First Newsletter Of "MIDNIGHT SLAYER" Author:DemonSlayer Time:7:20:12AM Date:25/7/98 A Guide to the H/P/A/C VOL.1 Midnight Slayer Hacking Team Founding Members. DemonSlayer DaemonSlayer ****** INTRODUCTION ****** Welcome to the MSHT. Basically, we are a group of phile writers who have combined our files and are distributing them in a group. This newsletter-type project is home-based. If you or your group are interested in writing philes for MSHT. You, your group, your BBS, or any other credits will be included. These philes may include articles on Hacking (computer & networks), Phreaking (telephone networks), Anarchy (destruction & anti-goverment but as a patriot to the country), Cracking (programs & network security), Warez (piracy stuff), Virus. Other topics will be allowed also to an certain extent. If you feel you have some material that's original, please call and we'll include it in the next issue possible. Also, you are welcomed to put up these philes on your BBS or web site too. The philes will be regularly available on our web site. If you wish to say in the philes that your BBS or web site will also be sponsering MSHT, please leave feedback to me, DemonSlayer starting you'd like your BBS or web site in the credits. Later on. DemonSlayer Midnight Slayer Hacking Team Volume: 001 Issue: 001 Number of Articles: 5 Size of Issue: 12KB HEAVILY EDITED by: DemonSlayer of "MIDNIGHT SLAYER" Special thanks to Microsoft Corporation for their Microsoft Inc.'s NotePad...... This file NEEDED IT! ****** SPECIAL THANK ALSO TO: ****** MY ANGEL : The ^_^ I loved. ThePolyNewGuy : For make me know more about IRC Hacking. HackStar : For help me to hack IRC server. HackEgnima : For help me to hack IRC server. Mindrvlt : For let me know more about phreaking. CodeMaster : For providing the manual of cracking. GaRbLeD uSeR : For let me know how to survive in an underground world. DaemonSlayer : My best buddy ever, for encourage me to write this file. This file is dedicated To "MIDNIGHT SLAYER". .....Whereever we both may be..... BEWARE OF MIDNIGHT SLAYER...... Hello, And welcome to "MIDNIGHT SLAYER"'s First News- letter, MIDNIGHT SLAYER PRESENTS. We here at MIDNIGHT SLAYER Hope you like it. But before we begin, A little about MIDNIGHT SLAYER.. Editor: DemonSlayer Assistant Editor: DaemonSlayer Date of National Release: 25/7/98 We are a group of Hackers from underground world. Also, we're writers too... Basically our main purpose here is to inform... We wanna to bring you the best information, as soon as we get ahold of it. We also believe that you, the end readers, users, and fans (Hopefully!) are more important than this group... and We'll try to keep the egos under control (Ahem! Think!) We also hope that you enjoy this newsletter. This will most likely to be the shortest letter we put out, due to a cram for time and authors. (WATCH OUT!!!) ;) ****** INDEX ****** ## Article Title Author Content ------------------------------------------------------------------------- 01 Hacking Rules DemonSlayer Hacking 02 Boxes Plans DemonSlayer Phreaking 03 Law of Crackers/Crackist DemonSlayer Cracking 04 Secret Of Lock Picking Steven Hampton Lock Picking 05 A Research Report DaemonSlayer Hacking ****** ARTICLES ****** ##: 01 Article Title: Hacking Rules Author: DemonSlayer Hacking Rules: 1. Never damage any system. This wull only get you into trouble. 2. Never alter any of the systems files, except for those needed to insure that you are not detected, and those to induse that you have access into that computer in the future. 3. Do not share any information about your hacking projects with anyone but those you'd trust with your life. 4. When posting on BBS's be as vague as possible when describing your current hacking projects. BBS's CAN be monitered by law enforcement. 5. Never use anyone's real name or real phone number when posting on a BBS. 6. Never leave your handle on any system that you hack into. 7. DO NOT hack goverment computers if you're not 100% ready yet. 8. Never speak about hacking projects over your home telephone line. 9. Be paranoid. Keep all of your hacking materials in a safe place. 10. To become a real hacker, you have to hack. You can't just sit around reading text files and hanging out on BBS's or surfing underground web sites. This is not what hacking is all about. ##: 02 Article Title: Boxes Plans Author: DemonSlayer Boxes Plans Boxing- the act of using a box. Box- A variety of electronic device used to aid in phreaking. The original was the Blue Box, used from the mid 60's to the mid 80's, which allowed long distance phonecalls to be make for free. A variety of other similar instruments accomplishing diffrent tasks have been developed using different box color names, some purely comical, some quite practical. The current list of Boxes follows: Box: Description: Acrylic Box steal 3-way calling and other services. Aqua Box stops FBI lock-in-trace. Beige Box lineman's handset. Black Box when called, caller pays nothing. Blast Box phone microphone amplifier. Blotto Box shorts out all phones in your area. Blue Box generates 2600Hz tone. Brown Box creates party line. Bud Box tap neighbours phone. Chatreuse Box use electricity from phone. Cheese Box turns your phone into a payphone. Chrome Box manipulates traffic signals. Clear Box free calls. Color Box phone conversation recorder. Copper Box causes crosstalk interference. Crimson Box hold button. Dark Box re-route calls. Dayglo Box connect to neighbours phone line. Divertor Box re-route calls. DLOC Box create party line. Gold Box dialout router. Green Box generates coin return tones. Infinity Box remote activated phone tap. Jack Box touch-tone key pad. Light Box in-use light. Lunch Box AM transmitter. Magenta Box connect remote phone line to another. Mauve Box phone tap without cutting into the line. Neon Box external microphone. Noise Box creates line noise. Olive Box external ringer. Party Box creates party line. Pearl Box tone generator. Pink Box creates party line. Purple Box hold button. Rainbow Box kill trace. Razz Box tap neighbours. Red Box generates tones for free phone calls. Rock Box add music to phone line. Scarlet Box causes interference. Silver Box create DTMF tones for A,B,C & D. ( Commonly used in military battlefield. ) Static Box raises voltage on phone line. Switch Box add services. Tan Box phone conversation recorder. TV Cable Box see sound waves on TV. Urine Box create disturbance on phone headset. Violet Box stop payphone from hanging up. White Box DTMF key pad. Yellow Box add line extension. ##: 03 Article Title: Law of Crackers/Crackist Author: DemonSlayer Law of Crackers/Crackist is shown below: 1. Knowing a higher level language such a BASIC, Pascal, or C++... 2. You don't have to become a master at assenbly to crack a program. 3. How proficient you are at assembly will determine how good of a cracker you become. 4. Don't show off in public. 5. You do need to learn some rudimentary principles when you are a beginner. First, we will using a good debugger to crack althings in DOS. As a beginner, you can forget about ever learning to crack Windows programs. As soon as a programmer throws some anti-debugging code into a program or starts revectoring interrupts, you'll be whining for someone to post a crack for this on that... And you can forget about ever learning to crack Windows programs. ##: 04 Article Title: Secret Of Lock Picking Author: Steven Hampton Secret Of Lock Picking By Steven Hampton LOCK IDENTIFICATION: These are many types of locks, the most common being 1. The pin tumbler lock: Used for house and garage doors, padlocks, mail boxes, and Ford automobile. 2. The wafer tumbler lock: Used for garage and trailer doors, desks, padlocks, cabinets, most autos, window locks, and older vending machines. 3. The double-wafer lock: Used for higher security wafer tumbler applications. 4. The warded locks: Used for light security padlocks and old- fashioned door locks. 5. Lever locks: Used for light security and older padlocks, sophisticated safe-deposit boxes, some desks, jewelry boxes, and small cash boxes. 6. Tubular cylinder locks: Used for alarm control systems, newer vending machines, car-wash control boxes and wherever higher security problems might exist. These locks are the more common locks used yet there are variations and combinations of these principal types that usually pick open in the manner that will be discussed. Some of them just require practice of the basic types, other luck, and most of the rest of them knowledge of how that particular lock works and is keyed. This comes from experience. ##: 05 Article Title: A Research Report Author: DaemonSlayer Hey, what do you know, Ya, it's me all right. Not, no Predator who also know as DemonSlayer not yet die, no... he's not retire, but he a little bit tired, so I take over his place. This is my first time writing this fucking shit. So... be more cautious, careful because of nowadays, security very strict, right. I tried to bring up more info for you. Ya! You! of course!!! So, what you want to talk about. H, P, A, or C. Or you want to talk about Miss ^_^, heh. OK, the serious part, Ya, the rule. What!!! You don't know what the Fucking Rule is. OK, OK you want rule, I give you the Golden Rule Edit By Jason Heng. Heh...Heh...Heh... Let me presents the Golden Rule 1. Don't tell anyone what you are, if you do, huh! You'll go bye bye. 2. Don't share any info to anyone (of course) 3. Never, never, never, never expose YOUR!!! identify to anyone especially your friend. ( Hey!! not me, I'm your partner right!!!) 4. Even your girlfriend also, don't let her know your identify. Not even her mother or father OK! OK that's it. So, What!!! you want talk about hacking, noway man, your house contain many info about H/P/A/C right! Remember, Read The Fucking Manual or also call as RTMF!!! Today lesson I want you to know more about Internet Firewalls . During my research I find that the FBI, CIA, IRS and other such secure concious departments all have computers (duh) with IP set up so they only have to sit there and make sure that the rest of their small network is secure, they are called FIREWALLS and are easy to hack if u know wat u are doing, apparently on unix machines there is an FTP command called 'dig' if u login to anonymous FTP sites u get the binary file off them. If you dig certain addresses that you know to be behind a firewall you can find information about the site. It give you address of all suck site with a certain name. So, what do you think! Cool huh. Wait for my next volume coming out. End of Volume 1.