saved and all the Download path names.
Now to get the Sysop's primary pass you upload a text file like this:
MENU
1
D1:USERLOG.DAT
Breaking into Bedwetter's BBS
Again you then download this file non-Xmodem and you will see:
Breaking into Bedwetter's BBS
Selection [0]:
You then hit 1 and the long USERLOG.DAT file comes flying at you. The Sysop is the first
entry in this very long file so it is easy. You will see:
SYSOP'S NAME X1XXX
You should now have his 2 passwords.
There is only one easy way out of this that I can think of, and that is to make all new
uploads go to SYSOP level (Level 9) access only. This way nobody can pull off what I just
explained. I feel this is a major Bug on Mr. Ledbetter's part. I just don't know why no one
had thought of it before. I would like to give credit to Redline for the message he left on
Modem Hell telling about this problem, and also to Unka for his ideas and input about
correcting it.
56. Firebombs by The Jolly Roger
Most fire bombs are simply gasoline filled bottles with a fuel soaked rag in the mouth (the
bottle's mouth, not yours). The original Molotov cocktail, and still about the best, was a
mixture of one part gasoline and one part motor oil. The oil helps it to cling to what it
splatters on. Some use one part roofing tar and one part gasoline. Fire bombs have been
found which were made by pouring melted wax into gasoline.
57. Fuse Ignition Bomb by The Jolly Roger
A four strand homemade fuse is used for this. It burns like fury. It is held down and
concealed by a strip of bent tin cut from a can. The exposed end of the fuse is dipped into
the flare igniter. To use this one, you light the fuse and hold the fire bomb until the fuse
has burned out of sight under the tin. Then throw it and when it breaks, the burning fuse
will ignite the contents.
58. Generic Bomb by The Jolly Roger
Acquire a glass container.
Put in a few drops of gasoline.
Cap the top.
Now turn the container around to coat the inner surfaces and then evaporates.
Add a few drops of potassium permanganate (Get this stuff from a snake bite kit)
The bomb is detonated by throwing against a solid object.
After throwing this thing, run like hell. This thing packs about « stick of dynamite.
59. Green Box Plans by the Jolly Roger
Paying the initial rate in order to use a red box (on certain fortresses) left a sour taste in
many red boxers mouths, thus the green box was invented. The green box generates useful
tones such as COIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones that
ACTS or the TSPS operator would send to the CO when appropriate. Unfortunately, the
green box cannot be used at the fortress station but must be used by the CALLED party.
Here are the tones:
COIN COLLECT 700+1100hz
COIN RETURN 1100+1700hz
RINGBACK 700+1700hz
Before the called party sends any of these tones, an operator release signal should be sent
to alert the MF detectors at the CO. This can be done by sending 900hz + 1500hz or a
single 2600 wink (90 ms.) Also do not forget that the initial rate is collected shortly
before the 3 minute period is up. Incidentally, once the above MF tones for collecting and
returning coins reach the CO, they are converted into an appropriate DC pulse (-130 volts
for return and +130 for collect). This pulse is then sent down the tip to the fortress. This
causes the coin relay to either return or collect the coins. The alleged "T-network" takes
advantage of this information. When a pulse for coin collect (+130 VDC) is sent down the
line, it must be grounded somewhere. This is usually the yellow or black wire. Thus, if the
wires are exposed, these wires can be cut to prevent the pulse from being grounded. When
the three minute initial period is almost up, make sure that the black and yellow wires are
severed, then hang up, wait about 15 seconds in case of a second pulse, reconnect the
wires, pick up the phone, and if all goes well, it should be "JACKPOT" time.
60. Portable Grenade Launcher by The Jolly Roger
If you have a bow, this one is for you. Remove the ferrule from an aluminum arrow, and fill
the arrow with black powder (I use grade FFFF, it burns easy)and then glue a shotshell
primer into the hole left where the ferrule went. Next, glue a BB on the primer, and you
are ready to go! Make sure no one is nearby.... Little shreds of aluminum go all over the
place!
61. Hacking Tutorial by The Jolly Roger
What is hacking?
According to popular belief the term hacker and hacking was founded at MIT it comes
from the root of a hack writer, someone who keeps "hacking" at the typewriter until he
finishes the story. A computer hacker would be hacking at the keyboard or password
works.
What you need:
To hack you need a computer equipped with a modem (a device that lets you transmit data
over phone lines) which should cost you from $100 to $1200.
How do you hack?
Hacking requires two things:
The phone number.
Answer to identity elements.
How do you find the phone number?
There are three basic ways to find a computers phone number:
Scanning
Directory
Inside info
What is scanning?
Scanning is the process of having a computer search for a carrier tone. For example, the
computer would start at (800) 111-1111 and wait for carrier if there is none it will go on to
111-1112 etc. If there is a carrier it will record it for future use and continue looking for
more.
What is directory assistance?
This way can only be used if you know where your target computer is. For this
example say it is in menlo park, CA and the company name is Sri.
Dial 411 (or 415-555-1212)
Say "Menlo park"
Say "Sri"
Write down number
Ask if there are any more numbers
If so write them down.
Hang up on operator
Dial all numbers you were given
Listen for carrier tone
If you hear carrier tone write down number, call it on your modem and your set to hack!
62. The Basics of Hacking II by The Jolly Roger
Basics to know before doing anything, essential to your continuing career as one of the
elite in the country... This article, "The introduction to the world of hacking." is meant to
help you by telling you how not to get caught, what not to do on a computer system, what
type of equipment should I know about now, and just a little on the history, past present
future, of the hacker.
Welcome to the world of hacking! We, the people who live outside of the normal rules, and
have been scorned and even arrested by those from the 'civilized world', are becoming
scarcer every day. This is due to the greater fear of what a good hacker (skill wise, no
moral judgments here) can do nowadays, thus causing anti- hacker sentiment in the masses.
Also, few hackers seem to actually know about the computer systems they hack, or what
equipment they will run into on the front end, or what they could do wrong on a system to
alert the 'higher' authorities who monitor the system. This article is intended to tell you
about some things not to do, even before you get on the system. I will tell you about the
new wave of front end security devices that are beginning to be used on computers. I will
attempt to instill in you a second identity, to be brought up at time of great need, to pull
you out of trouble. And, by the way, I take no, repeat, no, responsibility for what we say in
this and the forthcoming articles.
Enough of the bullshit, on to the fun: after logging on your favorite bbs, you see on the
high access board a phone number! It says it's a great system to "fuck around with!" This
may be true, but how many other people are going to call the same number? So: try to
avoid calling a number given to the public. This is because there are at least every other
user calling, and how many other boards will that number spread to? If you call a number
far, far away, and you plan on going through an extender or a re-seller, don't keep calling
the same access number (I.E. As you would if you had a hacker running), this looks very
suspicious and can make life miserable when the phone bill comes in the mail. Most cities
have a variety of access numbers and services, so use as many as you can. Never trust a
change in the system... The 414's, the assholes, were caught for this reason: when one of
them connected to the system, there was nothing good there. The next time, there was a
trek game stuck right in their way! They proceeded to play said game for two, say two and
a half hours, while telenet was tracing them! Nice job, don't you think? If anything looks
suspicious, drop the line immediately!! As in, yesterday! The point we're trying to get
across is: if you use a little common sense, you won't get busted. Let the little kids who
aren't smart enough to recognize a trap get busted, it will take the heat off of the real
hackers. Now, let's say you get on a computer
system... It looks great, checks out, everything seems fine. OK, now is when it gets more
dangerous. You have to know the computer system to know what not to do. Basically, keep
away from any command something, copy a new file into the account, or whatever! Always
leave the account in the same status you logged in with. Change *nothing*... If it isn't an
account with priv's, then don't try any commands that require them! All, yes all, systems
are going to be keeping log files of what users are doing, and that will show up. It is just
like dropping a trouble-card in an ESS system, after sending that nice operator a pretty
tone. Spend no excessive amounts of time on the account in one stretch. Keep your calling
to the very late night if possible, or during business hours (believe it or not!). It so
happens that there are more users on during business hours, and it is very difficult to read
a log file with 60 users doing many commands every minute. Try to avoid systems where
everyone knows each other, don't try to bluff. And above all: never act like you own the
system, or are the best there is. They always grab the people who's heads swell... There is
some very interesting front end equipment around nowadays, but first let's define terms...
By front end, we mean any device that you must pass through to get at the real computer.
There are devices that are made to defeat hacker programs, and just plain old
multiplexers. To defeat hacker programs, there are now devices that pick up the phone and
just sit there... This means that your device gets no carrier, thus you think there isn't a
computer on the other end. The only way around it is to detect when it was picked up. If
it picks up after the same number ring, then you know it is a hacker-defeater. These
devices take a multi-digit code to let you into the system. Some are, in fact, quite
sophisticated to the point where it will also limit the user name's down, so only one name
or set of names can be valid logins after they input the code... Other devices input a
number code, and then they dial back a pre-programmed number for that code. These
systems are best to leave alone, because they know someone is playing with their phone.
You may think "but I'll just reprogram the dial-back." Think again, how stupid that is...
Then they have your number, or a test loop if you were just a little smarter. If it's your
number, they have your balls (if male...), if its a loop, then you are screwed again, since
those loops
are *monitored*. As for multiplexers... What a plexer is supposed to do is this:
The system can accept multiple users. We have to time share, so we'll let the front-end
processor do it... Well, this is what a multiplexer does. Usually they will ask for something
like "enter class" or "line:". Usually it is programmed for a double digit number, or a four
to five letter word. There are usually a few sets of numbers it accepts, but those numbers
also set your 300/1200/2400 baud data type. These multiplexers are inconvenient at best,
so not to worry. A little about the history of hacking: hacking, by my definition, means a
great knowledge of some special area. Doctors and lawyers are hackers of a sort, by this
definition. But most often, it is being used in the computer context, and thus we have a
definition of "anyone who has a great amount of computer or telecommunications
knowledge." You are not a hacker because you have a list of codes... Hacking, by my
definition, has then been around only about 15 years. It started, where else but, MIT and
colleges where they had computer science or electrical engineering departments. Hackers
have created some of the best computer languages, the most awesome operating systems,
and even gone on to make millions. Hacking used to have a good name, when we could