Demon Roach Underground

Last updated

Demon Roach Underground (DRU) was a Lubbock, Texas based BBS that was popular in the "hacker" scene.

Contents

Grandmaster Ratte' was the SysOp of DRU, and the BBS was the "base system" for his group Cult of the Dead Cow, a computer hacker organization.

It ran from 1985 to 1999, though the name changed twice in its early existence. The original name of the BBS was "The Amazing Captain Neato (TACN) BBS." The name was then changed to "The Marauding C*A*M*E*L," before Ratte' changed the name for the final time to DRU.

The BBS ran GBBS software and was hosted on an Apple IIGS for its entire original lifetime.

Login

After connecting, the user was required to enter a certain word to be able to log into the BBS. Entries that would allow the user to enter the main DRU system included "THRASH" "GRUNGE" "CARCINOGEN" and "PIGFUCK".

The BBS required a new user password in order to gain access. The password was "VOID".

The DRU login screen displayed the following warning:

" Warning: This BBS may contain explicit descriptions of, or advocate one or more of the following: adultery, murder, morbid violence, bad grammar, deviant sexual conduct in violent contexts, or the consumption of alcohol and illegal drugs. But then again, it may not. Who knows?" This warning is now displayed on the cDc web site.

                                            ___     |\    ___   |\/|   /\      |            /___)   /\     ^      ___   |   |     | >  /___   |  |  <  >  |\ |           /  \    <  >   /_\    /      |___|     |/  /_____  |  |   \/   | \|         //    \\   \/   /   \  (_____  |   |                 |                                \                      |                         U   N   D   E   R   G   R   O   U   N   D                                          cDc                                      _   _                                     ((___))                                     [ x x ]                           cDc        \   /        cDc                                      (' ')                                       (U)                 '..and none but the Bovine survived the onslaught'                        -cDc-   CULT OF THE DEAD COW   -cDc-                                cDc communications                           -cDc-   BASE SYSTEM   -cDc-                           ---------------------------                                  HAVE A NICE DAY ----------------------- ------------ --------- -------- ------ ---- -- - - - -                              xXx  FUCK SHIT UP  xXx - -   - - - - -  -- --- ------- -------- ------------ ------------------------   ......82 megs............300/1200/2400 baud......86400 seconds per day.....     Prince of Monochrome    SysButthead           : Grandmaster Ratte' 
The Demon Roach Underground login screen

History

--Fetal commands       [] DEMON ROACH UNDERGROUND []  .______|_____________________|______.  |[C] Wail to chat :[D] Set display  |  |[F] Feed Ratte   :[I] Roach info   |  |[N] Roach news   :[O] Outta here...|  |[U] Fetus list   :[Y] Yo stats     |  |[Z] Nothing      :[@] Disclaimer   |  |  Check back in a day or so        |  |  for access                       |  |___________________________________| 
Demon Roach Underground menu

Related Research Articles

Keystroke logging Action of recording the keys struck on a keyboard

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.

Login spoofings are techniques used to steal a user's password. The user is presented with an ordinary looking login prompt for username and password, which is actually a malicious program under the control of the attacker. When the username and password are entered, this information is logged or in some way passed along to the attacker, breaching security.

passwd Tool to change passwords on Unix-like OSes

passwd is a command on Unix, Plan 9, Inferno, and most Unix-like operating systems used to change a user's password. The password entered by the user is run through a key derivation function to create a hashed version of the new password, which is saved. Only the hashed version is stored; the entered password is not saved for security reasons.

Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems.

X display manager

In the X Window System, an X display manager is a graphical login manager which starts a login session on an X server from the same or another computer.

Cult of the Dead Cow Hacker organization

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "Cult of the Dead Cow". New media are released first through the blog, which also features thoughts and opinions of the group's members.

Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. It is a common feature in identity management software and often bundled in the same software package as a password synchronization capability.

A trusted path or trusted channel is a mechanism that provides confidence that the user is communicating with what the user intended to communicate with, ensuring that attackers can't intercept or modify whatever information is being communicated.

Keychain (software)

Keychain is the password management system in macOS, developed by Apple. It was introduced with Mac OS 8.6, and has been included in all subsequent versions of the operating system, now known as macOS. A Keychain can contain various types of data: passwords, private keys, certificates, and secure notes.

A password manager is a computer program that allows users to store, generate, and manage their passwords for local applications and online services.

A Google Account is a user account that is required for access, authentication and authorization to certain online Google services. It is also often used as single sign on for third party services.

ASCII Express is a telecommunications program, written for the Apple II series of computers. At a time when the use of the bulletin board system (BBS), or even telecommunications in general wasn't a common use of the Apple II, ASCII Express was the choice among telecommunication users throughout much of the 1980s.

Registered user Signed-in or logged-in user

A registered user is a user of a website, program, or other system who has previously registered. Registered users normally provide some sort of credentials to the system in order to prove their identity: this is known as logging in. Systems intended for use by the general public often allow any user to register simply by selecting a register or sign up function and providing these credentials for the first time. Registered users may be granted privileges beyond those granted to unregistered users.

Login Process by which an individual gains access to a computer system

In computer security, logging in is the process by which an individual gains access to a computer system by identifying and authenticating themselves. The user credentials are typically some form of username and a matching password, and these credentials themselves are sometimes referred to as alogin. In practice, modern secure systems often require a second factor such as email or SMS confirmation for extra security. Social login allows a user to use existing user credentials from a social networking service to sign in to or create an account on a new website.

A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system. Operating systems lacking such features, such as DOS, Windows implementations prior to Windows NT, CP/M-80, and all Mac operating systems prior to Mac OS X, had only one category of user who was allowed to do anything. With separate execution contexts it is possible for multiple users to store private files, for multiple users to use a computer at the same time, to protect the system against malicious users, and to protect the system against malicious programs. The first multi-user secure system was Multics, which began development in the 1960s; it wasn't until UNIX, BSD, Linux, and NT in the late 80s and early 90s that multi-tasking security contexts were brought to x86 consumer machines.

GBBS is a bulletin board system (BBS) program for the Apple II. Its first series, named GBBS, was written in Applesoft and used by boards such as Demon Roach Underground in Lubbock, Texas Its successor, GBBS Pro, was ACOS-based. GBBS-Pro was used by boards like ProBOARD II in Paso Robles, California, Scotland Yard GBBS/AE Pro in Cincinnati, Ohio, No Earthly Connection in Blue Ridge, Georgia, and Apple Elite II in Riverside, California.

Multi-factor authentication Method of computer access control

Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence. MFA protects user data—which may include personal identification or financial assets—from being accessed by an unauthorised third party that may have been able to discover, for example, a single password.

Plover-NET, often misspelled Plovernet, was a popular bulletin board system in the early 1980s. Hosted in New York state and originally owned and operated by a teenage hacker who called himself Quasi-Moto, whom was a member of the short lived yet famed Fargo 4A phreak group. The popular bulletin board system attracted a large group of hackers, telephone phreaks, engineers, computer programmers, and other technophiles, at one point reaching over 600 users until LDX, a long distance phone company, began blocking all calls to its number (516-935-2481).

SpyEye is a malware program that attacks users running Google Chrome, Opera, Firefox and Internet Explorer on Microsoft Windows operating systems. This malware uses keystroke logging and form grabbing to steal user credentials for malicious use. SpyEye allows hackers to steal money from online bank accounts and initiate transactions even while valid users are logged into their bank account.