Send mail to edthegreat@angelfire.com http://www.fortunecity.com/skyscraper/solomon/1162/index.htm Written from collective works and chat converations from March of 1998 and composed into one large manual February 2001 by ETG This document is written for people formiluar with windows, this is not eliet or hard to do... Its just the basics for anyone to learn.... (n.)Slicer this is the term used to describe a computer hacker. -unofficial starwars encyclopedia GeneralHacking.... ETG *written by a lamer for lamerz* ETG Disclaimer, Please keep in mind i was a highschool freshman when i wrote some of it. I wrote it to piss off my dumb bitch ass teacher , ya the one with no ankles... well anyways I almost got expeled becouse everyone learned quickly and easily how to **** around with the computers becouse of me... Although it made me slightly more popular it didnt get me laid (I had to wait a full 3 months later....) In short, if your hacking make sure no one knows about it.... *****ing stool pigions they all had to buy new computers after i found out they told on me BASTARDS* INTRO Breaking ground Now the first thing you have to do is give yourself a cool hacker name like V0rX or H@lfD3@D. When chooseing a name dont use your real name or your real intitials or anything that would give away your real identity. Don't use Haxor or SuperHackerMan or anything with the word hacker , becouse this would clue off anyone of your victems, that you could possible be a threat, in addition be treated poorly by system administrator or Operators. Next you need an email address. Of course you will not use your isp's email address or any email address that would clue anyone to your identity or where abouts. You want to pick a free email service. Now theres hundreds of them out there all of them basicaly the same. You want to pick a free email that has at least 5 megs of space, so you could send and recieve small files and huge email messages. When choosing remember the most popular most likely has the most people trying to hack it. So don't choose an email service like hotmail, but a smaller less popular service like bigfoot.com. When signing up for your new hacker email remember not to give your real name or address. When asked for a name choose a popular name like John Smith or Mat Anderson. When asked for an address you could either say you live in a foriegn coutry like the Philipines(The Philipines is an excellent place to be a hacker for the lack of computer security laws) or give a fake address like 1 pleasant street Los Angelouse California. This will make anyone trying to find information on you run around in circles. If you have to give out additional info, remember not to give out real information about yourself. When ever asked for identification only give out your hacker name and email. If at anytime someone figures out your real name or address change your hacker name and email immediatly. >THIS MAY SEEM LONG BUT IT SHOULD ONLY TAKE ABOUT 3 MINUTES Some cases include hacks involving MicrotypePro or Keychamp (laming typing programs) Ok well you want to know how to get into everything on a computer with the fortress password thing on it. {press ctr.+shift+esc to get the password box up but that doesnt do any thing} I've heard other combinations make work on different networks This will make it impossible for anyone but you to run windows 95 {if you have a internet browser in class you can get into most stuff by type C:/ in the url} I got kicked out of anything to do with computers in school now since i told everyone how to do this ,,, now they have to replace the hard drive on every single computer. Im assuming you take a typing class using either microtypepro or keychamp 1}how to destroy{or disable the computer} A] turn on computer get into either MicrotypePro or Keychamp B} after you login and type your password go to the question mark button it should be near the bottom of the screen C] from there you should see Microtype or Keychamp help go to file then open D] you should see a list of everything in the system type *.exe;*.bat;*.txt;*.pwl in the place were you can type. E}go to Windows {not win95} and click on it press delete on the keyboard then change its name ITS IMPORTANT THAT YOU REMEMBER WHAT YOU CHANGED IT TOO. F]then close everything G}WARNING DONT DO THIS LAST PERIOD H} when the person in first period the next day turns on the computer it cant start windows and it will be