Taken from: ? IntroDucktion ? Chapter One - Rules ? Chapter Two - People ? Chapter Three - Now what? ? Chapter Four - Taking Over ? Chapter Five - Reading ? Chapter Six - Hotmail ? Chapter Seven - At Ease ? Chapter Eight - Win95 Screensaver ? Chapter Nine - Da5 + Da6 ? Chapter Ten - A few notes on Warez and Mp3z ? Chapter Eleven - Some Links ta Places + Some Groups ? Tha End Of Book One ________________________________________________________ IntroDucktion Well Phreako's and Phreakix. Here it is, I sat down and I've written me a basic word explanation of how I crack and hack things. I ain't good with words so here is what u must do to become a hacker. You must be a perfectionist other wise u will be caught. Also read as much as you can. Don't think your self to great when working. Try not ta brag ta people. Ta consider yaself a hacker ya have ta prove it ta Ur self. Every time u get caught Ur a lame arse punk again so take pride in ya work! Everything here is stuff that I have done nothing I haven't unless I say I haven't done it. I wrote it in word97 after getting the AnarchyCookBook in word97 I thought this would be the easiest was for me ta write it. I'll try not to leave any contact names and numbers since I don't want ta be bugged by anyone about this text. If you know me you can tell me what you think, this is copyright ta me and I say u can copy it and pass it around anything in here I take no responsibility for if you do it etc. __________________________________________________________ Chap One - Tha Rules Right here we are tha rules fer hacking cracking and any other schit yas likes ta does. 1. Don't Del stuff - cause if yas get court yas gets in more schit. 2. When yas hack something it isn't not meant ta be spur of tha moment's type of schit research the crap and make sure ya know whats yas doing when ya do it. 3. Yas can hack fer the fun of it. Yas can get paid ta do it or ya can do it fer someonce else or hack fer revenge. 4. Always relies if u do it u must be willing ta face tha consequences 5. Things ta watch or u'll be court ? Don't hacks GOV computers unless it's internationally ? Don't hack your ISP unless yas wants user details Ur ISP are good! ? Be paranoid __________________________________________________________ Chap Two - People Tha next things yas must relies that people r dumb, not just a few a lot! I've seen hackers as dumb as normal people. Ok to relies how dumb the person we're cracking is look at any work they've done and read through it, get ta know your subject, know what they will and will not do Email them with a hotmail account and find out about them if you want to! What I'm talkin about with the works and that look at their homepage not only from tha outside but also tha source. A dumb person may know html, when you get up ta stuff like javascript look at their source if it is copied it will normally have a link back ta the homepage of tha person who made it or if will not have many comments in it at all. E.g. Code of Dumb Person Code of Smart Person U'll see this more and more as you research people - look at geocities homepages and find some lame phuck them send them a mail like this. To : Lamerarsefuck@geocities.com From: Geocities@aserver.com - goto http://www.8m.com or somewhere like that and get a mail address that is really good, u gets a homepage too. Subject : Geocities phucked it's self Mail : Greetings Our server is too small to compansate all our users and it shut it's self down the other day. On shutdown it wiped a lot of user passwords so if our file_manager screws up and kicks u Out this is y. We're trying ta update our server to what it was and better so please reply this mail With your username in the subject and your password as the body. Once again we are sorry for any inconveniences. Geocities Phuckeded I've done this before except it was a better-written letter it took about « an hour to prepare then I looked around geocities and found a page made in their new basic editor so I sent it to them and they replied giving me their user name and password. I don't have that letter any more because I wiped all my stuff off this computer recently. When I get back on the net I will rewrite that letter and put it in a later chapter. __________________________________________________________ Chapter Three - Now what? Well I think you've realized that people are dumb after reading the last section - I hope u did. What can I do? Well pick a target; don't go to high yet try a geocities page. Just look threw all the blocks u'll see one that looks crap sooner or later, find out about them. Find wear they're from - look at their email address sometime they don't use hotmail or geocities ones. User@schit.edu.au so goto http://www.schit.edu.au or http://schit.edu.au/ and you get where they're from. You can get their icq uin if they have one add urself to their list and then look at their details, even their IP address can be used ta trace them, goto http://ipadress it might get you somewhere, I came across a search tool that let u look up the location of an IP address, or just look at it and work it out for your self most IP addresses starting with 203.xxx.xxxx mean that they usually come from Australia or New Zealand. 