________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 0 - 8 Series #1 Disclaimer ~~~~~~~~~~ This text file is for informational purposes only, any reproductions of this file is not illegal. I do not take any responsibality for the preceeding messages, or do incourage you to do anything described in the text file. Description ~~~~~~~~~~~ In the following issues of Krack (which will be issued monthly) will contain 8 files containing of 1 issue. The files will be reproductions, descriptions, Telephone Fraud, Phreaking, Carding, PBX, mics items, ect. The files will not only be written by me, but others. The intention of this is to carry out on the production of the stopped magazine "Phrack". All you "underground members" are welcome to goin in and construct/help produce Krack. Krack #1 ~~~~~~~~ This file will be the first of a series of many in the Krack library. The first file will get you into the seriousness of the following items, or text files. Krack #2 ~~~~~~~~ The file will explain all about recent busts. The file is fairly new and explains in detail some occurances that have happened, and all the stupid things you should be aware of. Krack #3 ~~~~~~~~ The file explains a recent NASA breakin! Very good Krack #4 ~~~~~~~~ This file is all about Picking Master Locks, Seriousness of Locker Breakins. Krack #5 ~~~~~~~~ This file explains Phone Sex, and how to benifet from setting up your own line for phone sex! Krack #6 ~~~~~~~~ What to do if you Detect a Bug. Also other concerns about bugging homes, where bugs are hidden, how to detect a bug. Krack #7 ~~~~~~~~ A Krack Orignal! ProTerm Emulation Documents. Ever run a board and just don't know how to do ProTerm Emulation like the other boards? Well just read the docs and you will be programming like a wizard Krack #8 ~~~~~~~~ GPR! Known as the popular 'Game Players Review' The game players review will not only review new releases for game systems, but will also tell you some tips on new/old games. The Currently Supported Systems are: Turbo Grafx-16, Genesis, Lynx, and Nintendo. More to come.. Publication ID: krackpub#0,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) Staff this Issue: ----------------- Octavian a. Orgnizer b. Intro Phreaking c. Master Lock #2 d. ProTerm Docs Overlord a. Nasa Breakins Phrack Inc. a. Master Lock #1 b. Detect a Bug? Unknown. a. News Update b. Penilities to Phreaking c. Carding #1 Overall Staff: ---------------------------- Octavian Overlord Phrack Inc Unknown Writters Wonder Boy Anaesthetist ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 1 - 8 Series #1 Issue: Phreaking Basics First off the term "Phreaking" is a faster way to say Telephone Fraud. Telephone is a serious crime and I do not recomend you try it because of the seriousness of it, a few penilities of phreaking is 1. Inprisonment (18 years or older) 2. Confiscated computer (third offence) 3. Pay for telephone bill (most common) 4. Community service (50-100hrs) (I dont think they have changed) for more information of busted phreakers please read ending The most common ways of going about phreaking is geting an extender (1800-225-5946 which might have been in use). The extenders resemble bulk mailing in the post office, which companies order it for a periof of time at a reduced rate. After you dial the extender there will be a recording telling you to enter a code, most codes run from 5-11 digits, finding how many digits is the trickey part. After you enter the aurthirization code it may then ask you for the phone number you wish to dial. The important thing is that you don't enter the 1 before the area code! This method of phreaking is commonly refered to as ACN (Extender - Code - Number). Some extenders have it reversed to ANC (Extender - Number - Code). That's the basic phreaking way and I do not recomend you trying this and I do not take any responsibility for your actions! Well thats is for this issue, and they will get in depth as you learn more about the basics. ---Octavian Busted! ~~~~~~~ Note: This article was taken from a series of text files on the seriousness of getting cought. Please be aware of the penilities. Article #1 ~~~~~~~~~~~ Title: ~~~~~~ Teen-Ager Faces Felony Charges In Computer Crimes Date: ~~~~~ August 9, 1988 Article: ~~~~~~~~ Using a personal computer to break into AT&T and government computers and steal more than $1 million worth of software. This is not malicious mischief," U.s. Attorney Anton Valukas said in announcing the federal charges. "It's a felony." Herbert Zinn Jr., 18, also is accused of advertising on a computer bulletin board how to break into AT&T's computers electronically. The charges against Zinn mark the start of "an aggressive position toward computer crimes, "Valukas said. Zinn allegedly committed the crimes when he was a juvenile, and could be sent to prison until his 21st birthday in August 1991. Federal agents raided Zinn's home last year and confiscated three computers and software