stuck in dos only you can Get into the computer again by typing in the name you used for windows. becouse it has to start in dos I]This could work with other other small file specific browsing boxes... like winpaint when opening a paint file (ya i like to paint too....) This is the good one!!!skip to j if you have a folder in the desktop were you can see the files but not get into them 2} how to get into everything in The computers in keyboarding class a] first open microtype pro or keychamp b} Then go into the place were you type in reports or lessons c} type in anything you like {But it has to be at least 1 letter long} D} go to file E} scroll down to save as text F} go to C: click on it you should get a list of things in the c drive G} go to windows click on it {NOT WIN95} H} go down to desktop and save it there in desktop I] if you did it right you should have a txt file on you desktop. Exit microtype pro or minimize it J}go into the text thing on your desktop go to file open then deskttop K] THERE ARE 2 Buttons ON YOUR MOUSE CLICK THE ONE THATS ON YOUR Left doubleclick if nessisary L} that should open a new thing thats gray on your screen M}go to new then go to one of those things youll know its the right one if you see a globe on it near the top N}you should get a new thing in your desktop O}open it then go to the globe thing click on it open it go to orginize favorites P}you should know what to do from there... Bootkey f8 is usefull hit it when you start up your computer {it doesnt work in school for secruity reasons] -Edthegreat [] Part 2 Fortress This is the good shit man, its like better then a dime bag and a sixpack in one night Some easy ways to get by fortress blocked programs, is to open them from internet explorer, simply type C:\ were you would usualy type the url, It should display contents of your computer.. Just see what you can do with this... Another simple step is opening Microsoft Word, and running programs through it... Pressing f5 while booting might bring you into safe mode and enable some more options... Since the grades arnt usualy stored on any computer within a 100 feet or yards from me, i forget what the restraining order was.. My main goal in class was opening up solitere and playing it through class.. its lame, but lamers treated me ass an idol for it.. Damn I have way to much free time. Part 3 Beating Down Bess... Theres a few different ways to lay the smack down on bess... (That BITCH) Its a censore program based on a proxy. It blocks websights containing socialable undersierable content.... 1. If you can open altavista's translator at http://world.altavista.com/ copy the url you want to access and press translate. Im guess since your reading this in English that you would want to translate it to English. The page would be displayed through altavista's server bypassing Bess 2. Ok, altavista is just one of many free proxys you can use. Other sights like www.schematic.org also provide free proxys, wich enable you to access sights bypassing bess. Bess actualy blocks off most sights with free proxys (at least at my school) so if all else fail, try #3 3. In Netscape click on edit in top left of netscape screen, select preferances. Once in the preferances screen click the "+" sight to enable advanced setup in all those boxes. You will come apon a section called proxies. Theres 3 bullets select manual proxy configuration. Copy the data in the http text box and paste it in the socks text box. Change the last number of the data to 3 , then delete everything in the http and security text boxes. Bess should now be dead enabling you to visit any webpage you so desire. 4. Ok this is the longest way, and you dont get pics so if you want porn, use the top 3 methods. Open a file called telnet. Theres a few ways to do this, the easyiest way to to open a msdosprompt and type telnet then hit enter. If you can't open dos then click start, then find..... If they disabled "find" (they actualy did this at my school) open up windows explorer open the file called windows... its in there someplace, its in alphabetical order so it wont be hard to find it. (if those idiot admins at my school had half a brain, they would know to delete telnet, becouse i can't find a legitiment reason for it being there other then hacking. 