About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

ZZZ


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING
------------------------------------------------------------------------
BY
REVELATION
LOA--ASH
------------------------------------------------------------------------
Written: 08/4/96 Volume: 1
------------------------------------------------------------------------

This document was written in Windows 95 Word Pad. The title
above, and some of the text looks a little screwed up when read in
anything else, so read it in Word Pad.

Anyway, for those of you who are wondering "what do the letters
"LOA" under his handle stand for?" Well, LOA stands for Legion
Of the Apocalypse, which is a group of elite hackers and phreakers
in my area. The current members of LOA are:

Revelation
Phreaked Out
Hack Attack
Electric Jaguar
Phreak Show
Logik Bomb

I started LOA when I discovered that there were many good hackers
and phreakers in my area. I thought that an organized group of
hackers and phreakers would accomplish much more than an
individual could by himself. Thus the Legion Of the Apocalypse
was formed and has been around for a while since. Our main goal is
to show the public what hacking and phreaking is all about and to
reveal confidential information to the hacking/phreaking
community so that we can learn more about computers, telephones,
electronics, etc. We are hoping to get our own World Wide Web
page soon, so keep an eye out for it. It will contain all of the
hacking, phreaking, computer, telephone, security, electronics,
virus, and carding information that you could possibly want.

Also, if some of you are wondering why I chose the word
Revelation as my handle, well, Revelation means revealing or
unveiling, which is exactly what I intend to do as a
hacker/phreaker. I intend to reveal all the information that I can
gather while hacking and phreaking.

Anyway, I wrote this document because I have read all the files that
I could get my hands on and noticed that there has never been a
really good file written that guided beginning hackers and
phreakers step by step.

When I began hacking and started reading all of the beginner files, I
still had many un-answered questions. My questions were
eventually answered, but only through LOTS of reading and
practice. In this file, I hope to give basic step by step instructions
that will help beginning hackers and phreakers get started. But, DO
NOT think that this will save you from having to read alot. If you
want to be a hacker/phreaker, reading is the most important thing
you can do. You will have to do ALOT of reading no matter what.

This document was intended for beginners, but it can also be used
as a reference tool for advanced hackers and phreakers.

Please distribute this document freely. Give it to anyone that you
know who is interested in hacking and/or phreaking. Post it on
your World Wide Web page, Ftp sites, and BBS's. Do whatever
you want with it as long as it stays UNCHANGED.

As far as I know, this is the most complete and in depth beginners
guide available, that is why I wrote it. Also, I plan to have new
volumes come out whenever there has been a significant change in
the material provided, so keep an eye out for them. LOA is
planning on starting an on-line magazine, so look for that too. And
we are also starting a hacking business. Owners of businesses can
hire us to hack into their systems to find the security faults. The
name of this company is A.S.H. (American Security Hackers), and
it is run by LOA. If you have any questions about this company, or
would like to hire us, or just want security advice, please E-Mail
A.S.H. at "[email protected]".

This document is divided into three main sections with many
different sub-sections in them. The Table Of Contents is below:

------------------------------------------------------------------------
Table Of Contents:
------------------------------------------------------------------------

1.HACKING
A. What is hacking? B. Why hack? C. Hacking rules D. Getting
started E. Where and how to start hacking F. Telenet commands
G. Telenet dialups H. Telenet DNIC's I. Telenet NUA's J. Basic
UNIX hacking K. Basic VAX/VMS hacking L. Basic PRIME
hacking M. Password list N. Connecting modems to different
phone lines O. Viruses, Trojans, and Worms
2.PHREAKING
A. What is phreaking? B. Why phreak? C. Phreaking rules D.
Where and how to start phreaking E. Boxes and what they do F.
Red Box plans G. Free calling from COCOT's H. ANAC numbers
3.REFERENCE
A. Hacking and phreaking W.W.W. pages B. Good hacking and
phreaking text files C. Hacking and phreaking Newsgroups D.
Rainbow Books E. Hacking and phreaking magazines F. Hacking
and phreaking movies G. Hacking and phreaking Gopher sites H.
Hacking and phreaking Ftp sites I. Hacking and phreaking BBS's
J. Cool hackers and phreakers K. Hacker's Manifesto L. Happy
hacking!

------------------------------------------------------------------------
* DISCLAIMER *
------------------------------------------------------------------------

"Use this information at your own risk. I Revelation, nor any other
member of LOA, nor the persons providing this file, will NOT
assume ANY responsibility for the use, misuse, or abuse, of the
information provided herein. The following information is provided
for educational purposes ONLY. The informaion is NOT to be used
for illegal purposes. By reading this file you ARE AGREEING to
the following terms:

I understand that using this information is illegal. I agree to, and
understand, that I am responsible for my own actions. If I get into
trouble using this information for the wrong reasons, I promise not
to place the blame on Revelation, LOA, or anyone that provided
this file. I understand that this information is for educational
purposes only. This file may be used to check your security systems
and if you would like a thorough check contact A.S.H.

This file is basically a compilation of known hacking and
phreaking information and some information gathered from my own
experience as a hacker/phreaker. I have tried to make sure that
everything excerpted from other documents was put in quotes and
labeled with the documents name, and if known, who wrote it. I am
sorry if any mistakes were made with quoted information."

*-Revelation-*
LOA

------------------------------------------------------------------------
I. HACKING
A. What is hacking?

Hacking is the act of penetrating computer systems to gain
knowledge about the system and how it works.

Hacking is illegal because we demand free access to ALL data, and
we get it. This pisses people off and we are outcasted from society,
and in order to stay out of prison, we must keep our status of being
a hacker/phreaker a secret. We can't discuss our findings with
anyone but other members of the hacking/phreaking community for
fear of being punished. We are punished for wanting to learn. Why
is the government spending huge amounts of time and money to
arrest hackers when there are other much more dangerous people
out there. It is the murderers, rapists, terrorists, kidnappers, and
burglers who should be punished for what they have done, not
hackers. We do NOT pose a threat to anyone. We are NOT out to
hurt people or there computers. I admit that there are some people
out there who call themselves hackers and who deliberately damage
computers. But these people are criminals, NOT hackers. I don't
care what the government says, we are NOT criminals. We are NOT
trying to alter or damage any system. This is widely misunderstood.
Maybe one day people will believe us when we say that all we want
is to learn.

There are only two ways to get rid of hackers and phreakers. One is
to get rid of computers and telephones, in which case we would
find other means of getting what we want.(Like that is really going
to happen.) The other way is to give us what we want, which is free
access to ALL information. Until one of those two things happen,
we are not going anywhere.

B. Why hack?

As said above, we hack to gain knowledge about systems and the
way they work. We do NOT want to damage systems in any way. If
you do damage a system, you WILL get caught. But, if you don't
damage anything, it is very unlikely that you will be noticed, let
alone be tracked down and arrested, which costs a considerable
amount of time and money.

Beginners should read all the files that they can get their hands on
about anything even remotely related to hacking and phreaking,
BEFORE they start hacking. I know it sounds stupid and boring
but it will definetly pay off in the future. The more you read about
hacking and phreaking, the more unlikely it is that you will get
caught. Some of the most useless pieces of information that you
read could turn out to be the most helpful. That is why you need to
read everything possible.

