SuperHacker Text PDF
SuperHacker Text PDF
htmare
introduction by Gareth Branwyn
**
i-:j>
LT
Jp*
of
"Not often do the contents of a book match its cover hype, but here is one book that comes closer than most.
Secrets of a Super Hacker, by The Knightmare, is billed as 'every security manager's worst nightmare.' It
does, indeed, descend into the realm of security managers' darkest fears."
Infosecurity
News
"...step-by-step instructions in
Booklist
"Excellent. This
work
will appeal to
many,
"...the
most specific,
Reading
Recommended."
for Pleasure
pages are loaded with clear, concise, and very devious information.
with wit and the Knightmare's own personal experiences."
"All 205
It is
well-written, sprinkled
"Sysops
may find it necessary to read this one, especially if their callers read it first."
BBS Magazine
"It's
<solmaker> on
and
and swashbuckling!"
alt.books.re views
ComputerWorld
be read by anyone
Secrets of a
Super Hacker
by The Knightmare
Loompanics Unlimited
Port Townsend, Washington
Contents
Introduction: Hackers: Heroes or Villians?,
by Gareth Branwyn
PART ONE
Before Hack
Motivations
13
2600
Shadow
19
Some Unusual Research Methods On-line Computer SimuCheck Up DamThrough Trash GIRK Found Disk Analysis
Collecting Information
lators
and
age to
One Side
Tutorials
Sorting
Imperfections
Examining Screenshots
Snooping
Chapter
Six:
PART TWO
During Hack
Chapter Seven: Public Access Computers And Terminals
71
Introduction to the Three Kinds
CD-ROM Databases and Information Computers Public Access
Terminals (PATs)
The Bar Code Hack Hidden Commands College PATs
Doing it the E-Z
Way
Shoulder Surfing
Doing it BASICally
Hardware Methods
General Purpose
Microcomputers Breaking Free Freedom Means Free Roaming PACK Menu Simulation and
Other Sneakiness Hiding Your Goody Basket Things to Watch Out For
Comprehension
ment
Chapter Ten: Electronic Bulletin Board Systems
105
Making Connections BBS Features BBS ExFinding BBS Numbers
Finding Hacker Boards
ploitation
Getting to Know You
Bypassing BBS Security Running a BBS Midnight MasquerCovering Up Trojan Horse Activity
Crashing BBSs
Trojan Horses
While it
ade Hackmail
is
Running
Before
119
Bribery
Bad Feelings
123
Chapter Twelve: What To Do When Inside
Looking Around
Commands to Look For
Operating Systems
Hacker Motivations Revisited
Fun 'N Games
The User Network
Becoming a
File Transfer Protocol (FTP)
and to Use
Bit by Bit
Program Employment Viruses
Cryptography and DES
Superuser
Spoofing
Covert Channels Get Out of Jail Free Returning to the Scene Mission Accomplished... Almost!
PART THREE
After Hack
Chapter Thirteen: This Lawful Land
139
Burglary
Criminal Mischief
Theft of Services or Labor
Receipt of Stolen Property
Larceny Theft of Trade Secrets
Fraud
Traditional Federal Crime Laws
Interference With Use Statutes
Under False Pretenses
State
Conspiracy
Traditional State
Conclusion
Crime Laws
Federal
It's
10:30,
Do
145
Chapter Fourteen: Hacker Security: How To Keep From Getting Caught
Your On-the-Road Kit
Dialing In
Laptop Hints
In Researching
In Social Engineering
BBS Protection Other On-line Security Steps
Lessons From the Hospital
System Tiptoeing
Maintaining Your
While Off-line: Minimizing Losses
Security Logs
In Public and On-Site
Computer Keeping Your Other Stuff Conclusion: How to Get Caught
161
Combining Principles
My One-Person Tiger Team
Concluding Thoughts
Some Thoughts to the Concerned Administrator
Principles Combined
Some Thoughts to the Concerned Hacker
The Hacker's Ethic
My Code of Ethics
Further Reading
The Books
169
Other Sources
Glossary
173
APPENDICES
Appendix A: Explanation of Some ASCII Codes
185
Appendix B:
Common Defaults
189
Appendix C:
Common Commands
191
193
197
199
List
201
205
Introduction:
Hacking
"Where ami?"
"In the Village."
We want... information...
information... information."
comes
will!"
McGoohan, a Luddite
be
sure, despised even the TV technology that brought
his libertarian tale to the masses. He saw no escape
from the mushrooming techno-armed State short of
out-and-out violent revolution (it was, after all, the
'60s!). As prescient as The Prisoner series proved to
be in some regards, McGoohan failed to see how
individuals armed with the same tech as their
warders could fight back. The #6 character himself
chinery of the State.
in the Village
number
Remember
ated
by and
realist
the '60s
TV show
starring Patrick
series
McGoohan to
was
McGoohan,
basically
explore his
this sur-
platform
for
own spy
to
of epi-
and
his
of his individuality.
One
why he
The Hacker as
Independent Scientist
The first image of hackerdom to emerge in the
and 70s was of the benevolent computer science student pushing the limits of computer technology and his/her own intellect. Computer labs at
MIT, Berkeley, Stanford and many other schools
hummed through the night as budding brainiacs
sat mesmerized by the promise of life on the other
side of a glowing computer screen. These early
'60s
The Hacker as
Cowboy
The cowboy has always served as a potent
American myth of individuality and survivalism in
the face of a harsh and lawless frontier. It is no accident that William Gibson chose cowboy metaphors for his groundbreaking cyberpunk novel
Neuromancer (1984). Case and the other "console
cowboys" in the novel ride a cybernetic range as
data rustlers for hire, ultimately sad and alone in
their harsh nomadic world. They are both loner heroes and bad-assed predators of the law-abiding
cyber-citizenry they burn in their wake. I don't
think I need to tell readers here what impact Gibson's fictional world has had on fueling hacker fantasies or what potent similarities exist between
Gibson's world and our own.
Like the cowboy tales of the wild west, the
myth of the hacker as cowboy is undoubtedly more
tered
1984 book
Hackers:
is an insult, and a
an outrage. Just as information
should be clearly and elegantly transported within
the computer, and just as software should be freely
disseminated, hackers believed people should be
allowed access to files or tools which might promote the hacker quest to find out and improve the
way the world works. When a hacker needed something to help him create, explore, or fix, he did not
locked door
is
Not
Indians?).
surprisingly,
Electronic
Frontier
Foundation
to
the
birth
of
the
EFF was
entitled,
rights."
While
this
ethic
continues to inform
many
book you
The Hacker as
are
Techno-Terrorist
it
When
70s, with
was
my
posters
and
(.22
I,
runaway
like
by more
McGoohan, was gearing up for the Big Confrontation. With a few friends (who seemed more
I
ally) of
We
could
of this hit
Morris,
home on November 2,
Jr.,
1988,
when Robert
a piece of information
terrorism
modems,
and
less-than-honorable
intentions.
with
his
The Hacker as
Pirate
it
Computer
the opera-
"critical to
tions of the
mon in cyberculture as
world countries and anarchist enclaves opbuying and selling global information through the world's wide-bandwidth comit,
third
puter networks.
Anarchist theorist and rantmeister Hakim Bey
penned an essay called "Temporary Autonomous
by
Zones
lands.
,,,,,...:.,,,,:,;,
new form
nomadic anarchic culture that might resemble
of
Using
all
come together to form tempoand virtual enclaves. These bands can wreak
havoc, throw a party, exchange intelligence, or
whatever else they want. Once the deed is done, the
party over, the nomadic bands simply disappear
back into the dense fabric of cyberspace. While de-
The Hacker as
rary
TAZ
idea
is
attractive to
movement and
of
who
daily
on "the nets."
invisibility offered
Of
many
If
let's
becomes a more ambiguous and conworms. Are you really taking something if you're simply looking at it or making a
let's
copy of it? If you copy copyrighted material
and then alter it significantly, to
say an image
the point that it is almost unrecognizable, have you
space, piracy
tested can of
What
if
you're using
it
as
Security Informant
Another do-gooder myth revolves around the
hacker as an either self-appointed or hired security
checker. Many hackers, true to their ethos of simply
wanting to push the limits of their ability and not
to cause harm, will report holes in security after
they've breached them. To the hacker who is interested in the gamesmanship and challenge of penetrating a system, tipping off the system's administrators means a new level of challenge should they
ever return. Hackers who are hired for purposes of
testing system security, called "tiger teams," also
work to compromise the security of a system to
find weaknesses. Often times, these hired guns are
convicted computer criminals who "go straight."
Several members of the legendary Legion of Doom,
caught in the Operation Sundevil busts, formed
it
more
them who
they're
The Hacker as
U.S. Cavalry
altering
Just as
dirt-lickin'
The Hacker as
Biblical David
on the
"parity of
myth
of
power" theme
who
are paranoid about megacorporate and government big brothers. However over-romanticized
this myth is, there is comfort to be found in the
knowledge that individuals can penetrate even the
glamorize
hackers,
misguided geniuses
often
who
portraying
them
as
and
prevent calamities they're often responsible for initiating. At the same time that the mainstream media has demonized hackers, Hollywood has romanticized them. John Badham's 1983 film
and raison
have also played into the myth of the evil government and megacorps who deserve the harassment
that the hacker protagonists dish out.
duction
is
furious
this intro-
number
that
hacker /cyberpunk
will
As
TV shows
fast
and
near-future
of
It
The Hacker as
Cyborg
Ultimately computer hacking and net navigating,
fantasies surrounding
It is this
sum
of
writer's opinion
new territory
be mapped out by
now beginning to
Hackers were the first cybernauts, the first
group of people to understand that we as a species
are about to disappear into a cyberspace at least
similar in function to that posited by William Gibson in his 80's fiction. As Manuel De Landa exthat is just
others.
plains in his
book War
relationship with
we
and the
freedom afforded by
has a
it
level of individual
do with how
and the first wave of
lot to
Landa
too
human/machine
hybridization).
Anyone
who
this,
many
others are
now
following in their
which
were once indispensable means to channel their
"...[S]ome elements of the hacker ethic
energies
into
(system-crashing,
lock-busting)
the
quest
physical
for
interactivity
and
logical
innocent world of hackerism has become the multimillion-dollar business of computer crime. What
used to be a healthy expression of the hacker
maxim
is now
new form of terrorism and
danger of becoming a
and organiza-
in
is
much
tions,
^^^
way you
look at computers and computer sehas already been very valuable to me. I
am a smarter computer/net user now and much
more attuned to computer security.
When Patrick McGoohan conceived of The Prisoner he wanted to create a show that would dethe
curity. It
mand
thinking.
He wanted
controversy,
argu-
fists
in
his face.
the
about
it.
who
cares to
keep the debate alive and that those who make use
of its privileged information will do so responsibly
and without malice.
Be Seeing You,
Gareth Branwyn
August 29, 1993
Nantucket Island, Mass.
llll
ill
l:
:mm
M^M
Before H;
"
knowledge or consent,
is
it
is
is
now
it
represent one way in which we can help avoid the creation of a more centralized, even
totalitarian government This is one scenario that hackers openly entertain.
Tom
Forrester
Chapter One:
The
Basics
the ones the text has prepared the hacker to encounter. Naturally, way-to-write-a-book
Number
The
first is
to write
an encyclopedic account of
its dialup numbers,
every
sites of
to
the
own. Sometimes
n't.
Some
scary.
part
things
When
isn't
I left
all is
said
it's
the reading of
Hacker
Secrets
state at
all.
Thank you
R.S.
and
the
many
who
Equipment
offered sug-
to
Opening Remarks
This book will show you various methods you
can use to break into computer systems.
In some ways this is harder to do than it used to
Nowadays people
are
more
how
strict,
it
more cau-
seems, anyway.
But there are plenty of holes still left in any system's armor. System managers can tighten up computer security as much as they want but there will
always be ways to get around their efforts. Remember the first rule of hacking: Whatever a human mind can achieve, another can also achieve.
Whatever one mind can hide, another can discover.
People tend to think and act alike, and it is this
sameness of thought that you, the hacker, will exploit.
What is
now, and
if
hacker
is
something, be
sports.
is
In
be.
side.
It's inconsequential what kind of computer it is.
What's more important are the modem and the
communications software you use with it.
old puzzler,
"Which weighs
or a 600 bits-per-second
modem?"
me explain.
between baud
modem
rate
VZfX^XX&mmxwxmxxx
&t
available in fairly
sure
able.
when necessary.
Hacking
is
to
be
fast.
When
got
my
first
modem,
when
the
at
such
When
there
is
static
correctly.
Communications Software
hard to find truly splendid communications
software,
and yet
it is
with a fast, high-quality modem) which will determine how much enjoyment or frustration you
get from your on-line interactions.
There are lots of communications software
("terminal emulators" or "term programs") out
there. Just because a particular package comes with
your modem doesn't mean you should feel obligated to use it. A good piece of telecommunications
software will have
more
pleasur-
Handy Features
The monitor on your computer was probably
your computer. When you
dial who-knows-where over the phone, you can
easily be talking to some computer with a completely different screen design than your own. Con-
many
it is
maybe
It's
experience
ment; when it
should try to buy the best available. This doesn't
mean you should get what the salesperson or a
magazine review says is best. It means, get what is
best suited to your needs. You will want your mo-
dem
the ability to
characters.
the original
Xmodem. Ymodem
is
another im-
,,'
go on
dial,
line,
go
v.m Ji ll
off line,
I . I . I .I.I.I.I.I
III II
.1
other functions.
II III HLIJ.I.IIU..1
1.1
stances.)
You should
is free.
and research.
One time I
was run by a
called
up a bulletin board
(BBS) that
local company, mostly for the purpose of advertising its products. The modems connected, I pressed Enter a couple times, and I got the
usual random characters on the screen, then the
login prompt came on. It took a little longer than
usual to get to the login prompt, and I was wondering about that, but nothing seemed really unusual
so I went about my business.
Later, I was going over the print outs I made of
the break-in and I took a second look at what at the
time seemed to be just normal login garbage. In the
middle of the nonsense symbols was this: "d-b".
And on the next line, sandwiched between two
this: "ye!". On the surface this doesn't
look too interesting, but think about it: put "d-b"
and "ye!" together and you get "d-bye!". What I was
plus signs,
looking at
was
word "good-
bye!".
computers.
There is one
Data Capture
Your terminal program should have a data capture feature. This means that as information gets
sent through your modem and put onto the screen,
you should be able to capture it in a disk file.
It's important for you to keep the data capture
feature on whenever you're using your modem.
You do this for several reasons. When I'm logged in
somewhere, I like to poke into all the text files I can
find, but I don't like to waste my time on the system by actually reading them while on-line. Instead, I turn on my data capture, store what can be
hundreds of pages of text in separate files, then sort
through the data
other times
I I
it is
later, offline, at
more appropriate
my
leisure. (At
to simply trans-
thing
Later
was
of this flaw to
able to incorporate
make myself
my
knowledge
a system operator by
up and connecting soon after the real system operator had finished a scheduled maintenance check. I wrote a letter explaining to him what
calling
printer)
and
tions
So you
analyze
it
see,
something
when
going to happen, like the system operator (sysop) coming on and doing system
maintenance while you watch. IVe had that happen to me more than once. In fact, there was one
You
out-of-the-ordinary
password (a dumb
thing to do in front of somebody, but maybe he
didn't realize I could see what he was typing). Since
I was capturing the event in a text file as I watched
it, there was no need for me to scramble for a pen to
write down the passwords as I saw them scroll
to validate a
across
new
user's
my screen.
An
have your
who do
this,
your communica-
data in
now
though,
all
was
is
program
electricity. Also,
start
of data security,
Gone,
in the
just a
And
there as well:
it is
leads
software
"jokey," Easter
later on.
And
Eggs purposes
or to wreak havoc
don't forget
counts and
1
all
demo modes,
the
default
security
The
really is not.
culture
may have
world
of
user-friendliness
benign
and
who
still
indifference,
want
And
more
lives in
vanity,
friendly-userness. Users
fortunate ones
gotten
who
who
aren't will
so Social Engi-
After
Add
immense number
of
computer systems operating today, and the staggering multitudes of inept users who run them. In
the past, computers were only used by the
techno-literate few.
ple
who
just don't
naive, but
it's
that there is a
There are
true.
lots of
reasons
why
companies don't
like:
is
too
much of a nuisance.
who
love a
challenge.
problems.
go on to better things?
There are different reasons why each of these
statements is either wholly or partially incorrect.
The last one is certainly false as any reader of this
book should be quick to point out. Computer
hacking (as well as the misuse of computers) will
always be a contemporary issue because of the
great value computers have in our daily lives.
Some of these sayings also have their validity.
In any case, the people who run computer installations (call them sysops, system managers, computer operators or whatever) very often believe in
these things, and so the window of opportunity is
left open. With a little work we can often ride the
breeze inside.
Computer Crime
folks
toast
I
ap-
plaud their willingness to step into unfamiliar waters. I just wish (sort of) that they would realize
what danger they put themselves in every time
they act without security in mind.
It is a simple and observable fact that most
computer systems aren't secure. If this isn't clear
now, it certainly will be once you've read a few
chapters of this book. Ironically, many of the peo-
would love
to honestly
it is
my way
in
ries,
of
"hacking" in
Stealing Money
Financial theft occurs
when computer
records
money
into a particular
sums
Many
robbery,
"experts" claim).
The way
technique
is
being used
is
to
if
a salami
accessed an exorbitant
checked to see
transactions represent. If
it's
up to something!
While
I feel obli-
thief s account.
Sabotage
Computer sabotage
is
>er Hacker
:
who
introduce incorrect
An
Various Thieveries
Hardware
computer or
its
peripherals, but
it
can also
in-
It
may be used
hardware
tinely
puter
files
of a
hardware designer in an
effort to
innovative ideas.
Software theft or piracy is the unauthorized
copying of programs protected by copyright. Often
hackers will make personal copies of software they
steal
Information theft
numbers,
sults,
that
when
party,
sibly
the
first
place.
and see
if
you can
detect
the paradox.
illus-
tual
Read
described as a person
who
any crimes at
Of
chooses not
to
commit
all.
course, there
is
Where
It is
like
money. There
a hobby, but
fee.
How's of hacking,
Before
let's
Why's.
Hacker Motivations
The IRS has a bad reputation
and
it
deserves
have a friend
who received a refund check from the IRS for one
cent; so apparently they can be honest at times),
they pretend to do things in our interest, but underneath it all they do a lot of cheating, conniving
it.
(I
things.
program
made improper
is
a high
deductions,
income, or for some other reason believes the filer has lied.
Now, as citizens of the United States, we are
entitled to know all the laws and regulations of our
country, right? Not so, according to the IRS. The
decision-making formula (algorithm) used by the
or hasn't reported
all
DFS
to select
which returns
be audited
will
is
kept
turn-selection laws).
It
seems
logical
and
IRS to not
re-
years ago,
it
two outraged
citizens
was ordered
and
several
The
citizens
re-
won and
The IRS
and they appealed their way up to the Supreme Court and still
lost in favor of the Freedom of Information Act.
immune
to the
Freedom
of In-
formation Act.
Now, I ask you: Can you think of a better reason to hack than to get back at the IRS? I'm sure
that someday some hacker will surreptitiously
stroll into the IRS's computers and make off with
their Discriminate Function System, and publicize
2
it widely for all to see and file by.
Even if that doesn't happen, and even if that's
not a hacker's main goal (which I wouldn't expect it
to be), there are plenty of motivations from which
to choose.
Dissemination of information
is
always an hon-
their
Tom Forester
book on computer
eth-
ics (listed in the bibliography), following the Chernobyl nuclear disaster, hackers in the Chaos Computer Club "released more information to the public about developments than did the West German
government itself. All of this information was
gained by illegal break-ins carried out in govern-
professional
setting.
Hackers
who
Once they have discovered (and misused) a security loophole in a system, they will warn the system
operator of that
fact.
to
on other people's
credit cards).
sorts
NOT to
who
just
when to quit.
are willing to
Or
grades, ratings,
bills,
who want
access
informa-
who
fall
into
this
line
of
work.
Maybe
once-in-a-while job
is
and exclusively is to
I
okay, but to do
sell
it
extensively
to learn
one's
innovations for
Chapter Two:
First
Came Hardware
cific
Do we
by J.
World War
II this
approached the
pair of engineer
US Army
and
physicist
with a proposal
for
an
device that
was a year
signed function
end
It
but
uses
computer
the
lived on.
dream behind its imagined future
Of course, the origin of the
the
computer for god's sake
the most revolutionary
enough.
It
that
we
on March
Graham
10, 1876.
the country.
summed up
otic stupor.
So, there
puter,
was
in the collective
human
was
the com-
inquisitiveness
subconscious.
It
took an-
other
war
waves of cyberspace.
A few years after YIPL's inception,
TAP
it
became
when
This
these machines
them
ing
led to
and
and
explored.
its
it
and more
was
that the
if
or a plastic
bag
up with a second
Computer Crime
frequent
think-
big
The
of thought for
why should
way
in
which criminologists
Bill in June,
puter Fraud and Abuse Act of 1986. Florida, Michigan, Colorado, Rhode Island, and Arizona were
some
first states to have computer crime legbased on the Ribicoff bills that had developed into the 1986 Act.
A year before, a major breakthrough was announced at the Securicom Conference in Cannes by
a group of Swedish scientists who had invented a
method of silently eavesdropping on a computer
screen from a far-off distance. But let's save this
of the
islation,
Much later.
2600
Tom Edison and Cheshire Catalyst, two phone
phreaks who had been interested in the nether side
of technology for ages, took over TAP in the late
'70s. The journal came to an end before its time in
1983 when Tom Edison's New Jersey condominium
burned to the ground, the victim of a professional
burglary and an amateurish arson. The burglars
had gotten all of Tom's computer equipment, the
stuff from which TAP was born. The arson, perhaps
TAP
printed
The following
new
Emmanuel
publication:
where
when
ing. Later,
went
off to
was
distributed through
lication
technical
the
name
is still dis-
implies, Phrack
deals with
Shadow Hawk
Landreth, who had been arrested in 1983,
out on parole and there are reports of his
mysterious disappearance following publication of
Bill
was
let
his guide to
Inner Circle.
As
commit
He
birthday..."
NASA
this.
D-Day
identified
on
the anniversary of
to
puter system.
of Chicago)
basis for
year.
tigative Service
up.
cities.
They
for in-
on
taking
by
the
game
"a
handbook
Chess, which
Jackson's office
was
sell
for
arrest-
nearly
went
The
on their tail.
$50,000 worth of computing equipment was seized,
said to have been used by the hackers to do the
break-ins. Dozens of stories like this were reported
then quickly faded. Other tales and other hackers
held more interest, like Acid Phreak and Phiber
Optik, who became "celebrity hackers," speaking
on behalf of the hacker community for various
media. Phiber Optik was eventually arrested and
sentenced to thirty-five hours of community service
got a whole load of law enforcers
in February, 1991.