209.xxx.xxxxxx means there from around USA/Canada and so on I came across a text that had a lot of this written down, I didn't see tha point of it when I first viewed it but now I relies tha thing I missed. Different countries seem ta have their own ways with how people act so think of that when you do this. Ok you know about the person now choose a method ta crack them, IMPORTANT NOTE: Find out more about their ISP. This was one of tha things that got me busted. Get the personality of the people who own the site in this case geocities. Read their newsletters and read their FAQ section and think exactly of what you will write, do some draft copies of it. Run a spell check threw it, send a copy of it to yourself with nicknames and signature files all in place so u know how they'll get it. The only thing that puts u down is the email which people don't think of when they read mail. Now your ready ta send it, before pressing send check all email are correct - I made this mistake and I sent it to tha webmaster of the person who owned the site. If they reply they'll do it within a week if not find a new target. Note : I've been back for abit and I've found a place that will trace tha persons ip address back to their server. It is meant to cmplain about spammers but wot tha hell I'll include it. It's at http://www.cyberarmy.com/ it's a good site for all your lame needs. Another way ta hack someone is to do it through Telnet which I haven't used much I've logged onto my ISP that way and looked around. It gave me a complete list of online users + it gave a list of their IP's. And then another way if they're on your server type thing get a ftp program I used CUTEFTP when I did this and then in hacking Text. You'll find the common system directories. The first one I tried was right so I look around and download some sort of file off it, read through it. and u'll get an idea of what system it runs in and who made it, down the bottom of the file I looked at had a copyright to SUN or something - I wiped all my stuff of this computer a day or 2 ago ta get more space I got about 200megs off the rest of the computer is filled with other peoples crap so that's why I'm guessing at a lot of this stuff! ___________________________________________ Chapter Four - Taking Over Ok now this chapter is about what to do when yas get into a geocities homepage, if you are like me the first time u get into one and leave access ta tha owner u'll be pissed of because dumb people think that when someone hacks them that they are clever if they can get back in. So that's why I have it so they don't get access back. A person who hacked my friends' homepage at geocities did everything here. I would have done the same thing if I were on the same mission he was on. Yas see he or they were a hate group against online EFEDS and my friend owned one so that was why he was targeted. Anyway he got in some way I don't know how but my friend gave out is password ta abouts 6 people. What happened was the hacker first changed tha password, next deleted everything but tha folders and tha main page and tha pictures. After that he changed tha member name and then tha email address. What I did first time was ta change tha password then I edited tha page leaving a note saying I was their and what she stuffed up with, then I let her back in by telling her some schit. Next time ta save the time hassles yas might as well do tha first crap because it shuts them up and pisses them off. _________________________________________________ Chapter Five - Reading Now ta become a successful hacker yas has gotta read abit, yas have still gotta do stuff but read and learn. So on ya travels take note of any library yas find. I don't have any at the moment but if you find Km's library ya cruisin. It has a great list of hacking textz. Anyhow I added this section Just for tha sake of Readed it cause it's good crap! Tha Manifesto: Mentor's Last Words by The Mentor Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world.... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smartass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong...." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. Tha Ethics: The Ethics of Hacking by Dissident I went up to a college this summer to look around, see if it was where I wanted to go and what not. The guide asked me about my interests, and when I said computers, he started asking me about what systems I had, etc. And when all that was done, the first thing he asked me was "Are you a hacker?" Well, that question has been bugging me ever since. Just what exactly is a hacker? A REAL hacker? For those who don't know better, the news media (and even comic strips) have blown it way out of proportion; A hacker, by wrong definition, can be anything from a computer user to someone who destroys everything they can get their evil terminals into. And the idiotic