home *** CD-ROM | disk | FTP | other *** search
-
-
- HackBBS v0.2 COM ONLY Version
- (c)1993 By Virogen
- 06-29-93
- -----------------
- The Ultimate In Board Hacking Software
-
-
- Disclaimer :
- Naturally, this software is not intended to be used in any
- state or country in which it may be illegal. This creator
- of this software can not be help accountable for any
- damages, loss of data, or anything else which may result
- in the use of this program. All responsibilities lie with
- the operator of this software.
- If you do not agree to the above terms then don't use
- this software.
-
- HACKBBS - The Concept
- ----------------------
- A while back I was looking at a few text files which describe how to
- infiltrate bulletin boards thru backdoors and bugs in the software. I
- saw some good ideas for hacking SOME bulletin boards. HackBBS will allow
- you to hack nearly any bulletin board in existence using no bugs in the
- software, etc.. So, welcome to the latest in board hacking technology.
- Yea, stupid phrase, I know.
-
-
- How it works
- -------------
- This is a COM Only version of Hackbbs. I had a few problems with memory
- with the EXE version, but I do still expect to release it soon. I separated
- the versions so that the file size could be kept to a minimum. Anyway, what
- hackbbs does is install itself, along with a specified batch, com, or exe
- file, onto any COM file. The file you append to the COM file will be
- called the activation file from now on. This file CANNOT exceed 32k. If it
- does, then it will not execute properly once activated. I'm working
- on fixing this. ALSO, make sure that the infected COM file does not exceed
- the 64k boundary. The infected file will function normally until the
- key is located anywhere in the command line. At which time, hackbbs
- will take control and write the batch, com, or exe file which it attached
- to the program. It will then execute this file. HackBBS writes the file
- to disk as EXACTLY the same name you specified when infecting the file.
- If you used a path such as : "C:\TEST\RUNME.COM" then HackBBS will write
- the file to that directory and filename upon activation. If you did not
- specify a directory name, then hackbbs will write it to the current
- directory on the victim's computer. Confusing enough? Good, why make it
- simple when you can completly screw things over?
-
- Command Syntax for HACKBBS :
- HACKBBS [COMFILE] [COM_EXE_BAT] [KEY]
-
- -COMFILE is the name of the file you wish to infect
- -COM_EXE_BAT is the name of the activation file -LESS THAN 32k!
- -KEY is up to 8 characters which, when found on the command line,
- activate hackBBS. If you specify a key longer than 8 chars, only
- the first 8 characters will apply.
-
- How to use it
- --------------
- To use this program to hack into a board, simply run hackbbs on the
- COM file you wish to infect, using the above parameters. The activation file
- you create can do anything you wish. I'll leave it up to your imagination
- to think of the possiblities. One thing you MUST remember though, this
- program is not designed for re-entry into the executable. Therefore, once
- the batch file is run don't plan on returning to the COM file and
- continuing the process. I'd suggest removing all evidence and then
- rebooting his system. Anyway, an example of hacking a board would
- be :
- 1) Create the batch file TEST.BAT containing :
- CTTY COM1
- (substitute the appropriate COM port)
- 2) Extract the latest version of DSZ into a temporary directory.
- Infect DSZ.COM with a command line something like :
- HACKBBS C:\TEMP\DSZ.COM TEST.BAT ACTIVATE
- 3) Be friendly, and upload it to the victim's board.
- (be sure to talk it up in the description, to make sure
- that he'll use it on his board)
- 4) Call back whenever he's got it installed and upload him the
- file : ACTIVATE.ZIP using DSZ. Bam, boom, smack.. as soon
- as DSZ is run with "ACTIVATE" in the command line your batch
- file is written to disk and executed. Thus, redirecting
- standord I/O to COM1. You just got access to his/her DOS.
- You need to remember to delete all evidence of your infiltration.
- HackBBS will not return to the infected file and continue
- running. I suggest you reboot the victim's computer.
-
- Ofcourse, you could just write a batch file to format his HD, send
- his users data file, etc.. No limits. The best part is that HACKBBS
- can install itself onto any COM file, protocols, compression utils,
- upload processors, etc. The EXE version will be even more effective.
-
-
- Details & Warnings
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- - DO NOT USE AN ACTIVATION FILE LARGER THAN 32k!
- - ALWAYS CHECK AND MAKE SURE THAT AN INFECTED COM FILE DOES NOT
- EXCEED THE 64K BOUNDARY.
- - HackBBS was written in assembly, compiled by TASM v2.0.
- - When executing a batch file, hackbbs uses the command line :
- C:\COMMAND.COM /K [filename.BAT]
- Where [filename.BAT] is the filename of the file you appended
- to the COM.
- - When executing a COM or EXE file, hackbbs executes it directly.
- - No, I haven't tested it extensivly.
- - Nowhere Man's CRYPTCOM utility was used to encrypt the
- original executable (HACKBBS.COM). I then made a few
- unsignificant changes to deter debugging. (here CCh, there
- a CCh, everywhere a CCh)
-
-
- How to tell Virogen what a great program he wrote, or what a shitty
- piece of crap this thing is
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- Simply leave me a message anywhere, and everywhere and eventually I'm
- bound to recieve it. You can leave a message to me on Fidonet (Virogen),
- Virus Conference, but I only scan it occaisionally.
-
-
- ░▀▀ ▀▀
- ░▀▀ ▀▀ ░▀ ░▀▀▀▀ ░▀▀▀ ░▀▀▀ ░▀▀ ░▀▀▀
- ░▀▀▀▀ ░▀▀ ░▀▀ ▀ ░▀ ▀ ░▀ ▀ ░▀▀ ░▀ ▀
- ░▀▀ ░▀▀ ░▀▀ ░▀▀▀ ░▀▀▀ ░▀▀ ░▀ ▀
- ░▀
- ────────────────────── ▀▀▀ ────────────────
-
-
-