And
lines.
the Craig
M. Neidorf
story
made head-
interstate
was
was
jail
and $122,000
particularly absurd
was
in fines.
that the
What
document
jail for
it
per-
copyright
infringement?
July, 1990.
some
time.
Some
Chapter Three:
Any
some prepara-
computer. This
gently,
and ideas.
With computer hacking, you should obviously
have some knowledge about computers and telecommunications (ideas) but to actually carry out a
hack requires just one fact: a phone number. Or if
not a phone number, at least one way of accessing a
computer. Either case requires some research. Once
you've called the computer for the first time, some
on-line research is required to tell you how you
should proceed with the hack. And finally, there is
the ongoing research you will do once you've
gained access to a system, to help you make full use
of the facilities you've conquered. The "after research" is discussed in the chapter "What To Do
When Inside." For now, let us discuss what to do to
get started.
Targeting
By
which a hacker
will decide
which of
all
by
possible
computer
may seem
many
reasons, but
it is
Let's
feel
be helpful in entering a specific system. For example, suppose you've discovered through the
computer crime grapevine the phone number of a
large governmental espionage database. Naturally,
it seems reasonable to call the number and see if it
actually is what you've heard it to be. On the other
hand, it might be better to first research your target
to see if it's worth the time and the risk, and the
phone bill. Look up the number in a criss-cross
will
di-
many libraries,
are
rectories,
at
books (usually non-licensed by the phone company) which list the names and addresses that go
with phone numbers. Unlike regular phone books,
criss-cross directories are sorted by number rather
than name. If you can't get this sort of directory,
call
to.
the operator
Naturally
it is
reif^Smmw^Mmm
your own, eliminating extraneous interaction with
It
to look
ber,
all, let
it is
before dialing
important to get as
much
it,
but remem-
information as
able to
call will
it's
first
reason-
be traced, or at
As
a novice
want
up
to follow
may be
the expertise to
do
it
properly.
no one
If
else
It
you have
it's
very
What
if
place.
and,
it is
from
systems.
It's
not
only
Regardless of whether
trifling
it's
dumb!
in mind,
irresponsible
want to
target a professor or
seems
logical to
assume
a university has the highest level of computer access. But does he or she really? Does the president
actually have a computer account AT ALL? You're
probably better off targeting individual professors.
One English teacher I had mentioned Kojak a cou-
one
if
Kojak
is
is
way
into this
and therefore
less likely to
understand the
And
trying
passwords
is
the obvious
way
of per-
But is he
first
place?
wanted
If I
had been
change
who had
sors!
This
it
was
and
my grade,
I
was ever
why
it's
right
PEOPLE,
as well as the
right computers.
be found by reading
documents about a site. Documents pertaining to "ethical use" of the system, and
Potential targets can often
publicly available
articles
quote I picked up from an outdated memorandum about security policies. This is one suggestion taken from a list of what was felt to be necessary improvements in security. By the time I read
the article the improvements had already taken
place, but thoughts of needing security were long
gone from the minds of those who had written the
memorandum, and so security was lax. Here's the
one suggestion from the list that stuck out:
a
little
PCs should
be implemented which
Look
at the
here.
We
is
21
your goal
system, target
all
is
is
a kind of
it
before
you begin. This can only help you in the long run.
It might lead to helpful hints, such as the mention
of Net 19, or it might at least familiarize you with
various aspects of the system.
Things you should be looking for when you
system in this way, with the intent
of going after a correlated private system, are: how
it handles input and output; if any bugs are present
and how the system reacts to them; what the command format is (three letters? control sequence?)
and what kinds of commands are available; and
machine specifications and hardware. Of course,
there are numerous other things you should either
be looking for, or will unconsciously be picking up
anyway as you look around, like what the visual
display is like and how long it takes the computer
to process commands. These are things that will be
helpful later on, because when you actually are
trespassing, you won't want to spend hours trying
to find the help command or how to log off.
Targeting may seem not just trivial, but distracting as well. After all, a scientist can analyze a
rainbow using specific technical terms that explain
what a rainbow is, how it is formed, and why it
displays its colors as it does. But in a way, this
target a public
22
is
completely
The
ex-
otherwise,
access levels
and
abilities
all
of this
is like
ana-
eral
plan of action.
Make
your case.
That way you'll know that what you are hacking
won't turn out to be a series of blind alleys.
I keep bringing up the point of "intentions," and
"goals," but unless you're a private investigator or
some sort of muckraker, you're probably willing
lined are really the ones that apply to
it is
But as you can well imagine, it is much more interesting to break into a system that holds secrets,
than one whose contents are worthless to you. Is it
worth it to spend months trying to get into a sys-
tem
an
system
half the
is
be more
exciting.
Collecting Information
you begin researching you should know
what kind of information you should be trying to
Before
hack.
your
field, especially
when
some books
You want
situations you'll
"computers,"
"hacking,"
else
remember
"telephones,"
of
through the
While you're
section
away
ful to write
and
for information
It is
use-
to
hacker. I'm
now on
lists
ite
note
was
that manual.
new way
of discovering
more
is
potentially useful.
and from
around
that information,
their products.
catching hackers,
can hack
my way
And Tutorials
know how
to avoid getting
caught.
24
iuper Hacker
Secrei
haps showing
to use
your imagination
to
the ropes.
Tutorials
and
simulators
give
new
users
poli-
supplement
What
if
it.
ing installed, or undergoing a renovation? Or perhaps not enough terminals are connected yet for all
employees to access the actual system. Using
simulators eliminates these problems since they can
be set up on any computer.
Temporary employment agencies may use
software from a specific company to pretrain their
workers, especially if the agency gets a lot of jobs
from a specific company. Or regular employees
may want the convenience of being able to borrow
a tutorial disk from the company library to practice
on at home. Finally, a good tutorial program or
simulation can ensure that everyone receives the
same quality instructions, without leaving out important details which a human instructor might
forget to teach.
You may
you're interested in
ask
if
making a
a demonstration disk
is
large purchase
available.
and
And you
friendly
member
social engineering
pretend
you're a
company
manager or supervisor).
Simulators and tutorials are great things
for a
find other
held
a
program
called
ARRSIM
(ARRangement SIMulator) which was actually a
copy of a program they used on-line, only with a
minuscule database of names. The program was
disk
computers
to arrange and schedule meetings between customers
and
system user,
pretending that you are also a legal user of the system, and in
the course of the conversation, manipulating the discussion so
that the user reveals
stuff.
to use the
potential contractors.
When
throughout the
1
how
offices.
do
it,
but
serious
"investigators"
ing a
investigators
refer to hackers
company
and nobody
or computer.
It
who
has got to
By
will.
are research-
places.
like to
make
find
and
course most of
it
lots
and
isn't
Of
is
25
interesting. It contained a
discarded lock from the vault, a box of orange "key
hole signals (style 'c')," some vault-key envelopes, a
ing)
which resulted
in myself getting a
copy of the
useful
information.
If you were caught hacking a trash bin, you
used to be able to say that you were "just looking
Now
offices pretty
much
recy-
ness waste.
time,
do a
want
to
nab white
office
at
their fullest.
GIRK
Of course, you can go out scavenging unarmed
through the trash bins of the world, but to facilitate
and quicken results, you will most likely want to
I^BIB^
vm
}
/
/'
^
\
TS>z
-^FROM:
SUBJECT:
Branch, Managers
Lie
*-~
DBS Diskettes
RETURN DISKETTE TO
Figure 1
.-.
GIRK
ing in your
Garbaged
Information Re-
trieval Kit:
you have
to
it.
If
al-
garbage.
Make
best thing
is
to use rechargeables.
going to be staring
at.
tell
security guards
how many
too?"
he asked.
threw
it
knew
Also, another
good
idea:
place
lying around
on people's desks,
You
file
in disk
cabinets.
or overnight without
it
of luck to you!
way;
hole.
WARNING!
Never put a disk of
a physically
damaged
unknown
origin, especially
one, into a
good disk
damaged
drive.
you
should get ahold of a cheap, second-hand drive and
Before examining found or
disks,
Check Up
Begin a found disk analysis by removing the
disk from
its
paper sleeve
if
there
is
one,
and eye-
distinct
made
cards are
disk,
there
is
but you're
still
(5V*")
it
in
hub ring.
If you suspect that a 5W disk is filthy, or if
there is any dirt at all inside, rotating the disk may
scratch it. Instead of rotating it, do this: Push the
disk to the bottom of the envelope with your finger.
Take a pair of sharp scissors or a knife and cut off a
very thin strip of plastic from the top (label) edge of
the envelope. With thumb and fingers, puff out the
envelope, and ease out the disk. Don't wipe dirt off
the disk
you don't want to scratch it. Try to blow
away dust and dirt, or use a hair dryer set on low
heat, or a can of compressed air.
You
will
If that's
mtmmt^mmm^^^
any
problems such as
grooves, coffee stains or wrinkles. It is amazing
what disasters disks can live through. During the
early '80s when home computers first hit the marketplace, there were warnings everywhere: "Don't
put disks by magnets, by your monitor, on your
printer, or near your telephone. Don't bend disks,
don't let your fingers stray from the label..." And on
and on. Certainly you should treat disks carefully,
but as we've learned since floppy drives became inexpensive enough for anyone to afford, disks just
aren't as fragile as they were once thought to be.
balling both sides for
ipUr
For 3%" disks, you can
if
trouble doing so
to straighten disks
flat
you
Damage To One
If
side,
the
damage
you
will
still
The
first
way
Side
is
two ways
to use a
to
do it.
superzap program
find
it.
utility,
you
DEBUG
at a time. If
you can
single-sided drive
it
get your
will
hands on an old
Figure 2
Don 't
to
open the
top,
apply pressure
Then (B) slide out the disk. Now you can repair the
clean it, and slide it into afresh envelope.
disk,
a bit
easier:
Rips
You can very
And Tears
Make
sure to
Once you've
gotten all the data you can off one side, you can
remove the tape and repair the other side. As before, it is imperative that you don't let the tape get
onto the side of the disk which the drive will be
reading, or you could throw off your drive's
read/write head, and may get sticky stuff on it, too.
only put tape on one side at a time.
Imperfections
If a disk looks okay, but will only give you
"Read Errors," it is probably physically damaged on
a microscopic level.
it,
eye to see.
by manually
is
It
to
we discussed earlier.
Examining Screenshots
The photographs of computers you see in
books, magazines, system documentation, promo-
in
it
damage
may be
that
tional literature
can
all
keyboard,
CPU and
accessories.
Or
the picture
might depict an actual computer in its natural environment, with perhaps an operator visible.
The first group, essentially "screenshots," can be
helpful in showing you what it looks like to be inside a particular system that you have never really
accessed. This can clue you in on what accessing
style the system uses, if the password is displayed
on-screen as it is typed, username and password
styles,
what features
are available,
depending on what the photographs are attempting to illustrate. Similarly, in user manuals and
other instructional aids, drawings of screens are
often found containing the same information, also
default login codes, text specifics, error messages,
jt
jjj
is
still
length of eight-characters.
Style of
username
is
you know
if first
many
terminal operators
as a
am, of course, only referring to pictures of computers in their natural environments, as opposed to
staged photos in advertisements, like the kind
showing a Macintosh in your typical teenager's
room. Newspaper and magazine articles are often
accompanied by the kind of computer photo you
will
want to analyze.
wearing
gives clues to passwords. The specific
kind of computer may suggest ways of breaking in
using known bugs or loopholes. The computing
environment also will allow the social engineer to
pretend familiarity with an otherwise private room
or office inside a building.
An
additional
can
is
pumped
for information, or
a relevant
cess,
and
city,
also passwords.
If
you
you get a
lot of static
on your
television
doesn't clear
up
the problem,
it
VCR.
may be
when
If
that
the audio
component
the screen.
like
VAW.UAUWJAUAWJJAUMWA MWAW^
'
fill
knew
to use the
(a precinct
number,
TV
show). So watching
televi-
Now
Snooping
You can go on
ficially
or unofficially.
A tour might be
may be one
one that
and
up
is
their par-
it
that can
specially set
for
the place.
power
of his
ma-
chine or the
help you
is
above.
where there
is
an
has been
Many
moved
what
Other times
I've snuck a peek at the computer behind the
counter, and although an innocuous screen was
being displayed at the time, there was worthwhile
stuff barely visible, burnt into the screen.
ness controls to see
Many
it all
businesses, institutes
says.)
and organizations
run what are called special libraries. These generally concern themselves only with the product or
service which is the group's field of interest, but
also include valuable details on the group itself. For
instance, a company library might have manuals in
it to the company's unique computer system. Often
there is a helpful listing of what programs are
available on the mainframes. Such a program listing might include mention of what security products are enabled, and you can write to the maker of
those security products for details.
Snooping around buildings undergoing reconstruction can be worthwhile, as can snooping
around buildings whose occupants are moving to a
new building.
In such cases, doors are found wide open, with
computers and manuals laying around all over the
place. I remember one building I went to that was
had tons of
the time.
33
*""*
Figure 3
must be used every day (such as access codes) is often found hiding on little scraps of paper:
(A) on a cork board, (B) attached to the side or top of the monitor, (C) on nearby file cabinets or other furniture,
(D) under blotter, (E) under mouse pad, (F) in desk drawer, or (G) underneath the the desk.
This wasn't
poses, but
it
was
interesting to read.
teresting to rescue
it
from
its
And
it
was
in-
shelf of a closet.
all
ONLY!"
was a huge and informative operatsystem reference manual and two PCs, each of
Inside there
ing
In that
simulation disks, as
to
files.
insider literature
either
gets
hack, but
who hacks
joyously
life.
Chapter Four:
Passwords
book.
this
The
are:
controls
first class
common
of access control
also the
most
netic card.
culiar
ken.
based
on
personal
characteristics
(biometric devices)
Possession-based
do with
a physical key or mag-
controls
have
to
Sometimes there is a metal clip of a peshape that must fit into a hole in the computer before the computer will operate. A "key"
could also be an identification badge, or a signed
letter from a person of high status in the company,
granting permission to access a site.
Biometric devices are those which look at
trait
of a potential user
and compare
it
some
to traits
is
Passwords
The cheapest and easiest way to protect any
kind of computer system is with that old standby:
the password. Even computers that under normal
circumstances have no need for security features
often come equipped with password protection
simply because it feels good to use and doesn't cost
much
tected
by other means
by magnetic
cards or by
will
fly
or restraints
conforms
to
"abc-12345-efgh"
prearranged
where
letters
constitution
and numbers
(like
are
rule is trivial.
The
sixth
several
personal)
questions:
"Spouse's
maiden name?", "Favorite color?", etc. The computer will have stored the answers to many such
questions, and upon login will prompt for the answer to two or three of them. These question/answer sessions can be delicious to the hacker
who
is
whom
he
is
someone's in the middle of an exciting online game when it happens. Q&A is used
only rarely nowadays. When it was first proposed
it seemed like a good idea, but the bothersome factor has resulted in this method being pretty much
phased out.
Passwords which are predetermined by
ing, especially if
on some
password from the one provided to a more secure, personal code. In situations where groups of
people must log in, but security must be maintained, a list of once-only codes may be provided.
Users then extract one code at a time, depending on
external factors such as time, date or day. Maybe
you can find a list of codes by going through the
garbage of a place? The codes won't work anymore,
but you'll get a sense of what the system expects
from you.
their
to protect
Software
is
available for
most operating
sys-
tems which looks through the computer's password files, analyzes user passwords and decides
how secure they are. Unsecure passwords will be
changed, or prevented in the first place. This is one
area where your prior research should help you.
Generally you will know which of these programs
your target has installed, and what passwords the
software will not allow.
Regardless of how clumsy-brained or brilliant a
person is, all people tend to think alike. It is only
through learning that they begin to think in creative ways. Even then, initial assumptions and first
conclusions are similar for a given peer group.
What this means is that when a person logs onto a
computer for the first time, and is prompted for a
password
especially
if
that person
is
under
themselves.
They may be
calling a
remote comline,
or sur-
urgency
is
of,
or are hoping to
the
first
first
is
login
it
environment,
hobbies or interests. If you can either find out or
guess any of these traits of a valid system user, the
sibly
current
number
events,
possessions,
of potential passwords
you
will
have
to
word
mug
every
day as a password. Think about the age and lifestyles of the average user whose account you are
attempting to breach. An office in a corporate setting probably wouldn't have a nudie poster hanging
up
may
but a
college
so
you
"playmate," "victoria,"
"body," or "month."
The
easiest
way
to get a
password
is
to enter
it
who
is
first
time.
You
novice,
good
secret
password? Oh,
know
down and
Of
terns
course not!
logical
Scrabble rules
way
is
unimportant.
What
is
important
is
that
Some hackers
will
and
"stryker."
real
adolescent
Many words
and examples are given in the appendices. Howmany words that you would almost
never expect to find as a password on a system. Is it
reasonable to suspect a person will enter an adverb
for a password? Words of this sort would be the
last ones
to try. Real-word passwords will
generally be nouns, ("eyeball," "drums," "kitchen"),
(usually obscene ones), and perhaps
verbs,
ever, there are
word
"sure"
embedded
find
names
to
include
"7u7u7u,"
"jkjkjkjk,"
"0987654321," "asdfgh" or
"ccccccc,"
patterns
"WXYZ,"
on a
keyboard if you are confused about these last two
examples. Keyboard patterns will usually be simple
repetitions of characters, portions of columns or
rows or every-other-letter designs. Keyboard pat"qazwsx." Look at the location of these letters
in
Figure 4
Some keyboard
theirs.
ing used on
password length is six characters, don't expect patterned passwords to go much beyond that mini-
mum. On
Beyond a
ber.
amateur hour.
was an
interest in computers.
life
ice's
"Find"
ple letters.
knew
had a membership on
this
knew she
I knew
system, and
was insanely simple to get her perID number on the system and, yes, within
about her
life. It
Yesterday
CompuServe address
audience
air!
turn to
make educated
Even
if
an author
know what
and so you have a lead to an account. If the sample program segments they list entail baseball trivia, you've got a good idea where to
by
text,
the
You can
his
listed.
of the sources
newly acquired
sonal
about themselves
unofficial
to get a write-up
With
all
of this said,
this is
free
subscription
or
clock
radio
or
magazine
range,
at the
company. As the
"
.""!
at a corporation,
son in an organization
is
new computer system, under the assumption that setting up a new account is too difficult or time consuming for the busy leader to do on
his or her own. This account will of course have a
natural English password, something of either the
easily-guessed variety, or something from the
boss's list of interests. ("Say, Mr. Larsen likes fishing, doesn't he? Put in 'FISH' as the password!")
So let's suppose you know a person's hobbies or
interests: From there, how do you proceed?
To start, you could go to a library and get all the
books you can on that subject. Then make up word
banks from the glossaries and indices. People like
onstrate the
else
names/words
which they think no one
So you get students of lit-
"Euripides," "Aeschylus,"
and
to use big
from
and (they
think) obscure
passwords,
for
in general, a
like
mess of
Make up word
fails
lists,
you can go on
because someone's a
"'
It
if all
first
name, a
user's first
and/or
that
last
didn't
superbly.
can find
file is
file
it
system dictionary
is
called "words."
or capture
it
You can
also
The
download this
if you need a
to another computer,
plaintext dictionary
try
would
file
for use
on other machines. 1
else
to a
Password Restraints
Most operating systems weren't developed with
security as top priority. Indeed, password-based
accounts should be
all
Password Studies
As we have
seen, however,
If
you think
all
A good
number of formal and informal studies have been
done to see just how good people are at picking
passwords
is
safe passwords.
passwords:
464 were
477 were
706 were
605 were
three characters,
lower case.
Numbers
will
41
to re-
Numbers from
one through 31 should be most common, along
member, or easy
to type, like 1 or 0.
means
that
if
"lemon,"
or
"colts,"
you
may
find
"lucifer,"
"cOOl,"
and
let-
tried:
PoPeYe
Popeye
PopEye
PopeyE
popeyE
popEyE
PoPeye
popEYE
PopEYE
on
its
and
would
Indeed,
when
forced to capitalize,
who
in their
"OliveOyl."
5
100
110
120
130
140
200
Randomize Timer
For i = 1 to 6
Char = Int(Rnd*91)
If Char < 65 Then Goto 110
Password = Password + Chr$ (Char)
Next i
Print "Your new password is: "; Password
Here, six uppercase letters are selected independently and concatenated to form the password.
afterthought.
If
not capital
Thus,
what
letters,
you
will
normally
find
are
upon
random
these
to us, to the
ri-TrriTrn-'-riT-rn
just
formula.
the
in
altered
more
ASCII
code
letter
Sine of
Selected
ASCII
Values
0.9781476
0.9659258
0.9063077
108
0.9510565
98
102
105
115
104
0.
h
If
Selected Value
asch
114
New
Range
to
95
46
56
26
47
104
97
0.9702957
Convert
0.9925461
990268
0.9702957
117
101
97
118
25
122
07
95
104
114
else
If
Selected Value
else
If
Selected Value
else
ASCH = Selected + 19
Resulting password: rueavzhr
A sample username is encoded into an obscure password using the method outlined in the text. On inspection
the password seems
available information about that user (in this case, the user's last name).
alteration
may be
deducing).
If
yours
for
the
ability to
taking
(or
change the
is noticed).
mmmmmmm^-l
is
just a
ate.
system: users
new,
secure
"rueavz"
was
may
passwords
you
(wouldn't
think
them over
is
to al-
series of
This
is
risky though,
may result.
One
method
and unwanted
side effects
the
flaws
in
all
those
But
found
it
wasn't
the
[Emphasis added.]
Clearly, sixty seconds plus some programming
time is worth spending to have access to every account on a system!
If you can't insert code to generate machinemade passwords, you might be able to analyze
them after they've been produced. This requires
having access to a minimum of one password,
preferably two or more, from a given system. If you
have a legitimate account, there's your first
password. If it's a local BBS you're hacking, or some
other sort of system where multiple anonymous
logons are possible, try calling back a few more
all
run
WA
three letters
of
from
my last name,
Or had it?
utilizing
by a
.:.......
as a
called
seemed
to
be no correlation
at all
personal information
Was
it
parts of the
new
users of his
(I
supplied their
received, to
my
disappointment,
in
the
history
of horrible
programming.
Dear Member:
Non-Random
Machine-Generated Passwords
Finally,
let's
consider
random/ess
machine-
to
al-
Anyway, you can see how it's possible to occasome good information by analyzing
"random" passwords. Even if there doesn't seem to
sionally get
first
version of one
BBS program
after
about a month
help a
a difference of
numbers, instead of 456,976,000
172,210,370 passwords! This software was riddled
with bugs, many of which have become famous as
strates this
of
new
on computer
on identification cards, class
housing lists and elsewhere! The memo
room sign-up
rosters,
sheets,
office to
change
their
PAC,
--:-':
:
-
.;
....
45
:
through
all
call.
In any
After
all,
we are hackers.
data
Social
one's
either
Security
number (SSN)
or
student ID number.
So
if
you want
early in the
to
name
start
to
get
number
in a public
environment
is
unconstitutional,
move
Let's
it is
we may
are distributed.
who
assistant,
into the
some
computer system.
