The Anarchist Cookbook (13 page)

Read The Anarchist Cookbook Online

Authors: William Powell

Tags: #Reference, #Handbooks & Manuals

saved and all the Download path names.

Now to get the Sysop's primary pass you upload a text file like this:

MENU

1

D1:USERLOG.DAT

Breaking into Bedwetter's BBS

Again you then download this file non-Xmodem and you will see:

Breaking into Bedwetter's BBS

Selection [0]:

You then hit 1 and the long USERLOG.DAT file comes flying at you. The Sysop is the first

entry in this very long file so it is easy. You will see:

SYSOP'S NAME X1XXX

You should now have his 2 passwords.

There is only one easy way out of this that I can think of, and that is to make all new

uploads go to SYSOP level (Level 9) access only. This way nobody can pull off what I just

explained. I feel this is a major Bug on Mr. Ledbetter's part. I just don't know why no one

had thought of it before. I would like to give credit to Redline for the message he left on

Modem Hell telling about this problem, and also to Unka for his ideas and input about

correcting it.

56. Firebombs by The Jolly Roger

Most fire bombs are simply gasoline filled bottles with a fuel soaked rag in the mouth (the

bottle's mouth, not yours). The original Molotov cocktail, and still about the best, was a

mixture of one part gasoline and one part motor oil. The oil helps it to cling to what it

splatters on. Some use one part roofing tar and one part gasoline. Fire bombs have been

found which were made by pouring melted wax into gasoline.

57. Fuse Ignition Bomb by The Jolly Roger

A four strand homemade fuse is used for this. It burns like fury. It is held down and

concealed by a strip of bent tin cut from a can. The exposed end of the fuse is dipped into

the flare igniter. To use this one, you light the fuse and hold the fire bomb until the fuse

has burned out of sight under the tin. Then throw it and when it breaks, the burning fuse

will ignite the contents.

58. Generic Bomb by The Jolly Roger

Acquire a glass container.

Put in a few drops of gasoline.

Cap the top.

Now turn the container around to coat the inner surfaces and then evaporates.

Add a few drops of potassium permanganate (Get this stuff from a snake bite kit)

The bomb is detonated by throwing against a solid object.

After throwing this thing, run like hell. This thing packs about « stick of dynamite.

59. Green Box Plans by the Jolly Roger

Paying the initial rate in order to use a red box (on certain fortresses) left a sour taste in

many red boxers mouths, thus the green box was invented. The green box generates useful

tones such as COIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones that

ACTS or the TSPS operator would send to the CO when appropriate. Unfortunately, the

green box cannot be used at the fortress station but must be used by the CALLED party.

Here are the tones:

COIN COLLECT 700+1100hz

COIN RETURN 1100+1700hz

RINGBACK 700+1700hz

Before the called party sends any of these tones, an operator release signal should be sent

to alert the MF detectors at the CO. This can be done by sending 900hz + 1500hz or a

single 2600 wink (90 ms.) Also do not forget that the initial rate is collected shortly

before the 3 minute period is up. Incidentally, once the above MF tones for collecting and

returning coins reach the CO, they are converted into an appropriate DC pulse (-130 volts

for return and +130 for collect). This pulse is then sent down the tip to the fortress. This

causes the coin relay to either return or collect the coins. The alleged "T-network" takes

advantage of this information. When a pulse for coin collect (+130 VDC) is sent down the

line, it must be grounded somewhere. This is usually the yellow or black wire. Thus, if the

wires are exposed, these wires can be cut to prevent the pulse from being grounded. When

the three minute initial period is almost up, make sure that the black and yellow wires are

severed, then hang up, wait about 15 seconds in case of a second pulse, reconnect the

wires, pick up the phone, and if all goes well, it should be "JACKPOT" time.

60. Portable Grenade Launcher by The Jolly Roger

If you have a bow, this one is for you. Remove the ferrule from an aluminum arrow, and fill

the arrow with black powder (I use grade FFFF, it burns easy)and then glue a shotshell

primer into the hole left where the ferrule went. Next, glue a BB on the primer, and you

are ready to go! Make sure no one is nearby.... Little shreds of aluminum go all over the

place!

61. Hacking Tutorial by The Jolly Roger

What is hacking?

According to popular belief the term hacker and hacking was founded at MIT it comes

from the root of a hack writer, someone who keeps "hacking" at the typewriter until he

finishes the story. A computer hacker would be hacking at the keyboard or password

works.

What you need:

To hack you need a computer equipped with a modem (a device that lets you transmit data

over phone lines) which should cost you from $100 to $1200.

How do you hack?

Hacking requires two things:

The phone number.

Answer to identity elements.

How do you find the phone number?

There are three basic ways to find a computers phone number:

Scanning

Directory

Inside info

What is scanning?

Scanning is the process of having a computer search for a carrier tone. For example, the

computer would start at (800) 111-1111 and wait for carrier if there is none it will go on to

111-1112 etc. If there is a carrier it will record it for future use and continue looking for

more.

What is directory assistance?

This way can only be used if you know where your target computer is. For this

example say it is in menlo park, CA and the company name is Sri.

Dial 411 (or 415-555-1212)

Say "Menlo park"

Say "Sri"

Write down number

Ask if there are any more numbers

If so write them down.

Hang up on operator

Dial all numbers you were given

Listen for carrier tone

If you hear carrier tone write down number, call it on your modem and your set to hack!