schmucks of the world who get a Commodore Vic-20 and a 300 baud modem (heh, and a tape drive!) for Christmas haven't helped hackers' reputations a damn bit. They somehow get access to a really cool system and find some files on hacking...Or maybe a friendly but not too cautious hacker helps the loser out, gives him a few numbers, etc. The schmuck gets onto a system somewhere, lucks up and gets in to some really cool information or programs, and deletes them. Or some of the more greedy ones capture it, delete it, and try to sell it to Libya or something. Who gets the blame? The true hackers...that's who. So what is a true hacker? Firstly, some people may not think I am entirely qualified to say, mainly because I don't consider myself a hacker yet. I'm still learning the ropes about it, but I think I have a pretty damn good idea of what a true hacker is. If I'm wrong, let one correct me.... True hackers are intelligent, they have to be. Either they do really great in school because they have nothing better to do, or they don't do so well because school is terribly boring. And the ones who are bored aren't that way because they don't give a shit about learning anything. A true hacker wants to know everything. They're bored because schools teach the same dull things over and over and over, nothing new, nothing challenging. True hackers are curious and patient. If you aren't, how can you work so very hard hacking away at a single system for even one small PEEK at what may be on it? A true hacker DOESN'T get into the system to kill everything or to sell what he gets to someone else. True hackers want to learn, or want to satisfy their curiosity, that's why they get into the system. To search around inside of a place they've never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool we live in. Why destroy something and take away the pleasure you had from someone else? Why bring down the whole world on the few true hackers who aren't cruising the phone lines with malicious intent? True hackers are disgusted at the way things are in this world. All the wonderful technology of the world costs three arms and four legs to get these days. It costs a fortune to call up a board in an adjoining state! So why pay for it? To borrow something from a file I will name later, why pay for what could be "dirt cheap if it wasn't run by profiteering gluttons?" Why be forced, due to lack of the hellacious cash flow it would require to call all the great places, to stay around a bunch of schmuck losers in your home town? Calling out and entering a system you've never seen before are two of the most exhilirating experiences known to man, but it is a pleasure that could not be enjoyed were it not for the ability to phreak. True hackers are quiet. I don't mean they talk at about .5 dB, I mean they keep their mouths shut and don't brag. The number one killer of those the media would have us call hackers is bragging. You tell a friend, or you run your mouth on a board, and sooner or later people in power will find out what you did, who you are, and you're gone.... I honestly don't know what purpose this file will serve, maybe someone somewhere will read it, and know the truth about hackers. Not the lies that the ignorant spread. To the true hackers out there, I hope I am portraying what you are in this file. If I am not, then I at least am saying what I think a true hacker should be. And to those wanna-be's out there who like the label of "HACKER" being tacked onto them, grow up, would ya? Oh yeah, the file I quoted from...It has been done (at least) two times. "The Hacker's Manifesto" or "Conscience of a Hacker" are the two names I've seen it given (a file by itself, and part of an issue of Phrack). Either way, it was written by The Mentor, and it is absolutely the best thing ever written on the subject of hackers. Read it, it could change your life. ______________________________________ Chapter Six - Hotmail Hotmail is one of the world's biggest free email setups. Microsoft owns it that's why people hack it. I've read about 3 different hacks for it as well as rewriting one abit so it works again. Now someone wrote the first hack on hotmail as a test ta gets inta a hackin group. It was about if the user didn't log out you could get into their account with out a password. By typing in the user name and then on tha password login point read tha source and it had the encrypted password in tha next location after it was checked by the cgi script Microsoft and it's schit programming fix tha problem. Next came one that worked on tha idea but it was run threw being on tha same line as tha person you were cracking simply log in as urself then look at their location and change it on ur computer and u were in. Now the third way was based one tha fact that hotmail weren't bothered ta as a filter in fer javascript, now they have but. Someone realized this and wrote a nice looking html code of a time expired page changed it so that it asked them ta relog back in so the user typed in their username and password and it was given