dslogo1.gif

Home
Tutorials
Password Crackers
Dictionary/Word Lists
Unix
Encryption
Port Scanners
Privacy/Anonymity
Trojans
Contact/About Me
The Lighter Side
Proxy Servers
Password Managers
Anti-Trojan/Virus
Personal Firewalls
Anti-Spyware
Secure File Deletion
Internet Cleanup Tools
PC Access Control
System Utilities
Email Security
Instant Messengers
Virus Creation Software
IRC
Web Development
Digital Soldier M.A.M.E
Digital Soldier Wallpaper
Digital Soldier Emulation
Digital Soldier Javascripts
Digital Soldier Games Spot

The Script Kiddie's Essential File Kit
DeXter
Dexter@email.ro

"We, whoever we are at the current time, are not responsible for your actions as the result of anything, especially such things that pertain to this site. If your ignorance of local, state, and/or federal laws pertaining to anything mentioned to or hinted at by us lands you in a position you don't like (i.e prison, jail, or the liable end of a lawsuit), remember that it is not L.I.S.T., it's members, God's, Jesus's, Allah's, Jehovah's, or anybody else's responsibility but your own. We didn't make you do anything, nor would we. It is also the intention of this disclaimer that we hold to, not it's exact wording: if you think there's a legal loophole that you've found that holds us liable for you're actions, you're most likely right. However it is the spirit of this disclaimer that should be followed."

This is a file for all you pre-Kiddies out there that don't even know what you need to get started on your descent into the digital underground. I am assuming that you have some semblance of computer know-how if you are reading this (i.e. telnet is not a foreign concept to you ), so I will not tell you how to specifically use each individual program, just it's general use and why you want it. If you can't read the included files with these programs don't come crying to me saying they don't work.

The first thing you should try and download is a port scanner. This is a nifty little tool that will allow you to put in an IP, and find out what ports are open (i.e. what ports you can screw with.) This is also good for scanning your own machine to see if someone has a back door to your machine (perhaps through BO [explained below]).

Another good file to have it a winnuker. I personally do not use it, so I can't say exactly what it does (I have better toys). As I understand it, it sends a ping to your victim that causes either their net connection or their entire system to crash. It is easy to find patches that make you nuke-proof, so don't rely on this to affect anybody but newbies and civilians.

Nuke Nabber (or any good port listener) is another essential addition to your files. It listens to whatever ports you tell it to, and informs you of any pings to those ports. You can also set it to do a trace/finger/whois on whatever poor bastard tries to nuke you (or something worse), thus giving you *their* IP, amongst other info (and you can nuke them [or worse]).

For those of you in more populated areas, a War Dialer will help you in finding direct-dial numbers. You give it a set of numbers to work with (ie 456-0000 through 456-9999), and it dials every one on the list, seeing if there is a modem on the other end. Some you can even set to dial a single number repeatedly (Two example uses of that: Jocko, the star quarterback, who was an important game tomorrow: probably won't appreciate 50 calls in a row at 4 in the morning... or DonPadre the Lawyer, who is expecting an important call: well it won't go through if every time he hangs up he gets called back by the same unanswering program).

A Tone Generator is good for any aspiring phreak. These will generally create the tones used in a red box, some do more. Blue Beep is one of the best, in my opinion: it incorporates red, blue, and silver tone generation, as well as a war dialer, in one small package. It's also DOS based, which makes it ten times better than this windows crap.

PGP, or Pretty Good Privacy, is becoming the standard in encryption technology for most people. Encryption is important, as it will keep those people that would get you thrown in jail out of your files (your family, your non-hacker "friends", and maybe the feds). PGP will also make sure that any files you send will only be usable by the person you want them to be. It does this through the use of public and private keys, but that's all discussed in it's manuals/readme files.

If your some sort of cracker, you'll probably want some sort of password cracker. Crackers work one of two ways: either by brute forcing the password (which will only work if the password is one in the crackers library file) or by rending the appropriate string of characters from the program itself. I personally have never used these and can't tell you much about them.

B.O. The Almighty God of a Script Kiddies Library is Back Orifice, written by Sir Dystic of the Cult of the Dead Cow (cDc). BO will render an infected (win9x) computer yours to do what you will, from causing dialog boxes to pop up (with your messages, of course) to a complete system crash. Of course, the trick to BO is getting your victim to run the server program (not hard with a little SE'ing skill) Check out cDc's page if you're interested. Note: before you run BO, make sure you change the default port/password settings. You wouldn't want some *other* script kiddie stealing your victim, would you?

Ah, almost forgot. ICQ. ICQ is a very important tool for the aspiring script kiddie, if not for the instant communication with all your other friends, it is a hunting ground for those who need BO targets. Of course, the standard ICQ isn't good enough for the second option. You'll need to download some patches for it: first, one that will cause auto-authorization for you to put others on your list. Second, one that causes your victims latest/last known IP address to never be hidden. Why? Easy - you get your targets email, look him up in the ICQ directory, and add him to your list. If he doesn't know you, SE him into running BO (which you happily file transfer to him using ICQ's handy file transfer). Look in his info for his IP. Boom. You've just nailed the punk -- you have his IP, and he's infected. You can now proceed to screw with your victim as much as you want.

The above should get you started, from defending yourself to counterattacking. As a side note though, there is at least one kind of program that no intelligent person would have -- a Credit Card number generator. Credit card fraud, while extremely easy, will get you locked up quicker than you can find hard-core porn on the net.