If
you happen
make
to find
sure
you
back of the class, where nobody will notice you copying other people's private data. A
hand-held scanner/copier makes life easier at times
sit
in the
like these.
You can
also get
dance sheets, or
both pieces of information for every individual in
the class.
If
transcript,
to
make
is
demo
help
info
tutorial
tut
menu
data
intro
anonymous
welcome
base
database
visit
Brute force
hello
usernames "calendar,"
"sched," "schedule,"
"cal,"
common command
names.
have a general-usage or
even public information system set up. Access may
"lpq," "archie,"
Many
or other
installations will
Wakka Doo
fictional
University
may
require
logging
If
hack
of
all
to
That time
it
is
must be
it
restrictions.
do, but
it
is
it.
It isn't
time consuming.
too difficult to
What
brute force
last
"must"
is
all,
to
it;
way
to fly, but
at
have
failed;
works.
common names,
puter and,
another at the
other.
usually, lots of
after
program entirely, you could have a lot of difficulty ahead of you. An upcoming section will offer
suggestions for getting beyond limited access
the
means manual
spent in
in writing special
eventually
Brute force
is
other variation
you are
else.
system.
"Visit"
much
research, trial
since
"tut"
guest
the "eventually"
names
each
file
so
it
includes
musi-
of cars
words.
Speaking of making things go faster for yourself, the same holds true when brute forcing nonlanguage passwords. If you live in New York, you
should begin your attack by brute forcing New
York SSNs only. There are many ways to bring
down the number of potential codes you have to
check. The military uses what is called the TAC
Access Control System (TACACS) to ensure
legitimacy of usership of its network computers.
The access codes that TACACS looks at are strings
of
Pat
whatever language you know, to dial
enter one word at a time as a
program
the
in
modem,
don't have
programs
the
expertise
to
do so, plenty
on BBSs.
of
name/password
combos
before
redialing
the
number.
Often remote computers will accept characters
as input even before the input prompt is put on the
screen. If this isn't the case with the system you're
trying to get into, you'll have to put a delay loop in
your program to make sure passwords are not
being entered before the cursor is on the screen.
Finally,
system operators
who by now
almost
going on
will be
furious!
the
program
monitor
absolutely
Have
text
as it is sent from the remote computer. When
something other than the login prompts are
certainly
is
try every
combination of possible
first
names.
If
it is
Foiling
received,
to see
If
X,
Joe,
to dinner
family one night, where they had an allyou-can-eat special. Naturally I decided to do my
part to see that I ate my fair share, but by the third
with
my
reorder,
we were
The techniques used to thwart brute force attacks work on the same principle as that all-youcan-eat restaurant. As mentioned earlier, if one is
dates,
and
persistent
prompts
is
to struc-
quitting early.
is
allowing only a
Another method is to increasingly slow the response time to each successive login attempt. A
prospective hacker might find himself waiting
thirty seconds for a response from the remote computer... Then a minute... Then two minutes... The
long waiting periods wouldn't start until the first
unsuccessful.
is.
The moral of this story is, if you write a password-cracking program, be sure you monitor its
progress. Don't just set it to run overnight and
leave it unless you've first determined that such
up
the next
Conclusion
Much
of pets, historical
titles
to
mention
returns
all
names
not
room numbers, book
common passwords
ing
down on
who
a hacker
two chapters.
Donn
B.
"
Parker
Chapter Five:
Social Engineering
It is
somehow shocking
the
first
time one
is
it
was
That
it
is
one of them.
The
alternate
term
the operator."
Social Engineering (SE) appears in a variety
of forms
them.
there
and
disguises.
As you
is
Here
will
list
many
of
ations to be
made on each
left for
thought of as an ac-
tivity
until
others will be
of these examples.
ascertain passwords,
neering
still
art of
asking, "Please...?"
I
ture."
gap
The other way
one
anyone a
and
stance
do
to
this is to call
secretary in
just ask,
JACK: "Uh,
YOU:
"Okay,
it
it'll
take a
minute or
stopped."
YOU:
"Just
do I do when
it
worked up
see. It
it
didn't work.
to
What
"
usually type?"
telephone shenanigans.
YOU:
Hacker As Neophyte
Here you play the
role of a
new
just a
user. Let's
say you're trying to get into a company's computer system. The time is 8:55 in the morning.
You call up the computer department (from
your home or wherever) and this is the conver-
"I don't
temp
know. This
YOU:
"Enter...
JACK: "Now
is
my first
day
here.
tell
me!"
I'm
Enter.
Okay."
type
YOU:
YOU:
"Okay...
Oh!"
"
JACK: "See?"
is
Jack
J don't
wrong before!"
with a problem?"
"Maybe...
What
is
it?"
tial
YOU:
you
talk
me
components of
all
some
of the essen-
neers.
through
it?
Computing Department.
JACK:
"Sure.
YOU:
YOU:
JACK:
"It'll
is
take a
boot up."
it...
on the floor.
Okay.
to
how you
begin your conversation by mimicking the technician's words, introducing yourself in a way similar to the way the
technician introduced him or herself. This is
done to make the person on the other end feel
more comfortable talking to you, and to show
that you're not afraid to reveal who you are or
Notice here,
YOU:
the
Researching Department
"Yes."
YOU:
'To what?"
Jack
it's
usually a safe
you sound,
in his ears,
could help
me with a problem?"
know
somewhat
flustered
you should
dle computers.
He
will then
go overboard
to
YOU:
"...and I can't
Now
me
seem
through it?"
that he
knows
you
it is
YOU:
"Well
you're the
else to ask.
anyone
won't always work.
available before
Consequently, you
a phone call at
you'll be able to say that the other people in the
office shut off the computers and went home before
YOU:
You have
it...
Okay."
JACK:
to pretend to
"It'll
to
boot up."
YOU:
"To what?"
JACK: "Uh,
YOU:
"Okay,
it
it'll
take a minute or
stopped."
ready to use.
"
complete
shows
your
helplessness when it comes to computers. You
don't want to pretend you've been living in a
"To
what!"
it
you're
"
see?
"
do I do when
see. It
it
it
YOU:
"Enter...
YOU:
"I don't
temp
Boy! This
Okay."
YOU:
Oh!"
"Okay...
worked up
to
What
didn't work.
"
JACK: "See?"
is
guy
my first
isn't letting
I don't
on hundreds of
real-life conversations that technicians have
with legitimate users who have the similar
based
usually type?"
know. This
Jack
wrong before!"
day
here.
tell
me!"
You can
up!
answer ("Usually
I'm
either
I
type
this
sample
script
just a
Enter.
YOU:
saying, "But
work be-
him
or her again
or her ego to
and
it
know you
you
have received.
known
you're a
that the
new
person, unless
company is
it's
widely
is
Temps
will generally
have a
site contact or
they report and ask
questions. The technician might not know that,
however, and in any case you can always say
that your supervisor is in a meeting and told
idea.
local supervisor to
whom
53
,...
copied off
Jack [a
really
worked
at the
is
li-
having
trouble getting into the circulation system from
public access mode. The computer's behind the
counter, so I don't know what it was doing in
PA mode to begin with, but..."
brary]
I'm
Library.
is
a sample encounter:
"Good afternoo
"
ON OTHER END:
Hacker In Power
appealing to a technician's sense of godliness won't work in your situation, perhaps it's
NEED
If
time to become a god. In a military setting, pretending to be a high ranking officer can put fear
into the hearts of any lowly receptionist. Just call
up, saying either that
you
CEO
CEO or presi-
known
where
it is
is
a hothead.
help
find someone
codes.
Would you
like
me
to
who can?
well
No
one
demoted. The anger routine
is useful because the person who picks up will
want to be rid of you as fast as possible, and will
wants
Hacker As Helper
to get fired or
and the
like,
CEOs
Just the
"
"
say you want to break into the computers at the mayor's office. You call up his secretary, and you say something like this:
Let's
"Hello, this
We
is
Jake
Of course
"
she's
problem with it
with computers!
The secretary answers: "Why
was happening, then blah blah
You
there's
it!
That wasn't
it.
When
last
travel
mainframe located at a
on the other side of town. If I were to try
some social engineering on the library, I would
do it during the 3 o'clock slow down, when most
library's terminals to the
college
problems occur.
I've noticed
who
don't
know
that
maybe
trons
blah...
your fault
or
night and
we
think that
it.
weak
effective ploy.
up
the "computer
Peak Hours
on a
is
a place
a "3 o'clock
user
places
if
when
number
of
"
-v-
customers, or
some
is
gener-
member,
offices will
be
at their
most
hectic after
OPERATOR: "Shark's
"
ing. May I help you?
Pam
speak-
Bill
still
BILL:
right
now?"
OPERATOR:
"Nothing,
we have them
all
turned
off''
Other Hints
If it's
Radio Supplies,
do so be-
it,
all.
forehand.
OPERATOR:
BILL:
"Well,
"Yeah."
have you
tried
turning them on
lately?"
OPERATOR: "No
BILL:
might
be.
Now
on again?
"
would be a good
time to try."
OPERATOR:
"Okay....
Nothing
screen."
came
on
the
typing in
first
if it
still
go
there.
Try
when you
YOUR RESPONSE:
my
picture yet.
Maybe
later today."
RECEPTIONIST:
OPERATOR:
"What
you
do
"Okay."
mean,
takes staff
pictures."
The operator went on to give Bill all the information he needed to know. When the operator was finished "logging on," Bill gave a resigned sigh and said, "Oh well, it was worth a
shot. I'll go back and tinker around some more.
Thanks anyway." Of course, he still didn't have
a phone number to call. He didn't even know if
the computer system was connected to outside
after all, this all happened on account of
lines
YOUR RESPONSE:
RECEPTIONIST:
won't be able
"I
is
right!"
to help
you
until I
ber, please?"
YOUR RESPONSE:
who went
cff to
have a baby."
easy to get yourself into awkward situations, especially at the beginning of your social
the
my
badge yet
boss/supervisor/-
YOUR RESPONSE:
thing about him/her?
"M_
"
'S'
Schindler?
up on
there
days."
picture hanging
YOUR RESPONSE:
YOUR RESPONSE:
wrong.
RECEPTIONIST:
ID
YOUR RESPONSE:
off your
number
manager?"
It's
You
badge."
Situations
engineering career.
RECEPTIONIST:
(M
Is
M
is
available?
the
seems
friendly.
This
just
is
another
way
of
YOU:
It's really
YOU: "By
Little
League?
M_
Note that
for
maximum
questions, should be
benefit, credibility
worked
in before asking
Miscellaneous
Social Engineering Tips
To improve your chances of getting in with
social engineering, here are some tips.
Notice how the person you speak to reacts to
your questions. If you speak to a receptionist or
other worker on the bottom of the pay ladder, he
or she may not want to chit chat or fool around
with computers if he or she's being monitored,
or if calls are being screened by the boss.
Go to some public place where they have
terminals hooked up, and look at the wall where
the terminal is connected to the phone box.
Write down the four digits that appear on the
box
phone
Guess the
hooked
to).
number by looking
at a
is
make
some reassurance in
weren't
a complete fake.
that you
mind
57
When
if it's
face
and
act in a jovial,
up
the
phone with
a,
If
the person
"Hello, General
Widgit Corporation, Lulu speaking," you respond with, "Hi Lulu! This is..." and go on with
your spiel. Now Lulu doesn't know if you two
have met before, and as you continue with your
friendly attitude, she will begin to treat you
more like a friend. Try looking through some
books on voice marketing, telephone selling,
etc.,
to get
more
ideas.
.;,
The way
in
PERSON
help
,.,.....
Y,,;.^^
Happy engineering!
For instance:
ter.
v.;.-..
ON OTHER END:
"Advertising.
May
Other Roles
you?"
Social engineering in
an
air of authority
(and
and with
special
on the telephone,
too).
Another
way
company
anyone else
would have dialed the listed number.
Another thing to consider is if you're trying
to reach a higher-up in the corporation, you may
only end up contacting secretaries, receptionists
and/or other underlings. A good trick is to call
an office of higher or similar prestige as your
goal office, and let the secretary transfer you
over. For example, suppose I want to try social
a middle manager
engineering Mr. Palooka
who runs the shoe division. But I can't get
through to speak with him personally. What I
do is, I call up Mrs. Colt, who is either a
same-level, or higher-level manager, and I ask
her secretary to connect me with Colt personally. Colt's secretary asks what I wish to speak to
Colt in reference to, and I say, "Shoes!" But Mrs.
Colt handles only the rubber band accounts, not
shoes. So Colt's secretary says, "Well, you'll have
parently a
insider
most important
maybe even a
its
the mail.
The
and
The second is more suited
difficult to ad lib telephone
first
who
find
it
SE conversations.
In-Person Engineering
Any
is a form of
The impersonation may be of
an individual person (the president of a company who demands to know why his password
instance of impersonation
social engineering.
isn't
it
(Jill
Tech-
if
good
properly.
suit,
one that
fits
Make
yourself
attire.
Many kinds
information.
and
similar info.
some
try all
to say
completely
raffle;
Written Engineering
Social engineering
may be done
through the
on the
net.
While mak-
so obvious!" But
people
fall for
it.
Hamm's
Office" fol-
sponse
if
worth a
you
shot. Advertising
it's
by
on BBSs.
phone
rr-r?s-air---T-"iaw-Yr-rft^^
Seeing as
misled for
on the flaws
Z,
Component
or
which
inhibit
reimbursement for
which amounts
down right.)
years
six
Component
non-functioning
of
twelve
to $14,000.
the
the user's
to
lem.
If
Or
the "Let's
work
together to
in,"
make
this
approach:
was dismayed
to
read
in
of Computer Magazine
edition
Friday's
that
your
Component Z is defective.
working.
Scan
all
the computer
fu-
riously,
product failures and security loopholes. Journalistic morality generally prevents dangerous secrets from making their way to the mass media,
so the exact details of system security failings
won't make it to print. You'll see things like,
"Four hackers were caught yesterday, after exploiting a loophole in the V software on the
machine
like,
at
tem...."
What you do
official
is,
let-
their
speedy reply.
proach:
send
Please
an
of
the
you should
your letter to the
company or organization. On one hand, you
don't want them to suspect your letter is phony.
But on the other hand, they're going to be receiving many letters similar to yours, most of which
are legitimate. You shouldn't have any problem
I'm divided as to whether or not
mention
specific threats in
as long as
letter
on good quality
explanation
You may
own
also slip in a
cheap to obtain.
has come to my attention that there are
serious shortcomings in your product,
It
Component Z.
My
business
operates
Component Z.
is
under
the
secure because of
If
the
company
you without
you're on your
refuses to help
company
computer security
associations, organizations and other groups
which will have the particulars of the loophole.
flaws. There are also plenty of
You might
juicy details
by
also
make an attempt
to get the
which
who
to the person
Dear User:
As
is
most embarrassing.
was
theft of several
among
on
data
small
percentage
of
our
As
of
now we
luckily, not
still
some
on
threat to
him?
The whole situation is preposterous! Any real
life computer service with a password problem
would require that all password updating occur
on-line. It's simply the cheapest and easiest way
to update hundreds or thousands of pieces of
ally sent this to
user information.
it
to us as
may
will
off your
cause you,
we
August bill.
Joe's account.
to
return envelope
is
postage paid!
their
password, but
Zip
Day Phone(
to
Night Phone(_
(Invalid)
line
Old
when
ate
Of
Name
Still,
this letter,
customers.
you.
This
J-
Password
You should
swindle, especially
letters to are
etc.
the people
you send
the
activity
can
Trouble In Paradise?
Impersonating a huge corporation, or induc-
tion
not
gal.
to encourage
When you
many
For all these reasons, a person you try to soengineer may not want to or may not be able
to tell you passwords and other information that
you request. Considering the above list, would
cial
The solution?
See you in the next chapter!
" "
TnmmnTm-iTfimTnTmTrmTii
. . .
-..-..
,.-
.-..
... ...
--.
,---
Chapter Six
sometimes
risky
and
effectiveness
endeavor
in
its
that
in
However,
and often so
You
to
an
accepted and revered method of finding out what
you shouldn't know, it has its faults. No system is
perfect, and clearly the list of flaws from the
previous chapter shows that there are deficiencies
see,
even though
of each
form.
its
applicability.
results
varies
chart that
social engineering is
In
many
respects
RSE
is
better
than
SE.
SOCIAL: Questions
victim.
REVERSE:
All
problems
are
corrected;
no
and
control of the
subject of conversation.
enough
to
trustworthy,
circumstances.
is
difficulties,
his
or
her
problem,
(effortlessly) find
the
hacker
is
with
able
to
the works.
Sabotage
Advertising
Assisting
is an initial brief contact with an oncomputer, during which the hacker causes a
malfunction of some kind that will need correcting.
Sabotage
site
Advertising
available to
is letting
the user
know you
are
the user's
advice. Consequently
member
is
the
company
or
gineering
is
not
social
engineering.
It
takes
solves yours.
how
accomplished and
what good it does, you should understand why it's
better to have them call you than the other way
around. Let's step through that list of bad stuff
about social engineering that was given previously,
time demonstrating how reverse social
this
engineering overcomes all of those problems.
Before
explain
this is
you are
using
cues such as Caller ID, a distinctive in-house telering, or a knowledge of employees and
protocol. In any case, magic passwords might not
phone
BUT in
of passage have
who
no reason
who know
to suspect
the
you
words
of deceit:
of security, after
all.
vnuptm
Has No Reason To Assist You, Or Can Give You
Wrong/Misleading Information
jj<
next time
What does
know
shouldn't
just tell
in the
the caller
you
if
it
fix
to
it,
occurs.
it
Even if such a
commonplace, or even
become
combe bullshitted any
does
thing
if
95%
by
of
the
still be those
hundreds of other new and old
hacking methods, and there will still be Reverse
and
longer
will
None
day.
of this
will help
list
of birthday wishes.
On
make you
people
overcome
obstacles,
word
is
sure to
When you
they
will
help
happily
the
three goals.
why even
of
want you
to
engineering will
fail
social engineering
on
occasion,
classic social
Yet
Social engineering can not
failings.
novices
don't
know about
or
think about.
66
Secrets of a
Super Hacker
the
Control-Backspace.
If
up a
call
translation table
install
they
RSE Case
Study:
Translation Table
he told me. "I tried bullshitting them, but they wouldn't have any of it.
And line connections were hard to establish. And
once on, they only gave you two chances before
disconnecting you. So I needed some other way of
really tight-lipped,"
you want
file,
anytime
it
translate that to
that to the
work
computer
to get rid of
for instance,
you can
sees a Control-J,
it
annoying
set
up
translates
the
it
to
getting in."
he
among
that contains
file
table so
set
They
characters. If
would
linefeeds in a
were
is
you later!
The
you can
Do NOT
it,
for you.
WARNING!
become unrecoverable.
other technical
tables
to
the
moved any
floppy
disk,
existing translation
and
copied
his
which
said,
Chaptet Sp
instructions
explicit
state matters.
which
give instructions
reversed
the
four
translation
tables,
so
Unlike
reverse
typical
engineering,
If
solution
on
is
tell
user.
disk. For
this case,
SETUP was a
file
on the disk,
and also
instruction,
or
RSE won't
you had enough onsite time to physically mess up their computer, you
should have had enough time to glean the
information that you are trying to get.
if
that can
Post
public
(thumbtack
message.
style,
On
bulletin board
Technical Helpline
COMPUTER PROBLEMS?
CALL US FREE AT
OUR NEW NUMBER:
(123)
ABC-WXYZ
login procedure
you must
wary
this
they
the sabotage
When
67
Technical Helpline
and
hacking,
up
day before
or
even a few hours before
the sabotage and tell
the person who answers about the computing
department's new phone number helpline
(your number). Ask whoever answers to put it
in the Rolodex, or to keep it otherwise close by
and handy for whenever anyone needs it. Ask if
Social engineering. Call
he or she
terminal;
make
if
the
is
the answer
sure others
their address
who
is "no," tell
know about
the
uses that
the person to
new number
and sabotage
Well,
On-line
When
advertising.
sabotage, see
if
doing the
initial
the
bulletin
create
simulated
word
processor
which
few
keystrokes,
characters
first
behind garbled
and this message:
leaving
and colors,
<Beep!>
XERROR
call
ABC-WXYZ
In your advertisements,
realizes
they
it is
know
an
make
to dial 9 or 2 or
whatever to
exit the
of
all,
that's
foolish.
Especially
will
shouldn't be doing
it.
you
create a friend
on the
inside.
Once
you
Directory tailoring.
first
situation,
too.
is
start
trouble
Jforf
/UXirifij
ill:Bll!;Illl
Jrx tl C
Two
69
Chapter Seven:
And Terminals
Introduction
wants
to a mall lately?
mean one
and food
courts,
but miniature golf courses, arcades, banks, post offices, and anything else you can or can not think of?
Instead of the large "You are here
up with
find your
you now
>" maps
you
and inform you
way around
the mall
but the
potential
do so is there as
is
there
and
the motivation
well.
ized
map
of the building
but
there
is
way
of
doing just that. Similarly, when you go to Ellis Island and look up your ancestors in the computers,
there is obviously some rear end to the system that
you are not being allowed to see. All public com-
it.
of
to get at
accessible computers:
lots
of
is
based
Computers
available
now
for the
at
librar-
terns in
an
ies.
room
CD-ROM
and News-
at
Some
libraries
tions available.
Macintoshes)
set
up with
user-friendly programs designed to teach patrons
how to use the library and to dispense other helpful
puters
(usually
this is rare
room.
if
You might be
is
a computer
(On the
shelf?
The challenge
there
is
to the hacker
is this:
He knows
used by library
etc.
add or
alter
must
staff,
database of information as
is
functions that are available to the public are a subset of the entire library
program. That
is,
gram
make
on books
part of a larger
inquiries
the prois
managerial functions.
The two program parts are obviously sepaanyone could walk into the library
rated, otherwise
.11LIJJIU..
'-'-'
and erase all the fines off their library card, or put
$100 worth of lost items on an enemy's card. So,
how is the public side separated from the private
side? Take a guess.
Yup, a password.
Actually, it's usually a combination of two
things: first, a hidden menu command, and then
the password to authorize usage. Go to the main or
earliest menu on the library system and try various
commands like BYE, END, EXIT, X, XXX, SYS,
SYSTEM, LATER, and OFF. Usually this kind of
system will accept either three-character commands or single-character commands, but of course
things vary widely as you go from one system to
another, so vary your tactics accordingly. If something like BYE works, and you are exited from the
public portion of the system, you will probably be
asked to supply a password. Well, you know how
to get
for a
passwords!
password
at
tion to determine
but not
it,
then
it is
If
your
possible
library, close to
my
house,
One fine day I decided I wanted to hack the sysI knew from random trying that BYE from the
tem.
Naturally,
so scanning
my library card
did noth-
card.
if I
access levels,
has
that
finding out
meant
certain
all...
trillions of
wanted
number
numbers
only a hundred
million or
so.
number?
