Copy Link
Add to Bookmark
Report

Outbreak Issue 06

eZine's profile picture
Published in 
Outbreak
 · 22 Aug 2019

  

ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
Û±±±±±±±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±±±±±±±Û
Û²²²²²²²|\_______________________________________________________________/|²²²²²²²Û
Û²²²²²²²||\_____________________________________________________________/||²²²²²²²Û
Û²²²²²²²||| __ ____ __ __ |||²²²²²²²Û
Û²²²²²²²||| /\ \__/\ _`\ ---The E-Zine--- /\ \/\ \ |||²²²²²²²Û
Û²²²²²²²||| ___ __ _\ \ ,_\ \ \L\ \ _ __ __ __ \ \ \/'/' |||²²²²²²²Û
Û²²²²²²²||| / __`\/\ \/\ \ \ \/\ \ _ <_/\`'__Y'__`\ /'__`\\ \ , < |||²²²²²²²Û
Û²²²²²²²||| /\ \L\ \ \ \_\ \ \ \_\ \ \L\ \ \ \/\ __//\ \L\.\\ \ \\`\ |||²²²²²²²Û
Û²²²²²²²||| \ \____/\ \____/\ \__\\ \____/\ \_\ \____\ \__/.\_\ \_\ \_\ |||²²²²²²²Û
Û²²²²²²²||| \____/ \/___/ \/__/ \/___/ \/_/\/____/\/__/\/_/\/_/\/_/ |||²²²²²²²Û
Û²²²²²²²|||_____________________________________________________________|||²²²²²²²Û
Û²²²²²²²||/_____________________________________________________________\||²²²²²²²Û
Û²²²²²²²|/_______________________________________________________________\|±±±±±±±Û
Û±±±±±±±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ`amatierÛ
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ


Outbreak Magazine Issue #6
June 2002 Release


"I am Russian Nazi, I shave my head for nazi-ness!"

- Boris Shlagnavich




Editorial:

It was a stormy day on May 29th, 2002. I was awaken by a lound
bang. I thought it was thunder. But I mistaken... It was my
roomate masturbating. Ya see, he's a loud masturbater. When he's
getting his wank on, its explosive. Snails in Canada can hear it.
True fact.

When hes getting his wank on, he can launch a space ship, and make
it propell all the way to Uranus. Who's anus? Uranus. Not Mianus.
Uranus.

Anyway, i've got nothing else to write. So when you think its
thundering outside.. It's really not. It's my roomate Phil
masturbating. It really is.

ANYWAY!

Enjoy issue #6. Start sending me articles for the next issue!

Send all texts to: outbreak@fwaggle.net

Enjoy!

- kleptic <outbreak@fwaggle.net>





Û°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°Staff°²²²ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°Û
ð
ð kleptic...............<outbreak@fwaggle.net> ð
ð fwaggle...............<root@fwaggle.net> ð
ð `amatier..............<amatier@twcny.rr.com> ð
ð antimatt3r............<antimatt3r@hotmail.com> ð
ð Strykar...............<strykar@hackerzlair.org> ð
ð Prodigal|Son..........<amlouden@insightbb.com> ð
ð Ryan..................<ryan@insidergaming.net> ð
ð Radioactive_Raindeer..<r_r@diegeekdie.org> ð
ð timeless..............<timeless@timelessguru.com> ð
ð TheEnigma.............<enigm4@freeshell.org> ð
ð dropcode..............<uberego@hotmail.com> ð
ð [encrypted]...........<prokzide@charter.net> ð
ð Turbanator............<turbanator2k2@roy.phonelosers.org>ð
ð BadGadget.............<badgajit@cyberspace.org> ð
ð gr3p..................<gr3p@gr3p.net> ð
ð evo225................<evo255x@hotmail.com> ð
ð ð
Û°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°ððððð°²²²ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°Û



Shout Outs:

All @ #hackerzlair on irc.dal.net, RBCP at phonelosers.org,
scene.textfiles.com, diegeekdie.org, hackerzlair.org,
fwaggle.net, dsinet.org, ameriphreak.com, surviveall.net,
roy.phonelosers.org, gr3p.net, gr3p.net/ravagrrl/
guruworld.org, #outbreakzine on irc.dal.net,
Everyone that helped out with this issue
of Outbreak. You all rule!




ÜßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßßÜ
\-Û http://www.fwaggle.net/~outbreak Û-/
ßÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜß

Vist Us @ IRC.DAL.NET

Join #outbreakzine

Send all articles for submission to:

outbreak@fwaggle.net





ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛðÛÛÛÛÛÛðÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
Ý Outbreak Issue #6 Þ
Ý ÜÜ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÜÜÜ Þ
Ý Ý Þ Þ
Ý Ý [ 0] Editorial...............................kleptic Þ Þ
Ý [ 1] Bosnia Doesn't Like Me Much.............BadGadget Þ
Ý [ 2] Setting Up A Conference.................gr3p Þ
Ý [ 3] History And Application Of TELETEXT.....GPC Þ
Ý [ 4] Internet Security Myths.................fwaggle Þ
Ý [ 5] What the fuck was I smoking?............kleptic Þ
Ý [ 6] How to get an 800 # for a local BBS.....Turbanator Þ
Ý [ 7] A Little Trick to Get an IP in AIM......evo255 Þ
Ý [ 8] Brief Thoughts on Terror in the U.S.....TheEnigma Þ
Ý [ 9] Blanks Short Tips For Newbies...........blank Þ
Ý [10] The Atomic Bomb.........................TheEnigma Þ
Ý [11] Automatic Number Identification (ANI)...dropcode Þ
Ý [12] The Return To Mianus (the sequal).......#Mianus Þ
Ý [13] Payphone Line Fiasco....................Coercion Þ
Ý [14] Grey Box................................Orange Julius Þ
Ý [15] Tao of the Firewalker...................dropcode Þ
Ý [16] Conclusion..............................Outbreak Staff Þ

ÜÜ ÜÜ
ÜÜÜÝ ÞÜÜÜ



³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
-°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°ð-|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°-
+-+-+-+-+-+-+-+-+
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij


All information provided in official OutBreak Zine, Web sites is provided for....
information purposes only and does not constitute a legal contract between the....
Editors or Writers and any person or entity unless otherwise specified............
Information on official OutBreak Zine web sites is subject to change without......
prior notice. Although every reasonable effort is made to present current and.....
accurate information, the Editors and Writers make no guarantees of any kind......

The OutBreak web site may contain information that is created and maintained
by a variety of sources both internal and external to the Staff. These sites are..
unmoderated containing the personal opinions and other expressions of the persons.
who post the entries. OutBreak does not control, monitor or guarantee....
the information contained in these sites or information contained in links to other
external web sites, and does not endorse any views expressed or products or.......
services offered therein. In no event shall OutBreak be responsible or...
liable, directly or indirectly, for any damage or loss caused or alleged to be....
caused by or in connection with the use of or reliance on any such content, goods,
or services available on or through any such site or resource.....................

Any links to external Web sites and/or non-OutBreak information provided on......
OutBreak pages or returned from Any Web search engines are provided as a..........
courtesy. They should not be construed as an endorsement by OutBreak and..........
of the content or views of the linked materials...................................


COPYRIGHT AND LIMITATIONS ON USE :

OutBreak Contents may not be used with out express written permission........
By the Editor..........outbreak@fwaggle.net.................................

COPYRIGHT©® 2002.

