The

                      Big Beef Hax0r Guide Supreme

                                 by

                            Guido Supremo



###########################################################################

  01. How do I access the password file under Unix?
  02. How do I crack Unix passwords?
  03. What is password shadowing?
  04. Where can I find the password file if it's shadowed?
  05. What is "Orin"?
  06. What are those weird things hanging off my body?
  07. How do I access the password file under VMS?
  08. How do I crack VMS passwords?
  09. What can be logged on a VMS system?
  10. What privileges are available on a VMS system?
  11. How do I break out of a restricted shell?
  12. How do I gain root from a suid script or program?
  13. How do I erase my presence from the system logs?
  14. How do I send fakemail?
  15. How do I fake posts and control messages to UseNet?
  16. How do I hack ChanOp on IRC?
  17. How do I play with myself?
  18. How to I change to directories with strange characters in them?
  19. What is ethernet sniffing?
  20. What is 127.0.0.1?

###########################################################################

01. How do I access the password file under Unix?

In standard Unix the password file is /etc/passwd.  On a Unix system
with either NIS/yp or password shadowing, much of the password data may
be elsewhere.  To get the password, type at the prompt:

	GIVE ME THE PASSWORD FILE NOW

If that does not work (many admins have patched this software bug), type:

	GIVE IT TO ME OR I WILL HAX0R YOU

This should bypass the current security measures.  There has been talk of a
patch to this bug, but it is still several years off from being widely used.


02. How do I crack Unix passwords?

Contrary to popular belief, Unix passwords cannot be decrypted.  Unix
passwords are encrypted with a one way function.  The login program
encrypts the text you enter at the "password:" prompt and compares
that encrypted string against the encrypted form of your password.

Password cracking software uses hammers.  To crack password files yourself,
display the current password file on your computer monitor, and take a 
large hammer.  Apply force to the back of the hammer directed at the 
computer screen.  Be careful not to completly destroy your screen, use only
enough force to crack the file displayed.  If you can't find a hammer, or 
your screen is already broken, you may print out the password file, wrap 
the printouts around a rock, and drop it from a tall structure.  This 
should sufficiently "crack" the encrypted passwords contained inside.


03. What is password shadowing?

Password shadowing is a security system where the password is actually the 
word "shadow".  This security measure was created by extremely stupid 
individuals.  The password file has been set up so that the word "shadow" 
is replaced with a !, #, *, x, or other token.  The password file showing 
all the people whose passwords are "shadow" will be found elsewhere on the 
system.


04. Where can I find the password file if it's shadowed?

Unix                  Location                        Token
------------------------------------------------------------------
AIX                   Toilet                           !
ACO                   Under Bathroom Mat               :)
BSD                   Inside Anal Cavity               :o
ConvexOS              Under Rock next to tree          **see below**
DG/UX                 Heaven                           newyorktransittoken
HP-UX                 Hell                             whosfryingbaloney
JizzOS                Where the sky loves the sea      x
Linux                 Candyland                        **see below**
OSF/1                 Between Boardwalk and Park Place *
SunOS                 In my pants                      %]
System V              The Land of Milk and Honey       thisisatoken
Ultrix                The Dog Ate It                   ~
UNICOS                Wedged between Orins breasts     **see below**

**Note, these systems no longer use tokens, as they have upgraded to the
  metrocard.


05. What is "Orin"?

Orin is currently to be elected Hardcore Porn Queen of the Year.  Please see
Http://america.net/~cochise 
for more information


06. What are those weird things hanging off my body?

Those are your genetalia.  Be careful not to damage them.

07. How do I access the password file under VMS?

Under VMS, the password file is SYS$SYSTEM:SYSUAF.DAT.  However,
unlike Unix, most systems are not suceptible to the "GIVE ME THE PASSWORD 
FILE NOW" attacks.  For these systems, other attacks are nessesary, such as
the "Pretty please with sugar on top" methods, outlined later.


08. How do I crack VMS passwords?

Exactly the same way you crack UNIX passwords.  Get your hammer or use the
printouts-and-rock method.


09. What can be logged on a VMS system?

Virtually every aspect of the VMS system can be logged for
investigation.  With this known, be sure you keep plenty of matches handy,
so that you can print out these logs and burn them, therefore eliminating 
any evidence of your breakin.


10. What privileges are available on a VMS system?
  
BEDTIME         Allows you to go to bed whenever you want
CANDY           Allows you to eat all the candy you want
STORY           Makes Mommy or Daddy read you a story
JIMMORRISON     Allows you to listen to the Doors
CLOCKWORKORANGE Allows you to gang rape people and listen to Beethoven


11. How do I break out of a restricted shell?

On poorly implemented restricted shells you can break out of the
restricted environment by eating the chocolate shell to get at the creamy 
center, or, if the shell is not made of chocolate but instead of something 
inedible like Bash, type "GIVE ME ROOT PLEAZE" and you should have it. 
Keep in mind that a Korn shell is edible, but yeilds no creamy center.


12. How do I gain root from a suid script or program?

Very carefully.


13. How do I erase my presence from the system logs?

Edit /etc/iamloggingyoustupid, /usr/adm/bunnysex and /usr/adm/jimmorrison. 
These are not text files that can be edited by hand with vi, you must use a
program specifically written for this purpose.
Example:

#include 
void main()
{
printf("Error, user is too stupid to have gotten root in the first place.");
}


14. How do I send fakemail?

Telnet to port 25 of the machine you want the mail to appear to
originate from.  Enter your message as in this example:

 HELO OTHUR KOMPUTER
 THIS MALE IS FRUM billgates@microsoft.com
 NO, REALLY, IT IS
 DATA
 Frum: Joe Momma
 To: you
 Subjekt: This mail is fake
 Replie-To: Joe Momma

 3y3 /\m 31337 b3cau§e 3y3 fakex0red this mailx0r
 .
 QUIT (this pathetic life of mine)


15. How do I fake posts and control messages to UseNet?

If you are a real 31337 hax0r, then you shouldn't use Usenet.  Stick to 
more conventional message boards, such as the bulletin board at your local 
laundromat.  You can stick messages there that say "This message is from 
Joe Blatz, I am a stoopid luser".  With an 31337 skill like that, you will 
surely be ph33r3d.


16. How do I hack ChanOp on IRC?

Find a server that is split from the rest of IRC and create your own
channel there using the name of the channel you want ChanOp on.  Then when 
the split ends, say to the ops "I JUST HAX0RED J00R CHANNEL! JOO SUX0R", in
which case you will quickly end up in a situation where you are no longer 
hacking the channel, and are probably wondering where the channel went.  
That means that you have successfully hax0red the channel.  Those people 
will now ph33r you. 

17. How do I play with myself?

That is just slightly out of scope for this file.


18. How to I change to directories with strange characters in them?

These directories are often used by people trying to hide information,
most often warez (commercial software).  The first thing you do is type 
Ctrl-D, I, space, S, U, X, 0, R, enter.  This will let you see exactly what
is in those directories, or at least let you have some insight about 
yourself.


19. What is ethernet sniffing?

Ethernet sniffing is listening (with software) to the raw ethernet
device for packets that interest you.  When your software sees a
packet that fits certain criteria, it logs it to a file.  The most
common criteria for an interesting packet is one that contains words
like "pornography" or "pedophilia".  To get a sniffer, enter an IRC 
channel or aol chat room, and say "GIVE ME A ETHERNET SNIFFER" 
approximately five hundred times. After the five hundredth, it will be 
DCCed to you or you will find it in an email.  This is an automatic 
function of most IRC servers, provided you do it in a channel with no ops 
in it.


20. What is 127.0.0.1?

127.0.0.1 is Bill Gates IP.  Is is suggested that you do all you can to make 
this guys life a living hell.  Winnuke this address often.  He will really 
ph33r j00. 

    Source: geocities.com/siliconvalley/2072

               ( geocities.com/siliconvalley)