~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -={ BlackCode Ravers Magazine Issue 2 }=- Home page : http://www.blackcode.com Editor of the magazine: tHe mAniAc themaniac@blackcode.com ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Table of Contents: ----------------------------------------------------- 1.Editorial 2.Mirrors of the magazine 3.Latest News With BlackCode Ravers 4.How to break your school security 5.About Virii 6.Advertising 7.Trojans Section 8.For the newbies 9.Linux Section 10.Interviews 11.Final Words ----------------------------------------------- 1.Editorial =-=-=-=-=-=-=-=-=-=-=-=-= It's me again.This is our second issue.I've changed the design and I've added several new things in the newsletter. I've also received a lot of e-mails about our magazine. People like it and they want more information here. The first issue was short one but of course every new issue has many new things added in it. I'm happy people like it and we have MANY new subcribers every day. Also we have much more visitors than before. All issues of our magazine are archived on the page because many new subscribers want to read the one they haven't read. Also we have new section about our magazine where you'll be able to read what is our magazine about and other things connected with it. Many people think that their e-mail will be used for spamming after they subscribe.This is NOT true we BlackCode Ravers are agains the spamming and you can be 100% sure that we won't give your e-mail to anyone.I hope you'll suggest new sections or send some texts to me. ========================================> I want to thank to all people that support us and mail me with their comments about our magazine. If you want to publish one of your texts in our Magazine, just mail me your text to :themaniac@blackcode.com I will review it and if it is a good one I will publish it. Note : All texts are welcome. You can write about everything you want, but it has to be connected with hacking/cracking/phreaking/carding/virii/computers ... -thanx a lot- ========================================> Just keep sending new texts to me it's always useful to read texts from new people and if they're good I'll put them in our magazine. Also if you want to mirror our magazine on our page mail me also. Our magazine will become more popular if you put links about it on some pages or mirror it on your page. If you have any suggestion about out magazine please mail me and tell me about it. I'll be very happy if all people help me to make this magazine one of the best and most informative out there. __ __________________________________________ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_- If you want to put these texts on your page/ftp/newsgroup etc. PLEASE don't change anything. USE THESE TEXTS AT YOUR OWN RISK.WE'RE NOT RESPONSIBLE FOR ANYTHING HAPPENED AFTER READING SOME OF THESE TEXTS. THEY'RE FOR EDUCATIONAL PURPOSES ONLY. OUR GOAL IS TO IMPROVE YOUR KNOWLEDGE. ___________________________________________ _-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_- Happy reading :-) 2.Mirrors of the magazine =-=-=-=-=-=-=-=-=-=-= This is our second issue and we've got mirror of the magazine. I think this is very good thing and if you want to become a mirror just mail me about that. These are our mirrors for now: http://www.tlsecurity.com/Textware/mailinglists/ If you're mirror of our magazine please inform me so I can add you to the list. --------------------------------------------- 3.Latest News With BlackCode Ravers =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Our page has MANY new subscribers and new visitors these days.We've added MANY new exlpoits in the our exploit section and also many new things. A new area has born inside BC-Tech. It's the Blackcode Newsletter area where you can learn more about our e-zine, send comments and articles, and download old issues. So you'll be able to download all issues of the magazine from our new area and you won't miss any of them. Just go there and check it.Also download issue 1 if you don't have it. Search Blackcode now available so you can easily find the information you're looking for. Also we have added 2 Virii made by one of our members. 2 new texts has been added.About Encryption and PGP and about Voting. We've added AntiSniff for windows and Unix, the last L0pht Industries tool. We've affiliated with amazon to offer directly from Blackcode computer related books.You can look at the Library area for more info. We're soon going to put several books on our page,and we hope you'll like them. But don't worry BlackCode will be updated a lot we promise :-) In a few days we'll make interview with all of our members and we'll post them in our magazine.I think this will be usefull and you'll learn new thing for our members. Also we think it's good idea to have Linux section with many texts and programs in it.Some of them will be our creation. ------------------------------------------------------------------- 4.How to break your school by tHe mAnIaC themaniac@blackcode.com =-=-=-=-=-=-=-=-=-=-= This guide is for educational purposes only I do not take any responsibility about anything happen after reading the guide. I'm only telling you how to do this not to do it. It's your decision. If you want to put this text on your Site/FTP/Newgroup or anything else you can do it but don't change anything without the permission of the author. A word from the author: I hope you like my texts and find them useful. If you have any problem or some suggestion feel free to e-mail me but please don't send mails like "I want to hack the US government please help me" or "Tell me how to blind a trojan into a .jpg" Be sure if I can help you with something I will do it. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= In this guide I'll explain you how to hack your school and the things you can do after you're in the school's computer.This guide is for people who hate their school and want to learn how to hack it. -_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_ So you want to hack your school :-) OK now you should do some social engineering.Learn every- thing you can about the computers in your school. About the teacher working with them,about their OS (operation system)everything that can be usefull for you.Most of the cases the teacher that is working with the computers will put lame password that is easy to gues.Use every moment when your teacher is writing some password and try to remember it.It's good when you have some friends with you so everyone will remember a little part of the password and then you'll combine it to the full one. Almost every teacher has a favourit student. You should use him to give you some information about the passwords and other things. You teacher is maybe writing the passwords on paper so you should find this paper in the room where the computers are. Use the guy that the teacher likes a lot he or she can give you very useful information. Another way is to use another teacher. Check if the teacher that is working with the computer is not there.Find another teacher and tell him or her that you've lost sensitive information and will get to write it again because you've lost it. Make sure the teacher will believe you and let you do it. Then tell the teacher that the information is on the school computer and you should go and take it from there. Then if the teacher let's you in that's good now search for passwords and other things on the disk. You can see if there's anything interesting in the "my documents folder" you can find something useful there.You should search for the paper I told you about with the passwords.If the teacher you came with is still there you can't search because the teacher will see you,so one of your friends should call the teacher and talk with it for 5 minutes for that time you should find the paper or other information that can be useful for you. You must know everything about the teacher that is working with the computers.What he/she likes what the teacher hate,what he think about the passwords such things.Once again your friend that is the teacher favourite student will help you for these things.Then you should create a wordlist with words you think your teacher will put as passwords on the computer.It's better and more usefull when you know many things about your teacher.Then you should just try the passwords.If you're good social engineer you'll make very good word list and you'll have the password. Also learn about what kind of passwords your teacher prefers.Something like: letters with numbers or something else this is important and will help you a lot. You teacher should know you as person that don't know anything about the computers so when you hack their computers and do other things he/she won't think it was you because you don't know anything about computers. So now let's suppose you're in and you can do as you want.First of all you must check the disk for some tests and students marks.If you find any tests copy them and you have the answers to them hehe you'll be ready.If you find any students marks you can change them to what you want.But don't write the best mark to the most stupid student because they'll check and see it's not true. If your school has a Linux OS and you're root create several users with root rights so when you want to get back just use them.Be sure to remove everythig connected with you from the log files. But almost EVERY school is using Windows not Linux because the teachers are too lame to use it they just want to use Windows and nothing else. I hope now you're in the school computers or you know some of their passwords. ------------------------------------------- 6.Advertising =-=-=-=-=-=-=-= Our magazine need more advertising.We want more people to read it. And of course EVERYONE can help.Just tell your friends so they can subscribe too or if you're webmaster somewhere put a link to our page and tell the other people about BlackCode Ravers Magazine. You can also add the page to some search engines and of course try to find a mirror of the magazine.But please don't start spamming and sending messages to every e-mail you find.Just tell about the magazine to your friends and to people you know. This will make our magazine popular but of course with your help.I hope you'll do some advertising and tell the other about us and our magazine. This will help us a lot because we'll probably find some good writers for our magazine and you'll be able to see more texts. ------------------------------------------- 7.Trojans Section =-=-=-=-=-=-=-=-= This is our new section.Many people want such section and that's why the section is up now.Don't think in this section I'll put links where you can download trojans because the trojans are everywhere. Here you'll see information about the latest trojans,how to remove them,latest news connected with trojans, latest and the best anti-trojan software and many other things connected with trojans. I just want to show you how dangerous the trojans are and that you may completely destroy yourself when you're using them. In thie issue I'll tell you about the different kinds of the trojans and I'll also review one trojan. ------------------| by tHe mAnIaC | -----------------| Remote Access Trojans ------------------------------- These trojans are the most popular trojans now. Everyone wants to have such trojan because he or she want to have access to their victim's hard drive. The RAT'S (remote access trojans)are very simple to use.Just make someone run the server and you get the victim's IP and you have FULL access to his or her computer.They you can almost everything it depends of the trojan you use. But the RAT'S have the common remote access trojan functions like: keylogger,upload and download function, make a screenshot and so on.Some people use the trojans for malicious purposes. They want just to delete and delete.This is lame.But a have a guide about the best way to use a trojan.You should read it. There are many programs out there that detects the most common trojans,but new trojans are coming every day and these programs are not the maximum deffence. The trojans do always the same things. If the trojan restart every time Windows is loaded that means it put something in the registry or in win.ini or in other system file so the trojan can restart. Also the trojans create some file in the WINDOWS\SYSTEM directory.The file is always looking to be something that the victim will think is a normal WINDOWS executable.Most trojans hide from the Alt+Ctrl+Del menu.This is not good because there are people who use only this way to see which process are running.There are programs that will tell me you exactly the process and the file from where it comes.Yeah but some trojans as I told you use fake names and it's a little hard for some people to understand which process should they kill.The remote access trojans opens a port on your computer letting everyone to connect. Some trojans has options like change the port and put a password so only the guy that infect you will be able to use the computer.The change port option is very good because I'm sure you don't want your victim to see that port 31337 is open on their computer.Remote access trojans are appearing every day and they will continue to appear. For those that use such trojans: BE CAREFULL you can infect yourself and they the victim you wantet destroyed will revange and you'll be sorry. If you don't know anything about trojans DON'T USE THEM. --------------------------------------- Password Sending Trojans The purpose of these trojans is to rip all cached passwords and send them to specified e-mail without letting the victim about the e-mail. Most of these trojans don't restart every time Windows is loaded and most of them use port 25 to send the e-mail.There are such trojans that e-mail other information too like ICQ number computer info and so on.These trojans are dangerous if you have any passwords cached anywhere on your computer. ---------------------------------------- Keyloggers These trojans are very simple.The only one thing they do is to log the keys that the victim is pressing and then check for passwords in the log file. In the most cases these trojans restart every time Windows is loaded.They have options like online and offline recording.In the online recording they know that the victim is online and they record everything.But in the offline recording everything writen after Windows start is recorded and saved on the victims disk waiting for to be transfered. ---------------------------------------- Desctructive The only one fuction of these trojans is to destroy and delete files.This makes them very simple and easy to use.They can automatically delete all your .dll or .ini or .exe files on your computer. These are very dangerous trojans and once you're infected be sure if you don't desinfect your computer information will no longer exist. ----------------------------------------- FTP trojans These trojans open port 21 on your computer letting EVERYONE that has a FTP client to connect to your computer without password and will full upload and download options. These are the most common trojans.They all are dangerous and you should me carefull using them. ----------------------------------------- So now I'll review one trojan called Vampire 1.2 I think most of you know it but if you don't you'll now learn about it and how to remove it. Vampire 1.2 is a remote access trojan that use port 1020 to connect. It has a friendly and easy to use client.The trojan is dangerous one because it has a lot of functions some of them cal COMPLETELY destroy your computer data. HideTaskbar Send Message Format Drive Read A:\ Drive Shutdown Logged on User Log Off Ping Get Hard Drive - Get fixed hard drive(s) Server Path Show Mouse Hide Mouse Clear Recent Folder Open Control Panel Open Date/Time Reboot Delete File Delete Directory - ISP Account Info Open CD Door - Open victims CD doorClose CD Door - Close victims CD door Close Server Open Web Page - Run Program Get Windows Directory Get Local Time Get Temp Directory Set Computer Name Registry Kill Fill Hard Drive Get ICQ Number Close Windows Wacky CD-ROM hangup Modem Monitor Off Make Directory Enable Alt+Ctrl+Del Get Active Windows Crazy Mouse Stop Crazy Mouse Get Operating System Get System Owner Get Organisation Set Volume Label Find File Disk Space left Send Keys Get Disk Serial Number Kill Window Chat with Victim Screenshot These are all the functions of the trojan. The server's size is 53,248bytes . You can remove the trojan when you: delete c:\windows\system\Winboot.exe and then in the registry [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows \CurrentVersion\Run] "WindowsBootFile"="c:\\windows\\system\\Winboot.exe" That's it when you delete these things you're clean from the trojan. You see what dangerous options it has so check if you're infected with it manualy :-) That was everything for the trojan section in this issue. I'm waiting for your ideas and suggestions at: themaniac@blackcode.com ----------------------------------------------- 8.For the newbies =-=-=-=-=-=-=-= This is also a new section in our magazine.It's for people that just came on the net and want to know some things and of course to learn how to hack.So they started sending e-mails to everyone asking but in the most of the cases they don't receive reply.That's for what is this section. To answer to your questions and help you to learn something. Don't worry you're newbie and you want to know,you're not lamer that don't read because he/she "knows" everything :-) The section will explain things only for newbies and will be only for them. But who knows you may also learn something new from this section. I hope this section will help to many people that don't know the basics and will teach them something.If you have any question and you want to see the answer here tell it to me at:themaniac@blackcode.com.I'm waiting for your suggestions about this new section. About IP and how to get it ------------------| by tHe mAnIaC | -----------------| In this issue I'll explain you everything you want to know about the IP addresses and how to get someones IP from IRC,ICQ,e-mail etc. First I'll explain you what an IP is. Every computer connected to the net has IP address. This IP identifies the computer on the Internet. The IP is where the data comes and goes out. If you're using Dial Up every time when you connect your IP is differend this is called dynamic IP. Everyone need the IP address of someone to do something to the victim like nuking,flooding or if the victim is infected with trojan horse and you need the IP to connect to the computer. The IP addresses can be get with these methods: via e-mail-the IP is in the header.When you receive a message right click,then Save Message and then you'll see the IP there. via IRC-if your victim is on IRC just type /dns and you'll see it via ICQ-ICQ is not so secure thing and in the most of the cases you'll see the IP in the info if not just find a ICQ patch that will show you the real IP of the victim.Most of these patches are on every page connected with h/c/p/a. Also there are ICQ tools that will help you to get the IP of ICQ user. I hope you understood what an IP is and how to get it from the people. But there are people that hide their IP so you just can't get it from everyone. Advices to the newbies and for the people that want to know ------------------| by tHe mAnIaC | -----------------| People STOP sending e-mails to everyone like "Learn me to hack","How can I use a trojan","if you're hacker can you hack hotmail account" and such things.This is lame and in the most of the cases you won't receive reply. Or you'll receive something like "FUCK oFF laMer".Noone want to be called lamer. Just learn what to ask and how to ask it.Ask BUT don't ask shit like these ones. Read and of course practise.There are MANY texts on the net believe me just read some and understand what is the hacking about and learn something about the security on the net. Many people ask where to read.Well you can read at blackcode.com and also on many other sites.Just check progenic.com or cyberarmy.com and check some sites in their top lists.There you'll find many texts that will help you. Many people think hacking is to nuke machines,to flood someone,to steal passwords from people that don't know what a trojan is,to send viruses and such shit.This is not hacking this is stupid thing and you should NEVER do it. I hope now you'll start reading and learn the basic things and then start asking questions. But I'm sure they won't be lame one :-) And last thing: SHARE YOUR KNOWLEDGE with the other people.Teach and learn the other people the things you know and don't be shame to say that you don't know something. -------------------------------------------------------- 9.Linux Section =-=-=-=-=-=-= This will be our Linux section full with texts about Linux security and other things connected with Linux. In this issue I'll publish one text about Why you should use Linux instead of Windows bacause many people ask what's the big deal with Linux.I'll show you now. ------------------------------------------------ Why people use Windows instead of Linux? by tHe mAnIaC In this text I'll explain you why almost EVERY man that is working with computers use Windows instead of other OS like Linux. Everyone know Windows.In most of the cases when you buy a computer you have Windows on it.This show you once again how many people use it. But why you may ask why are they using something that crashes every 5 minutes,that is so insecure on the net and that everyone can own your computer via the net.Because the people don't know about these things. They just think if they learn how to use Windows they'll have computer knowledge.But they're normal users.They don't want to learn about security,they don't want to learn how the things work and what might happen to their machines when they're on the net.They just want to have an e-mail box and surf the net,that's everything they want.And when someone find that they're infected with trojan and inform them all the normal users says something like "are you crazy this is impossible". They don't know about anything they just think that when all the people are using Windows they should use it too. People take the easier part when they don't have to do anything instead of clicking on icons and working with Word.They don't care about security about making they're system more secure.That's what Windows is. But how about Linux.Linux is for people that want to learn that want to know it's for the hackers. You can COMPLETELY control your computer with Linux.You can see who is on your system why tried to brute-force passwords on your accounts and so on.You have full control and everything is FREE. That's it that's what Linux is a system for the hacker for the person that want to learn and want to know,that want to make his/her own programs under Linux. Windows uses all of your system resources for something and that's why it crashes. Linux completely uses the resources of your system and make it stable. Every hacker that respect himself should use Linux instead of Windows. Windows is FULL with security problems and you can be easily crashed and hacked over the net.Of course Linux has also security problems but you can remove them just get the latest patches for the bugs.Also if you know how to configure your Linux right you'll be secure for the lame people that has one exploit and think they're elite and they can hack everyone. When you're using you'll learn much more about your hardware which is very good thing.You won't be stupid Windows user anymore.You'll be Linux user. NOTE: Windows is good for offices and for graphic designers also for people that don't want to learn anything,that just want to surf BUT if you want to know and you respect yourself you should get Linux and learn how it works. That's for now in our Linux Section.The next time you'll see here some security papers also with source code of some attacks. If you're Linux expert and want to handle the section please e-mail me and tell me. themaniac@blackcode.com ------------------------------------------------------------- 10. Interviews =-=-=-=-=-=-= This is again new section I think you'll like and have fun with. In this section you'll see interviews with webmasters,hackers, security experts and many other one.I hope you'll like the section and also you'll learn many new things about the people that have been interviewed in our magazine. I'm waiting for your ideas about this section and also your suggestions about it at: themaniac@blackcode.com In this issue you'll read interview with Melkor the webmaster and the founder of BlackCode Ravers. The interview was made by me tHe mAnIaC. tHe m4niac:When did you start BlackCode Ravers? Melkor: tHe m4niac:Why and how did you start the page? Melkor: tHe m4niac:What do you think about the page now?About it's stuff,visitors? Melkor: tHe m4niac:Do you think BlackCode is famous group with good reputation? Melkor: tHe m4niac:What do you think about the BlackCode's magazine? Melkor: tHe m4niac:What do you think about the people that use trojans and make fun with the other people? Melkor: tHe m4niac:What will you say to the webmasters of the other pages on the net? Melkor: tHe m4niac:Which is the best H/P/C/A site on the net by your opinion? Melkor: tHe m4niac:What do you think about the future of the net and BlackCode? Melkor: tHe m4niac:What are your plans for the future? Melkor: Well that's for now.I hope you like the interview and you've learned a lot of things about the webmaster of BlackCode Ravers.In the next issue here there will be again interview with someone.I'm waiting for your ideas about this section and also your suggestions about it. ---------------------------------------------------------------------------------------------- 11.Final Words =-=-=-=-=-=-= You're finally reading the final words.Well that was from us in this second issue. It's was bigger the issue 1 and I think you'll like all the changes and the new sections added in the new issue. Many new things as you see have been added,new sections and a lot of other things.Of course in the next issue there will be many new things and new sections too so for now just spread the word about our magazine and tell the other people about it. This is our second issue and we've got so many readers and people that like the magazine I hope we'll get new readers every day. We're still looking for mirrors of our magazine and of course your opinions and suggestions about our second issue.Also send texts and ideas about new sections.I'll be really happy if you can handle some section or help me with the magazine or write something for us.Of course you'll get FULL credit for everything you've written for the magazine. Tell me what do you think about the design.If you make better one please send it to me so I can see it. Bye for now and I hope you've learned something new from our second issue. Be ready for out third one and by then just keep telling people about our magazine and about BlackCode Ravers. -----------------------------------| tHe mAnIaC | Magazine Editor | themaniac@blackcode.com | ---------------------------------| -----------------------------------------| Melkor | Webmaster of BlackCode Ravers | melkor@blackcode.com | --------------------------------------| ************************************ EOF ********************************