allegedly stolen during the electronic break-ins. The federal charges were brought after Zinn had been arrested several times, including for alleged computer break-ins at the Keller Graduate School of Management and at Commodity Perspective Inc., both in Chicago. "Before and after the computer break-ins (at Keller and Commodity Perspective), Zinn was, by his own admission, breaking into AT&T computers," Valukas said. Court documents said Zinn broke into an AT&T computer at the North Atlantic Treaty Organization's Maintenance and Supply Headquarters in Burlington, N.C., and an AT&T computer at Robins Air Force Base, Ga. Valukas said the software taken from NATO and the Air Force base were "low level in terms of sensitivity." Agents raided Zinn's home after an AT&T security officer logged onto the so-called Phreak Class-2600 computer bulletin board and spotted messages signed by "Shadow Hawk," a code name the government said the teen-ager used. Shadow Hawk bragged in the messages that he had gained access to AT&T computer files, but he inadvertently included his telephone number. Article #2 ~~~~~~~~~~~~ Title: ~~~~~~ 17 Arrested in High-Tech Phone Fraud Date: ~~~~~ April 27, 1988 - Newsweek Newspaper Article: ~~~~~~~~ HONOLULU--AP It was high-tech robbery -- the theft and sale of long-distance telephone service. Seventeen people in 13 states were arrested Monday. The charge: conspiracy to commit access device fraud and wire fraud. The victims: U.S. Sprint, MCI Corp., Allnet Corp.,ITT, Tri-Tel Communications. Their loss: a reported $125 million in the past year. Steve Ramsay of the Secret Service said those charged sold access codes for $80 to $150 a month. An access code -- a telephone credit card number-- allows callers to use long-distance phone lines. Calls were billed to that card number. The distributors often sold one code to hundreds, maybe thousands of people, Ramsey said. Charged to one number in four days: $73,592. According to Assistant U.S. Attorney Robert Godbey: Computers were programmed to call the companies' long distance networks, then enter a credit card number to pay for the call. If the number was rejected, the computer kept dialing until one was accepted. The successful number then was sold. Whoever was assigned the number, got the bill. "It was the miracle of technology, the computer took a simple chore and did it over and over and over," he said. The Secret Service caugt them by setting up their own distributorship of illegal numbers -- a "sting operation" -- and "making controlled diliveries," Ramsey said. Publication ID: krackpub#1,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 2 - 8 Series #1 Isssue: News Updates! Hacking Clubs ~~~~~~~~~~~~~ Early computer hackers tended to be college students. With the advent of home computers, and the teaching of computer basics at the grade school level, the average age of the begininning (youth) hacker has dropped to only 14!! The overwhelming majority of BBS owners and users are teenagers. Teens tend to form cliques and peer groups, so the formation of phone phreak and hacker gangs was inevitable. The parents of these bright teens usually do not, themselves, understand the power of the computer. This means that the teens are not subject to the same parental restrictions that would govern their using the family car. Many parents veiw the home computer as an excellent baby-sitting device. If their child spends an evening quietly in his/her room with the computer the parents feel that thier offspring is not getting into any trouble. In reality, these teens may be engaging in electronic gang activites that have very serious implications. Losses to the software industry alone are staggering!!! Unfortunately, many of the gang leaders are older, more experienced teens, perhaps college students. These people are interested in hacking not for its intellectual challenge, for for its financial rewards. A few gang leaders are adults who are politically or firal adults who are major figures behind the cracking and distribution of pirated software for resale to the public. One adult gang leader openly solicited credit card numbers from the juvenile members in exchange for fraudulently obtained hard disk drives and other equipment. Some of the teenage leaders seek notoriety and acclaim from their peers. They strive to be the biggest phreaker or to have broken into the greatest number of computer systems. The gangs may be local in nature such as the infamous "Milwaukee 414 gang"; they may be national in nature, like the "Inner Circle"; or even international. One such international group is "NYSHII" or "CHAOS" both cracking and pirating clubs with headquaters in both West Germany and the United States. All of these groups had a BBS that was their main base of operations and served supposedly as a sercure communications center. The 414s had a private BBS that was so sercet it didn't even have a name. The Inner Circle had a