C. Hacking rules

1.Never damage any system. This will only get you into trouble.
2.Never alter any of the systems files, except for those needed to
insure that you are not detected, and those to insure that you have
access into that computer in the future. 3.Do not share any
information about your hacking projects with anyone but those
you'd trust with your life. 4.When posting on BBS's (Bulletin
Board Systems) be as vague as possible when describing your
current hacking projects. BBS's CAN be monitered by law
enforcement. 5.Never use anyone's real name or real phone number
when posting on a BBS. 6.Never leave your handle on any systems
that you hack in to. 7.DO NOT hack government computers.
8.Never speak about hacking projects over your home telephone
line. 9.Be paranoid. Keep all of your hacking materials in a safe
place. 10.To become a real hacker, you have to hack. You can't just
sit around reading text files and hanging out on BBS's. This is not
what hacking is all about.

D. Getting started

The very first thing you need to do is get a copy of PKZIP or some
other file unzipping utility. Nearly everything that you download
from the Internet or from a BBS will be zipped. A zipped file is a
file that has been compressed. Zipped files end with the extension
".zip".

Then you need to get yourself a good prefix scanner.(also known as
a War Dialer) This is a program that automatically dials phone
numbers beginning with the three numbers (prefix) that you
specify. It checks to see if the number dialed has a carrier.(series of
beeps that tells you that you have dialed a computer) Try and find a
large business area prefix to scan. It is these businesses that have
interesting computers. There are many good scanners out there, but
I would recommend Autoscan or A-Dial. These are very easy to use
and get the job done quickly and efficiently.

E. Where and how to start hacking

After you get yourself a good scanner, scan some prefixes and find
some cool dialups, then do the following: From your terminal, dial
the number you found. Then you should hear a series of beeps
(carrier) which tells you that you are connecting to a remote
computer. It should then say something like "CONNECT 9600"
and then identify the system that you are on. If nothing happens
after it says "CONNECT 9600" try hitting enter a few times. If you
get a bunch of garbage adjust your parity, data bits, stop bits, baud
rate, etc., until it becomes clear.

That is one way of connecting to a remote computer. Another way
is through Telenet or some other large network.

Telenet is a very large network that has many other networks and
remote computers connected to it.

Ok, here is how you would connect to a remote computer through
Telenet:

First, you get your local dialup(phone number) from the list that I
have provided in Section G. Then you dial the number from your
terminal and connect.(If you get a bunch of garbage try changing
your parity to odd and your data bits to 7, this should clear it up.) If
it just sits there hit enter and wait a few seconds, then hit enter
again. Then it will say "TERMINAL=" and you type in your
terminal emulation. If you don't know what it is just hit enter. Then
it will give you a prompt that looks like "@". From there you type
"c" and then the NUA (Network User Address) that you want to
connect to. After you connect to the NUA, the first thing you need
to do is find out what type of system you are on.(i.e. UNIX,
VAX/VMS, PRIME, etc.)

There are other things that you can do on Telenet besides
connecting to an NUA. Some of these commands and functions are
listed in the next section.

You can only connect to computers which accept reverse charging.
The only way you can connect to computers that don't accept
reverse charging is if you have a Telenet account. You can try
hacking these. To do this, at the "@" prompt type "access". It will
then ask you for your Telenet ID and password.

Telenet is probably the safest place to start hacking because of the
large numbers of calls that they get. Make sure you call during
business hours (late morning or early afternoon) so there are many
other people on-line.

F. Telenet commands

Here is a list of some Telenet commands and their functions. This
is only a partial list. Beginners probably won't use these commands,
but I put them here for reference anyway.


COMMANDFUNCTIONcConnect to a host.statShows network
port.fullNetwork echo.halfTerminal echo.telemailMail.(need ID
and password)mailMail.(need ID and password)setSelect PAD
parameterscontContinue.dDisconnect.hangupHangs
up.accessTelenet account.(ID and password)

G. Telenet dialups

Here is the list of all the Telenet dialups that I know of in the
U.S.A., including the city, state, and area code:


STATE,CITY:AREA CODE:NUMBER:AL, Anniston205236-
9711AL, Birmingham205328-2310AL, Decatur205355-0206AL,
Dothan205793-5034AL, Florence205767-7960AL,
Huntsville205539-2281AL, Mobile205432-1680AL,
Montgomery205269-0090AL, Tuscaloosa205752-1472AZ,
Phoenix602254-0244AZ, Tucson602747-0107AR,
Ft.Smith501782-2852AR, Little Rock501327-4616CA,
Bakersfield805327-8146CA, Chico916894-6882CA,
Colton714824-9000CA, Compton213516-1007CA,
Concord415827-3960CA, Escondido619741-7756CA,
Eureka707444-3091CA, Fresno209233-0961CA, Garden
Grove714898-9820CA, Glendale818507-0909CA,
Hayward415881-1382CA, Los Angeles213624-2251CA, Marina
Del Rey213306-2984CA, Merced209383-2557CA,
Modesto209576-2852CA, Montery408646-9092CA,
Norwalk213404-2237CA, Oakland415836-4911CA,
Oceanside619430-0613CA, Palo Alto415856-9995CA,
Pomona714626-1284CA, Sacramento916448-6262CA,
Salinas408443-4940CA, San Carlos415591-0726CA, San
Diego619233-0233CA, San Francisco415956-5777CA, San
Jose408294-9119CA, San Pedro213548-6141CA, San
Rafael415472-5360CA, San Ramon415829-6705CA, Santa
Ana714558-7078CA, Santa Barbara805682-5361CA, Santa
Cruz408429-6937CA, Santa Rosa707656-6760CA,
Stockton209957-7610CA, Thousand Oaks805495-3588CA,
Vallejo415724-4200CA, Ventura805656-6760CA, Visalia209627-
1201CA, West Covina818915-5151CA, Woodland Hills818887-
3160CO, Colorado719635-5361CO, Denver303337-6060CO, Ft.
Collins303493-9131CO, Grand Junction303241-3004CO,
Greeley303352-8563CO, Pueblo719542-4053CT,
Bridgeport203335-5055CT, Danbury203794-9075CT,
Hartford203247-9479CT, Middletown203344-8217CT, New
Britain203225-7027CT, New Haven203624-5954CT, New
London203447-8455CT, Norwalk203866-7404CT,
Stamford203348-0787CT, Waterbury203753-4512DE,
Dover302678-8328DE, Newark302454-7710DC,
Washington202429-7896DC, Washington202429-7800FL, Boca
Raton407338-3701FL, Cape Coral813275-7924FL, Cocoa
Beach407267-0800FL, Daytona Beach904255-2629FL, Ft.
Lauderdale305764-4505FL, Gainsville904338-0220FL,
Jacksonville904353-1818FL, Lakeland813683-5461FL,
Melbourne407242-8247FL, Miami305372-0230FL,
Naples813263-3033FL, Ocala904351-3790FL, Orlando407422-
4099FL, Pensacola904432-1335FL, Pompano Beach305941-
5445FL, St. Petersburg813323-4026FL, Sarasota813923-4563FL,
Tallahassee904681-1902FL, Tampa813224-9920FL, West Palm
Beach407833-6691GA, Albany912888-3011GA, Athens404548-
5590GA, Atlanta404523-0834GA, Augusta404724-2752GA,
Colombus404571-0556GA, Macon912743-8844GA,
Rome404234-1428GA, Savannah912236-2605HI, Oahu808528-
0200ID, Boise208343-0611ID, Idaho Falls208529-0406ID,
Lewiston208743-0099ID, Pocatella208232-1764IL,
Aurora312896-0620IL, Bloomington309827-7000IL,
Chicago312938-0600IL, Decatur217429-0235IL, Dekalb815758-
2623IL, Joliet815726-0070IL, Peoria309637-8570IL,
Rockford815965-0400IL, Springfield217753-1373IL,
Urbana217384-6428IN, Bloomington812332-1344IN,
Evansville812424-7693IN, Ft. Wayne219426-2268IN,
Gary219882-8800IN, Indianapolis317299-0024IN,
Kokomo317455-2460IN, Lafayette317742-6000IN,
Muncie317282-6418IN, South Bend219233-7104IN, Terre
Haute812232-5329IA, Ames515233-6300IA, Cedar
Rapids319364-0911IA, Davenport319324-2445IA, Des
Moines515288-4403IA, Dubuque319556-0783IA, Iowa City
319351-1421IA, Sioux City712255-1545IA, Waterloo319232-
5441KS, Lawrence913843-8124KS, Manhattan913537-0948KS,
Salina913825-7900KS, Topeka913233-9880KS, Wichita316262-
5669KY, Bowling Green502782-7941KY, Frankfort502875-
4654KY, Lexington606233-0312KY, Louisville502589-5580KY,
Owensboro502686-8107LA, Alexandria318445-1053LA, Baton
Rouge504343-0753LA, Lafayette318233-0002LA, Lake
Charles318436-0518LA, Monroe318387-6330LA, New Orleans
504 524-4094 LA, Shreveport 318 221-5833 ME, Augusta 207
622-3123 ME, Brewer 207 989-3081 ME, Lewiston 207 784-0105
ME, Portland 207 761-4000 MD, Annapolis 301 224-8550 MD,
Baltimore 301 727-6060 MD, Frederick 301 293-9596 MA,
Boston 617 292-0662 MA, Brockton 508 580-0721 MA, Fall
River 508 677-4477 MA, Framingham 508 879-6798 MA,
Lawrence 508 975-2273 MA, Lexington 617 863-1550 MA,
Lowell 508 937-5214 MA, New Bedford 508 999-2915 MA,
Northampton 413 586-0510 MA, Pittsfield 413 499-7741 MA,
Salem 508 744-1559 MA, Springfield 413 781-3811 MA, Woods
Hole 508 540-7500 MA, Worcester 508 755-4740 MI, Ann Arbor
313 996-5995 MI, Battle Creek 616 968-0929 MI, Detroit 313
964-2988 MI, Flint 313 235-8517 MI, Grand Rapids 616 774-0966
MI, Jackson 517 782-8111 MI, Kalamazoo 616 345-3088 MI,
Lansing 517 484-0062 MI, Midland 517 832-7068 MI, Muskegon
616 726-5723 MI, Pontiac 313 332-5120 MI, Port Huron 313 982-
8364 MI, Saginaw 517 790-5166 MI, Southfield 313 827-4710 MI,
Traverse City 616 946-2121 MI, Warren 313 575-9152 MN,
Duluth 218 722-1719 MN, Mankato 517 388-3780 MN,
Minneapolis 612 341-2459 MN, Rochester 507 282-5917 MN, St.
Cloud 612 253-2064 MS, Gulfport 601 863-0024 MS, Jackson
601 969-0036 MS, Meridian 601 482-2210 MS, Starkville 601
324-2155 MO, Columbia 314 449-4404 MO, Jefferson City 314
634-5178 MO, Kansas City 816 221-9900 MO, St. Joseph 816
279-4797 MO, St. Louis 314 421-4990 MO, Springfield 417 864-
4814 MT, Billings 406 245-7649 MT, Great Falls 406 771-0067
MT, Helena 406 443-0000 MT, Missoula 406 721-5900 NE,
Lincoln 402 475-4964 NE, Omaha 402 341-7733 NV, Las Vegas
702 737-6861 NV, Reno 702 827-6900 NH, Concord 603 224-
1024 NH, Durham 603 868-2924 NH, Manchester 603 627-8725
NH, Nashua 603 880-6241 NH, Portsmouth 603 431-2302 NJ,
Atlantic City 609 348-0561 NJ, Freehold 201 780-5030 NJ,
Hackensack 201 488-6567 NJ, Marlton 609 596-1500 NJ,
Merchantville 609 663-9297 NJ, Morristown 201 455-0275 NJ,
New Brunswick 201 745-2900 NJ, Newark 201 623-0469 NJ,
Passaic 201 778-5600 NJ, Paterson 201 684-7560 NJ, Princeton
609 799-5587 NJ, Rahway 201 815-1885 NJ, Redbank 201 571-
0003 NJ, Roseland 201 227-5277 NJ, Sayreville 201 525-9507 NJ,
Trenton 609 989-8847 NM, Albuquerque 505 243-4479 NM, Las
Cruces 505 526-9191 NM, Santa Fe 505 473-3403 NY, Albany
518 465-8444 NY, Binghampton 607 772-6642 NY, Buffalo 716
847-1440 NY, Dear Park 516 667-5566 NY, Hempstead 516 292-
3800 NY, Ithaca 607 277-2142 NY, New York City 212 741-8100
NY, New York City 212 620-6000 NY, Plattsburgh 518 562-1890
NY, Poughkeepsie 914 473-2240 NY, Rochester 716 454-1020
NY, Syracuse 315 472-5583 NY, Utica 315 797-0920 NY, Whit
Plains 914 328-9199 NC, Asheville 704 252-9134 NC, Charlotte
704 332-3131 NC, Fayetteville 919 323-8165 NC, Gastonia 704
865-4708 NC, Greensboro 919 273-2851 NC, High Point 919 889-
7494 NC, North Wilkesboro 919 838-9034 NC, Raleigh 919 834-
8254 NC, Res Tri Park 919 549-8139 NC, Tarboro 919 823-0579
NC, Wilmington 919 763-8313 NC, Winston-Salem 919 725-2126
ND, Fargo 701 235-7717 ND, Grand Forks 701 775-7813 ND,
Mandan 701 663-2256 OH, Canton 216 452-0903 OH, Cincinnati
513 579-0390 OH, Cleveland 216 575-1658 OH, Colombus 614
463-9340 OH, Dayton 513 461-5254 OH, Elyria 216 323-5059
OH, Hamilton 513 863-4116 OH, Kent 216 678-5115 OH, Lorain
216 960-1170 OH, Mansfield 419 526-0686 OH, Sandusky 419
627-0050 OH, Springfield 513 324-1520 OH, Toledo 419 255-
7881 OH, Warren 216 394-0041 OH, Wooster 216 264-8920 OH,
Youngstown 216 743-1296 OK, Bartlesville 918 336-3675 OK,
Lawton 405 353-0333 OK, Oklahoma City 405 232-4546 OK,
Stillwater 405 624-1113 OK, Tulsa 918 584-3247 OR, Corvallis
503 754-9273 OR, Eugena 503 683-1460 OR, Hood River 503
386-4405 OR, Klamath Falls 503 882-6282 OR, Medford 503 779-
6343 OR, Portland 503 295-3028 OR, Salem 503 378-7712 PA,
Allentown 215 435-3330 PA, Altoona 814 949-0310 PA, Carlisle
717 249-9311 PA, Danville 717 271-0102 PA, Erie 814 899-2241
PA, Harrisburg 717 236-6882 PA, Johnstown 814 535-7576 PA,
King Of Prussia 215 337-4300 PA, Lancaster 717 295-5405 PA,
Philadelphia 215 574-9462 PA, Pittsburgh 412 288-9950 PA,
Reading 215 376-8750 PA, Scranton 717 961-5321 PA, State
College 814 231-1510 PA, Wilkes-Barre 717 829-3108 PA,
Williamsport 717 494-1796 PA, York 717 846-6550 RI,
Providence 401 751-7910 SC, Charleston 803 722-4303 SC,
Columbia 803 254-0695 SC, Greenville 803 233-3486 SC,
Spartenburg 803 585-1637 SD, Pierre 605 224-0481 SD, Rapid
City 605 348-2621 SD, Sioux Falls 605 336-8593 TN, Bristol 615
968-1130 TN, Chattanooga 615 756-1161 TN, Clarksville 615
552-0032 TN, Johnson City 615 282-6645 TN, Knoxville 615 525-
5500 TN, Memphis 901 521-0215 TN, Nashville 615 244-3702
TN, Oak Ridge 615 481-3590 TX, Abilene 915 676-9151 TX,
Amarillo 806 373-0458 TX, Athens 214 677-1712 TX, Austin 512
928-1130 TX, Brownsville 512 542-0367 TX, Bryan 409 822-0159
TX, Corpus Christi 512 884-9030 TX, Dallas 214 748-6371 TX,
El Paso 915 532-7907 TX, Ft. Worth 817 332-4307 TX, Galveston
409 762-4382 TX, Houston 713 227-1018 TX, Laredo 512 724-
1791 TX, Longview 214 236-4205 TX, Lubbock 806 747-4121
TX, Mcallen 512 686-5360 TX, Midland 915 561-9811 TX,
Nederland 409 722-3720 TX, San Angelo 915 944-7612 TX, San
Antonio 512 225-8004 TX, Sherman 214 893-4995 TX, Temple
817 773-9723 TX, Tyler 214 597-8925 TX, Waco 817 752-9743
TX, Wichita Falls 817 322-3774 UT, Ogden 801 627-1630 UT,
Provo 801 373-0542 UT, Salt Lake City 801 359-0149 VT,
Burlington 802 864-0808 VT, Montpelier 802 229-4966 VT,
Rutland 802 775-1676 VT, White River Jct. 802 295-7631 VA,
Blacksburg 703 552-9181 VA, Charlottesville 804 977-5330 A,
Covington 703 962-2217 VA, Fredericksburg 703 371-0188 VA,
Harrisonburg 703 434-7121 VA, Herndon 703 435-1800 VA,
Lynchburg 804 845-0010 VA, Newport News 804 596-6600 VA,
Norfolk 804 625-1186 VA, Richmond 804 788-9902 VA, Roanoke
703 344-2036 WA, Auburn 206 939-9982 WA, Bellingham 206
733-2720 WA, Everett 206 775-9929 WA, Longview 206 577-
5835 WA, Olympia 206 754-0460 WA, Richland 509 943-0649
WA, Seattle 206 625-9612 WA, Spokane 509 455-4071 WA,
Tacoma 206 627-1791 WA, Vancouver 206 693-6914 WA,
Wenatchee 509 663-6227 WA, Yakima 509 575-1060 WV,
Charleston 304 343-6471 WV, Huntington 304 523-2802 WV,
Morgantown 304 292-0104 WV, Wheeling 304 233-7732 WI,
Beloit 608 362-5287 WI, Eau Claire 715 836-9295 WI, Green Bay
414 432-2815 WI, Kenosha 414 552-9242 WI, La Crosse 608 784-
0560 WI, Madison 608 257-5010 WI, Milwaukee 414 271-3914
WI, Neenah 414 722-7636 WI, Racine 414 632-6166 WI,
Sheboygan 414 452-3995 WI, Wausau 715 845-9584 WI, West
Bend 414 334-2206 WY, Casper 307 265-5167 WY, Cheyenne
307 638-4421 WY, Laramie 307 721-5878

H. Telenet DNIC's

Here is the list of all the Telenet DNIC's. These will be defined and
explained in the next section:


DNIC: NETWORK: 02041 Datanet-1 02062 DCS 02080 Transpac
02284 Telepac (Switzerland) 02322 Datex-P (Austria) 02392
Radaus 02342 PSS 02382 Datapak (Denmark) 02402 Datapak
(Sweden) 02405 Telepak 02442 Finpak 02624 Datex-P (West
Germany) 02704 Luxpac 02724 Eirpak 03020 Datapac 03028
Infogram 03103 ITT/UDTS (U.S.A.) 03106 Tymnet 03110 Telenet
03340 Telepac (Mexico) 03400 UDTS (Curacau) 04251 Isranet
04401 DDX-P 04408 Venus-P 04501 Dacom-Net 04542 Intelpak
05052 Austpac 05053 Midas 05252 Telepac (Hong Kong) 05301
Pacnet 06550 Saponet 07240 Interdata 07241 Renpac 07421
Dompac 09000 Dialnet

I. Telenet NUA's

Here is a list of a few Telenet NUA's and what type of system they
are. But first, this is how an NUA is put together:

The DNIC says which network connected to Telenet you are using.
The area code is the area code for the area that the NUA is in. And
the NUA is the address of the computer on Telenet. Please note that
an NUA does NOT have to be in your area code for you to connect
to it.

There are two ways of finding useful NUA's. The first way is to get
or write an NUA scanning program. The second way is to get a
copy of the Legion Of Doom's Telenet Directory.( Volume 4 of the
LOD Technical Journals)

Now, here is the list. Remember that these are only a few NUA's.
These are NOT all of the Telenet NUA's. All of these NUA's DO
accept reverse charging. Also, please note that all of these may not
be working by the time you read this and that network congestion
frequently makes an NUA inaccessible for a short period of time.