5. click connect click remote system, in host name type in "shellyeah.org" simply follow the direction on the screen, and you set up your free new shell account... (about 10 minute process) once your done with this setup, exit that connection and make a new connection to "zippy.shellyeah.org" login, then type in "lynx" it should open up a browser, theres directions on it, and bess can't do a thing to stop you. !I CAN'T BE CENSORED! Part 4 Trojans and Traceroute (tracert) 4.1 Alright you set up a cool name and email address. Time to start the hacking. There are many many different ways and types of hacking. Ill start you off with the easyest way to hack* , useing a Trojan Horse Virus. First download a very user friendy trojan horse, In this case SubSeven** by MobMan go to subseven.slak.org (the offical websight of sub7) if that fails go to tlsecurity.com, if that fails go to www.paragonhacking.com. If all else fails go to a popular search engine like hotbot.com and search under sub7, or trojan horses. Once downloaded unzip the file and place in a seldom used folder on your computer, basicaly hide it. Don't open the file called server just yet, wait for further instruction. Do not put it on your desktop or in your start menu for security reasons. The file you downloaded should come with a client and a server. (subseven along with a few other advanced trojans aka Back Orifice or DeepThroat also comes with an editserver file and possible some more addons depending on the version) Open the client you should see the user interface with an assortment of folders and buttons. In version 2.1 in the upper left hand corner you should see a large "7" to the right of that "7" theres a black box labeled ip/uin:. To the right of that you should see a box labeled port. Look through the rest of the folders and explore its features for a while. Afterwards you will activate the trojan horse. So you dont f*ck yourself over (dont worry its easy to un**** yourself when dealing with Sub7) open the Edit Server file.(its icon is a "7" with a hammer over it) A large black and blue box should open on your screen titled "EditServer for Sub7". To the upper left near a black box labeled "server" type in were you hide your sub7server or click browse and look through folders for it. Below that theres a box labeled startup methods, dont even bother with that yet. If you have icq edit the notification options as follows if not read on. Scan through entil you see a box labeled "enable icq notify to uin" Type in your icq # and check the box.(icq number is just a different name for UIN). Skip over to the upper right in a box labeled "installation" next to the check box labeled "automatically start server on port" change the default port (remember what you changed it to) and check the box. Below that is a small check box labeled "server password" type in a password and check the box. (remeber passwords should be made up of random numbers and letters and at least 5 characters long , the longer the better) You dont have to worry about any of the other features or check boxes. If you dont know what they do dont mess with them. Now Open the server. Once you opened the server remember you infected yourself with a trojan horse virus. Although trojan horse viruses usualy dont delete files or cause damage to your computer by itself , its more then likely controlled by a human being. (Thats what a trojan horse is.) Ok open the client again, make sure your connected to the internet and type in your own ip address (or icq # if you have icq and you corrently loged in to icq) What the f*ck is an ip address you ask? Well its short for internet protocol address. Its like a street address to a computer, every computer connected to the internet has an ip addy. Ill get into this deeper later on in the text. Considering your a lame windows user you can find your ip by running a file that comes with window called WINIPCFG.EXE. Its should be located in your windows folder in windows explorer. The fastest way of opening this file would be to click the Start Botton click run and type in "WINIPCFG.EXE" (without the commas). A program will pop up called "IP CONFIGURATION" In a box labeled Ip Address is your current Ip addy. (it changes everytime you log into the net) Type it in your sub7 client were it says IP , and were it says port type in the port you selected in the "Edit Server". There you go your all set with the first hack. As long as the server is on your comp, almost all password files typed in on your computer will show up on sub7 including icq passwords, email passwords, etrade passwords, etc.. etc.. You can mess with the features and learn what they do its pretty self explanitory. For more information on Sub7 go to Subseven.slak.org and you can download a walk through, read faq and email developers of sub7, also chat on the offical sub7 irc server were you can get help from Ops "remember dont trust everyone on Irc". 