Securityland BBS and Illegitimate accounts on GTE'S Telemail network. Chaos operates on a variety of BBS's in both the U.S. and West Germany. NYSHII (New York Safehouse II) to this date has baffled local and international law enforcement agencys as to it's true whereabouts. The Sysop "The Line Breaker" has found a way of changing the BBS's location on a weekly basis without moving the master computer. Orginzed Crime News Update ~~~~~~~~~~~~~~~~~~~~~~~~~~ Naturally, an underground BBS could be used by organized crime in much the same manner as the teen hacker gangs use them. The author has good reason to believe thgat organized crime is controlling a number of BBS systems in the Midwest, the New York City area, and in Florida. One informant claims there is a bbs that is located in an off-track betting parlor. Teenagers are easily recruited to act as information gathers for organized crime. The young people work for little or nothing and, in most cases, do not even know that they are being used. The author and other adult hackers have been approached and offered large sums of money to tamper with banking and credit data computer systems. Organized crime is moving into this new area of crime. There is a real and present danger if BBSs continue to be alloowed to operate unchecked. Underground BBSs may be creating a whole new generation of criminals. As the youthful hackers mature, their interest in hacking as an intellectual challenge and rebellion against authority may be replaced by profit motive. College students always seem to need money and the teens who do not go to college may find it difficult to obtain a job. It is only natural that these individuals would graviate into hacking for personal gain. For example, many bulletin boards cater to those who are involved in credit card fraud. There is also evidence that drug dealers use BBSs to arrange swaps of stolen property for drugs. Hackers who have learned how to access credit bureau systems, such as TRWs, have discovered that making unauthorized credit checks foe business. Credit bureau computer penetrations are routine in the hacker under- ground. The typical hacker gang obtains credit card numbers from discarded charge slip carbons. As an alternative, one or more hackers who work in retail establishments may supply card numbers. Other gang members can then check the cards for credit limits and expiuration dates by using the telephone or illegally accessing credit bureau computers. Others in the gang set up mail drops and safe houses for the deliverly of the merchandise ordered by mail and charged to the credit card numbers. Since the gangs know no geographic boundaries, it is difficult to investigate these frauds. Some commerical time-sharing services, such as Comp-u-serve, allow merchandise to be ordered via computer and shipped to the user's address. ime-sharing accounts are easily obtained with a stolen credit card. This allows the thief to order merchandise with little fear of being traced. These new high tech thieves are replacing more traditional criminals. The hackers and phone phreaks have knowledge and skill to completly disrupt major communication and computer networks. All that is lacking is organization, planning and financing. If enemy power should infiltrate and organize this underground, the consequences could be disastrous. Subversive Bulletin Boards ~~~~~~~~~~~~~~~~~~~~~~~~~~ An article in a newspaper from the United Kingdom had an article relating to a computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire, England. It contained information relating to such things as making plastic explosives. Anti-terrorist detectives are said to be investigating for possible breaches of the Obscene Publications Act. Apparently reporters were able to easily gain access to this bulletin board and peruse articles on such subjects as credit card fraud, making various types of explosives, street fighting techniques and dodging police radar traps. One article was obviously aimed at children and described how to make a bomb suitable for use on "the car of a teacher you do not like at school," which would destroy the tire of a car when it was started. The boy's parents did not seem to think that their son was doing anything wrong, preferring him to be working with his computer rather than roaming the streets. A London computer consultant, Noel Bradford, is quoted as having seen the bulletin board and found messages discussing "how to crack British Telecom, how to get money out of people and how to defraud credit card companies. Credit card numbers are given, along with PIN numbers, names, addresses and other details." Publication ID: krackpub#2,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 3 - 8 Series #1 Issue: Nasa Breakins Nasa Breakin Report ~~~~~~~~~~~~~~~~~~~ Boy tells of 'WAR GAMES' on NASA computers HUNTSVILLE, Ala.