![]() |
The Magic Spade | home
![]() Magic | The Conquerors | Downloads | Contact Me | Forum | Live Chat | Poll | Daily Cartoon | Music | Hacking
![]() ![]() ![]() Hacking
![]() (Warning This Is For Information ONLY I Am In No Way Responsible For What You Do With IT)
![]() Hacking takes on many different forms, there are people who are happy to
just read information and never try their hand at hacking, The average hacker
will have penetrated some form of a UNIX server and found information which
is not actively available to themselves. The next step in hacking, is the
malicious bastards who wreak BBS`s and spread virii across LAN networks.
Hackers can be classed in many different form`s. My advice to Newbies who
want to start is, first read this file and try and get your hands on some
other hacking texts, once you feel confident try breaking into an easily
penatratable system, don`t try anything which you could get sued for, or
enough arrested for, until you feel confident enough to try.
Tools For Hacking
![]() ![]() Explanation.
These are easily explained as they spit out randomly generated credit card
numbers for different cards.
What can I use them for ??
The only use I've found for credit card generators is to hack into a server
provider and get a free account. You can't really get free thing's from
your credit card due to the fact that the CC Generator doesn't give you
the name of the card holder, or the expiry date. Another good idea is to
use them in the many "Adult check" parts of the web, just tap in your Credit
card number and fake the rest of the sign up process. You will be given
the password instantly and you will be able to proceed without anyone knowing.
What do I need ??
Try and get The Credit Card Generator, and a program that Verifies the card.
Try ThcCred.zip, and VC.zip.
![]() Explanation.
Anonymous mail is a very handy thing to have. You can send mail to any one
without showing your return address, this can also be used on a newsgroup
if your sending some "sensitive" material and you don`t want anything
traced back to you.
What can I use it for ??
Sending mail to someone without your address showing. This used to be done
by telnetting to port 25 on a server. But modern programs do that for
you now.
What do I need ??
All you need is ONE good anonymous mailing program, I would recomend private
idaho, if you can find it.
Mailbombers
Explanation.
These arn`t as nasty as they sound, they don`t blow the persons mailbox up.
All they do is send as many mails as you specify to the person you specify.
Why do this ??
Say for example, some one`s been getting on your nerves. You can use a
mailbomber program to send loads of mail to the person, so he`s got to
download all the mail which will take him ages, and increase his phone
bill, online connection time, and increase his temper !!.
What do I need ??
Once again, all you need is a good Mailbombing piece. I`ve tried most of
them and found ONLY Unibomber to be VERY easy to use. Upyourz is supposed
to be good, but Unibomber is the easiest to set up.
But Dajimbo, If I`m sending 1000 mails, won`t that take ME ages ??
No, becuase the Bomber sends mail at a VERY quick speed. So you shouldn`t
have to wait more than a few minutes.
![]() Explanation.
Wardiallers are programs which scan every number in an area code you specify
looking for the connect tone.
Why do this ??
This is the basis of hacking, use this to find out a place nearby which
has a modem attached and you can hack into the machine. This could be
used for finding your school/college number, so you can hack into there
computer, or you might find a big business number which you can use to find
out information on whatever you want.
What do I need ??
All wardiallers are VERY easy to use, so just find the one with a decent
file size and your away !!!......If you don`t know where to look,
go to my site.
![]() Explanation.
Virii is the term for Virus, such as the computer kind. Viruses can do
many different things, most are malicious but they are types which do
special thing`s. Such as play a tune, or display a message.
Different types of Virii :
1. Spawning : These viruses copy themselves to the file, and infect it, thus
at the end of the day, you have a computer full of infected files.
2. Trojan Horse : These do a quick attack. Such as wiping your hard drive, as
soon as you click on it.
3. E-Mail : These are NONE existent. So don`t FALL for it.
4. Timebomb : These are the kewlest in my opinion, because they lie dorment
in a unsuspected computer until the date the author speciefies, and then
they go off and wipe the harddrive. Hahaa.....
There`s also many more different types, but that`s the basics.
What can I use these for ??
Infecting an unsuspected computer, or spreading it across unsuspected
corporate pigs computers, who have more money than sense.
What do I need ??
You need a compiler, such as Tasm, to compile your virus. Most Viruses are
wrote in assembley C code. But as most people reading this won`t know how
to, Use a decent program that`s someone`s made to make yourself a virus.
You won`t be able to make a really good virus, but there not bad.
Try and find, Virus Lab Creator, or the Nasty tool kit, or even NRLG.
Also you may find that TLink is usful, in the way that it links the virus
to a file such as a picture.
![]() Explanation...
These Log anything that`s typed on the person`s computer or network, to a
file which you can scrape off later and read at your own leisure.
Why do this ??
The best use is to get someone`s log on screename and password, off a Lan
Network. But if people don`t use a LAN network, then you could, use it to
read anythging you want, what someone who uses your computer types.
What do I need ??
A Basic Key stroke recorder, or the best I found, is Password Leacher.
![]() Explanation.....
Passwords crackers, are used to crack passwords to a shareware program, or a
pirate program.
Grenadiers, are basically the same, apart from they try and "Bust" there way
into the password by using a dictionary of words.
Why do this ??
Do you want a free program or not !!!
What do I need ??
I`m not a cracker, so just try and find a good cracking program. You`ll also
need a disassembler such as softice. A good grenedier is Claymore.
![]() Explanation...
These arn`t really hackers just pirates, who upload programs and games, for
people to download for free.
They don`t make a profit, and there site doesn`t last very long. So it`s
hard to find a good site.
You`ll also need a fast modem, to download the program as most are massive.
Try and get these on your hard drive:
1. Tasm
2. NRLG.
3. Virus Lab Creator.
4. The credit card generator.
5. A fake AOl account.
6. A fake Compuserve account.
7. The beginners guide to hacking.
|
![]() |