HACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACK HACK A special Release From Anarchia Reticulum HACK HACK HACK HACK -=> Hacking and its History <=- HACK HACK by HACK HACK The Shadow HACK HACK _/'` /'`/``` HACK HACK HACK HACK The Shadow's AE - [604] 271-0778 HACK HACK The WareHouse - [209] 474-0868 HACK HACK Mister Grungy's Ae - [904] 731-4679 HACK HACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACKHACK Note: This file was created on the basis of the purpose on educating anyone interested in "HACKING" or different uses of computers. Not just for boring Word Processing and Games but then what the fuck were the computers used for besides serious business ??? I do not take any responsibility of use and result from this file. ============================================================================== History of Hacking ~~~~~~~~~~~~~~~~~~ Definition of Hacker: Computer Enthusiast. Hacking itself dated back to about 1960. But the most significant of the first hacks was yes, a girl of seventeen, by the name of Susan Headly. In 1977 she had extracted information at her Telephone Company and ran all over the U.S.A by networks. She stopped 4 years later when her boyfriend was scheming up ways to shut down the telephone company. Next he was heard working on a government project. But in recent years two spectacular hacks have astounded many people. One was the 'Great Prince Philip Prestel Hack'. It occured on the second of October 1983. A demostrator was showing off a new system (network) and displaying what E-Mail is when he got the following message: Computer Security Error. Illegal Access. I hope your television PROGRAMME runs as smoothly as my PROGRAM worked out your passwords! Nothing is secure! Hacker's Song Put another password in, Bomb it out and try again Try to get past logging in, We're hacking, hacking, hacking. Try his first wife's maiden name, This is more fun than just a game, It's real fun, but just the same, It's hacking, hacking, hacking. The Nutcracker (hackers UK) HI THERE, OWLETS, FROM OZ AND YUG (OLIVER AND GUY) It is said they then crashed the entire system.. Then there was the famous 'COOKIE MONSTER' hack. It was said to be that a clever modemer had re-programmed a system so that whenever a sub-scriber of a system was retrieving data, A flashing sentence kept being repeated 'I want a COOKIE! , I want a COOKIE!' at the top of the screen. If the person did not type COOKIE it would start destroying what was on the screen and the data files. And if he typed COOKIE. The message would disappear and replace it with "I DON'T WANT A COOKIE ANYWAYS" Equipment: A computer and a modem. It doesn't need to be fancy. Get yourself a TRS-80 MC-10 from someone who's selling one, a 50$ radio shack modem and the software for about 100$ bux max. Targets: University Systems - Run on a UNIX system, can branch off to others Banks - Are capable of beaking broke into. but the chances of being caught are great. No bank has really suffered. On-Line Databases - Such as Compuserve or the source. but Grab a example of their passwords and I.D's to get the idea of the format. and Government Computers - Which can be reached by University computers. Accessing University Computers One thing about university are they are fucking maddening. They are usually run on some type of feable UNIX system which can drive you wild. When you call one up. It will ask you for a destination. From my experience, either type 'HELP' or a government system such as ARPA-Net or PLATFORM maybe COMPU-SERVE and the SOURCE. I found HELP will pop you in its "programmable function" where you just type in a command. Try TOPICS at the * , ; , > , ? , or # sign it might list all the available things you can do. The UNIX systems file and topics are in numbers like for instance: 103 Computers 104 Hardware 105 Commands etc. Thats what you might see from TOPICS. But there are more than just those in the list. Just by typing random numbers you might stumble upon important information. Finding these University Systems Check out your local University number area like 321 or 228 or whatever then wargame dial in that area. If you are using touch tone it would take you about 4 hours to cover the whole area.. but you could find other systems.. How to FIND business systems Get your favorite wargames dialer (use hayes hamatic for a smartmodem) .. if you dont have it. Call my AE up and i will give you a copy. Anyways.. Look at a large corporations number area like 450 or whatever and maybe it has 452 - xxxx .. depending on the area you live in. Then start dialing.. It takes a long time but it's worth it. Hints and Techniques Log onto the system yourself and find out the format for the passwords. Now try and find some I.D. numbers of people that you have heard of rumors about like does he phreak? does he hack. Is he into movies? Then get his or her I.D and start hacking with passwords relating to what he likes.. example. if he likes girls. Try GIRLS, SEX, FUCK, CHIK, SHIK, CHICK, SEXY, SHIT, CUTE, SUCK, COCK, PUSSY, TIT, TITS etc but thats what most girl crazy teenagers would put. But here is a list of most common passwords used HELP, TEST, TESTER, SYSTEM, C0-SYSOP, CO-SYSOP,COSYSOP, C0SYSOP, SYSTEM MANAGER, SYSMAN, SYSOP, SYS0P, ENGINEER, OPS, OPERATIONS, CENTRAL, DEMO, SECRET, PASSWORD, LOVE, SEX, DEMONSTRATION, DEMO, AID, DISPLAY, CALL, TERMINAL, EXTERNAL, REMOTE, CHECK, NET, HACK, HACKER, NETWORK, PHONE, AND FRED Also. Try 1234567890, 11111111, 22222222, 10101010 etc.. Those have been found frequently too. Then there are the usuals: MODEM, PHREAK, CAT, GUY, GUN, LION, QWERTY, AND AE Ways to BREAK into big systems. OK. Many Many very old systems had a tiny 2 letter combo. If pressed you would get super user access. I would try it on any level on any system. The 2 characters are ' ;; ' thats it!. Also a skillful programmer/hacker can call a system, and make the system hand over the I.D's and passwords (big systems) by: Calling the computer system and sticking the modem in answer mode (on smartmodems its AT R. example: AT T D XXX-XXXX,,,,,,R) THEN alterting the baud rate. And finally sending it Control-E. which should do it. Radio Hacking Actually. Radio hacking is more of a novelty than usefullnes but you could find nifty info such as internation radio operated computer systems and especially the government!. But you need the following equipment: An apple ][ A short wave radio buy a jack that will plug your cassette into the Apple Cassette IN port. Now I assume you have a little machine language programming. First, Plug the cassette cord into the short wave earfone plug, plug the other end into the cassette port. Now the main problem is that data is sent at 5 bits 1 stop bit or none. But create a m/l program to strip off the bits.. Or you maybe get lucky and they might be operating at 7 bits. I dont know. But common garbage you might get is RYRYRYRYRYRYRY or GTGTGTGTG But its worth the try. Just borrow your dads short wave or buy your own for about 50$ now and rig it up to the cassette. Then load the contents of $C060 and your set. Strip down if you want and print. Its as easy as that! Also. YOu could mistake computers for "snow" .. There you go folks. a short complete guide to hacking and some of it's special interestes. But remember. This was a basic Hacking tutorial. If anyone wants any special information on tones or any information on Packet Switching (PSS or we call Telenet or datapac) then please give me a call. [=================================[] [] []===================================] [> ................ Call these Anarchia Reticulum systems ..................<] [> The Shadow's Ae ................................... 604-271-0778.300/1200<] [> The Warehouse Ae .................................. 209-474-0868.300/1200<] [> Mister Grungy's Ae ................................ 904-731-4679.300/1200<] [> S.E. Connection ................................... 305-898-5649.1200only<] [> Crowley Manor ..................................... 915-694-0004.300/1200<] [> Mystics ........................................... 209-957-7372.300/1200<] [=================================[] [] []===================================]