(AP)-One of four teenagers whose home computers were seized by the FBI after an ilegal tap into NASA computers likend his electronic forays to those in the movie "WAR GAMES," and one of the boys mothers said they never ment any harm. "We didn't find anything top secret or anything we thought was top secret, just stuff about space and sattelites," Joe Moorman, 13, said after the FBI on onday seized home computers, floppy disks and software that were allegedly used to tap into two computers, according to the FBI. The unauthorized taps destroyed records and blocked scientists from using the computers, according to the FBI. "It was sort of like 'War Games,'" which depicted a students unauthorized entery into a strategic defense computer, Moorman said. "We used an automatic dialer to print out all the codes until we got the right one." printers were also seized from the youths' residences. The two NASA computers that were broken into contained no classified information, but secret passwords and access numbers were needed to use either machine, NASA officials said. "Valuable computer time was stolen and certain computer records have been destroyed by persons who made the penetrations," said Cecil Moses, special agent in charge of the FBI's Birmingham office. Charges have not been filed against the teenagers, but may be filed later, said Moses. Conviction for theft or destruction of government property carries a maximum fine of $10,000 and up to 10 years imprisonment. "NASA had good countermeasures in their system to discover any penetration and it took us about 10 days to trace the origin," said Tom Moore, an FBI spokesman. There has been no indication of any attempt to tap into NASA computers at the Kennedy Space Center in Cape Canaveral, Fla., or the Johnson Space Center in Houston, officials said. Tapping even the administrative computers "Has been made as diffucult as possible," said Hugh Harris, a spokesman at the Kennedy Space Center. A series of passwords and identefication codes must be used to gain access to these computers, and these are periodically changed, he said. Scientists at Marshall discoverd the computer break-in June 28 and reported it to the FBI, said Moses. The scientists were unable to use the computers whial the "hackers" were working on them, he said. The telephones through which the data banks were tapped were traced to the four residences raided Monday, which are all in the same area of Huntsville, said Moses and Moore. The FBI did not release the names of the teenagers, but residences where computer equipment was seized were identified by federal agents as those of William H. Graham, George R. Grumbles, Dr. Robert S. Moorman Jr. and Mark A. Strickland. Carroll Strickland said her 15 year-old son, Allen, who lost his computer equipment to the FBI, was innocent of tapping into the NASA computers. She said her son from a friend a list of telephone numbers that "Contained the number of the computer which we were recently told by the FBI was a NASA computer, not described as such on the list, of course." Mrs. Strickland said her son, despite two attempts, never gained access to the NASA computer. "As one of the FBI agents told us when he left yesterday, it was obvious there was nothing malicious in what they did," said Lenora Grumbles, the mother of the 16 year-old Robert Grumbles. He surrenderd an APPLE ][ computer to the FBI. Mrs. Grumbles said she was told any evidence the FBI may have found will be presented to a federal grand jury next month. She said agents also told her that "they will try to get our equipment back as soon as possible." Mrs. Grumbles said that she was "thouroughly convinced the children had no malicious intent. I guess we would have to say that their computer knowledge exceeds thier maturity." She said her son "passed all of us in computer know-how years ago." When he was 13, he and another student developed a video game called "Doom Vally." which is now being marketted nationally, she said. "we weren't really sure what he was doing, typing away at that computer all the time. I guess now we know," Mrs. Grumbles said. At Marshall, scientists work on general research and managment of the space program, including work on space shuttles. Publication ID: krackpub#3,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 1 - 8 Series #1 Issue: Master Locks Have you ever tried to impress your friends by picking one of those Master combination locks and failed? Well then read on. The Master lock company has made this kind of lock with a protection scheme. If you pull the handle of it hard, the knob won't turn. That was their biggest mistake...... Ok, now on to it. 1st number. Get out any of the Master locks so you know what's going on. 1: The handle part (the part that springs open when you get the combination), pull on it, but not enough so that the knob won't move. 2: While pulling on it turn the knob to the left until it won't move any more. Then add 5 to this number. Congradulations, you now have the 1st number. 2nd number. (a lot tougher) Ok, spin the dial around a couple of times, then go to the 1st number you got, then turn it to the right, bypassing the 1st number once. WHEN you have bypassed. Start pulling the handle and turning it. It will eventually fall into the groove and lock. While in the groove pull on it and turn the knob. If it is loose go to the next groove; if it's stiff you got the second number. 3rd number: After getting the 2nd, spin the dial, then enter the 2 numbers, then after the 2nd, go to the right and at all the numbers pull on it. The lock will eventually open if you did it right. If can't do it the first time, be patient, it takes time. * Credits - Taken from Phrack Updated 12/19/90 Krack #4 Issue #1 Master Lock Picking 12/20/90 Ever see a broken down railroad? Chances are you have, now a broken down railroad is the best tool for locker breakings! I am not saying just take the dam railroad, but try walking down the tracks and look for a railroad spike. (Railroad Tire Spike also works) Once you find the spike then all you need is a master lock. (Ever watch those comercials that they shoot a bullet through the lock? Hmm.. Makes you wonder.. Send a master lock and a railroad spike to David Horawitz 'Fight Back') After you have the two items then the rest is easy. Put the Spike in between the lock part and then just pull down/up. Kaboom! There you have an open master lock. * Credits - Octavian Publication ID: krackpub#4,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 5 - 8 Series #1 Issue: Phone Sex Ever called a phone sex line? Moaning and groaning of sensual pleasures for only 20-45 bucks, and memberships? The Scandal: The only way your are going to be able to pull this off is if you have call waiting (this is a necessary for the 1st type of phone sex scam), or a Voice Mail System (this is easy, but it is harder to get the cards out of the perverted ones). Sub-Section #1 : Call Waiting ----------------------------- Materials Needed ---------------- A Phone with TONE dialing (that PULSE shit ain't gonna cut it!) Call Waiting (of course) The number to the BEST phone sex line you can get (live convo's ONLY!) A good phreak (unless you live in LA where all the good ones are) A good MC/AMEX/VISA card (the sex line must carry all of those) Setting it up ------------- Using one of the cards, advertise in Penthouse Forum, Club, X Rated Porn Stars, or any other porno mag that is semi-hardcore and carries the sex line ads and card an advertisement. Have it run for a few weeks (send in a picture and shit for the ad, they will tell you all about it). You should get a different phone line that can be easily disconnected by Ma Bell so the feds don't come a runnin' and the perverts don't keep calling back. When the guys (or girls) call to "have sex", you simply answer the phone "Triple X Hardcore Porn Line, may I help you?" Go for a big ass ad in the mag, since you're not paying for it anyway. Ask for the person's credit card type, card #, expiration, bank number, name, etc. Don't ask too much personal information, you do not want them to hang up on you. Then after they give you the information, say "please wait". Next, dial the >GOOD< porn line and give THEM the information the person gave you (act as though you are them). Just before the chick comes on, hit the button and stick the dude online, say "enjoy!" Don't hang up, you will disconnect them (on some phones). I have also found that if you record them, you can exploit it to the maximum (if they are kids, tell them to give you all their parents cards or you will send the tape to mommy and daddy). You know have a good card, (if it has enough money on it for the line you just called!), go out and have fun. That is just 1 way to do it. Sub-Section #2 : Voice Mail Systems ----------------------------------- Get ahold of a voice mail system, the kind you just dial up and answers like an answering machine (the Dragonfire one is 415-227-5618, call it for an example). Set up the message (get your girlfriend to do this, or if you are a geek and have a squeaky voice, go for it!) to say something like this "Welcummmmm, tooooo Pandora's Hardcore Triple X CUM Again Porn Line, Please leave your name, number, credit card type, card number, expiration date, bank number, and anything you'd like to talk about. We will call you back in 2 hours. If this is inconvienent, please hang up and call when it is not. Otherwise, you will be getting the hottest head in LA,SF,Trenton, Lubbock, etc. Thank you for calling, mmmmmmmmmmm." BEEP. This way is a piece of shit way since it is so fucken inconvienent. You would be lucky if you got 2-3 cards in a week. But it's better than nothing. Remember, using this way, you don't do shit! You do not have to call the guy back. You got his card, why give him the merchandise? Heh. * Note I would like to state that credit card fraud is a serious offense under the constitution of the united states (i forget what amendment, but ya know, the one reagan made a year or two back). I am not liable for what you do with this, and I am in no way responsible for your actions with voice mail systems and false advertising. This file is for informational and educational purposes only (they all say that!) and should not actually be used. I had a brainstorm, * Credit - Unknown Publication ID: krackpub#5,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 6 - 8 Series #1 Issue: A Bug or Not to Bug? Detect a Bug??? ~~~~~~~~~~~~~~~ In today's landscape of insider trading, leveraged buyouts and merger mania, it is no great shock that a new underground industry has developed within telecom -- eavesdropping. Bugs are cheap (starting at $30) and can be installed in as little as 10 seconds. And you can bet your bottom $1 million that this expense pales in comparison to the rewards of finding out your takeover plans, marketing strategies, and product developments. According to Fritz Lang of Tactical Research Devices (Brewster, NY), there is a virtual epidemic of bugging going on in the American marketplace. Counter- surveillance agencies like TRD have sprung up all over. They search for eavesdropping equipment, then notify the client if they're being tapped. It's up to the client to respond to the intrusion. Each of TRD's employees is a retired CIA or FBI operative. Formerly, they planted bugs for Uncle Sam. Since it's illegal to plant bugs for anyone else, these men now engage in counter surveillance work, pinpointing eavesdropping devices, and sometimes the culprits who put them there, for TRD's client companies. Where Do They Put The Bugs? ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Your TELEPHONE, of course, is a convenient place to install an eavesdropping device. But this doesn't mean that the illegal tapping will be limited to your phone conversations. Electronic phones have microphones which are always "live," even when the telephone is on-hook. Stick an amplifier and transmitting unit to the microphone, and you have constant surveillance of all conversations taking place in that room, whether or not the phone is off-hook at the time. A device rapidly gaining popularity among today's wire-tappers is a mouthpiece containing a tiny bug, which looks exactly like the one of your 2500 set. All it takes is one trip to the water cooler or the men's room for the insider to surreptitiously make the old switcheroo. LOUDSPEAKERS are another favorite location for wire-tappers, because they can pick up conversations when not in use. Paging systems, piped in music, and telephone systems all employ some variety of amplifier which the culprit can use to his advantage. LINE INTERCEPTORS allow eavesdroppers more extensive coverage of your activities, since they can monitor more than on-line communications from a single listening post. But really, the number of places you can find a bug is limited only by the tapper's imagination. Light switches, plugs, clocks, calculators, legs of wooden chairs, staplers, ashtrays, the underside of a toilet bowl -- all of these items have proved fertile territory for the little critters. Tools For Finding The Bugs ~~~~~~~~~~~~~~~~~~~~~~~~~~ TRD's people use a patented Surveillance Search Receiver to locate the bugs. The Receiver uses a broad-band radio spectrum, from 25 kHz to 7 gHz. If there is an unaccounted-for radio frequency emission on the premises, the Receiver will tune it in on a small spectrum monitor. It then traces the emission to its inevitable source, the bug. For room bugs, they also use a Non-Linear Junction Detector, which can pinpoint all electronic circuit diodes or resistors in the architecture of the building. The Detector emits a high microwave signal into walls, furniture, et al., causing any circuit hidden within to oscillate. As soon as they oscillate, they become detectable. Mr. Lang clears up a misconception about the Russians bugging our embassy in Moscow. "They didn't riddle the building with actual bugs, instead, they buried millions of little resistors in the concrete." The embassy, therefore, became a hot bed for false alarms. Whenever the American counter-measure people came in with their detectors to look for a bug, they'd pick up oscillation readings from the countless resistors and capacitors buried in the walls. Finding any real bugs would be infinitely more difficult than finding the old needle in a haystack. For finding wire-taps along the phone lines, TRD uses a computerized electronic Telephone Analyzer. The unit runs 18 different tests on phone lines between the CPE block and the Central Office (CO). Resistance, voltage, and line balance are just a few of them. Once they locate a tapped line, they send a pulse down it with a time-domain reflectometer, which can pinpoint exactly where in the line the bug has been affixed. Bear in mind that wire-tapping is extremely difficult and time consuming. As much as 20 hours of conversations has to be monitored every single business day. Because