BeginHackingToday


SUBMITTED BY: ProffesorFaux

DATE: March 28, 2020, 2:58 p.m.

FORMAT: Text only

SIZE: 63.6 kB

HITS: 1016

  1. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
  2. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  3. &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
  4. ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
  5. ######################################################################
  6. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
  7. **********************************************************************
  8. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  9. + +
  10. + THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING +
  11. + +
  12. + +
  13. + +
  14. + +
  15. + BY +
  16. + REVELATION +
  17. + LOA--ASH +
  18. + +
  19. + +
  20. + +
  21. + +
  22. + +
  23. + Written: 08/4/96 Volume: 1 +
  24. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  25. **********************************************************************
  26. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
  27. ######################################################################
  28. ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
  29. &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
  30. %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
  31. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
  32. This document was written in Windows 95 Word Pad. The title
  33. above, and some of the text looks a little screwed up when read in
  34. anything else, so read it in Word Pad.
  35. Anyway, for those of you who are wondering "what do the letters
  36. "LOA" under his handle stand for?" Well, LOA stands for Legion Of the
  37. Apocalypse, which is a group of elite hackers and phreakers in my area.
  38. The current members of LOA are:
  39. Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and
  40. Phreak Show
  41. I started LOA when I discovered that there were many good
  42. hackers and phreakers in my area. I thought that an organized group of
  43. hackers and phreakers would accomplish much more than an individual
  44. could by himself. Thus the Legion Of the Apocalypse was formed and has
  45. been around for a while since. Our main goal is to show the public
  46. what hacking and phreaking is all about and to reveal confidential
  47. information to the hacking/phreaking community so that we can learn
  48. more about computers, telephones, electronics, etc. We are hoping to
  49. get our own World Wide Web page soon, so keep an eye out for it. It
  50. will contain all of the hacking, phreaking, computer, telephone,
  51. security, electronics, virus, and carding information that you could
  52. possibly want.
  53. Also, if some of you are wondering why I chose the word
  54. Revelation as my handle, well, Revelation means revealing or
  55. unveiling, which is exactly what I intend to do as a hacker/phreaker.
  56. I intend to reveal all the information that I can gather while
  57. hacking and phreaking.
  58. Anyway, I wrote this document because I have read all the files
  59. that I could get my hands on and noticed that there has never been a
  60. really good file written that guided beginning hackers and phreakers
  61. step by step.
  62. When I began hacking and started reading all of the beginner
  63. files, I still had many un-answered questions. My questions were
  64. eventually answered, but only through LOTS of reading and practice.
  65. In this file, I hope to give basic step by step instructions that will
  66. help beginning hackers and phreakers get started. But, DO NOT think
  67. that this will save you from having to read alot. If you want to be a
  68. hacker/phreaker, reading is the most important thing you can do. You
  69. will have to do ALOT of reading no matter what.
  70. This document was intended for beginners, but it can also be used
  71. as a reference tool for advanced hackers and phreakers.
  72. Please distribute this document freely. Give it to anyone that
  73. you know who is interested in hacking and/or phreaking. Post it on your
  74. World Wide Web page, Ftp sites, and BBS's. Do whatever you want with it
  75. as long as it stays UNCHANGED.
  76. As far as I know, this is the most complete and in depth beginners
  77. guide available, that is why I wrote it. Also, I plan to have new
  78. volumes come out whenever there has been a significant change in the
  79. material provided, so keep an eye out for them. LOA is planning on
  80. starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "an641839@anon.penet.fi".
  81. This document is divided into three main sections with many
  82. different sub-sections in them. The Table Of Contents is below:
  83. Table Of Contents:
  84. I. HACKING
  85. A. What is hacking?
  86. B. Why hack?
  87. C. Hacking rules
  88. D. Getting started
  89. E. Where and how to start hacking
  90. F. Telenet commands
  91. G. Telenet dialups
  92. H. Telenet DNIC's
  93. I. Telenet NUA's
  94. J. Basic UNIX hacking
  95. K. Basic VAX/VMS hacking
  96. L. Basic PRIME hacking
  97. M. Password list
  98. N. Connecting modems to different phone lines
  99. O. Viruses, Trojans, and Worms
  100. II. PHREAKING
  101. A. What is phreaking?
  102. B. Why phreak?
  103. C. Phreaking rules
  104. D. Where and how to start phreaking
  105. E. Boxes and what they do
  106. F. Red Box plans
  107. G. Free calling from COCOT's
  108. H. ANAC numbers
  109. III. REFERENCE
  110. A. Hacking and phreaking W.W.W. pages
  111. B. Good hacking and phreaking text files
  112. C. Hacking and phreaking Newsgroups
  113. D. Rainbow Books
  114. E. Hacking and phreaking magazines
  115. F. Hacking and phreaking movies
  116. G. Hacking and phreaking Gopher sites
  117. H. Hacking and phreaking Ftp sites
  118. I. Hacking and phreaking BBS's
  119. J. Cool hackers and phreakers
  120. K. Hacker's Manifesto
  121. L. Happy hacking!
  122. * DISCLAIMER *
  123. "Use this information at your own risk. I Revelation, nor any
  124. other member of LOA, nor the persons providing this file, will NOT
  125. assume ANY responsibility for the use, misuse, or abuse, of the
  126. information provided herein. The following information is provided for
  127. educational purposes ONLY. The informaion is NOT to be used for illegal
  128. purposes. By reading this file you ARE AGREEING to the following terms:
  129. I understand that using this information is illegal. I agree to, and
  130. understand, that I am responsible for my own actions. If I get into
  131. trouble using this information for the wrong reasons, I promise not
  132. to place the blame on Revelation, LOA, or anyone that provided this
  133. file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.
  134. This file is basically a compilation of known hacking and
  135. phreaking information and some information gathered from my own
  136. experience as a hacker/phreaker. I have tried to make sure that
  137. everything excerpted from other documents was put in quotes and labeled
  138. with the documents name, and if known, who wrote it. I am sorry if any
  139. mistakes were made with quoted information."
  140. *-Revelation-*
  141. LOA
  142. I. HACKING
  143. A. What is hacking?
  144. Hacking is the act of penetrating computer systems to gain
  145. knowledge about the system and how it works.
  146. Hacking is illegal because we demand free access to ALL data, and
  147. we get it. This pisses people off and we are outcasted from society, and
  148. in order to stay out of prison, we must keep our status of being a
  149. hacker/phreaker a secret. We can't discuss our findings with anyone but
  150. other members of the hacking/phreaking community for fear of being
  151. punished. We are punished for wanting to learn. Why is the government
  152. spending huge amounts of time and money to arrest hackers when there are
  153. other much more dangerous people out there. It is the murderers,
  154. rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.
  155. There are only two ways to get rid of hackers and phreakers.
  156. One is to get rid of computers and telephones, in which case we would
  157. find other means of getting what we want.(Like that is really going to
  158. happen.) The other way is to give us what we want, which is free access
  159. to ALL information. Until one of those two things happen, we are not
  160. going anywhere.
  161. B. Why hack?
  162. As said above, we hack to gain knowledge about systems and the
  163. way they work. We do NOT want to damage systems in any way. If you do
  164. damage a system, you WILL get caught. But, if you don't damage
  165. anything, it is very unlikely that you will be noticed, let alone be
  166. tracked down and arrested, which costs a considerable amount of time
  167. and money.
  168. Beginners should read all the files that they can get their
  169. hands on about anything even remotely related to hacking and phreaking,
  170. BEFORE they start hacking. I know it sounds stupid and boring but it
  171. will definetly pay off in the future. The more you read about hacking
  172. and phreaking, the more unlikely it is that you will get caught. Some
  173. of the most useless pieces of information that you read could turn out
  174. to be the most helpful. That is why you need to read everything
  175. possible.
  176. C. Hacking rules
  177. 1. Never damage any system. This will only get you into trouble.
  178. 2. Never alter any of the systems files, except for those needed to
  179. insure that you are not detected, and those to insure that you have
  180. access into that computer in the future.
  181. 3. Do not share any information about your hacking projects with
  182. anyone but those you'd trust with your life.
  183. 4. When posting on BBS's (Bulletin Board Systems) be as vague as
  184. possible when describing your current hacking projects. BBS's CAN
  185. be monitered by law enforcement.
  186. 5. Never use anyone's real name or real phone number when posting
  187. on a BBS.
  188. 6. Never leave your handle on any systems that you hack in to.
  189. 7. DO NOT hack government computers.
  190. 8. Never speak about hacking projects over your home telephone line.
  191. 9. Be paranoid. Keep all of your hacking materials in a safe place.
  192. 10. To become a real hacker, you have to hack. You can't just sit
  193. around reading text files and hanging out on BBS's. This is not what
  194. hacking is all about.
  195. D. Getting started
  196. The very first thing you need to do is get a copy of PKZIP
  197. or some other file unzipping utility. Nearly everything that you
  198. download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip".
  199. Then you need to get yourself a good prefix scanner.(also known
  200. as a War Dialer) This is a program that automatically dials phone
  201. numbers beginning with the three numbers (prefix) that you specify. It
  202. checks to see if the number dialed has a carrier.(series of beeps that
  203. tells you that you have dialed a computer) Try and find a large
  204. business area prefix to scan. It is these businesses that have
  205. interesting computers. There are many good scanners out there, but I
  206. would recommend Autoscan or A-Dial. These are very easy to use and get
  207. the job done quickly and efficiently.
  208. E. Where and how to start hacking
  209. After you get yourself a good scanner, scan some prefixes and
  210. find some cool dialups, then do the following: From your terminal,
  211. dial the number you found. Then you should hear a series of beeps
  212. (carrier) which tells you that you are connecting to a remote computer.
  213. It should then say something like "CONNECT 9600" and then identify the
  214. system that you are on. If nothing happens after it says "CONNECT 9600"
  215. try hitting enter a few times. If you get a bunch of garbage adjust your
  216. parity, data bits, stop bits, baud rate, etc., until it becomes clear.
  217. That is one way of connecting to a remote computer. Another way is
  218. through Telenet or some other large network.
  219. Telenet is a very large network that has many other networks and
  220. remote computers connected to it.
  221. Ok, here is how you would connect to a remote computer through
  222. Telenet:
  223. First, you get your local dialup(phone number) from the list that
  224. I have provided in Section G. Then you dial the number from your
  225. terminal and connect.(If you get a bunch of garbage try changing your
  226. parity to odd and your data bits to 7, this should clear it up.) If
  227. it just sits there hit enter and wait a few seconds, then hit enter
  228. again. Then it will say "TERMINAL=" and you type in your terminal
  229. emulation. If you don't know what it is just hit enter. Then it will
  230. give you a prompt that looks like "@". From there you type "c" and then
  231. the NUA (Network User Address) that you want to connect to. After you
  232. connect to the NUA, the first thing you need to do is find out what type
  233. of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.)
  234. There are other things that you can do on Telenet besides
  235. connecting to an NUA. Some of these commands and functions are listed in
  236. the next section.
  237. You can only connect to computers which accept reverse charging.
  238. The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password.
  239. Telenet is probably the safest place to start hacking because of
  240. the large numbers of calls that they get. Make sure you call during
  241. business hours (late morning or early afternoon) so there are many
  242. other people on-line.
  243. F. Telenet commands
  244. Here is a list of some Telenet commands and their functions. This
  245. is only a partial list. Beginners probably won't use these commands,
  246. but I put them here for reference anyway.
  247. COMMAND FUNCTION
  248. c Connect to a host.
  249. stat Shows network port.
  250. full Network echo.
  251. half Terminal echo.
  252. telemail Mail.(need ID and password)
  253. mail Mail.(need ID and password)
  254. set Select PAD parameters
  255. cont Continue.
  256. d Disconnect.
  257. hangup Hangs up.
  258. access Telenet account.(ID and password)
  259. G. Telenet dialups
  260. Here is the list of all the Telenet dialups that I know of in
  261. the U.S.A., including the city, state, and area code:
  262. STATE,CITY: AREA CODE: NUMBER:
  263. AL, Anniston 205 236-9711
  264. AL, Birmingham 205 328-2310
  265. AL, Decatur 205 355-0206
  266. AL, Dothan 205 793-5034
  267. AL, Florence 205 767-7960
  268. AL, Huntsville 205 539-2281
  269. AL, Mobile 205 432-1680
  270. AL, Montgomery 205 269-0090
  271. AL, Tuscaloosa 205 752-1472
  272. AZ, Phoenix 602 254-0244
  273. AZ, Tucson 602 747-0107
  274. AR, Ft.Smith 501 782-2852
  275. AR, Little Rock 501 327-4616
  276. CA, Bakersfield 805 327-8146
  277. CA, Chico 916 894-6882
  278. CA, Colton 714 824-9000
  279. CA, Compton 213 516-1007
  280. CA, Concord 415 827-3960
  281. CA, Escondido 619 741-7756
  282. CA, Eureka 707 444-3091
  283. CA, Fresno 209 233-0961
  284. CA, Garden Grove 714 898-9820
  285. CA, Glendale 818 507-0909
  286. CA, Hayward 415 881-1382
  287. CA, Los Angeles 213 624-2251
  288. CA, Marina Del Rey 213 306-2984
  289. CA, Merced 209 383-2557
  290. CA, Modesto 209 576-2852
  291. CA, Montery 408 646-9092
  292. CA, Norwalk 213 404-2237
  293. CA, Oakland 415 836-4911
  294. CA, Oceanside 619 430-0613
  295. CA, Palo Alto 415 856-9995
  296. CA, Pomona 714 626-1284
  297. CA, Sacramento 916 448-6262
  298. CA, Salinas 408 443-4940
  299. CA, San Carlos 415 591-0726
  300. CA, San Diego 619 233-0233
  301. CA, San Francisco 415 956-5777
  302. CA, San Jose 408 294-9119
  303. CA, San Pedro 213 548-6141
  304. CA, San Rafael 415 472-5360
  305. CA, San Ramon 415 829-6705
  306. CA, Santa Ana 714 558-7078
  307. CA, Santa Barbara 805 682-5361
  308. CA, Santa Cruz 408 429-6937
  309. CA, Santa Rosa 707 656-6760
  310. CA, Stockton 209 957-7610
  311. CA, Thousand Oaks 805 495-3588
  312. CA, Vallejo 415 724-4200
  313. CA, Ventura 805 656-6760
  314. CA, Visalia 209 627-1201
  315. CA, West Covina 818 915-5151
  316. CA, Woodland Hills 818 887-3160
  317. C0, Colorado 719 635-5361
  318. CO, Denver 303 337-6060
  319. CO, Ft. Collins 303 493-9131
  320. CO, Grand Junction 303 241-3004
  321. CO, Greeley 303 352-8563
  322. CO, Pueblo 719 542-4053
  323. CT, Bridgeport 203 335-5055
  324. CT, Danbury 203 794-9075
  325. CT, Hartford 203 247-9479
  326. CT, Middletown 203 344-8217
  327. CT, New Britain 203 225-7027
  328. CT, New Haven 203 624-5954
  329. CT, New London 203 447-8455
  330. CT, Norwalk 203 866-7404
  331. CT, Stamford 203 348-0787
  332. CT, Waterbury 203 753-4512
  333. DE, Dover 302 678-8328
  334. DE, Newark 302 454-7710
  335. DC, Washington 202 429-7896
  336. DC, Washington 202 429-7800
  337. FL, Boca Raton 407 338-3701
  338. FL, Cape Coral 813 275-7924
  339. FL, Cocoa Beach 407 267-0800
  340. FL, Daytona Beach 904 255-2629
  341. FL, Ft. Lauderdale 305 764-4505
  342. FL, Gainsville 904 338-0220
  343. FL, Jacksonville 904 353-1818
  344. FL, Lakeland 813 683-5461
  345. FL, Melbourne 407 242-8247
  346. FL, Miami 305 372-0230
  347. FL, Naples 813 263-3033
  348. FL, Ocala 904 351-3790
  349. FL, Orlando 407 422-4099
  350. FL, Pensacola 904 432-1335
  351. FL, Pompano Beach 305 941-5445
  352. FL, St. Petersburg 813 323-4026
  353. FL, Sarasota 813 923-4563
  354. FL, Tallahassee 904 681-1902
  355. FL, Tampa 813 224-9920
  356. FL, West Palm Beach 407 833-6691
  357. GA, Albany 912 888-3011
  358. GA, Athens 404 548-5590
  359. GA, Atlanta 404 523-0834
  360. GA, Augusta 404 724-2752
  361. GA, Colombus 404 571-0556
  362. GA, Macon 912 743-8844
  363. GA, Rome 404 234-1428
  364. GA, Savannah 912 236-2605
  365. HI, Oahu 808 528-0200
  366. ID, Boise 208 343-0611
  367. ID, Idaho Falls 208 529-0406
  368. ID, Lewiston 208 743-0099
  369. ID, Pocatella 208 232-1764
  370. IL, Aurora 312 896-0620
  371. IL, Bloomington 309 827-7000
  372. IL, Chicago 312 938-0600
  373. IL, Decatur 217 429-0235
  374. IL, Dekalb 815 758-2623
  375. IL, Joliet 815 726-0070
  376. IL, Peoria 309 637-8570
  377. IL, Rockford 815 965-0400
  378. IL, Springfield 217 753-1373
  379. IL, Urbana 217 384-6428
  380. IN, Bloomington 812 332-1344
  381. IN, Evansville 812 424-7693
  382. IN, Ft. Wayne 219 426-2268
  383. IN, Gary 219 882-8800
  384. IN, Indianapolis 317 299-0024
  385. IN, Kokomo 317 455-2460
  386. IN, Lafayette 317 742-6000
  387. IN, Muncie 317 282-6418
  388. IN, South Bend 219 233-7104
  389. IN, Terre Haute 812 232-5329
  390. IA, Ames 515 233-6300
  391. IA, Cedar Rapids 319 364-0911
  392. IA, Davenport 319 324-2445
  393. IA, Des Moines 515 288-4403
  394. IA, Dubuque 319 556-0783
  395. IA, Iowa City 319 351-1421
  396. IA, Sioux City 712 255-1545
  397. IA, Waterloo 319 232-5441
  398. KS, Lawrence 913 843-8124
  399. KS, Manhattan 913 537-0948
  400. KS, Salina 913 825-7900
  401. KS, Topeka 913 233-9880
  402. KS, Wichita 316 262-5669
  403. KY, Bowling Green 502 782-7941
  404. KY, Frankfort 502 875-4654
  405. KY, Lexington 606 233-0312
  406. KY, Louisville 502 589-5580
  407. KY, Owensboro 502 686-8107
  408. LA, Alexandria 318 445-1053
  409. LA, Baton Rouge 504 343-0753
  410. LA, Lafayette 318 233-0002
  411. LA, Lake Charles 318 436-0518
  412. LA, Monroe 318 387-6330
  413. LA, New Orleans 504 524-4094
  414. LA, Shreveport 318 221-5833
  415. ME, Augusta 207 622-3123
  416. ME, Brewer 207 989-3081
  417. ME, Lewiston 207 784-0105
  418. ME, Portland 207 761-4000
  419. MD, Annapolis 301 224-8550
  420. MD, Baltimore 301 727-6060
  421. MD, Frederick 301 293-9596
  422. MA, Boston 617 292-0662
  423. MA, Brockton 508 580-0721
  424. MA, Fall River 508 677-4477
  425. MA, Framingham 508 879-6798
  426. MA, Lawrence 508 975-2273
  427. MA, Lexington 617 863-1550
  428. MA, Lowell 508 937-5214
  429. MA, New Bedford 508 999-2915
  430. MA, Northampton 413 586-0510
  431. MA, Pittsfield 413 499-7741
  432. MA, Salem 508 744-1559
  433. MA, Springfield 413 781-3811
  434. MA, Woods Hole 508 540-7500
  435. MA, Worcester 508 755-4740
  436. MI, Ann Arbor 313 996-5995
  437. MI, Battle Creek 616 968-0929
  438. MI, Detroit 313 964-2988
  439. MI, Flint 313 235-8517
  440. MI, Grand Rapids 616 774-0966
  441. MI, Jackson 517 782-8111
  442. MI, Kalamazoo 616 345-3088
  443. MI, Lansing 517 484-0062
  444. MI, Midland 517 832-7068
  445. MI, Muskegon 616 726-5723
  446. MI, Pontiac 313 332-5120
  447. MI, Port Huron 313 982-8364
  448. MI, Saginaw 517 790-5166
  449. MI, Southfield 313 827-4710
  450. MI, Traverse City 616 946-2121
  451. MI, Warren 313 575-9152
  452. MN, Duluth 218 722-1719
  453. MN, Mankato 517 388-3780
  454. MN, Minneapolis 612 341-2459
  455. MN, Rochester 507 282-5917
  456. MN, St. Cloud 612 253-2064
  457. MS, Gulfport 601 863-0024
  458. MS, Jackson 601 969-0036
  459. MS, Meridian 601 482-2210
  460. MS, Starkville 601 324-2155
  461. MO, Columbia 314 449-4404
  462. MO, Jefferson City 314 634-5178
  463. MO, Kansas City 816 221-9900
  464. MO, St. Joseph 816 279-4797
  465. MO, St. Louis 314 421-4990
  466. MO, Springfield 417 864-4814
  467. MT, Billings 406 245-7649
  468. MT, Great Falls 406 771-0067
  469. MT, Helena 406 443-0000
  470. MT, Missoula 406 721-5900
  471. NE, Lincoln 402 475-4964
  472. NE, Omaha 402 341-7733
  473. NV, Las Vegas 702 737-6861
  474. NV, Reno 702 827-6900
  475. NH, Concord 603 224-1024
  476. NH, Durham 603 868-2924
  477. NH, Manchester 603 627-8725
  478. NH, Nashua 603 880-6241
  479. NH, Portsmouth 603 431-2302
  480. NJ, Atlantic City 609 348-0561
  481. NJ, Freehold 201 780-5030
  482. NJ, Hackensack 201 488-6567
  483. NJ, Marlton 609 596-1500
  484. NJ, Merchantville 609 663-9297
  485. NJ, Morristown 201 455-0275
  486. NJ, New Brunswick 201 745-2900
  487. NJ, Newark 201 623-0469
  488. NJ, Passaic 201 778-5600
  489. NJ, Paterson 201 684-7560
  490. NJ, Princeton 609 799-5587
  491. NJ, Rahway 201 815-1885
  492. NJ, Redbank 201 571-0003
  493. NJ, Roseland 201 227-5277
  494. NJ, Sayreville 201 525-9507
  495. NJ, Trenton 609 989-8847
  496. NM, Albuquerque 505 243-4479
  497. NM, Las Cruces 505 526-9191
  498. NM, Santa Fe 505 473-3403
  499. NY, Albany 518 465-8444
  500. NY, Binghampton 607 772-6642
  501. NY, Buffalo 716 847-1440
  502. NY, Dear Park 516 667-5566
  503. NY, Hempstead 516 292-3800
  504. NY, Ithaca 607 277-2142
  505. NY, New York City 212 741-8100
  506. NY, New York City 212 620-6000
  507. NY, Plattsburgh 518 562-1890
  508. NY, Poughkeepsie 914 473-2240
  509. NY, Rochester 716 454-1020
  510. NY, Syracuse 315 472-5583
  511. NY, Utica 315 797-0920
  512. NY, Whit Plains 914 328-9199
  513. NC, Asheville 704 252-9134
  514. NC, Charlotte 704 332-3131
  515. NC, Fayetteville 919 323-8165
  516. NC, Gastonia 704 865-4708
  517. NC, Greensboro 919 273-2851
  518. NC, High Point 919 889-7494
  519. NC, North Wilkesboro 919 838-9034
  520. NC, Raleigh 919 834-8254
  521. NC, Res Tri Park 919 549-8139
  522. NC, Tarboro 919 823-0579
  523. NC, Wilmington 919 763-8313
  524. NC, Winston-Salem 919 725-2126
  525. ND, Fargo 701 235-7717
  526. ND, Grand Forks 701 775-7813
  527. ND, Mandan 701 663-2256
  528. OH, Canton 216 452-0903
  529. OH, Cincinnati 513 579-0390
  530. OH, Cleveland 216 575-1658
  531. OH, Colombus 614 463-9340
  532. OH, Dayton 513 461-5254
  533. OH, Elyria 216 323-5059
  534. OH, Hamilton 513 863-4116
  535. OH, Kent 216 678-5115
  536. OH, Lorain 216 960-1170
  537. OH, Mansfield 419 526-0686
  538. OH, Sandusky 419 627-0050
  539. OH, Springfield 513 324-1520
  540. OH, Toledo 419 255-7881
  541. OH, Warren 216 394-0041
  542. OH, Wooster 216 264-8920
  543. OH, Youngstown 216 743-1296
  544. OK, Bartlesville 918 336-3675
  545. OK, Lawton 405 353-0333
  546. OK, Oklahoma City 405 232-4546
  547. OK, Stillwater 405 624-1113
  548. OK, Tulsa 918 584-3247
  549. OR, Corvallis 503 754-9273
  550. OR, Eugena 503 683-1460
  551. OR, Hood River 503 386-4405
  552. OR, Klamath Falls 503 882-6282
  553. OR, Medford 503 779-6343
  554. OR, Portland 503 295-3028
  555. OR, Salem 503 378-7712
  556. PA, Allentown 215 435-3330
  557. PA, Altoona 814 949-0310
  558. PA, Carlisle 717 249-9311
  559. PA, Danville 717 271-0102
  560. PA, Erie 814 899-2241
  561. PA, Harrisburg 717 236-6882
  562. PA, Johnstown 814 535-7576
  563. PA, King Of Prussia 215 337-4300
  564. PA, Lancaster 717 295-5405
  565. PA, Philadelphia 215 574-9462
  566. PA, Pittsburgh 412 288-9950
  567. PA, Reading 215 376-8750
  568. PA, Scranton 717 961-5321
  569. PA, State College 814 231-1510
  570. PA, Wilkes-Barre 717 829-3108
  571. PA, Williamsport 717 494-1796
  572. PA, York 717 846-6550
  573. RI, Providence 401 751-7910
  574. SC, Charleston 803 722-4303
  575. SC, Columbia 803 254-0695
  576. SC, Greenville 803 233-3486
  577. SC, Spartenburg 803 585-1637
  578. SC, Pierre 605 224-0481
  579. SC, Rapid City 605 348-2621
  580. SC, Sioux Falls 605 336-8593
  581. TN, Bristol 615 968-1130
  582. TN, Chattanooga 615 756-1161
  583. TN, Clarksville 615 552-0032
  584. TN, Johnson City 615 282-6645
  585. TN, Knoxville 615 525-5500
  586. TN, Memphis 901 521-0215
  587. TN, Nashville 615 244-3702
  588. TN, Oak Ridge 615 481-3590
  589. TX, Abilene 915 676-9151
  590. TX, Amarillo 806 373-0458
  591. TX, Athens 214 677-1712
  592. TX, Austin 512 928-1130
  593. TX, Brownsville 512 542-0367
  594. TX, Bryan 409 822-0159
  595. TX, Corpus Christi 512 884-9030
  596. TX, Dallas 214 748-6371
  597. TX, El Paso 915 532-7907
  598. TX, Ft. Worth 817 332-4307
  599. TX, Galveston 409 762-4382
  600. TX, Houston 713 227-1018
  601. TX, Laredo 512 724-1791
  602. TX, Longview 214 236-4205
  603. TX, Lubbock 806 747-4121
  604. TX, Mcallen 512 686-5360
  605. TX, Midland 915 561-9811
  606. TX, Nederland 409 722-3720
  607. TX, San Angelo 915 944-7612
  608. TX, San Antonio 512 225-8004
  609. TX, Sherman 214 893-4995
  610. TX, Temple 817 773-9723
  611. TX, Tyler 214 597-8925
  612. TX, Waco 817 752-9743
  613. TX, Wichita Falls 817 322-3774
  614. UT, Ogden 801 627-1630
  615. UT, Provo 801 373-0542
  616. UT, Salt Lake City 801 359-0149
  617. VT, Burlington 802 864-0808
  618. VT, Montpelier 802 229-4966
  619. VT, Rutland 802 775-1676
  620. VT, White River Jct. 802 295-7631
  621. VA, Blacksburg 703 552-9181
  622. VA, Charlottesville 804 977-5330
  623. VA, Covington 703 962-2217
  624. VA, Fredericksburg 703 371-0188
  625. VA, Harrisonburg 703 434-7121
  626. VA, Herndon 703 435-1800
  627. VA, Lynchburg 804 845-0010
  628. VA, Newport News 804 596-6600
  629. VA, Norfolk 804 625-1186
  630. VA, Richmond 804 788-9902
  631. VA, Roanoke 703 344-2036
  632. WA, Auburn 206 939-9982
  633. WA, Bellingham 206 733-2720
  634. WA, Everett 206 775-9929
  635. WA, Longview 206 577-5835
  636. WA, Olympia 206 754-0460
  637. WA, Richland 509 943-0649
  638. WA, Seattle 206 625-9612
  639. WA, Spokane 509 455-4071
  640. WA, Tacoma 206 627-1791
  641. WA, Vancouver 206 693-6914
  642. WA, Wenatchee 509 663-6227
  643. WA, Yakima 509 575-1060
  644. WV, Charleston 304 343-6471
  645. WV, Huntington 304 523-2802
  646. WV, Morgantown 304 292-0104
  647. WV, Wheeling 304 233-7732
  648. WI, Beloit 608 362-5287
  649. WI, Eau Claire 715 836-9295
  650. WI, Green Bay 414 432-2815
  651. WI, Kenosha 414 552-9242
  652. WI, La Crosse 608 784-0560
  653. WI, Madison 608 257-5010
  654. WI, Milwaukee 414 271-3914
  655. WI, Neenah 414 722-7636
  656. WI, Racine 414 632-6166
  657. WI, Sheboygan 414 452-3995
  658. WI, Wausau 715 845-9584
  659. WI, West Bend 414 334-2206
  660. WY, Casper 307 265-5167
  661. WY, Cheyenne 307 638-4421
  662. WY, Laramie 307 721-5878
  663. H. Telenet DNIC's
  664. Here is the list of all the Telenet DNIC's. These
  665. will be defined and explained in the next section:
  666. DNIC: NETWORK:
  667. 02041 Datanet-1
  668. 02062 DCS
  669. 02080 Transpac
  670. 02284 Telepac (Switzerland)
  671. 02322 Datex-P (Austria)
  672. 02392 Radaus
  673. 02342 PSS
  674. 02382 Datapak (Denmark)
  675. 02402 Datapak (Sweden)
  676. 02405 Telepak
  677. 02442 Finpak
  678. 02624 Datex-P (West Germany)
  679. 02704 Luxpac
  680. 02724 Eirpak
  681. 03020 Datapac
  682. 03028 Infogram
  683. 03103 ITT/UDTS (U.S.A.)
  684. 03106 Tymnet
  685. 03110 Telenet
  686. 03340 Telepac (Mexico)
  687. 03400 UDTS (Curacau)
  688. 04251 Isranet
  689. 04401 DDX-P
  690. 04408 Venus-P
  691. 04501 Dacom-Net
  692. 04542 Intelpak
  693. 05052 Austpac
  694. 05053 Midas
  695. 05252 Telepac (Hong Kong)
  696. 05301 Pacnet
  697. 06550 Saponet
  698. 07240 Interdata
  699. 07241 Renpac
  700. 07421 Dompac
  701. 09000 Dialnet
  702. I. Telenet NUA's
  703. Here is a list of a few Telenet NUA's and what type of system
  704. they are. But first, this is how an NUA is put together:
  705. 031106170023700
  706. \ /\ / \ /
  707. | | |
  708. DNIC Area NUA
  709. Code
  710. The DNIC says which network connected to Telenet you are using.
  711. The area code is the area code for the area that the NUA is in. And
  712. the NUA is the address of the computer on Telenet. Please note that
  713. an NUA does NOT have to be in your area code for you to connect to it.
  714. There are two ways of finding useful NUA's. The first way is to
  715. get or write an NUA scanning program. The second way is to get a copy
  716. of the Legion Of Doom's Telenet Directory.( Volume 4 of the LOD
  717. Technical Journals)
  718. Now, here is the list. Remember that these are only a few NUA's.
  719. These are NOT all of the Telenet NUA's. All of these NUA's DO accept
  720. reverse charging. Also, please note that all of these may not be
  721. working by the time you read this and that network congestion
  722. frequently makes an NUA inaccessible for a short period of time.
  723. NUA: SYSTEM TYPE:
  724. 031102010022500 VAX
  725. 031102010015600 UNIX
  726. 031102010022000 VAX
  727. 031102010025900 UNIX
  728. 031102010046100 VAX
  729. 031102010025200 PRIME
  730. 031102010046100 VAX
  731. 031102010052200 VAX
  732. 031102020001000 PRIME
  733. 031102020013200 VAX
  734. 031102020014100 PRIME
  735. 031102020014200 PRIME
  736. 031102020015000 VAX
  737. 031102020016100 UNIX
  738. 031102020021400 PRIME
  739. 031102020024500 AOS
  740. 031102020030800 PRIME
  741. 031102020030900 PRIME
  742. 031102020031200 PRIME
  743. 031102020033600 VAX
  744. 031102020033700 VAX
  745. 031102020034300 PRIME
  746. 031102020036000 HP-3000
  747. 031102030007500 VAX
  748. 031102030002200 VM/370
  749. 031102030013600 PRIME
  750. 031102060003200 HP-3000
  751. 031102060044000 VAX
  752. 031102060044900 NOS
  753. 031102060044700 VM/370
  754. 031102120003900 NOS
  755. 031102120015200 PRIME
  756. 031102120026600 VAX
  757. 031102120026300 VAX
  758. 031102120026700 UNIX
  759. 031102120044900 UNIX
  760. 031102120053900 VOS
  761. 031102140024000 VAX
  762. J. Basic UNIX hacking
  763. UNIX is probably the most commonly used operating system on Telenet, and is the easiest to hack since it doesn't record bad login attempts. You know you've found a UNIX system when it gives you a "Login" prompt, and then a "Password" prompt. To get in you should first try the default logins.(Listed below.) If these don't work try some of the passwords listed in Section M. If these don't work try to find backdoors. These are passwords that may have been put in to allow the programmer (or someone else who could be in a position to make a backdoor) to get access into the system. These are usually not known about by anyone but the individual who made it. Try doing some research on the programmer and other people who helped to make the system. And, if these don't work, just try guessing them. The Login (usually the account holders name) has 1-8 characters and the Password is 6-8 characters. Both can be either letters or numbers, or a combination of the two.
  764. Once you get in, you should get a "$" prompt, or some other special character like it. You should only use lower case letters when hacking UNIX, this seems to be standard format. If you type "man [command]" at the prompt, it should list all of the commands for that system. Anyway, here are the default Logins and Passwords:
  765. Login: Password:
  766. root root
  767. root system
  768. sys sys
  769. sys system
  770. daemon daemon
  771. uucp uucp
  772. tty tty
  773. test test
  774. unix unix
  775. unix test
  776. bin bin
  777. adm adm
  778. adm admin
  779. admin adm
  780. admin admin
  781. sysman sysman
  782. sysman sys
  783. sysman system
  784. sysadmin sysadmin
  785. sysadmin sys
  786. sysadmin system
  787. sysadmin admin
  788. sysadmin adm
  789. who who
  790. learn learn
  791. uuhost uuhost
  792. guest guest
  793. host host
  794. nuucp nuucp
  795. rje rje
  796. games games
  797. games player
  798. sysop sysop
  799. root sysop
  800. demo demo
  801. Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things:
  802. /etc/passwd
  803. or
  804. cat /etc/passwd
  805. The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this:
  806. john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john
  807. Broken down, this is what the above password file states:
  808. Username: john
  809. Encrypted Password: 234abc56
  810. User Number: 9999
  811. Group Number: 13
  812. Other Information: John Johnson
  813. Home Directory: /home/dir/john
  814. Shell: /bin/john
  815. If the password file does not show up under one of the above two commands, then it is probably shadowed.
  816. The following definition of password shadowing was taken from the alt.2600 hack faq:
  817. "Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users."
  818. If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using:
  819. UNIX System Type: Path: Token:
  820. AIX 3 /etc/security/passwd !
  821. or /tcb/auth/files/<first letter of #
  822. username>/<username>
  823. A/UX 3.Os /tcb/files/auth/*
  824. BSD4.3-Reno /etc/master.passwd *
  825. ConvexOS 10 /etc/shadpw *
  826. Convex0S 11 /etc/shadow *
  827. DG/UX /etc/tcb/aa/user *
  828. EP/IX /etc/shadow x
  829. HP-UX /.secure/etc/passwd *
  830. IRIX 5 /etc/shadow x
  831. Linux 1.1 /etc/shadow *
  832. OSF/1 /etc/passwd[.dir|.pag] *
  833. SCO UNIX #.2.x /tcb/auth/files/<first letter of *
  834. username>/<username>
  835. SunOS 4.1+c2 /etc/security/passwd.adjunct ##
  836. SunOS 5.0 /etc/shadow
  837. System V 4.0 /etc/shadow x
  838. System V 4.2 /etc/security/* database
  839. Ultrix 4 /etc/auth[.dir|.pag] *
  840. UNICOS /etc/udb *
  841. Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data:
  842. bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob
  843. The characters in the password aging data stand for the following:
  844. 1. Maximum number of weeks a password can be used without changing.
  845. 2. Minimum number of weeks a password must be used before being changed.
  846. 3&4. Last time password was changed, in number of weeks since 1970.
  847. The password aging data can be decoded using the chart below:
  848. Character: Number:
  849. . 0
  850. / 1
  851. 0 2
  852. 1 3
  853. 2 4
  854. 3 5
  855. 4 6
  856. 5 7
  857. 6 8
  858. 7 9
  859. 8 10
  860. 9 11
  861. A 12
  862. B 13
  863. C 14
  864. D 15
  865. E 16
  866. F 17
  867. G 18
  868. H 19
  869. I 20
  870. J 21
  871. K 22
  872. L 23
  873. M 24
  874. N 25
  875. O 26
  876. P 27
  877. Q 28
  878. R 29
  879. S 30
  880. T 31
  881. U 32
  882. V 33
  883. W 34
  884. X 35
  885. Y 36
  886. Z 37
  887. a 38
  888. b 39
  889. c 40
  890. d 41
  891. e 42
  892. f 43
  893. g 44
  894. h 45
  895. i 46
  896. j 47
  897. k 48
  898. l 49
  899. m 50
  900. n 51
  901. o 52
  902. p 53
  903. q 54
  904. r 55
  905. s 56
  906. t 57
  907. u 58
  908. v 59
  909. w 60
  910. x 61
  911. y 62
  912. z 63
  913. Now, explore the system freely, be careful, and have fun!
  914. K. Basic VAX/VMS hacking
  915. The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's:
  916. Username: Password:
  917. SYSTEM OPERATOR
  918. SYSTEM MANAGER
  919. SYSTEM SYSTEM
  920. SYSTEM SYSLIB
  921. OPERATOR OPERATOR
  922. SYSTEST UETP
  923. SYSTEST SYSTEST
  924. SYSTEST TEST
  925. SYSMAINT SYSMAINT
  926. SYSMAINT SERVICE
  927. SYSMAINT DIGITAL
  928. FIELD FIELD
  929. FIELD SERVICE
  930. GUEST GUEST
  931. GUEST unpassworded
  932. DEMO DEMO
  933. DEMO unpassworded
  934. TEST TEST
  935. DECNET DECNET
  936. Here are some of the VAX/VMS commands:
  937. Command: Function:
  938. HELP (H) Gives help and list of commands.
  939. TYPE (T) View contents of a file.
  940. RENAME (REN) Change name of a file.
  941. PURGE (PU) Deletes old versions of a file.
  942. PRINT (PR) Prints a file.
  943. DIRECTORY (DIR) Shows list of files.
  944. DIFFERENCES (DIF) Shows differences between files.
  945. CREATE (CR) Creates a file.
  946. DELETE (DEL) Deletes a file.
  947. COPY (COP) Copy a file to another.
  948. CONTINUE (C) Continues session.
  949. The password file on VAX's are available when you type in the command:
  950. SYS$SYSTEM:SYSUAF.DAT
  951. The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J.
  952. Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced.
  953. But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts.
  954. L. Basic PRIME hacking
  955. PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN <USERNAME>". It should then ask you for your username and password. The default usernames and passwords are listed below:
  956. Username: Password:
  957. PRIME PRIME
  958. PRIME PRIMOS
  959. PRIMOS PRIMOS
  960. PRIMOS PRIME
  961. PRIMOS_CS PRIME
  962. PRIMOS_CS PRIMOS
  963. PRIMENET PRIMENET
  964. SYSTEM SYSTEM
  965. SYSTEM PRIME
  966. SYSTEM PRIMOS
  967. NETLINK NETLINK
  968. TEST TEST
  969. GUEST GUEST
  970. GUEST1 GUEST
  971. When you are inside the system, type "NETLINK" and it ahould give you alot of help. This system uses NUA's, too. I might print these in the next volume.
  972. M. Password List
  973. The password list was taken from A Novice's Guide To Hacking, by The Legion Of Doom, and from some of my own discoveries. Here is the list of commonly used passwords:
  974. Password:
  975. aaa
  976. academia
  977. ada
  978. adrian
  979. aerobics
  980. airplane
  981. albany
  982. albatross
  983. albert
  984. alex
  985. alexander
  986. algebra
  987. alias
  988. alisa
  989. alpha
  990. alphabet
  991. ama
  992. amy
  993. analog
  994. anchor
  995. andy
  996. andrea
  997. animal
  998. answer
  999. anything
  1000. arrow
  1001. arthur
  1002. ass
  1003. asshole
  1004. athena
  1005. atmosphere
  1006. bacchus
  1007. badass
  1008. bailey
  1009. banana
  1010. bandit
  1011. banks
  1012. bass
  1013. batman
  1014. beautiful
  1015. beauty
  1016. beaver
  1017. daniel
  1018. danny
  1019. dave
  1020. deb
  1021. debbie
  1022. deborah
  1023. december
  1024. desire
  1025. desperate
  1026. develop
  1027. diet
  1028. digital
  1029. discovery
  1030. disney
  1031. dog
  1032. drought
  1033. duncan
  1034. easy
  1035. eatme
  1036. edges
  1037. edwin
  1038. egghead
  1039. eileen
  1040. einstein
  1041. elephant
  1042. elizabeth
  1043. ellen
  1044. emerald
  1045. engine
  1046. engineer
  1047. enterprise
  1048. enzyme
  1049. euclid
  1050. evelyn
  1051. extension
  1052. fairway
  1053. felicia
  1054. fender
  1055. finite
  1056. format
  1057. god
  1058. hello
  1059. idiot
  1060. jester
  1061. john
  1062. johnny
  1063. joseph
  1064. joshua
  1065. judith
  1066. juggle
  1067. julia
  1068. kathleen
  1069. kermit
  1070. kernel
  1071. knight
  1072. lambda
  1073. larry
  1074. lazarus
  1075. lee
  1076. leroy
  1077. lewis
  1078. light
  1079. lisa
  1080. louis
  1081. love
  1082. lynne
  1083. mac
  1084. macintosh
  1085. mack
  1086. maggot
  1087. magic
  1088. malcolm
  1089. mark
  1090. markus
  1091. martin
  1092. marty
  1093. marvin
  1094. matt
  1095. master
  1096. maurice
  1097. maximum
  1098. merlin
  1099. mets
  1100. michael
  1101. michelle
  1102. mike
  1103. minimum
  1104. nicki
  1105. nicole
  1106. rascal
  1107. really
  1108. rebecca
  1109. remote
  1110. rick
  1111. reagan
  1112. robot
  1113. robotics
  1114. rolex
  1115. ronald
  1116. rose
  1117. rosebud
  1118. rosemary
  1119. roses
  1120. ruben
  1121. rules
  1122. ruth
  1123. sal
  1124. saxon
  1125. scheme
  1126. scott
  1127. secret
  1128. sensor
  1129. serenity
  1130. sex
  1131. shark
  1132. sharon
  1133. shit
  1134. shiva
  1135. shuttle
  1136. simon
  1137. simple
  1138. singer
  1139. single
  1140. singing
  1141. smile
  1142. smooch
  1143. smother
  1144. snatch
  1145. snoopy
  1146. soap
  1147. socrates
  1148. spit
  1149. spring
  1150. subway
  1151. success
  1152. summer
  1153. super
  1154. support
  1155. surfer
  1156. suzanne
  1157. tangerine
  1158. tape
  1159. target
  1160. taylor
  1161. telephone
  1162. temptation
  1163. tiger
  1164. tigger
  1165. toggle
  1166. tomato
  1167. toyota
  1168. trivial
  1169. unhappy
  1170. unicorn
  1171. unknown
  1172. urchin
  1173. utility
  1174. vicki
  1175. virgin
  1176. virginia
  1177. warren
  1178. water
  1179. weenie
  1180. whatnot
  1181. whitney
  1182. will
  1183. william
  1184. winston
  1185. willie
  1186. wizard
  1187. wonbat
  1188. yosemite
  1189. zap
  1190. N. Connecting modems to different phone lines
  1191. Ok, if you are really paranoid (or smart) and you don't want to hack from your house for fear of getting caught, you can hook up your modem to other peoples phone lines or to payphones.
  1192. If you want to hook your modem to a payphone, do it late at night and at a very secluded payphone. Look along either side of the phone. You should see a small metal tube (which contains the telephone wires) running along the wall. Somewhere along the tube it should widen out into a small box. Pop off the boxes lid and there is a nice little phone jack for ya'. Taking off the lid may be difficult because they are usually pretty secure, but nothing is impossible, so keep trying. Of course, you can only do this with a lap-top computer.
  1193. Now, if you want to hook up the modem to someone's house or appartment phone line, you need to get a pair of red and green alligator clips, and an extra modem cord for your lap-top.
  1194. After you get those parts, cut the plastic end off of your modem cord and you will see a red wire, a green wire, and two other wires, but you can ignore those. Attach the red alligator clip to the red wire, and attach the green alligator clip to the green wire and you're all set. Now all you need to do is go find a telephone pole or one of those small green boxes that stick out of the ground.(They should have a Bell Systems logo on them.)
  1195. On a telephone pole open the little box that has a bunch of wires going to and from it. On the right side of the box you should see what look like two large screws.(These are called "terminals".) One should have a red wire wrapped around it and the other should have a green wire wrapped around it. Attach the red alligator clip the the red wire and the green alligator clip to the green wire, and you're all set. This should get you a dial tone. If it doesn't, make sure that the alligator clips are not touching each other, and that the alligator clips are attached to the exposed end of the wire.
  1196. Now, on those green boxes you need to undo all of the screws and shit holding the lid on, and open it up. Then you should find basically the same setup as in the telephone pole. Attach the appropriate wires to the appropriate terminals and you are all set.
  1197. This process can also be used to hook up a Beige Box (Lineman's Handset.) when phreaking.
  1198. O. Viruses, Trojans, and Worms
  1199. Just in case some of you are interested, here are the definitions for Viruses, Trojans, and Worms. These definitions were taken from the alt.2600 hack faq.
  1200. Trojan:
  1201. "Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans."
  1202. Virus:
  1203. "A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore."
  1204. Worm:
  1205. "Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."
  1206. II. PHREAKING
  1207. A. What is phreaking
  1208. Phreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls. In the following sections, you will learn some about boxes, what they are, and how they work. You will also learn about the other forms of phreaking.
  1209. B. Why phreak?
  1210. Phreaking, like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information.
  1211. C. Phreaking rules
  1212. Most of the same rules apply for hacking and phreaking, so I will only list a few here.
  1213. 1. Never box over your home phone line.
  1214. 2. You should never talk about phreaking projects over your home phone line.
  1215. 3. Never use your real name when phreaking.
  1216. 4. Be careful who you tell about your phreaking projects.
  1217. 5. Never leave phreaking materials out in the open. Keep them in a safe place.
  1218. 6. Don't get caught.
  1219. D. Where and how to start phreaking
  1220. Well, you can phreak on any telephone, but as stated above, it is very stupid to do so on your home phone line.
  1221. First you need you need to construct the boxes needed for what you want to do. All of the boxes and their descriptions are listed in the next section. Most of the boxes are very easy to make, but if your not into making shit, there are usually alternative ways of making them.
  1222. E. Boxes and what they do
  1223. Box: Description:
  1224. Red Box generates tones for free phone calls
  1225. Black Box when called, caller pays nothing
  1226. Beige Box lineman's handset
  1227. Green Box generates coin return tones
  1228. Cheese Box turns your phone into a payphone
  1229. Acrylic Box steal 3-way calling and other services
  1230. Aqua Box stops F.B.I. lock-in-trace
  1231. Blast Box phone microphone amplifier
  1232. Blotto Box shorts out all phones in your area
  1233. Blue Box generates 2600hz tone
  1234. Brown Box creates party line
  1235. Bud Box tap neighbors phone
  1236. Chatreuse Box use electricity from phone
  1237. Chrome Box manipulates traffic signals
  1238. Clear Box free calls
  1239. Color Box phone conversation recorder
  1240. Copper Box causes crosstalk interference
  1241. Crimson Box hold button
  1242. Dark Box re-route calls
  1243. Dayglo Box connect to neighbors phone line
  1244. Divertor Box re-route calls
  1245. DLOC Box create party line
  1246. Gold Box dialout router
  1247. Infinity Box remote activated phone tap
  1248. Jack Box touch-tone key pad
  1249. Light Box in-use light
  1250. Lunch Box AM transmitter
  1251. Magenta Box connect remote phone line to another
  1252. Mauve Box phone tap without cutting into the line
  1253. Neon Box external microphone
  1254. Noise Box creates line noise
  1255. Olive Box external ringer
  1256. Party Box creates party line
  1257. Pearl Box tone generator
  1258. Pink Box creates party line
  1259. Purple Box hold button
  1260. Rainbow Box kill trace
  1261. Razz Box tap neighbors phone
  1262. Rock Box add music to phone line
  1263. Scarlet Box causes interference
  1264. Silver Box create DTMF tones for A,B,C, and D
  1265. Static Box raises voltage on phone line
  1266. Switch Box add services
  1267. Tan Box phone conversation recorder
  1268. TV Cable Box see sound waves on TV
  1269. Urine Box create disturbance on phone headset
  1270. Violet Box stop payphone from hanging up
  1271. White Box DTMF key pad
  1272. Yellow Box add line extension
  1273. F. Box Plans
  1274. The Red Box is the main tool that you will use so I have included the Red Box plans. The other box plans can be downloaded from the Internet.
  1275. Red Box:
  1276. There are two ways that you can make a Red Box:
  1277. One is to go to Radio Shack and buy a tone dialer and a 6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you can order them from the electronics companies that I have listed at the end of this section.) Open up the tone dialer and replace the existing crystal (big, shiny, metal thing labeled "3.579545Mhz") with the 6.5536Mhz crystal. Now, close it up. You have a red box.
  1278. To use it for long distance calls play the tones that add up to the amount of money that the operator requests. For a 25 cents tone press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press 1 *.
  1279. And, the second way, which is a much easier method, is to get the Red Box tones from a phreaking program, such as: Omnibox, or Fear's Phreaker Tools. Play the tones as you hold a microcassette recorder about 1-inch away from your computer speakers, and record the tones.
  1280. The Red Box only works on public telephones, it does not work on COCOT's.(Defined in next section.) It makes the telephone think that you have put money in. Red Boxes do not work on local calls because the phone is not using ACTS (Automated Coin Toll System), unless you call the operator and have her place the call for you. You tell her the number that you want to dial and then when she asks you to put in your money, play the tones. If she asks you why you need her to place the call tell her that one of the buttons is smashed in or something like that. You now have and know how to use a Red Box!
  1281. Electronics Companies:
  1282. Alltronics
  1283. 2300 Zanker Road
  1284. San Jose, CA 95131
  1285. (408)943-9774 -Voice-
  1286. (408)943-9776 -Fax-
  1287. Blue Saguaro
  1288. P.O. Box 37061
  1289. Tucson, AZ 85740
  1290. Mouser
  1291. (800)346-6873
  1292. Unicorn Electronics
  1293. 10000 Canoga Ave. Unit C-2
  1294. Chatsworth, CA 91311
  1295. 1-800-824-3432
  1296. G. Free calling from COCOT's
  1297. First of all, COCOT stands for "Customer Owned Customer Operated Telephone". These are most likely to be found at resteraunts, amusement parks, etc.
  1298. All you have to do to make a free call from a COCOT is dial a 1-800 number (they let you do this for free), say some bullshit and get them to hang up on you. Stay on the line after they hang up, then dial the number that you want to call.
  1299. This may not work by the time you read this because COCOT owners are becoming more aware of us every day.
  1300. H. ANAC numbers
  1301. ANAC stands for "Automated Number Announcment Circuit". In other words, you call the ANAC number in your area and it tells you the number that you are calling from. This is useful when Beige Boxing, or hooking your modem up to other phone lines, to find out what number you are using. The "?" are substituted for unknown numbers. Do some scanning to find them out. Here are the ANAC numbers for the U.S.A. with their area code, and the only one I knew of in the U.K.:
  1302. U.S.A.:
  1303. Area Code: ANAC Number:
  1304. 201 958
  1305. 202 811
  1306. 203 970
  1307. 205 300-222-2222
  1308. 205 300-555-5555
  1309. 205 300-648-1111
  1310. 205 300-765-4321
  1311. 205 300-798-1111
  1312. 205 300-833-3333
  1313. 205 557-2311
  1314. 205 811
  1315. 205 841-1111
  1316. 205 908-222-2222
  1317. 206 411
  1318. 207 958
  1319. 209 830-2121
  1320. 209 211-9779
  1321. 210 830
  1322. 212 958
  1323. 213 114
  1324. 213 1223
  1325. 213 211-2345
  1326. 213 211-2346
  1327. 213 760-2???
  1328. 213 61056
  1329. 214 570
  1330. 214 790
  1331. 214 970-222-2222
  1332. 214 970-611-1111
  1333. 215 410-????
  1334. 215 511
  1335. 215 958
  1336. 216 200-????
  1337. 216 331
  1338. 216 959-9968
  1339. 217 200-???-????
  1340. 219 550
  1341. 219 559
  1342. 301 958-9968
  1343. 310 114
  1344. 310 1223
  1345. 310 211-2345
  1346. 310 211-2346
  1347. 312 200
  1348. 312 290
  1349. 312 1-200-8825
  1350. 312 1-200-555-1212
  1351. 313 200-200-2002
  1352. 313 200-222-2222
  1353. 313 200-???-????
  1354. 313 200200200200200
  1355. 314 410-????
  1356. 315 953
  1357. 315 958
  1358. 315 998
  1359. 317 310-222-2222
  1360. 317 559-222-2222
  1361. 317 743-1218
  1362. 334 5572411
  1363. 334 5572311
  1364. 401 200-200-4444
  1365. 401 222-2222
  1366. 402 311
  1367. 404 311
  1368. 404 940-???-????
  1369. 404 940
  1370. 405 890-7777777
  1371. 405 897
  1372. 407 200-222-2222
  1373. 408 300-???-????
  1374. 408 760
  1375. 408 940
  1376. 409 951
  1377. 409 970-????
  1378. 410 200-6969
  1379. 410 200-555-1212
  1380. 410 811
  1381. 412 711-6633
  1382. 412 711-4411
  1383. 412 999-????
  1384. 413 958
  1385. 413 200-555-5555
  1386. 414 330-2234
  1387. 415 200-555-1212
  1388. 415 211-2111
  1389. 415 2222
  1390. 415 640
  1391. 415 760-2878
  1392. 415 7600-2222
  1393. 419 311
  1394. 502 200-2222222
  1395. 502 997-555-1212
  1396. 503 611
  1397. 503 999
  1398. 504 99882233
  1399. 504 201-269-1111
  1400. 504 998
  1401. 504 99851-0000000000
  1402. 508 958
  1403. 508 200-222-1234
  1404. 508 200-222-2222
  1405. 508 26011
  1406. 509 560
  1407. 510 760-1111
  1408. 512 830
  1409. 512 970-????
  1410. 515 5463
  1411. 515 811
  1412. 516 958
  1413. 516 968
  1414. 517 200-222-2222
  1415. 517 200200200200200
  1416. 518 511
  1417. 518 997
  1418. 518 998
  1419. 603 200-222-2222
  1420. 606 997-555-1212
  1421. 606 711
  1422. 607 993
  1423. 609 958
  1424. 610 958
  1425. 610 958-4100
  1426. 612 511
  1427. 614 200
  1428. 614 517
  1429. 615 200200200200200
  1430. 615 2002222222
  1431. 615 830
  1432. 616 200-222-2222
  1433. 617 200-222-1234
  1434. 617 200-222-2222
  1435. 617 200-444-4444
  1436. 617 220-2622
  1437. 617 958
  1438. 618 200-???-????
  1439. 618 930
  1440. 619 211-2001
  1441. 619 211-2121
  1442. 703 811
  1443. 704 311
  1444. 707 211-2222
  1445. 708 1-200-555-1212
  1446. 708 1-200-8825
  1447. 708 200-6153
  1448. 708 724-9951
  1449. 708 356-9646
  1450. 713 380
  1451. 713 970-????
  1452. 713 811
  1453. 714 114
  1454. 714 211-2121
  1455. 714 211-2222
  1456. 716 511
  1457. 716 990
  1458. 717 958
  1459. 718 958
  1460. 802 2-222-222-2222
  1461. 802 200-222-2222
  1462. 802 1-700-222-2222
  1463. 802 111-2222
  1464. 805 114
  1465. 805 211-2345
  1466. 805 211-2346
  1467. 805 830
  1468. 806 970-????
  1469. 810 200200200200200
  1470. 812 410-555-1212
  1471. 813 311
  1472. 815 200-???-????
  1473. 817 290
  1474. 817 211
  1475. 818 970-611-1111
  1476. 818 1223
  1477. 818 211-2345
  1478. 903 211-2346
  1479. 904 970-611-1111
  1480. 906 200-222-222
  1481. 907 1-200-222-2222
  1482. 907 811
  1483. 908 958
  1484. 910 200
  1485. 910 311
  1486. 910 988
  1487. 914 990-1111
  1488. 915 970-????
  1489. 916 211-2222
  1490. 916 461
  1491. 919 200
  1492. 919 711
  1493. U.K.:
  1494. 175
  1495. III. REFERENCE
  1496. A. Hacking and phreaking WWW. sites
  1497. Here is a list of some World Wide Web sites that contain hacking, phreaking, computer, virus, carding, security, etc. material:
  1498. Site Address:
  1499. http://www.outerlimits.net/lordsome/index.html (Hacker's Layer)
  1500. http://web2.airmail.net/km/hfiles/free.htm (Hacker's Hideout)
  1501. http://resudox.net/bio/novell.html
  1502. http://www.louisville.edu/wrbake01/hack2.html
  1503. http://www.intersurf.com/~materva/files.html
  1504. http://hightop.nrl.navy.mil/rainbow.html
  1505. http://www.rit.edu/~jmb8902/hacking.html
  1506. http://www.spatz.com/pecos/index.html
  1507. http://pages.prodigy.com/FL/dtgz94a/files2.html
  1508. http://www.2600.com (alt.2600)
  1509. http://att.net/dir800
  1510. http://draco.centerline.com:8080/~franl/crypto.html
  1511. http://everest.cs.ucdavis.edu/Security.html
  1512. http://ice-www.larc.nasa.gov/WWW/security.html
  1513. http://lOpht.com (lOpht)
  1514. http://lOpht.com/~oblivion/IIRG.html
  1515. http://underground.org
  1516. http://www.alw.nih.gov/WWW/security.html
  1517. http://www.aspentec.com/~frzmtdb/fun/hacker.html
  1518. http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
  1519. http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
  1520. http://www.engin.umich.edu/~jgotts/underground/boxes.html
  1521. http://www.etext.org/Zines
  1522. http://www.inderect.com/www/johnk/
  1523. http://www.mgmua.com/hackers/index.html
  1524. http://www.paranoia.com/mthreat
  1525. http://www.paranoia.com/astrostar/fringe.html
  1526. http://www.umcc.umich.edu/~doug/virus-faq.html
  1527. http://www.wired.com
  1528. B. Good hacking and phreaking text files
  1529. All of these files are available by download from the Internet.
  1530. File Name:
  1531. A Novice's Guide To Hacking
  1532. Alt.2600 Hack Faq
  1533. The Hacker's Handbook
  1534. The Official Phreaker's Manual
  1535. Rainbow Books (Listed in Section D.)
  1536. The Hacker Crackdown
  1537. Computer Hackers: Rebels With A Cause
  1538. The Legion Of Doom Technical Journals
  1539. The Ultimate Beginner's Guide To Hacking And Phreaking (Of course!)
  1540. C. Hacking and phreaking Newsgroups
  1541. alt.2600
  1542. alt.2600.hope.tech
  1543. alt.cellular
  1544. alt.cellular-phone-tech
  1545. alt.comp.virus
  1546. alt.cracks
  1547. alt.cyberpunk
  1548. alt.cyberspace
  1549. alt.dcom.telecom
  1550. alt.fan.lewiz
  1551. alt.hackers
  1552. alt.hackintosh
  1553. alt.hackers.malicious
  1554. alt.security
  1555. D. Rainbow Books
  1556. The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:
  1557. Infosec Awareness Division
  1558. ATTN: x711/IAOC
  1559. Fort George G. Meade, MD 20755-6000
  1560. or call:
  1561. (410)766-8729
  1562. Here is the list of all the Rainbow Books and their descriptions:
  1563. Color: Description:
  1564. Orange 1 D.O.D. Trusted Computer Systems
  1565. Green D.O.D. Password Management
  1566. Yellow Computer Security Requirements
  1567. Yellow 2 Computer Security Requirements
  1568. Tan Understanding Audit In Trusted Systems
  1569. Bright Blue Trusted Product Evaluation
  1570. Neon Orange Understanding Discretionary Access
  1571. Teal Green Glossary Of Computer Terms
  1572. Orange 2 Understanding Configurations
  1573. Red Interpretation Of Evaluation
  1574. Burgundy Understanding Design Documentation
  1575. Dark Lavender Understanding Trusted Distrobution
  1576. Venice Blue Computer Security Sub-Systems
  1577. Aqua Understanding Security Modeling
  1578. Dark Red Interpretations Of Environments
  1579. Pink Rating Maintenence Phase
  1580. Purple Formal Verification Systems
  1581. Brown Understanding Trusted Facilities
  1582. Yellow-Green Writing Trusted Facility Manuals
  1583. Light Blue Understanding Identification And Authentication In Trusted Systems
  1584. Blue Product Evaluation Questionaire
  1585. Gray Selecting Access Control List
  1586. Lavander Data Base Management Interpretation
  1587. Yellow 3 Understanding Trusted Recovery
  1588. Bright Orange Understanding Security Testing
  1589. Purple 1 Guide To System Procurement
  1590. Purple 2 Guide To System Procurement
  1591. Purple 3 Guide To System Procurement
  1592. Purple 4 Guide To System Procurement
  1593. Green Understanding Data Remanence
  1594. Hot Peach Writing Security Features
  1595. Turquiose Understanding Information Security
  1596. Violet Controlled Access Protection
  1597. Light Pink Understanding Covert Channels
  1598. E. Cool hacking and phreaking magazines
  1599. Phrack Magazine
  1600. 2600 Magazine
  1601. Tap Magazine
  1602. Phantasy Magazine
  1603. F. Hacking and phreaking movies
  1604. Movie:
  1605. Hackers
  1606. War Games
  1607. G. Hacking and phreaking Gopher sites
  1608. Address:
  1609. ba.com
  1610. csrc.ncsl.nist.gov
  1611. gopher.acm.org
  1612. gopher.cpsr.org
  1613. gopher.cs.uwm
  1614. gopher.eff.org
  1615. oss.net
  1616. spy.org
  1617. wiretap.spies.com
  1618. H. Hacking and phreaking Ftp sites
  1619. Address:
  1620. 2600.com
  1621. agl.gatech.edu/pub
  1622. asylum.sf.ca.us
  1623. clark.net/pub/jcase
  1624. ftp.armory.com/pub/user/kmartind
  1625. ftp.armory.com/pub/user/swallow
  1626. ftp.fc.net/pub/defcon/BBEEP
  1627. ftp.fc.net/pub/phrack
  1628. ftp.giga.or.at/pub/hacker
  1629. ftp.lava.net/users/oracle
  1630. ftp.microserve.net/ppp-pop/strata/mac
  1631. ftp.near.net/security/archives/phrack
  1632. ftp.netcom.com/pub/br/bradelym
  1633. ftp.netcom.com/pub/daemon9
  1634. ftp.netcom.com/pub/zz/zzyzx
  1635. ftp.primenet.com/users/k/kludge
  1636. I. Hacking and phreaking BBS's
  1637. BBS's are Bulletin Board Systems on which hackers and phreakers can post messages to each other.
  1638. Here is a list of some BBS's that I know of. If you know of any other BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note that some of these may be old and not running.
  1639. Area Code: Phone Number: Name:
  1640. 203 832-8441 Rune Stone
  1641. 210 493-9975 The Truth Sayer's Domain
  1642. 303 343-4053 Hacker's Haven
  1643. 315 656-5135 Independent Nation
  1644. 315 656-5135 UtOPiA 617 855-2923 Maas-Neotek
  1645. 708 676-9855 Apocalypse 2000
  1646. 713 579-2276 KOdE AbOdE
  1647. 806 747-0802 Static Line
  1648. 908 526-4384 Area 51
  1649. 502 499-8933 Blitzkrieg
  1650. 510 935-5845 ...Screaming Electron
  1651. 408 747-0778 The Shrine
  1652. 708 459-7267 The Hell Pit
  1653. 415 345-2134 Castle Brass
  1654. 415 697-1320 7 Gates Of Hell
  1655. J. Cool hackers and phreakers
  1656. Yes there are many, many, cool hackers and phreakers out there, but these are some that
  1657. helped me to get this file out on the Internet. I did not list a few people because I only
  1658. knew their real name, and I don't want to use their real name without their permission.
  1659. Handle:
  1660. Silicon Toad
  1661. Logik Bomb/Net Assasin
  1662. oleBuzzard
  1663. Lord Somer
  1664. Weezel
  1665. Thanks for your help guys.
  1666. K. Hacker's Manifesto
  1667. "This is our world now...the world of the electron and the switch, the beauty of the baud.
  1668. We make use of a service already existing without paying for what could be dirt cheep if it
  1669. wasn't run by profiteering gluttons, and you call us criminals. We explore...and you call us
  1670. criminals. We exist without skin color, without nationality, without religious bias...and you
  1671. call us criminals. You build atomic bombs, wage wars, murder, cheat, and lie to us and try to
  1672. make us believe it is for our own good, yet we're the criminals.
  1673. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by
  1674. what they say and think, not what they look like. My crime is that of outsmarting you, something
  1675. that you will never forgive me for. I am a hacker and this is my manifesto. You may stop this
  1676. individual, but you can't stop us all...after all, we're all alike."
  1677. +++The Mentor+++
  1678. K. Happy hacking!
  1679. Be careful and have fun. Remember to keep your eye out for the next volume of
  1680. The Ultimate Beginner's Guide To Hacking And Phreaking and the Legion Of the Apocalypse
  1681. W.W.W. page. Oh, and keep looking for our on-line magazine, too, it should be coming out
  1682. soon. Well, I hope you enjoyed the file and found it informative. I also hope that I
  1683. helped get you started in hacking and phreaking.
  1684. "The Revelation is here."
  1685. *-Revelation-*
  1686. LOA--ASH
  1687. EOF

comments powered by Disqus