³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 1 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij

The Day Bosnia Attacked BadGadget
---------------------------------
A Log by BadGadget


<MACSMRTI> PLISS DONT BAN ME
<BadGadget> to late bucko
<BadGadget> I already did
<MACSMRTI> pliss
<MACSMRTI> i can help
<BadGadget> pliss?
<MACSMRTI> did you can
<MACSMRTI> help me
<BadGadget> I've gotta take a pliss
<BadGadget> brb
<BadGadget> ok back. it was a wonderful pliss
<BadGadget> so what's up buckshot?
<BadGadget> help me you can?
<BadGadget> are you yoda now?
<MACSMRTI> ok
<BadGadget> ok what?
<MACSMRTI> you hev dat i nuck
<MACSMRTI> soory
<MACSMRTI> soory
<BadGadget> yeah, I nucked once
<BadGadget> it hurt
<MACSMRTI> bay
<BadGadget> you have any luck nucking?
<MACSMRTI> Soory
<MACSMRTI> no
<MACSMRTI> this is erron
<MACSMRTI> error
<BadGadget> you don't like the nuck?
<MACSMRTI> i not have nuck
<MACSMRTI> i have help at nuck
<MACSMRTI> i like at nuck
<MACSMRTI> that i no
<MACSMRTI> how i nuck
<BadGadget> so buckshot. what's your feelings on what's going
on in cuba right now?
<BadGadget> you there nuckster?
<MACSMRTI> FUCK YOU
<MACSMRTI> YOUR MAMM
<BadGadget> I already did that. the record is 4 times in one day.
<BadGadget> how about you?
<MACSMRTI> hehe
<MACSMRTI> You hev nuck me
<MACSMRTI> yes
<MACSMRTI> nuck me
<MACSMRTI> i not
<MACSMRTI> good nuck
<MACSMRTI> bat
<BadGadget> good nuck?
<MACSMRTI> how you help me
<MACSMRTI> zhat
<MACSMRTI> i good at this
<BadGadget> you sound like a fucking stooge
<BadGadget> nuck nuck nuck
<MACSMRTI> i sey
<MACSMRTI> i not
<MACSMRTI> good
<BadGadget> you not?
<MACSMRTI> nock
<BadGadget> nick nock?
<BadGadget> nuck?
<MACSMRTI> i find help at this
<BadGadget> nick nack paddy whack?
<MACSMRTI> i find help at this
<BadGadget> give a dog a bone?
<MACSMRTI> FACK YOU LEARN SOME BOSNIA I LEARN GOOD ENGLISH
<MACSMRTI> I FUCK ENGLISH
<MACSMRTI> I NOT LIVE
<MACSMRTI> THAT I MAST IN SCHOOL ENGLSH learn
<MACSMRTI> i FUCK ENGLIsH AND THIS WOMEN AND MAN
<BadGadget> you obviously didn't learn it very well
<MACSMRTI> FUCK YOU AND YOUR eNGLISH
<BadGadget> ok, I will
øùú BadGadget fucks his english
<BadGadget> oh god, that feels so good
<MACSMRTI> I not live english your women not good you not good
you speak english you learn smoll at comp you face fack you i
fuck you and you LEARN
<MACSMRTI> bay
<BadGadget> I'm not good cause I speak english?
<BadGadget> and our women aren't good?
<BadGadget> are you mad cause they wont give you any lovin' ?
<BadGadget> do you hold a grudge against english women cause
they wont talk to you, or touch your love nuggets?
<MACSMRTI> I FUCK YOU WOMEN
<MACSMRTI> END YOUR MAN
<MACSMRTI> BAY
<BadGadget> you fuck our men to?
<MACSMRTI> you are ignore
<BadGadget> you swing both ways?
<MACSMRTI> duda
<BadGadget> duda
<BadGadget> dedo?
<BadGadget> yabba dabba do?

--------------
then after i got done with him, he changed his name and pretended to be
someone else.



<__WAR-MASTER__> ej
<__WAR-MASTER__> why are you ofending my friend
<BadGadget> cause its fun
<BadGadget> can I offend you?
<BadGadget> you're short, and your mom wears army boots
<__WAR-MASTER__> you mother fucking soon of a bitch shut up
<BadGadget> yeah, so?
<__WAR-MASTER__> hehehe
<BadGadget> so what if I like to fuck mothers
<BadGadget> its fun
<BadGadget> you should try it
<__WAR-MASTER__> !!!!!!!!!!!!??????????
<BadGadget> Ok you made your point. you know how to use the ! and the ? keys
<BadGadget> can you use any others?





³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 2 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij


+/=\=/=\=/=\=/=\=/=\=/=\=/+
| Setting up a Conference |
| By: gr3p |
| http://www.gr3p.net |
+\=/=\=/=\=/=\=/=\=/=\=/=\+

In this text file you will learn how to setup different types of
teleconferences. However, this file will not discuss bullshit features or
menus that you could learn on your own ;)

I. Choosing a Provider

There are literally tons of companies that offer audio conferencing. Such
as Att, Sprint, Qwest, j2, Raindance, Ilink, Verizon, Conference Center,
and even Eintercall. There is a cupple of free ones out there two but they
will not set up an 800 number for you ;/

II. Frauding the Provider

A. Att
Good ole leet ATnTs. You can either set these up by beiging or by credit
card. To set them up by credit card go to
http://www.att.com/conferencing/restools/index.html. To set them up by
beiging get a dial tone. Then dial an ANAC to get the ANI and write it down.
Now call 800-232-1234 and setup a conference. It would typically be like this:

*call ANAC* *hang up* *write down number* *call 800-232-1234*
Operator: Hello at&t teleconference services this is sherry how may I help you?
You: Hi I would like to setup a teleconference.
Operator: Can I have your conference folder id?
You: Im sorry I do not have one of those this is my first time calling.
Operator: Oh, well then lets setup a folder.
Operator: What is you name?
You: My name is Mr. Lar Lar.
Operator: And what is you fone number?
You: My fone number is 123-123-1234(you know the ANI from the ANAC earlier).
Operator: What is your address?
You: I live on 1234 Phreak Lane in Columbus Indiana. My zip is 12345.
Operator: Ok is this gonna be a operator dialed or a dial in conference?
You: Dial in please.
Operator: How many people including yourself are gonna be calling in?
You: 4 but I would like to have auto port expansion on.
Operator: How long will the call last?
You: Uhm... about 5 hours..
Operator: Alright I have a 4 port conference for 5 hours with auto port
expansion on. I will call you back shortly to verify billing.
You: Ok bye.
*hang up* *wait* *wait* *ring* *ring* *pick up*
You: Hello?
Operator: Hi is Mr. Lar Lar there?
You: Yes your speaking to him.
Operator: Well this is at&t you conference dial in number is 800-123-1234. Your
moderator code is 123456 and your participant code is 123455.
*write that down*
You: Ok thanks a lot!
Operator: Alright would you like a confirmation emailed or faxed to you?
You: No thanks.
Operator: Ok that is it.
You: Alright bye.
*grins* *hangs up the fone* *runs home to drop conf infro on irc*

They also have a java based (I _hate_ java) conference manager where you can
dial out, mute, and kick people at http://www.att.com/conferencemanager/.

B. Verizon
A new service by verizon just came out its called verizon conference
connections. These stay up for a long time and when you have quick start on
you can use them as a voice bridge. Just have your friends dial in whenever.
You can set these up by a credit card at
http://www22.verizon.com/conferenceconnections/html/home.html. Supposedly
you can also beige these but I have never done it. The dial in numbers for
verizon are 8664412942 and 9727172043. The only big downside to this is
canucks can not dial into the toll free number.

C. Conference Center
"Welcome to the conference center. Please enter your passcode followed by the
pound sign," said the hot automated operator. I have heard that more then a
million times. Anyways these are mad easy to crack just dial 800-260-7078
or 800-930-9525. They are six digit pins just keep trying. You will have a
ton of these in no time. Except the company has been ripped off so much lately
they even have a operator monitoring at night so these get shut down fast.

D. Raindance
These are awesome but a little harder to get. With a credit card you can get
one at http://www.raindaince.com. It has a really nice web panel that even
shows your ANI. The reason they are a little harder to get is because they
have a screwy way of validating credit cards. Even the valid ones get turned
down a lot. Another thing is never try signing up with an anonymous email
because you will get the same error as you would if your card was declined.

E. Eintercall or Intercall
These are the same thing except one is a web conference the other is an audio
conference. These are very similar to the Raindances. They seem to last
longer too. You can set these up on the fone by dialing 800-374-2441 and
telling them you want to setup a reservation-less plus conference. You will
need to have a fone line that you can sit by all day that will not lead back
to you. Why you ask? Because they will want to call you back :(

F. Sprint and Qwest
Sprint and Qwest are two very nice companies that offer teleconferencing.
You can set these up at http://www.sprint.com and http://www.qwest.com. To
set these up you will find a form on there site where you request an audio
conference. They will eventually call you back and setup an account with you.
That is a major pain in the ass but its worth it. Be on a look out for more
promotional accounts from sprint those were mad fun.

G. Ilink
I do not why im mentioning this company because if you do not know how to set
these up then you probably will not find out. The URL to set these up is kept
a secret. Either way this is worth mentioning cause it's a great voice over
IP conference service. They give you an 800 number that has an ANI logging
voice mail and an option to find the moderator. One neat thing is the moderator
can forward people that dial in to different number or just not let the person
in at all. :)

H. j2
The only conference service I know of that has no dial in. You _must_ use the
web panel for this to dial out to you and all your parties. It's a pain in
the ass but neat. They also give you a fax and voice mail number. They will
however shut these down for over usage. Can set these up with a credit card at
http://www.j2.com.

These were just examples of how to setup a conference with a few of the many
companies out there. The principal is all the same though. You either bill
them to a fone line, card them, or crack them. Another way is steal a companies
account and set one up but that does not happen very often.

III. Dialing in the Conference
If your such a dumb shit that you do not understand this section then do us a
favor and unplug your internet connection.

Btw I wanted to add Att conferences are _not_ to be confused with alliance.
Also alliance is pretty much dead and outdated so I did not put infro on it
in this file.

+/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=/=\=/=/=\=/=\+
| Mad shouts to: lexi, dropcode, heavenly, kleptic, adeamis, rambox, dewey, |
| dirv, execute, digid, voyweiser, coercion, and everyone I missed :D |
| Email: grthreep@gr3p.net http://www.gr3p.net |
+\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=\=/=/=\=/=/=\=/=\=/+ ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 3 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij


^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The History And Application Of TELETEXT

Written by GPC
On 14:54 21/04/02
heelflip_the_biscuit_tin@hotmail.com

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

You may ask yourself, why is GPC doing an article on TELETEXT and more
importantly, who is GPC? To answer the latter I am GPC (duh!) or Geldoff's
Poor Cousin. Anyway, I'm writing an article on TELETEXT because it was really
the first time that technology and the media were fully integrated but also
cos I happen to think that TELETEXT is quite dope :D.


Frequently asked TELETEXT (hense forth abbreviated to TT) questions:

1. What is TT?
Well if u live outside Europe, chances are you'll never have heard of TT.
This is cos for sum reason TT never really took off in America, and every1
else in the world does what America does (apart from Europe :P). But
politics aside, TT is a 'data carousel' (more about that later) text
information service that holds information in a linear ASCII format. It has
info on things such as TV listings and sports news. Teletext also has
subtitles (known as 'closed captions' in the US) and can display half on,
half off (its difficult to describe).

2. How does it work?
The actual teletext pages are broadcast in a hidden part of the television
signal (the Vertical Blanking Interval), and decoded by the television.
Teletext pages are accessed by a 3-figure number; on most channels, the
front page is on page 100.

3. Why isn't it instantaneous?
Many people ask this, as, after all, the information is just text and in
some cases it can take minutes to load. This is because when u select a
page, say 456, theres no way of telling the TT provider what page u have
asked for because analogue TV is only one way. So instead, the pages go
around on a 'data carousel' and this carousel will only stop at the page u
request. This way there is no user to provider link needed.

4. Isn't TT crap tho?
Well yes and no. Its not graphical apart from where ASCII is used to convey
images. It is, however, extremely helpful for txt services and it requires
no special equipment, technical knowledge or encur call costs. For these
reasons over 22 million people use teletext in one week.

5. Why cant the TV just cache the pages?
This is cos nearly all TVs dont have a cache, let alone the programming to
cache pages automatically. Plus there is a chance of blue screen moments of
death when the info in the cache clashes with ne updated info on the page.
But, if you have a TV card on ur box ur comp can cache it.


Digital TELETEXT

Digital television has 'digital teletext'. Despite the name, the only
thing common to 'analogue' teletext is the fact that the viewer looks at
information on the TV screen. The methods used to broadcast and decode it,
as well as the way it looks, are much removed. Some channels on
SkyDigital, the UK's digital satellite operator, carry analogue teletext
despite the promise of digital teletext. Sky's own-brand channels carry an
expanded version of SkyText, although it directs viewers to the Sky
Electronic Programme Guide instead of carrying TV listings. Channels on
the UK's digital terrestrial channels don't carry analogue teletext. This
was due to a decision by The Digital Television Group (DTG), who decided
that such things were unnecessary. In the long term, this is probably
true. Teletext Ltd. will be provides a service on channel 9 of digital
terrestrial television with the BBC Text on channel 10. To complicate
things for the providers of digital teletext, the systems opted for by Sky
and DTG are different. Whilst DTG decided to use MHEG-5, which is an ISO
standard, Sky decided on OpenTV. OpenTV is a proprietary 'solution for
digital interactive receivers'. Teletext has a demo of Digital Teletext on
their web site; the BBC also has some information on their digital site and
in a paper (in PDF format).

Recoding TELETEXT

Direct recording of TT is quite difficult but it is possible to decode the
old text pages from old S-VHS video tapes that also recorded the vertical
blanking interval.


Thats it every1, I hope this has opened ur eyes. Next time ur waiting for
the page u want to come round on the loop try to appreciate how amazing it
is :D

- Geldoff's Poor Cousin
heelflip_the_biscuit_tin@hotmail.com

(Stop laughing Timeless :P)
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 4 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij



Internet Security Myths
by fwaggle | Oct 25 '00 (a bit outdated. but still good)
<root@fwaggle.net>
http://www.fwaggle.net

* note: epinions.com sucks because they owe me $40
--------------------------------------------------------


I can't stress some of the points I'm about to make enough, because surprisingly
a lot of people panic when it comes to internet security. First of all, there are
these evil people called "hackers" which are lurking around every little corner
waiting to break into your computer.

First things first, I find it somewhat offensive that people even use the
term hacker any more. I mean, the term hacker in the 80s referred to a very
small and elitist group of people. These were people who learnt entire computer
systems, and how to program them, and exploit security features... Without any
documentation or help files... Simply from dialling into a stolen dial-up, and
experimenting. A very talented group of individuals...

Nowadays, you have any 12 year old geek with some of the latest "toolz" is now
a "hacker". Would you appreciate spending a decade of your life learning and
improving yourself, only to see in another decade, a stupid 12 year old hot-shot
categorized in the same place as you?

It may be the same outcome - someone's computer getting invaded in some way,
but it still kind of ticks me off.

Which brings us back to people's fear. All you need is some technical knowledge
(not a lot, just a basic grasp of a few concepts), and some common sense, and
you can be reasonably safe without spending a cent on software.

Firstly understand that to break into a computer, it must have a service which
you can exploit. Windows machines (the kind you're probably using to connect
to the internet now) usually have one service nad one service only. This is
called NetBIOS.

NetBIOS can be exploited with what's called an OOB Nuke. This is old hat,
anything over Windows 98a is immune to this.

There are ways to prevent your computer from even listening to NetBIOS on
the internet. If you read up on how to do this (and have a friend port-scan
you and it shows up empty), then there is no concievable way you could be
"hacked".