4.2 some tips to remember while useing sub7 as well as anyother trojan DONT GIVE OUT YOUR PASSWORD DONT GIVE OUT YOUR PORT NUMBER DONT LET YOUR VICTEM KNOW THERE INFECTED WITH SUB7 DONT GET BUSTED USEING SUB7 ON ANYONES COMPUTER OTHER THEN YOUR OWN, IF YOU GET CAUGHT ITS YOUR OWN FAULT 4.3 Ok Now that you had enough fun playing with yourself, I mean hack your own computer with a trojan, now its time to learn how to infect other people. Technicaly all you have to do is get someone to open the server file on there own computer. Sounds easy huh? Well its easyer said then done. First off, any one with an iq above 70 knows that a file called server, is most likely a trojan virus so CHANGE THE NAME of the server (you cant change the .exe extension or else it wont work). SubSeven is detected by almost all antiviruses, so you want to either use an uptodate version of sub7 or another lesser know trojan alltogether. A simple way to test if your trojan is detected by an antivirus, is to simply scan it with your own antivirus, if it detects it, then the trojan is detectable by an antivirus. The most trusting people are your friends and family, it sounds cruel, but they would be the easyest victems. You can simply tell them its a cool game or just a stupid file, or just send it to them and dont tell them anything. As long as they open the server, you can have vertualy complete control of there computer. Allright if you dont want to infect your friends or family, "becouse your so nice" Youll have to find a random victem to hack. On icq this is easy becouse you can simply do a random person search and start chatting. For reference males between the ages of 25-100 are the hardest to infect and teenage girls seem to be the most trustfull and therefore easyest victems. Try to befriend your new victem before you infect them. Make them trust you before you send them the server. Some common lies that usualy work are, "its a game" "its an extension for icq" it will boost your modem speed" "its a pick" "becouse i love you". If non of these work get an exe binder there avalable at tlsecurity.com they let you bind one executalbe file, like a game, with your server. In some cases you can change the icon of the server. You can change it to a camera and say its a pic. You can Change it to a music note and say its an mp3. The possibilities are endless. People have gotten over 20 victems useing these methods in a period of days. Ok they opened the server, now how the h3ll do I figure out the IP addy? Well thats not as difficult as must people would think. If you infected your victem with Sub7 you could edit the server to notify you everytime your victem connects to the internet. You can use Email notify, Irc notify, or my favorite is icq notify wich we decussed earlyer in the text. This simply sends you a notice everytime when your victem connects online with your victems IP address. Also , with sub7, if you and your victem have icq you can simply enter your victems icq# and sub7 converts it into an ip address. If your not useing sub7 you can still find there ip addy. If you use Icq then your victem could have there ip right in the open, in the upper right hand side of there info. If they block there ip out of there info you can do a traceroute (you need to have some sort of a connection to your victem in order for a traceroute to work, like an instant message or your playing an online game with them or something of that nature.) ,, or in windows a Tracert. Its a little tricky but after a few minutes you should figure it out. Open an MSDos prompt on your desktop. Click start then programs then scroll all the ways down until you reach MSDOS PROMPT then open it. All it is , is a black box with a small amount of text in it. It give you some Microsoft bullshit with the version and copywrite date, then below it it says C:\WINDOWS>. Type in "cd\" so it says on the screen C:\WINDOWS>cd\ then press enter. It should say C:\> after you press enter. Type in "netstat" after C:\> and press enter. This little trick tell you everyone who is connected to you at the time, for