ta a geocities form which sent it back ta tha maker. The last one I rewrote changing it back into html then sending it threw as an attachment, I set it up to a different form place and set it ta redirect back ta hotmails main log-in page. On tha first test run on my friend he used tha password and I read his mail for abit. Just before I was banned I had a list of about 100 hotmail addresses and I was about ta sending off mail trying ta getting their passwords. ____________________________________ Chapter Seven - At Ease I put this chapter in here because our school uses At Ease ta protect tha main part of tha computers because people stick crap everywhere plus it's easy ta network. At Ease is a Mac program, now I think Macs are alright but I use IBM's more mainly because they have more holes in them. Mac are hard ta crack for newbies like me but I've worked out about 3 different ways ta screw it. First Way: Reading/Writing other peoples crap You must have access ta a disk and be given user access ta use it. First open up a word tool Claris works well! 1. Write some crap, anything will do 2. Save it to tha disk. 3. Quit Claris 4. Open the file strait off tha disk not threw Claris 5. Close the file you won't need it. 6. Klick open it's should be in tha disk 7. Press Eject in Claris 8. When it comes up with the error message press apple "." 9. You r now in shared items so open documents 10. Now choose the users name 11. Open their folder and view tha file This works with saving after closing tha documents Click new write something then follow it from 6. But save instead of open. IMPORTANT NOTE: This process works once every time you are in Claris, to open another file you need to quit and start again. Likewise with saving. Crack 2: This isn't really a crack but if your computer teacher is a fuckwit try holding shift on startup as long as he's set a true admin password it won't work. Before I start with the next bit there has been a HyperCard hack for At Ease written plus the infamous Dis Ease which is meant ta phuck it too. Once Ur in! When yas gets inta tha finder u'll want ta know what ta do to I) Fuck up that computer II) Phuck up the whole network and III) Give ur self full finder access. I) Phuck the Computer Ta phuck tha computer when Ur in trash everything. II)Phuck tha Network Klick on shared items, then system, the at ease. Now delete tha At Ease Preferences, Restart. III) Finder Access! First we'll make u tha administrator simply in tha harddrive delete or move At Ease Preferences in tha system / at ease folder. Restart and At Ease should be turned off so goto At Ease Setup in the harddrive somewhere and make u an admin because there's no password any more. Next one is if you don't want them ta know to well. First open up the folder in Shared Items / at Ease / groups or something I can't remember now open harddrive / system up and copy finder to the other folder with your class groups items. Rename it something like About At Ease when you do it so people don't Klick on it. There are another couple of cracks for At Ease I'm not bothered writing them here because I am too tired to. Chapter Eight - Windows 95 Screensaver I have actually written some text files on cracking At Ease, Win95, Hotmail (I think) and Da5. But when I cleaned up me crap I lost it all. Windows 95 sucks and I guess so does windows 98. But almost every computer store I've been in has had Windows 95 screensaver as their protection. I know this text is late but I'm working on the win98 screensaver hack at tha moment. I worked this out one day when I was totally bored. I set tha screensaver up and choose "QWERTY" as tha password. Now I went ta make her beep for a while by holding down some keys and pressing keys then I let goes and it cut out. Schit I thought what made it do that? Well I traced threw what I did and this is how she goes. 1. Hold [alt] + [ctrl] + [shift] + [win95but] don't let go until done 2. Press [Delete] once 3. Press [Enter] once 4. Run threw tha keys - "qwertyuiop[]asdfghjkl;'zxcvbnm,./\`1234567890-= " which is going threw tha keyboard across from q to } then a to ` and z to / then 1 to Backspace and last space alt wwin95 taskkey ctrl. 5. Let go of [alt] + [ctrl] + [shift] + [win95but] 6. Press Enter 2 * - it ads ta the affect. And wow the screen turns off then on and then it comes up with the start bar. Next step is ta turn tha password off so yas can run things. So: 1. Click tha right mouse button once 2. Choose properties 3. Since ya can't see it press tab * 6 then the right arrow key once and then tab another 4 times then space and press enter. 