1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-24 02:32:54 +02:00
Files
mirror-textfiles.com/bbs/DESTRUCTION.html

94 lines
11 KiB
HTML

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>BBS Destruction and Hacking</H1>
<P>
This section of files contains how-tos and stories centered around the
dark flipside of the BBS world: BBS hacking. This is the process of somehow
breaking into a BBS program, the actual program that runs the BBS, and
then either halting it, deleting it, or otherwise taking down the
machine.
<P>
By doing this, of course, the users would bring to a crashing halt the only
line of communication that community had; the single machine that everyone's
words and thoughts were being kept. Taken from this perspective, it seems
foolish, but in some locations there were a lot of BBSes, and in many
cases, the BBS would be back up, shaken but not gone, by the next morning.
<P>
One can make an argument for the feeling of power this might give a young
modem user. One also can't discount the scads of bland, uninteresting
BBSes that populated the landscape, who only provided an interest to those
who could penetrate its meager defenses and shake it by the scruff of the
neck.
<P>
Of course, the software designed for bulletin boards in the 1980's was often
the work of programmers using their spare time, so while the security would
be existent, it would not be bulletproof. In the case of some programs (like
the GBBS software), the code would be in something like the BASIC computer
language, and certain Back Doors that had been put into the program were
then known to all. By giving these BBS programs the wrong information at
the right time, users could make the system die, or worse, get access to
the command prompt of the BBS computer, causing havok all over the place.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/abusebbs.txt">abusebbs.txt</A> <tab to=T><TD> 10527<BR><TD> The BBS Abusing Handbook by The Joker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/abuser.txt">abuser.txt</A> <tab to=T><TD> 10950<BR><TD> The Best Ways to Abuse a BBS by The Joker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/applenet.ana">applenet.ana</A> <tab to=T><TD> 3264<BR><TD> How to have Fun with Apple-Net BBSes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/applhak">applhak</A> <tab to=T><TD> 1973<BR><TD> Hacking Apple BBSes: A Collection of Hints
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/b-door.txt">b-door.txt</A> <tab to=T><TD> 959<BR><TD> Backdoor for PCExpress V1.0 Registered by iLLeGaL e?Ror
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/batdis.txt">batdis.txt</A> <tab to=T><TD> 7871<BR><TD> Computer Terror and Destruction Issue #1: BBS Infiltration
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/bbsenter.hac">bbsenter.hac</A> <tab to=T><TD> 3940<BR><TD> BBS Crashing Techniques, by Mr. Memorex
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/bbshack.txt">bbshack.txt</A> <tab to=T><TD> 18874<BR><TD> The Really Fine Art of BBS Hackingm by Vortex of HIT Inc.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/beepoff.bgr">beepoff.bgr</A> <tab to=T><TD> 3859<BR><TD> Creating Beeping BBS Annoyance, by Abigwar
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/board.des">board.des</A> <tab to=T><TD> 3072<BR><TD> Destroying an Apple II Board by Doctor Crunch
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/bom-hack.txt">bom-hack.txt</A> <tab to=T><TD> 12007<BR><TD> How to Hack Your Favorite BBS Systems by Raven of BOM
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/breakbbs">breakbbs</A> <tab to=T><TD> 4425<BR><TD> What to Do When You Break Into a BBS, by Doctor Crunch
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/crashae.hac">crashae.hac</A> <tab to=T><TD> 1495<BR><TD> Crashing AE Lines, by Delta Master
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/crashc.txt">crashc.txt</A> <tab to=T><TD> 7629<BR><TD> The How to File on Crasking a C-Net Part Two by Ditto and Shlomo
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/crashcom.txt">crashcom.txt</A> <tab to=T><TD> 5949<BR><TD> How to Crash a Commodore BBS, by The Highwayman of Chaotic Computing
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/crashem.ana">crashem.ana</A> <tab to=T><TD> 8884<BR><TD> What to Do when you Break into a BBS, by Dr. Crunch
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/crshgbbs.hac">crshgbbs.hac</A> <tab to=T><TD> 3770<BR><TD> How to Crash GBBS II Boards
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/crshnw.txt">crshnw.txt</A> <tab to=T><TD> 10752<BR><TD> Crashing Networks, the Causes and Prevention, by the Oracle of Delos
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/forum.hac">forum.hac</A> <tab to=T><TD> 7012<BR><TD> Crashing Forum Boards by Panther Man
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/frymodem.txt">frymodem.txt</A> <tab to=T><TD> 2518<BR><TD> The Anti Modem Weapon by Amiga Trading Board BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hack-pcb.txt">hack-pcb.txt</A> <tab to=T><TD> 3744<BR><TD> A Simple Way to Hack Around PC-BOARD And Succeed by Sniper
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hack6.txt">hack6.txt</A> <tab to=T><TD> 4544<BR><TD> System Crusher Part II or How to Crash a BBS II, by Grim Raper and Mind Master (October 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hackcom.txt">hackcom.txt</A> <tab to=T><TD> 6438<BR><TD> DOCUMENTATION: HackBBS v0.2 COM Only Version by Virogen (June 29, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hacker.txt">hacker.txt</A> <tab to=T><TD> 6265<BR><TD> Attention all PC Board Sysops! Beware of a User Called RAM DRIVE!
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hackrene.txt">hackrene.txt</A> <tab to=T><TD> 4736<BR><TD> Hacking Into Renegade BBSes by Slide N Gutz
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hackrg.txt">hackrg.txt</A> <tab to=T><TD> 1766<BR><TD> A Serious Flaw in Renegade BBS Software
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hacktlgd.txt">hacktlgd.txt</A> <tab to=T><TD> 1757<BR><TD> How to Hack into a Telegard Board by Caramon Majere
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hackwwiv.txt">hackwwiv.txt</A> <tab to=T><TD> 7790<BR><TD> Hacking into WWIV, Second Edition by Vision
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hermes.hak">hermes.hak</A> <tab to=T><TD> 3307<BR><TD> Hermes Back-Door (Hacking the Hermes BBS Software) by Dookie (November 13, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hermes_backdoor.txt">hermes_backdoor.txt</A> <tab to=T><TD> 2144<BR><TD> How to Become a Sysop on Any Hermes System (December 13, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hhackin4">hhackin4</A> <tab to=T><TD> 14917<BR><TD> Hacking the Oxgate Public Bulletin Board System by The 0mega & Lord Vision
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/hobo.txt">hobo.txt</A> <tab to=T><TD> 100631<BR><TD> Havok Crashes a BBS and Prints out a Userlist (December, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/kevin.txt">kevin.txt</A> <tab to=T><TD> 5231<BR><TD> Kevin Dahlstedt describes major security breaches in Wildcat! BBSes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/killbird2.ana">killbird2.ana</A> <tab to=T><TD> 4096<BR><TD> How to Crash a BBS Part II by Grim Reaper
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/killwwiv.txt">killwwiv.txt</A> <tab to=T><TD> 4480<BR><TD> Kill the Lamer SysOP's Computer! By the Crypt Keeper and The Evil Master
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/lol14.txt">lol14.txt</A> <tab to=T><TD> 14054<BR><TD> Hacking & Crashing: Emulex/2, Forum Hacks, WWiV, and Telegard by Legions of Lucifer and PHUCK (January 15, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/majorbbs.txt">majorbbs.txt</A> <tab to=T><TD> 1138<BR><TD> Some MajorBBS Backdoors, by Enigma
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/mish19.txt">mish19.txt</A> <tab to=T><TD> 13056<BR><TD> Networks (BBS Program Hacking) by The MinuteMan (May 26th, 1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/net-work.txt">net-work.txt</A> <tab to=T><TD> 4825<BR><TD> A Tutorial On how to Fuck Up Net-Works, by The Minuteman, 3/26/1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/ra.txt">ra.txt</A> <tab to=T><TD> 5402<BR><TD> Fun with Random Access BBS Software, by Vince Niel
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/rbbs.crs">rbbs.crs</A> <tab to=T><TD> 3954<BR><TD> How to Destroy an RBBS-PC System by Mad Hacker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/real-ra.txt">real-ra.txt</A> <tab to=T><TD> 12665<BR><TD> Why the "Fun with RA boards" hacking method is LAME (The REAL way to hack RemoteAccess) by ByTe RyDeR
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/renehack.txt">renehack.txt</A> <tab to=T><TD> 8325<BR><TD> Hacking Renegade 07-17 by Tokyo of PSW
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/rghf.txt">rghf.txt</A> <tab to=T><TD> 2102<BR><TD> DOCUMENTATION: Renegade History Finder (June 1993) by Kris Greer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/rgst.txt">rgst.txt</A> <tab to=T><TD> 3839<BR><TD> DOCUMENTATION: Renegade Smart Trojan (June, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/rrg-wwv2.txt">rrg-wwv2.txt</A> <tab to=T><TD> 11671<BR><TD> The Rebel Riting Guild: Having Phun on WWIV II by The Evil Master (December 3, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/rrg-wwv3.txt">rrg-wwv3.txt</A> <tab to=T><TD> 9978<BR><TD> The Rebel Riting Guild: Having Phun on WWIV III by the Evil Master (December 9, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/screwbbs.txt">screwbbs.txt</A> <tab to=T><TD> 10600<BR><TD> The Best Way to Abuse a BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/telefard.hac">telefard.hac</A> <tab to=T><TD> 2137<BR><TD> How to hack into a Telegard board, by Carmon Majere
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/trash.pcb">trash.pcb</A> <tab to=T><TD> 3134<BR><TD> How People Crash a 10.0 PCBOARD, by Jeremy Kruse (Ninja)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/wildcat.hck">wildcat.hck</A> <tab to=T><TD> 6694<BR><TD> How to hack WildCat! 4.0 by RoBoTiC HaMSTeR
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/wildcat.txt">wildcat.txt</A> <tab to=T><TD> 1664<BR><TD> how to Hack Wildcat by Virus in 1994
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="DESTRUCTION/wwivcrakdoc.hac">wwivcrakdoc.hac</A> <tab to=T><TD> 5576<BR><TD> Kill the lamer SysOp's computer! By The Crypt Keeper and The Evil Master of WCCP
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 53 files for a total of 422,390 bytes.</SMALL></TABLE></BODY>
</HTML>