Unless, with the lack of services some pimply geek decides to create a service
of his own. This is what's known as a "trojan horse". Well known trojan horses
are (you may have heard of these):

Back Orifice
NetBus
SubSeven
Master's Paradise

How do these get onto your computer? Exactly like a virus. You have to run a
program which contains one. Which brings us to common sense. NEVER run programs
from sources you don't trust. You can set up email filters to block files which
end in .exe and so on.

Remember things like file extensions. Pictures end in .bmp, .gif, .jpg, and that's
about it. If it ENDS in anything else, don't download it.

If you run an email client such as Outlook Express, then disable Javascript in
Email. You don't need it, and it can be used for malicious purposes. If you use
Outlook, get the patches or disable Word Macros to prevent viruses such as
Melissa from entering your system.

As you can see, with a little common sense there really isn't much to be worried
about. If you can get a shell account who will give you permission to run a port
scanner, investigate the possibility of doing so (do it quick before the stupid
government makes it illegal).

If nothing shows up on the port scans, then there are no security holes. Therefore,
no need for Firewalls. If you don't accept files from other people, then there is no
way for a virus to enter your machine. Therefore, no real need for anti-virus software
(although it's probably a good idea anyway).

In my opinion, it's probably better to clean up your system yourself, armed with
some technical knowledge, rather than paying money from security software which
is only as good as the person who installs it anyway.

One final note, it's of great importance that if you have children, you
educate them in the dangers of accepting files from other people (even their
friends, you never know when one of their friends will experiment, leaving you
open to attacks from more experienced losers). If in doubt, set programs such
as ICQ to ignore file transfer requests (you can do this in the preferances
under events), and Email programs to automatically dump attachments with programs
in them.

Thanks for listening.

- fwaggle
<root@fwaggle.net>
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 5 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij

What the fuck was I smoking?
----------------------------
By: kleptic <drklep@roy.phonelosers.org>

At the chime of 12:00 pm I was awaken by a midget wearing sandals and suspenders.
He claimed his name was Blasko but I found that hard to believe. Ya see, he had
that sort of suspicious glare in his eyes that made me think that one of two
things have just occured. He either just got some mad midget lovin', or he killed
a man. Well, I wasn't one to ask questions. So I got out of bed and strolled to
the bathroom (the water closet if you're british) and proceeded to urinate in
the "John."

After I releived myself I then went to my basement where I work. Ya see, I don't
have your average job. Most people work in offices, or at resturants, or fast food
joints. Ya see, I donate sperm to the homeless (hey, vagrants need some sperm to,
ya bum!). Anyway, after hours of HARD work. I then took a journy up stairs to find
something to eat. There I found Mr. Blasko digging in my fridge. So I was like,
"Hey Blasko, what are you doing!?" And he was like, "I'm looking for something to eat."
And then I was like, "Hey what time is it?" And then he was like, "It's 3:00 pm." And
then I was all like, "No you're wrong........ IT'S FACE PUNCHING TIME!"

So I proceeded to punch Blasko in the face. Ya see, when it's face punching... faces
just gots ta get punched.

So After hours of pummeling Blasko, I opened my fridge to see what was there to eat.
To my suprise, I found nothing but a tube of cookie dough. So I made cookies for dinner.
That's right.... let me say it again for those that didn't catch what I just wrote...
COOKIES.... FOR... DINNER!!

What kind of chronic masturbator, manic depressive, butt monkey, would eat cookies for dinner??

Well, all signs point to me. Thats who!

Anyway, this story is going no where. I forgot what the moral was supposed to be. But maybe it's..
When a Midget wearing sandals and suspenders named Blasko is eating your hard earned food.
You punch them in the face. That's right.... in the fucking face.

- kleptic
drklep@roy.phonelosers.org

³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 6 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij

--------------------------------------------------------------------------------

How to get an 800 # for a local BBS

By: Turbanator

Ok first go to the drug store and open up a magazine
from the magazine rack. Pull out a subscription card
and keep it for the address listed for the magazine
company. Now get the number of the local AT&T
or Verizon office in your area and note it down.

Now go to your handy-dandy yellow pages and pick
out a technical type business, one not to small, and not
as big as Micro$oft. Write down the name of the company.

Next go to a payphone or op divert to spoof your ANI,
and dial 1-800-222-0400. When you call up tell the nice
op that you want to get an 800 number, and save time
by telling them that you want the 'Readyline Service'.
When they ask you for your name, just make up one,
or use one of the person you hate most. When asked for
the name of the company, give them the name of the
place you pulled out of the phonebook.When asked for
the billing address, give them the P.O. BOX of the address
of the company on the card u pulled from the magazine.
When they ask about a service address, give em the address
of your local AT&T or Verizon office.They'll ask for the
number you want it to route to, that would obviously
be the BBS #. For you contact number, just give em
one that doesnt answer, or is constantly busy.

If they ask for credit info, just make up the companys
name and the presidents name. When asked when
started, say anything after 1980, since most somewhat newer
companys are likely to set up an 800 #. If they ask for
annual sales, just say something about $160,000.

Once all that is complete as to have the number assigned
while your on the phone, and say you need the line ASAP.
Not too long from then it should be up an routing the selected
BBS #. This also works for dial-up access numbers, and even
normal phone numbers. Doing all this will ensure that you
get an 800 number you want, while having the monopoly
companys, AT&T and/or Verizon, paying for the number.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This text was brought to you by:
Turbanator -- turbanator2k2@roy.phonelosers.org AIM -- Turbanator2k2 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 7 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij

-= Getting an IP address through AIM =-

Easy trick that you might already know...
Say you hate someone and know they got an AIM name... get a fake one....
chat with them a bit and get them to accept a direct connection with you to
show them pics of your car or yourself anything will do to get them to accept a direct
connection..

What most people dont know is that when your "directly connected "
Your IP's are as well... so once connected, pop open a command prompt and
type "netstat" you should see some address along with the port number 4443
Just do a NSlookup on that address or for the simple minded folk / go in to
IRC and type /dns guy.address.com (replace that with his address)
And there ya go... now you got his IP and if you want to be naughty and
especially if the tard dosent have a firewall up, you can be :)

- evo255 (evo255x@hotmail.com)
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 8 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij



--=Brief Thoughts on Terror in the U.S.=--

-By TheEnigma-



With the growing popularity of suicide bombings and other terrorist activities
I decided I would let you know what some of my thoughts are on the subject.

The recent attacks on American civilians curtailed drastically if not
completely when we launched a military attack against the government sponsor
of that terrorism. I now feel the real shit is yet to come (not that the events of
9/11 were not real).

Americans were targeted by Arabic Terrorists back in the seventies and
eighties and we lived through it. Now it is 2002 and we must once again accept the
fact that we are the primary targets of homicide bombers, hijacked aircraft, and
god knows what else.

Israel has been dealing with this for years, and recently they have not done
a thing to really stop terrorism. They go blasting up Palestinian villages,
which is great for Sharon's ratings because it makes it appear that he's doing
something. But the reports say that foreign governments are sending the supplies
in to the terrorists, yet there are no reprisals against the foreign
governments. Also, reportedly wealthy Arabs are offering financial rewards to
suicide bombers'surviving family members. Uh...can anyone say "special ops
teams should eliminate said wealthy Arabs"? Special ops teams don't play well
on the evening news. Remember that our guys were in Afghanistan on day three,
but it wasn't reported for months.

I think that, should further suicide attacks or any other form of terrorism
visit the United States, we would visit upon supporters of suicide bombers the
principle that "payback is a bitch".

As far as defending against suicide bombers, there's an old military axiom:
"he who defends everything defends nothing". Do you think that, if detecting
suicide bombers was a simple matter of getting some dogs, maybe Israel would
have thought of that by now?

Isn't "Qaeda" Arabic for "Gore"?

Scary, huh?

³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 9 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij


=================================================================

This is a starter kit for those that are new and are very curious

=================================================================


Can't sleep.. bored? I have just the thing for all you wannabes....That is if your running
windows. First were going to d/l a few tools.

1. A damn good scanner........ http://packetstormsecurity.org/NT/scanners/superscan.zip.
Don't let the NT bother you it works on your winderz machine. .....you can set the ports you want
to scan from just one or two to all. Write your own .lst....VERY handy.

2. A browser that sends commands to port 80........http://www.astalavistalab.com/files/cgis4.zip.
You know all those CGI exploits you hear about. Well this app has all thats known for now and
you can ad new ones as there found.

3. A app that uses a file to find passwds and logins on a passwd protected site.......
http://www.astalavistalab.com/files/webhammerb.zip. Just get you a dictionary file and get after it.

Now I'm not going to tell you how to use these tools......You need to d/l them and play around
with them. It's my hope that in doing that you will start to see the wonders that can be done with
that windows machine that so many ppl think you can't hack with. If you have questions AFTER
learning these tools....drop by #hackerzlair on dalnet and ask what you need to know. The ppl
there are always happy to help if you just need a little push in the right direction.
But don't ask me...... " I know nothing"


blank
www.hackerzlair.org
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 10 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij

--=The Atomic Bomb=--

-by TheEnigma-


===============
!!!DISCLAMER!!!
===============
This article is for edicational purposes only. If you're actually stupid
enough to make an atomic bomb, then you should get punched in the face.
Outbreak Magazine or The Enigma is not held liable for your stupidity.
Read this article, learn about The Atomic Bomb and how it works. But
if you make one, and if you fuck yourself up and others. Then thats your
own god damn fault.
===============
!!!DISCLAMER!!!
===============

The following is part of a research paper I wrote.


On August 2nd 1939, just before the beginning of World War II, Albert
Einstein wrote to then President Franklin D. Roosevelt. Einstein and several
other scientists told Roosevelt of efforts in Nazi Germany to purify U-235
with which might in turn be used to build an atomic bomb. It was shortly
thereafter that the United States Government began the serious undertaking
known only then as the Manhattan Project. Simply put, the Manhattan Project
was committed to expedient research and production that would produce a
viable atomic bomb.

The most complicated issue to be addressed was the production of ample
amounts of `enriched' uranium to sustain a chain reaction. At the time,
Uranium-235 was very hard to extract. In fact, the ratio of conversion
from Uranium ore to Uranium metal is 500:1. An additional drawback is that
the 1 part of Uranium that is finally refined from the ore consists of over
99% Uranium-238, which is practically useless for an atomic bomb. To make it
even more difficult, U-235 and U-238 are precisely similar in their chemical
makeup. This proved to be as much of a challenge as separating a solution of
sucrose from a solution of glucose. No ordinary chemical extraction could
separate the two isotopes. Only mechanical methods could effectively separate
U-235 from U-238. Several scientists at Columbia University managed to solve
this dilemma.

A massive enrichment laboratory/plant was constructed at Oak Ridge, Tennessee.
H.C. Urey, along with his associates and colleagues at Columbia University,
devised a system that worked on the principle of gaseous diffusion.
Following this process, Ernest O. Lawrence (inventor of the Cyclotron) at the
University of California in Berkeley implemented a process involving magnetic
separation of the two isotopes.

Following the first two processes, a gas centrifuge was used to further
separate the lighter U-235 from the heavier non-fissionable U-238 by their mass.
Once all of these procedures had been completed, all that needed to be done was to
put to the test the entire concept behind atomic fission.

Over the course of six years, ranging from 1939 to 1945, more than 2 billion
dollars were spent on the Manhattan Project. The formulas for refining
Uranium and putting together a working bomb were created and seen to their logical
ends by some of the greatest minds of our time. Among these people who unleashed
the power of the atomic bomb was J. Robert Oppenheimer.

Oppenheimer was the major force behind the Manhattan Project. He literally
ran the show and saw to it that all of the great minds working on this project
made their brainstorms work. He oversaw the entire project from its conception to
its completion.

Finally the day came when all at Los Alamos would find out whether or not
The Gadget (code-named as such during its development) was either going to be
the colossal dud of the century or perhaps end the war. It all came down to a
fateful morning of midsummer, 1945.

At 5:29:45 (Mountain War Time) on July 16th, 1945, in a white blaze that
stretched from the basin of the Jemez Mountains in northern New Mexico to
the still-dark skies, The Gadget ushered in the Atomic Age. The light of the
explosion then turned orange as the atomic fireball began shooting upwards at
360 feet per second, reddening and pulsing as it cooled. The characteristic
mushroom cloud of radioactive vapor materialized at 30,000 feet. Beneath the
cloud, all that remained of the soil at the blast site were fragments of jade
green radioactive glass. ...All of this caused by the heat of the reaction.

The brilliant light from the detonation pierced the early morning skies with
such intensity that residents from a faraway neighboring community would swear
that the sun came up twice that day. Even more astonishing is that a blind girl
saw the flash 120 miles away.

Upon witnessing the explosion, reactions among the people who created it
were mixed. Isidor Rabi felt that the equilibrium in nature had been upset -- as
if humankind had become a threat to the world it inhabited. J. Robert
Oppenheimer, though ecstatic about the success of the project, quoted a remembered
fragment from Bhagavad Gita. "I am become Death," he said, "the destroyer of worlds."
Ken Bainbridge, the test director, told Oppenheimer, "Now we're all sons of
bitches."

Several participants, shortly after viewing the results, signed petitions
against loosing the monster they had created, but their protests fell on
deaf ears. As it later turned out, the Jornada del Muerto of New Mexico was not
the last site on planet Earth to experience an atomic explosion.

As many know, atomic bombs have been used only twice in warfare. The first
and foremost blast site of the atomic bomb is Hiroshima. A Uranium bomb (which
weighed in at over 4 & 1/2 tons) nicknamed "Little Boy" was dropped on
Hiroshima August 6th, 1945. The Aioi Bridge, one of 81 bridges connecting
the seven-branched delta of the Ota River, was the aiming point of the bomb.

Ground Zero was set at 1,980 feet. At 0815 hours, the bomb was dropped from
the Enola Gay. It missed by only 800 feet. At 0816 hours, in the flash of an
instant, 66,000 people were killed and 69,000 people were injured by a 10 kiloton
atomic explosion.

The point of total vaporization from the blast measured one half of a mile
in diameter. Total destruction ranged at one mile in diameter. Severe blast
damage carried as far as two miles in diameter. At two and a half miles, everything
flammable in the area burned. The remaining area of the blast zone was
riddled with serious blazes that stretched out to the final edge at a little over
three miles in diameter.

On August 9th 1945, Nagasaki fell to the same treatment as Hiroshima. Only
this time, a Plutonium bomb nicknamed "Fat Man" was dropped on the city. Even
though the "Fat Man" missed by over a mile and a half, it still leveled nearly half
the city. Nagasaki's population dropped in one split-second from 422,000 to
383,000. 39,000 were killed, over 25,000 were injured. That blast was less
than 10 kilotons as well. Estimates from physicists who have studied each atomic
explosion state that the bombs that were used had utilized only 1/10th of 1
percent of their respective explosive capabilities.

While the mere explosion from an atomic bomb is deadly enough, its
destructive ability doesn't stop there. Atomic fallout creates another hazard as well.
The rain that follows any atomic detonation is laden with radioactive particles.
Many survivors of the Hiroshima and Nagasaki blasts succumbed to radiation
poisoning due to this occurance.

The atomic detonation also has the hidden lethal surprise of affecting the
future generations of those who live through it. Leukemia is among the
greatest of afflictions that are passed on to the offspring of survivors.

While the main purpose behind the atomic bomb is obvious, there are many by-
products that have been brought into consideration in the use of all weapons
atomic. With one small atomic bomb, a massive area's communications, travel
and machinery will grind to a dead halt due to the EMP (Electro- Magnetic Pulse)
that is radiated from a high-altitude atomic detonation. These high-level
detonations are hardly lethal, yet they deliver a serious enough EMP to
scramble any and all things electronic ranging from copper wires all the way
up to a computer's CPU within a 50 mile radius.

At one time, during the early days of The Atomic Age, it was a popular
notion that one day atomic bombs would one day be used in mining operations and
perhaps aid in the construction of another Panama Canal. Needless to say, it
never came about. Instead, the military applications of atomic destruction
increased. Atomic tests off of the Bikini Atoll and several other sites were
common up until the Nuclear Test Ban Treaty was introduced. Photos of
nuclear test sites here in the United States can be obtained through the Freedom of
Information Act.


---------------------------
Links
---------------------------

http://www.atomicarchive.com/
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 11 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij


--Automatic Number Identification (ANI). -dropcode. ::o4.o6.2oo2::---.

----------------------------------------------------------------------.
<rip src="www22.verizon.com/wholesale/glossary/">

--/
. "The number transmitted through the network that identifies the
. calling party. Technically, a Common Channel Interoffice
. Signaling (CCIS) parameter that refers to the number
. transmitted on an out-of-band basis through the SS7 signaling
. network identifying the calling party's telephone number. Also
. known as Calling Party Number (CPN)."
--\

</rip src="www22.verizon.com/wholesale/glossary/">
----------------------------------------------------------------------.

ANI is the standard in CCIS for passing the originators CPN
(telefone number) between LECs. Each individual LEC (local exchange
carrier, or central office) uses an out-of-band signalling method to
transfer the loop ID and routing codes.

----------------------------------------------------------------------.

I've yet to confirm whether the original implementation was infact
split into multiple classifications or not, but the 4 classes of ANI
rumoured to have existed in the beginning are as follows:

Level A: Contained only the NPA (area code) of the calling party.
Level B: Contained the NPA and City of the calling party.
Level C: Contained the NPA, City and the calling parties prefix, or
switching exchange.
Level D: La whole anchaloda. NPA-Nxx-xxxx/city.

whether this is fact or fable, since the implementation of SS7, every
LEC using the SS7 protocal forwards Level D ANI. A recent developement
in CLID (Calling Line IDentification), known as ANI II, makes use of
a two digit pair to identify the Class of Service, or type of line
the caller is using, ie. POTS, COCOT, Payfone, etc.

----------------------------------------------------------------------.

ANI accross an analog trunk is sent in the form of DTMF/MF signalling
tones. Though the syntax varies slightly between carriers, it is
generally similar to:

KP-[NPA]-Nxx-xxxx-i-ST
.---------.-------------.----------------------------.----------------.
|code.....|decode.......|notes.......................|dtmf/mf.........|
'---------'-------------'----------------------------'----------------'
|kp.......|key pulse....|seizes a trunk..............|11khz/17khz.....|
|[npa]....|area code....|long distance calls only....|n/a.............|
|Nxx-xxxx.|loop id......|calling party number, cpn...|n/a.............|
|i........|info digit...|identifies class of service.|n/a.............|
|st.......|start signal.|end of ANI info.............|15khz/17khz.....|
'---------'--------------'---------------------------'----------------'
|..........the information digit is sometimes sent after kp...........|
'---------------------------------------------------------------------'

ANI accross data trunks is sent as the header of a data packet. Due to
sketchy standards within the SS7 protocal, i was unable to include an
exact diagram of how these packets are formatted.

----------------------------------------------------------------------.

All Wide Area Telephone/Telecom Service, or WATS lines are put through
a WATS Serving Office (WSO). The WSO has equipment capable of reading/
logging ANI.

----------------------------------------------------------------------.

Operator assisted dialing does not always forward ANI with the
original CPN. Often the equipment used by the TSPS will forward the
call with an ANIF or ANI Fail substituting the originators number.

Enhancements in the Automatic Intercept System (or CCI's DAIS II)
makes it possible for an end office to flag a line generating an
unusually large amount of ANIFs.

----------------------------------------------------------------------.

Well, i guess thats about it for this file. i lub you savvy. sorry
bout the last one, you know you're mai favourite.

-dropcode ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 12 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij


=================================
The Return To Mianus (the sequal)
=================================

[ka] join (#mianus) kleptic (~piss-off@24.247.247.136)
[ka] topic for (#mianus) (HAPPY BDAY MISS LAILA)
[ka] topic by (erika_) (Mon Jun 03 01:18:47 2002)
[ka] You're not opped on #mianus
[ka] hash (#mianus) 0.986sec (5)
[ka] mode (#mianus) (+n )
<kleptic> hey, mianus is a grand place
<kleptic> hi ops in mianus!
øùú kleptic waves at the ops in mianus
<kleptic> there's new diseases in mianus.
[ka] join (#mianus) kleptic (~piss-off@24.247.247.136)
[ka] topic for (#mianus) (HAPPY BDAY MISS LAILA)
[ka] topic by (erika_) (Mon Jun 03 01:18:47 2002)
[ka] You're not opped on #mianus
[ka] hash (#mianus) 0.931sec (5)
<kleptic> hey cletus.. who's coming over for thanksgiving?
<kleptic> I don't know.. but we're cooking a big turkey
<kleptic> that ain't no turkey
<kleptic> that's a big COCK
<Big_CoCk> FREAK
<Big_CoCk> Keep it in the z0o
[ka] join (#mianus) orange_julius (~fdag@216.209.132.182)
<orange_julius> sorry
[ka] join (#mianus) JayP (a@ACBA0468.ipt.aol.com)
[ka] mode (#mianus) +o JayP (ChanServ)
<kleptic> with my big cock
<orange_julius> lol
[ka] nick(Big_CoCk) to (Little_cock)
[ka] leave (#mianus) Little_cock (sekjhsad@pcp671339pcs.indpnd01.mo.comcast.net)
[ka] join (#mianus) Little_cock (sekjhsad@pcp671339pcs.indpnd01.mo.comcast.net)
<orange_julius> im gona have some funn in mianus this summer
<Little_cock> I love mianus
<@JayP> i hear we have lamers in here!
<kleptic> yup
<kleptic> lamers in mianus
<kleptic> mianus is infested
<@JayP> stfu!
[ka] join (#mianus) KHiggs (Dentalflos@AC99624A.ipt.aol.com)
<@New_Disease> wow. imagine that...
<kleptic> shut the fuck up in mianus?
<Little_cock> with a (little_cock)
[ka] mode (#mianus) +o KHiggs (JayP)
<@New_Disease> welcome to the club, KHiggs
<kleptic> mianus!
[ka] mode (#mianus) +o JayP (JayP)
<kleptic> CLub MIanus!
<@KHiggs> gracias ND
<@KHiggs> and thanks Jay :)
<orange_julius> CLUB MIANUS
[ka] mode (#mianus) -o JayP (JayP)
<JayP> lamers!
<@New_Disease> shut up. no one asked your stupid ass
<kleptic> yes, mianus is infested with lamers
<Little_cock> Get ready for his shitty remix
<kleptic> I have lamers in mianus
[ka] leave (#mianus) JayP (a@ACBA0468.ipt.aol.com)
[ka] join (#mianus) JayP (a@ACBA0468.ipt.aol.com)
[ka] mode (#mianus) +o JayP (ChanServ)
[ka] leave (#mianus) JayP (a@ACBA0468.ipt.aol.com)
[ka] join (#mianus) JayP (a@ACBA0468.ipt.aol.com)
[ka] mode (#mianus) +o JayP (ChanServ)
[ka] mode (#mianus) +m (JayP)
<@JayP> fucking fags!
<kleptic> asdf
[ka] #mianus Cannot send to channel
<@KHiggs> hah
<@New_Disease> how did they find mianus?
<@JayP> i was thinking that
<kleptic> haha
<@New_Disease> hey, idiots. how did you find this channel?
<@JayP> they can't talk!
[ka] mode (#mianus) -m (JayP)
<@KHiggs> it's moderated nd
<kleptic> haha
<@JayP> they can now.
<@KHiggs> erm
<@KHiggs> well it was
<@New_Disease> oh..sorry.
<@JayP> kleptic, how did you find this channel?
<kleptic> <@New_Disease> how did they find mianus?
<kleptic> haha
øùú New_Disease does some random sign language
<orange_julius> lol
<Little_cock> Sorry for talking bad about mianus
<kleptic> Outbreak Magazine did a log in this channel
<@JayP> hahaha @ kleptic
<kleptic> its hilarious
<@JayP> wtf is Outbreak Magazine
<kleptic> so everyone probably joins it for that reason
<kleptic> an underground text file e-zine
<@JayP> show me.
<orange_julius> shit, ive gota scratch mianus
<kleptic> http://www.fwaggle.net/~outbreak/
<@JayP> hahaha
<kleptic> its in issue #5
<@JayP> thanks
<kleptic> uh huh
<kleptic> now back to business in mianus
<@JayP> hahaha
øùú KHiggs dies from all the corniness in mianus
<@JayP> kleptic, which text file when i unzip it
<orange_julius> mianus is infestid by corninus
<@KHiggs> fuck this
[ka] leave (#mianus) KHiggs (Dentalflos@AC99624A.ipt.aol.com)
<@JayP> haha, found it
<orange_julius> shit... mianus is gettin all wet and brown
<@New_Disease> no need for racism
<@JayP> hahaha @ this

  
log
<kleptic> there's a log in mianus?
<kleptic> hehe ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 13 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij

--------------------------------------------------------------------------------
.-- Payphone line fiasco. -Coercion. ::o4.o6.2oo2::
---.
--------------------------------------------------------------------------------
By Coercion

What's up everyone? This is my first text file, although I cannot really call
what I am going to write in the least bit solid or what one would call elite
everything in this text file is purely speculative so bear with it's
inaccuracy if any mistakes are found.

Recently I have gotten interested in payphones and such since, of course they
are so interesting to look at with their shiney buttons and fake recordings ;)

So anyhow this brings me to the next part of payphones which I can state are
just coin gateways to a semi-normal phone line. With my experience with
payphones now is that bell and all those fatcat companies make the line in
such a fashion that outgoing calls can be made but incoming calls cannot be
received which is quite an interesting phenomenon. When it comes to COCOT's
though we get a carrier tone... but lets not go into that for now.

Knowing this it gives us phreakers a lot of advantages that is if you find a
way of doing what I state below through another method since not all of us
are fortunate enough for the following circumstances.

What if you have the line of a bocot or even a few bocot's going through the
same bridging base (green boxens on the road) or dslams (the brown boxens)
as your own phone line, it means that you have a line of which calls being
made are untracked and secondly cannot be called back except by the op but what's
the chance that out of nowhere a telco operator randomly chooses that bocot
to call out of all those other thousands. Sure it may happen but your reaction
time in such an emergency will be a lot faster than the local telco company.

The first mistake they made was that it's actually the payphone that is
restricting you from dialing out directly to the line, because of that
beiging is possible but instead how about just hooking it upto your line or even
better have it as a second phone line, you have an unrestricted phone line which
you can scan off of and do any bloody fucking thing you like except in most
instances create conferences.

This then raises the question if you have a dtmf decoder device and a small
amount of equipment it would be easy enough to construct a box to do this:

When you pickup your phone and enter in a code it puts you through to the
payphone line and disconnects the payphone so any passerby who tries to use
the phone will find it "Out of Order". Sure it would be just peachy keen if
I would give you the plans to such a box but wouldn't it be better if you
build it yourself with your own custom modifications to enable your microwave to
heat up your butter to drink?

Apart from a dtmf decoder device if you have a ringback number why not have
a goldbox hooked up in-between your line to the dtmf decoder.

A diagram would be like this:


_________<<__________<<____________
| |
_____________ V ^
|Incoming Line|-> YOUR LINE -->>-- GOLDBOX |
|____START____| DEFAULT/UNSUCCESSFUL CODE
| ^
V |
DTMF DECODER -->>-- Timer

|
V

SUCCESSFUL CODE

|
V

Payphone line & switch
triggered so line on
payphone goes dead

As we see above basically before it goes through to your own line you go
through 2 devices basically the practicality of this setup is much simpler
than it seems since the Timer is usually part of the DTMF Decoder device
which of course can be setup for 3 seconds an amount of time which no one
feels so its virtually undetectable and if hidden well at the Dslam or
Bridging Base you should be perfectly fine. So in conclusion Payphone lines
are handy use them to your advantages and most of all use your common sense
I don't like seeing people being caught for stupidity or reasons otherwise.

I realize that this text isn't as thorough as how people would like but
then again working for your shit is always good and most of all you
basically learn a lot so take care have fun and happy phreaking.

mmmm.... FACE!
:)



Shouts to all mah bruh's on dalnet I would like to list everyone part of my
shouts but unfortunately it's a long list and I am way to fucking lazy to
type em all out if you know you should be here and you feel a great deal of
injustice not being here please fucking email me at bah2u@hotmail.com apart
from that remember,
:) :) :) :) :) :) :) :) :) :) :) :D :P :)
-Coercion

³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 14 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij



GGGGGGG RRRRR EEEEEE YY YY BBBBBB OOOOO XX XX
GGGGGGG RRRRRR EEEEEE YY YY BBBBBBB OOOOOOO XX XX
GG RR RR EE YYYY BB BB OO OO XX XX
GG GGG RRRRR EEEE YY BBBBB OO OO XXXX
GG GG RR RR EE YY BB BB OO OO XX XX
GGGGGGG RR RR EEEEEE YY BBBBBBB OOOOOOO XX XX
GGGGGGG RR RR EEEEEE YY BBBBBB OOOOO XX XX

By Orange Julius (AKA) c-k-y

Purpose

Have you ever gone beiging and some guy walks up on you and asks you what
you're doing, well it's happened to me... you usually can jet, but odds are
he might know you and might see your face, so why don't we get around having
him even comes close to seeing your face. I have made this box, it's called a
grey box cause that's the color that it mainly was. This box will buzz if
someone enters the area you're in. Most censors have a 60ft range. If you're
willing to open someones TNI and place long distance calls to their line
then you're probably willing to steal a censor light from someones yard.
Unless you're pretty tall, you're gonna need a buddy to boost you up and
some wire snippers to cut the lines going from the censor. Watch out, there
is 120v going through the power line. This can be potentially deadly. You
should probably get your friend to stand on a milk crate or a large rubber
platform... Enough Of This Crap!!!

Materials

Light Censor
Magnet Buzzer
6-12 lantern Battery

Schematic

c=censor
b=battery
MB=magnet buzzer
.= + line
_= - line

CCCCCCC.......out.......MB
CCCCCCC_________________MB
CCCCCCC
CCCCCCC.......in........B
CCCCCCC_________________B

Step By Step

If you're too stupid to figure out the schematic you've got to do this... on
your censor will be 4 wires, two for your output=light (in this case, magnet
buzzer) and output DC (in this case, AC). Now wire the DC output to a 12v
battery and the other 2 to the magnet buzzer. Now you're gonna need a small
magnet buzzer. Magnet buzzers are those things they use in fire alarm
systems. The great thing about them is they don't need an amplifier. They're
just a magnet that spins and creates a low bass tone... You don't want it to
be too loud...

Disclaimer #1

This Is Meant for Educational Purposes Only, and is not meant To Be Directly
Related To Illegal Conduct Such As Beige-Boxing. I Also Do Not Advice
Stealing the Censor or Take Responsibility for People Who Use This Document
In an Illegal sense...

Disclaimer #2

Anyone Who Alters This Text will be Sentenced To Hell, Or Better Yet,
Canada...





³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ
+-+-+-+-+-+-+-+-+
Issue #6 - Page 15 of 16
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij



######################################################################
## firewall detection, interrogation and penetration. -dropcode ##
######################################################################

intro.

on todays internet its rare to find a system that isn't behind some
type of firewall. be it a software based application gateway, a hard-
ware based packet filtering or logging gateway, or some type of acd,
firewalls are everywhere.

this text will cover various techniques to detect firewalls on the
target network, remotely determine the firewalls rulesets and map out
the internal network through the firewall.

detection.

the detection of a firewall on a target network is generally quite
simple. as the function of a firewall is to prohibit certain types
of data from passing beyond itself and into the internal network, they
can easily be discovered by monitoring an orchestrated data flow
between you and a target system.

detection with traceroute.

traceroute is a network administration tool used to map a route
between you and a destination box. by default it launches a UDP packet
with a low TTL, or time to live, flag set in the IP header. the
objective is to force an ICMP TIME_EXCEEDED response for every system
on the route. for instance, we start by sending a UDP packet to our
target host with a TTL of 1, it will reach the first system on the
route and timeout there. that first system will discard the packet and
send an ICMP TIME_EXCEEDED packet back to you. you'll then send
another UDP packet, but this time the TTL will be set to 2. it will
terminate on the second system and we'll recieve a TIME_EXCEEDED from
them. so on, et cetera, ad nauseum. thats the general idea, to be
technical the standard with traceroute is to send three probes with
the same TTL before the incrementation. also, every packet is sent
to one port higher then the preceeding packet. so, not only does the
TTL increment, but the port does as well.

now, that probably seemed like i was getting way off track, but as
you'll soon see its all relevant.

--
bash-2.05a$ traceroute 0.0.0.8
traceroute to 0.0.0.8 (0.0.0.8), 64 hops max, 40 byte packets
1 0.0.0.2 (0.0.0.2) 0.630 ms 0.470 ms 0.413 ms
2 0.0.0.4 (0.0.0.4) 1.599 ms 1.505 ms 1.809 ms
3 0.0.0.6 (0.0.0.6) 1.759 ms 1.714 ms 2.847 ms
4 * * *
--

for some reason, the machine on hop 4 failed to return an ICMP
TIME_EXCEEDED. theres a good chance that this box is a firewall
filtering incoming UDP (or outgoing ICMP?). in either case, we've
probably found a firewall :).

for windows users, the microsoft implementation of traceroute,
tracert uses ICMP by default.

of course, traceroute/tracert isn't the only way to find a firewall.
there are many ways, often if an ICMP ECHO_REQUEST (ping) returns no
ECHO_REPLY its because theres a firewall filtering icmp (note:
this doesn't apply to users on dalnet *smirk*). there are plenty
more tools that can be used in firewall detection, but i'll leave
that to your imagination.

interrogation.

interrogation is the process of remotely determining the rulebase of
a firewall systematically.

in the previous section we have already done a bit of basic
interrogation. we know that the firewall at hop 4 filters either
incoming UDP or outgoing ICMP on at least the port we connected
to, which is unknown to us. using traceroutes -p attribute we can
specify a port to start at and determine if any ports allow UDP. a
good place to start looking is DNS (port 53) since some DNS transfers
require UDP theres a good chance it will allow UDP packets through
this port.

since traceroute increments the destination port for each packet we
need to do a bit of math. there are three packets for each hop and
4 hops till we reach the firewall. so the port to start at will be
53 - (4 * 3) - 1 giving us 40.

--
bash-2.05a$ traceroute -p40 0.0.0.8
traceroute to 0.0.0.8 (0.0.0.8), 64 hops max, 40 byte packets
1 0.0.0.2 (0.0.0.2) 0.630 ms 0.470 ms 0.413 ms
2 0.0.0.4 (0.0.0.4) 1.599 ms 1.505 ms 1.809 ms
3 0.0.0.6 (0.0.0.6) 1.759 ms 1.714 ms 2.847 ms
4 0.0.0.8 (0.0.0.8) 1.831 ms 1.918 ms 1.303 ms
--

we now know that the firewall allows UDP to pass through port 53 :)

hping and firewalk are two of the most important tools needed
for successful firewall interogation. firewalk is a console app
used to check for open ports on a firewall. it sends data to a live
system behind the firewall on various ports to see what is allowed.

hping is a tool for pinging remote systems, but it has alot of nice
attributes for playing with different parts of the actual tcp
packets. sometimes you can change a few of the features of a packet
and a firewall will let it through. hping also gives you the option
of fragmenting packets. this means that the packet will be split into
more than one packet. most firewalls nowadays have handlers for
fragmentation, but you may find one that doesn't recognize the
packets and lets them through.

now nmap. as important as firewalk and hping are, nmap owns them both
hands down. it is the single most important tool in your armoury.
ports scanned with nmap will output filtered when there is
no SYN/ACK or RST/ACK recieved from the destination. if nmap outputs
unfiltered it means we recieved an RST/ACK which means our packets
are passing through the firewall but the destination machine isn't
listening on the destination port.

penetration.

using the methods above, it is possible to map out the network behind
a firewall. similar to ping sweeping, only every packet sent is care-
fully formatted so to not be blocked by the firewall.

--

well thats about all for this text. if anyone has any questions, try
me at uberego@hotmail.com. regular greets to my bestest phrends:
kleptic, ramb0x, gr3p, jenny, lexi, oj, smiley, dirv, adeamis.
and to my newest phrends: |arry, turb. and anyone i forgot.

sav, i love you.

ps. maybe someday i'll be as hardcore as failure. *throws fone at
wall* till then, i'll keep practicing.

-dropcode
_______________________________________________________________
|______________________________________________________________ |
|| ||
|| ___ _ ____ _ ||
|| / _ \ _ _| |_| __ ) _ __ ___ __ _| | _ ||
|| | | | | | | | __| _ \| '__/ _ \/ _` | |/ / ||
|| | |_| | |_| | |_| |_) | | | __/ (_| | < ||
|| \___/ \__,_|\__|____/|_| \___|\__,_|_|\_\ ||
|| ||
||_____--------------------------------------------------______||
|_______/-----------------------------------------------\_______|

___ _ _
| __(_)_ _ __ _| |
| _|| | ' \/ _` | |
__ |_| |_|_||_\__,_|_|
\ \ / /__ _ _ __| |___
\ \/\/ / _ \ '_/ _` (_-<
\_/\_/\___/_| \__,_/__/



ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ

PUT THE WORDS IN HERE:

Hey Folks! Well, here you go. Issue #6 of Outbreak Magazine.
We at Outbreak hope you enjoyed this issue. It's full of some
helpful tips, well informed articles, and some comical texts.

If you have anything worth submitting. Please send your text
to us. We read everything that gets sent our way.

Send all articles to: outbreak@fwaggle.net

Oh yeah, theres a bonus in this issue. A special prank phone
call by our editor kleptic. Enjoy.


Thanks!

- Outbreak Staff


ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
++++++++++++++++++++++++++WATCH THIS SPACE++++++++++++++++++++++
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij
+-+-+-+-+-+-+-+-+
-°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°ð-|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛÛÛ²²²±±°-
+-+-+-+-+-+-+-+-+
³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij

Outbreak Contents may not be used with out express written permission
By the Editor - outbreak@fwaggle.net

COPYRIGHT©® 2002.


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT