home *** CD-ROM | disk | FTP | other *** search
- Welcome to the 'How to Hack' series of documents. After seeing many 'short
- arsed' attempts on a lot of systems (mainly BBS's), I have decided to
- contribute to the needs of up-and-comming Hacker's. Now people who have had
- experience, will read this document with an air of sarcasim and will probably
- say Bullshit, Bullshit, Bullshit but may I add that everyone has their own
- method. As to whether it is effective or not, that remains to be seen but I
- will provide the grounds to my method which so far has seen 2 successfull
- hacks into Continental Airlines in the USA. The first attempt was quite easy
- as I had 75% of the passwords needed. The second attempt involved entering via
- a back door.
-
- Anyway, enough of the bullshit and onto the fundamentals. First of all, you
- probably all have a copy of Hugo Cornwall's, 'Hacker's Handbook III' or are
- contemplating on getting one. This is up to you. General summary on his book -
-
- Nice stories involving hacks in the early 1980's mainly in Britain and Europe
- but apart from that, not much content at all. If you read between the lines,
- then maybe you will get a bit more out of it but generally what he has to say
- comes down to common sense. There are a few interesting ciruit diagrams in the
- book which I would say are the only bits worth copying. Anyway, it is
- available from most bookstores and retails for around about $20.00.
-
- Starting Out
- ÄÄÄÄÄÄÄÄÄÄÄÄ
-
- Everyone starts out at the bottom, you always make mistakes and life's a
- bitch. These are just a few home truths about hacking. If you haven't read
- Murphy's laws, read them. No matter how funny they are, in the world of
- hacking they are damn true. There are five major requirements for a successul
- hack. These are (1) Time, (2) Patience, (3) Research ,(4) Common Sense and
- (5) The Element of Surprise.
-
- (1) Time
-
- Continental Airlines took me four (4) months to hack into. It also cost me a
- heck of a lot on phone bills, and travelling expenses from my place to meet
- people in town. To be a successful hacker, you must be a damn good con-artist.
- You must be able to bullshit your way into/out of any situation that arises.
- But before you do this, you must make sure that you WANT to complete the hack
- - not just do something half heartedly. An example was when I wanted more
- information on VAX computer systems. I made an appointment with the Computer
- Operations Manager and said that I was from XYZ company and in the process of
- installing a computer system. This fellow took me right the way through the
- Commonwealth Computer system. I got this because I bullshitted, and was
- dressed for the occassion, and could produce a business card (fake of course).
- Time goes hand and hand with research as you will find when you read about it.
-
- (2) Patience
-
- There is no bigger Piss Off than ringing up a place, getting a connect sign
- and then you both just sit there - no signs of life at all. Pisses me off and
- it'll piss you off but, you must pursevere. It is just a case of finding out
- about the computer and what it wants to make it speak. In my case, a descent
- kick up the arse with some fancy characters gave me a log on screen. However,
- it took me hours at a time to work out what it needed. You know you are
- getting frustrated when you start abusing the computer. In a case like that,
- switch off and leave yourself a little 'to do' note just so you have a
- reminder when you wake up at the crack of noon the next day. 'To Do' notes are
- a great idea. They are the same as leave little 'Rem' statements when you
- programme so you know where you were last up to.
-
- (3) Research
-
- This is the most important category in Hacking. YOU MUST KNOW WHAT YOU ARE
- DOING otherwise you arouse suspicion. Don't think that when you log on to a
- system and try 100,000 different log on names, that you go un noticed. Utter
- bullshit. Almost every system contains a log file of everything that has
- happened. You must know the system you are going to hack. Eg/ Unix or VAX. I
- can suggest to good books on UNIX and Vax.
-
- Unix - 'Operating Systems - Design and Implementation'
- Prentice-Hall International Editions. Andrew S. Tanenbaum.
- VAX - 'VMS VAX' (dunno the rest of it !)
-
- The next step is to find out information about the workers at the place that
- you are going to enter. Find out who controls the company, who the closest
- person is to the computer operations department, and ask for information
- regarding their computer system. Read magazines as they tell a lot about who's
- got what in the way of computers. Keep up to date in your research. There is
- no use finding out in March that XYZ uses Unix and in June going to hack as
- they might have switched to VMS Vax. Keep alert.
-
- (4) Common Sense
-
- Not everyone has it and if you don't have it, don't even attempt to hack.
- Hacking is fun but it is getting bloody difficult and bloody dangerous. The
- Government have not passed any major laws on hacking due to the fact that they
- do not know how to handle it. However, if they don't get you on hacking
- charges, you can be your left nut that they'll book you on something else.
-
- (5) The Element of Surprise
-
- There is no use making a 4th of July celebration just because you are going
- to enter a system. It is okay afterwards to brag about it if you have to, but
- before you actually enter the system, keep your mouth shut. Word gets around
- fast in the computer world. You can be ambushed and not even know it. When you
- are on the system, keep checking to make sure that you are alone and that no
- one is watching you. You can do this by constantly checking your status and
- the file time and dates in directories. Vague method but works alot of the
- time. Also check electronic mail and who else is on the system. Don't do it
- too regularly as you will arouse suspicion. Get on there, do what you want and
- get off. Do not linger on there.
-
- Don't get caught. Check for line traces on your phone regularly. Use a
- multi meter - I am pretty sure that the line should sit around 5 volts. You
- can check for traces by seeing if the line is is around 3 volts or so. Line
- traces need to draw power from somewhere and they mainly grab it from the
- Telephone line. The group in melbourne who claim to be 'Phoneix' is a load of
- bullshit. I have heard that they are taking the rap for something that other
- people have done. They are a bunch of wankers because they will be a test case
- and they have as but as good a chance of keeping out of jail as woman has
- growing balls. If you get caught or suspect that you are going to be, hide
- everything or destroy everything. You do not want any bit of incriminating
- evidence at your place when they come around to check you out.
-
- Well that is it for this text file. I'll produce another one shortly. The
- next one will focus mainly on BBS's, other commercial companies and
- information on the Hacker's Multi Terminal Emulation programme which I am
- working on called 'Carlisle'.
-
- Until then, keep up the good work and I'll put another file up soon !
-
-