Thank you for joining the HAPPY HACKER email list. Moderator
is Carolyn P.
Meinel. If you have hacking tips that you wouldn't mind
being read by law
enforcement types, please send them in! In the meantime,
welcome to the
flagship ezine of this list. Here's...
Vol. 1 Number 1
Hacking tip of this column: how to finger a user via telnet.
_______________________________________________________
*********************
Newbie note: 3l1t3, 31337, etc. all mean "elite." The idea
is to take either
the word "elite" or "eleet" and substitute numbers for some
or all the
letters. We also like zs. Hacker d00dz do this sor7 of th1ng
l0tz.
********************
Now maybe you were making a sincere call for help. But there
is a reason
many hackers are quick to flame strangers who ask for help.
What we worry about is the kind of guy who says, "I want to
become a hacker.
But I *don't* want to learn programming and operating
Page 2
gtmhh1-1
systems. Gimme some
passwords, d00dz! Yeah, and credit card numbers!!!"
Honest, I have seen this sort of post in hacker groups. Post
something like
this and you are likely to wake up the next morning to
discover your email
box filled with 3,000 messages from email discussion groups
on agricultural
irrigation, proctology, collectors of Franklin Mint
doo-dads, etc. Etc.,
etc., etc....arrrgghhhh!
This column will teach you how to do real, yet legal and
harmless hacking,
without resorting to these hacking tools. But I won't teach
you how to harm
other people's computers. Or even how to break in where you
don't belong.
******************************
You can go to jail tip: Even if you do no harm, if you break
into a portion
of a computer that is not open to the public, you have
committed a crime. If
you telnet across a state line to break in, you have
committed a federal felony.
*************************************
Page 3
gtmhh1-1
I will focus on hacking the Internet. The reason is that
each computer on
the Internet has some sort of public connections with the
rest of the Net.
What this means is that if you use the right commands, you
can *legally*
access these computers.
Warning: the tech support person at your ISP may tell you
that you have a
"shell account" when you really don't. Many ISPs don't
really like shell
accounts, either. Guess why? If you don't have a shell
account, you can't hack!
Any good ISP will allow you to try it out for a few days
with a guest
account. Get one and then try out a few Unix commands to
make sure it is
really a shell account.
How would you like to start your hacking career with one of
the simplest,
yet potentially hairy, hacks of the Internet? Here it comes:
telnet to a
finger port.
Have you ever used the finger command before? Finger will
sometimes tell you
a bunch of stuff about other people on the Internet.
Page 5
gtmhh1-1
Normally you would just
enter the command:
finger Joe_Schmoe@Fubar.com
finger cmeinel@techbroker.com
Now this command may tell you something, or it may fail with
a message such
as "access denied."
But there is a more elite way to finger people. You can give
the command:
telnet llama.swcp.com 79
What this command has just done is let you get on a computer
with an
Internet address of llama.swcp.com through its port 79 --
without giving it
a password.
But the program that llama and many other Internet hosts are
running will
usually allow you to give only ONE command before
automatically closing the
connection. Make that command:
cmeinel
This will tell you a hacker secret about why port 79 and its
finger programs
are way more significant than you might think. Or, heck,
maybe something
else if the friendly neighborhood hacker is still planting
insulting
messages in my files.
Page 6
gtmhh1-1
Now, for an extra hacking bonus, try telnetting to some
other ports. For
example:
telnet kitsune.swcp.com 13
That will give you the time and date here in New Mexico,
and:
telnet slug.swcp.com 19
Page 7