The Anarchist Cookbook (14 page)

Read The Anarchist Cookbook Online

Authors: William Powell

Tags: #Reference, #Handbooks & Manuals

BOOK: The Anarchist Cookbook
10.8Mb size Format: txt, pdf, ePub

honestly say "we know what we are doing". Now it means (in the public eye): the 414's, Ron

Austin, the NASA hackers, the arpanet hackers... All the people who have been caught,

have done damage, and are now going to have to face fines and sentences. Thus we come

past the moralistic crap, and to our purpose: educate the hacker community, return to the

days when people actually knew something...

63. Hacking DEC's by The Jolly Roger

In this article you will learn how to log in to dec's, logging out, and all the fun stuff to do

in-between. All of this information is based on a standard dec system. Since there are dec

systems 10 and 20, and I favor, the dec 20, there will be more info on them in this article.

It just so happens that the dec 20 is also the more common of the two, and is used by

much more interesting people (if you know what I mean...) OK, the first thing you want to

do when you are receiving carrier from a dec system is to find out the format of login

names. You can do this by looking at who is on the system.

Dec=> ` (the 'exec' level prompt)

you=> sy

sy: short for sy(stat) and shows you the system status.

You should see the format of login names. A systat usually comes up in this form:

Job Line Program User

Job: The job number (not important unless you want to log them off later)

Line: What line they are on (used to talk to them...) These are both two or three digit

numbers.

Program: What program are they running under? If it says 'exec' they aren't doing

anything at all...

User: ahhhahhhh! This is the user name they are logged in under... Copy the format, and

hack yourself outa working code... Login format is as such:

dec=> `

you=> login username password

Username is the username in the format you saw above in the systat. After you hit the

space after your username, it will stop echoing characters back to your screen. This is the

password you are typing in... Remember, people usually use their name, their dog's name,

the name of a favorite character in a book, or something like this. A few clever people

have it set to a key cluster (qwerty or asdfg). Passwords can be from 1 to 8 characters

long, anything after that is ignored. You are finally in... It would be nice to have a little

help, wouldn't it? Just type a ? Or the word help, and it will give you a whole list of

topics... Some handy characters for you to know would be the control keys, wouldn't it?

Backspace on a dec 20 is rub which is 255 on your ASCII chart. On the dec 10 it is

control-H. To abort a long listing or a program, control-C works fine. Use Control-O to

stop long output to the terminal. This is handy when playing a game, but you don't want to

control-C out. Control-T for the time. Control-u will kill the whole line you are typing at the

moment. You may accidentally run a program where the only way out is a control-X, so keep

that in reserve. Control-s to stop listing, control-Q to continue on both systems. Is your

terminal having trouble?? Like, it pauses for no reason, or it doesn't backspace right?

This is because both systems support many terminals, and you haven't told it what yours is

yet... You are using a VT05 so you need to tell it you are one.

Dec=> `

you=> information terminal

-or-

You=> info

(This shows you what your terminal is set up as.)

Dec=>all sorts of shit, then thè

you=> set ter vt05

(This sets your terminal type to VT05.)

Now let's see what is in the account (here after abbreviated acct.) that you have hacked

onto. Say:

=> dir

(Short for directory.)

It shows you what the user of the code has save to the disk. There should be a format

like this: xxxxx.Oooxxxxx is the file name, from 1 to 20 characters long. Ooo is the file

type, one of: exe, txt, dat, bas, cmd and a few others that are system dependant. Exe is

a compiled program that can be run (just by typing its name at thè)

Txt is a text file, which you can see by typing:

=>type xxxxx.Txt

Do not try to:

=>type xxxxx.Exe

(This is very bad for your terminal and will tell you absolutely nothing.)

Dat is data they have saved.

Bas is a basic program, you can have it typed out for you.

Cmd is a command type file, a little too complicated to go into here. Try:

=>take xxxxx.Cmd

By the way, there are other users out there who may have files you can use.

(Gee, why else am I here?)

=> dir <*.*> (Dec 20)

=> dir [*,*] (Dec 10)

* is a wildcard, and will allow you to access the files on other accounts if the user has it

set for public access. If it isn't set for public access, then you won't see it. To run that

program:

dec=> `

you=> username program-name

Username is the directory you saw the file listed under, and file name was what else but

the file name? ** You are not alone ** remember, you said (at the very start) sy short

for systat, and how we said this showed the other users on the system? Well, you can talk

to them, or at least send a message to anyone you see listed in a systat. You can do this

by:

dec=> the user list (from your systat)

you=> talkusername (Dec 20)

send username (Dec 10)

Talk allows you and them immediate transmission of whatever you/they type to be sent to

the other. Send only allow you one message to be sent, and send, they will send back to

you, with talk you can just keep going. By the way, you may be noticing with the talk

command that what you type is still acted upon by the parser (control program). To avoid

the constant error messages type either:

you=> ;your message

you=> rem your message

the semi-colon tells the parser that what follows is just a comment. Rem is short for

'remark' and ignores you from then on until you type a control-Z or control-C, at which

point it puts you back in the exec mode. To break the connection from a talk command

type:

you=> break priv's:

If you happen to have privs, you can do all sorts of things. First of all, you have to activate

those privs.

You=> enable

This gives you a $ prompt, and allows you to do this: whatever you can do to your own

directory you can now do to any other directory. To create a new acct. Using your privs,

just type:

=>build username

If username is old, you can edit it, if it is new, you can define it to be whatever you wish.

Privacy means nothing to a user with privs. By the way, there are various levels of privs:

operator, wheel, cia. Wheel is the most powerful, being that he can log in from anywhere

and have his powers. Operators have their power because they are at a special terminal

allowing them the privs. Cia is short for 'confidential information access', which allows you

a low level amount of privs. Not to worry though, since you can read the system log file,

which also has the passwords to all the other accounts.

To de-activate your privs, type:

you=> disable

when you have played your greedy heart out, you can finally leave the

system with the command:

=>logout

This logs the job you are using off the system (there may be varients of this such as kjob,

or killjob.)

64. Harmless Bombs by The Jolly Roger

To all those who do not wish to inflict bodily damage on their victims but only terror.

These are weapons that should be used from high places.

The Flour Bomb

Take a wet paper towel and pour a given amount of baking flour in the center. Then wrap it

up and put on a rubber band to keep it together. When thrown it will fly well but when

it hits, it covers the victim with the flower or causes a big puff of flour which will put

the victim in terror since as far as they are concerned, some strange white powder is

all over them. This is a cheap method of terror and for only the cost of a roll of paper

towels and a bag of flour you and your friends can have loads of fun watching people

flee in panic.

Smoke Bomb Projectile

All you need is a bunch of those little round smoke bombs and a wrist rocket or any sling-

shot. Shoot the smoke bombs and watch the terror since they think it will blow up!

Rotten Eggs (Good ones)

Take some eggs and get a sharp needle and poke a small hole in the top of each one. Then

let them sit in a warm place for about a week. Then you've got a bunch of rotten eggs

that will only smell when they hit.

Glow in the Dark Terror

Take one of those tubes of glow in the dark stuff and pour the stuff on whatever you want

to throw and when it gets on the victim, they think it's some deadly chemical or a

radioactive substance so they run in total panic. This works especially well with flower

bombs since a gummy, glowing substance gets all over the victim.

Fizzling Panic

Take a baggy of a water-baking soda solution and seal it. (Make sure there is no air in

it since the solution will form a gas and you don't want it to pop on you.) Then put it in

a bigger plastic bag and fill it with vinegar and seal it. When thrown, the two

substances will mix and cause a violently bubbling substance to go all over the victim.

65. Breaking Into Houses by The Jolly Roger

Okay You Need:

Tear Gas or Mace

A BB/Pellet Gun

An Ice Pick

Thick Gloves

What You Do Is:

Call the house, or ring doorbell, to find out if they're home.

If they're not home then...

Jump over the fence or walk through gate (whatever).

If you see a dog give him the mace or tear gas.

Put the gloves on! ! ! !

Shoot the BB gun slightly above the window locks.

Push the ice-pick through the hole (made by the BB gun).

Enter window.

FIRST...Find the LIVING ROOM. (there're neat things there!).

Goto the bedroom to get a pillow case. Put the goodies in the pillow case.

Get out <-* FAST! -*>

Notes: You should have certain targets worked out (like computers, Radios, Ect.) Also <-*

NEVER *-> Steal from your own neighborhood. If you think they have an alarm...<-*

FORGET IT! *->.

66. A Guide to Hypnotism by The Jolly Roger

What hypnotism is?

Hypnotism, contrary to common belief, is merely state when your mind and body are in a

state of relaxation and your mind is open to positive, or cleverly worded negative,

influences. It is not a trance where you:


Are totally influenceable.


Cannot lie.


A sleep which you cannot wake up from without help.

This may bring down your hope somewhat, but, hypnotism is a powerful for self help,

and/or mischief.

Your subconscious mind

Before going in further, I'd like to state that hypnotism not only is great in the way that

it relaxes you and gets you (in the long run) what you want, but also that it taps a force of

incredible power, believe it or not, this power is your subconscious mind. The subconscious

mind always knows what is going on with every part of your body, every moment of the day.

It protects you from negative influences, and retains the power to slow your heartbeat

down and stuff like that. The subconscious mind holds just about all the info you would like

to know

About yourself, or, in this case, the person you will be hypnotizing. There are many ways to

talk to your subconscious and have it talk back to you. One way is the ouja board, no its

not a spirit, merely the minds of those who are using it. Another, which I will discuss here,

is the pendulum method. OK, here is how it goes. First, get a ring or a washer and tie it to

a thread a little longer than half of your forearm. Now, take a sheet of paper and draw a

big circle in it. In the big circle you must now draw a crosshair (a big +). Now, put the

sheet of paper on a table. Next, hold the thread with the ring or washer on it and place it

(holding the thread so that the ring is 1 inch above the paper swinging) in the middle of the

crosshair. Now, swing the thread so the washer goes up and down, say to yourself the

word "Yes" now, do it side to side and say the word "no". Do it counter clockwise and say "I

don't know". And lastly, do it clockwise and say "I don't want to say." Now, with the

thread back in the middle of the crosshair, ask yourself questions and wait for the

pendulum to swing in the direction for the answer. (yes, no, I don't know or I don't want to

say...). Soon, to your amazement, it will be answering questions like anything... Let the

pendulum answer, don't try.. When you try you will never get an answer. Let the answer

come to you.

How to induce hypnotism

Now that you know how to talk to your subconscious mind, I will now tell you how to guide

someone into hypnosis. Note that I said guide, you can never, hypnotize someone, they

must be willing. OK, the subject must be lying or sitting in a comfortable position, relaxed,

Other books

The Path of the Storm by James Maxwell
Simply Amazing by Hadley Raydeen
The Simbul's Gift by Lynn Abbey
Lore by Rachel Seiffert
The Rogue Retrieval by Dan Koboldt
SARA, BOOK 2 by ESTHER AND JERRY HICKS
Mystery Ranch by Gertrude Warner
A Peace to End all Peace by David Fromkin