4. Click on the screen saver and if it works press enter for tha password and ur out 5. If not do it again. And there it is tha win95. Screensaverpassword. Crack. by tha PornoPhreak. _______________________________________ Chapter Nine - Da5 + Da6 Da5 \ Da6 - Direct Access an IBM security program. They suck monkeyballs. They are properly the worst written programs in tha world. They have so many flaws Da5: 1. Press [ctrl C] when it goes ta run a program and terminate it. 2. Press F1 the admin button and leave it for awhile, if tha teacher hasn't set it up properly it send u into the admin area. Da6: 1. Go threw it a couple of levels try ctrl alt delete and try shutting down ta dos. 2. Press [ctrl] + [alt] + [esc] a couple of times and win95 awaits u! ________________________________________________________ Chapter Ten - Notes on Mp3s and Warez Right Warez and Mp3z and other crap like that are illegal, a few good hackers don't touch that sort of crap. What they are, are simply Programs either copied or crack ta full version status and on tha net for download. Mp3z are CD quality music free for download copyrighted illegally as well. Now to find software like this you can search for it threw a normal search e.g. http://www.Yahoo.com if yas find much ur lucky as hell cause these site are always being killed. Ya could use WarezWolf a program from somewhere they've got a couple of programs for download like that. It searches all good search engines at once. 1source of Warez if you're desperate is the t69 at http://www.t69.com a lot of people I've talked to about it say it's crap and that's an opinion I share with them because u have to go threw about 10 of these type of pages to find any. Now when you check them out u'll get about 10 thousand popups, but if you find a good page they stay there for awhile. Another way of doing Warez is get a shareware version of something - Dreamweaver will do in this document. It's a good html editor. Anyway first get tha program; I first got it off a CD with a magazine. Goto somewhere like http://astalavista.box.sk and search for the crack or serial. Cracks fix tha program so it works full version, serials are numbers that when enter the program becomes full version. I found a half crack/serial by CrownMan with instruction on wot ta do ta crack it. ________________________________________________________ Chapter Eleven - Links to Places Right then to get started off you've got to learn right? Well here are some links that will make the journey abit easier. They goto place where there is information. Actually every place has information it's just where to look. 1. AnarchyRules - http://www.anarchyrules.com - This place it the place to go if you wanna do something fun. 2. NewOrder - http://neworder.box.sk - Has a vast information depo, exploits and programs. Plus 400 links to other hacking pace on tha net. 3. Astalavista - http://astalavista.box.sk - Looking for a crack for a program this is the first place I look other than checking out oscar. It is a searh engine for serials and cracks. 4. Top 100 - http://www.webfringe.com/top100/?WarForge - top100 hacking sites links to tha best of the best. 5. Phrozen Crew Updates - http://www.geocities.com/~starkidd/oscar.html -this is one of the only place on the net that I've found that shows PC's new programs. Also here Oscar. 6. Warforge - http://www.warforge.com - I havn't seen this page up for a while cause it was hacked or something and it's down or it was when I wrote this. It has tools and tutorials 7. Hackers.Com - http://www.hackers.com - you wanna learn go here good site. It's made with dhtml and stylesheets so it looks good. 1st plage may take awhile to load. 8. Active Matrix - can't rember - This is a site I really wanna put here there's a link to it on the neworder page. He's a coool fella so I recommend if you got some time check it. 9. United Hackers Association - httP://www.uha1.com - Nice site I think it's down though check it out. 10. Hackers Club - http://www.hackersclub.com - I think that's the address it contains km's stuff somewhere. 11. Elite Hackers - http://www.elitehackers.net - I'm not sure about this address either ut if it's right it's another cool hacking site. Some Groups to look for - these are ones I know of and rember so don't be mad if your not here. UCC - Under Ground Collaberate Crew - AnarchyRules , CDC - Cult of the Dead Cow - Know to me mainly for Back Orfice, HCV - I not to sure about this group my friend knows one of them so I put them here, I think they were the people who hacked ar.c and the t69. IHK - ICQ Hacking Klan I think that's tha name sorry if I got it wrong but as the name sujests they hack icq. The End of Book One That's It for the first book in mah schit book. It's a lot of writin and I got a headache. Ummm this is out of my handbook. It's actually the first section. I'm still writing the rest, which is about another 2 section so when I get the next one done I'll stick it up at the schit site. I'm actually happy with the site because I remade it tha other day. Just tha enterance and all that. Sorry about the spelling mistakes but I don't really feel like going back through it all and checking it. Anyway as it says in the intro tell us wot you think of it so far and if ya's have any ideas for it. You mite find me on the Anarchyrules board. Just post something to tha PornoPhreak and I'll respond if I'm there. Schit I just looked at this and it looks like it's 25 pages wow I need ta have a sleep. By tha PornoPhreak