NeuralArchive

An archive of published things by Neural.it. You can browse, search, or see a random publication. The Neural Archive lists 1884 publications.

Secrets of a Super Hacker. Introduction by Gareth Branwyn

Author
Knightmare
Publisher / Label
Loompanics Unlimited
Country
USA
Language
English
Publication year
1994
Type of publication
Book
Number of pages
205
ISBN
9781559501064

Index

Contents
Introduction: Hackers: Heroes or Villians?, by Gareth Branwyn..................................i

PART ONE 
Before Hack

Chapter One: The Basics........................................................................3
Reading vs. Doing ♦ Opening Remarks ♦ Equipment ♦ Modems And Speed ♦ Communications 
Software ♦ Handy Features ♦ Data Capture ♦ Past and Future ♦ Days of Yore Live On ♦ Computer 
Crime ♦ Stealing Money ♦ Sabotage ♦ Various Thieveries ♦ The Seventh Crime ♦ Hacker 
Motivations

Chapter Two: The History Of Hacking...........................................................13
First Carne Hardware ♦ YIPL and TAP ♦ Computer Crime ♦ 2600 ♦ WarGames and Phrack ♦ Shadow 
Hawk ♦ The Electronic Frontier Foundation

Chapter Three: Researching The Hack...........................................................19
Targeting ♦ Collecting Information ♦ Some Unusual Research Methods ♦ On-line Computer Simu-
lators and Tutorials ♦ Sorting Through Trash ♦ GIRK ♦ Found Disk Analysis ♦ Check Up ♦ Dam-
age to One Side ♦ Rips and Tears ♦ Imperfections ♦ Examining Screenshots ♦ Snooping

Chapter Four: Passwords And Access Control....................................................35
Passwords ♦ Passwords Supplied by the User ♦ Possible Password Investigation ♦ Password Stud-
ies ♦ Password Restraints ♦ Computer Generated Passwords: Fakery and Analysis of Machine-
Generated Passwords ♦ Non-Random Machine-Generated Passwords ♦ Programs are People Too ♦ 
Brute Force Methods ♦ Foiling the Brute Force Assault ♦ Conclusion

Chapter Five: Social Engineering..............................................................49
The Noble Form ♦ Hacker as Neophyte ♦ Hacker in Power ♦ Hacker as Helper ♦ Peak Hours ♦ 
Other Hints ♦ Sample Social Engineering Situations ♦ Miscellaneous Social Engineering Tips ♦ 
Other Roles ♦ In-Person Engineering ♦ Written Engineering ♦ Request for Information ♦ Message 
From God ♦ Trouble in Paradise?

Chapter Six: Reverse Social Engineering.......................................................63
Overcoming Social Engineering Drawbacks ♦ Reverse Social Engineering Sabotage Methods ♦ RSE
Case Study: The Translation Table ♦ Solving thè Sabotage ♦ RSE Advertising Methods ♦ Trouble for 
Nothing?

PART TWO 
During Hack

Chapter Seven: Public Access Computers And Terminals..........................................71

Introduction to the Three Kinds ♦ CD-ROM Databases and Information Computers ♦ Public Access 
Terminals (PATs) ♦ The Bar Code Hack ♦ Hidden Commands ♦ College PATs ♦ Doing it thè B-Z 
Way ♦ Shoulder Surfing ♦ Doing it BASICally ♦ Hardware Methods ♦ General Purpose 
Microcomputers ♦ Breaking Free ♦ Freedom Means Free Roaming ♦ PACK ♦ Menu Simulation and 
Other Sneakiness ♦ Hiding Your Goody Basket ♦ Things to Watch Out For

Chapter Eight: On-Site Hacking: The Trespasser-Hacker.........................................89
Closed-Circuit Television ♦ Biometrie Systems ♦ Always a Way ♦ Acting for thè On-Site Hack ♦ 
Piggybacking ♦ Other Successful Tricks & Antics ♦ Electronic Passive Computing ♦ Radiation 
Comprehension ♦ Van Eck and Britton ♦ Ups and Downs

Chapter Nine: Hacking At Home: Dialing Up Computers With Your Modem...........................99
Reality ♦ Who to Connect to ♦ Paying for thè Pleasure ♦ Packet Switched Networks ♦ Other Net-
works ♦ Finding Dial-Up Numbers ♦ Dial-Up Security Measures ♦ Scrutinize the Login Environ-
ment

Chapter Ten: Electronic Bulletin Board Systems...............................................105
Finding BBS Numbers ♦ Finding Hacker Boards ♦ Making Connections ♦ BBS Features ♦ BBS Ex-
ploitation ♦ Getting to Know You ♦ Bypassing BBS Security ♦ Running a BBS ♦ Midnight Masquer-
ade ♦ Hackmail ♦ Crashing BBSs ♦ Trojan Horses ♦ Covering Up Trojan Horse Activity ♦ While it 
is Running ♦ Before & After ♦ A Few Tips for thè Do-It-Yourselfer

Chapter Eleven: Borderline Hacking...........................................................119
Hacking for Ca$h ♦ Filthy Tricks ♦ Bribery ♦ Booze and Broads ♦ Bad Feelings

Chapter Twelve: What To Do When Inside.......................................................123

Hacker Motivations Revisited ♦ Operating Systems ♦ Looking Around ♦ Commands to Look For 
and to Use ♦ File Transfer Protocol (FTP) ♦ Fun 'N Games ♦ The User Network ♦ Becoming a 
Superuser ♦ Spoofing ♦ Cryptography and DES ♦ Bit by Bit ♦ Program Employment ♦ Viruses ♦ 
Covert Channels ♦ Get Out of JaU Free ♦ Retuming to thè Scene ♦ Mission Accomplished... Almost!

PART THREE 
After Hack

Chapter Thirteen: This Lawful Land...........................................................139
State Computer Crime Laws ♦ Traditional State Crime Laws ♦ Criminal Mischief ♦ Burglary ♦ 
Fraud ♦ Larceny ♦ Theft of Trade Secrets ♦ Receipt of Stolen Property ♦ Theft of Services or Labor 
Under False Pretenses ♦ Interference With Use Statutes ♦ Traditional Federai Crime Laws ♦ 
Conspiracy ♦ 661, 2113, 641, 912, 1343, 1361, Etc. ♦ Federai Computer Crime Laws, Or: It’s 10:30, Do 
They Know Where thè Hackers Are? ♦ Conclusion

Chapter Fourteen: Hacker Security: How To Keep From Getting Caught...........................145

In Researching ♦ In Social Engineering ♦ Dialing In ♦ Laptop Hints ♦ Your On-the-Road Kit ♦ 
System Tiptoeing ♦ Lessons From the Hospital ♦ BBS Protection ♦ Other On-line Security Steps ♦ 
Security Logs ♦ In Public and On-Site ♦ While Off-Line: Minimizing Losses ♦ Maintaining Your 
Computer ♦ Keeping Your Other Stuff ♦ Conclusion: How to Get Caught

Chapter Fifteen: Conclusion..................................................................161
The Hacker's Ethic ♦ My Code of Ethics ♦ Combining Principles ♦ My One-Person Tiger Team ♦ 
Principles Combined ♦ Concluding Thoughts ♦ Some Thoughts to the Concerned Administrator ♦ 
Some Thoughts to the Concerned Hacker

Further Reading..............................................................................169
The Books ♦ Other Sources

Glossary.....................................................................................173

APPENDICES

Appendix A: Explanation of Some ASCII Codes..................................................185

Appendix B: Common Defaults..................................................................189

Appendix C: Common Commands..................................................................191

Appendix D: Novice Word List.................................................................193

Appendix E: Job-Related Word List............................................................197

Appendix F: Technical Word List..............................................................199

Appendix G: Social Security Number Listing and ICAO Alphabet.................................201

Appendix H: Additional R/SE Role Playing Situations..........................................205