of this, key executives' telephones are usually the only ones slated for a wire-tap. Catching The Culprit ~~~~~~~~~~~~~~~~~~~~ Finding a wire-tap is easier than finding the spy who bugged your office. Direct hardwire taps can be traced to the remote location where the snoop stores his voltage-activated electronic tape recorder. After you've found the monitoring post, it's a matter of hanging around the premises until someone comes to collect the old tapes and put in fresh ones. As for room bugs, your best bet is to make the device inoperable, without removing it, and wait for the eavesdropping to come back to fix or replace it. Once Is Never Enough ~~~~~~~~~~~~~~~~~~~~ Some of TRD's clients have their offices checked monthly, some quarterly. After the initial sweep, you can have equipment installed on your phone lines which constantly monitors any funny stuff. As for TRD, they offer a money-back guarantee if they fail to detect an existing bug on your premises. Mr. Lang assures us that Fortune 500 company has been bugged to a greater or lesser extent. That's how out-of-hand the problem is getting. Toward the end of our conversation, Mr. Lang pauses. "So you're really going to print this, huh? You're really on the up and up?" Then he spills the beans. It turns out Mr. Fritz Lang is really Mr. Frank Jones (he says), a licensed private investigator with a broad reputation in the industry. He used the alias because he suspected I was from a rival counter-measure agency, or worse, a wire-tapper, trying to infiltrate his operations. Which quite possibly I am. You can't trust anybody in this spy business. * Credit - Phrack Publication ID: krackpub#6,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 7 - 8 Series #1 Issue: Programming ProTerm in your BBS ProTerm Emulation Docs ~~~~~~~~~~~~~~~~~~~~~~ Introduction: ------------ I. So you want to master the art of making ProTerm Adds, well your in luck because you have the best of the best explaining it to you. Well the docs you are about to read will explain how to use the curser control command and the repeat command. Ok well you might get confused when you see characters like this (ie. •,, ,) in that inversed form. Well to duplicate them you must get into your ProTerm editor and hit (control-p, then it will ask you for the character you want) Repeat Command: -------------- II. The repeat command will make your add ZOOM litterly. The repeat command cuts down time in 2/3 the ammout as if you were to type it out. Here is an example of both Problem: Lets say you want to get 10 "_" across the screen 1. (The Lame way) __________ 2. (The Fast way) _* A. Explaination a. The  means repeat. (Wow that was hard) the _ means the character you want to repeat, and the * means the ascii character for 10 (the ascii chart will be explained later) B. How do I get the ascii character? a. First deterimine how many times you want the character to repeat its self (ie. 10) then add 32 to the given number (ie. 32+10) then the given total is 42. Look up 42 on the ascii chart and you will see that the character is a * Move Command: ------------ III. The move command is pretty easy. It is similar to the move command. The move command saves ALOT of disk space and is easy to program one you know how to do it. Problem: Lets say you wanted to move to horozantial 5 (left to right and vertical (up and down) 6. 1. (The Lame way)  2. (The Fast way) •%&"then whatever you want..(ie. a repeat command) A. Explaination The • command you must have on every move statement. The rest is a little complex. The % after the • is the ascii character for 5, simple enough. The & is the ascii character for 6. That was easy. So the command •%(horozantial) & (vertical). B. How do I get the ascii character? Same way as you did before. Take the given character and add 32 to it for the sum, then look up the sum on the ascii chart and then you get your ascii character. Few Examples: ------------ IV. Here is a quick example of both statements combined to preform a function. Problem: You want to make a 22 _'s across the screen on the location, 8 horozantial and 12 vertical. Answer: •(,_6 Ascii Chart: ------------ **** Remember to add 32 to your number **** _____________________________________ _____________________________________ | Number | Ascii Number | Ascii Code || Number | Ascii Number | Ascii Code | |=========|==============|============||=========|==============|============| | 0 | 32 | SPACE || 1 | 33 | ! | | 2 | 34 | " || 3 | 35 | # | | 4 | 36 | $ || 5 | 37 | % | | 6 | 38 | & || 7 | 39 | ' | | 8 | 40 | ( || 9 | 41 | ) | | 10 | 42 | * || 11 | 43 | + | | 12 | 44 | , || 13 | 45 | - | | 14 | 46 | . || 15 | 47 | / | | 16 | 48 | 0 || 17 | 49 | 1 | | 18 | 50 | 2 || 19 | 51 | 3 | | 20 | 52 | 4 || 21 | 53 | 5 | | 22 | 54 | 6 || 23 | 55 | 7 | | 24 | 56 | 8 || 25 | 57 | 9 | | 26 | 58 | : || 27 | 59 | ; | | 28 | 60 | < || 29 | 61 | = | | 30 | 62 | > || 31 | 63 | ? | | 32 | 64 | @ || 33 | 65 | A | | 34 | 66 | B || 35 | 67 | C | | 36 | 68 | D || 37 | 69 | E | | 38 | 70 | F || 39 | 71 | G | | 40 | 72 | H || 41 | 73 | I | | 42 | 74 | J || 43 | 75 | K | | 44 | 76 | L || 45 | 77 | M | | 46 | 78 | N || 47 | 79 | O | | 48 | 80 | P || 49 | 81 | Q | | 50 | 82 | R || 51 | 83 | S | | 52 | 84 | T || 53 | 85 | U | | 54 | 86 | V || 55 | 87 | W | | 56 | 88 | X || 57 | 89 | Y | | 58 | 90 | Z || 59 | 91 | [ | | 60 | 92 | \ || 61 | 93 | ] | | 62 | 94 | ^ || 63 | 95 | _ | | 64 | 96 | ` || 65 | 97 | a | | 66 | 98 | b || 67 | 99 | c | | 68 | 100 | d || 69 | 101 | e | | 70 | 102 | f || 71 | 103 | g | | 72 | 104 | h || 73 | 105 | i | | 74 | 106 | j || 75 | 107 | k | | 76 | 108 | l || 77 | 109 | m | | 78 | 110 | n || 79 | 111 | o | | 80 | 112 | p || 81 | 113 | q | ------------------------------------------------------------------------------ * Credit - Octavian 10/28/90 Publication ID: krackpub#7,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??) ________________________________________________________________ [ _ _ _____ ] [ // \\ // / ] [ //\ /\\ //__ / ] [ // \ / \\ // ] [ // \/ \\ ystic // roductions ] [ ] [ "For some this is a legend, others a legecy" ] [ 12/17/90 ] [________________________________________________________________] Krack Issue 8 - 8 Series #1 Issue: GPR (Game Players Review) Introduction ~~~~~~~~~~~~ The GPR will be in every issue of Krack because of the growing population of game systems. Well will battle each other and all but never before has an offical GPR been released for the home computer enviorment. The purpose of the GPR is to get you aware of the strong points and weak points of your system. Following Systems Supported So Far: TG-16, Genesis, Lynx, Nintendo Turbo Grafx-16 Stats ~~~~~~~~~~~~~~~~~~~~ Micro Processor - HU6820 Max Screen Resolution - 256 x 216 (With Overscan 320 x 224) Palette of Colors - 512 # of Colors/Screen - 256 # Sprites/Screen - 64 # Colors/Sprite - 16 Stero Sound - Yes Genesis ~~~~~~~ Micro Processor - 68000 Max Screen Resolution - 320 x 224) Palette of Colors - 512 # of Colors/Screen - 64 # Sprites/Screen - 80 # Colors/Sprite - 16 Stero Sound - Yes Reviews ~~~~~~~ TV Sports Football (Turbo Grafx-16) The first in a series of great games, Cinemaware introduces TV Sports Football for the Turbo Grafx-16. TV Sports Foorball includes everything from a pre-game show to halftime (featuring marching band) to updates of games from around the leauge and everything inbetween. Using the TurboTap, up to five people can play. Choose to be a coach or a player in both offensive or defensive positions, as you tackle our way through the 16 game season into the playoffs. What a great was to spend the off season! Retail Price $49.99 Klax (Turbo Grapfx-16) Based on the hit arcade game, Klax is Tengen's first entry for the Turbo Grafx-16. Tengen kept this puzzle game true to the arcade counterpart by including the special bonus points ans warps. Klax is sure to become a classic. Retail Price $45.99 Gloden Axe (Genesis) This is Sega's orignal arcade game and has proven a spot in the genesis library. In the start of the game you start off by choosing to be either a Dwarf, Fighter, Girl. The game has one extra level not present in the arcade game. The game is much like the arcade game but the controls are a little off so you have to line your self up with your enemy. Moonwalker (Genesis) This is another Sega orignal arcade game. The game is different fromn the arcade game in many ways. In the arcade game the perspective is a blimp view, which is nice, but in the genesis version it is a flat picture with litte effects of 3-D motion. The game is not much like the arcade so if you like the arcade game, dont go out and buy this and expect the same. Tips ~~~~ Phantasy Star II To play this role playing game in slow motion, simply press START to pause, then press and hold the B button. Truxton Make sure you have at least one bomb at the end of each level. When you reach the boss release the bomb, and PASUE it, wait 20-30 sec. then un PAUSE it. Wow the boos is gone. R-Type Extra Credits: On the title screen hold down the SELECT button and rapidly hit 1. You must hit the buttons quickly for this trick to work (Just put the sucker on TURBO). The highest you can aquire is 21, once you are there hit START quickly!! There 21 continues. Galaga '90 Extra Fire Power: During the title screen, press and hold UP, then press RUN. On the select mode pick single ship and the first pod (from the last enemy shot) will give you triple ship * Credit - Written in full by Octavian 12/20/90 Publication ID: krackpub#8,1 ----------------------------------------------------------------------------- If intreasted in helping out please contact me on the following boards: Apple Rebel 916-457-0624 (Octavian #??) TCQ 614-231-7646 (Octavian #41) Apple Tree MW 816-826-4158 (Octavian #177) Ware House GS 609-429-8487 (Octavian #24) IxGS 914-693-5679 (Octavian #95) Imperial Fortress 201-808-5768 (Octavian #??)