β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Telenet City Codes
t.me/UndercodeTesting
PC-Pursuit
PC-Pursuit City, ST | A C | Code | Bauds Available
--------------------+-----+------------+-----------------
Atlanta, GA | 404 | D/GAATL | 3/12/24
Boston, MA | 617 | D/MABOS | 3/12/24
Chicago, IL | 312 | D/ILCHI | 3/12/24
Chicago, IL * | 815 | D/ILCHI | 3/12/24
Cleveland, OH | 216 | D/OHCLV | 3/12
Dallas, TX | 214 | D/TXDAL | 3/12/24
Dallas, TX | 817 | D/TXDAL | 3/12/24
Denver, CO | 303 | D/CODEN | 3/12/24
Detroit, MI | 313 | D/MIDET | 3/12/24
Glendale, CA | 818 | D/CAGLE | 12
Hartford, CN | 203 | D/CTHAR | 12
Houston, TX | 713 | D/TXHOU | 3/12/24
Los Angeles, CA | 213 | D/CALAN | 3/12/24
Miami, FL | 305 | D/FLMIA | 3/12
Milwaukee, WI | 414 | D/WIMIL | 12
Minneapolis, MN | 612 | D/MNMIN | 3/12/24
Newark, NJ | 201 | D/NJNEW | 3/12/24
New York, NY | 212 | D/NYNYO | 3/12/24
New York, NY * | 718 | D/NYNYO | 3/12/24
Philedelphia, PA | 215 | D/PAPHI | 3/12/24
Pheonix, AZ | 602 | D/AZPHO | 3/12/24
Portland, OR | 503 | D/ORPOR | 3/12
Triangle Park, NC | 919 | D/NCRTP | 3/12/24
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Telenet City Codes
t.me/UndercodeTesting
PC-Pursuit
PC-Pursuit City, ST | A C | Code | Bauds Available
--------------------+-----+------------+-----------------
Atlanta, GA | 404 | D/GAATL | 3/12/24
Boston, MA | 617 | D/MABOS | 3/12/24
Chicago, IL | 312 | D/ILCHI | 3/12/24
Chicago, IL * | 815 | D/ILCHI | 3/12/24
Cleveland, OH | 216 | D/OHCLV | 3/12
Dallas, TX | 214 | D/TXDAL | 3/12/24
Dallas, TX | 817 | D/TXDAL | 3/12/24
Denver, CO | 303 | D/CODEN | 3/12/24
Detroit, MI | 313 | D/MIDET | 3/12/24
Glendale, CA | 818 | D/CAGLE | 12
Hartford, CN | 203 | D/CTHAR | 12
Houston, TX | 713 | D/TXHOU | 3/12/24
Los Angeles, CA | 213 | D/CALAN | 3/12/24
Miami, FL | 305 | D/FLMIA | 3/12
Milwaukee, WI | 414 | D/WIMIL | 12
Minneapolis, MN | 612 | D/MNMIN | 3/12/24
Newark, NJ | 201 | D/NJNEW | 3/12/24
New York, NY | 212 | D/NYNYO | 3/12/24
New York, NY * | 718 | D/NYNYO | 3/12/24
Philedelphia, PA | 215 | D/PAPHI | 3/12/24
Pheonix, AZ | 602 | D/AZPHO | 3/12/24
Portland, OR | 503 | D/ORPOR | 3/12
Triangle Park, NC | 919 | D/NCRTP | 3/12/24
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hacking techniques :
fb.com/UndercodeTesting
1) CALLBACK UNITS:
Callback units are a good security device, But with most phone systems,
it is quite possible for the hacker to use the following steps to get
around a callback unit that uses the same phone line for both incomming
and out going calls:First, he calls he callback unit and enters any
authorized ID code (this is not hard to get,as you'll see in a moment).
After he enters this ID, the hacker holds the phone line open - he does
not hang up. When the callback unit picks up the phone to call the user back,
the hacker is there, waiting to meet it.
> The ID code as I said, is simple for a hacker to obtain, because these
codes are not meant to be security precautions.The callback unit itself
provides security by keeping incomming calls from reaching the computer.
The ID codes are no more private than most telephone numbers. Some callback
units refer to the codes as "location identification numbers," and some
locations are used by several different people,so their IDs are fairly
well known.I've been told that, in some cases,callback ubits also have
certain simple codes that are always defined by default. Once the hacker
has entered an ID code and the callback unit has picked up the phone to
re-call him,the hacker may or may not decide to provide a dial tone to
allow the unit to "think" it is calling the correct number. In any event,
the hacker will then turn on his computer, connect with the system - and
away he goes.If the however, the hacker has trouble holding the line with
method,he has an option: the intercept.
π¦The Intercept:
Holding the line will only work with callback units that use the same
phone lines to call in and to call out.Some callback units use different
incoming and outgoing lines, numbers 555-3820 through 555-3830 are dedicated
to users' incoming calls, and lines 555-2020 through 555-2030 are dedicated
to the computers outgoing calls.The only thing a hacker needs in order to
get through to these systems is a computer and a little time - he doesn't
even need an ID code. First,the hacker calls any one of the outgoing phone
lines, which, of course, will not answer.Sooner or later, though, while the
hacker has his computer waiting there, listening to the ring, an authorized
user will call one of the incomming lines and request to be called back.
It will usually be less than an hours wait, but the hacker's computer
is perfectly capable of waiting for days, if need be.
> The callback unit will take the code of the authorized user, hang up,
verify the code, and pick up the phone line to call back.If the unit
tries to call out on the line the hacker has dialed, the hacker has his
computer play a tone that sounds just like a dial tone.The computer will
then dial the number given that matches up with the user's authorized ID.
After that,the hacker can just connect his computer as he would in any
other case.If he is really serious,he will even decode the touch tones
that the mainframe dialed,figure out the phone number of the user the
system was calling, call the person, and make a few strange noises that
sound as though the computer called back but didnt work for some reason.
2) TRAPDOORS AS A POSSIBLILITY
I haven't heard of this happening, but i think it is possible that a
callback modem could have a trapdoor built into it.Callback modems are
run by software, which is written by programmers.An unscrupulous programmer
could find it very easy to slip in an unpublicized routine, such as,
"if code =*43*, then show all valid codes and phone numbers." And such a
routine, of course, would leave security wide open to anyone who found the
trapdoor.The obvious protection here, assuming the situation ever arises,
is simply an ethical manufactorer that checks its software thoroughly before
releasing it.
> A trapdoor is a set of special instructions embedded in the large
program that is the operating system of a computer.A permanent,
π¦Hacking techniques :
fb.com/UndercodeTesting
1) CALLBACK UNITS:
Callback units are a good security device, But with most phone systems,
it is quite possible for the hacker to use the following steps to get
around a callback unit that uses the same phone line for both incomming
and out going calls:First, he calls he callback unit and enters any
authorized ID code (this is not hard to get,as you'll see in a moment).
After he enters this ID, the hacker holds the phone line open - he does
not hang up. When the callback unit picks up the phone to call the user back,
the hacker is there, waiting to meet it.
> The ID code as I said, is simple for a hacker to obtain, because these
codes are not meant to be security precautions.The callback unit itself
provides security by keeping incomming calls from reaching the computer.
The ID codes are no more private than most telephone numbers. Some callback
units refer to the codes as "location identification numbers," and some
locations are used by several different people,so their IDs are fairly
well known.I've been told that, in some cases,callback ubits also have
certain simple codes that are always defined by default. Once the hacker
has entered an ID code and the callback unit has picked up the phone to
re-call him,the hacker may or may not decide to provide a dial tone to
allow the unit to "think" it is calling the correct number. In any event,
the hacker will then turn on his computer, connect with the system - and
away he goes.If the however, the hacker has trouble holding the line with
method,he has an option: the intercept.
π¦The Intercept:
Holding the line will only work with callback units that use the same
phone lines to call in and to call out.Some callback units use different
incoming and outgoing lines, numbers 555-3820 through 555-3830 are dedicated
to users' incoming calls, and lines 555-2020 through 555-2030 are dedicated
to the computers outgoing calls.The only thing a hacker needs in order to
get through to these systems is a computer and a little time - he doesn't
even need an ID code. First,the hacker calls any one of the outgoing phone
lines, which, of course, will not answer.Sooner or later, though, while the
hacker has his computer waiting there, listening to the ring, an authorized
user will call one of the incomming lines and request to be called back.
It will usually be less than an hours wait, but the hacker's computer
is perfectly capable of waiting for days, if need be.
> The callback unit will take the code of the authorized user, hang up,
verify the code, and pick up the phone line to call back.If the unit
tries to call out on the line the hacker has dialed, the hacker has his
computer play a tone that sounds just like a dial tone.The computer will
then dial the number given that matches up with the user's authorized ID.
After that,the hacker can just connect his computer as he would in any
other case.If he is really serious,he will even decode the touch tones
that the mainframe dialed,figure out the phone number of the user the
system was calling, call the person, and make a few strange noises that
sound as though the computer called back but didnt work for some reason.
2) TRAPDOORS AS A POSSIBLILITY
I haven't heard of this happening, but i think it is possible that a
callback modem could have a trapdoor built into it.Callback modems are
run by software, which is written by programmers.An unscrupulous programmer
could find it very easy to slip in an unpublicized routine, such as,
"if code =*43*, then show all valid codes and phone numbers." And such a
routine, of course, would leave security wide open to anyone who found the
trapdoor.The obvious protection here, assuming the situation ever arises,
is simply an ethical manufactorer that checks its software thoroughly before
releasing it.
> A trapdoor is a set of special instructions embedded in the large
program that is the operating system of a computer.A permanent,
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
hopefully secret "doorway", these special instructions enabe anyone who
knows about them to bypass normal security procedures and to gain access to
the computer's files.Although they may sound sinister, trapdoors were not
invented by hackers, although existing ones are certainly used by hackers
who find out about them.
3) THE DECOY
One of the more sophisticated hacking tools is known as the decoy, and it
comes in three versions.The first version requires that the hacker have an
account on the system in question. As in my case,the hacker has a
low-security account,and he tries this method to get higher-security
account.He will first use his low-security account to write a program that
will emulate the log-on procedures of the systems in questions.
This program will do the following:
*- Clear the terminal screen and place text on it that makes everything
look as if the system is in charge.
*- Prompt for, and allow the user to enter, both an account name and a password.
*- Save that information in a place the hacker can access.
*- Tell the use the account/password entries are not acceptable.
*- turn control of the terminal back over to the system.
The user will now assume that the account name or password was mistyped
and will try again...this time (scince the real operating system is in
control) with more success.You can see a diagram of the way these steps are
accomplished
___________________
| Clear Terminal |
| screen |
|____________________|
||
_________||_________
| Print Compuserve |
| Computer |
|_____ Network ______|
||
_________||_________
| Print "ENTER |
| PASSWORD" |______
|____________________| |
|| |
_________||_________ |
| PASSWORD ENTERED? |NO|
|____________________|
||_YES
_________||_________
| SAVE PASSWORD |
| INFORMATION |
|____________________|
||
_________||_________
| PRINT "LOGIN |
| INCORRECT |
|____________________|
||
_________||_________
| LOG OFF/RETURN |
| CONTROL TO |
| OPERATING SYSTEM |
|____________________|
4) CALL FORWARDING
Many people use call forwarding by special arrangement with the phone
company.When a customer requests call forwarding, the phone company uses
its computer to forward all the customers incomeing calls to another
number. Lets say, for example, that you want calls that come to your office
phone to be forwarded to your home phone: A call from you to the phone
company,some special settings in the phone companys computer, and all
calls to your office will ring at your home instead.This little bit of help
from the phone company is another tool used by hackers. Lets say you thought
that the computer you were hacking into was being watched-because the
sysop might have seen you and called the fed's and your sort of bugged by
this nagging feeling that they will trace the next hacker that calls,
just call the phone company and ask for call forwarding, pick a number,
(ANY NUMBER) out of the phone book and have your calls forwarded to that
number,Hea,Hea, the number you picked is the one that will be traced to,
not yours, so you could be hacking away,they think that they have traced you,
but actually the number you had your calls forwarded too. they enter chat mode
and say (YOUR BUSTED!!!!, WE'VE TRACED YOUR PHONE NUMER THE FEDS ARE ON THE
WAY!!), You could reply (Hea, SURE YA DID! I'D LIKE TO SEE YA TRY AND GET ME!
GO AHEAD!) ,that wont seem very important to them at the time, but it will
sure piss them off when they bust the wrong guy!
5) RAPID FIRE
Memory-location manipulation can be helpful, but there is another, more
powerful,possibility, in some cases: the Rapid-fire method.To understand how
this methos works, you have to know something about the way operationg
systems work.When a user enters a command, the operating system first places
knows about them to bypass normal security procedures and to gain access to
the computer's files.Although they may sound sinister, trapdoors were not
invented by hackers, although existing ones are certainly used by hackers
who find out about them.
3) THE DECOY
One of the more sophisticated hacking tools is known as the decoy, and it
comes in three versions.The first version requires that the hacker have an
account on the system in question. As in my case,the hacker has a
low-security account,and he tries this method to get higher-security
account.He will first use his low-security account to write a program that
will emulate the log-on procedures of the systems in questions.
This program will do the following:
*- Clear the terminal screen and place text on it that makes everything
look as if the system is in charge.
*- Prompt for, and allow the user to enter, both an account name and a password.
*- Save that information in a place the hacker can access.
*- Tell the use the account/password entries are not acceptable.
*- turn control of the terminal back over to the system.
The user will now assume that the account name or password was mistyped
and will try again...this time (scince the real operating system is in
control) with more success.You can see a diagram of the way these steps are
accomplished
___________________
| Clear Terminal |
| screen |
|____________________|
||
_________||_________
| Print Compuserve |
| Computer |
|_____ Network ______|
||
_________||_________
| Print "ENTER |
| PASSWORD" |______
|____________________| |
|| |
_________||_________ |
| PASSWORD ENTERED? |NO|
|____________________|
||_YES
_________||_________
| SAVE PASSWORD |
| INFORMATION |
|____________________|
||
_________||_________
| PRINT "LOGIN |
| INCORRECT |
|____________________|
||
_________||_________
| LOG OFF/RETURN |
| CONTROL TO |
| OPERATING SYSTEM |
|____________________|
4) CALL FORWARDING
Many people use call forwarding by special arrangement with the phone
company.When a customer requests call forwarding, the phone company uses
its computer to forward all the customers incomeing calls to another
number. Lets say, for example, that you want calls that come to your office
phone to be forwarded to your home phone: A call from you to the phone
company,some special settings in the phone companys computer, and all
calls to your office will ring at your home instead.This little bit of help
from the phone company is another tool used by hackers. Lets say you thought
that the computer you were hacking into was being watched-because the
sysop might have seen you and called the fed's and your sort of bugged by
this nagging feeling that they will trace the next hacker that calls,
just call the phone company and ask for call forwarding, pick a number,
(ANY NUMBER) out of the phone book and have your calls forwarded to that
number,Hea,Hea, the number you picked is the one that will be traced to,
not yours, so you could be hacking away,they think that they have traced you,
but actually the number you had your calls forwarded too. they enter chat mode
and say (YOUR BUSTED!!!!, WE'VE TRACED YOUR PHONE NUMER THE FEDS ARE ON THE
WAY!!), You could reply (Hea, SURE YA DID! I'D LIKE TO SEE YA TRY AND GET ME!
GO AHEAD!) ,that wont seem very important to them at the time, but it will
sure piss them off when they bust the wrong guy!
5) RAPID FIRE
Memory-location manipulation can be helpful, but there is another, more
powerful,possibility, in some cases: the Rapid-fire method.To understand how
this methos works, you have to know something about the way operationg
systems work.When a user enters a command, the operating system first places
the command in a holding area, a buffer, where it will sit for a few
millionths of a second.The system looks at the command and say's "Does this
person really have authorization to do this, or not?" Then, the command
sits there a few thousandths of a second while the system runs off to
check the user's authorization.When the system comes back to the command,
it will have one of two possible answers: "OK, GO AHEAD," or "SORRY,
GET PERMISSION FIRST."
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
millionths of a second.The system looks at the command and say's "Does this
person really have authorization to do this, or not?" Then, the command
sits there a few thousandths of a second while the system runs off to
check the user's authorization.When the system comes back to the command,
it will have one of two possible answers: "OK, GO AHEAD," or "SORRY,
GET PERMISSION FIRST."
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ X200 NORDVPN PREMIUM β
pastebin.com/HtuUcHEM
pastebin.com/HtuUcHEM
Pastebin
x200 Nordvpn Prem Verified - Pastebin.com
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACKING TYMNET
TYMNET IS A GATEWAY SYSTEM, LIKE TELENET. AND CAN BE USED TO ACCESS SYSTEMS
THAT MIGHT NOT OTHERWISE HAVE LOCAL NUMBERS. THIS IS JUST A BASIC FILE,
INTENDED FOR SOMEONE WHO HAS NEVER USED TYMNET BEFORE, OR TO HELP SOMEONE WHO
IS LEARNING TO USE TYMNET.
π¦ CONNECTING:
1) MOST TYMNET SYSTEMS USE THE FOLLOWING SETTINGS:
--- FULL DUPLEX
--- NO PARITY (OFF OR SPACE PARITY)
--- 1 STOP BIT
--- MOST ARE 300/1200 BAUD
2) ALSO, MOST USE CONTROL-S TO PAUSE LISTING AND CONTROL-Q TO RESUME LISTING.
CONTROL-X STOPS LISTING.
TO ENSURE THAT YOU ARE ALLOWED TO USE CONTROL KEYS, ENTER CONTROL-R BEFORE
TELLING TYMNET WHO YOU WISH TO LOG ONTO.
3) FOR THOSE OF YOU WHOSE TERM ARE CAPABLE OF SENDING AN ESCAPE, AN ESCAPE WILL
4) GET YOU BACK TO THE [...LOG IN] AREA IF YOU EVER FIND YOURSELF STUCK IN A
POSITION WHERE YOU ARE ABOUT TO BE DISCONNECTED.
5) WHEN YOU FIRST CONNECT WITH TYMNET;
[PLEASE TYPE YOUR TERMINAL IDENTIFIER]
WILL PRINT ACROSS YOUR SCREEN. SOMETIMES THIS WILL BE NOTHING BUT A BUNCH OF
GARBAGE, WHICH COULD MEAN THAT YOU CONNECTED AT THE WRONG BAUD, OR THAT YOUR
SYSTEM WILL NEED AN ID LETTER OTHER THAN 'A' OR 'E'. BUT, FOR MOST PURPOSES,
'A' WILL BE THE LETTER THAT YOU WILL ENTER, BUT 'E' IS ALSO A COMMON ID.
HOWEVER, B,C,D,F,G,I,AND P ARE ALSO VALID ID'S.
(COMMIES, APPLES, TI'S & TRS'S USE 'A' OR 'E')
6) THEN A LOCATION NUMBER, WILL BE SHOWN.
[-4004-075-]
AFTER THAT, TYMNET WILL ASK YOU TO;
[PLEASE LOG IN.]
7) YOU WILL ENTER THE SERVICE NAME OR INITIALS AND BE SENT TO THAT SERVICE.
(EXAMPLE:)
[PLEASE TYPE YOUR TERMINAL IDENTIFIER] A
[-4004-075-]
[PLEASE LOG IN.] IBM
------
π¦ IN THE EXAMPLE, TYMNET SENT EVERYTHING IN [] BRACKETS, AND YOU ENTERED
EVERYTHING IN LOWER CASE.
FOLLOWING THAT PROCEDURE WOULD SEND YOU TO IBM.
π¦ SYSTEMS ON TYMNET:
TRY USING NAMES, OR SIMPLE 3-5 CHARACTER CODES. REMEMBER, NEW USERS ARE
SUPPOSED TO BE ABLE TO USE TYMNET SECONDS AFTER UNPACKING THEIR COMPUTERS,
SO THINK SIMPLE.
ALSO, TRY GETTING A BUNCH OF SYSTEM NAMES THAT WORK ON TELENET, UNINET,
OR DATAPAC AND TRY THEM ON TYMNET. TRY ENTERING THE NAME, INITIALS OR
INITIALS & NUMBERS.
--- EXAMPLES:
DOW1;; & DOW2;; = DOW JONES, WHEN TYMNET ASKS FOR SERVICE, ENTER 'DJNS'.
STANDARD
10 CHARACTER PASSWORD.
CIS01 & CIS02 & CPS = COMPUSERVE, STANDARD FORMAT.
LEXIS & NEXIS = LEXIS & NEXIS, WHEN IT ASKS FOR TERMINAL ID, ENTER '.LEXIS' OR
'.TELV950'
NEWS1 = NEWSNET
ONTYME = ONTYME (MCDONALD DOUGLAS INTERNATIONAL DATA LIBRARY)
IBM = (WHAT ELSE?) I.B.M
ART = HONEYWELL'S 'SYSTEM M'.
DIR. = DIRECTORYNET.
TEL = ??? (CONTACT ME IF YOU FIND OUT)
INDEX = MTECH/COMMERCIAL SERVICES DIVISION.
VAX1 = UCC UCEL ON-LINE
OPER = NET940/111
PLINK = PEOPLE/LINK 6 CHAR ID. 9 CHAR PASSWORD.
-----
TYMNET GATEWAY NUMBERS:
-------------------------
WASHINGTON (206): 825-7720, 754-3900, 375-3367, 285-0109, 747-4105, 272-1503
693-0371, 453-1591, 825-7781
ALABAMA (205) : 236-2655, 942-4141, 882-3003, 343-8414, 265-4570, 345-1420
ALASKA HAS 'ALASKANET' A SIMILAR SYSTEM.
ARIZONA (602) : 254-5811, 790-0764
CALIFORNIA (818): 308-1800, 789-9002, 841-7890
(714): 371-2291, 594-4567, 966-0313, 370-1200, 498-9504,
(415): 778-3420, 952-4757, 682-3851, 490-7366, 430-2900, 836-8700
COLORADO (303) : 590-1003, 830-9210, 356-0425, 543-3313
CONNETICUT (203): 242-7140, 773-0082, 226-5250
FLORIDA (305) : 395-7330, 463-0887, 466-0661
GEORGIA (404) : 546-0167, 446-0270, 722-7967, 327-0369, 424-0025, 291-1000
HAWAII (808) : 528-4450
IDAHO (208) : 343-0404, 523-2964, 233-2501
KENTUCKY (502) : 782-0436, 499-7110
LOUISIANA (318) : 443-9544, 237-9500, 436-1633, 322-4109, 688-5840
MICHIGAN (313) : 662-8282, 963-3388, 963-8880, 963-2353, 732-7303, 459-8900
985-6005, 569-8350
(517) : 787-9461, 484-6602, 631-4721
MONTANA (406) : 252-4880, 586-7638, 494-6615, 727-0100, 728-2415
NEBRASKA (402) : 475-8659, 397-0414
π¦HACKING TYMNET
TYMNET IS A GATEWAY SYSTEM, LIKE TELENET. AND CAN BE USED TO ACCESS SYSTEMS
THAT MIGHT NOT OTHERWISE HAVE LOCAL NUMBERS. THIS IS JUST A BASIC FILE,
INTENDED FOR SOMEONE WHO HAS NEVER USED TYMNET BEFORE, OR TO HELP SOMEONE WHO
IS LEARNING TO USE TYMNET.
π¦ CONNECTING:
1) MOST TYMNET SYSTEMS USE THE FOLLOWING SETTINGS:
--- FULL DUPLEX
--- NO PARITY (OFF OR SPACE PARITY)
--- 1 STOP BIT
--- MOST ARE 300/1200 BAUD
2) ALSO, MOST USE CONTROL-S TO PAUSE LISTING AND CONTROL-Q TO RESUME LISTING.
CONTROL-X STOPS LISTING.
TO ENSURE THAT YOU ARE ALLOWED TO USE CONTROL KEYS, ENTER CONTROL-R BEFORE
TELLING TYMNET WHO YOU WISH TO LOG ONTO.
3) FOR THOSE OF YOU WHOSE TERM ARE CAPABLE OF SENDING AN ESCAPE, AN ESCAPE WILL
4) GET YOU BACK TO THE [...LOG IN] AREA IF YOU EVER FIND YOURSELF STUCK IN A
POSITION WHERE YOU ARE ABOUT TO BE DISCONNECTED.
5) WHEN YOU FIRST CONNECT WITH TYMNET;
[PLEASE TYPE YOUR TERMINAL IDENTIFIER]
WILL PRINT ACROSS YOUR SCREEN. SOMETIMES THIS WILL BE NOTHING BUT A BUNCH OF
GARBAGE, WHICH COULD MEAN THAT YOU CONNECTED AT THE WRONG BAUD, OR THAT YOUR
SYSTEM WILL NEED AN ID LETTER OTHER THAN 'A' OR 'E'. BUT, FOR MOST PURPOSES,
'A' WILL BE THE LETTER THAT YOU WILL ENTER, BUT 'E' IS ALSO A COMMON ID.
HOWEVER, B,C,D,F,G,I,AND P ARE ALSO VALID ID'S.
(COMMIES, APPLES, TI'S & TRS'S USE 'A' OR 'E')
6) THEN A LOCATION NUMBER, WILL BE SHOWN.
[-4004-075-]
AFTER THAT, TYMNET WILL ASK YOU TO;
[PLEASE LOG IN.]
7) YOU WILL ENTER THE SERVICE NAME OR INITIALS AND BE SENT TO THAT SERVICE.
(EXAMPLE:)
[PLEASE TYPE YOUR TERMINAL IDENTIFIER] A
[-4004-075-]
[PLEASE LOG IN.] IBM
------
π¦ IN THE EXAMPLE, TYMNET SENT EVERYTHING IN [] BRACKETS, AND YOU ENTERED
EVERYTHING IN LOWER CASE.
FOLLOWING THAT PROCEDURE WOULD SEND YOU TO IBM.
π¦ SYSTEMS ON TYMNET:
TRY USING NAMES, OR SIMPLE 3-5 CHARACTER CODES. REMEMBER, NEW USERS ARE
SUPPOSED TO BE ABLE TO USE TYMNET SECONDS AFTER UNPACKING THEIR COMPUTERS,
SO THINK SIMPLE.
ALSO, TRY GETTING A BUNCH OF SYSTEM NAMES THAT WORK ON TELENET, UNINET,
OR DATAPAC AND TRY THEM ON TYMNET. TRY ENTERING THE NAME, INITIALS OR
INITIALS & NUMBERS.
--- EXAMPLES:
DOW1;; & DOW2;; = DOW JONES, WHEN TYMNET ASKS FOR SERVICE, ENTER 'DJNS'.
STANDARD
10 CHARACTER PASSWORD.
CIS01 & CIS02 & CPS = COMPUSERVE, STANDARD FORMAT.
LEXIS & NEXIS = LEXIS & NEXIS, WHEN IT ASKS FOR TERMINAL ID, ENTER '.LEXIS' OR
'.TELV950'
NEWS1 = NEWSNET
ONTYME = ONTYME (MCDONALD DOUGLAS INTERNATIONAL DATA LIBRARY)
IBM = (WHAT ELSE?) I.B.M
ART = HONEYWELL'S 'SYSTEM M'.
DIR. = DIRECTORYNET.
TEL = ??? (CONTACT ME IF YOU FIND OUT)
INDEX = MTECH/COMMERCIAL SERVICES DIVISION.
VAX1 = UCC UCEL ON-LINE
OPER = NET940/111
PLINK = PEOPLE/LINK 6 CHAR ID. 9 CHAR PASSWORD.
-----
TYMNET GATEWAY NUMBERS:
-------------------------
WASHINGTON (206): 825-7720, 754-3900, 375-3367, 285-0109, 747-4105, 272-1503
693-0371, 453-1591, 825-7781
ALABAMA (205) : 236-2655, 942-4141, 882-3003, 343-8414, 265-4570, 345-1420
ALASKA HAS 'ALASKANET' A SIMILAR SYSTEM.
ARIZONA (602) : 254-5811, 790-0764
CALIFORNIA (818): 308-1800, 789-9002, 841-7890
(714): 371-2291, 594-4567, 966-0313, 370-1200, 498-9504,
(415): 778-3420, 952-4757, 682-3851, 490-7366, 430-2900, 836-8700
COLORADO (303) : 590-1003, 830-9210, 356-0425, 543-3313
CONNETICUT (203): 242-7140, 773-0082, 226-5250
FLORIDA (305) : 395-7330, 463-0887, 466-0661
GEORGIA (404) : 546-0167, 446-0270, 722-7967, 327-0369, 424-0025, 291-1000
HAWAII (808) : 528-4450
IDAHO (208) : 343-0404, 523-2964, 233-2501
KENTUCKY (502) : 782-0436, 499-7110
LOUISIANA (318) : 443-9544, 237-9500, 436-1633, 322-4109, 688-5840
MICHIGAN (313) : 662-8282, 963-3388, 963-8880, 963-2353, 732-7303, 459-8900
985-6005, 569-8350
(517) : 787-9461, 484-6602, 631-4721
MONTANA (406) : 252-4880, 586-7638, 494-6615, 727-0100, 728-2415
NEBRASKA (402) : 475-8659, 397-0414
NEVADA (702) : 293-0300, 885-8411
OKLAHOMA (405) : 223-1552, 233-7903, 355-0745, 947-6387, 582-4433
OREGON (503) : 485-0027, 773-1257, 226-0627, 399-1453
TEXAS (713) : 427-5856, 556-6700
VERMONT (802) : 658-2123, 223-3519
THOSE AREN'T ALL THE TYMNET NUMBERS, BUT YOU SHOULD BE ABLE TO FIND ONE
TO CALL.
CAUTION:
----------
TYMNET SEEMS TO BE BECOMING AWARE OF HACKERS, AND CALLING THE SAME PLACE TOO
MANY TIMES IN A ROW COULD HAVE COMPLICATED RESULTS. ESPECIALLY IF YOU ONLY
GO TO 1 OR 2 DIFFERENT SYSTEMS.
TRY ALL THE ID'S UNTILL YOU FIND SEVERAL THAT WORK WITH YOUR SYSTEM, THEN
NOT ONLY CAN YOU GO TO SEVERAL DIFFERENT PLACES SO AS NOT TO ATTRACT ATTENTION
TO YOURSELF, BUT YOU CAN ENTER A DIFFERENT ID LETTER ALSO.
IF YOU HAVE ANY QUESTIONS, ADDITIONS OR COMPLAINTS, CONTACT ME ON:
THE CARTEL BBS 'SEMI-NETWORK' Main Board - 206-825-6236.
---
π¦SILICON RAT
=+=
==============================================================================
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: The NIRVANAnet(tm) Seven
& the Temple of the Screaming Electron Taipan Enigma 510/935-5845
Burn This Flag Zardoz 408/363-9766
realitycheck Poindexter Fortran 510/527-1662
Lies Unlimited Mick Freen 801/278-2699
The New Dork Sublime Biffnix 415/864-DORK
The Shrine Rif Raf 206/794-6674
Planet Mirth Simon Jester 510/786-6560
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
OKLAHOMA (405) : 223-1552, 233-7903, 355-0745, 947-6387, 582-4433
OREGON (503) : 485-0027, 773-1257, 226-0627, 399-1453
TEXAS (713) : 427-5856, 556-6700
VERMONT (802) : 658-2123, 223-3519
THOSE AREN'T ALL THE TYMNET NUMBERS, BUT YOU SHOULD BE ABLE TO FIND ONE
TO CALL.
CAUTION:
----------
TYMNET SEEMS TO BE BECOMING AWARE OF HACKERS, AND CALLING THE SAME PLACE TOO
MANY TIMES IN A ROW COULD HAVE COMPLICATED RESULTS. ESPECIALLY IF YOU ONLY
GO TO 1 OR 2 DIFFERENT SYSTEMS.
TRY ALL THE ID'S UNTILL YOU FIND SEVERAL THAT WORK WITH YOUR SYSTEM, THEN
NOT ONLY CAN YOU GO TO SEVERAL DIFFERENT PLACES SO AS NOT TO ATTRACT ATTENTION
TO YOURSELF, BUT YOU CAN ENTER A DIFFERENT ID LETTER ALSO.
IF YOU HAVE ANY QUESTIONS, ADDITIONS OR COMPLAINTS, CONTACT ME ON:
THE CARTEL BBS 'SEMI-NETWORK' Main Board - 206-825-6236.
---
π¦SILICON RAT
=+=
==============================================================================
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: The NIRVANAnet(tm) Seven
& the Temple of the Screaming Electron Taipan Enigma 510/935-5845
Burn This Flag Zardoz 408/363-9766
realitycheck Poindexter Fortran 510/527-1662
Lies Unlimited Mick Freen 801/278-2699
The New Dork Sublime Biffnix 415/864-DORK
The Shrine Rif Raf 206/794-6674
Planet Mirth Simon Jester 510/786-6560
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦a good tool for termux :
1) git clone https://github.com/joker25000/Devploit.git
2) cd Devploit
3) chmod +x install
4) ./install
5) Run in Terminal
Devploit
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦a good tool for termux :
1) git clone https://github.com/joker25000/Devploit.git
2) cd Devploit
3) chmod +x install
4) ./install
5) Run in Terminal
Devploit
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hacking Webpages
1) Getting the Password File Through FTP
Ok well one of the easiest ways of getting superuser access is through
anonymous ftp access into a webpage. First you need learn a little about
the password file...
root:User:d7Bdg:1n2HG2:1127:20:Superuser
TomJones:p5Y(h0tiC:1229:20:Tom Jones,:/usr/people/tomjones:/bin/csh
BBob:EUyd5XAAtv2dA:1129:20:Billy Bob:/usr/people/bbob:/bin/csh
2) This is an example of a regular encrypted password file. The Superuser is
the part that gives you root. That's the main part of the file.
root:x:0:1:Superuser:/:
ftp:x:202:102:Anonymous ftp:/u1/ftp:
ftpadmin:x:203:102:ftp Administrator:/u1/ftp
3) This is another example of a password file, only this one has one little
difference, it's shadowed. Shadowed password files don't let you view or
copy the actual encrypted password. This causes problems for the password
cracker and dictionary maker(both explained later in the text). Below is
another example of a shadowed password file:
root:x:0:1:0000-Admin(0000):/:/usr/bin/csh
daemon:x:1:1:0000-Admin(0000):/:
bin:x:2:2:0000-Admin(0000):/usr/bin:
sys:x:3:3:0000-Admin(0000):/:
adm:x:4:4:0000-Admin(0000):/var/adm:
lp:x:71:8:0000-lp(0000):/usr/spool/lp:
smtp:x:0:0:mail daemon user:/:
uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp:
nuucp:x:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:uid no body:/:
noaccess:x:60002:60002:uid no access:/:
webmastr:x:53:53:WWW Admin:/export/home/webmastr:/usr/bin/csh
pin4geo:x:55:55:PinPaper Admin:/export/home/webmastr/new/gregY/test/pin4geo:/bin/false
ftp:x:54:54:Anonymous FTP:/export/home/anon_ftp:/bin/false
5) Shadowed password files have an "x" in the place of a password or sometimes
they are disguised as an * as well.
Now that you know a little more about what the actual password file looks
like you should be able to identify a normal encrypted pw from a shadowed
pw file. We can now go on to talk about how to crack it.
6) Cracking a password file isn't as complicated as it would seem, although the
files vary from system to system. 1.The first step that you would take is
to download or copy the file. 2. The second step is to find a password
cracker and a dictionary maker..
π¦ Hacking Webpages
1) Getting the Password File Through FTP
Ok well one of the easiest ways of getting superuser access is through
anonymous ftp access into a webpage. First you need learn a little about
the password file...
root:User:d7Bdg:1n2HG2:1127:20:Superuser
TomJones:p5Y(h0tiC:1229:20:Tom Jones,:/usr/people/tomjones:/bin/csh
BBob:EUyd5XAAtv2dA:1129:20:Billy Bob:/usr/people/bbob:/bin/csh
2) This is an example of a regular encrypted password file. The Superuser is
the part that gives you root. That's the main part of the file.
root:x:0:1:Superuser:/:
ftp:x:202:102:Anonymous ftp:/u1/ftp:
ftpadmin:x:203:102:ftp Administrator:/u1/ftp
3) This is another example of a password file, only this one has one little
difference, it's shadowed. Shadowed password files don't let you view or
copy the actual encrypted password. This causes problems for the password
cracker and dictionary maker(both explained later in the text). Below is
another example of a shadowed password file:
root:x:0:1:0000-Admin(0000):/:/usr/bin/csh
daemon:x:1:1:0000-Admin(0000):/:
bin:x:2:2:0000-Admin(0000):/usr/bin:
sys:x:3:3:0000-Admin(0000):/:
adm:x:4:4:0000-Admin(0000):/var/adm:
lp:x:71:8:0000-lp(0000):/usr/spool/lp:
smtp:x:0:0:mail daemon user:/:
uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp:
nuucp:x:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:uid no body:/:
noaccess:x:60002:60002:uid no access:/:
webmastr:x:53:53:WWW Admin:/export/home/webmastr:/usr/bin/csh
pin4geo:x:55:55:PinPaper Admin:/export/home/webmastr/new/gregY/test/pin4geo:/bin/false
ftp:x:54:54:Anonymous FTP:/export/home/anon_ftp:/bin/false
5) Shadowed password files have an "x" in the place of a password or sometimes
they are disguised as an * as well.
Now that you know a little more about what the actual password file looks
like you should be able to identify a normal encrypted pw from a shadowed
pw file. We can now go on to talk about how to crack it.
6) Cracking a password file isn't as complicated as it would seem, although the
files vary from system to system. 1.The first step that you would take is
to download or copy the file. 2. The second step is to find a password
cracker and a dictionary maker..
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Web hacking :
The PHF Technique
1) The phf technique is by far the easiest way of getting a password file
(although it doesn't work 95% of the time). But to do the phf all you do
is open a browser and type in the following link:
http://webpage_goes_here/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
2) You replace the webpage_goes_here with the domain. So if you were trying to
get the pw file for www.webpage.com you would type:
http://www.webpage.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
and that's it! You just sit back and copy the file(if it works).
3) The best way to get root is with an exploit...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Web hacking :
The PHF Technique
1) The phf technique is by far the easiest way of getting a password file
(although it doesn't work 95% of the time). But to do the phf all you do
is open a browser and type in the following link:
http://webpage_goes_here/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
2) You replace the webpage_goes_here with the domain. So if you were trying to
get the pw file for www.webpage.com you would type:
http://www.webpage.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd
and that's it! You just sit back and copy the file(if it works).
3) The best way to get root is with an exploit...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β