Happy Hacker Digest Feb. 5, 1997
This is a moderated list for discussions of *legal* hacking.
Carolyn Meinel. Please don't send us anything you wouldn't email
friendly neighborhood narc, OK? Send posts to .
To subscribe or unsubscribe,
use the subscribe boxes on the menubar. If you decide you
just want to
use the forum and not get these mailings, I promise my feelings
hurt if you unsubscribe from this list.
Happy hacking -- and ne auderis delere orbem rigidum meum!
Moderator: just in case you don't read the boiler plate above,
let me remind
you. DON'T EMAIL US ANY MESSAGES ABOUT CRIMES YOU MAY HAVE COMMITTED!!@#!!
We are against computer crime. Get it?
Recently I found a site online that acts as an online betting
agency. The servers are located in Barbados the company
is based out
of Las Vegas. On their site they offer $1000.00 to anyone
alter the results or account balances of anyone on their server.
Well I could always use a $1000.00 but I was wondering.
1.) This is an international hack to Barbados what are the
2.) Does their post constitute permission or do I need to
them in advance and pre arrange written permission.
3.) If they do give me permission and I don't do any phone
in the process of hacking them, what other laws will I probably
Anyway just trying to work and stay out of the pen in the
P.S. Happy hacker is one of the best things to hit the newbie
community. Thanks for the taking the risks and putting
in the time.
(Moderator: If I wanted to both get some sick entertainment
and shut down an
Internet gambling outfit -- oh, yes, I think gambling is a nasty
the math-challenged -- guess what I would do? I would use a good
to hack their Web site and put in a message saying "Pleeeze
gambling site! Steal money from us! Screw up our accounts! We'll
luv ya for
it. Honest!" Then guys with guns with silencers will pay
their visits to the
clueless newbie hackers they catch breaking into their computers.
away clean. Fortunately, however, I'm not that kind of a woman.
So to live
long and prosper DON"T HACK THEIR SITE!!!! In general, I
figure that unless
I have a signed, notarized contract to hack a site, I'm not going
the many, MANY kinds of trouble lurking there.)
(Moderator: the following post about how to disable Cybersitter
is not meant
to encourage you minors on this list to fill your heads with
Parents who are using this list need to know how easily Cybersitter
hacked. Parents, please remember to supervise your children's
use of this
list, OK? And don't let them hack any gambling operations.)
From: "Ryan" <email@example.com>
Subject: Cyber Sitter!!!!!!
Here's how to 'hack' Cyber sitter.
In the Windows Directory, edit the field Cy.alt (or something
like that) in
Notepad. This file contains all the violations made.
Only took 5 mins to
work out, and that was only as long as it took me to open all
Cybersitter files in notepad! They take kids for fools
(So I'm slightly
older than the 15 year old kids whom this would appeal to).
From: Saint Waldo <firstname.lastname@example.org>
Subject: Beginner's Hole...
I'm tired of lurking and want to make sure that the
Spookys out there MAKE a file on me if they don't
already have one.
Here is something to think about the next time you
see an office full of Win95 crap boxes running Word.
In the last version I played with (6.0), it was
possible to sneak into any users "personal Documents"
folder through the file open box. I tried this on
a remote drive whose personal docs folder was not shared.
For a little background, a guy in our office was
wasting a lot of time and office resources on his
own "consulting work". We knew he was using the
office software for his own business. He was tying
up phone lines, distracting people with BS about
vapor-tech, and basically a pain. My manager and I
wanted to get the poop on what he was doing, and get
some proof that he was improperly using company time
and resources. His machine was on and logged into
the network, and the kicker was that he was USING it
while we did this hack.
He wasn't using word. We started up his copy of word,
File: Open. Popped up to the network level, and hit his
machine. We noticed that, even though normal surfing
(i.e. File manager) would NOT show us the personal
docs folder, his word over the network would. We got
a good look at everything, and saved copies on our
machine (even the passworded ones were copyable).
The poop we needed was there, and we filed it away for
I know it's a "lame" hack, but it was fun cuz we
looking at things this guy KNEW he didn't want seen,
KNEW was incriminating, and KNEW would get him in trub.
For a paranoiac, his knowledge of how to keep things a
It also might lead you to some other ways that the
Godzilla of OS's fails in it's claim of security, and
take steps to make sure you can plug up the holes.
The Above mini-Hack should be tested while playing
Sonic Youth's "Death Valley 69" at MaxVol.
Saint Waldo I.P./E.
"Callidus ad Infinitum, Magister ad Nihil."
(Moderator's note: my Latin quote is kewler than your Latin
auderis delere orbem rigidum meum.")
From: Marco Pappalardo <email@example.com>
here are answers to some of the latest posts :
to firstname.lastname@example.org (if that is his address) :
congratulations for *FINALLY* discovering RFC's and welcome to
of -real- hacking (read 'learning as much as possible')
to Enrique F Azuara who wants to know what log files to erase,
wmtp, umtp and lastlog would be a good start...
(Moderator's note: erasing these files is destroying evidence,
in itself a
crime. Trust me, erasing or altering these is not enough to keep
From: Marco Pappalardo <email@example.com>
Subject: answers (continued)
to firstname.lastname@example.org :
they look like *nix systems (Unix, Linux, BSD,...) No wonder
passwords don't work, no one uses them anymore. If I were you
port 25 for remote sendmail exploits, getting an account if it's
university for local exploits, checking directories that are
exported if they have NFS/NIS,...
to email@example.com :
no no no finger doesn't bring you up the user's password (that'd
good to be true...) It just gives you info about that user, thus
you clues about what his password MIGHT be. Sorry you'll have
and finally to you Carolyn :
the exploits idea is good but you may have noticed there's no
code in the posts. I don't care I get them through Bugtraq just
but I doubt the newbies that go around asking how to hack will
out how to code an exploit from the info you give... :-)
One last thought : I used to think of myself as a newbie but
months of intensive reading and collecting exploits all over
the net I
realized that when true hackers talk about stuff I actually understand
what they're talking about and I could answer most of the questions
Happy Hacker...Could it be ...? YES ! I have finally evolved
status of newbie hacker wannabe to intermediate hacker ! Reading
does pay after all !!! :-)
P.S.: I know nobody cares but I just felt like letting everyone
From: root <firstname.lastname@example.org>
Subject: Re: Happy Hacker Digest Feb. 2-4, 1997
> If you load /etc/services into your favorite text editor
or just cat it
> through 'more', you'll see a list of every port a Unix can
> what it does, the protocol layer it monitors, and maybe
> What port 15 does is it responds with network statistics,
like the load
> the processor of the system is running, what method is being
> access that process (in your example, a direct telnet session),
> of memory that process is addressing, and suchlike.
> (Moderator: what he means by "cat it through 'more'
is to give the command:
> ->more /etc/services/
> On some Unix systems you can also give the command:
> ->less /etc/services
> This is actually an obscure programmers' joke. See if you
can find the
> difference in the two commands.)
actually, by "cat it through more" he meant "cat
/etc/services | more". But
it won't make a difference, except in helping you to understand
I have never seen less (much better than more, but not as good
as most <G>)
on anything but a Linux box.
<-> <-> <->
> FROM: "Enrique F. Azuara" <email@example.com>
> Subject: what to delete after a hack?????
> I was wondering what logs or files should be modified in
a Unix system after
> a hack. I want to start my first hack but I need to know
what not to do.
> BTW does anyone know if hacking is illegal in Mexico??,
are here any groups,
> clubs, or something to share a drink or two?
> see ya
> henry jr.
> (Moderator: Above all, don't erase the system files. Elite
hackers do no
> harm. Period!
In general, you should also *edit* the logfiles, but
remove them. You can find the names of the system logfiles
on many Unixes
by viewing /etc/syslog.conf. The simplest way to do this
is to record the
time you start hacking their system, since loglines are always
Note that if their are entries like a.b <TABS> @hostname,
and you cannot
hack into @hostname, it is likely best to not modify any of the
their is something auth., or security., or >.notice.
(Read man syslog if you
didn't understand that)
--- James Mastros
(Moderator: many logging programs save your log file in memory
write it to disk after you log off of the system. So you're still
trouble. Hint: *part* of the solution is to figure out how to
log on in such
a way that there will be no logging at all of your visit. Galf
knows how to
do that. But it's against the law. One of these days the FBI
file on galf
will get big enough for a bust. Think about it, galf, how come
we knew so
much about your hack even though you logged on to the Happy Hacker
server box in such a way that there was no shell logging? )
From: root <firstname.lastname@example.org>
Subject: Re: Happy Hacker Digest Feb. 2-4, 1997 (continued)
> From: Kenn Evitt <email@example.com>
> Subject: linux slackware
> I understood how to use minicom with the pppd daemon to
open a PPP
> connection, but how can i do this and connect to a specific
In your /etc/resolv.conf, add "nameserver nnn.nnn.nnn.nnn".
If you don't
already have a /etc/resolv.conf, you should also have a "domain
(note the trailing dot) in the file.
> From: "J Leane" <firstname.lastname@example.org>
> Hi IM new to happy hacker...
> Any ideas on hacking bbs's??
Yeha, don't. Generally, if their is anything worth getting
at a BBS, the
best way to get to it is to UPLOAD good stuff. If you have
warez to upload,
send a e-mail with an attachment to the SysOp, do not upload
it to a public
forum, which can result in legal damage to the SysOp of the BBS
--- James Mastros
<-> <-> <->
> From: email@example.com (Burn-Cycle)
> Subject: Re: Welcome to Happy Hacker
> I use windows 95 and I use a really good telnet program...I
> because I've read thing that hackers have written and they
have said that
> they can't only do certain stuff with a shell account. Well,
I can do
> everything they can do with my telnet program..........i
think. Only things
> that I've tried, have all worked for me. Anyway, I don't
get something. I
> know that when you finger someone you get the location of
> file right?
> ya know it looks something like this..
That looks like it should be /etc/usr/bin. Note that
Unix uses slashes,
^ ^ ^
rather than back-slashes like DOS or colons like MacOS (yeech!).
under every Unix I have ever seen, the password file is /etc/passwd
--- James Mastros
From: Tony Riggs <firstname.lastname@example.org>
New guy here just wondering does anyone know how to get around
password on the screen saver for WIN 95 WITHOUT hitting CTRL
+ ALT + DEL??
(Moderator: think boot disk. If that doesn't work, power down,
escape and make sure the bios is set to boot from a: drive. Folks,
Win95 password is a fragile way to save you from someone with
access to your box!)
From: Frankie Hayes <email@example.com>
Since this is my 1st post, I'd like to say, "Hey!"
to everyone out there.
Now, the main question i have is does anyone have ANY tips on
WildCat!, TeleGuard, or Renegade BBSes? I know for a fact that
BBSes are relatively simple, but tips always help. ;)
The following is a tip for anyone else interested in hacking
from experience i KNOW this helps...
1) First, get a copy (Shareware -or- Registered
version) and set
it up on your computer.
2) Next, make sure that it's installed
properly, and logon to it
locally. (Ya'll should know what that means)
3) After your logged on, DON'T use SYSOPs
or whatever YOUR
account is, and try hacking it and dropping to DOS.
This is a VERY good way to practice hacking into a board...BUT
TRY HACKING YOUR BOARD WITH VIRII, ANSI-BOMBS, etc. So don't
say i didn't
warn ya!!!! I'd appreciate any responses/flaming of what
above. Until then...later...... ;)
_____ _____ _____
_____ ____ _____
| ____| (_ _)
| o ) (_ _) |
\ |__ _) | o )
|____ | | |
| _ ( _) (_ |
O | |__)_ | _ (
|_| |_) (_____) |_____/ |____)
This letter was forwarded Tue 3:52pm, 4 Feb 1997 EST by SUNRUNNER@TAMPA:
This letter was forwarded Tue 3:42pm, 4 Feb 1997 EST by MATCHMAKER:
>From comp.risks; seems fitting re the sub-discussion about
at the last JUG meeting.
Date: 1 Feb 1997 05:12:02 GMT
From: firstname.lastname@example.org (Debora Weber-Wulff)
Subject: Electronic Funds Transfer without stealing PIN/TAN
The Berlin newspaper "Tagespiegel" reports on 29
Jan 97 about a television show
broadcast the previous evening on which hackers from the Chaos
demonstrated how to electronically transfer funds without needing
(Personal Identification Number) or TAN (Transaction Number).
Apparently it suffices for the victim to visit a site which
downloads an ActiveX
application, which automatically starts and checks to see if
Quicken, a popular
financial software package that also offers electronic funds
transfer, is on the
machine. If so, Quicken is given a transfer order which
is saved by Quicken in
its pile of pending transfer orders. The next time the
victim sends off the
pending transfer orders to the bank (and enters in a valid PIN
and TAN for
that!) all the orders (= 1 transaction) are executed ->
money is transferred
without the victim noticing!
The newspaper quotes various officials at Microsoft et al
disbelief/outrage/"we're working on it". We discussed
this briefly in class
looking for a way to avoid the problem. Demanding a TAN
for each transfer is
not a solution, for one, the banks only send you 50 at a time,
and many small
companies pay their bills in bunches. Having to enter a
TAN for each
transaction would be quite time-consuming. Our only solution
would be to forbid
browsers from executing any ActiveX component without express
that rather circumvents part of what ActiveX is intended for.
A small consolation: the transfer is trackable, that
is, it can be determined
at the bank to which account the money went. Some banks
even include this
information on the statement, but who checks every entry on their
Debora Weber-Wulff, Technische Fachhochschule Berlin, Luxemburger
13353 Berlin GERMANY email@example.com <http://www.tfh-berlin.de/~weberwu/>
SAN MATEO, Calif.--(BUSINESS WIRE)--Feb. 4, 1997--Pretty Good
Inc. (http://www.pgp.com), the world leader in digital-privacy
for individuals and businesses, today announced the availability
PGPmail 4.5, an upgraded version of the world's most popular
encryption software for sending private encrypted email messages
and files over the Internet and corporate intranets.
M/B Research -- The Technology Brokers