R:990209/0256Z @:NL3DAV.ZH.NLD.EU #:44436 [Leiderdorp] FBB7.00f $:103-R0CK
R:990208/2342Z @:NL3ZMR.ZH.NLD.EU #:39443 [Zoetermeer] FBB7.00g $:103-R0CK
R:990207/1301Z @:NL3LDM.ZH.NLD.EU #:1633 [L.dam] FBB7.00f $:103-R0CK
R:990207/0433Z @:NL3RTD.ZH.NLD.EU #:48853 [Rotterdam-Noord] $:103-R0CK
R:990207/0829Z @:NL3IPR.IPR.NLD.EU #:47001 [IPR] FBB7.00g $:103-R0CK
R:990206/1225Z @:BE1BBS.ZL.NLD.EU #:60099 [Middelburg] FBB7.00g $:103-R0CK

From: R0CK@BE1BBS.ZL.NLD.EU
To  : HACK@WW


[¯¯¯ TST HOST 1.43b, UTC diff:5, Local time: Sat Feb 06 12:15:39 1999 ®®®]

Yo Hackerz,



POWER IS KNOWLEDGE !!!! So keep on reading:



Unresponsive Systems
~~~~~~~~~~~~~~~~~~~~
   Occasionally you will connect to a system that will do nothing but sit
there.  This is a frustrating feeling, but a methodical approach to the system
will yield a response if you take your time.  The following list will usually
make *something* happen.
1)  Change your parity, data length, and stop bits.  A system that won't re-
    spond at 8N1 may react at 7E1 or 8E2 or 7S2.  If you don't have a term
    program that will let you set parity to EVEN, ODD, SPACE, MARK, and NONE,
    with data length of 7 or 8, and 1 or 2 stop bits, go out and buy one.
    While having a good term program isn't absolutely necessary, it sure is
    helpful.
2)  Change baud rates.  Again, if your term program will let you choose odd
    baud rates such as 600 or 1100, you will occasionally be able to penetrate
    some very interesting systems, as most systems that depend on a strange
    baud rate seem to think that this is all the security they need...
3)  Send a series of 's.
4)  Send a hard break followed by a .
5)  Type a series of .'s (periods).  The Canadian network Datapac responds
    to this.
6)  If you're getting garbage, hit an 'i'.  Tymnet responds to this, as does
    a MultiLink II.
7)  Begin sending control characters, starting with ^A --> ^Z.
8)  Change terminal emulations.  What your vt100 emulation thinks is garbage
    may all of a sudden become crystal clear using ADM-5 emulation.  This also
    relates to how good your term program is.
9)  Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, LOGON, GO,
    JOIN, HELP, and anything else you can think of.
10) If it's a dialin, call the numbers around it and see if a company
    answers.  If they do, try some social engineering.

Brute Force Hacking
~~~~~~~~~~~~~~~~~~~
   There will also be many occasions when the default passwords will not work
on an account.  At this point, you can either go onto the next system on your
list, or you can try to 'brute-force' your way in by trying a large database
of passwords on that one account.  Be careful, though!  This works fine on
systems that don't keep track of invalid logins, but on a system like a VMS,
someone is going to have a heart attack if they come back and see '600 Bad
Login Attempts Since Last Session' on their account.  There are also some
operating systems that disconnect after 'x' number of invalid login attempts
and refuse to allow any more attempts for one hour, or ten minutes, or some-
times until the next day.
   The following list is taken from my own password database plus the data-
base of passwords that was used in the Internet UNIX Worm that was running
around in November of 1988.  For a shorter group, try first names, computer
terms, and obvious things like 'secret', 'password', 'open', and the name
of the account.  Also try the name of the company that owns the computer
system (if known), the company initials, and things relating to the products
the company makes or deals with.

                              Password List
                              =============

      aaa                daniel             jester             rascal
      academia           danny              johnny             really
      ada                dave               joseph             rebecca
      adrian             deb                joshua             remote
      aerobics           debbie             judith             rick
      airplane           deborah            juggle             reagan
      albany             december           julia              robot
      albatross          desperate          kathleen           robotics
      albert             develop            kermit             rolex
      alex               diet               kernel             ronald
      alexander          digital            knight             rosebud
      algebra            discovery          lambda             rosemary
      alias              disney             larry              roses
      alpha              dog                lazarus            ruben
      alphabet           drought            lee                rules
      ama                duncan             leroy              ruth
      amy                easy               lewis              sal
      analog             eatme              light              saxon
      anchor             edges              lisa               scheme
      andy               edwin              louis              scott
      andrea             egghead            lynne              scotty
      animal             eileen             mac                secret
      answer             einstein           macintosh          sensor
      anything           elephant           mack               serenity
      arrow              elizabeth          maggot             sex
      arthur             ellen              magic              shark


                       ---=== TO BE CONTINUED ===---


GreetZ

                         
HM Murdock

                         
                         
                         R0CK@BE1BBS.ZL.NLD.EU

 Û\ Û\ ÛßßÛ\ Ûßß Û\ Ü  ßßÛßß\ Û\ Û\ Ûßßß\  ÛßßÛ\ Û\  ÛßßÛ\ Û  Û\ Ûßßß\ ßßÛßß\
 ÛßßÛ\ ÛÜÜÛ\ Û\  ÛÜß\    Û\   ÛßßÛ\ Ûßß\   Ûßßß  Û\  ÛÜÜÛ\ ÛßÜÛ\ Ûßß\    Û\
 Û\ Û\ Û  Û\ ÛÜÜ Û\ßÜ    Û\   Û\ Û\ ÛÜÜÜ   Û\    ÛÜÜ Û  Û\ Û  Û\ ÛÜÜÜ    Û\
                                  
                      E-MAIL: HM_MURDOCK@USA.NET