Advertisement
Guest User

Untitled

a guest
Jun 1st, 2013
143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.69 KB | None | 0 0
  1. ****************************
  2. *** HACKING TECHNIQUES ***
  3. *** Typed By: LOGAN-5 ***
  4. *** (Hacker Supreme) ***
  5. *** From the ***
  6. *** Inner Circle Book ***
  7. ****************************
  8.  
  9. 1) CALLBACK UNITS:
  10.  
  11. Callback units are a good security device, But with most phone systems,
  12. it is quite possible for the hacker to use the following steps to get
  13. around a callback unit that uses the same phone line for both incomming
  14. and out going calls:First, he calls he callback unit and enters any
  15. authorized ID code (this is not hard to get,as you'll see in a moment).
  16. After he enters this ID, the hacker holds the phone line open - he does
  17. not hang up. When the callback unit picks up the phone to call the user back,
  18. the hacker is there, waiting to meet it.
  19.  
  20. The ID code as I said, is simple for a hacker to obtain, because these
  21. codes are not meant to be security precautions.The callback unit itself
  22. provides security by keeping incomming calls from reaching the computer.
  23. The ID codes are no more private than most telephone numbers. Some callback
  24. units refer to the codes as "location identification numbers," and some
  25. locations are used by several different people,so their IDs are fairly
  26. well known.I've been told that, in some cases,callback ubits also have
  27. certain simple codes that are always defined by default. Once the hacker
  28. has entered an ID code and the callback unit has picked up the phone to
  29. re-call him,the hacker may or may not decide to provide a dial tone to
  30. allow the unit to "think" it is calling the correct number. In any event,
  31. the hacker will then turn on his computer, connect with the system - and
  32. away he goes.If the however, the hacker has trouble holding the line with
  33. method,he has an option: the intercept.
  34.  
  35. The Intercept:
  36. Holding the line will only work with callback units that use the same
  37. phone lines to call in and to call out.Some callback units use different
  38. incoming and outgoing lines, numbers 555-3820 through 555-3830 are dedicated
  39. to users' incoming calls, and lines 555-2020 through 555-2030 are dedicated
  40. to the computers outgoing calls.The only thing a hacker needs in order to
  41. get through to these systems is a computer and a little time - he doesn't
  42. even need an ID code. First,the hacker calls any one of the outgoing phone
  43. lines, which, of course, will not answer.Sooner or later, though, while the
  44. hacker has his computer waiting there, listening to the ring, an authorized
  45. user will call one of the incomming lines and request to be called back.
  46. It will usually be less than an hours wait, but the hacker's computer
  47. is perfectly capable of waiting for days, if need be.
  48.  
  49. The callback unit will take the code of the authorized user, hang up,
  50. verify the code, and pick up the phone line to call back.If the unit
  51. tries to call out on the line the hacker has dialed, the hacker has his
  52. computer play a tone that sounds just like a dial tone.The computer will
  53. then dial the number given that matches up with the user's authorized ID.
  54. After that,the hacker can just connect his computer as he would in any
  55. other case.If he is really serious,he will even decode the touch tones
  56. that the mainframe dialed,figure out the phone number of the user the
  57. system was calling, call the person, and make a few strange noises that
  58. sound as though the computer called back but didnt work for some reason.
  59.  
  60. 2) TRAPDOORS AS A POSSIBLILITY
  61.  
  62. I haven't heard of this happening, but i think it is possible that a
  63. callback modem could have a trapdoor built into it.Callback modems are
  64. run by software, which is written by programmers.An unscrupulous programmer
  65. could find it very easy to slip in an unpublicized routine, such as,
  66. "if code =*43*, then show all valid codes and phone numbers." And such a
  67. routine, of course, would leave security wide open to anyone who found the
  68. trapdoor.The obvious protection here, assuming the situation ever arises,
  69. is simply an ethical manufactorer that checks its software thoroughly before
  70. releasing it.
  71.  
  72. A trapdoor is a set of special instructions embedded in the large
  73. program that is the operating system of a computer.A permanent,
  74. hopefully secret "doorway", these special instructions enabe anyone who
  75. knows about them to bypass normal security procedures and to gain access to
  76. the computer's files.Although they may sound sinister, trapdoors were not
  77. invented by hackers, although existing ones are certainly used by hackers
  78. who find out about them.
  79.  
  80. 3) THE DECOY
  81.  
  82. One of the more sophisticated hacking tools is known as the decoy, and it
  83. comes in three versions.The first version requires that the hacker have an
  84. account on the system in question. As in my case,the hacker has a
  85. low-security account,and he tries this method to get higher-security
  86. account.He will first use his low-security account to write a program that
  87. will emulate the log-on procedures of the systems in questions.
  88. This program will do the following:
  89.  
  90. *- Clear the terminal screen and place text on it that makes everything
  91. look as if the system is in charge.
  92.  
  93. *- Prompt for, and allow the user to enter, both an account name and a password.
  94. *- Save that information in a place the hacker can access.
  95.  
  96. *- Tell the use the account/password entries are not acceptable.
  97.  
  98. *- turn control of the terminal back over to the system.
  99.  
  100. The user will now assume that the account name or password was mistyped
  101. and will try again...this time (scince the real operating system is in
  102. control) with more success.You can see a diagram of the way these steps are
  103. accomplished
  104.  
  105. ___________________
  106. | Clear Terminal |
  107. | screen |
  108. |____________________|
  109. ||
  110. _________||_________
  111. | Print Compuserve |
  112. | Computer |
  113. |_____ Network ______|
  114. ||
  115. _________||_________
  116. | Print "ENTER |
  117. | PASSWORD" |______
  118. |____________________| |
  119. || |
  120. _________||_________ |
  121. | PASSWORD ENTERED? |__NO__|
  122. |____________________|
  123. ||_YES
  124. _________||_________
  125. | SAVE PASSWORD |
  126. | INFORMATION |
  127. |____________________|
  128. ||
  129. _________||_________
  130. | PRINT "LOGIN |
  131. | INCORRECT |
  132. |____________________|
  133. ||
  134. _________||_________
  135. | LOG OFF/RETURN |
  136. | CONTROL TO |
  137. | OPERATING SYSTEM |
  138. |____________________|
  139.  
  140. 4) CALL FORWARDING
  141.  
  142. Many people use call forwarding by special arrangement with the phone
  143. company.When a customer requests call forwarding, the phone company uses
  144. its computer to forward all the customers incomeing calls to another
  145. number. Lets say, for example, that you want calls that come to your office
  146. phone to be forwarded to your home phone: A call from you to the phone
  147. company,some special settings in the phone companys computer, and all
  148. calls to your office will ring at your home instead.This little bit of help
  149. from the phone company is another tool used by hackers. Lets say you thought
  150. that the computer you were hacking into was being watched-because the
  151. sysop might have seen you and called the fed's and your sort of bugged by
  152. this nagging feeling that they will trace the next hacker that calls,
  153. just call the phone company and ask for call forwarding, pick a number,
  154. (ANY NUMBER) out of the phone book and have your calls forwarded to that
  155. number,Hea,Hea, the number you picked is the one that will be traced to,
  156. not yours, so you could be hacking away,they think that they have traced you,
  157. but actually the number you had your calls forwarded too. they enter chat mode
  158. and say (YOUR BUSTED!!!!, WE'VE TRACED YOUR PHONE NUMER THE FEDS ARE ON THE
  159. WAY!!), You could reply (Hea, SURE YA DID! I'D LIKE TO SEE YA TRY AND GET ME!
  160. GO AHEAD!) ,that wont seem very important to them at the time, but it will
  161. sure piss them off when they bust the wrong guy!
  162.  
  163. 5) RAPID FIRE
  164.  
  165. Memory-location manipulation can be helpful, but there is another, more
  166. powerful,possibility, in some cases: the Rapid-fire method.To understand how
  167. this methos works, you have to know something about the way operationg
  168. systems work.When a user enters a command, the operating system first places
  169. the command in a holding area, a buffer, where it will sit for a few
  170. millionths of a second.The system looks at the command and say's "Does this
  171. person really have authorization to do this, or not?" Then, the command
  172. sits there a few thousandths of a second while the system runs off to
  173. check the user's authorization.When the system comes back to the command,
  174. it will have one of two possible answers: "OK, GO AHEAD," or "SORRY,
  175. GET PERMISSION FIRST."
  176.  
  177. Once you are on a system that handles things this way, you can use the
  178. rapid-fire method to change the command while its sitting in the buffer,
  179. waiting to be executed. If you can do this,you can do anything.You can enter
  180. a command that you know will be approved, such as "tell me the time." As soon
  181. as the system runs off to verify your right to know the time,you change
  182. the command in the buffer to something you know would not be approved-perhaps
  183. "give me a list of all the passwords." When the system comes back with an
  184. "OK, go ahead," it responds to your second command, not the first. Of course,
  185. this exchange has to be done very rapidly,but most systems existing today
  186. can be fooled by this trick. The question is,how easy is it to do, and how
  187. much authority do you need? I know of one system that let this one slip.
  188.  
  189. These are certainly not all the hacker's little secret tricks and tool's,
  190. You will probably figure out some better, more efficiant,hacking techniques.
  191.  
  192. GOOD LUCK!!!!!!
  193. L O G A N - 5
  194. <------------------------------------------------>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement