Use telnet on a mac to break through file security. V. 1.0 Written by SpoonMan on Feb 5, 1998 SpoonMan_@hempseed.com Most schools have a mac lab. But they are protected by programs such as OnGuard or Foolproof. They restrict copying files to the hard drive and programs can only be run from the hard drive. They also restrict access to the system folder. If you want to put something onto the hard drive, such as a keystroke logger, too bad, can't do it. But with a common program that no one would think to be harmful, it can be done. All you need to have on the machine is a telnet program, such as NCSA Telnet or BetterTelnet and stuffit expander, or somthing that can expand compressed files. What most people dont know about mac telnet clients is that it has a built in ftp server. In Better Telnet and NCSA telnet, it is under the Edit menu, FTP Server, in that panel, check the radio button from "ftp server off" to "ftp server on, no passwords needed". Now goto Edit FTP users, and change the default ftp directory to the hard drive. After you do this, the entire mac's hard drive is being served over ftp, you can upload anything to the mac, and you can go into restricted areas such as the system folder. Before you upload a mac program to it, you must compress it. Mac programs have two forks, the data fork and the resource fork. When you upload ftp, it only uploads the data fork. That's where stuffit expander comes in, lets say you stuffed the installer for a backdoor program such as WeeDo's RAE (Remote Administration Extension http://weedo.blackout.org), then you upload it to the target mac. After that, you must use stuffit expander to extract the file so you can run it. This technique can be used to transfer anything to the mac to be ran. Another good program you might want to have is ResEdit and Burn. Because you cannot delete the files you uploaded to the mac, you need someway to get rid of it. Burn is a good utility to completely erase any file. Or you can use resedit to make a file invisible so the admin cant see it. But if they do a careful search, they can find invisible files so be careful. This technique can be useful at public terminals such as at a library, where many people will use the computer. --SpoonMan--