62. The Basics of Hacking II by The Jolly Roger

Basics to know before doing anything, essential to your continuing career as one of the

elite in the country... This article, "The introduction to the world of hacking." is meant to

help you by telling you how not to get caught, what not to do on a computer system, what

type of equipment should I know about now, and just a little on the history, past present

future, of the hacker.

Welcome to the world of hacking! We, the people who live outside of the normal rules, and

have been scorned and even arrested by those from the 'civilized world', are becoming

scarcer every day. This is due to the greater fear of what a good hacker (skill wise, no

moral judgments here) can do nowadays, thus causing anti- hacker sentiment in the masses.

Also, few hackers seem to actually know about the computer systems they hack, or what

equipment they will run into on the front end, or what they could do wrong on a system to

alert the 'higher' authorities who monitor the system. This article is intended to tell you

about some things not to do, even before you get on the system. I will tell you about the

new wave of front end security devices that are beginning to be used on computers. I will

attempt to instill in you a second identity, to be brought up at time of great need, to pull

you out of trouble. And, by the way, I take no, repeat, no, responsibility for what we say in

this and the forthcoming articles.

Enough of the bullshit, on to the fun: after logging on your favorite bbs, you see on the

high access board a phone number! It says it's a great system to "fuck around with!" This

may be true, but how many other people are going to call the same number? So: try to

avoid calling a number given to the public. This is because there are at least every other

user calling, and how many other boards will that number spread to? If you call a number

far, far away, and you plan on going through an extender or a re-seller, don't keep calling

the same access number (I.E. As you would if you had a hacker running), this looks very

suspicious and can make life miserable when the phone bill comes in the mail. Most cities

have a variety of access numbers and services, so use as many as you can. Never trust a

change in the system... The 414's, the assholes, were caught for this reason: when one of

them connected to the system, there was nothing good there. The next time, there was a

trek game stuck right in their way! They proceeded to play said game for two, say two and

a half hours, while telenet was tracing them! Nice job, don't you think? If anything looks

suspicious, drop the line immediately!! As in, yesterday! The point we're trying to get

across is: if you use a little common sense, you won't get busted. Let the little kids who

aren't smart enough to recognize a trap get busted, it will take the heat off of the real

hackers. Now, let's say you get on a computer

system... It looks great, checks out, everything seems fine. OK, now is when it gets more

dangerous. You have to know the computer system to know what not to do. Basically, keep

away from any command something, copy a new file into the account, or whatever! Always

leave the account in the same status you logged in with. Change *nothing*... If it isn't an

account with priv's, then don't try any commands that require them! All, yes all, systems

are going to be keeping log files of what users are doing, and that will show up. It is just

like dropping a trouble-card in an ESS system, after sending that nice operator a pretty

tone. Spend no excessive amounts of time on the account in one stretch. Keep your calling

to the very late night if possible, or during business hours (believe it or not!). It so

happens that there are more users on during business hours, and it is very difficult to read

a log file with 60 users doing many commands every minute. Try to avoid systems where

everyone knows each other, don't try to bluff. And above all: never act like you own the

system, or are the best there is. They always grab the people who's heads swell... There is

some very interesting front end equipment around nowadays, but first let's define terms...

By front end, we mean any device that you must pass through to get at the real computer.

There are devices that are made to defeat hacker programs, and just plain old

multiplexers. To defeat hacker programs, there are now devices that pick up the phone and

just sit there... This means that your device gets no carrier, thus you think there isn't a

computer on the other end. The only way around it is to detect when it was picked up. If

it picks up after the same number ring, then you know it is a hacker-defeater. These

devices take a multi-digit code to let you into the system. Some are, in fact, quite

sophisticated to the point where it will also limit the user name's down, so only one name

or set of names can be valid logins after they input the code... Other devices input a

number code, and then they dial back a pre-programmed number for that code. These

systems are best to leave alone, because they know someone is playing with their phone.

You may think "but I'll just reprogram the dial-back." Think again, how stupid that is...

Then they have your number, or a test loop if you were just a little smarter. If it's your

number, they have your balls (if male...), if its a loop, then you are screwed again, since

those loops

are *monitored*. As for multiplexers... What a plexer is supposed to do is this:

The system can accept multiple users. We have to time share, so we'll let the front-end

processor do it... Well, this is what a multiplexer does. Usually they will ask for something

like "enter class" or "line:". Usually it is programmed for a double digit number, or a four

to five letter word. There are usually a few sets of numbers it accepts, but those numbers

also set your 300/1200/2400 baud data type. These multiplexers are inconvenient at best,

so not to worry. A little about the history of hacking: hacking, by my definition, means a

great knowledge of some special area. Doctors and lawyers are hackers of a sort, by this

definition. But most often, it is being used in the computer context, and thus we have a

definition of "anyone who has a great amount of computer or telecommunications

knowledge." You are not a hacker because you have a list of codes... Hacking, by my

definition, has then been around only about 15 years. It started, where else but, MIT and

colleges where they had computer science or electrical engineering departments. Hackers

have created some of the best computer languages, the most awesome operating systems,

and even gone on to make millions. Hacking used to have a good name, when we could

Other books

Six Bad Things by Charlie Huston
Violet Ink by Rebecca Westcott
Taming the Alter Ego by Shermaine Williams
The Devil's Serenade by Catherine Cavendish
Boot Camp Bride by Lizzie Lamb
Pleasure Me by Tina Donahue
Appleby's Answer by Michael Innes
A Twist in Time by Frank J. Derfler