                                                         .
                                                         :
               .                                       
               |                      .             ---
         :                                             
     --Ŀ----Ŀ--  --Ŀ--Ŀ'94   
      - -- -Ĵ --   :  -- -
 - - : --    : ÿ| | :   :     -M<G<ZiNE-
    .:  Ŀ -- | -  | | : |   | -
    :| -- |-- : ---| :     --
    |--------  --------
                                                
----                                       
                  
    |                                         Issue #2!
    :
    


 None of the information and knowledge in this file is meant to harm anyone,
 public information purposes only, so, readers are at your own risk and will
 free to use this info the way they want, when they want, with whatever they
 want, in whoever they wish.
 People that are afected somehow by the info in this file, should blame only
 the responsibles by such "attrocity", and should never try to affect
 Essence crew by somehow: 'please, respect the work we waste on this
 information spreading!'
 If you don't agree with what I've just wrote, please, don't read the rest
 of the magazine! 'Respect is what everybody expects!'

                                    Thanks for reading this and have some
                                    fun! Remember, "Essence Magazine only
                                    spreads this knowledge/info for public
                                    informational purposes!"

                                                [Ed] - Kore

==============================================================================

 I'm sorry the issue #2 of the 'zine took so long to be released, but I
 suffered an HD crash and lost all the stuff that I had on that HD drive,
 fortunatly, I managed (with help of Dark Snow, Asskicker, Cebolas, Young
 Devil, Death's Law, and others) to set up an "emergency" WHQ HUB for
 Essence Network. This issue will be shorter because of that.

 Feel free to help the cause :-)


                                         [Ed] (fuck the mystyped words)  ;)

==============================================================================

  --------------------------------------------------
  The Art of Stealing Users Passwords (on networks?)
  --------------------------------------------------

  First of all u really should get to know the system where u'r going
  to 'borrow' the users passwords!
   Try to know in what kinda computers & software(networksoft) is the system
  based on, how many users/accounts have the system, the types of security 
  levels, how many terminals are connected, who the hell are or how many 
  System Admnistrators the system has, and other relevant info.

   I'm used to work with Pc's so they will be used has example, but the  
  following principles mencioned in this article can & should be applied 
  to virtually any kind of system.
  
   But let's get pratical...

   Well, one of first things you should check is the maximum pw input lenght
  the protected system accepts.
   
   Check also what kind of pw the systems uses (PIN, characters or both),
  how many tries can a user make to access the system and if the system 
  produces a log of every user entry (u don't wanna be caugh, want u?).
   
   Well if there is no tries limit (nah, & how about the pw user list written 
  next to u?...) to correctly strike the pw or, at least, the system doesn't 
  keep a record of each try (a login log), the danger of being caugh will be 
  much lower.
   
   Keep in mind that the user of the account u'r trying to get to, surely will 
  be informed by the system administrator (if there is a log & a serious SA) 
  that "someone" is trying to get in with his account.
   
   So what's next? Well, its going to be more difficult to get the damn pw, 
  because now the user knows "someone" is trying to hack is account and 
  therefore he will certainly periodically change his pw!
   
   But chill out..., in big systems with hundreds or thousands users, this 
  probably (who knows?!)will not happen because no SA is in the mood to verify 
  the entry logs of each user every day & night. There are too many users 
  and he certainly have better things (a life?) to do rather then verifying 
  the system all the time!


  So lets discuss some ways of getting those passwords:

  1 The hardway or Sherlock Holmes style?:
  #########################################   

     This consists basically in pure deduction.
     
      U can "casually" get to know the SA, get to know his habits, his 
    behaviour, his way of life like, in order then to deduct what could be
    his password.
     Exemple:  is he a "straight" guy? More like a "clean" guy who doesn't 
               drink, smoke, go out & come late...
               
               Does he do his bed every morning (not me!) and go to bed early
               (not me either) and is his desk always in order (not mine)?...
               Well, if the answer is yes, them FORGET! 
               
               Normally, people like these are very carefull with what they do 
               in life! In fact they'r too tidy and organized & so it will be 
               fucking difficult trying to "guess" his password!
               
               But just for the record how about checking his agenda? 
     


     This is a very hard task, and normaly takes too much time & few results
    when applied to people we REALLY don't know/ever met!