If not,
see
if
alter
digits.
If a carriage return was added, try scanning
your bar code again, this time sending a break or
pause signal as soon as you do. You might be able
to make the computer think it's receiving the entire
bar code, although you will be able to change and
add numbers to suit your needs. If you pushed control-S to pause the bar code
and it worked
try
pressing control-C and see if this stops it from
reading in more digits from the scanner.
The bar code will be read in and placed on the
screen rather quickly, so it may be difficult to stop
it halfway through. If there's a printer attached to
slow
working on (not
it is
it.
to let
This might
you break
it
a computer you're
might be a
mode because
in turbo
mode through
DOS
shell
something
something
there
be some
is
way
a "Turbo" light
lit
of disabling turbo
and see
if
there's a
similar), or
SPEED command
or
it
out
of Turbo).
Another
difficult
thing to
do
is
scanner only a partial or erroneous code. Occasionally bar code readers can be duped into thinking a bar code of a kind it's not supposed to be able
to read is the correct type. Then it may read that
code and stop halfway through, to wait for the rest
of the input.
Lastly, if there is a way of accessing terminal
parameter menus, by all means do so: often there is
some sort of switch which toggles automatic sending of input, or the key code used to send input. By
disabling the automatic send, you can manually
input the bar-coded information.
All of these above suggestions imply that you
have managed to get ahold of the bar code number
lines are
used
have anyone's number. The purpose of my hack was to find one. So I had to find a
way of using the light pen to scan in a hundred
million bar codes that I didn't have, until one was
But
didn't
all
program
to print out
photo-sensor
of the
At the time of
decoding, voltage corresponding to white lines is
approximately 0.11 volts, and
volts for the black
lines. My plan was to send voltages into the scanner, making it think it was reading a bar code,
when really all it was doing was being victimized
firing pattern
way
of
making
is
the cor-
drive, then at
RS232
home
see
if
there's a
serial interface to
difficulty
of
books
the
result.
times the
sum
the numbers.
Figure 6
After a while
The
UPC
initial digit
0.
The
to use
For
this
is:
5.
to
now had
and
was
my own
itself,
as-
able
library
but having
could
+ e + g + i + k)-(b + d + f + h + j)
sample bar code, the formula
it
210-3(a +
The
may
was a simple
accounts
otherwise.
Using
all this
information
many network
There
Hidden Commands
have different
With each
level, the
various
let's
say a library's
don't
has a
three-letter
to try
characters
possibility of
letters
working.
these unlisted
anything
It
else that
commands just
once; sometimes
you
you won't
find that
badly coded as to allow misuse, but you'd be surprised at the number of bugs that do go unnoticed
by the authors and testers. This is especially true of
program editions.
remember this: There are many functions
you may not think would be on a library computer
(or whatever computer it is you're working on).
early
Also,
(patron information, to
PAT
commands
commands. There
that you simply
know about.
commands
called
is
appropriate).
On some
systems,
all
NEW USER
or
RECALL or something. If
know the computer will
then you
n>
-^
tomr\
Figure 7
To fool the PAT into believing you are feeding it bar codes, first (a) remove the light pen from the computer.
Then (b) plug the jack into a receiver that is connected to your laptop via the communication port.
You can then output bar codes through the comm port, straight into the PAT.
members
who
to contact
refuse to return
It is
Some
it
on again
to see
what hap-
and
Alt.
pressed
down
PATs
There
terminal,
system.
You should
and con-
College
keypad on the right side of the keyboard, the corresponding ASCII character will be
screen colors.
Press ? or type
HELP and
Most
see
what commands
run an
mation system, possibly connected with the
are available to you.
colleges
infor-
library
you're using,
too!)
the numeric
produced.)
Also look at the function keys, and combinations of Shift, Ctrl, etc., with the function keys. Try
various other control codes like Escape, Ctrl-C,
Ctrl-X, Ctrl-Q, Ctrl-G, Ctrl-Break, etc. You can
never tell what's going to do something, or if anything unusual will happen at all. But sometimes
you can get pleasantly surprised.
ment.
^^___
where the
would input his choice. You could move
around on the screen with arrow keys and type
elsewhere, but when you pressed Send, only the
characters written in the space where the underline
had been would be acknowledged.
Barry went to the main menu of the information
system. He used the arrow keys and space bar to
erase all the text on the screen, then proceeded to
reproduce the login screen that was used to access
the mainframe. At the bottom, he put the appropriof appropriate size placed at the bottom,
user
who had
sat
down be-
room com-
command
egy accordingly.
Some
you
change screen
color. I've worked a ploy similar to Barry's on one
such terminal. First I erased the screen and typed
up a fabrication of the login screen. But it wasn't an
I put my underline one line
exact reproduction
below where it normally would be.
terminals allow
to
screen
tered
(above
nnnnnnnn,pppppppp
ate prompt...
then
my
fake
underline).
make
used
the characters
...and
He
underline.
he shut
waited.
in.
As you can imagine, when someone uses the accomputer covers up passwords with asterisks. The woman who was using
the terminal did not seem to realize that anything
unusual was going on as she typed her vital data.
tual login screen, the
she
had
commands,
space that was supposed to be used
which Barry had erased). The computer redrew the
information system main menu, and the woman,
surprised, logged in again and went about her
for
business.
key
to
change
it
in the special
my
made
needed.
you
that allow
line,
on
and
or
might be
worth it.
If you try this, remember these tips: Do what
you can to make reading the screen from a distance
easier. Switch on the Caps Lock key if it helps.
it's
way
is
If
Another
the system,
and
therefore
e-mail text editor, there is probably a "Send Comments to Sysop" section in the public information
system that you are able to access. You would
probably want to use a public editor anyway, to
avoid having this evil-doing being traced back to
your ID.
One way of using a text editor to simulate the
login screen is to write up a document such as this:
Brighten
up
tor a bit to
And
if
the screen
if you're able. Tilt the monireduce glare from your viewing angle.
possible,
Name:
terminal.
position the
on the screen
ible
is
document so the
"Enter Name:".
if
there
you
Shoulder Surfing
Enter Password:
You
yourself
>login
Enter
select
is
and turn
word
last line vis-
You put
the
one.
slightly involved
Remember, most login routines will not display the password on the screen,
so you must look at the keyboard to get any useful
as
it is
entered.
information.
inventions.
in the
upper
cor-
tilt
posi-
Doing It B ASICally
tion.
to
will
has
outside lights.
Do some
if
detective
the building
work
before
ple:
10
20
30
40
50
PRINT
INPUT "Name? ";N$
INPUT "Pass? ";P$
60
70
an error
to
80
90
have
Remember
lays, if
it
to
program
to register. Also
remember
to
commands
appropriate)
user's
password.
Sometimes commands are available to users before logging on, like allowing
Figure 8
is
Tricks
Finally, think
need any of
about
this.
all.
them
to see
who else
somehow 1
After
all,
count,
very important
you never
know what superuser is spying on your activities.
Therefore, it would be wise to encode volatile information like other people's passwords before
they get stored in a file in your personal directory. I
use a simple code, such as storing 13 + ASCII code
of each character, with every other number stored
being random. So for the name/password combi-
Hacker security
nation
is
97 85 82 95 96 / 95 78 91 84 82 95 96,
with random numbers between each of these numstore 96 90 86
bers.
An expansion
of these ideas
is
found in an up-
coming chapter.
den
little
dumb
environment.
Let's say you
call
up your
local library
and
Hardware Methods
One
terminal
the portable.
wooden
"Password:".
Basically,
the portable
acted as a
opened up the
plastic casings,
and hid-
Breaking Free
The
of
first
some kind
The people who
don't need some snot-nose kid coming
menu system on
is there's
these micros.
of
commands
that shouldn't
it
does
for
any
be
there,
it
indications
such as
,'
menu, only to get a message like this:
any key to return to Menu." What
happened is this: when the computer was first
turned on in the morning, the menu system was
called up by the AUTOEXEC.BAT file. By typing
Alt-X,
you have been returned to the
AUTOEXECBAT shell, and are experiencing the
next line of that BAT file. Simply Ctrl-C your way
exit the
"Error! Press
out of there.
ing system.
hacking,
starting
If this is
by
all
means
with blank
or company,
lines, the
name
passwords
of the building
taneously.
then turn
'"
'
'
"
'
Vi./,
v
.
My recommendation is to copy everything relevant to your cause onto floppies, then take them
home to examine them at your leisure. This is akin
to the burglar who steals the entire unopenable safe
so he can work on it in his basement with noisy
power tools and blow torches.
Copy
the
AUTOEXEC.BAT
file
system first of all, and any directories you find containing files with BAT, DOC or TXT extensions;
miscellaneous disk
Check
them, too,
business-like words.
\.. mi i^m.mii--
for
if
Depending on the
situation
the computer,
may
you
may
to exit the
computer-wise people
around, or people looking over your shoulder, or
people in charge running all over the place, then
you'll want to get back to authorized sections of the
computer ASAP so you're not discovered in the
private parts and thrown out of the building.
If
there
are
lots
of
networking
abilities,
numbers or
sign-in protocols
there
you
will
be able
to
use.
If
you have encountered prompts for
passwords in your exploration of the computer, try
to find out where the master list of passwords is
stored on the disk. One time I broke out of a public
menu program
PASSWDS.
in
the
tried those
names on
without success.
all
or at
often, es-
area
tools:
Other
pecially
handy
the
for
disk will
tried
UNIX command
eject
pop out.
way to
a disk.
Menu Simulation
And Other Sneakiness
altering the
altering the
creating
private
these:
Menu programs
tion.
will
menuing
computers to create
menu
"Business Programs,"
"Word
tage
When you go
menu
tion).
Public
are available to
word is entered.
of the
and
who
maintain the
such as
categories
Processing,"
and
the
to
public use.
PACK
domain programs
menu program, or
your own simulation
system.
like,
tion,
menu,
is
to
ecrets of
Super Hacker
thing.
licly available
re-install the
where menu information is stored. If you start getting error messages when you try to change the file,
the ATTRIB command might have been used to
"lock" the
file.
MS-DOS systems).
The way these menu programs work is, the per-
lock
it
(on
Again,
information.
is
like:
That's
What
actually
menu
example, it
might prompt for which computer the user wants
to connect with, and then pretend to connect to that
computer. Your program then presents the name
selects
"Telecommunications."
Of course,
this
off.
lot of
after the
look
realistic
we've
all
like the
are entered.
kind of
Make
it
but make
excessive. The user will be forced to log off almost immediately. If he doesn't, or if he tries doing
anything, just have the computer display the standard "Logged off. Good-bye!" message. It may be
possible at that point to have the computer load the
real terminal program, so it will look like nothing
it
batch
file.
effortlessly
It
gram.
the
menu
uses pop-up
menu
windows you
prowill
have to write routines for screen dissolves, or program-in windows that explode open and implode
to a close. You will have to carefully take note of
the actual
make
passwords
this project
will
it
keystrokes, result in a
from occurring.
The thing is, since most of this takes place on
public computers, anyone at all may locate your
precious files. This includes the people who run the
computer labs, those who fix the computers, other
these
hackers,
new material.
away
files
that
have human names to them. These are private directories that people made for themselves in the
hopes that other users wouldn't read or delete their
files
never realizing that their files would be deleted by the computer. Often the cleaning program
is
Before
altered
too,
menu program
or
you
to
certain
files
files
are removed.
also
be
lrWed
IrThu
lrFri
IrSat
file
called "filename")
erased.
echo off
cttynul
date <
edlin
date 12-31-1999
del temp.*
cttycon
make up
three
nocuous.
2d
lrCurrent date
IrSun
IrMon
IrTue
it's
Your batch
del*.bak
file
< command3
edlin commandl < command3
edlin command2 < command3
edlin command3 < command3
date < temp
edlin filename
auxiliary
works by using the "date" command to change the date to December 31, 1999.
EDLIN is invoked to save the password file
(containing the goods), and the three auxiliary files,
under this new date to protect them. Finally, the
date is returned to normal. Note that MS-DOS can
be set up to display the date under various formats.
You might have to alter the batch file and
"Command2" if your target computer is set up in an
irregular way. Also, realize that "temp" is a common filename. You would do best to use something
exotic in your own program.
AUTOEXEC.BAT files get changed often, and a
batch file like this sample is bound to be noticed by
the maintenance staff. To keep your coding discreet
you may want to keep this and similar batches in a
separate file far away on the hard drive from the
AUTOEXEC. BAT. At the point in the AUTOEXEC
where your Trojan batch would have been
executed, you can use the DOS "call" command
("call BATCH.BAT" will execute your Trojan and,
The batch
file
is
list
Chapter Seve
applicable to just about
any program
make
sure
EDLIN is
DE-
there, as well as
external
DOS commands.
program.
the
If
commands you
to get
them
works on
mess up binary
text files
will
DOS
directory
is
Change the
it
able one.
cddir
of course
just
add a
PATH
but
or
commands
if
named
"temp"
open temp
already
in a
one.)
exist?
goto Start
you had
dir
to
add
rectory, or
file:
yourself to an unusual or
(If so,
a batch
statement be-
unfamiliar directory.
a locked directory?
not
something you
it is
CD
it is
:Start
EDLIN
in
Try
commands into
AUTOEXEC.BAT)
no problem
mkdir
directory for
USERS
Place
is
files,
files.
there
If
EDLIN
And Term
file
USERS
Does a
How
in
di-
file
about
you
will get
it
named
directory. After
"dir" are created
You
it is
impossible to
directories
"Commandl,"
There are
cess
ticed.
it
uses the
tories,
from the
it
it
gets to those
il-
want
that to
filenames like
a bit
and see
if
there are
any patterns to
files
file
etc. Do you
them then? You
AFGRAB4.0VL, AFGRAB5.0VL,
might want to
separate
split
directory;
up
the
don't
files,
putting each in a
forget
file
to
specify
the
files.
be for naught if, when you come back the next day
to see what you've reaped, all of your files are gone.
Protect yourself, and your handiwork.
Keep in mind as you read about these special
programming tricks, that I'm not implying you
should actually sit out in the open and edit menus
or sift through files looking for passwords. Never
do that! You must always first make a preliminary
examination of the computer as I described earlier.
You will have already copied over the important
you do.
You must be especially careful with computers
that are meant to be used only for short periods of
things
and
inserting
disks.
It is not the other users you have to be wary of:
they couldn't care less about you, and if anything,
in the building.
by
Some computers
private.
are public;
many more
are
Z^.-.-.-.-.-.-.-.-.-.-.-.-,.-.-.-.
iYiYiYiYiTiYiTiTiTiTi'iTiTi'
Chapter Eight:
On-Site Hacking:
The Trespasser-Hacker
we
discussed methods
computers, but
there is another side to on-site hacking. It is one
that you might think would be best left to spies and
thieves, but one that you can actually participate in
yourself. I'm referring to the on-site hacking of, not
public computers, but private ones. Basically, I'm
of exploring publicly
available
referring to trespassing.
It is risky and possibly dangerous to walk into a
company headquarters and simply start using the
computers you find there. But it's also thrilling! It is
an electrifying experience to first maneuver one's
way into a restricted place and then, while there, to
explore both the building itself and its computer
You
would be virtually
impossible to do this, but more often than not it can
might
think
it
system.
many
have to hack
computing
so-
ways
this
ness.
eras,
it is
it
Wherever you go, you will often have camguards and possibly biometric devices (see
make
it
tough
______
hacker to get close enough to even touch a
computer on site, let alone infiltrate it.
for a
era frame in
an
actual camera in
Closed-Circuit Television
called
up
the store
Nobody answered
and
where
bought
it,
repair department.
spoke with
up and running.
All
had to
an empty caman
an unusual
spot.
A trespasser will
made
smoke
detector,
may
also
be
placed behind grillwork, pipes, or a one-way mirror, or hung from the ceiling inside a translucent
plastic
dome.
hidden cameras
there?
attention to them, so
&
white and color transmissions can be sent over privately owned cables from distances of a few feet to
hundreds of miles. Usually black & white is used,
as it is less expensive and color is generally an unneeded feature. No licensing is required for most
CCTV
private
installations,
many settings.
either openly
store cameras
If
you
are trespassing
try to seek
oughtn't, to
exist,
them
walk
out. After
off,
tall
all,
to
If
stare at
a shape pro-
cameras are often contained in a white or aluminum housing with vents on the sides. If they are
outside, they will have night viewing capabilities,
and so you may be detected even before you enter
the building. I remember walking across the lawn
very far.
system user. Finally there are retinal pattern recwhich look at the pattern composed by blood vessels in the eyes. These too have
been shown to be reliable in their accepognition systems,
a building where you're required to get your eyescanned every time you want to walk through
a door. Or imagine being in a place where you have
balls
The
Biometric Systems
Controls based on personal characteristics are
the ultimate in
they
work
properly.
Known
when
as biometric systems,
computer or the
security conditions
Unless there
would
is
some
by guards
a motivation to
that everyone
going to try their hardest to break them. People
tored
like
showing
unless there
is
how
crophone!
show
they
open
for strangers.
Similarly, finger
Hand geometry
devices
whole damn
thing!
don't
ure the length and translucency of fingers
seem to have much going against them, although
for others,
mind allowing
even
like
holding doors
They
don't
own clearance to
Nobody wants
to look like
you
sometimes find these costly machines turned off and unplugged. You'll find garbage cans placed in the doorways to prevent them
from shutting anyone out. You will find helpful,
smiling personnel who will open doors for you and
hold doors open behind them to let you through
even when they've never seen you before in their
So,
will
lives.
!,
:: .
-.-
.y.,;..:.
.;.,;
j.-
r y. ::. -^^^.^v^v^:-^^;;;;;:^
side
alarm.
This
Always
A Way
realize that
taken
away
because they were thought to be a menace to society. Sure, the Secret Service and the FBI may be
powerful, but maybe they are feeble-minded too.
would be impossible
is
even
if
to hack, especially
there
like it
when you
to get at
is
security:
some
acting ability
about
this
just
we wanted
and
it
takes
Piggybacking
There are two kinds of piggybacking. Electronic
piggybacking is dialing up a computer and finding
yourself connected to the account of the last person
who logged off. Physical piggybacking is using
another person's access to gain entry to a computer
or computer room.
One way
other buildings
and
know these
done them.
with them,
Then
like if
went into the building, up to the sevenand came out of the elevator facing a
teenth floor,
So you
see,
piggybacking
computer
is
insertion of a
& Antics
the jobs
you wouldn't
necessarily
That
site.
tell
In seventh grade
is
surreptitiously
transferred.
was amazed,
the
first
day of
it's no great technological feat to contwo or more monitors to the same computer
and switch between them. If you have access to the
computer your target will be using, you can attach
an RF adapter to the back and secretly run the cable
to another monitor or television set. Then sit back
and watch as what occurs on your target's screen
unfurls on yours. You won't get to see your target's
password, since it will be covered by asterisks, dots
or spaces as it is typed
but you can get other information this way. This is a good technique if your
target has a lot of encrypted files for which you
passwords
taped to ink blotters and stuck to walls. You can
find pictures of kids, people's names, hobbies, etc.,
from which to guess more passwords. You can easily eavesdrop and find out inside dope on people,
as well as shoulder surf with ease. Yes, to a hacker,
those yucky gray cubicles can be wonderful!
Sometimes you will be trying helplessly to hack
an on-site computer, but for whatever reason the
data you type refuses to be entered. Note that on
some terminals (or computers), non-standard data
to the next, finding
hacking of computers behind closed doors. In airports one can often find unattended terminals. Step
behind the counter and you can hack until you're
chased away.
Before concluding this section on the hacking of
private and on-site computers, I want to touch on
an area that is connected to the subject by a tenuous
thread.
Electronic Passive
I
Computing
be
won by
intellectual exercise in
game
way
as
an
tries to
Actually,
nect
will let
if
he de-
crypts his
may
screen.
to a printer buffer.
is fast
Make
or the buffer
is
As an example
of one limited
can be accomplished, consider the "print from keyboard" option found on many word processors.
"Print from keyboard" causes that several thousand
machine
to act like
keyboard.
slips
away from
you can
slip
his
word
over and
Another option
software which
some
write
is
make use
to
of monitoring
commercially available
is
yourself, to satisfy
your
95
own
or
personal
When
site,
program
(visiting the
who had
a vi-
puter-knowledgeable investigator.
on
By
printing "Shift-PrintScreen"
on any
mode
DOS
will
be
activated.
this
also al-
last key-
stroke!
I
didn't think of
at the time,
it
but
it
would've
keystrokes?
Good
You can
question,
word, but
You
it
and actually
do have
his pass-
it.
can only go
and the
were a
file is
lot of things
which
wave
if
the
modem
is
coupled to
it.
tar-
modem calls
number
You go home,
call the
the recording
that lawful
user's access
to synchro-
computer's prompting.
If
it
right,
you
amplifiers,
cables, the
tors,
the
tion,
it
at
but transmit
some
it
electrical
Computers operate
at radio frequencies
prove
all
and so
why
the
Federal Communications
computers (and
many
other electronic
it
picks
if
the
up from a com-
TV has an antenna
amplifier attached).
When my
quencies,
Radiation Comprehension
Nearby
it is
target's
computer account.
1 Transient
and reconstruct the information from any digital device, most notably computers. Scientist Don Britton had already gone
it was the Van Eck paper that got people to sit up
and take notice.
We were talking before about how you could
set up a radio receiver to pick up the mess of signals coming from cables, wiring and circuit boards.
This is possible, yes, but you would end up with an
unintelligible mishmash of signals. It would be difficult to separate and decode the various signals
though not entirely impossible. Doing so would
enable you to determine what a distant computer
was
"thinking"
through
its
as
those
pulses
electrical
shot
system.
"Pulses" is the
story about
We
all
know
and zeroes
to create the
every time
we
the
we
get
game.
latest Sierra
is
We
as being Is
little
(fluoresces)
screen
is
when
energized,
and the
stuff.
inside of the
F t< r-Hacker 97
lug* * **, * **
Ha
up,
the screen?"
it
The answer
is lit
phosphorescent matter with an electron only produces a very brief burst of glow before extinguishing. That's
why
the electron
gun must
systemati-
Van
Eck's idea
was
monitor emits them, and have the television respond by firing a pixel in the corresponding place
on
its
own screen
by
display
pixel, that of
huh?
The problem
is
re-
chronization signal.
Two
vertical (picture)
and horizontal
synchronization.
....
...,
,.-.._....
cir-
realms.
difference
between
Britton's
that
method
it
is
no trespassing
computer. Van Eck has
involves
your target
reported that he was able to use his invention to
view the contents of computer screens from distances over a kilometer away. His working group
housed the device in a van which they parked on
the street, usually right in front of a target's home,
at all to get at
without incident.
we
do what
is
away
ditional hacking
allow us
is
marvelous in and
discussing, as
methods
we were, pulling
from the
through
ether.
further
away than a
section
we
But
tra-
the telephone
from much
how
a hacker can
roam through all the confidential computer systems of his neighborhood, his country, and, if he
chooses, the world.