example you could get something like this Proto Local Address Foriegn Address State TCP you:2366 cx60839-b.alpn1.sdca.home.com:6699 ESTABLISHED TCP you:2401 shell1.pulltheplug.com:6667 TIME_WAIT <----- Irc server TCP you:1133 208.184.216.177.napster.com:7777 ESTABLISHED <---- ya remember napster ill get into file shareing later on TCP you:1234 248.cambridge-23-24rs.ma.dial-access.att.net:1298 ESTABLISHED <-----punk ass kid Ok your 2/3rds of the way done, already, and the first time is always the longest. After all this info comes up type in the foriegn address of the computer that you would like to find the ip of. For example if you want to find that punks kids ip addy you would type in "tracert 248.cambridge-23-24rs.ma.dial-access.att.net" and you would get something like this Tracing route to 248.cambridge-23-24rs.ma.dial-access.att.net [12.78.207.248] <-------victems ip over a maximum of 30 hops: 1 135 ms 146 ms 158 ms Iwgw72.bos1.Level7.net [127.0.0.240] 2 114 ms 144 ms 138 ms wmcu53.bos1.Level7.net [127.244.39.26] 3 145 ms 129 ms 138 ms speed-speed.speed.net [304.113.128.1] 4 855 ms 139 ms 128 ms serial2-0-1.hsa1.det1.Level7.net [36.90.184.1] 5 135 ms 138 ms 140 ms lo0.mp2.NewYork1.level7.net [109.247.8.252] 6 144 ms 145 ms 138 ms 109.247.10.70 7 133 ms 130 ms 139 ms 109.0.227.98 8 145 ms 148 ms 139 ms gbr3-p50.wswdc.ip.att.net [12.123.9.50] 9 160 ms 141 ms 159 ms gbr3-p80.n54ny.ip.att.net [12.122.2.165] 10 150 ms 159 ms 159 ms gbr1-p100.n54ny.ip.att.net [12.122.1.150] 11 152 ms 159 ms 159 ms 12.127.11.118 12 155 ms 155 ms 157 ms 199.70.127.10 13 160 ms 156 ms 158 ms 199.70.35.89 14 294 ms 267 ms 279 ms 248.cambridge-23-24rs.ma.dial-access.att.net [12 .78.207.248] <------ victems ip Trace complete. There you go your victems IP addy is 12.78.207.248. Happy Hacking! 4.4 Ok to recap I mentioned this funny little thing called an IP address. Each ip is unique.(with a few exceptions) An ip is mostly the address of a single computer and is made up of 4 numbers each ranging from 0 to 255, for example 127.0.0.1 . Occasionaly you will find someone whos behind a proxy or a firewall, this could mask the ip. In such a case the ip may be 255.255.255.255, or something similar, or it may look like any other normal ip. In businesses or schools there maybe be what a network, in wich several computer are connected over a lan, each one would have the same ip. Ok whats up with netstat well netstat holds a wealth of info if you know how to read it Proto Local Address Foriegn Address State TCP you:2366 cx60839-b.alpn1.sdca.home.com:6699 ESTABLISHED TCP you:2401 shell1.pulltheplug.com:6667<--- 6667 is an irc port TIME_WAIT <----- Irc server TCP you:1133 208.184.216.177.napster.com:7777<---- napster port ESTABLISHED <---- ya remember napster ill get into file shareing later on TCP you:1234 248.cambridge-23-24rs.ma.dial-access.att.net:1298 ESTABLISHED <-----punk ass kid ^ ^ ^ the town the isp the state is based. means hes using a dial up connection Ok that helps a little with netstat,, but what the f*cks up with tracert Tracing route to 248.cambridge-23-24rs.ma.dial-access.att.net [12.78.207.248] <-------victems ip over a maximum of 30 hops: 1 135 ms 146 ms 158 ms Iwgw72.bos1.Level7.net [127.0.0.240] <---- this would be were you start your scanning from,, (your own computer) 2 114 ms 144 ms 138 ms wmcu53.bos1.Level7.net [127.244.39.26] 3 145 ms 129 ms 138 ms speed-speed.speed.net [304.113.128.1] <-----tells you your own isp 4 855 ms 139 ms 128 ms serial2-0-1.hsa1.det1.Level7.net [36.90.184.1] <---- ok its going through phonelines to detroit 5 135 ms 138 ms 140 ms lo0.mp2.NewYork1.level7.net [109.247.8.252] <-----now its in a NewYork server 6 144 ms 145 ms 138 ms 109.247.10.70 7 133 ms 130 ms 139 ms 109.0.227.98 8 145 ms 148 ms 139 ms gbr3-p50.wswdc.ip.att.net [12.123.9.50] 9 160 ms 141 ms 159 ms gbr3-p80.n54ny.ip.att.net [12.122.2.165]<------- NY is NewYork remember the state codes 10 150 ms 159 ms 159 ms gbr1-p100.n54ny.ip.att.net [12.122.1.150] 11 152 ms 159 ms 159 ms 12.127.11.118 12 155 ms 155 ms 157 ms 199.70.127.10 13 160 ms 156 ms 158 ms 199.70.35.89 14 294 ms 267 ms 279 ms 248.cambridge-23-24rs.ma.dial-access.att.net [12 <---- you can tell your he live near Cambridge in Massachuttess and has a dial up modem.... interesting huh.. .78.207.248] <------ victems ip A nice trick to play on people is to trace them to wear they live. (ofcourse you can only get an approximate area in wear they live) Then show them a weather satalite pic, or just any satalite pic of the area in wich they live. Tell them your spying on them with your satalite you hacked from "pick a county". Say "im watching your every move". They will friggen freak out. Its hilerouse just dont get caught. Part 5 REAL HACKING* Forging Email 1. Ok open telnet just like i showed you before. Open a connection to a cheap isp service like lets say isp.com . (please note that i just used isp.com as an expample and if you didnt notice already, you just leave you the http://www. part of a webpage) For the port type in 25, this is the mail port click connect. Click terminal then preferences and check local echo. 2. Ok you just setup telnet, back to the main screen type in "mail from:" and type in the email you want like admin@nasa.net type in "rcpt to:" enter the email you want to forge to, for exaple john@nasa.net , hit enter. You'll get a message like "rcpt......OK". Hit enter, type in data hit enter again it gives directions for typeing your message. It may take a while to find a server that allows this but I know that at least gis.net still lets you do this. 3. This is very useful hack.. I bet you can think of a million different pranks to play on people with this.... >:} Part 6 Getting Passwords the Super Lame Way This is how I found out all my friends fathers porn passwords, I had hours of fun. 1. Download install and setup netscape 6.0 2. Have people use it for a while, parents, siblings, coworkers, classmates, friends, eventualy one of them will use netscape to open there email account, or go to there porn websight, or any other websight that requires them to enter a password. 3. After about a week goes by lets see what passwords we got. Open netscape 6.0, go to edit, then down to preferences. On the left hand side there should be some blue arrows, click the last blue arrow that says "advanced" next to it. This should show some more options, go down to passwords and open it. On the right make sure that the option "remeber passwords for sights that require me to log in" is checked. Open up view saved passwords. There you go theres a list of passwords people entered, as long as there to lazy to remeber there own password they will always have netscape record them so they won't have to enter them in the future. 4. There you go , this won't work all the time, but it works enough to get noticed. Its very lame, no cracking required. This is probly the eaziest way i've ever seen to retrieve someones passwords. Part 7 Irc K-lines (k-line is when an irc op completely kicks you from the irc server) Ok, I hate it when an irc op tries to threaten me with a k-line (umm.... they fear what they don't knw) sometimes I just push them into k-lining me just so I can evaid the k-line. Ok, the first way to avoid a k-line is by going back to that irc server through a websight. Websights like www.schematic.org have irc clients in there websights allowing you to enter that server again. The next way would be by setting up a shell account like on shellyeah.org any shell that allows irc. Go back to that irc server through that shell account and it should let you in. There are many ways of avoiding a k-line im not listing here, but really the best way to avoid a k-line is to not do anything stupid enough to get the op pissed off. Additional References All of this was written based on conversations I had over icq, irc, and just plain talking to friends. Not bad considering I have no formal certifications like a ccnp cert or a college degree or something important like that **** I almost got suspended for telling people how to disable bess (school proxy). O-well now hundreds of people know how to hack there way around school. hehe >:} Please email me at edthegreat@angelfire.com if you see any errors in this document, or if you would like to add your two cents, yes I know its lame, I know it sux ass, but dammit I was bored. * tecnicaly trojan horses are not considered hacking by real hackers. ** subseven is detected by almost every major antivirus 1 dos the operating system should not be confused with d.o.s. ,denial of service. 2 warez is short for software , usualy refering to pirated software 3 progs is short for programs Keep in mind Im not a professional hacker,(if there is such a thing) please email me any errors I made in writting this, so that I could fix it for the future. And they all lived happily ever after..... -ETG