     But, if is too difficult to 'deduct' the password from a stranger, why 
    not 'deducting' from our friends?

     They surely will not suspicious u! Specially if u are a close friend,
    meaning that he will think that's someone elses dirty work but not YOU! 
    ( eheheh, too dirty for u?).
     



  2 Elephant memory style?:
  ##########################

     Well if u have a good memory (like an elephant??) how about using it?

     Go near the network terminals and when someone approaches them how about 
    trying to memorize what he/she types?
    
    In case u don't get the correct order of what he/she typed, memorize at 
    least what charaters he/she used so u may play a little "scrabble" later..
     
     Even though, if u tried to figure out what could be the damn correct 
    order and u don't succed don't get desperate!
     
     Just try to know if "that" specially user is a regular user, and if so, 
    find out when he usually gets in the system (in order u to be also there), 
    so that u may calmly "review" what he types.
     
     BTW, there may be a prob with this proceding! What could be?

     If u'r alone, the user may get suspicious by seeing one guy (YOU) doing 
    nothing around him! He will certainly ask u to do nothing else where!
     
     So what should u do? How about getting help? (nope, not u'r dads help!) 
     
     With a trusty buddy, u both can simulate an 'intelectual' (ahahahahah) 
    chat near the terminals while u memorize what the user types! 
     
     Surelly the user now will not get (so) suspicious by seeing two guys 
    having a nice conversation about some intelectual stuff (even if u don't 
    know what u'r saying)  u'r closed to him (but not to close. ok? He might
    interprete wrong if u know what i mean..).

  
     

     
     
  3 Lazy dependent style?:
  #########################

     If memory is not u'r best quality...(betwen others, eheheh)

     
     Well u can always recruit one or more guys who are willing to help u 
    in this special "mission" sharing the memory task with each one!
     
     So each one will have to memorize just a portion of the complete pw!
     
     For exemple: u will memorize the firts 3 digits, the nxt guy the 
    following 3 digits & the last another 3 digits!
     
     So the pw will be 9 digits long! Get it? 
     
     But don't forget to simulate a fake chat with all of u so the user don't
    get suspicious by seeing tree guys looking to him or his keyb! (he might 
    interprete wrong again...).
     
     Also don't get to much close to him!






  4 Super-Ultra-memory-lazy-guy or 'Sony' style?:
  ################################################
  
     But, if u have lack of memory, or u'r just to lazy to memorize anything,
    why the hell don't u make use of ur (or ur daddys) 'Sony Handy Camera'? 
    Specially if she's equipped with zoom and autofocus!
     
     But first of all don't forget to desgise undercover her. Hide the camera 
     little red light (the red LED) that gives the recording information and 
     could get the victims attention.
     
     Also don't forget to put a sticker in the transparent magnetic tape 
    support (where u put the record tape...) so no one sees the 
    camera (tape) working!

     U also can get a shoes-box/cake-box & put the camera inside after doing 
    a nice whole for the lens. So no one will know u carry a camera.
     One more thing, don't put the camera lens to much close to the whole of
    the box or u can be caught by the light reflection caused by the lens!
     Get the tube of a TOILETTE PAPER and make the separation whole<->lens 
    with this??

     Now how about taking u'r SONY for a spin?

     I suggest the terminal area of ur collegue, university, school, work or
    any public or non public terminal area, where we can find a  network & 
    some suckers...
    
     So take ur "baby" under ur arm to one of this places  and when u get
    there start recording the users types from a safe or distante place (it
    will depend on the cameras zoom/quality!).
     
     But ofcourse u'll get a better image if u'r near the victim, wouldn't u?

     So get close to the victim,(but not to much, u have to keep a safe 
    distance or he will HEAR the camera noise -where do u bought that shit?) 
    & again with the help of a friend start to simulate a nice little chat 
    about snow white & the 7 dwarfs while the camera aquires the target & 
    starts recording!!
     GOT IT?

     After the work done (lots of tape after) go to u'r home and calmly start
    viewinge how great director u r!




  5 Electrical expert style?:
  ############################
  
     Do u have access to the terminals keyboard connection?
     Yes? ok...
     
