* THE BASICS OF HACKING: INTRO *
Editors note: This article is somewhat out of date but presented
for it's historical value.
THE FIRST OF A SET OF ARTICLES: AN INTRODUCTION TO THE WORLD OF
THE HACKER.
BASICS TO KNOW BEFORE DOING ANYTHING, ESSENTIAL TO YOUR CONTINUING
CAREER AS ONE OF THE ELITE IN * * THE COUNTRY... THIS
ARTICLE, "THE INTRODUCTION TO THE WORLD OF HACKING" IS MEANT TO HELP
YOU BY TELLING YOU HOW NOT TO GET
CAUGHT, WHAT NOT TO DO ON A COMPUTER SYSTEM, WHAT TYPE OF EQUIPMENT
SHOULD I KNOW ABOUT NOW, AND JUST A LITTLE ON THE HISTORY, PAST PRESENT
FUTURE, OF THE HACKER.
WELCOME TO THE WORLD OF HACKING! WE, THE PEOPLE WHO LIVE OUTSIDE
OF THE NORMAL RULES, AND HAVE BEEN SCORNED AND EVEN ARRESTED BY THOSE
FROM THE 'CIVILIZED WORLD', ARE BECOMING SCARCER EVERY DAY. THIS
IS DUE TO THE GREATER FEAR OF WHAT A GOOD HACKER (SKILL WISE, NO MORAL
JUDGMENTS HERE) CAN DO NOWADAYS, THUS CAUSING ANTI-HACKER SENTIMENT IN
THE MASSES. ALSO, FEW HACKERS SEEM TO ACTUALLY KNOW ABOUT THE
COMPUTER SYSTEMS THEY HACK, OR WHAT EQUIPMENT THEY WILL RUN INTO ON THE
FRONT END, OR WHAT THEY COULD DO WRONG ON A SYSTEM TO ALERT THE
'HIGHER' AUTHORITIES WHO MONITOR THE SYSTEM. THIS ARTICLE IS
INTENDED TO TELL YOU ABOUT SOME THINGS NOT TO DO, EVEN BEFORE YOU GET
ON THE SYSTEM. WE WILL TELL YOU ABOUT THE NEW WAVE OF FRONT END
SECURITY DEVICES THAT ARE BEGINNING TO BE USED ON COMPUTERS. WE
WILL ATTEMPT TO INSTILL IN YOU A SECOND IDENTITY, TO BE BROUGHT UP AT
TIME OF GREAT NEED, TO PULL YOU OUT OF TROUBLE. AND, BY THE WAY,
WE TAKE NO, REPEAT, NO, RESPONSIBILITY FOR WHAT WE SAY IN THIS AND THE
FORTHCOMING ARTICLES. ENOUGH OF THE BULLSHIT, ON TO THE
FUN: AFTER LOGGING ON YOUR FAVORITE BBS, YOU SEE ON THE HIGH
ACCESS BOARD A PHONE NUMBER! IT SAYS IT'S A GREAT SYSTEM TO "FUCK
AROUND WITH!" THIS MAY BE TRUE, BUT HOW MANY OTHER PEOPLE ARE GOING TO
CALL THE SAME NUMBER? SO: TRY TO AVOID
CALLING A NUMBER GIVEN TO THE PUBLIC. THIS IS BECAUSE THERE ARE
AT LEAST EVERY OTHER USER CALLING, AND HOW MANY OTHER BOARDS WILL THAT
NUMBER SPREAD TO? IF YOU CALL A NUMBER FAR, FAR AWAY, AND YOU PLAN ON
GOING THRU AN EXTENDER OR A RE- SELLER, DON'T KEEP CALLING THE SAME
ACCESS NUMBER (I.E. AS YOU WOULD IF YOU HAD A HACKER RUNNING),
THIS LOOKS VERY SUSPICIOUS AND CAN MAKE LIFE MISERABLE WHEN THE PHONE
BILL COMES IN THE MAIL. MOST CITIES HAVE A VARIETY OF ACCESS
NUMBERS AND SERVICES, SO USE AS MANY AS YOU CAN.
NEVER TRUST A CHANGE IN THE SYSTEM... THE 414'S, THE
ASSHOLES, WERE CAUGHT FOR THIS REASON: WHEN ONE OF THEM CONNECTED
TO THE SYSTEM, THERE WAS NOTHING GOOD THERE. THE NEXT TIME, THERE
WAS A TREK GAME STUCK RIGHT IN THEIR WAY! THEY PROCEEDED TO PLAY
SAID GAME FOR TWO, SAY TWO AND A HALF HOURS, WHILE TELNET WAS TRACING
THEM! NICE JOB, DON'T YOU THINK? IF ANYTHING LOOKS
SUSPICIOUS, DROP THE LINE IMMEDIATELY !! AS IN, YESTERDAY!!
THE POINT WE'RE TRYING TO GET ACROSS IS: IF YOU USE A LITTLE
COMMON SENSE, YOU WON'T GET BUSTED. LET THE LITTLE KIDS WHO
AREN'T SMART ENOUGH TO RECOGNIZE A TRAP GET BUSTED, IT WILL TAKE THE
HEAT OFF OF THE REAL HACKERS. NOW, LET'S SAY YOU GET ON A
COMPUTER SYSTEM... IT LOOKS GREAT, CHECKS OUT, EVERYTHING SEEMS
FINE. OK, NOW IS WHEN IT GETS MORE DANGEROUS. YOU HAVE TO
KNOW THE COMPUTER SYSTEM (SEE FUTURE ISSUES OF THIS ARTICLE FOR INFO ON
SPECIFIC SYSTEMS) TO KNOW WHAT NOT TO DO. BASICALLY, KEEP AWAY
FROM ANY COMMAND WHICH LOOKS LIKE IT MIGHT DELETE SOMETHING, COPY A NEW
FILE INTO THE ACCOUNT, OR WHATEVER! ALWAYS LEAVE THE ACCOUNT IN
THE SAME STATUS YOU LOGGED IN WITH. CHANGE *NOTHING*... IF
IT ISN'T AN ACCOUNT WITH
PRIV'S, THEN DON' T TRY ANY COMMANDS THAT REQUIRE THEM! ALL, YES
ALL, SYSTEMS ARE
GOING TO BE KEEPING LOG FILES OF WHAT USERS ARE DOING, AND THAT WILL
SHOW UP. IT IS JUST
LIKE DROPPING A TROUBLE-CARD IN AN ESS SYSTEM, AFTER SENDING THAT NICE
OPERATOR A PRETTY TONE. SPEND NO EXCESSIVE AMOUNTS OF TIME ON THE
ACCOUNT IN ONE STRETCH. KEEP YOUR CALLING TO THE VERY LATE NIGHT
IF POSSIBLE, OR DURING BUSINESS HOURS (BELIEVE IT OR NOT!). IT SO
HAPPENS THAT THERE ARE MORE USERS ON DURING BUSINESS HOURS, AND IT IS
VERY DIFFICULT TO READ A LOG FILE WITH 60 USERS DOING MANY COMMANDS
EVERY MINUTE. TRY TO AVOID SYSTEMS WHERE EVERYONE
KNOWS EACH OTHER, DON'T TRY TO BLUFF. AND ABOVE ALL: NEVER
ACT LIKE YOU OWN THE SYSTEM, OR ARE THE BEST THERE IS. THEY
ALWAYS GRAB THE PEOPLE WHO'S HEADS SWELL... THERE IS SOME VERY
INTERESTING FRONT END EQUIPMENT AROUND NOWADAYS, BUT FIRST LET'S DEFINE
TERMS... BY FRONT END, WE MEAN ANY DEVICE THAT YOU MUST PASS THRU
TO GET AT THE REAL COMPUTER. THERE ARE DEVICES THAT
ARE MADE TO DEFEAT HACKER PROGRAMS, AND JUST PLAIN OLD
MULTIPLEXERS. TO DEFEAT HACKER PROGRAMS , THERE ARE NOW DEVICES
THAT PICK UP THE PHONE AND JUST SIT THERE... THIS MEANS THAT YOUR
DEVICE GETS NO CARRIER, THUS YOU THINK THERE ISN'T A COMPUTER ON THE
OTHER END. THE ONLY WAY AROUND IT IS TO DETECT WHEN IT WAS PICKED
UP. IF IT PICKS UP AFTER THE SAME NUMBER RING, THEN YOU KNOW IT
IS A HACKER- DEFEATER. THESE DEVICES TAKE A MULTI- DIGIT CODE TO
LET YOU INTO THE SYSTEM. SOME ARE, IN FACT, QUITE SOPHISTICATED
TO THE POINT WHERE IT WILL ALSO LIMIT THE USER NAME' S DOWN, SO ONLY
ONE NAME OR SET OF NAMES CAN BE VALID LOGINS AFTER THEY INPUT THE
CODE... OTHER DEVICES INPUT A NUMBER CODE, AND THEN THEY DIAL
BACK A PRE-PROGRAMMED NUMBER FOR THAT CODE. THESE SYSTEMS ARE
BEST TO LEAVE ALONE, BECAUSE THEY KNOW SOMEONE IS PLAYING WITH THEIR
PHONE. YOU MAY THINK "BUT I'LL JUST REPROGRAM THE DIAL-BACK." THINK
AGAIN, HOW STUPID THAT IS... THEN THEY HAVE YOUR NUMBER, OR A
TEST LOOP IF YOU WERE JUST A LITTLE SMARTER. IF IT'S YOUR NUMBER,
THEY HAVE YOUR BALLS (IF MALE...), IF ITS A LOOP, THEN YOU ARE SCREWED
AGAIN, SINCE THOSE LOOPS ARE *MONITORED*. AS FOR
MULTIPLEXERS... WHAT A PLEXER IS SUPPOSED TO DO IS THIS:
THE SYSTEM CAN ACCEPT MULTIPLE USERS. WE HAVE TO TIME
SHARE, SO WE'LL LET THE FRONT- END PROCESSOR DO IT... WELL, THIS
IS WHAT A MULTIPLEXER DOES. USUALLY THEY WILL ASK FOR SOMETHING
LIKE "ENTER CLASS" OR "LINE:". USUALLY IT IS PROGRAMMED FOR A
DOUBLE DIGIT NUMBER, OR A FOUR TO FIVE LETTER WORD. THERE ARE
USUALLY A FEW SETS OF NUMBERS IT ACCEPTS, BUT THOSE NUMBERS ALSO SET
YOUR 300/1200 BAUD DATA TYPE. THESE MULTIPLEXERS ARE INCONVENIENT
AT BEST, SO NOT TO WORRY. A LITTLE ABOUT THE HISTORY OF
HACKING: HACKING, BY OUR DEFINITION, MEANS A
GREAT KNOWLEDGE OF SOME SPECIAL AREA. DOCTORS AND LAWYERS ARE
HACKERS
OF A SORT, BY THIS DEFINITION. BUT MOST OFTEN, IT IS BEING USED
IN THE COMPUTER CONTEXT, AND THUS WE HAVE A DEFINITION OF "ANYONE WHO
HAS A GREAT AMOUNT OF COMPUTER OR TELECOMMUNICATIONS KNOWLEDGE." YOU
ARE NOT A HACKER BECAUSE YOU HAVE A LIST OF CODES... HACKING, BY
OUR DEFINITION, HAS THEN BEEN AROUND ONLY ABOUT 15 YEARS. IT STARTED ,
WHERE ELSE BUT, MIT AND COLLEGES WHERE THEY HAD COMPUTER SCIENCE OR
ELECTRICAL ENGINEERING DEPARTMENTS. HACKERS HAVE CREATED SOME OF THE
BEST COMPUTER LANGUAGES, THE MOST AWESOME OPERATING SYSTEMS, AND EVEN
GONE ON TO MAKE MILLIONS. HACKING USED TO HAVE A GOOD NAME, WHEN WE
COULD HONESTLY SAY "WE KNOW WHAT WE ARE DOING". NOW IT MEANS (IN
THE PUBLIC EYE): THE 414'S, RON AUSTIN, THE NASA HACKERS, THE
ARPANET HACKERS... ALL THE PEOPLE WHO HAVE BEEN CAUGHT, HAVE DONE
DAMAGE, AND ARE NOW GOING TO HAVE TO FACE FINES AND SENTENCES.
THUS WE COME PAST THE MORALISTIC CRAP, AND TO OUR PURPOSE:
EDUCATE THE HACKER COMMUNITY, RETURN TO THE DAYS WHEN PEOPLE ACTUALLY
KNEW SOMETHING...
PROGRAM GUIDE: THREE MORE ARTICLES WILL BE WRIT TEN IN THIS SERIES, AT
THE PRESENT TIME.
BASICS OF HACKING I: DEC'S
BASICS OF HACKING II: VAX'S (UNIX)
BASICS OF HACKING III: DATA GENERAL
IT IS IMPOSSIBLE TO WRITE AN ARTICLE ON IBM, SINCE THERE ARE SO MANY
SYSTEMS AND WE ONLY HAVE INFO ON A FEW...
THIS ARTICLE HAS BEEN WRITTEN BY: THE KNIGHTS OF SHADOW
*********************************
[END] 1984
*****************************