^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^ ^^ ^^ Technical Hacking: Volume One ^^ ^^ ^^ ^^ Written by:The Warelock ^^ ^^ SABRE elite ^^ ^^ and Lords of Darkness ^^ ^^ presentation ^^ ^^ ^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ In technical hacking, I will mainly talk about the moret technicly oriented methods of hacking, phreaking, and other fun stuff... In this issue I plan to discuss the various protection devices ( filters, encription devices, and call-back modems ) that large corporations and networks use to 'protect' their computers, I will talk about and describe the various types of computer (hardware) protection, the way they work, how to surcomvent them, and other sources of information that may be available on the devices... ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Filters ---------- A filter, a box like contraption that hooks in between the computer and the phone-line, is used, instead of a password program, toID each user and to verify his password... Why the companies decided to make a hardware version of a verification program, I don't know. For no matter what kind of password system you use, there are still Users with passwords that make it a pleasure to hack (love, password, access, sex )... Sircumventing a Filter: Filters are no harder to get around thatn a good, secure password system... There are still several default passwords in most ( the usuall "demo" or "test" account) and usuall hacks ( the hack-hack, data base hack, circumvent hack, call-back hack, etc. All to be discussed in further volumes) also work... A filter device, though, posseses several interesting features and failings.. First of all, each filter system is geared for a sertain number of computers... Thus several computer networks using filters arent completely protected by the sole device on which they place all their trust in ' protecting ' them... For example, several computer networks use a sertain filter geared toward 4 on-line computer systems, but unfortinately for them, they needed a fifth on-line computer...oops, there goes the whole syste! Although they thought that since only a library computer, which doesnt require security, was on-line (giving out no secret information) it wouldnt compromise the rest of the system...They were wrong! For from the library computer (which is already in the operating system, bypassing the filter) one could force the operating system for the entire mainframe to place you in any of the other terminals!!! Finaly, an interesting feature of a filter system: ALL THE PASSWORDS ARE STORES INSIDE THE MEMORY OF THE FILTER UNIT... therefore, once you are inside the data base, you could set up a worm program that would slowly but surely read all of the systems passwords from the filter FROM THE INSIDE!!! Notes (names of filters, further readings, Aknolodgements): EnterCept (filter) : USES : a six character ID of any ASCII variables ComputerSentry : USES : (this one's a bitch... if you don't need to get into the system badly, forget it...) a voice synthesiser thats asks for a touch-tone ID of a variable number of digits... DataFlo : USES : a six character ID that both identifies and is used as a Pass Bay MultiPlex : USES : either a four or six letter/number ID code standar (no individual ID's!!! It's usually this default: 524E ) For further Reading: try Bill Landreths 'Out of The Inner Circle', Basic Telephone Security by an Annonomous author, or you can order specs. and manuals directly from the company...(see end of text for company names) ---------------------------------------------------------------------------- Encription/Decryption Devices: These are instaled directly inside terminals from which a system using this type of device is called... These are mothers to hack, yet it is not impossible many people say that once you see an encrypted carier, forget it... Not So! A lot of times, an appearant encrypted carier is actually a standar modem using a diffrent parity than your terminal... so fool around with that, adjusting parity (and make sure you have a good connection, sometimes static can cause some funny stuff to appear on the screen)and stop bits... besides that, there's very little you can do... although if you know the make of encryption device that the system is using, you may be able to adjust your term program to correctly modify each character recieved... (for example: a while back, there was an encryption device that simply added two points to the ASCII value of each character and then sent it as that character, the decription device on the other end took each value and subtracted two points and printed the character! That simple! All I had to do was change my AE to evaluate each character, subtract the two points, and print the character... It was incredibly slow, but it worked...) Notes: Sherlock Information Systems: USES : An AuthentiKey, it is usually a standard based on the serial number of the unit... Unless you can find that, it's a lost cause... Super Encryptor II: USES : nearly impossible, a key of about 40-50 characters.. almost impossible to break... ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Call Back Modems: How these little beuties work is quite simple and was quite effective untill a quite successfull method was descovered at breaking in... They work in the following manner: A user calls a modem line, enters an account and ID, the modem hangs up the line and then, using another line, calls back the authorised number belonging to the code & ID in it's memory... Circumvention: Actually, when you think about it, it turns out quite simply... The modem usesone line to recieve calls and another to send them out... the number is usually 1 or digit above the suffix of the number...EX: (xxx) xxx-0001The Warelock<--