     If u'r working with PC's and u have access to the Ficha DIN of 5 pins,
    then get the following material (components):


    Ŀ
                                                               
     Qt: Type:                                Ref:             
                                                               
    Ĵ
                                                               
      1  female five pins DIN type            DIN n1          
                                                               
      2  male five pins DIN type              DIN n2, DIN n3 
                                                               
         A few meters of breathboard                           
         cable (or other comum elctric cable)                  
                                                               
      1  Iron solder + SOLDA                                   
    



    And do this BOX:

           Ŀ
           
           DIN n1THE  BOXDIN n2
           (Femeale)CONNECTION(Male)
          ĿĿ
          1    ----------------------------+---------     1
          4  ----------------------------+-|-----------   4
                    ||          
          3 ---------------------------+-|-|------------- 3
                    |||          
          5  ------------------------+-|-|-|-----------   5
          2    --------------------+-|-|-|-|---------     2
          ٰ|||||
           |||||
           |||||DIN n3
           |||||(Male)
    [ LEGEND ]Ŀ|||||Ŀ
     1 - Keyboard Clock||||---------     1
    | 2 - Keyboard Data |||-------------   4
    | 3 - Spare    ٰ|||          
     4 - Ground   ||----------------- 3
     5 - +5v DC   ||          
     + - Junction |-----------------   5
      - Pins     -----------------     2
    ٰ
           
           
           


                     --------------------------
                     THE BOX Simple Connection:
                     --------------------------
                        
                        Ŀ 
                        THE ----[    - (DIN n2)
        (DIN n1) - --[ BOX----[    - (DIN n3)
                        




    Capiche? Non? Look...




       Ŀ                                Ŀ
                                                                   
         Suckers                                                   
         screen                      Ŀ       My 27"     
                                         My        SCREEN     
                             100                   
     Ŀ  n2              į Mhz                  
            -- ]-------------      PENTIUM 
            Ŀ |              Ŀ        
         n1 THE ] [        
      ------[ BOX]--n3         Ŀ
     :::::::::: :::                     - oooooooooooo   ooo 
     -                              oooooooooooo   ooo 
                          not connected - ]----  oooooooooooo   ooo 
                                                  
                                      

    Ok? 
    Has u can see, basically this is just a simple signal derivation!
    We just have to derivate the signal from the sucker computer to our 
    computer. 
    Every little character he'll type will be also written in our screen! 
    U should have cable enough to be (if possible) in the opposite site 
    (or as far as possible, but not too far because of the decreasing signal 
    strengh) of the user ur monitoring.
   


 IMPORTANT: By the time u connected DIN n3 to your computer, this must have
            already done the keyboard test, on startup ok? 
            Ex: If the suckers computer is already turn on and your not, 
                then switch it on and only then after the keyb test u can 
                attach DIN n3 to your computer, figure why? In order to use
                the users keyb clock which will be used by ours making the
                computer think its the same clock he tested & so garanteeing 
                the keyb scan code syncronization!
                
    Well, theorically this should result but at the present time i hadn't         
    have time to test it! So no garantees are given (freeware style! eheh)





 6 Electronics-ultra-advanced style?
 ####################################

    One more advanced way of stealing the pws is by (active) interception too!
    
    The idea is quit simple: 
  
     I pretend to develop a small box (which will be connected in serial with
     the keyb's cable) that will be full transparent (meaning the system will
     not notest he's there) and will act like a (digital-parasite) recorder.
      
      So, every little shit a user type will be memorize by this BOX!
      
      I know! I know! U'r just thinking: this guy must be crazy, where the 
     hell will he get the enough memory to storage all the crap a user could 
     write?
     
     Suppose a user gets in the system. The DR (Digital Recorder) starts
     memorizing everything. But if after that he starts making a E-MAIL 
     writing the story of his life? 
      
      Well, has u can obviously understand there is not enough memory to 
     record all this crap in a single(or more) EEPROMS. I could use a hard 
     disk, put a controler, etc (one more computer?...,nah), but the size 
     would increase too much and therefore what was suppose to be small & 
     "low-profile-not-attracting-attention-BOX" would be notest by every 
     blind guy!

      So whats the solution? Simple...
      
      How about implementing a small infrared control to control the 
      recording?
      
      Do u see the advantages? The small BOX will only record the stuff u want
     , meaning he will only memorize the keyboard scan codes you wish...
      
      Exemple procceding:

          1 A inocente user comes and sit down a computer (terminal).
          
          2 At the same time u activate the BOX with your remote.

          3 The BOX starts recording the keyb scan codes the user produces by
             entering is name and the PASSWORD!
          
          4 The user gets in the system...
          
          5 ... while u calmly deactivate the BOX (again with your remote)

          6 If the BOX still has more memory than repete procceding n1 for 
             more users!

          7 If the BOX is already full! Go and pick her!
             At home with a little device or with this same BOX,u willbe able 
             to see the scan codes memorized on your computers screen & find 
             what you'r looking for (what could it be? eheheh).





        Got the picture? No? Then look at this:


       Ŀ                
                                YOUR REMOTE
         Suckers                      ^
         screen                       |
                   Infrared rays-       O
                       \ ( =/\  - YOU
     Ŀ                (    < > 
            -- ]--------------(
              ( 
               THE  
      --------[ BOX]
     :::::::::: :::           
     -                
                         
                                    


      Just one more thing! I'll try to use SMD (Surface Mounting Devices)
     technology to reduce space but this conponents are difficult (not 
     impossible) to get, but let's w8 & see, ok?

      I'll give u a call when finished...(year 2000??)



 7 Tricky programming style?:
 #############################

    Another fine solution is making a program that will act by the same 
    principle of this last one BOX, by recording the keyb scan codes in a 
    file (in background)!
     
    But, as i'm not a good programmer this would be a difficult  task 
    for me! And i don't even have the time (and i have a life, u know?)...
    
    But for u helythes guys of the programming scene this must be a piece of 
    cake, am i right?




 Well that's all folks!




     
     W88888888! There is still one more way of stealing the passwords...


  8 The cybertelecomunications hightech style?:
  ##############################################

     Is based on the basic principle of interception, but by indirect or 
     passive process. 
     
     This would be made by the analysing of the electromagnetic fields 
     variation produced on a keyboard cable (wire effect!)...

       ... but that's another story! (maybe nxt ESSENCE number?)



       Well, hope u enjoyed!
          
          Cya (maybe) nxt month...

       Fuck the mistyped words! :-)


                                               Cyertch '94

==============================================================================

                  --------->>> NET NEWS <<<--------

SHADOW Net ?!.. What tha fuck?!...  Well, ShadowNet is now longer ShadowNet...
We have discovered that an already existing ShadowNet was echoing, and, as
we respect others and expect respect in return, we decided to change the
net's name...  welcome ESSENCE Net guys...   we hope you have a lotta'fun
in our nodes.

A new node in USA is about to join us, this may still being a rumour, but
Software House is supposed to become our US HQ HUB.  If you're interested
in echoing us, push Software House's Co-Sysnav a little!  :-)

Why SURF GENERATiON is down ?!... Well, I suffered an HD 'fuck up' (thx to
WINDOWS, grunf!), and I've decided to put my place as a dedicated HUB (WHQ
HUB) for the net, so the pools will be efectuated more easly, and no more
BUSY messyes will be received by my Nodes and Hubs that called.

                               -----------------------------------------Ŀ
 Maybe this scheme will help   (eheh) Ŀ    ONLY ESSENCE Net    
 lamers to 'get the picture'    o      -----------     Hubs and Nodes can  |
 if this doesn't make things   /\     Net WHQ HUB     access to!          :
 clear, nothing will! eheh :-) < > \  (Dedicated)              Ŀ phone  
                                    |        ---- company
                               Kore/ Ŀ            (to the.
                                 --- ---       --------          World)
                                    ..  phone cable      ;-) :
                                 --[                        |
                                     ::::::::::: :::                       
                                                            
                               -----------------------------------------

We will not accept more nacional BOARDS  to enter the net (if you still think
that we might accept you, give it a try). Foreign guys, make your runs now! :-)

A conference in the Net is available to those who wish to participate on
the ESSENCE Magazine with articles and stuff like that. The name of the
conference is 'ESSENCE', feel free to leave mail on that confie to Kore.



ESSENCE Net - Join us today, for information, contact these guys:
              Kore, Chevy, Dark Snow, Asskicker or Young Devil. (in 351-zone)

WE ARE LOOKING FOR NEW NODES AND 'HQ HUBs'!  Hurry up!...


                                        Kore - WHQ HUB - 21:20001/0
                                                         .
                                                         :
               .                                       
               |                      .             ---
         :                                             
     --Ŀ----Ŀ--  --Ŀ--Ŀ'94   
      - -- -Ĵ --   :  -- -
 - - : --    : ÿ| | :   :     -NETWoRK-
    .:  Ŀ -- | -  | | : |   | -
    :| -- |-- : ---| :     --
    |--------  --------
                                                
----                                       
                  
    |
    :
    

==============================================================================

                        DKMAG01.ZIP - Seems OK!

I've read Dark Kingdom Magazine (issue #1) and I've liked it...   I'm
encouraging you guys to check it...  The dude as some points there...
Read his mag! He has some very important info about a VIRUS that is fucking
around spread on an H&P file!...  check it out!   8^D

I've detect some bugses... soooo,  I'll list'hem:

    - PNP has released more than 1 release.
    - NUKE has release some stuff as well.
    - IPPLC is not producing cause our programmers are now on
      exams and sort of.

                                        Greets: Dark Kingdom Sysnav
                                                thx for mentioning ESSENCE
                                                Magazine in yer 'Zine'! :-)
                                                (have fun pal)  :-)

==============================================================================

         ACDU0694.ZIP - Hummm... where are the ANSIs ?! Nice RIPs! :-)

(Ci) released another pack... this time it was weak on ANSis, and kicked
buts on RIP screens...   well, (Ci) dudes...  don't stop producing anseahs...
Ansis still kicking! Next time, try a pack bigger (more ansis & RIP screens)...


P.S.: check out the portuguese ansi artists: Asskicker and Slayer... they
kick some as well :-)

==============================================================================

                          TO BE RELEASED...

I've heard OUTPOST from Sierra is going to be released in the week of
"12/06/94 to 18/06/94"...  If you see that game, GET IT and PLAY IT!...
From what I've seen, that game is going to be one of the bests in '94.

Does anyone knows when is going to be released WING COMMANDER ARMADA?!
I've seen some "screen shot" GIFs that PNP released from that game, and
I've liked what I've seen... Completly AMAZING! Its going to have
Multiplayer Option, and the GFX are better than in 'Wing Commander
Privateer' or any other 'Wing Commander' I've ever seen!  :-)

==============================================================================

 - [Ed] Final note (before saying goodbye:
   Again, I'm sorry this issue was so small... sniff...  but WINDOWS fucked
   up my HD...   fucked up my partitions.. and I had to start it all
   over... Fuck any mystyped word...   We live to fuck anyway! :-)
   And remember:

   "The hacker is compared to Socrates. Seek the maximum knowledge.
    Find the BUG!    :-)"


 - Greets (alphabetic order):
        Asskicker    (the GFX dude?!  the GFX!   :-))
        Cebolas      (the MOD...  where's the MOD?!)  :-)
        Chevy        (ehhhh.. Colledge sux :-) I need that pack urgently!!!)
        CybetTech    (I don't know who you are, but, thx anyway!)  ;)
        Byte Swaper  (how's oPORTO? :))
        Dark Lizard  (thx for mentioning my 'zine' in yers)
        Dark Snow    (the critic!... Always useful...  well.. almost
                      always :-))
        Death's Law  (We now echo, huh?!)  ;-)
        Fackie       (so, when are you going to start kicking again?!) :-)
        Fido Dido    (what should I say to you?!...  Nice vodka :-)))
        Metamorph    (Burp :-), how's your babe ?!...  hope she's OK!)  ;)
        Satan        (hummm...  can you improve yer nice MOD again ?! ;-))
        Slayer       (Going to Algarve this summer holydays, again ?!)
        Sudden Death (Quasar is running fine huh?! 0 days rules!) 8-)
        TeknoPro     (Yeah... You're OK!...  l8er friend! :-))
        Young Devil  (last but least important! (ahahahh) kiddin'... have
                      fun chap!... :-) ...  How's the going pal?!)

        Special greets to ESSENCE crew!  8^D

                                         Kore (with the usual smile)  8^)