NUA: SYSTEM TYPE: 031102010022500 VAX
031102010015600 UNIX 031102010022000 VAX
031102010025900 UNIX 031102010046100 VAX
031102010025200 PRIME 031102010046100 VAX
031102010052200 VAX 031102020001000 PRIME
031102020013200 VAX 031102020014100 PRIME
031102020014200 PRIME 031102020015000 VAX
031102020016100 UNIX 031102020021400 PRIME
031102020024500 AOS 031102020030800 PRIME
031102020030900 PRIME 031102020031200 PRIME
031102020033600 VAX 031102020033700 VAX
031102020034300 PRIME 031102020036000 HP-3000
031102030007500 VAX 031102030002200 VM/370
031102030013600 PRIME 031102060003200 HP-3000
031102060044000 VAX 031102060044900 NOS
031102060044700 VM/370 031102120003900 NOS
031102120015200 PRIME 031102120026600 VAX
031102120026300 VAX 031102120026700 UNIX
031102120044900 UNIX 031102120053900 VOS
031102140024000 VAX

J. Basic UNIX hacking

UNIX is probably the most commonly used operating system on
Telenet, and is the easiest to hack since it doesn't record bad login
attempts. You know you've found a UNIX system when it gives you
a "Login" prompt, and then a "Password" prompt. To get in you
should first try the default logins.(Listed below.) If these don't
work try some of the passwords listed in Section M. If these don't
work try to find backdoors. These are passwords that may have
been put in to allow the programmer (or someone else who could be
in a position to make a backdoor) to get access into the system.
These are usually not known about by anyone but the individual
who made it. Try doing some research on the programmer and other
people who helped to make the system. And, if these don't work,
just try guessing them. The Login (usually the account holders
name) has 1-8 characters and the Password is 6-8 characters. Both
can be either letters or numbers, or a combination of the two.

Once you get in, you should get a "$" prompt, or some other special
character like it. You should only use lower case letters when
hacking UNIX, this seems to be standard format. If you type "man
[command]" at the prompt, it should list all of the commands for
that system. Anyway, here are the default Logins and Passwords:


Login: Password: root root root system sys sys sys system daemon
daemon uucp uucp tty tty test test unix unix unix test bin bin adm
adm adm admin admin adm admin admin sysman sysman sysman
sys sysman system sysadmin sysadmin sysadmin sys sysadmin
system sysadmin admin sysadmin adm who who learn learn uuhost
uuhost guest guest host host nuucp nuucp rje rje games games
games player sysop sysop root sysop demo demo



Once you are in, the first thing that you need to do is save the
password file to your hard drive or to a disk. The password file
contains the Logins and Passwords. The passwords are encoded. To
get the UNIX password file, depending on what type of UNIX you
are in, you can type one of the following things:

/etc/passwd
or
cat /etc/passwd


The first one is the standard command, but there are other
commands as well, like the second one. Once you get the password
file, it should look like this:

john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john

Broken down, this is what the above password file states:

Username: john
Encrypted Password: 234abc56
User Number: 9999
Group Number: 13
Other Information: John Johnson
Home Directory: /home/dir/john
Shell: /bin/john

If the password file does not show up under one of the above two
commands, then it is probably shadowed. The following definition
of password shadowing was taken from the alt.2600 hack faq:

"Password shadowing is a security system where the encrypted
password field is replaced with a special token and the encrypted
password is stored in a seperate file which is not readable by
normal system users."

If the password file is shadowed, you can find it in one of the
following places, depending on the type of UNIX you are using:


UNIX System Type: Path: Token: AIX 3 /etc/security/passwd !
A/UX 3.Os /tcb/files/auth/* BSD4.3-Reno /etc/master.passwd *
ConvexOS 10 /etc/shadpw * Convex0S 11 /etc/shadow * DG/UX
/etc/tcb/aa/user * EP/IX /etc/shadow x HP-UX /.secure/etc/passwd
* IRIX 5 /etc/shadow x Linux 1.1 /etc/shadow * OSF/1
/etc/passwd[.dir|.pag] * SCO UNIX #.2.x /tcb/auth/files/(first letter
of username)/(username) * SunOS 4.1+c2
/etc/security/passwd.adjunct ## SunOS 5.0 /etc/shadow System V
4.0 /etc/shadow x System V 4.2 /etc/security/* database Ultrix 4
/etc/auth[.dir|.pag] * UNICOS /etc/udb *



Some passwords can only be used for a certain amount of time
without having to be changed, this is called password aging. In the
password file example below, the "C.a4" is the password aging
data:

bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob

The characters in the password aging data stand for the following:

1. Maximum number of weeks a password can be used without
changing.
2. Minimum number of weeks a password must be used before
being changed.
3&4. Last time password was changed, in number of weeks since
1970.

The password aging data can be decoded using the chart below:


Character: Number: . 0 / 1 0 2 1 3 2 4 3 5 4 6 5 7 6 8 7 9 8 10 9 11
A 12 B 13 C 14 D 15 E 16 F 17 G 18 H 19 I 20 J 21 K 22 L 23 M
24 N 25 O 26 P 27 Q 28 R 29 S 30 T 31 U 32 V 33 W 34 X 35 Y
36 Z 37 a 38 b 39 c 40 d 41 e 42 f 43 g 44 h 45 i 46 j 47 k 48 l 49
m 50 n 51 o 52 p 53 q 54 r 55 s 56 t 57 u 58 v 59 w 60 x 61 y 62 z
63

Now, explore the system freely, be careful, and have fun!

K. Basic VAX/VMS hacking

The VAX system runs the VMS (Virtual Memory System)
operating system. You know that you have a VAX system when
you get a "username" prompt. Type in capital letters, this seems to
be standard on VAX's. Type "HELP" and it gives you all of the help
that you could possibly want. Here are the default usernames and
passwords for VAX's:


Username: Password: SYSTEM OPERATOR SYSTEM
MANAGER SYSTEM SYSTEM SYSTEM SYSLIB OPERATOR
OPERATOR SYSTEST UETP SYSTEST SYSTEST SYSTEST
TEST SYSMAINT SYSMAINT SYSMAINT SERVICE
SYSMAINT DIGITAL FIELD FIELD FIELD SERVICE GUEST
GUEST GUEST unpassworded DEMO DEMO DEMO
unpassworded TEST TEST DECNET DECNET



Here are some of the VAX/VMS commands:



Command: Function: HELP (H) Gives help and list of commands.
TYPE (T) View contents of a file. RENAME (REN) Change name
of a file. PURGE (PU) Deletes old versions of a file. PRINT (PR)
Prints a file. DIRECTORY (DIR) Shows list of files.
DIFFERENCES (DIF) Shows differences between files. CREATE
(CR) Creates a file. DELETE (DEL) Deletes a file. COPY (COP)
Copy a file to another. CONTINUE (C) Continues session.



The password file on VAX's are available when you type in the
command:

SYS$SYSTEM:SYSUAF.DAT


The password file on most VAX's are usually not available to
normal system users, but try it anyway. If the default logins don't
work, use the same means of finding one as stated in Section J.

Be VERY careful when hacking VAX's becuase they record every
bad login attempt. They are sometimes considered one of the most
secure systems. Because of this, I advise not to try hacking these
until you are more advanced.

But, when you are an advanced hacker, or if you are already an
advanced hacker, I advise that you try a few passwords at a time and
then wait and try a few more the next day and so on, because when
the real user logs on it displays all of the bad login attempts.

L. Basic PRIME hacking

PRIME computer systems greet you with "Primecon 18.23.05", or
something like it, when you connect. You should type in capital
letters on this system, too. Once you connect, it will usually just sit
there. If this happens, type "LOGIN [USERNAME]". It should then
ask you for your username and password. The default usernames
and passwords are listed below:


Username: Password: PRIME PRIME PRIME PRIMOS PRIMOS
PRIMOS PRIMOS PRIME PRIMOS_CS PRIME PRIMOS_CS
PRIMOS PRIMENET PRIMENET SYSTEM SYSTEM SYSTEM
PRIME SYSTEM PRIMOS NETLINK NETLINK TEST TEST
GUEST GUEST GUEST1 GUEST



When you are inside the system, type "NETLINK" and it ahould
give you alot of help. This system uses NUA's, too. I might print
these in the next volume.

