³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij +-+-+-+-+-+-+-+-+ ÛÛÛÛÛÛÛÛÛ²²²²²±±±±±°°°ð|O|u|t|b|r|e|a|k|ð°°°±±±±±²²²²²ÛÛÛÛÛÛÛ +-+-+-+-+-+-+-+-+ Issue #3 - Page 1 of 12 ³ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄij The KEY ----------Trojans unribbed---------- by `das<<<`amatier>>> Ok, most hacking channels all across the world claim they despise the word trojan. To start things off, a trojan is a brand name for a condom, this is not the trojan I am referring to. The trojan I am speaking about is also not an ancient Greek warrior. Trojan Horses are not viruses, though they are often thought of as such. A Trojan Horse is a program that appears to serve some useful purpose (which encourages you to run it), but hidden within it is a destructive program, which may damage files or allow a intruder access to your computer via TCP/IP port. I'm not going into the long boring text on what trojans are, what they do, or tell you which ones I like to use. But if you do some research there is some really fucking cool-ass-high-speed trojans floating around I'm also not going to explain the best types of trojans to use or what a port is. I'm going to defend hackers' rights to use such a thing as a tool. Yes trojans can be very useful to a hacker. I'm not talking about those cheesy malicious Trojans were you make the hosts CD-ROM tray open or close, even Del command.com on his computer because that's just lame shit. Some trojans are very useful. Ones that can infect a computer and the trojan will even message you when the host is online. But that's not too great. The ultimate I used one day. Me and a buddy of mine wanted to get some kind of revenge on this guy. He was a major asshole. We knew it was just too hard to say, "Ya I'm going to hack his box." because it isn't that easy. Some of you might snicker to yourselves and think hacking is easy hehehehe, but we all no it's not all point and click and you're in. Ok. So we wanted to get back at this guy, we went down on a checklist on how we could get at this guy. We started off by thinking where his life can go wrong. The first thing that came to mine is making it look like a suicide attempt.. naw that wouldn't do, too easy. My friend said ya he is screwing this other chick that we worked in the same building as us. That's it we can fuck his life over. My buddy was getting real excited saying, "You fucker, what are you going to do." I told him wait till tomorrow. Well it was tomorrow; my buddy was dying to know what scheme I come up with. I gave him a floppy disk; he was like this is it. I'm like fuck yak this is it. I wrote on the diskette, "Card Games" I knew he liked to play games during his lunch break off a floppy disk. I told my buddy TDC=TheDarkCRow. Drop this one on his desk. TDC said, "No way too risky. What the fuck is it." I said, "This is the Key." After an explanation, he agreed. Well, what is on the disk is a trojan that I myself did not write but know the author of the trojan. We call the trojan, "The Key." Anyway, after TDC put the disk on his desk we waited for like a week. Nothing happened. TDC said to me, "Your plan sucks it's not working." We totally forgot about it. A week later TDC was at my house drinking and we always hang out near my LAN. I checked my mail and in my mailbox was exactly what I was waiting for. A few passwords from this fucker that we wanted to get an even score with. Now we have his e- mail address and his wifes e-mail, AOL accounts, passwords is ISP passwords. We did a high 5 and a cheers. We started off by e-mailing his wife love letters from this chick that her husband was screwing. Acting like it was his e-mail address. We also stole his address book for the fact we had a key into his box. We started e-mailing to all his e-mail addresses saying he was leaving his wife because he had found something better. We also were dialing from his ISP account checking his E-mail as we sent them, left the e-mails on the server so he could check his mail from home to, So he did not suspect anything happening to him. We also e-mailed his girlfriend saying that they had to break off the fling they were having. But we e-mailed it from his wife's account hoping that she would reply to it. Well she did since our little venture. This dickhead has no more life, no wife, and no girlfriend. But he still works in our building. Only because we allow him to. Now when TDC and me see him in the hall or pass near his office we high 5 it. Chuckle and lol. Now I really didn't wipe out the guys computer or give him a fucking virus I used a key and yes if you can use a key to get in. Why in the fuck would you go around the back of the house and break down a door so the dog inside can eat you, hehehe. Lamers. TDC and me have had many more adventures like this one, but even better. This was just the first one so I thought I would share it with you. There is even more useful ways to enjoy keys; this one is more or less mild, as a hacker would say. What TDC and I did was illegal, inhuman and as a hacker would say, "That's lame." or "That's lame man." hehe. ',) The Moral to this story is "What a fucking blast trojans can be." I wish I had more patience to write more ... I would go into detail on how TDC and I uploaded child porn onto this lamers box and made shortcuts from the desktop to them. Another thing, if you find a floppy disk and don't know were the fuck it came from don't be stupid and put it into your box. Enjoy `,) `amatier --------------------------------------------------------------------- I have seen the future, and have seen the past, and yes, our master is thier.<<<`das`amatier>>> hacking into the realm................................................... ---------------------------------------------------------------------