Chapter Nine:
Hacking At Home:
Dialing Up Computers
With Your Modem
Now we get to the stuff of which dreams are
made. You flick the switch on your computer and a
few moments later it's purring away. You press a
few keys, type in a phone number and after some
beeps you hear the wonderful shriek of connection.
The handshaking is fine, but you're looking for a lot
more than a handshake.
You
name?"
name
You respond
asks.
with someone
When
mean
it.
say
hack from
their
let
the directories
sift
to
to
matter
its size,
leads to
line
Who To Connect To
Who can you expect to connect to,
You
else's.
a luscious display.
play.
don't really
Then you
let your fingers whisper that sweet secret word
through the keyboard and the screen lights up with
of course
Reality
"Hacking at Home"
home? Lots
puters,
calling
from
home com-
You might
tabases
^:,^:j.
:v'
^;V
,^..,, ;
,:
,,,,,.,.,,;,,...,.,,;,;
A hacker named
how
for
enthralled
one aspect
known
CompuServe
S.
CompuServe
is
often
is
as
me
results of
tech-
nology reports, books, personal information, history, and popular culture. There have been times
late at night when I needed one crucial piece of information for something I was writing, or just to
satisfy my curiosity. Anybody can access one of
these databases and find what he or she needs any
time of the day or night. Of course, we must be
prepared to pay through the nose. There is usually
a charge to subscribe to the service, then there may
be any number of the following charges:
A display charge for each piece of data presented on the screen, or a search charge for each
query made to the database.
if
the service
in your local-
up
to give
special
in.
bills
when
so
many
chatting, bulletin
membership
tem
will appear.
hacking.
if
You
you were
directly connected to
it,
when in reality everything you type is being broken down into chunks of text (packets), possibly
compressed and encoded, then shipped across the
country, from one computer to the next, until it
reaches
its
destination.
known
Many
to
"Getting Started
the system as
dialing area.
Many
very attractive. You will find many ideas throughout this book.
You'll be interested to hear about one trick a
pair of high-school-age New Jersey crackers used to
get some service for free. One brand of personal
computer was being sold in a special package that
included several pieces of software, along with a
as packet switching.
puters that
Packet
do
all
the
work
Assembler/Disassemblers,
because
they
take incoming packets of data, strip away the encoded insulation which tells that PAD where the
packet is headed, then reassemble the data with
new directional information, sending it further
of code
to
typical
Internet
address
M
might be [email protected]. We
can deduce that at the University of Boulder there
is a computer in the computer science department
called zowie4, and on that computer there is a person whose first name is Daniel, and last name begins with K. The "edu" is a standard thing stuck at
the end of educational computer addresses. Other
identifying components used are:
,,
Other Networks
The only other network
that counts
is
An
the Inter-
Internet
address
may
also
net.
the world,
all
end
in
Some exam-
AUAUstralia
IL IsraeL
US
United States
JP JaPan
UKUnited Kingdom
DE Germany (tricky! DE is for DEutschland).
sites)
Many
are connected to
it.
To
need
"direct connect"
their
lines. If that
the
familiarity
call.
dial-up lines
if
rectory.
is
a person speaks
the other
it
if
Software
ries
you're doing
legit: if a person picks up, they get a short recorded message: if a modem picks up, they get a
callback later.
end gets a
book.
many
looks
on the telephone,
is
for that
list
up a
se-
dem
names:
possible
it's
unstoppable.
an intermediary de-
codes.
may have
computer
kept
secure and changed frequently, the important data
initial
is
it is
possible to set
who
up
is
calling
back a stored telephone number which goes with the identity that
has been entered. This is the normal way ring-back
calls
measures make
may
life difficult
knowledge out of a
One
legiti-
phone numbers because you have reason to suspect that a computer line exists within that range. If
one of the numbers is never answered no matter
how often you call, you can surmise a ring-back or
similar device is connected to the other end. If you
call one number and hear a computer at the other
end but aren't connected, suspect that the computer
is looking at your phone number and seeing if it's
valid. 2 (Either that, or what you're really trying to
of
connect to
is
When
up
use
the computer, a special device answers the phone.
puter available at
all.
a user calls
to
modem noises,
devices which inhibit access to the actual computer are nothing more than one more
All in
all,
Scrutinize
phone number
to
it
that
it
narrows
helps you
more
down
easily
is
helpful in
number of unknowns. It
figure out what you should
the
If
type "HELP"
you
CONNE
is
not available"
it
im-
form you. The first way is preferable, as it is less secure and requires substantially fewer guesses to
crack than the
latter.
inse-
know
it
same
format. First
it
helpfully
prompts
(hint, hint,
type your password." This particular computer allows you to easily break into one of several command languages and reprogram the menu interface. It also comes equipped with dial-in ports.
Dynix is a joy to hack.
If you get a computer of the second type (one
is
and
name
that the
files. If it
it
takes
to find in
its
password
cially for
to see
function.
If you have no idea what kind of username
and/or password is required on a particular system, do the same kind of checking you would do at
a general command prompt, checking for which
characters and lengths are recognized.
A completely different way you might like to
prompt
is
by
control codes.
computer which
may
to
it
to act in
password
file.
end-of-file
command)
Look up
all
on the
screen.
Any
and
decent
library will
often
you
will call
up
comes
address,
infinitely simpler.
Chapter Ten:
When
it
does, the
BBS program
Schools,
libraries,
the
system operator
stores,
user groups,
up electronic BBSs as a way for customers to mail order products from them, to see
new product information, or to report problems
with products or services.
The US Congress has even set up a bulletin
board system. Run on RBBS software, the BBS was
created in late 1991 by Congressman Bob Wise and
his House Government Operations subcommittee
panies will set
workplace.
Other BBSs are private ones, the phone numwhich are not made widely available. For
example, the FBI runs the National Crime Information Center (NCIC) which makes use of a BBS to
keep track of wanted persons, missing persons, and
people with criminal records. Franchise businesses
such as fast food places often use BBSs to upload
inventory or financial data to their company head-
Usually there
is
no charge
is
to call these
up and
bers to
n
quarters
on a daily
basis.
And
who
illegal
purposes.
keep messages clean... No discussion of illegal activities such as computer hacking, fone phreaking,
stolen credit card numbers, etc.").
After that, you might be given guest access to
the BBS until the sysop can validate your request
for admission, or you might be logged off and
asked to call back the next day. This isn't always
the case, of course, but sysops like to make sure you
if
Finding
Once you
BBS Numbers
find one
will auto-
up every BBS
in existence. Thus,
you
will al-
puter stores.
on much
you will find an electronic conversome intellectual value to it. Embrace it,
add to it, and pretty soon you'll find yourself accepted into its underground. If you find such a BBS,
one whose members proclaim themselves to be
hackers, and yet the conversation is smart and conservative, you can bet that there are secret subboards lurking behind trap doors, where all the real
hacking news gets discussed. Prove yourself as a
Occasionally
Making Connections
sation with
You must
and to give.
If you log on
have
good information
to a respectable
to share
command
each
time you log on. (Don't do more than one per login,
you find a com-
feelings
who are
line chats.
we
no trading of break-in
secrets,
and
certainly
no
sensitive information of
to
already
into
possibly
established,
ho-hum
conversations.
Be
polite, try to
comments
be helpful.
Add
thoughtful
to the discussion.
hacker.
them
to accept
like to
show
you
off,
difficult is getting
like to ex-
plain
as they can
to
the bulletin board forkeep track of where you've been. Keep a list of
the different BBSs, making note of the software
used to run each BBS, and what features are available on each one. Particular features to keep track
est,
lists,
Text
file libraries.
"Welcome
share.
of are
file
to
technical files
the
BBS,"
and other
handy
jokes,
information,
and doors.
BBS
Exploitation
BBS Features
that
BBSs are more than just bulletin boards
is, they are more than just a place to write and read
messages.
farther.
gram.
BBS pro-
(by selecting
command from
different
don't
to
even think
about security. He's never had files erased by a virus, never had his credit card numbers stolen, or
his DIALOG account breached. Joe Blow is the
weak link.
How
is
Joe
Blow
the
weak
link
be
to
ex-
is
him
this
makes
And
Blow?
Yes, you.
Getting
To Know You
you
up
Fred's BBS,
To sum up:
you
find out
is
same or a
similar
what
things a user
interested in,
work
it's
you know
or school,
password
is
it's
likely the
sys-
tems.
word
tience,
is
simple.
and a
are faster,
technical
lot
not
you have to have paof time on your hands. But there
It's
Bypassing
BBS
Security
&
lacrosse."
Now
4.
5.
1.
2.
3.
6.
7.
is
and
know
them.
It is
not
you
areas of interest.
are learning
is
watching.
8.
ting to
"easy" to
that person
is
Let's
SCUBA
If
new user)
(especially a
the
like her-
esy to some, downright evil to others, and superficially it will appear to break the very fundamentals
of the hacker's code of ethics. Well, in some ways it
that are like that.
the password of
are get-
offers
numerous
the BBS of
pretty
much
time
you will be familiar with practievery aspect of the BBS you select to hack.
BBSs often have a menu option that gives you the
the
first
cally
rundown on what equipment is being used to operate the system. The brand of software will also be
known to you, and from regular conversations with
the sysops and users, a personal familiarity will
develop. Knowing all these facts gives you a great
advantage in the writing and uploading of Trojan
horse programs, in the seeking out of bugs to profit
by and, yes, in the guessing of passwords.
BBSs will generally tell you upon login whether
or not the sysop
is
no guarantee
is
advertising
dures, to ensure that you're not accepting law enforcement officials or hostile hackers onto your
board. So as not to get too off the topic, I will come
later, at
Running a BBS
or at the very least, setting
one up on your system, even if you don't go public
with it
will teach you more about how BBSs op-
hacker,
and soothing
It's
always beneficial to a
be most cautious.
Even if the sysop appears to be unavailable, the
BBS software itself might be watching you like a
hawk, printing out your every move, or every attempt at crashing the software. For example,
RBBS-PC bulletin board software allows the sysop
to keep a continuous printout on each caller's
name, files exchanged, and error messages that occur. As we will see later in this chapter, this can be
troublesome depending on the type of attack you
definitely
to
be
fully conscious of
nm
a BBS by myself
Running A BBS
The least difficult way
to collect
If
passwords
you
start
is
to
up your
nm
Midnight Masquerade
leaves
ity-satiating
value of
it,
2)
3)
passwords
own
BBS, the
turns removed.
like this.]
you
are really
who you
let's
go
voice!
This
is
this is
Knightmair
Forgot
my password.
Log
me on.
He knew
that
dendryte
is
pick
up
the telephone
go
that
never
my
DR
modem and
voice.]
get
is,
off his
DR den-
GO VOICE
Theres no phone in the room..
Sure there
is!
broke
dont know
it
just slipped
my mind,
guess!
HA!! You should have said, "WHAT bookThere IS no bookshelf in the room! HA
shelf?"
I
HAHAHAHAA
tell
+++
me,
[Click.]
you
trust
your
own
best friend
&
co-
sysop?
come on.,
i
DR
him!"
or uses
bad grammar or
like
Hackmail
DR dendryte
The Treacherous Den BBS was a particularly
sweet target for hackers to try and infiltrate. It was
many
(many of whom
and it had dozens of
users
"Yeah,"
struction
book
it?"
BBS software.
at a
used
DR
man who
also
started the
com-
LB
Not only did DR dendryte know immediately
that this was a total crock, but he knew who had
had the gall to send it to him. At once he reduced
login access for that user he had spoken with on the
phone, down to one-time visitor status. Then he
wrote a nasty note and e-mailed it to him. That
files:
Dear Mr. L
upgrade
grade.
and a
fifth
program
that
matched
closely
It
programmed
This
new
is
fully
compatible with
START.
Thank you
Software.
We
hope
to
A copy of the
user information file was programmed to be emailed to a user the first time he logged on; a trap
door had also been inserted that would give temporary operating system access to anyone who
typed control-E, control-X, control-I, control-T, control-! at the username prompt.
You won't be able to pull a stunt like this unless
you can gain access to the source code for the soft-
(Signature)
board system).
want
to recreate
from scratch an
entire bulletin
at-
tacks
Crashing BBSs
modem, during
A "\x" typed at
'
worked.
I've always wondered about that "\x." Why
would such a harmful thing be there? I can't imag-
user's drives.
line service,
It
Maybe
that
along the
line.
system access
is
gained.
When
it
receives
line, the
stated publicly
or transmit to
is
Maybe
theirs doesn't
do those things
but
yours can!
so, highest
As we have
distributed their
own homebrewed,
program
Macintosh
nal
for the
line.
practice:
packages? In
cial
programs.
package, and so
As
fact, this is
doors now
changing a BBS
to in-
to interject
sults,
code for the trap door but, for best redetermine a way to hide that code from inter-
itself.
itself,
The
copying
ested eyes.
Covering Up
Trojan Horse Activity
Trojan Horses
It is usually easy for a hacker to infiltrate a BBS
with some version of a Trojan horse program. The
hacker writes a program which performs some interesting function, such as playing a game or put-
here's the
of the
important part
horse to a system:
it is
running.
program.
If
the
While
It Is
Running
on and on and
on.... It
takes quite a
some
hold interest for the length of the format or file deletions. The time-killer could be a pornographic
display (perhaps accompanied by digitized sound
effects: "Ohhh! Ooooh baby! Yummm-mee...!") or a
digitized musical score, or perhaps the program
could send graphics to the printer. Meanwhile, you
Loading text
will
program
should erase the note from the screen; this will ensure the drive access time goes unsuspected. If
possible, have the note be erased midway through
the Trojan horse's activities, to deliver the illusion
of very quick drive access.
Another way to access the drive unnoticed is to
have the program say something like this when it is
started up:
Before
& After
board
file
now
transfers.
to
it.
As
bomb
Meanwhile, the Trojan horse will be scanning
the computer's hard disk for passwords!
etc.
that
Opening data
file
Reading data
Saving selections before quitting
Even
if
grams,
files.
crasher's
he or she
is
before the
looks like
it
program, or
is
text that
is
actu-
a snap.
cdBBSXUSERS
open USERINFO.TXT
read USERINFO.TXT: User #44
3 == systemlevel 99
set systemlevel
close
exit
This
isn't real
code.
It's
meant
to illustrate the
One way
attention.
have
the main application program create batch files and
other programs it needs. The batch commands start
out as encoded gibberish in the application program. A subroutine is called, which opens a text
file, decodes the commands, fills the file with them,
then goes about its business. The creation and use
of the file should probably be done on separate occasions, to keep illegal drive access time low.
to eliminate this
problem
is
to
if
you would
delete
it I
will
What
if
taken on the road through the use of laptops, pubcomputers and the like. But you most
likely use your computer for other sports: game
licly available
playing,
word
modem
One way
and
processing, programming,
you
up a BBS.
get
legal
all
ex-
to
much
as a generalized
BBS would
after all,
But you
want new users to come and enjoy themand if they turn out to be the kind of folks
all
the
riff-raff.
still
selves,
The strategy
stay awhile
leave
it
on.
is
to set
Many
up your BBS,
BBS
Don't do that!
If
turn
it
own
come
off-line
to
someone
in
and
on, then
with the
system, continually
make improvements.
calls
and
finds
no com-
man
it
is
common
upcoming
we
more
ways you the hacker can protect yourself from the
some
law. But for now let's get back to hacking
of the best and most useful techniques are yet to
In an
section
will explore
come!
Chapter Eleven:
Borderline Hacking
want
to talk about
hacking world.
good," be-
all
valid points.
your heart.
Remember
it is
curity loopholes
iHRnBBI
You know their minds and their methods, and so,
yes, you have the expertise to recommend action
that will prevent invasion of their system. Explain
to your employer why it is important that each of
your suggestions be followed. Tell them what you
did to get in, the weaknesses you saw, and the potential trouble spots for the future.
no sense
to hacker techniques
when
in restricting yourself
If
want
to try
Filthy Tricks
because they are the
kinds of things a rank amateur would do. These
These
in.
Bribery
You might not want to bribe
istrator,
count.
If
Offering
money
Vehicles are
some
of the easiest
and
safest of
com-
is
why
about.
Booze
And Broads
It
literate.
Bad Feelings
This
isn't exactly
a dirty
trick,
but
it
feels like
who
is
blame for
know, I'm cruel sometimes.)
In any case, employees who are moving on
get the
(I
who
to
Chapter Twelve:
is
lessly outwit.
is
will
most
likely settle
to take
system to
its
he
time to come.
I like
hacking, but
available,
in the short
run
if
files is
a crime
mentioned
increasing
all
nm
covery.
make
also like
exploration.
for
to
and you
and rim
have the
You now
root
the programs.
account
Download files.
of several "sysadmins").
different
of a security problem.
sysadmin, superuser, demigod account, sysop account, or admin. Or you may never even know
you've gotten into the root until you find you can
do stuff only the Computer Gods high upon Mount
Input/Output should be able to do.
A "group account" is one used by many people.
It might be a departmental or store account, where
everyone in a particular store or department can
this one.
turn.
If you have managed to work your way into
some data that you feel might have market value,
you might consider selling that data and thereby
fund your next big computer purchase. I recommend strongly against doing so. Becoming a spy
becomes a serious and dangerous
for anyone
business. It also helps to further degrade the image
of the hacker in the public's eye, and will serve only
is
names:
It
avatar
may
by
god account,
also be called
account,
may have
their
ample, many companies like to set up limited accounts for secretaries, typing pool or temps. Other
group accounts appear in places where terminals
are available to a number of employees, but where
?mvmn^ssssssssssM~^,^^~^
tabase
is
structured.
"Special accounts" include guest or demo accounts that allow one to take a sneak peek before
subscribing to a service. They may be testing ac-
counts put in
counts
may
by system programmers.
Special ac-
you
to
an operating system
way
for tutorial
account,
you
may mean
my
computer? Or a fourth?
Do
keep adding
more switches?
What I do is, instead of adding hardware
switches, I add a third program, a software switch.
The third program is called the operating system (or
OS), and when I push the computer's switch, the
computer will automatically turn on the operating
system program.
"Word Processor."
As you are well aware,
controlling software
was
As
operating system.
Operating Systems
ings.
what if we
Does it go right to the game? It can't
wanted to do word processing? You see, now we
have to make a choice. When we turn on the computer, we now have to specify somehow whether
software.
1.
2.
3.
error messages.
But
back.
have
to actually
things about
its
operating system.
may be
able to get
And
I'm talking
You
we
still
above
is just
of this information
is easily avail-
manuals and
berg. After
all, all
know about an OS
come
is
in the manuals, or
if it is
printed there it is so
is information deci-
enter
worthwhile.
version of the
into
mean,
it's
one thing
on-line database.
It's
to
hack one's
way
into
an
fig-
particular
those alterations
used
of insecurity.
nical
is
oblivious to
all
of these pos-
if the hacker has a fundamental understanding of the operating system which underlies
all these sources of intrusion, then that hacker will,
with a bit of thought, realize where the traps are
to them, but
Needless to say, this book is not going to suddenly turn into an explanation of the technical aspects of every single operating system, and a true
hacker wouldn't want it to be. So, go out there and
find some operating system you can get acquainted
with. Learn its basic commands, but then go a step
right
127
to a spe-
cial directory.
One
if
of the
rity log
the
Do When Inside
errors.
it
For example,
if
George Washington
tries
UNIX
following ensues:
ory? These are the kinds of things that are important to a hacker
who wants
to
WashingtonUs
accomplish big
[Enter]
dreams.
ername:cherrytree [Enter]
Examples of such techno-oriented hacker methods abound throughout the rest of this chapter. The
reason is simple and unavoidable: the best things in
life are often not free. You have to work hard if you
want to do great and exciting things after invading
Password:
you may
convenient to learn
arises, such as a
particular shell programming language, or the way
an application works. But when you lack knowla system. Sure,
find
it
need
George
realizes
his
name
his
password
line.
He
He has typed
on the "Username:"
damage
is
file
that reads:
you
are just as
and flaws
Mar 24,
of the
@ Tue,
1992, 14:16:03
away from
all
this
heady
stuff for
awhile and go back to the impetus for this discussion of operating systems: After
the hell
you get
in,
what
Looking Around
What should you expect to find, once you've
made it onto a system or network? A whole lotta
things!
may be
programs to run, or
ways to move about from one computer to another,
or one network to another.
Try looking for backup files and files that have
been automatically saved on a timed basis. Some
text editors leave behind files like this that are
readable by anyone who happens to pass by. If the
sysadmin has been editing the password file, or
some other file containing sensitive data, you could
files to
you
just
password.
Security logs
comes next?
There
Now
read,
be in luck. Electronic mail is often not automatically deleted, and it accumulates in (perhaps hidden) files on disks. Deleted files may not be deleted
may
it
through.
the message
tells
you
116" message.
of
knowing
that
problems with
system.
If
you
receive a
group
We
doing what
we
ports
detailing
readership,
file
command
may be
activity,
history re-
newsgroup
show you when and how the legitimate user is using the system, and also the level of competence of
the user.
If
quently, then
you know
infre-
although it
owner poses very little threat to you
means the system manager is now a threat,
since he will suddenly see tons of activity from an
account that had never before been active.
also
there night
of
if
him than
of the sysop
to
is
in
be more wary
any hacking
after all,
shuffle.
< filename"
that entire
com-
program
acts to
it is
remove
activated, but
when
mands, programs and variables that have something to do with passwords. You can then use "man
commandname" to find out what each one means.
On TOPS machines you can type "help" or "help
Message #01
From 1513 SuperUser
To [email protected]
Some
On
first
place
is
to give
It
also
might be the
USENET
most practical solution to the problem of connecting to a certain computer, since some computers
can only be accessed through other networks.
ing about software, about hardware, viruses, hackers, individual operating systems and printers and
FTP is a program
copy
files
made available.
Often an anonymous FTP site is set up like
trading post.
An incoming
directory
is set
up with
others
tiality,
files
before
flowers
FTP
is
and
that
two
owned by
the
FTP
and
sions of system
account.
If
Fun
N Games
number
on the com-
of on-line, multiuser
games
available
you crack, especially those at colleges. Because the games are multiuser, passwords are required to access them, and it should be noted that
often the password-storing mechanism on the
games is not as secure as it should be; the passwords are sometimes placed in a plaintext file. We
know that people tend to use the same password
puters
to local
it
is,
some
Becoming A Superuser
anonymous
You might
SCUBA
making them
Some newsgroups
publicly available.
One common
cars, sex,
it all.
with
is
is
isn't
worth anything
if
you
or social engineering.
As far as research is concerned, you will want
tricks,
software
is
start
Spoofing
cases
mail in such a
with the
first,
and look
at
to spoof
an e-mail
send
text or a
and the
fur-
system.
Usually one sends mail by running a mail program. The mail program includes a text editor and
file
it
MAIL.TXT.
let-
ter
body
contents of the
text
there
may be
if
be a computer
an e-mail message. This includes "mail from" and "rcpt" which establish who the sender and recipient are. Use "help"
to get yourself through this.