M. Password List

The password list was taken from A Novice's Guide To Hacking, by
The Legion Of Doom, and from some of my own discoveries. Here
is the list of commonly used passwords:

Password:
aaa
academia
ada
adrian
aerobics
airplane
albany
albatross
albert
alex
alexander
algebra
alias
alisa
alpha
alphabet
ama
amy
analog
anchor
andy
andrea
animal
answer
anything
arrow
arthur
ass
asshole
athena
atmosphere
bacchus
badass
bailey
banana
bandit
banks
bass
batman
beautiful
beauty
beaver
daniel
danny
dave
deb
debbie
deborah
december
desire
desperate
develop
diet
digital
discovery
disney
dog
drought
duncan
easy
eatme
edges
edwin
egghead
eileen
einstein
elephant
elizabeth
ellen
emerald
engine
engineer
enterprise
enzyme
euclid
evelyn
extension
fairway
felicia
fender
finite
format
god
hello
idiot
jester
john
johnny
joseph
joshua
judith
juggle
julia
kathleen
kermit
kernel
knight
lambda
larry
lazarus
lee
leroy
lewis
light
lisa
louis
love
lynne
mac
macintosh
mack
maggot
magic
malcolm
mark
markus
martin
marty
marvin
matt
master
maurice
maximum
merlin
mets
michael
michelle
mike
minimum
nicki
nicole
rascal
really
rebecca
remote
rick
reagan
robot
robotics
rolex
ronald
rose
rosebud
rosemary
roses
ruben
rules
ruth
sal
saxon
scheme
scott
secret
sensor
serenity
sex
shark
sharon
shit
shiva
shuttle
simon
simple
singer
single
singing
smile
smooch
smother
snatch
snoopy
soap
socrates
spit
spring
subway
success
summer
super
support
surfer
suzanne
tangerine
tape
target
taylor
telephone
temptation
tiger
tigger
toggle
tomato
toyota
trivial
unhappy
unicorn
unknown
urchin
utility
vicki
virgin
virginia
warren
water
weenie
whatnot
whitney
will
william
winston
willie
wizard
wonbat
yosemite
zap

N. Connecting modems to different phone lines

Ok, if you are really paranoid (or smart) and you don't want to hack
from your house for fear of getting caught, you can hook up your
modem to other peoples phone lines or to payphones.

If you want to hook your modem to a payphone, do it late at night
and at a very secluded payphone. Look along either side of the
phone. You should see a small metal tube (which contains the
telephone wires) running along the wall. Somewhere along the tube
it should widen out into a small box. Pop off the boxes lid and
there is a nice little phone jack for ya'. Taking off the lid may be
difficult because they are usually pretty secure, but nothing is
impossible, so keep trying. Of course, you can only do this with a
lap-top computer.

Now, if you want to hook up the modem to someone's house or
appartment phone line, you need to get a pair of red and green
alligator clips, and an extra modem cord for your lap-top.

After you get those parts, cut the plastic end off of your modem
cord and you will see a red wire, a green wire, and two other wires,
but you can ignore those. Attach the red alligator clip to the red
wire, and attach the green alligator clip to the green wire and you're
all set. Now all you need to do is go find a telephone pole or one of
those small green boxes that stick out of the ground.(They should
have a Bell Systems logo on them.)

On a telephone pole open the little box that has a bunch of wires
going to and from it. On the right side of the box you should see
what look like two large screws.(These are called "terminals".) One
should have a red wire wrapped around it and the other should have
a green wire wrapped around it. Attach the red alligator clip the the
red wire and the green alligator clip to the green wire, and you're all
set. This should get you a dial tone. If it doesn't, make sure that the
alligator clips are not touching each other, and that the alligator
clips are attached to the exposed end of the wire.

Now, on those green boxes you need to undo all of the screws and
shit holding the lid on, and open it up. Then you should find
basically the same setup as in the telephone pole. Attach the
appropriate wires to the appropriate terminals and you are all set.

This process can also be used to hook up a Beige Box (Lineman's
Handset.) when phreaking.

O. Viruses, Trojans, and Worms

Just in case some of you are interested, here are the definitions for
Viruses, Trojans, and Worms. These definitions were taken from
the alt.2600 hack faq.

Trojan:

"Remember the Trojan Horse? Bad guys hid inside it until they
could get into the city to do their evil deed. A Trojan computer
program is similiar. It is a program which does an unauthorized
function, hidden inside an authorized program. It does something
other than it claims to do, usually something malicious (although
not necessarily!), and it is intended by the author to do whatever it
does. If it is not intentional, it is called a bug or, in some cases, a
feature :) Some Virus scanning programs detect some Trojans.
Some scanning programs don't detect any Trojans. No Virus
scanners detect all Trojans."

Virus:

"A Virus is an independent program which reproduces itself. It may
attach itself to other programs, it may create copies of itself (as in
companion Viruses). It may damage or corrupt data, change data, or
degrade the performance of your system by utilizing resources such
as memory or disk space. Some Viruse scanners detect some
Viruses. No Virus scanners detect all Viruses. No Virus scanner
can protect against any and all Viruses, known and unknown, now
and forevermore."

Worm:

"Made famous by Robert Morris, Jr., Worms are programs which
reproduce by copying themselves over and over, system to system,
using up resources and sometimes slowing down the system. They
are self contained and use the networks to spread, in much the same
way that Viruses use files to spread. Some people say the solution
to Viruses and worms is to just not have any files or networks.
They are probably correct. We could include computers."


II. PHREAKING


A. What is phreaking

Phreaking is basically hacking with a telephone. Using different
"boxes" and "tricks" to manipulate the phone companies and their
phones, you gain many things, two of which are: knowledge about
telephones and how they work, and free local and long distance
phone calls. In the following sections, you will learn some about
boxes, what they are, and how they work. You will also learn about
the other forms of phreaking.

B. Why phreak?

Phreaking, like hacking, is used to gather information about
telephones, telephone companies, and how they work. There are
other benefits as well. As stated above, you also get free phone
calls. But, these are used mainly to gather more information about
the phones, and to allow us free access to all information.

C. Phreaking rules

Most of the same rules apply for hacking and phreaking, so I will
only list a few here.


1.Never box over your home phone line. 2.You should never talk
about phreaking projects over your home phone line. 3.Never use
your real name when phreaking. 4.Never leave phreaking materials
out in the open. Keep them in a safe place. 5.Don't get caught.

D. Where and how to start phreaking

Well, you can phreak on any telephone, but as stated above, it is
very stupid to do so on your home phone line.

First you need you need to construct the boxes needed for what you
want to do. All of the boxes and their descriptions are listed in the
next section. Most of the boxes are very easy to make, but if your
not into making shit, there are usually alternative ways of making
them.

E. Boxes and what they do

Box: Description: Red Box generates tones for free phone calls
Black Box when called, caller pays nothing Beige Box lineman's
handset Green Box generates coin return tones Cheese Box turns
your phone into a payphone Acrylic Box steal 3-way calling and
other services Aqua Box stops F.B.I. lock-in-trace Blast Box phone
microphone amplifier Blotto Box shorts out all phones in your area
Blue Box generates 2600hz tone Brown Box creates party line Bud
Box tap neighbors phone Chatreuse Box use electricity from phone
Chrome Box manipulates traffic signals Clear Box free calls Color
Box phone conversation recorder Copper Box causes crosstalk
interference Crimson Box hold button Dark Box re-route calls
Dayglo Box connect to neighbors phone line Divertor Box re-route
calls DLOC Box create party line Gold Box dialout router Infinity
Box remote activated phone tap Jack Box touch-tone key pad Light
Box in-use light Lunch Box AM transmitter Magenta Box connect
remote phone line to another Mauve Box phone tap without cutting
into the line Neon Box external microphone Noise Box creates line
noise Olive Box external ringer Party Box creates party line Pearl
Box tone generator Pink Box creates party line Purple Box hold
button Rainbow Box kill trace Razz Box tap neighbors phone
Rock Box add music to phone line Scarlet Box causes interference
Silver Box create DTMF tones for A,B,C, and D Static Box raises
voltage on phone line Switch Box add services Tan Box phone
conversation recorder TV Cable Box see sound waves on TV Urine
Box create disturbance on phone headset Violet Box stop
payphone from hanging up White Box DTMF key pad Yellow Box
add line extension

F. Box Plans

The Red Box is the main tool that you will use so I have included
the Red Box plans. The other box plans can be downloaded from
the Internet.

Red Box:

There are two ways that you can make a Red Box:

One is to go to Radio Shack and buy a tone dialer and a
6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you
can order them from the electronics companies that I have listed at
the end of this section.) Open up the tone dialer and replace the
existing crystal (big, shiny, metal thing labeled "3.579545Mhz")
with the 6.5536Mhz crystal. Now, close it up. You have a red box.

To use it for long distance calls play the tones that add up to the
amount of money that the operator requests. For a 25 cents tone
press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press
1 *.

And, the second way, which is a much easier method, is to get the
Red Box tones from a phreaking program, such as: Omnibox, or
Fear's Phreaker Tools. Play the tones as you hold a microcassette
recorder about 1-inch away from your computer speakers, and
record the tones.

The Red Box only works on public telephones, it does not work on
COCOT's.(Defined in next section.) It makes the telephone think
that you have put money in. Red Boxes do not work on local calls
because the phone is not using ACTS (Automated Coin Toll
System), unless you call the operator and have her place the call for
you. You tell her the number that you want to dial and then when
she asks you to put in your money, play the tones. If she asks you
why you need her to place the call tell her that one of the buttons is
smashed in or something like that. You now have and know how to
use a Red Box!

Electronics Companies:
Alltronics
2300 Zanker Road
San Jose, CA 95131
(408)943-9774 -Voice-
(408)943-9776 -Fax-

Blue Saguaro
P.O. Box 37061
Tucson, AZ 85740

Mouser
(800)346-6873

Unicorn Electronics
10000 Canoga Ave. Unit C-2
Chatsworth, CA 91311
1-800-824-3432

G. Free calling from COCOT's

First of all, COCOT stands for "Customer Owned Customer
Operated Telephone". These are most likely to be found at
resteraunts, amusement parks, etc.

All you have to do to make a free call from a COCOT is dial a 1-
800 number (they let you do this for free), say some bullshit and
get them to hang up on you. Stay on the line after they hang up,
then dial the number that you want to call.

This may not work by the time you read this because COCOT
owners are becoming more aware of us every day.

H. ANAC numbers

ANAC stands for "Automated Number Announcment Circuit". In
other words, you call the ANAC number in your area and it tells
you the number that you are calling from. This is useful when
Beige Boxing, or hooking your modem up to other phone lines, to
find out what number you are using. The "?" are substituted for
unknown numbers. Do some scanning to find them out. Here are
the ANAC numbers for the U.S.A. with their area code, and the
only one I knew of in the U.K.:

U.S.A.:

Area Code: ANAC Number: 201 958 202 811 203 970 205 300-
222-2222 205 300-555-5555 205 300-648-1111 205 300-765-4321
205 300-798-1111 205 300-833-3333 205 557-2311 205 811 205
841-1111 205 908-222-2222 206 411 207 958 209 830-2121 209
211-9779 210 830 212 958 213 114 213 1223 213 211-2345 213
211-2346 213 760-2??? 213 61056 214 570 214 790 214 970-222-
2222 214 970-611-1111 215 410-???? 215 511 215 958 216 200-
???? 216 331 216 959-9968 217 200-???-???? 219 550 219 559
301 958-9968 310 114 310 1223 310 211-2345 310 211-2346 312
200 312 290 312 1-200-8825 312 1-200-555-1212 313 200-200-
2002 313 200-222-2222 313 200-???-???? 313 200200200200200
314 410-???? 315 953 315 958 315 998 317 310-222-2222 317
559-222-2222 317 743-1218 334 5572411 334 5572311 401 200-
200-4444 401 222-2222 402 311 404 311 404 940-???-???? 404
940 405 890-7777777 405 897 407 200-222-2222 408 300-???-
???? 408 760 408 940 409 951 409 970-???? 410 200-6969 410
200-555-1212 410 811 412 711-6633 412 711-4411 412 999-????
413 958 413 200-555-5555 414 330-2234 415 200-555-1212 415
211-2111 415 2222 415 640 415 760-2878 415 7600-2222 419
311 502 200-2222222 502 997-555-1212 503 611 503 999 504
99882233 504 201-269-1111 504 998 504 99851-0000000000 508
958 508 200-222-1234 508 200-222-2222 508 26011 509 560 510
760-1111 512 830 512 970-???? 515 5463 515 811 516 958 516
968 517 200-222-2222 517 200200200200200 518 511 518 997
518 998 603 200-222-2222 606 997-555-1212 606 711 607 993
609 958 610 958 610 958-4100 612 511 614 200 614 517 615
200200200200200 615 2002222222 615 830 616 200-222-2222
617 200-222-1234 617 200-222-2222 617 200-444-4444 617 220-
2622 617 958 618 200-???-???? 618 930 619 211-2001 619 211-
2121 703 811 704 311 707 211-2222 708 1-200-555-1212 708 1-
200-8825 708 200-6153 708 724-9951 708 356-9646 713 380 713
970-???? 713 811 714 114 714 211-2121 714 211-2222 716 511
716 990 717 958 718 958 802 2-222-222-2222 802 200-222-2222
802 1-700-222-2222 802 111-2222 805 114 805 211-2345 805
211-2346 805 830 806 970-???? 810 200200200200200 812 410-
555-1212 813 311 815 200-???-???? 817 290 817 211 818 970-
611-1111 818 1223 818 211-2345 903 211-2346 904 970-611-
1111 906 200-222-222 907 1-200-222-2222 907 811 908 958 910
200 910 311 910 988 914 990-1111 915 970-???? 916 211-2222
916 461 919 200 919 711 U.K.: 175



III. REFERENCE


A. Hacking and phreaking WWW. sites

Here is a list of some World Wide Web sites that contain hacking,
phreaking, computer, virus, carding, security, etc. material:

Site Address:
http://home.ptd.net/~msteen/hack.html
http://www.outerlimits.net/lordsome/index.html (Hacker's Layer)
http://web2.airmail.net/km/hfiles/free.htm (Hacker's Hideout)
http://resudox.net/bio/novell.html
http://www.louisville.edu/wrbake01/hack2.html
http://www.intersurf.com/~materva/files.html
http://hightop.nrl.navy.mil/rainbow.html
http://www.rit.edu/~jmb8902/hacking.html
http://www.spatz.com/pecos/index.html
http://pages.prodigy.com/FL/dtgz94a/files2.html
http://www.2600.com
http://att.net/dir800
http://draco.centerline.com:8080/~franl/crypto.html
http://everest.cs.ucdavis.edu/Security.html
http://ice-www.larc.nasa.gov/WWW/security.html
http://lOpht.com
http://lOpht.com/~oblivion/IIRG.html
http://underground.org
http://www.alw.nih.gov/WWW/security.html
http://www.aspentec.com/~frzmtdb/fun/hacker.html
http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-
faq/faq.html
http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
http://www.engin.umich.edu/~jgotts/underground/boxes.html
http://www.etext.org/Zines
http://www.inderect.com/www/johnk/
http://www.mgmua.com/hackers/index.html
http://www.paranoia.com/mthreat
http://www.paranoia.com/astrostar/fringe.html
http://www.umcc.umich.edu/~doug/virus-faq.html
http://www.wired.com
B. Good hacking and phreaking text files

All of these files are available by download from the Internet.

File Name:
A Novice's Guide To Hacking
Alt.2600 Hack Faq
The Hacker's Handbook
The Official Phreaker's Manual
Rainbow Books (Listed in Section D.)
The Hacker Crackdown
Computer Hackers: Rebels With A Cause
The Legion Of Doom Technical Journals
The Ultimate Beginner's Guide To Hacking And Phreaking (Of
course!)
C. Hacking and phreaking Newsgroups
alt.2600
alt.2600.hope.tech
alt.cellular
alt.cellular-phone-tech
alt.comp.virus
alt.cracks
alt.cyberpunk
alt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.malicious
alt.security
D. Rainbow Books

The Rainbow Books are a series of government evaluations on
various things related to computer system security. You can get all
of the existing Rainbow Books free and if you ask to be put on
their mailing list you will get each new one as it comes out. Just
write to the address or call the number below:

Infosec Awareness Division
ATTN: x711/IAOC
Fort George G. Meade, MD 20755-6000
or call:
(410)766-8729

Here is the list of all the Rainbow Books and their descriptions:

Color: Description:
Orange 1 D.O.D. Trusted Computer Systems
Green D.O.D. Password Management
Yellow Computer Security Requirements
Yellow 2 Computer Security Requirements
Tan Understanding Audit In Trusted Systems
Bright Blue Trusted Product Evaluation
Neon Orange Understanding Discretionary Access
Teal Green Glossary Of Computer Terms
Orange 2 Understanding Configurations
Red Interpretation Of Evaluation
Burgundy Understanding Design Documentation
Dark Lavender Understanding Trusted Distrobution
Venice Blue Computer Security Sub-Systems
Aqua Understanding Security Modeling
Dark Red Interpretations Of Environments
Pink Rating Maintenence Phase
Purple Formal Verification Systems
Brown Understanding Trusted Facilities
Yellow-Green Writing Trusted Facility Manuals Light
Blue Understanding Identification And Authentication In Trusted Systems
Blue Product Evaluation Questionaire
Gray Selecting Access Control List
Lavander DataBase Management Interpretation
Yellow 3 Understanding Trusted Recovery
Bright Orange Understanding Security Testing
Purple 1 Guide To System Procurement
Purple 2 Guide To System Procurement
Purple 3 Guide To System Procurement
Purple 4 Guide To System Procurement
Green Understanding Data Remanence
Hot Peach Writing Security Features
Turquiose Understanding Information Security
Violet Controlled Access Protection
Light Pink Understanding Covert Channels

E. Cool hacking and phreaking magazines
Phrack Magazine
2600 Magazine
Tap Magazine
Phantasy Magazine
F. Hacking and phreaking movies
Movie:
Hackers
War Games
G. Hacking and phreaking Gopher sites
Address:
ba.com
csrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.org
oss.net
spy.org
wiretap.spies.com
H. Hacking and phreaking Ftp sites
Address:
2600.com
agl.gatech.edu/pub
asylum.sf.ca.us
clark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrack
ftp.giga.or.at/pub/hacker
ftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/mac
ftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge
I. Hacking and phreaking BBS's

BBS's are Bulletin Board Systems on which hackers and phreakers
can post messages to each other.

Here is a list of some BBS's that I know of. If you know of any
other BBS's, please E-Mail me via the A.S.H. E-Mail address.
Also, Please note that some of these may be old and not running.


Area Code: Phone Number: Name: 203 832-8441 Rune Stone 210
493-9975 The Truth Sayer's Domain 303 343-4053 Hacker's Haven
315 656-5135 Independent Nation 315 656-5135 UtOPiA 617 855-
2923 Maas-Neotek 708 676-9855 Apocalypse 2000 713 579-2276
KOdE AbOdE 806 747-0802 Static Line 908 526-4384 Area 51
502 499-8933 Blitzkrieg 510 935-5845 ...Screaming Electron 408
747-0778 The Shrine 708 459-7267 The Hell Pit 415 345-2134
Castle Brass 415 697-1320 7 Gates Of Hell

J. Cool hackers and phreakers

Yes there are many, many, cool hackers and phreakers out there,
but these are some that helped me to get this file out on the
Internet. I did not list a few people because I only knew their real
name, and I don't want to use their real name without their
permission.

Handle:
Silicon Toad
Logik Bomb/Net Assasin
oleBuzzard
Lord Somer
Weezel
Thanks for your help guys.

K. Hacker's Manifesto

"This is our world now...the world of the electron and the switch,
the beauty of the baud. We make use of a service already existing
without paying for what could be dirt cheep if it wasn't run by
profiteering gluttons, and you call us criminals. We explore...and
you call us criminals. We exist without skin color, without
nationality, without religious bias...and you call us criminals. You
build atomic bombs, wage wars, murder, cheat, and lie to us and try
to make us believe it is for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that
of judging people by what they say and think, not what they look
like. My crime is that of outsmarting you, something that you will
never forgive me for. I am a hacker and this is my manifesto. You
may stop this individual, but you can't stop us all...after all, we're
all alike."

+++The Mentor+++

K. Happy hacking!

Be careful and have fun. Remember to keep your eye out for the
next volume of The Ultimate Beginner's Guide To Hacking And
Phreaking and the Legion Of the Apocalypse W.W.W. page. Oh,
and keep looking for our on-line magazine, too, it should be
coming out soon.

Well, I hope you enjoyed the file and found it informative. I also
hope that I helped get you started in hacking and phreaking.

"The Revelation is here."


*-Revelation-*

LOA--ASH
EOF Text is copywright 1996 by Revelation. HTML is copywright
1996 by Weezel
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
anyone familiar with ms secure?
how do i hide files in to jpeg
FTP Attackers...
cable tv question
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS