The Script Kiddie's Essential File Kit
|
DeXter Dexter@email.ro
"We, whoever we are at the current time,
are not responsible for your actions as the result of anything, especially such things that pertain to this site. If your
ignorance of local, state, and/or federal laws pertaining to anything mentioned to or hinted at by us lands you in a position
you don't like (i.e prison, jail, or the liable end of a lawsuit), remember that it is not L.I.S.T., it's members, God's,
Jesus's, Allah's, Jehovah's, or anybody else's responsibility but your own. We didn't make you do anything, nor would we.
It is also the intention of this disclaimer that we hold to, not it's exact wording: if you think there's a legal loophole
that you've found that holds us liable for you're actions, you're most likely right. However it is the spirit of this disclaimer
that should be followed."
This is a file for all you pre-Kiddies out there that don't even know what you need to get
started on your descent into the digital underground. I am assuming that you have some semblance of computer know-how if you
are reading this (i.e. telnet is not a foreign concept to you ), so I will not tell you how to specifically use each individual
program, just it's general use and why you want it. If you can't read the included files with these programs don't come crying
to me saying they don't work.
The first thing you should try and download is a port scanner. This is a nifty little
tool that will allow you to put in an IP, and find out what ports are open (i.e. what ports you can screw with.) This is also
good for scanning your own machine to see if someone has a back door to your machine (perhaps through BO [explained below]).
Another
good file to have it a winnuker. I personally do not use it, so I can't say exactly what it does (I have better toys). As
I understand it, it sends a ping to your victim that causes either their net connection or their entire system to crash. It
is easy to find patches that make you nuke-proof, so don't rely on this to affect anybody but newbies and civilians.
Nuke
Nabber (or any good port listener) is another essential addition to your files. It listens to whatever ports you tell it to,
and informs you of any pings to those ports. You can also set it to do a trace/finger/whois on whatever poor bastard tries
to nuke you (or something worse), thus giving you *their* IP, amongst other info (and you can nuke them [or worse]).
For
those of you in more populated areas, a War Dialer will help you in finding direct-dial numbers. You give it a set of numbers
to work with (ie 456-0000 through 456-9999), and it dials every one on the list, seeing if there is a modem on the other end.
Some you can even set to dial a single number repeatedly (Two example uses of that: Jocko, the star quarterback, who was an
important game tomorrow: probably won't appreciate 50 calls in a row at 4 in the morning... or DonPadre the Lawyer, who is
expecting an important call: well it won't go through if every time he hangs up he gets called back by the same unanswering
program).
A Tone Generator is good for any aspiring phreak. These will generally create the tones used in a red box,
some do more. Blue Beep is one of the best, in my opinion: it incorporates red, blue, and silver tone generation, as well
as a war dialer, in one small package. It's also DOS based, which makes it ten times better than this windows crap.
PGP,
or Pretty Good Privacy, is becoming the standard in encryption technology for most people. Encryption is important, as it
will keep those people that would get you thrown in jail out of your files (your family, your non-hacker "friends", and maybe
the feds). PGP will also make sure that any files you send will only be usable by the person you want them to be. It does
this through the use of public and private keys, but that's all discussed in it's manuals/readme files.
If your some
sort of cracker, you'll probably want some sort of password cracker. Crackers work one of two ways: either by brute forcing
the password (which will only work if the password is one in the crackers library file) or by rending the appropriate string
of characters from the program itself. I personally have never used these and can't tell you much about them.
B.O.
The Almighty God of a Script Kiddies Library is Back Orifice, written by Sir Dystic of the Cult of the Dead Cow (cDc). BO
will render an infected (win9x) computer yours to do what you will, from causing dialog boxes to pop up (with your messages,
of course) to a complete system crash. Of course, the trick to BO is getting your victim to run the server program (not hard
with a little SE'ing skill) Check out cDc's page if you're interested. Note: before you run BO, make sure you change the default
port/password settings. You wouldn't want some *other* script kiddie stealing your victim, would you?
Ah, almost forgot.
ICQ. ICQ is a very important tool for the aspiring script kiddie, if not for the instant communication with all your other
friends, it is a hunting ground for those who need BO targets. Of course, the standard ICQ isn't good enough for the second
option. You'll need to download some patches for it: first, one that will cause auto-authorization for you to put others on
your list. Second, one that causes your victims latest/last known IP address to never be hidden. Why? Easy - you get your
targets email, look him up in the ICQ directory, and add him to your list. If he doesn't know you, SE him into running BO
(which you happily file transfer to him using ICQ's handy file transfer). Look in his info for his IP. Boom. You've just nailed
the punk -- you have his IP, and he's infected. You can now proceed to screw with your victim as much as you want.
The
above should get you started, from defending yourself to counterattacking. As a side note though, there is at least one kind
of program that no intelligent person would have -- a Credit Card number generator. Credit card fraud, while extremely easy,
will get you locked up quicker than you can find hard-core porn on the
net.
|
|