Earlier I mentioned that spoofing is also considered to be any form of on-line impersonation of
there are not,
commands
sending the
to
to generate
another.
Many
each other by
WRITE, or
way
of a
TALK command,
1
person's screen. When they hang up, you piggyback a ride on their account.
As with
the
e-mail spoofs,
TALK command
screen.
You have
to
you
put
text
TALK command.
safety
(If
you
it's you
sending the message, not the Sysadmin. You have
to emulate the TALK header which announces the
name of the user sending text. You also want to go
down to the fundamental "send text" statements
because you don't want the user to have the option
of not talking with you.)
It's a recognized fact that spoofing accounts for
a good majority of system security failings, mainly
because they're so easy to do once you've gotten
on-line and taken a look at the software source
codes and manuals. Another trick relies on TALKing a message that an intelligent terminal will understand. When you use a TALK command you
aren't putting words into the OS prompt's mouth
the OS
ligent terminals
se-
come
across a
command which
allows interaction
Cryptography And
DES
though it is encrypted.
Then you compile a copy of the decryption
software, altering it so it will read in a word from a
file, use that as a key,
source code listings are
specially-prepared dictionary
result.
UNIX
is
that follows
know
know
VMS.
Sorry to say,
don't
isn't
used
all
that
much
is.
DES is
And if
part of that ".login" included mailing the user's secret stuff to your account, so much the better.
on another user's
go into the source code of the
to
J^-^tt^u^
How
does
it
As we
all
know,
UNIX password
files
are
nm
attack.
bit, it's
unsettling to
not be as secure as
it
was once
believed to be.
may
DES
was based on a security system called Lucifer, developed by IBM for the National Bureau of Standards in 1973. Before being released as the USA's
official (standard) code, the top-secret National Security Agency had their say in the matter, reducing
the complexity of the encoding algorithm
and
code!
I'll
stick
you.
Bit
By Bit
little
peruser status.
is
Or is it?
that they
to
change
your own.
up
too soon!
It
may be
that
while others
due
or impracticality
have been left unsecure.
you may not be able to change the passwords
but perhaps it would be possible to move files
sibility
If so,
file,
change
opens up a whole
world of possible Trojan horses and back doors.
If security seems to prevent all illegal access
from taking place, perhaps it is possible to trick a
process with superuser security clearance into doing the work for you. A simple program, such as a
to another user's private directory, or to
files
ViYiYiYiViYiYiYiYiYiYiYiTiYiTiYiriYinYiTiT
superusers.
directory. Eventually
make up
there
is
access
Program Employment
Most programs
that are
is
its
Viruses
employed by hackers
And
the classic
faults
means
PATH commands.
Most modern operating systems allow you to
arrange your files in an organized fashion by the
use of directories and subdirectories. This makes
finding where you left a file easy, but it causes
problems when you get sick of typing in long
pathnames to change from one directory to anusing undisciplined
IF/THEN
cess that
in
PATH
PATH commands
PATH.
The program
it.
is likely
to
is
then
be in a super-
innocently
chance
superuser
upon, let's say, your "date" program instead of the
shell
"official"
is
true,
entails.
classic
to use is
adequate job performance, or for some other huA few days after he walks away,
the head honchos at the firm get a message from
the programmer: "Pay me X thousand dollars before July 31st and I'll tell you how to save your
miliating reason.
file.
user's path.
such-and-such
IF
commands. A PATH
command says to the OS, "If you don't find that file
in the current directory, look over there... Then look
there.... And there." In other words, you specify a
path which the OS can follow to find files. That
way you don't have to be in a file's directory to acis
THEN
other.
The solution
statement.
it is
script,
OS directory.
It is
ac-
programmer
has,
you
implanted a logic
see,
bomb
does
is
look at
its
environment,
when
replicate as
3 Also, think about Trojan horses in terms of the multiuser games discussed earlier
words,
etc.
obtaining those
pass-
thing hides
itself
a Trojan horse.
Logic bombs are dangerous, but at least they
are contained. Worms and viruses on the other
say a true
hacker will never release a worm, because they are
too destructive with no purpose. A true hacker may
release a virus if it can move harmlessly
throughout a system, erasing itself as it goes, making sure it never backtracks to where it's been before.
A
words
virus can be
programmed
to a specific address, or
battering
ram to brute
force
it
new
to e-mail pass-
can be used as a
passageways into
So you have
which requires another key...
which means more hiding needs to be done... another key.... Well, this could go on forever. Make
the best of the situation.
If
lot of
them safely.
There have been rumors of a microcomputer virus which, if it exists, would gladden the heart of
many a hacker. The virus is called the AT&Tack Virus. Once it copies itself onto a computer, it tries to
find a Hayes brand or compatible modem. If one
exists, it silences the modem's speaker and dials a
preprogrammed number. Apparently then who-
access to
makes
it
may
ever
anyway
You may
also
To send short messages (like a single password4) you may have your rogue program rename
a world-changeable file to that message. By
"world-changeable,"
am
on that file
set it to very low
protection, so that anyone can change its attributes.
Your Trojan horse/virus will come into your direcprotections placed
all
Covert Channels
One of the fun things about using Trojan horses
and viruses
is
you
in
some
read-
individual
by giving
'
",
'
"
'
commands
When Im
nonexistent hardware or
means
"Find"
alphabet. See
that
If
there
is
if it's
any
bounds of
beyond the
up programs for
possible to set
memory capabilities.
fine a character.
continue.
ones accumulate, the program translates them into a character of the message.
bits to de-
do so unnoticed.
Okay,
all
of that
is
fine
if
as a
If
the
latter,
see
in
it.
On an on-line
("WORD.PROC
FILE.TWO...") or
STORY.DOC
by giving
it
FILE.ONE
inappropriate data.
Some examples:
WORD.PROC WORD.PROC
WORD.PROC \directoryname
WORD.PROC nonexistent-filename
WORD.PROC /etc/date [or other command]
The "inappropriate data"
tactic
been exploited
mand
stacking
is
excess
is
Another bug
command
stacking.
that's
Com-
Al-
password, but through some fluke hidden command or technical means, you will definitely want
to add a trap door just so you don't have to go
through all that rigmarole the next time you want
to get in.
On many
out.
these
complish.
Is
new
(i.e.,
Beta tested).
being renovated.
Is not commercially available.
Is
dummy
Mainly
this
if
further penetra-
means
setting
up a
there
now
So
let's
ji:*Ll
--,--,-,
Afte
'
WpterThirtet
""ii-n-
W
*
Chapter Thirteen:
There are
lots of
manner
ficials
of local, state
and
guys and
all
to trip
who
love
The Wisconsin
("Chapter 293,
statute
on computer crimes
you law-
willful,
State
Laws
ties
state except
documentation."
The
aspect.
final offenses
"Whoever
have
to
willingly,
under this
statute.
There are eight different penalties listed, depending on whether the act in question is consid-
*:** :;.JFmm%r'KifM.
A * V*****;
Vrilfltriffflgffififi'
we
'
mttmiYfitmiiiiYft
might apply to a
hacker's trial. For the specifics you will have to do
your own research into your state's laws. Here is a
generalized overview of traditional crimes, and
how they can be applied to convict you of
computer hacking. I want to stress this point of
"generalizations." All the definitions of law to follow are simplifications of the laws throughout the
land. Individual states add their own personal
quirks and nuances to these laws
minutiae on
which both surprise verdicts and legal loopholes
Laws
statute
and
definition
not
every single
list
that
are based.
if
Criminal Mischief
there's a
some
circumstances,
ful destruction of
may
other reasons
such
as a rural jury
prosecutors
technical aspect of
They
it.
someone
is
the will-
else's property.
You
say to yourself, "Gosh, as long as I don't purposely go around acting like a jerk, how can they
convict me
To be
man
must be
damage
damage
to
someone
else's
property,
has caused
and
that the
smashed
is
storefront
window,
but
how many
how an algo-
file.
In-
may not actually have been alany detectable degree, and the hacker himself may not have done any noticeable actions at
all. Can one then honestly say that criminal mischief has occurred? And yet, the hacker may have
left the software in an altered, "destroyed" state.
The answers to such questions remain to be
adequately determined.
only
made
a copy of
it
for
him
or herself? Is this a
different issue?
enough
to
be
in
addition
to
federal
laws,
space
Burglary
For most states, burglary is the unauthorized
breaking and entering of the real property of another with intent to commit a crime. Again there is
to accept
erty.
is
Larceny
locking
becomes
futile if there is
commit a crime.
your intentions
futile. It
may become
slightly less
a clear intent
that path.
more
on
as
many techni-
tutes "taking"
calities.
away
termittent code is
password
is
is
fraud, since
you are
falsely represent-
privileges
have received.
But to be convicted of fraud
all,
the in-
it
has
Fraud
Fraud
of property. After
still
on a computer,
trical
to stolen telephone service or elecpower. In these cases it would seem the law-
Theft
must be shown
had damage done to him or her. What happens in the case
where a computer manager knows it's a hacker on
the line, and yet the manager is unable to prevent
damage from occurring? Since there is no
deception, there is no fraud. That may be intent to
defraud, and perhaps not fraud itself.
situation in
Of Trade
it
Theft
of
trade
secrets
Secrets
may be
also
if
kind of property, or
its
own
called
con-
a trade seit
statute.
may
be
Misap-
two names, as
it
informa-
tion gained
ized to
if
do so.
law
statute, a
JLsM*=
can be shown that the hacker intended to permanently deprive the owner of his property. We both
know that computer hackers generally don't have
deprivation
any intention of
that, but we
know
just learning.
We
and juries
to
the system.
understand.
Finally, let's
end
this section
no
it is
on a good
note. If
can not be seriously considered as having taken place. Thus, hackers should
theft of trade secrets
files
Receipt
Interference
With Use
Statutes
Of Stolen Property
If
owner) then
to the property
it
is
said that an
As with trade secret theft, ROSP may be included in the larceny laws, or it may have its very
ishable, regardless of
parts: (1)
own
anti-tampering laws.
Even the
installation of a
this illegal
Laws
words, and
TRW
files. If
ROSP
to deal
with.
place
eral
ers,
laws which don't necessarily refer to computyet are acceptable for use in the prosecution
(persecution?) of
Of Services Or Labor
Under False Pretenses
Theft
only
when
the computers
government in
to abbreviate
Property!
Conspiracy
whereby you
trick
someone
into letting
you have
fact
with
Conspiracy (aka 18
bers) takes place
USC
#371,
when two
or
.,
This
means
that a
if
youVe
ever
............
that
Federal
Or:
ing
in.
you have,
let's
tenses,
when
and
2071 disallows the concealment, mutilation or removal of public records. All of which a computer
cracker is likely to do, if on a federal computer.
cally relate to
offense.
one's
believe, is that
One
title
that's
where the
comes from.
law
interesting
when you
realize
on the
it's
Makes you
beyond
my
no lawyer.
The Computer Security Act
then, I'm
Conclusion
I
was going
way
I've
manhandled these
really,
descrip-
why should I
apologize to lawyers?
we
Chapter Fourteen:
Hacker Security:
Hacking
also illegal,
just
In Researching
jobs.
There
Consequently, the prudent hacker has two
goals in mind while hacking. Number one: don't
get caught.
Number
two:
if
you do,
don't
make
it
true.
Hacking
about com-
all for
may be
local ordinances in
your area
-
iper Hacker
--
mssmrr-v "-^fiff>
--j
In Social Engineering
Some
social engineering
engi-
is
obviously
risky since you are giving out your address or telephone number to people whom you are about to
defraud. Hackers have utilized several ingenious
methods to overcome this problem.
Once I found a small business with a technicalsounding name that would be closed for a few
weeks over the summer. By doing some hacking,
some research, and rubbing my lucky rabbit's foot I
wag able to come up with the code that released
messages left on their answering machine. That
/gave ttie a way to have people contact me without
them knowing who I was.
I put up some phony advertising for a computer network, instructing people to call and leave
their name and vital data. I could call up the machine whenever I wanted, punch in the magic code
and listen to those messages. When the store reopened, I called them up, saying I was from the
phone company. I told the store owner that some
lines got crossed, so they might get some weird
calls.
Some hackers
to residential status
drop.
a cheaper solution.
He
in the
Dialing In
When you're new it may be okay to dial up remote computers from your house, but once you've
been around a while you'll never know if your
phone is being tapped or your computer usage being monitored. So when you're past your hacking
childhood, make sure to never make an illicit call
from your own house, or from any number that can
be traced to you.
Even when you are new to hacking, you could
be in trouble. Imagine if you become a regular on
the TECHRIME-USA BBS, right about the time an
FBI officer is planning to bust the sysops for conducting illegal business on their board! You don't
want to get involved with that, especially if you
haven't done anything illegal. Even scarier than
that are semi-reliable
it
phone."
Nelson
Rockefeller
cir-
someplace
dems
many
"If
happens to be unlocked,
bicle and chug away.
little
had
their
windows open.
noticed
Every of-
as
and
kill
and
work
things)
to a
and
doors down from a bustling police station
being
wiser.
with no one
the
If you have money laying around, or if you
have a hacking expense account, you can always
hole up in a hotel or motel to do your hacking.
The money problem is one which gets to hack-
phone numbers of some local pay phones, and deactivate their need for coins. You then use the pay
phones to call or hack any place in the world.
which, as far as is
Or you can use a MIZAR
known, does not keep records of its activities, unlike
COSMOS
sent
phone number
ers in other
the
is
something which
all
I want to make the point that dialing in to a remote computer is not as safe as it feels. Communi-
at
hacking and
happen
to you.
Remember to always
follow
Many
tricate
functions,
Once
the
phone
line leaves
your house
it
goes
home
already
but
then, so
easily
hacked
still
really isn't
into
may be
how
Time how long you're on the phone with a maA phone trace is instantaneous if you're local, and takes just a half a tweak longer if you're
calling from far away. But it's still not wise to stay
on a single line half the day. Move around a lot,
calling from different phone numbers, to different
chine.
iSKHRHHmmm-
access numbers. If
lines,
dial-in
and green wires from your motwo silver mouthpiece contacts in-
dem wire
to the
a poor signal, so
Laptop Hints
if
actual telephone
who-knows-where
on your portable laptop, here are some suggestions
to help you get connected.
When in unfamiliar domain, such as an office,
Since you'll be calling from
schoolroom
your
laptop is of infinite
as you can get
it to work. Never plug your modem into an unfamiliar phone setup until you've verified that doing
so won't burn out your equipment. Many offices
have installed their own electronic phone systems,
called PBXs, to facilitate special functions such as
in-house dialing and phone menus, or to block
certain phones from making long distance calls.
hotel,
Some
telephone's transformer.
of these
on your cheap
test
If
you
To
that
it's
the
PBX
into the
to the
modem
One
Alternatively, devices
dem
Wire
cutters,
screwdrivers,
and assorted
coil
(you
cases,
other end.
correct the
modem
get a
system at fault.
this,
stuff
motels,
with
sure
line voltages.
works, your
PBX-networked
value so long
your
clip
call.
first. If it
and
dem wires to the red and green cable leads from the
System Tiptoeing
Even the best intentioned, the most honorable
and nondestructive of hackers are thought of as evil
by the managerial population. This means that if
you're caught breaking into computers that don't
belong to you, expect some trouble. Even if the
hacking you were doing is completely benign you
are likely to be punished in some way. I've seen reports that estimate the cost of computer crime per
and that's
is $3 billion to $5 billion dollars
on the low end. Other sources list figures as high as
year
$100 billion.
Even the $3
billion
figure,
to
me, seems
realize that
who
they
believe
likely to
is
contributing
that
to
that hospital
was
in fact,
it
swered:
"Greenwood,
"Yes, please,"
said, "Is
Tom there?"
"Who?"
earlier...
"Nope. Lee
left at five."
"Bye-bye."
Welcome to GFH-NET!
300-2400 baud
(123)456-7890
IS
CORNWALL
MAINTAINED BY ROGER
AND
HAROLD LIPNICK
QUESTIONS OR COMMENTS? E-MAIL TO
THEM!!!
to do with hospital billing, paanything else pertaining to the actual running of the place. Mostly it was like a doctor BBS. From what I could make of it, it was medical students discussing problems with the doctors
all. It
had nothing
tient records, or
time in years,
logon screen awaiting me:
rally,
into.
that
welcoming
screen.
Guess
not too hard to figure out what I did! Natutyped in ROGER CORNWALL for my
TO AUTHORIZED PERSONNEL
ONLY!
-^ ^
. .
. .' L
JL-. f
'
'
'
rnriTnrTnTiTr-f
was gone!
tem
operator,
and
that
everything there
prompt.
back again.
Incidentally, Roger and Harold had gotten
smart in some respects, but remained dumb in others. Through continued perseverance I was able to
never going to
tried
some
of the old
names
I'd
figured out
get onto
is to
call
doctors
had been
two years
her reply:
month a
Last
friend of
mine was
in the hospi-
tal,
up in my
book and I was surprised I still had it. I knew
the name of my friend's doctor, and when I
was there visiting him, I got the names of lots
years ago or something, so
looked
it
8:00, 1 finally
got on.
One
of the doctor's
thing
tried
much else
either... after
giving
my name
before.
"Sincerely, Polly
Wanza
Hacker." Then
called
"THANX POLLY!
SIGNED
R.C.
& H.L."
smart?
you're there,
rung.
didn't
smart,
and because of
was
it,
just
their arrival to
You
you
will
considerably.
On GFH-NET,
the sysops
like
to start
If
you
any way
you do show
yourself in
don't
want
like
by a
password
least.
Concerned
might otherwise
Alternately,
certain system,
facilitate entry.
if
up
to
no good no matter
crime.
by entering words
like
"DEATH"
what.
BBS Protection
This section deals with the
two
issues of secu-
several existing
members can
BWKWA-.W-WOWM
you
aren't
even
legal
if
il-
the
to find these
darlings staring
little
& BBS's
Message:
General Information
41
Title:
To:
From:
ALL
HIGH TECH
hoods.
Posted:
Greetings:
BBS,
tell
false-
Board:
If
crackers)
one logged
in:
are
operated
beauty of
E-Mail and
this is
we have
and Canada,
regular users,
among
Tech,
When
will
weeks.
directly, talking
curity agents
It
worthless, but
help.
around anyway
Many
tion:
^^^^^^
/om
to
throw them
my
next sugges-
which hackers
Mike WendHand
The I-team
is,
WDIV, Detroit, ML
Message:
General Information
42
Title:
BOARDSCAN
Board:
& BBS's
From:
ALL
THE REAPER
Posted:
To:
This
is
puter or
Please address
land at
all letter
WDIV-TV
bombs
Detroit.
to
idea.
way
to let the
Is
(a.k.a.
Cable Pair)
hackers
YOU
ter
are not
knew enough
the people
all
who
will
who come
be coming
The
The newuser password to
Pair.
af-
like
way we
the
and
it
means you
and
Now
let's
talk
ment rights.
We do have the
about exercising
right to
First
Amend-
own
BBS, and
a hacker board,
rim our
that information
feel
may
The Reaper
members
on
It is
computer system
is being prepared for public dissemination and
is therefore "work product material" protected
under The First Amendment Privacy Protection Act of 1980 (USC 42, Section 2000aa).
of the material
this
by law enforcement
In addition, there
storage
fined
on
this
by the
Electronic
Communication
Pri-
ECPA
such
without warrants
by government
as seizure
sue YOU.
to
it
to
illegal activities
tor of this
my
attention
if
you discover
cura-
life
and
detective
fiction,
the
real
others to find
notice
inconspicuous.
155
Security Logs
handcuffs.
easy to get manufacturers of security products to mail you everything you would ever want
to know about the things they sell. Here I am concerned mostly with software which quietly monitors the activity on a system, audits the system reIt is
new one
cious. Instead,
tried a
was
in that
asked
it
first login.
me
to
After doing
word-changing
command
to
go back
to the Social
that
is
and
irregularities,
and keeps a
Suddenly you're in
an unsafe position, and you never even knew it
Better
him..."
was coming.
From your
to hack,
you
will
know which
se-
you'll
know what
silent
against.
if
will alert administrators to any patwhich you create. Well, you're not going to
create any patterns, but you're probably going to
create some problems, and those too, will show up
on the security log's report.
attended to
terns
American vernacular, thus implying that he was in fact American (i.e., a spy from a
Third World country probably wouldn't use the
password "RENANDSTIMPY").
often identifiable
you plan
It is
to stay
position to
do these
sorts of things,
you most
likely
may
com-
'
'
'
'
mand
to control
how
your behavior.
'
'
'
--!>"ysi'A,-
,yi
'
:!:'V>:<
-!i
'
'
:ff:-3J
'
.........................
:" '
........
log printouts, he or she won't notice any questionable activity going on.
WARNING!
There have been many, many instances
of hackers carefully editing out personal
sections of audit records, only to find to
their horror that they've deleted more than
they should have. Or hackers who were
faying to be helpful by cleaning up a messy
program or fixing a typo in a memo, and
having some disaster occur. You know you
should always keep backups. The backup
rule applies every time you use a computer,
especially computers which aren't yours. If
you feel you must alter a file that doesn't
belong to you, alter a backup of that file.
When you're done, make certain your
changes are perfect, delete the original file
and then rename the backup.
One simple
task that
page
is
Once a deed
for
is
done,
my
it is
friend,
you are
trapped on that
life.
Of
if it's
no ink
car-
doing
all this
what equipment
medium, or
to
the re-
hacker
Any
business.
is
would
try
If
A more troublesome form of paper log is someby organizations to keep track of who
does what, when, and why. Some companies insist
times used
littlest
In Public
And On-Site
the ter-
Doing any
altering public access comput(PACs) or public access terminals (PATs), sabotaging for reverse social engineering (RSE), doing
in-person social engineering (SE), using a university's computing facilities, or simply doing research
public or on-site
ers
is riskier
And just
ber, that's
as a burglar
what happens
to regular users
is
they
forget
when
where
you're trespassing, or
fishy to a passer-by.
if
Make
sure
you dress
if all
What
if you still get caught? It's good to be prepared for such an emergency so if the feds do catch
up to you they at least won't have any evidence on
which to base a trial.
files
stored on
When
ille-
secrets.
belong, or parts of
your
disks.
It's
files
files to
which they
Any computer
stroy
file which you simply can't demust be encrypted and, ideally, hidden under
the part
to shoulder surfers,
and
before logging in
a simulation trap.
thing's
wrong.
It
It is
that computer
routine.
The truth is, a printout is just as valid as any other piece of written evidence, as long as it can be shown to have been
made at or near the time of the criminal act, or
during preparation for the act. If a Secret Service
"LOADING MENU"
meskeep all
my
ever do,
lummox who
gets to
how
if
know
has a warrant
for your arrest, he or she can legally steal all of your
computers and peripherals, blank disks and audio
cassettes, commercial software and documentation,
official
and operating logs, telephones and answering machines, any piece of electronic equipment as well as any papers indicating that you are
the owner or user of that equipment, wires and
printouts
loose parts,
model
magazines,
et cetera.
These things
if
any papers or evidence with which a connection may be made between that place or person and
the crime. They purposely write their warrants to
allow seizure of a wide range of items, and believe
seize
me
they
And
it.
any of
it
back in one
why, as
lying
around,
keep
them
"SCHOOL HOMEWORK"
or
in
folders
marked
"CHURCH GROUP".
file
contained on
it,
then
makes a printout
made
it
it
to the court
know how
(I
they can
le-
presume by bringing
on store-bought tapes
with legitimate
Beatles, Grateful
names
Dead,
would want to
own, including ones that look as harmless as rock
and roll.
As hackers, we do exchange information and
keep records on disk. So if you have a box of disks
containing all your hacker stuff, you can't simply
label the disks with names like "Space War" and
"Pac Man." They will suspect either that the disks
have been labeled misleadingly, or that the games
(Think of Steve Jackson.) Bewon't stop to sort seemingly
irrelevant belongings from the obviously illegal
ones. So you'll have to hide the disks themselves,
and hide them in a way that is unrelated to technology. The same goes for your other electronics
equipment, and anything else that might reasonably be stolen by the feds. For example, I keep my
I being
backup disks in a graham cracker box.
in a
store
my
laptop
I
paranoid? I don't think so.
themselves are
real.
Am
up
in the closet
it's
just as
i.rlackt
easy to keep
it
there as
You
ful
as helpful to
is just
through a shredder
mean
completely de-
wash away
do just
and the disks themselves chopped up. 2 These
items can be anonymously deposited in some pub-
lic
garbage can, or in the case of paper, a public reYou do this and you've just
.........I
because
than if you demolish what you hack
fewer agencies will be willing to pursue you.
Tiptoe.
all
act.
according to
Donn B.
list
things,
is
and so here
you do these
you see, there are five ways you, the hacker, can get
caught hacking:
1.
2.
3.
5.
by making a mistake, or
by being made (recognized).
You will get caught by phone
that he:
directory of messages;
it
the
you,
4.
was
all,
It is
Conclusion:
mistake.
backup copies of
all
puter failure.
line traces
and
As a
result,
much
of his corre-
You need
not paranoid enough for the US
Department of Defense, which according to Lance
Hoffman in his Modern Methods for Computer Security
and Privacy (Prentice-Hall, Inc., Englewood Cliffs, NJ:
1977) "feels that there are techniques for electronically
retrieving overwritten information and thus requires
destruction of the recording medium."
2 This behavior
is
to
ca-
name
Kobayashi, then proceeded to withdraw small amounts of cash from automatic teller
machines (ATMs) scattered around Japan. Each
false
time, after
S.
to
each of the bank's 348 ATMs, and when the kidnapper retrieved the money, he was caught.
Look out for the unexpected twists in your
plans, and remember that there probably are people on the other side trying to find ways to foil you.
Finally, you will get caught by being recognized. In public places, make sure you stay unobto
trusive.
to
NOT
get caught
an inactive
Part of your
is
to
way not to
NOT
die
is
computers
and the things you can do with computers. Without
hacking, all you have to do with computers is busito live
life.
little
life is
some programming.
hacking, you have instantaneous
control of the world. Enough said. May we all have
a good many peaceful, happy hacks!
possibly
But
WITH
Chapter 15:
Conclusion
The Hacker's
Ethic
much
gree to
like
The versions
which the
ethic is followed.
many hackers,
start
is
are all
the de-
Smart people,
the Ethic
get
They begin to get the feeling that because they know about the law, they have the
sidetracked.
authority to break
do
it:
they're smart,
and be-
illegal ac-
tivities.
What
I'm saying
is, I
you abide by
your hacker's
that code,
circle
and
it is
if all
you
known
members of
well
some
instances
it
may
"It's
especially
cussions of law,
many
At the very
least,
My Code Of Ethics
Computers have enabled a great deal of information to be available to anyone, and quicker and
cheaper than ever before. The free flow of informabut not when it violates human rights.
There are two kinds of human rights. There are
Never harm,
any way.
If damage has been done, do what is necessary to
correct that damage, and to prevent it from
know how
things work,
if
they
for use in
or
a hack.
rights
People should
alter
tion is good,
rights
it is
politeness.
am
ethical
you can
justify
file
Combining Principles
or
be
guaranteed that all makers and suppliers of databases will enable these rights to be granted, in a
is
what
and
in
situations these rights are currently acknowledged. However, most of these rights are almost
some
this
book
you
for
no one
timely fashion.
All of this
Throughout
one must
upon
a vari-
them when appropriand just hack away until something comes of it.
call
,-: .:
'v<:v-:-x-:;,-:->;v.-Xv:
how to react to
to
to expect
puting knowledge, social engineering, reverse social engineering, screen analysis, system simulators. It shows how each is played off the other for
the final triumphant result of a successful hack.
exit the
menu and
Recently
was given
function keys
my
hand at hacking into a newly set up computer system at a special library. The library director was
concerned because they had recently transferred to
new system which, unlike previous ones, allowed dial-up access from outside lines. The director wanted to know if it was possible to break out
this
ing to
matter.
Now, he
me
offered to give
numbers, but I
I was a hacker
was
to the director,
acting
museum
around that
and
yet,
that
he bemoaned the
when
spoke
incomprehensible
programmer's
environment.
Aha! This is what I needed! But when you're calling
in over the phone lines, you don't have access to the
function keys that are available on the computers in
the
company offices.
I
card.
out to be enough.
What was immediately apparent
was
had
the com-
that
mands were standard English words or abbreviations of words, like CAT or END. There were
two-letter commands and dot commands, too.
When you input a dot command you type a
period (.) followed by an alphanumeric command.
They are often used
where entering
the alphanumeric command by itself would be
in applications
let's
The three digits in parentheses changed depending on which part of the program I was using.
"(000)" presumably signified the opening screen,
where I was attempting to launch these unlisted
commands. If I tried the .HELP command at, let's
at the
Indeed, that
mand
character
sionally
you
will
Anyway, the
me
that press-
ing function key Fl was akin to the .QUIT command, and F2 was the .HELP command. Both
seemed promising
.QUIT because it might allow
me access to the nether regions, and .HELP because
since this was a newly set up system, help was very
likely not yet implemented
and might be one of
those functions which the director was complaining would crash the system if someone used it.
I was dialing in to the computer from the outside world, and there really isn't any way to
transmit a function key press through a modem
(function keys are not in the ASCII lineup), so I had
to hope that either .QUIT or .HELP would work. Of
course I had tried their undotted counterparts before to no avail, but maybe, just maybe, one of them
Nope!
.QUIT simply terminated my session and disconnected me. When I typed .HELP, the screen
cleared, and the following line was printed:
<EOF \txt\hlp\help000>
I
presumed
this
meant
that the
End Of
File
was temporarily
licked, I thought,
<
is
number
12. I
system
"\txt\hlp\help013."
wondered
if
book
the same format would
citation for
was no
such as ".HELP
99999" and ".HELP < 99999" but none of them were
valid either. Finally I gave ".HELP99999" one last
try and this time it worked! I guess I had made a
typo when I tried it the first time, perhaps inserting
a space between the "P" and the "9," or whatever.
The system crashed, and I found myself launched
into the programmer's debugging environment.
It was like a mini-editing system for the text
valid.
much
sure
that
receptionist informed
>
file
files.
this:
cause
was
was displayed which
number
files,
say, screen
me
No
good; the
number
He had not.
wanted
were
an outside hacker, unconnected with the company,
trying to get in; special favors were out of the quesBesides,
to
if I
know how
raised in Kentucky, so
That meant
engineering.
the
first
three digits
wrote up a program
and
it
it
was time
for
some
serious social
at the library
who
library director.
was
went back
was wondering if they had version 8 of the program? Naturally she didn't know, but I kindly explained to her that to find out she would have to
look for some disks with labels stuck to the front of
them....
me
that the
number
director's office,
and
Anyway,
it I
move around in
more importantly for my purposes
and
to exit
from it. (All the important commands were abstruse things like KLOO and EE61. This editor was
clearly a rush job, created by programmers, for pro-
grammers.)
I
knew
that worked.
tion.
told
apparently
brought to a second level of security
the circ/JSC was a general login combination that
Now
needed
Jane's password.
word
"minicirc,"
and then
"circ"
ish,
some more
gibberI
second circ
could be unencrypted to read 'JSC." If it
could, then I would be able to use the same procedure on the gibberish following "minicirc." This
tried analyzing the gibberish after the
to see
tactic
if it
was to no avail.
!
m^,...
...
ID code."
tered
it came from some fictitious repfrom the database company that had
to say that
it
ing*). I
resentative
supplied a phone
number
to call.
now
that
engineer-
The num-
password."
This was, I hoped, the last level of security. Yes
it was: a few moments later I was in the minicirc
briefed
called.
tual circulation
system
new
on how
We
set
When the
talked about
him some
names and
Many
etc.,
addresses.
welcome
From
came up
to the system...."
it
listing
receive
word
it.
sent
Part of the
which
send messages from
was possible to
and vice
who had
"minicirc,"
versa (otherwise,
able to use
written,
its file
and
had
being di-
company was
products this
when
offering at the
time.
one
features which,
to act
up
director did
make
some upcoming
the
call,
Morriskat
log
on...
"Perfect,"
usual
stuff. Circ.
JSC.
Are you
ourselves.
still
because every
every employee at the company
employee, whether they ever stepped into the
company library or not, had a record in the library's computer. We knew what materials they
had borrowed, their home and office phone numbers and addresses, and year of birth.
Exiting from this level to the network server
was simple to do, and from there we could login to
one of the host computers using the library director's name and his password "firebird."
As the coup de grace, and to prove conclusively
that I had done what I had set out to do, I used the
programmer's interactive debugger editor to alter
the library program's opening screen so that instead of giving an explanation of commands, it told
a dirty joke.
library di-
rector's directory
ken
in.
that
had bro-
file,
Principles
Combined
If
who
be a hack-of-all-trades.
not enough to be a spontaneous and
smooth-talking social engineer. It's not enough to
be a programming genius. It's not enough to have
the perseverance of a marathon runner. You must
It's
Did
when
file
carried
had done
that contained
I had found.
And, I should add, they have done so.
and
can
it,
it
in words.
and I can
feel
know
to this bull
is,
"What a
He
is
truly believes
and
error, practice
Some Thoughts
To The Concerned Administrator
this book because of your inlaw enforcement, security, or the mindset
of the computer delinquent, then you should have
by now learned dozens of ways the most seemingly
airtight of security systems can be broken and
penetrated. You should have, by now, made up a
comparable list of ways to protect against each of
the methods I've described.
Such a list should include stressing to your system's users the importance of keeping good passwords, regularly changing them, and taking note of
the login message which will display the user's last
login date, time and place.
If
terest in
this:
the answer
myself knowing
impossible."
the
is
sation
any information of a confidential or suspicious nature over the telephone, through the postal service
or electronic mail, or in "chat" mode. Tell your users
that if they are asked to reveal such things as passwords, they should simply respond, "I can not help
you with that," and end all communications. They
should not reveal name or phone number, e-mail
Concluding Thoughts
the existence of our universe
it.
But to
Set
up a means by which
.: :
-<.
Some Thoughts
situ-
offices
Don't
security,
If
ex-employee's account,
Numerous
your system.
little
its
this all
you
will
become
proficient in the
art.
If
haven't
or perhaps you
ber
can
still
After
all,
that's
now you
_J
Further Reading
What
that
means
is, if
intellectual ex-
you want
to continue
nation's
and users.
If you expect
systems
must be intimately
highly
recommend
your own
in the world
at least for
Publishers.
New
it
Fast:
how
subject.
uncover expert
Harper and
Row
many
books of this kind; if you can't find this particular one, it might be helpful to see if you can locate others. Berkman lists some good phone
may
extracting
not
all
be
it
ham
It
for
you out.
and
is
tips
and
The Books
his
Farr, Robert.
Book Company.
Forester,
MTT
Press.
and ethics.
That's
Glossbrenner, Alfred.
Martin's Press.
How
phone numbers
useful
to
New York:
Look
it
Up
Online. St.
1987. Includes
(voice
many
and modem),
how
ex-
and
books are
being whatever
he
is
Check out
Hafher, Katie
New
and hackand
your favorite hack targets. Possibly more important than all that is to see how these master
hackers got caught, so you can do just the opposite of what they did.
Landreth,
Bill.
Press.
New
Out of
it.
Sterling,
Bruce.
New
homages
herein.
Much ado
Bantam Books.
of history and
about
many
topics
Stoll, Clifford.
An instant classic,
read
it.
Donn
portantly,
will
B.
it.
it is
essential for
you
to learn
Other Sources
Bill
resource manual.
against
Landreth uses his expertise to show system operators and computer managers how they can
prevent their security from being breached. Because Landreth has had actual hacking experience, this book is more useful to the hacker than
other books of its kind. Includes some interesting anecdotes and useful information.
you
is
Parker,
book
good writer.
Schuster.
how
Keep up
numbers
. ,,
., .,. . ,n
,
,.,
i.
,
for products
.^
.i
--
.^....,,.i w..
.
which
! ;.
... |
. ..
ll
.
,. |, I
T.
i
., ... ...
y. ., - ,..,
..-..i
me. I get
of different companies, as
interest
When I fill in my
I put myself down as president
name and
of
address,
are usually
title
and
which
entitles
me
journal! (Note:
to the subscription
You
steal
a subscription,
is
there?
dope on the
They are
all free,
and
legally free.
Certain nefarious
If
such as down-to-earth retellings of technical articles. But I have come across useful stuff in these
things. In the very least, reading these journals
makes you feel good, because you'll end up thinking to yourself, "Gosh, these so-called hackers don't
know much more than I do."
And it's true. You can know a lot about computers; you can learn a lot about hacking, but ultimately, the greatest hackers are the ones who are
most dedicated to what they set out to do. There are
no algorithms
to follow to
become a good
hacker.
M^.^Mt-r r.^.^w.mmKlKTO
|.
x*xwwwx^>*&.-rAW.vmaxwx';'X.w?*i
Glossary
acoustic coupler
A device
mounted on a
consisting of
two cups
telephone handset.
connected to
directly through the mouthpiece of the phone,
and receives signals through the earpiece.
Useful for hacking on-the-run, such as from
telephone booths and public fax machines.
amplifier
A device
quality.
analog signal
An output that changes in
proportion with changes in the input producing
program
The
that
is
not
A word processor
short.
archive
Several
files
file.
This
is
and downloading
files
to other sites.
asynchronous
it.
Any software
done
anonymous FTP
application
doing so
gets
if
the
changed
to "accept
by another
command
proc-
will exe-
cute.
avatar
browsing
To ferret out data that has been left
behind in computer memory or on storage
media after the termination of a critical pro-
gram or process.
name
Alternative
for
the
root
or
bps
back door
baud
bit
byte
of
digit,
bits.
least a
chat
A network
mail and
have the
and
file
BITNET
Bulletin
to receive
It
do remote login
(telnet
Board System.
A computer set up
Term used
BBS
cir-
many
connects
colleges together.
ability
To
CCTV
Closed
cameras
set
up
Circuit
Security
and
else-
discs the
way
text files.
Chief Information
console On a mainframe, the
CIO
circa
Television.
in office buildings
CD-ROM
World War
II
to refer
along
its
sessions).
boffin
that,
cles,
computers.
universities
a small amount
is
inC.
understand.
BBS
enough
frame
just
or other character.
BITNET
Informally, a byte
memory,
The
that
is
for trapdoor.
excess data
giving
Pulses
sumption
BIOS
when
sites.
Synonym
buffer overflow
buffer is a (usually temporary) holding area for data. Overflow happens
backbone site
Key USENET and e-mail site
which processes a large amount of third-party
traffic. That is, it receives and sends news and
messages to other
Short
Officer.
station
which the
console
PBX
and ctty.
Desktop switching
service.
.uujj.uiu.uiuuuij.ua
covert channel
A way
to secretly
communicate
cracker
Console
daemon Short
cty
directions.
(Also
ctty).
Two
make a duplex
is
DES
as email.
firewall
machine
An
Encryption Standard.
standard
electrical circuit
Apple
II series.
MS-DOS
Also
A device
smart terminal.
Management
A set of protocols by
communications.
group accounts
terminal
get
or PC-
DOS.
dumb
FTS
FOIM
FTP
Data
usable information.
Similar to a
two
demon.
in
e-mail Short
protect the
demon
communication
if one of the telephones has its mouthpiece broken off, it becomes a simplex system.
EDP
tty.
Also,
Simultaneous
duplex
single
computer directory or
hacker
Time for a pop quiz! Read this book, then
use your own judgment to compose a definition
for the word.
handle
An assumed name; an
alias.
Often used
on BBSs.
handshaking
The process or activity by which
two separate pieces of hardware coordinate
their signals so that they can work together,
usually to send messages between them. When
you call another computer on your modem, the
two modems must handshake to synchronize
the
LAN
A smart
Aclist
interoffice telephone
call
A telephone not
limited-use passwords
certain date.
line
Listserv
A program
like
slowing
live data
in a data
circumstances,
file
gets
which, under
interpreted
as
On
the
Apple He
it is
the
so that
the
program the A D
Any
will be printed
on the
DOS command
ISIS
executed.
screen column.
that does
first
nothing, but
stantly.
Joe
Information
certain
read, or
down
on many BITNET
destinations.
restrictive or
something simple
system to a crawl.
available
files to
from a telephone
able to
A passwording system
box
Perhaps not too accurate a name, since
any hacker falling into a literal iron box would
certainly know about it! An iron box is a
iron
called
Might also be
system.
recipient's
nastygram.
Internet
is,
letterbomb
A piece of e-mail that contains live
data, with the purpose of causing harm to the
of
that is
terminal.
interactive question
cess control
their responses.
intelligent terminal
modern world."
password
log
A record kept
of computer activity;
may be
want
to
of signals.
NCIC
To gain
bomb
piece of code in an
with TECS
the computer system of the
Treasury Department
as well as many state
persons,
A subversive
application
program
specific conditions
that is executed
hold
true.
THEN
all
macro
account
is
instruct
logic
bomb
deleted
net
payroll
is
Short form
words
is
linked
the Internet.
Two
or
newsgroup
name
NCIC
also
network
short
arrest records.
insert a
A keystroke or
and
computers.
lounging
when
disgruntled
by
and password.
logic
of different modulating
The use
multiplexing
that
is
used to
section of
modulation
A process
signal (wave)
carrier
wave.
node
An individual machine (such as a
computer or printer) that is connected to other
machines in a network.
OCIS
of loading a voice or other
When
modem
modulates your
tion collected.
once-only codes
A password that can only be
used for one access.
telephone transmits.
modem
MOdulator-DEModulator. A device
that
MS-DOS
Generic version
PC-DOS, operating
runs on IBM PCs, clones
of
and compatibles.
MULTICS
Short
and Computing
for
MULTiplexed Information
Service.
An
antique operating
operating system
(Abbreviated OS). The control
program of the computer which oversees how
the system interfaces with the user and
peripherals. Examples: DOS, MULTICS, MS-
Operating System.
PAD Packet Assembler/Disassembler.
PABX
Automatic Branch eXchange. A
OS
Private
packet assembler/disassembler
One of the node
computers of a public data network.
packet switching
method of transmitting data
along computers in a network. Each intermittent computer is a PAD that receives
chunks of data (128 bits long, following the X.25
standard) and routes them onward along a path
to the receiving computer.
A program
parser
text
and
tries to
MS-DOS
is
erase the
called "filename."
to
do
A parser in an
game
adventure
"Walk
file
to the
was a
interpret the
word
"it"
passive computing
pass phrase
precautions
usually not
bill.
Phreaking
used
it is
unto itself.
It has its own set of rules and jargon, and even a
knowledgeable hacker who stumbles upon a
phreak BBS is likely to be confused by the
discussion. As they say, it's good to know a
foreign language. For hackers, that language is
phreak.
piggybacking
IBM
for
and usually by
doesn't
the
that
realize
when
first
PLE
plaintext
telephones
houses or
usually
offices,
in
file)
that
local
network of
separate
buildings,
phone company.
switchboard.
user's call,
is
munication.
PC-DOS
is
the computer
Short
specific pieces of
syllables
PBX
words or
characters
PAX
password.
series of
A word,
password
phreak
post
To publish a
letter, article,
file
essay, story,
or whatever
electronically,
but usually a letter or article
by sending it to the public message area of a
BBS or newsgroup.
PPN
PPN
to refer to a user's
AWm MmAWJMJAWmmmmmmW^
'
ID number.
PPN may
at times
be applied to
other systems.
that are
root
inside a building
phone
to
directory
It is
or,
tree.
in pro-
For hacking
access to a system.
An
PRIME
salami technique
A program
stuns of
that a
computer
is
currently
running.
A method used
money over
command
A command
to the operating
to steal large
process
structure,
computers.
process
The superuser
hierarchical
company lines.
PRIMOS
confidential data.
when
is
reprogrammed so that
an account
on is doing.
account.
'
protocol
set of rules
used by software
to in-
modems
protocol, else
will
must follow
same
communication between them
connect), they
scavenging
still
useful, informa-
the
script
A command
file
be impossible.
bins in
by the
caller's
A network, such
as Telenet
or Tymnet, that uses packet switching to connect computers; generally follows an interna-
pulse
A momentary flow
ized
pulse frequency
receive
of current, character-
fall.
second.
of
that
generator,
hook
up
to the telephone,
and
whereby the
system user contacts the hacker for advice, and
Tactic
Here is a pre-login
message that exemplifies the opposite of security through obscurity: "Thanks for calling Hey
There Travel Agency Network. Please enter
your five character password in the form ABC12 where ABC stands for uppercase letters and
12 stands for digits. If you need help, call
sequential order.
bit at a time in
shell
An
interface or
command
interpreter be-
user
is
simplex
One-way communications. (Compare
with duplex.)
simulation
A program
set
up by a hacker
that
puter
erwise a computer in
that has
graphics,
or
is
memory,
computational
somehow
its
the
engineering
use
lies,
deceit,
play
The
list
make up
program. This
list is
a computer
device,
since
an
commands which
acfile
are run as a
takes
Pronounced
of instructions that a
that
equipment.
a com-
"sis-op" or "sy-zop."
and sometimes as
Often written
"sys-op" though
programmer types in
stand-alone
is
when
logs into
as "SysOp",
tem.
source code
when one
sysadmin
SYStem ADMINistrator. The overseer
of a computer or network.
sysop
To
that is executed
login").
an intelligent terminal.
acting
file
booted, or
oth-
social
is
batch.
A terminal
commands,
editing
containing shell
as login screens.
is altering.
switch
To make a connection; or a system of
connecting pairs of telephone lines. In surveillance, the redirection of output of two or more
cameras to the available viewing monitors.
startup file
smart terminal
superzap
To use special debugging or computer
maintenance software tools to modify data.
