Taken from:
? IntroDucktion
? Chapter One - Rules
? Chapter Two - People
? Chapter Three - Now what?
? Chapter Four - Taking Over
? Chapter Five - Reading
? Chapter Six - Hotmail
? Chapter Seven - At Ease
? Chapter Eight - Win95 Screensaver
? Chapter Nine - Da5 + Da6
? Chapter Ten - A few notes on Warez and Mp3z
? Chapter Eleven - Some Links ta Places + Some Groups
? Tha End Of Book One
________________________________________________________
IntroDucktion
Well Phreako's and Phreakix. Here it is, I sat down and I've written me a basic word explanation of how I
crack and hack things. I ain't good with words so here is what u must do to become a hacker. You must be a
perfectionist other wise u will be caught. Also read as much as you can. Don't think your self to great when
working. Try not ta brag ta people. Ta consider yaself a hacker ya have ta prove it ta Ur self. Every time u get
caught Ur a lame arse punk again so take pride in ya work! Everything here is stuff that I have done nothing
I haven't unless I say I haven't done it. I wrote it in word97 after getting the AnarchyCookBook in word97 I
thought this would be the easiest was for me ta write it. I'll try not to leave any contact names and numbers
since I don't want ta be bugged by anyone about this text. If you know me you can tell me what you think,
this is copyright ta me and I say u can copy it and pass it around anything in here I take no responsibility
for if you do it etc.
__________________________________________________________
Chap One - Tha Rules
Right here we are tha rules fer hacking cracking and any other schit yas likes ta does.
1. Don't Del stuff - cause if yas get court yas gets in more schit.
2. When yas hack something it isn't not meant ta be spur of tha moment's type of schit research the crap
and make sure ya know whats yas doing when ya do it.
3. Yas can hack fer the fun of it. Yas can get paid ta do it or ya can do it fer someonce else or hack fer
revenge.
4. Always relies if u do it u must be willing ta face tha consequences
5. Things ta watch or u'll be court
? Don't hacks GOV computers unless it's internationally
? Don't hack your ISP unless yas wants user details Ur ISP are good!
? Be paranoid
__________________________________________________________
Chap Two - People
Tha next things yas must relies that people r dumb, not just a few a lot! I've seen hackers as dumb as normal
people. Ok to relies how dumb the person we're cracking is look at any work they've done and read through
it, get ta know your subject, know what they will and will not do Email them with a hotmail account and find
out about them if you want to! What I'm talkin about with the works and that look at their homepage not
only from tha outside but also tha source. A dumb person may know html, when you get up ta stuff like
javascript look at their source if it is copied it will normally have a link back ta the homepage of tha person
who made it or if will not have many comments in it at all.
E.g.
Code of Dumb Person
Code of Smart Person
U'll see this more and more as you research people - look at geocities homepages and find some lame
phuck them send them a mail like this.
To : Lamerarsefuck@geocities.com
From: Geocities@aserver.com - goto http://www.8m.com or somewhere like that and get a mail address that
is really good, u gets a homepage too.
Subject : Geocities phucked it's self
Mail : Greetings
Our server is too small to compansate all our users and it shut it's self down the other day.
On shutdown it wiped a lot of user passwords so if our file_manager screws up and kicks u
Out this is y. We're trying ta update our server to what it was and better so please reply this mail
With your username in the subject and your password as the body. Once again we are sorry for any
inconveniences.
Geocities Phuckeded
I've done this before except it was a better-written letter it took about « an hour to prepare then I looked
around geocities and found a page made in their new basic editor so I sent it to them and they replied giving
me their user name and password. I don't have that letter any more because I wiped all my stuff off this
computer recently. When I get back on the net I will rewrite that letter and put it in a later chapter.
__________________________________________________________
Chapter Three - Now what?
Well I think you've realized that people are dumb after reading the last section - I hope u did. What can I
do? Well pick a target; don't go to high yet try a geocities page. Just look threw all the blocks u'll see one
that looks crap sooner or later, find out about them. Find wear they're from - look at their email address
sometime they don't use hotmail or geocities ones. User@schit.edu.au so goto http://www.schit.edu.au or
http://schit.edu.au/ and you get where they're from. You can get their icq uin if they have one add urself to
their list and then look at their details, even their IP address can be used ta trace them, goto http://ipadress it
might get you somewhere, I came across a search tool that let u look up the location of an IP address, or just
look at it and work it out for your self most IP addresses starting with 203.xxx.xxxx mean that they usually
come from Australia or New Zealand. 209.xxx.xxxxxx means there from around USA/Canada and so on I came
across a text that had a lot of this written down, I didn't see tha point of it when I first viewed it but now I
relies tha thing I missed. Different countries seem ta have their own ways with how people act so think of
that when you do this. Ok you know about the person now choose a method ta crack them, IMPORTANT
NOTE: Find out more about their ISP. This was one of tha things that got me busted. Get the personality of
the people who own the site in this case geocities. Read their newsletters and read their FAQ section and
think exactly of what you will write, do some draft copies of it. Run a spell check threw it, send a copy of it to
yourself with nicknames and signature files all in place so u know how they'll get it. The only thing that puts
u down is the email which people don't think of when they read mail. Now your ready ta send it, before
pressing send check all email are correct - I made this mistake and I sent it to tha webmaster of the person
who owned the site. If they reply they'll do it within a week if not find a new target.
Note : I've been back for abit and I've found a place that will trace tha persons ip address back to their
server. It is meant to cmplain about spammers but wot tha hell I'll include it. It's at
http://www.cyberarmy.com/ it's a good site for all your lame needs.
Another way ta hack someone is to do it through Telnet which I haven't used much I've logged onto my
ISP that way and looked around. It gave me a complete list of online users + it gave a list of their IP's. And
then another way if they're on your server type thing get a ftp program I used CUTEFTP when I did this and
then in hacking Text. You'll find the common system directories. The first one I tried was right so I look
around and download some sort of file off it, read through it. and u'll get an idea of what system it runs in
and who made it, down the bottom of the file I looked at had a copyright to SUN or something - I wiped all
my stuff of this computer a day or 2 ago ta get more space I got about 200megs off the rest of the computer
is filled with other peoples crap so that's why I'm guessing at a lot of this stuff!
___________________________________________
Chapter Four - Taking Over
Ok now this chapter is about what to do when yas get into a geocities homepage, if you are like me the first
time u get into one and leave access ta tha owner u'll be pissed of because dumb people think that when
someone hacks them that they are clever if they can get back in. So that's why I have it so they don't get
access back. A person who hacked my friends' homepage at geocities did everything here. I would have
done the same thing if I were on the same mission he was on. Yas see he or they were a hate group against
online EFEDS and my friend owned one so that was why he was targeted. Anyway he got in some way I
don't know how but my friend gave out is password ta abouts 6 people. What happened was the hacker
first changed tha password, next deleted everything but tha folders and tha main page and tha pictures.
After that he changed tha member name and then tha email address. What I did first time was ta change tha
password then I edited tha page leaving a note saying I was their and what she stuffed up with, then I let
her back in by telling her some schit. Next time ta save the time hassles yas might as well do tha first crap
because it shuts them up and pisses them off.
_________________________________________________
Chapter Five - Reading
Now ta become a successful hacker yas has gotta read abit, yas have still gotta do stuff but read and learn.
So on ya travels take note of any library yas find. I don't have any at the moment but if you find Km's
library ya cruisin. It has a great list of hacking textz. Anyhow I added this section Just for tha sake of
Readed it cause it's good crap!
Tha Manifesto:
Mentor's Last Words
by The Mentor
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal",
"Hacker Arrested
after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and
1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces
shaped him, what may
have molded him? I am a hacker, enter my world....
Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us
bores me... Damn
underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the
fifteenth time how to
reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid.
Probably copied
it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I
want it to. If it
makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or
thinks I'm a
smartass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all
alike. And then it
happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins,
an electronic pulse
is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is
where I belong...." I
know everyone here... even if I've never met them, never talked to them, may never hear from them again... I
know you all...
Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been
spoon-fed baby
food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed
and tasteless.
We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found
us willing pupils, but
those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a
service already
existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us
criminals. We
explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without
skin color, without
nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you
murder, cheat, and
lie to us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and
think, not what
they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a
hacker, and this is my
manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
Tha Ethics:
The Ethics of Hacking
by Dissident
I went up to a college this summer to look around, see if it was where I wanted to go and what not. The
guide asked me about
my interests, and when I said computers, he started asking me about what systems I had, etc. And when all
that was done, the
first thing he asked me was "Are you a hacker?"
Well, that question has been bugging me ever since. Just what exactly is a hacker? A REAL hacker?
For those who don't know better, the news media (and even comic strips) have blown it way out of
proportion; A hacker, by
wrong definition, can be anything from a computer user to someone who destroys everything they can get
their evil terminals
into.
And the idiotic schmucks of the world who get a Commodore Vic-20 and a 300 baud modem (heh, and a tape
drive!) for
Christmas haven't helped hackers' reputations a damn bit. They somehow get access to a really cool system
and find some files
on hacking...Or maybe a friendly but not too cautious hacker helps the loser out, gives him a few numbers,
etc. The schmuck
gets onto a system somewhere, lucks up and gets in to some really cool information or programs, and
deletes them. Or some
of the more greedy ones capture it, delete it, and try to sell it to Libya or something. Who gets the blame?
The true hackers...that's who. So what is a true hacker?
Firstly, some people may not think I am entirely qualified to say, mainly because I don't consider myself a
hacker yet. I'm still
learning the ropes about it, but I think I have a pretty damn good idea of what a true hacker is. If I'm wrong,
let one correct
me....
True hackers are intelligent, they have to be. Either they do really great in school because they have nothing
better to do, or
they don't do so well because school is terribly boring. And the ones who are bored aren't that way because
they don't give a
shit about learning anything. A true hacker wants to know everything. They're bored because schools teach
the same dull
things over and over and over, nothing new, nothing challenging.
True hackers are curious and patient. If you aren't, how can you work so very hard hacking away at a single
system for even
one small PEEK at what may be on it?
A true hacker DOESN'T get into the system to kill everything or to sell what he gets to someone else. True
hackers want to
learn, or want to satisfy their curiosity, that's why they get into the system. To search around inside of a
place they've never
been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool we live in. Why
destroy something
and take away the pleasure you had from someone else? Why bring down the whole world on the few true
hackers who
aren't cruising the phone lines with malicious intent?
True hackers are disgusted at the way things are in this world. All the wonderful technology of the world
costs three arms and
four legs to get these days. It costs a fortune to call up a board in an adjoining state! So why pay for it? To
borrow something
from a file I will name later, why pay for what could be "dirt cheap if it wasn't run by profiteering gluttons?"
Why be forced,
due to lack of the hellacious cash flow it would require to call all the great places, to stay around a bunch of
schmuck losers in
your home town? Calling out and entering a system you've never seen before are two of the most
exhilirating experiences
known to man, but it is a pleasure that could not be enjoyed were it not for the ability to phreak.
True hackers are quiet. I don't mean they talk at about .5 dB, I mean they keep their mouths shut and don't
brag. The number
one killer of those the media would have us call hackers is bragging. You tell a friend, or you run your mouth
on a board, and
sooner or later people in power will find out what you did, who you are, and you're gone....
I honestly don't know what purpose this file will serve, maybe someone somewhere will read it, and know
the truth about
hackers. Not the lies that the ignorant spread. To the true hackers out there, I hope I am portraying what you
are in this file. If
I am not, then I at least am saying what I think a true hacker should be. And to those wanna-be's out there
who like the label
of "HACKER" being tacked onto them, grow up, would ya?
Oh yeah, the file I quoted from...It has been done (at least) two times. "The Hacker's Manifesto" or
"Conscience of a Hacker"
are the two names I've seen it given (a file by itself, and part of an issue of Phrack). Either way, it was written
by The Mentor,
and it is absolutely the best thing ever written on the subject of hackers. Read it, it could change your life.
______________________________________
Chapter Six - Hotmail
Hotmail is one of the world's biggest free email setups. Microsoft owns it that's why people hack it. I've
read about 3 different hacks for it as well as rewriting one abit so it works again. Now someone wrote the
first hack on hotmail as a test ta gets inta a hackin group. It was about if the user didn't log out you could
get into their account with out a password. By typing in the user name and then on tha password login
point read tha source and it had the encrypted password in tha next location after it was checked by the cgi
script Microsoft and it's schit programming fix tha problem. Next came one that worked on tha idea but it
was run threw being on tha same line as tha person you were cracking simply log in as urself then look at
their location and change it on ur computer and u were in. Now the third way was based one tha fact that
hotmail weren't bothered ta as a filter in fer javascript, now they have but. Someone realized this and wrote a
nice looking html code of a time expired page changed it so that it asked them ta relog back in so the user
typed in their username and password and it was given ta a geocities form which sent it back ta tha maker.
The last one I rewrote changing it back into html then sending it threw as an attachment, I set it up to a
different form place and set it ta redirect back ta hotmails main log-in page. On tha first test run on my friend
he used tha password and I read his mail for abit. Just before I was banned I had a list of about 100 hotmail
addresses and I was about ta sending off mail trying ta getting their passwords.
____________________________________
Chapter Seven - At Ease
I put this chapter in here because our school uses At Ease ta protect tha main part of tha computers because
people stick crap everywhere plus it's easy ta network. At Ease is a Mac program, now I think Macs are
alright but I use IBM's more mainly because they have more holes in them. Mac are hard ta crack for
newbies like me but I've worked out about 3 different ways ta screw it.
First Way: Reading/Writing other peoples crap
You must have access ta a disk and be given user access ta use it. First open up a word tool Claris works
well!
1. Write some crap, anything will do
2. Save it to tha disk.
3. Quit Claris
4. Open the file strait off tha disk not threw Claris
5. Close the file you won't need it.
6. Klick open it's should be in tha disk
7. Press Eject in Claris
8. When it comes up with the error message press apple "."
9. You r now in shared items so open documents
10. Now choose the users name
11. Open their folder and view tha file
This works with saving after closing tha documents Click new write something then follow it from 6. But
save instead of open.
IMPORTANT NOTE: This process works once every time you are in Claris, to open another file you need to
quit and start again. Likewise with saving.
Crack 2:
This isn't really a crack but if your computer teacher is a fuckwit try holding shift on startup as long as he's
set a true admin password it won't work.
Before I start with the next bit there has been a HyperCard hack for At Ease written plus the infamous Dis
Ease which is meant ta phuck it too.
Once Ur in!
When yas gets inta tha finder u'll want ta know what ta do to I) Fuck up that computer II) Phuck up the
whole network and III) Give ur self full finder access.
I) Phuck the Computer
Ta phuck tha computer when Ur in trash everything.
II)Phuck tha Network
Klick on shared items, then system, the at ease. Now delete tha At Ease Preferences, Restart.
III) Finder Access!
First we'll make u tha administrator simply in tha harddrive delete or move At Ease Preferences in tha system
/ at ease folder. Restart and At Ease should be turned off so goto At Ease Setup in the harddrive somewhere
and make u an admin because there's no password any more.
Next one is if you don't want them ta know to well. First open up the folder in Shared Items / at Ease /
groups or something I can't remember now open harddrive / system up and copy finder to the other folder
with your class groups items. Rename it something like About At Ease when you do it so people don't Klick
on it.
There are another couple of cracks for At Ease I'm not bothered writing them here because I am too tired to.
Chapter Eight - Windows 95 Screensaver
I have actually written some text files on cracking At Ease, Win95, Hotmail (I think) and Da5. But when I
cleaned up me crap I lost it all. Windows 95 sucks and I guess so does windows 98. But almost every
computer store I've been in has had Windows 95 screensaver as their protection. I know this text is late but
I'm working on the win98 screensaver hack at tha moment. I worked this out one day when I was totally
bored. I set tha screensaver up and choose "QWERTY" as tha password. Now I went ta make her beep for a
while by holding down some keys and pressing keys then I let goes and it cut out. Schit I thought what
made it do that? Well I traced threw what I did and this is how she goes.
1. Hold [alt] + [ctrl] + [shift] + [win95but] don't let go until done
2. Press [Delete] once
3. Press [Enter] once
4. Run threw tha keys - "qwertyuiop[]asdfghjkl;'zxcvbnm,./\`1234567890-= " which is going threw tha
keyboard across from q to } then a to ` and z to / then 1 to Backspace and last space alt wwin95 taskkey
ctrl.
5. Let go of [alt] + [ctrl] + [shift] + [win95but]
6. Press Enter 2 * - it ads ta the affect.
And wow the screen turns off then on and then it comes up with the start bar.
Next step is ta turn tha password off so yas can run things.
So:
1. Click tha right mouse button once
2. Choose properties
3. Since ya can't see it press tab * 6 then the right arrow key once and then tab another 4 times then space
and press enter.
4. Click on the screen saver and if it works press enter for tha password and ur out
5. If not do it again.
And there it is tha win95. Screensaverpassword. Crack. by tha PornoPhreak.
_______________________________________
Chapter Nine - Da5 + Da6
Da5 \ Da6 - Direct Access an IBM security program. They suck monkeyballs. They are properly the worst
written programs in tha world. They have so many flaws
Da5:
1. Press [ctrl C] when it goes ta run a program and terminate it.
2. Press F1 the admin button and leave it for awhile, if tha teacher hasn't set it up properly it send u into
the admin area.
Da6:
1. Go threw it a couple of levels try ctrl alt delete and try shutting down ta dos.
2. Press [ctrl] + [alt] + [esc] a couple of times and win95 awaits u!
________________________________________________________
Chapter Ten - Notes on Mp3s and Warez
Right Warez and Mp3z and other crap like that are illegal, a few good hackers don't touch that sort of crap.
What they are, are simply Programs either copied or crack ta full version status and on tha net for download.
Mp3z are CD quality music free for download copyrighted illegally as well. Now to find software like this
you can search for it threw a normal search e.g. http://www.Yahoo.com if yas find much ur lucky as hell
cause these site are always being killed. Ya could use WarezWolf a program from somewhere they've got a
couple of programs for download like that. It searches all good search engines at once.
1source of Warez if you're desperate is the t69 at http://www.t69.com a lot of people I've talked to about it
say it's crap and that's an opinion I share with them because u have to go threw about 10 of these type of
pages to find any. Now when you check them out u'll get about 10 thousand popups, but if you find a good
page they stay there for awhile.
Another way of doing Warez is get a shareware version of something - Dreamweaver will do in this
document. It's a good html editor. Anyway first get tha program; I first got it off a CD with a magazine. Goto
somewhere like http://astalavista.box.sk and search for the crack or serial. Cracks fix tha program so it works
full version, serials are numbers that when enter the program becomes full version. I found a half crack/serial
by CrownMan with instruction on wot ta do ta crack it.
________________________________________________________
Chapter Eleven - Links to Places
Right then to get started off you've got to learn right? Well here are some links that will make the journey
abit easier. They goto place where there is information. Actually every place has information it's just where
to look.
1. AnarchyRules - http://www.anarchyrules.com - This place it the place to go if you wanna do
something fun.
2. NewOrder - http://neworder.box.sk - Has a vast information depo, exploits and programs. Plus 400 links
to other hacking pace on tha net.
3. Astalavista - http://astalavista.box.sk - Looking for a crack for a program this is the first place I look
other than checking out oscar. It is a searh engine for serials and cracks.
4. Top 100 - http://www.webfringe.com/top100/?WarForge - top100 hacking sites links to tha best of the
best.
5. Phrozen Crew Updates - http://www.geocities.com/~starkidd/oscar.html -this is one of the only place
on the net that I've found that shows PC's new programs. Also here Oscar.
6. Warforge - http://www.warforge.com - I havn't seen this page up for a while cause it was hacked or
something and it's down or it was when I wrote this. It has tools and tutorials
7. Hackers.Com - http://www.hackers.com - you wanna learn go here good site. It's made with dhtml and
stylesheets so it looks good. 1st plage may take awhile to load.
8. Active Matrix - can't rember - This is a site I really wanna put here there's a link to it on the neworder
page. He's a coool fella so I recommend if you got some time check it.
9. United Hackers Association - httP://www.uha1.com - Nice site I think it's down though check it out.
10. Hackers Club - http://www.hackersclub.com - I think that's the address it contains km's stuff
somewhere.
11. Elite Hackers - http://www.elitehackers.net - I'm not sure about this address either ut if it's right it's
another cool hacking site.
Some Groups to look for - these are ones I know of and rember so don't be mad if your not here.
UCC - Under Ground Collaberate Crew - AnarchyRules ,
CDC - Cult of the Dead Cow - Know to me mainly for Back Orfice,
HCV - I not to sure about this group my friend knows one of them so I put them here, I think they were the
people who hacked ar.c and the t69.
IHK - ICQ Hacking Klan I think that's tha name sorry if I got it wrong but as the name sujests they hack
icq.
The End of Book One
That's It for the first book in mah schit book. It's a lot of writin and I got a headache. Ummm this is out of
my handbook. It's actually the first section. I'm still writing the rest, which is about another 2 section so
when I get the next one done I'll stick it up at the schit site. I'm actually happy with the site because I
remade it tha other day. Just tha enterance and all that. Sorry about the spelling mistakes but I don't really
feel like going back through it all and checking it. Anyway as it says in the intro tell us wot you think of it so
far and if ya's have any ideas for it. You mite find me on the Anarchyrules board. Just post something to tha
PornoPhreak and I'll respond if I'm there. Schit I just looked at this and it looks like it's 25 pages wow I need
ta have a sleep. By tha PornoPhreak