Usually to do so constitutes a security breach,
or in the very least, violates the intended usage
terminal
it
is
not a stand-alone
must be connected
to
A Macintosh is a stand-
alone device.
is
talk
mode
To engage
in on-line conversation
TAP
this is
more
set of
to access one
machine through another. There are two types
of programs used to do this. One, called telnet,
telnet
establishes a
terminal
Usually
refers to a
dumb
terminal. In
it is
vice (a monitor
TG Technical Guide.
team
A hacker or group of hackers who are
engaged by an organization to find the security
flaws in that organization's computer system.
tiger
A device which
two
coupling
components
an
and a telephone keypad with
tone generator
includes
acoustic
exterior
device
interior
that
electronics
generate
tones
needed
to
An
trapdoor
access to a
areas of a system.
A different kind
may be unintentional;
of trapdoor
encryption procedure that allows one to determine the plaintext without knowing the key.
An
investigator's use of
system logs
To scavenge through
Trojan horse
application
program
that performs
some
USENET
an
of other computers
TSR program
the sun.
network or system
is
it
vandal
A cracker, and probably a not-too-talented one, who tries to delete files, crash systems, leave nasty messages everywhere and
generally is a big pain in the ass.
A worm implemented
VMB Voice
as a Trojan horse
bomb.
is
a comput-
Virtual
in-
Memory
system used on
VAX
DEC.
WAN Wide
Area Network.
network where
put into
A huge
secret
list
UNIX
VMS
trusted hosts
it is
erized
action.
require
virus
the garbage of a
memory and
WAN
via
LAN.
Warez dOOd
silly
name
for
people
who
Warez dOOd =
trade
(Soft)
wares dude.
which allows
interstate)
worm
reproduce.
into
Service.
presents
A worm
itself.
1l
mjf-
Lf
C^'.X
L %JL JL Km %Z %9
Appendix A:
Explanation Of
you
"ENQ,"
"SI"
listed
cryptic
codes like
and "DC1."
it is
No
NUL1
extra spaces
on disk/tape when
time
in
filling in
there
is
no
data.
the
NUL
not.
is
SOH
Start
Of Heading
which contains
STX
Start of
TeXt
ETX
End of TeXt
Indicates the
end of the
text that
STX
started.
happening when in
EOT
End Of Transmission
last
text
indicate the
UNIX
to
14
SO
Shift
Out
which
ENQ
ENQuiry
A request for a response from the other end.
can be used as a
"Who
station to identify
itself.
15 SI
Shift In
which follow
to
ACK
an SI is reached. (Control-N)
It
ACKnowledge
Used
16
as a positive response
attention;
may
devices. (Control-G)
Back Space
Indicates
the
17
18
19
20
movement
of
the
printing
HT
Horizontal Tabulation
print
Device Controls
Characters for the control of ancillary devices or
to
DC3
features.
(Control-S)
21
mechanism
terminal
DC1 (Control-Q)
DC4 is Control-T.
(Control-H)
Moves cursor or
DC1
DC2
DC3
DC4
special
a control
is
is
BS
Data-Link Escape
an ENQ. (Control-F)
BEL
BEL1
Used when there
DLE
NAK
given.
is
DC2
is
Control-R.
Negative AcKnowledgment
next
A NAK
"Whafd ya say?
didn't
quite
catch
it."
(Control-U)
10 LF
Move
Line Feed
printing
start of
next
to
22
SYN
Used
line. (Control-J)
SYNchronous/idle
in synchronous transmission systems to
achieve synchronization.
11
VT
Print
Vertical Tabulation
sent,
send
to next
synchronous
(Control-V)
23
Form Feed
printing
mechanism or cursor to starting
Moves
12 FF
13
ETB
Indicates
the
end
of
data
block
for
CR
Moves
Carriage Return
to starting position of
24
same
line.
Often
CAN
CANcel
command.
(Control-X)
__
25
EM
End of Medium
Indicates physical
end of a
SUB
of
SUBstitute
or
27
invalid.
Sometimes
command.
(Control-Z)
ESC
ESCape
used
as
break
by giving alternate
(usually control)
meaning
to
28 FS File Separator
29 GS Group Separator
30 RS Record Separator
31 US Unit Separator
Information separators may be used in an optional
manner except that their hierarchy is FS (most
inclusive) to
US (least inclusive).
32 SP SPacebar
127DEL
DELete
^^^^^^^^^mt^^^m^'^^^^^^^^^^^^
Appendix
6:
Common Defaults
demo
use
demonstration
introduction
enter
new
newuser
z
sysop
manager
password
instructions
name
test
sys
system systest
field
temp
instr
passwd
pswrd
startup
id
slash in front of
tty
root
go
train
separating
trainer
tempy
training info
testing
mini
hello
techsupport
remembered
etc.), and
repeated letters
if a password can be up to eight
characters, try "XXXXXXXX," and other things like
it.
capitalization
Also
numbers
(i.e.,
"NewUser," "newUser,"
etc.).
easily
digits, asterisks
characters,
and plain
start
account
visitor
su
default
anonymous
user
visit
intro
supruser
superuser
'n
Credit Bureaus
TRW uses a password of the form:
"LLLNNNNNNNLNL"
where L is a letter of the alphabet, and N is a digit.
Note that the actual password does not have spaces
between each letter and number.
NOS
"NNNLLNNN-??"
PRIMOS
Again, the
the Ls are
letters.
wild character.
DEC-10
UIC
Passwords:
UNIX
syslib, operator,
manager
2,7
maintain
5,30
games
ftp,
anonymous
VM/CMS
Accoimts or passwords: autologl, autolog, cms,
FTP
cmsbatch,
erep,
maintain,
maint,
operatns,
VMS
HP-xOOO (MPS OS)
Login using "Hello [Job ID],[Username][User
Password].[Account Name],[Group Name][Group
Password]"
Accounts:
Mgr.Telesup,hp3
Mgr.Telesup,hponly
Mgr.Telesup,pub
Mgr.Hpoffice,pub
Mgr.Rje,Pub
Manager.itf3000,pub
Field.support,pub
(password:
fid,
field)
Mail.telesup,pub
(password:
mail)
Mgr.rje
Field.hppl87
Field.hppl89
Field.hppl96
Field.support,pub
Hpoffice,pub
IRIS
Account names or passwords: manager, boss,
software, demo, PDP8, PDP11, accounting
Libraries
catalog,
file,
minicirc
Appendix C:
Common Commands
security interests,
many
you
command
have to try
you can think of
will
one types
Unless
something
the
(like
"/login."
system
specifically
asks
for
date
list
log
man
page
open
time
load
login
trace
dir
info
net
call
begin
sys
go
connect public
show
state
logon
1
phone(s) help
control
tele
buy
show
bye
shell
menu
sell
hint
quit
demo
access
demo
start
intro
exit
run
sched
who
whois
end
on
games
calendar
link
Appendix D:
want to try.
In addition to these words,
try
easily typed
on a
more appropriate.
Two lists of words are given. The first is my
own. The second, written by Robert Morris Jr., was
used by the worm program that blazed through the
Internet in 1988. Many of the words he used seem
oddly chosen and superfluous, and there are many
others which I can't understand why he did not
include.
reasons.
have
it
listed
also think
it's
interesting to see
how
My List:
account
adventure
aid
birthday
disk
black
blue
diskette
dollar
dumb
book/s
bowling
earth
brain
eat
ass
breast
fish
asshole
car/s
force
bach
bard
Christmas
code
barf
comp
cow
Friday
fuck
fucku
aids
alpha
angel
baseball
basic
basketball
bboard
bbs
crazy
cunt
darkstar
fuckyou
games
go
god
dead
golf
beam
death
ham
beta
dick
happy
big
disc
hell
hi
nazi
strike
atmosphere
clusters
establish
hitler
no
striker
aztecs
coffee
estate
hockey
o.k.
stupid
coke
euclid
home
okay
open
suck
azure
bacchus
collins
evelyn
sun
bailey
commrades
extension
oreo
overload
sunshine
banana
superbowl
bandit
computer
condo
felicia
superman
banks
cookie
system
barber
baritone
cooper
fender
fermat
Cornelius
fidelity
hope
horses
hump
identify
pass
penis
Pepsi
play
in
please
id
ident
identify
talk
fairway
television
bass
couscous
finite
tennis
bassoon
creation
fishers
terminal
batman
creosote
flakes
keyboard
printer
test
beater
cretin
float
kiU
pswd
tester
beauty
beethoven
beloved
benz
beowulf
daemon
flower
dancer
flowers
daniel
foolproof
danny
football
dave
december
foresight
intro
king
qwerty
kiss
radar
later
radio
thanks
thunder
thunderbolt
life
real
tiger
lion
red
tincan
berkeley
little
rex
tits
berliner
login
run
tv
beryl
logon
Saturday
beverly
love
sex
fyger
universe
bicameral
defoe
deluge
desperate
develop
frighten
format
forsythe
fourier
fred
friend
manager
shit
user
bob
dieter
marijuana
skull
brenda
digital
fun
me
smart
vagina
white
brian
fungible
mensa
Mickey
mine
snoopy
who
bridget
discovery
disney
soccer
word
world
broadway
bumbling
dog
space
spacebar
drought
gardner
garfield
duncan
fauss
modem
gabriel
Monday
money
moon
starlight
you
burgess
campanile
eager
george
stars
zoo
cantor
easier
gertrude
cardinal
ginger
mouse
startup
carmen
edges
edinburgh
stop
Carolina
gnu
castle
edwin
edwina
egghead
eiderdown
cat
eileen
gosling
cayuga
einstein
gouge
Celtics
elephant
music
yes
start
Caroline
cascades
Morris's List:
answer
aaa
academia
algebra
aliases
anthropoge
aerobics
alphabet
anvils
airplane
ama
anything
albany
amorphous
aria
albatross
analog
anchor
ariadne
albert
arrow
alex
andromache
arthur
alexander
animals
athena
glacier
golpher
gorgeous
gorges
cerulean
elizabeth
graham
gryphon
change
ellen
guest
charles
emerald
engine
guitar
gumption
charming
charon
engineer
guntis
Chester
enterprise
cigar
enzyme
classic
ersatz
hacker
hamlet
handily
happening
patricia
sal
target
harmony
lynne
macintosh
peoria
mack
penguin
saxon
scamper
tarragon
harold
harvey
maggot
malcolm
mark
markus
persona
scheme
percolate
scott
persimmon
scotty
telephone
temptation
thailand
pete
secret
tiger
marty
marvin
peter
sensor
toggle
phoenix
serenity
philip
sharks
tomato
topography
pierre
sharon
tortoise
pizza
plover
Sheffield
toyota
sheldon
trails
plymouth
shiva
trivial
shivers
trombone
shuttle
tubas
signature
tuttle
hebrides
heinlein
hello
help
herbert
taylor
imperial
master
maurice
mellon
merlin
mets
michael
include
michelle
ingres
mike
polynomial
pondering
pork
inna
innocuous
irishman
minimum
poster
simon
minsky
moguls
moose
morley
mozart
nancy
praise
simple
umesh
unhappy
precious
singer
unicorn
prelude
single
unknown
prince
smile
urchin
princeton
smiles
utility
hibernia
honey
horus
hutchins
imbroglio
isis
japan
Jessica
protect
smooch
vacant
protozoa
smother
vertigo
johnny
napoleon
nepenthe
pumpkin
snatch
vicky
Joseph
joshua
ness
puneet
puppet
snoopy
village
network
soap
Virginia
judith
newton
rabbit
socrates
juggle
next
sossina
julia
nic
sparrows
warren
weenie
whatnot
kathleen
noxious
rachmaninoff
rainbox
raindrop
spit
whiting
kermit
nutrition
raleigh
spring
whitney
random
jester
jixian
kernel
nyquist
springer
will
kirkland
oceanography rascal
squires
knight
ocelot
really
strangle
william
Williamsburg
ladle
olivetti
rebecca
Stratford
willie
lambda
olivia
remote
Stuttgart
lamination
oracle
rick
subway
winston
Wisconsin
wizard
larkin
orca
ripple
success
larry
orwell
robotics
summer
lazarus
osiris
rochester
lebesgue
outlaw
rolex
lee
oxford
romano
leland
pacific
ronald
super
superstage
support
supported
leroy
painless
surfer
wombat
woodwind
wormwood
yaco
yang
lewis
pakistan
rosebud
rosemary
suzanne
yellowstone
yosemite
light
pam
roses
swearer
zap
lisa
papers
ruben
symmetry
Zimmerman
louis
password
rules
tangerine
.v- .-v: :
:
;:;-..
---..--..........^
Appendix E:
Job-Related
memo
spread
info
work
spread-
sheets
wp
comp
job
office
word
file
doc
paper/s
file/s
busy
notes
report/s
sheet/s
type
docu-
ments
enter
dbase
printer
database print
journal
process
desk
desktop
write
folders
secretary
terminal
news
processor
text
txt
data
compute] term
letter/s
mailing
business docs
read
stuff
project
labor
public
Word List
week
day
phone/s
lotus
123
disk
disc
level
service
admin
pc
net
network protect
safe
boss
software
IBM
account-
Friday
ing
Monday book/s
writer
begin
secretery
margin
list
field
record
check
sec
pres
manage
table
clock
Appendix F:
Technical
just
people
like
you
they're
Word List
bboard
chomp
erotics
beam
beamup
Christmas
expert
cluster
external
berserk/er
connect
biff
cowboy
female
foobar
bilbo
crack/er
fractal
blast
crunchy
freq
board
crusher
bogon
frequency
frodo
bomb
data
date
bones
dbms
frontier
bridge
broadcast
demigod
function
demo
gene
buzz
devil
generation
atheist
cable
diana
genius
attack
cage
captain
digital
g
god
Star Trek
is
fronteir
absolut
ambassador
anarchism
anarchy
avatar
absolute
analog
baggins
central
director
band
bandwidth
bang
chang
dos
channel
chaos
dump
barf
chen
ebdic
group
baud
chess
enterprise
hack/er
chief
enterprize
ham
choke
erotica
hamradio
abort
abortion
access
application
address
arc
ai
archive
algorithm
alias
alpha
ascii
async
atheism
bbaggins
dipole
dvorak
green
grep
grok
gronk
hobbit
oscillator
szone
home
tasha
host
output
overheat
overload
technical
hotkey
picard
technician
horizontal
tech
human
piggy
test
index
input
power
time
tng
iris
primos
procedure
prodigy
isis
jip
pres
transport
transporter
travel
kermit
king
protocol
trek
quartz
treker
kirk
quattro
trekie
klingon
Ian
query
trekker
quit
trekkie
lang
qwerty
trekky
language
radio
tribble/s
laser
random
troy
lee
ravel
tsupport
lord
register
tyar
male
riker
man
robot
unix
var
mark
mask
romulan
romulon
romulun
variable
rtty
virus
master
matrix
vax
vector
memory
ryker
vms
mensa
scotty
vulcan
menu
scraft
modal
shuttle
wan
wang
mode
shuttlecraft
warf
model
skip
warp
modem
wc
msdos
skipzone
space
speed
spock
nc-101
star
net.god
stars
worm
xmodem
network
startrek
xterm
next
sting
nil
strek
ymodem
zmodem
nill
sttng
nim
su
node
sundevil
super
superuser
support
swl
synch
modulate
moon
null
object
ohm
oop
operation
wheel
wizard
worf
yar
zero
zoo
Appendix G:
Social Security Number Listing
Social
Security
again!)
who
who work
once worked in
in this
country and
have since retired to live outside the US.
Except for a few numbers issued in the
mid-1970s to military recruits, all Social Security
numbers contain nine digits. Those military SSNs
contained ten digits beginning with zero. There are
very few of those ten-digit numbers around.
country or
this
for public
Alabama
416-424
Alaska
574
American Samoa
581-585
Arizona
Arkansas
526-527, 600-601
California
545-573, 602-626
Colorado
521-524
040-049
221-222
577-579
Connecticut
Delaware
District of Columbia
Florida
Georgia
Guam
Hawaii
was
issued
Idaho
Illinois
Indiana
Iowa
Kansas
429-432
261-267,589-595
252-260
581-585
575-576
518-519
318-361
303-317
478-485
509-515
Kentucky
Louisiana
Maine
Maryland
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
Norm Carolina
400-407
433-439
004-007
212-220
010-034
362-386
468-477
425-428,587-588
486-500
516-517
505-508
530
001-003
135-158
525,585
050-134
Maryland
Delaware
Idaho
212-220
221-222
223-231
232-236
237-246
247-251
252-260
261-267
268-302
303-317
318-361
362-386
387-399
400-407
408-415
416-424
425-428
429-432
433-439
440-448
449-467
468-477
478-485
486-500
501-502
503-504
505-508
509-515
516-517
518-519
Wyoming
520
Colorado
New Mexico
Arizona
521-524
525,585
526-527
Utah
528-529
Virginia
West Virginia
North Carolina
South Carolina
Georgia
Florida
Ohio
Indiana
Illinois
Michigan
Wisconsin
Kentucky
Tennessee
Alabama
237-246
Mississippi
North Dakota
Ohio
501-502
Arkansas
268-302
Louisiana
Oklahoma
Oregon
Oklahoma
Puerto Rico
440-448
540-544
159-211
581-585
581-585
Railroad
700-729
Rhode Island
035-039
247-251
Pennsylvania
Philippine Islands
South Carolina
South Dakota
Tennessee
Texas
Utah
503-504
408-415
449-467
Vermont
528-529
008-009
Virgin Islands
580
Virginia
223-231
Washington
West Virginia
Wisconsin
531-539
232-236
387-399
Wyoming
520
New Hampshire
Maine
Vermont
Massachusetts
Rhode Island
Connecticut
New York
New Jersey
Pennsylvania
Texas
Minnesota
Iowa
Missouri
North Dakota
South Dakota
Nebraska
Kansas
Montana
Nevada
530
Washington
Oregon
531-539
540-544
California
545-573
Alaska
574
Hawaii
District of Columbia
575-576
577-579
Virgin Islands
580
008-009
010-034
American Samoa
035-039
040-049
Puerto Rico
581-585
581-585
581-585
581-585
700-729
001-003
004-007
050-134
135-158
159-211
Guam
Philippine Islands
Railroad
a'x:x:<:-,-x-:y:-Cy: -^:--::Wf
INVALID SSNs
1.
2.
3.
4.
issued
Spelled Speech
The International
has a standard
list
words used
of
for international
word
list.
And
to
any
no
of course,
them.
Alpha/Alfa (Able)
Bravo (Baker)
November (Nan)
Oscar (Oboe)
Charlie
Delta (Dog)
Papa (Peter)
Quebec
Echo (Easy)
Romeo (Roger)
Foxtrot (Fox)
Sierra (Sugar)
Golf (George)
Tango (Tare)
Uniform (Uncle)
Hotel (How)
India (Item)
Victor
Juliet (Jig)
Whisky (William)
Kilo (King)
Xray
Yankee (Yoke)
Zulu (Zebra)
Lima (Love)
Mike
Fi-yiv, Six,
...
-i:*y.-fx
Appendix H:
Additional R/SE
Role Playing Situations
the
password and
this
forgot
Call
and ask
want
work
Ask
for a
if
they want to
little bit.
you'll fix
it
and
call
back
later.
You
do:
On
your
modem.
after
legitimate user
who
Say you
new
manager
you are a
to get done.
incident,
repaired.
was broken
into.
The
target leaves,
and you
are
Secrets of a Super
to
Social Engineering and Reverse Social Engineering: Seducing legitimate users into revealing their
passwords.
Spoofing: Designing
Superuser Abuser.
Screen Stealing:
Data Delivery:
How to hide the information you've collected; How to e-mail it to your computer.
Stair Stepping:
it
cracks.
lists
of likely passwords,
and a summary
of
The Super Hacker reveals all his tricks: Trojan Horses, Viruses, Worms, Trap Doors and Dummy
Accounts. The how-to text is highlighted with bare-knuckle tales of The Knightmare's hacks, including
on-site hacking, remote-access hacking and bulletin board busting.
Chapters include: Researching the Hack Passwords and Access Control Social Engineering
Reverse Social Engineering Public Access Computers and Terminals On-Site Hacking: The
Trespasser-Hacker Hacking at Home: Dialing Up Computers with Your Modem Electronic Bulletin
Boards What to Do When Inside How to Keep from Getting Caught The Hacker's Code of Ethics
Bibliography Glossary And Much, Much More!!!
And no
person
WA
Of
10048
step-by-step,
to-use,
you
to
illustrated
8Vi,
method enables
few short les-
in just a
$7.95.
We
offer
unusual books
B.
are being
Luger.
Edward
Easy, by
Nitchie. Here's a
10052
Made
the
very finest
in
controversial and
complete catalog
is
sent
FREE
is
with
this
practical,
SUPHK93
illustrated
how to
how
LOOMPANICS UNLIMITED
PO BOX 1197
PORT TOWNSEND, WA 98368
(206) 385-2230
5Vi
illus-
Please send
Spies,
by Duncan
fi-
marketing plans,
new product
am enclosing $
shipping and handling of
I
Defeating Industrial
55086
me the books
1 to
information
or other
Spies
NAME
bugs and
x 8*A, 132 pp, il-
wiretaps,
1991, 5*A
How
61092
ADDRESS
Profit,
CITY
STATE/ZIP
privacy.
that allow
"Yes,
wiretapping,
smuggling,
gunmanship,
lockpicking,
self-defense,
eavesdropping,
car
the
good
is
in
but their advice should be taken with a salt shaker or two and all your wits.
Though
them.
catalog
is
full
is
of 'you'll-wish-you'd-read-these-when-it's-too-late'
genuinely informative.
offer hard-to-find
rhetoric,
their
N THE WORLD!!!
in
our exciting
new catalog:
only to a few,
carry
of these
who
"
A few
and surveillancel
much, much
And
and
Locksmithing, Self-Defense,
Money-Making Opportunities,
Weapons, Sex, Drugs, Anarchism, and more!
Human
Our book catalog is 280 pages, 8 /2 x 1 1 packed with over 800 of the most
controversial and unusual books ever printed! You can order every book listed!
Periodic supplements keep you posted on the LATEST titles available!!! Our
1
catalog
is
Our book catalog is truly THE BEST BOOK CA TALOG IN THE WORLD! Order
will be very pleased, we know.
LOOMPANICS UNLIMITED
PO BOX 11 97
PORT TOWNSEND, WA 98368
USA
SECRETS OF
SUPER HACKER
He's not
'QtoGaa^i
motivated by
money
or
is
itil
techniques covered
in this
is
data-devouring dossier:
it
cracks.
lc 5
$mm%sami
Superuser Abi
Screen Stealing:
Data Delivery:
How
mm mmm
to g(
fplM&l ps#$5^^^^^^H to
e-mai
Stair Stepping:
How
to
summary
to.
Spoofing:
Designing
whether he wants
Seducing
is
in;
text
is
of
isswords
hi
com
highlighted with bare-knuckle tales of The Knightmare's hacks, including on-site hacking,
No system can withstand the ingenious, unrelenting assaults of The Knightmare. And no person concerned
with computer security should miss this amazing manual of
mayhem.
ISBN l-SS^SO-lDb-S
90000
781559"501064