This document was written in Windows 95 Word Pad. The title
above, and some of the text looks a little screwed up when read in
anything else, so read it in Word Pad.
Anyway, for those of you who are wondering "what do the letters
"LOA" under his handle stand for?" Well, LOA stands for Legion Of the
Apocalypse, which is a group of elite hackers and phreakers in my area.
The current members of LOA are:
Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and
Phreak Show
I started LOA when I discovered that there were many good
hackers and phreakers in my area. I thought that an organized group of
hackers and phreakers would accomplish much more than an individual
could by himself. Thus the Legion Of the Apocalypse was formed and has
been around for a while since. Our main goal is to show the public
what hacking and phreaking is all about and to reveal confidential
information to the hacking/phreaking community so that we can learn
more about computers, telephones, electronics, etc. We are hoping to
get our own World Wide Web page soon, so keep an eye out for it. It
will contain all of the hacking, phreaking, computer, telephone,
security, electronics, virus, and carding information that you could
possibly want.
Also, if some of you are wondering why I chose the word
Revelation as my handle, well, Revelation means revealing or
unveiling, which is exactly what I intend to do as a hacker/phreaker.
I intend to reveal all the information that I can gather while
hacking and phreaking.
Anyway, I wrote this document because I have read all the files
that I could get my hands on and noticed that there has never been a
really good file written that guided beginning hackers and phreakers
step by step.
When I began hacking and started reading all of the beginner
files, I still had many un-answered questions. My questions were
eventually answered, but only through LOTS of reading and practice.
In this file, I hope to give basic step by step instructions that will
help beginning hackers and phreakers get started. But, DO NOT think
that this will save you from having to read alot. If you want to be a
hacker/phreaker, reading is the most important thing you can do. You
will have to do ALOT of reading no matter what.
This document was intended for beginners, but it can also be used
as a reference tool for advanced hackers and phreakers.
Please distribute this document freely. Give it to anyone that
you know who is interested in hacking and/or phreaking. Post it on your
World Wide Web page, Ftp sites, and BBS's. Do whatever you want with it
as long as it stays UNCHANGED.
As far as I know, this is the most complete and in depth beginners
guide available, that is why I wrote it. Also, I plan to have new
volumes come out whenever there has been a significant change in the
material provided, so keep an eye out for them. LOA is planning on
starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "an641839@anon.penet.fi".
This document is divided into three main sections with many
different sub-sections in them. The Table Of Contents is below:
Table Of Contents:
I. HACKING
A. What is hacking?
B. Why hack?
C. Hacking rules
D. Getting started
E. Where and how to start hacking
F. Telenet commands
G. Telenet dialups
H. Telenet DNIC's
I. Telenet NUA's
J. Basic UNIX hacking
K. Basic VAX/VMS hacking
L. Basic PRIME hacking
M. Password list
N. Connecting modems to different phone lines
O. Viruses, Trojans, and Worms
II. PHREAKING
A. What is phreaking?
B. Why phreak?
C. Phreaking rules
D. Where and how to start phreaking
E. Boxes and what they do
F. Red Box plans
G. Free calling from COCOT's
H. ANAC numbers
III. REFERENCE
A. Hacking and phreaking W.W.W. pages
B. Good hacking and phreaking text files
C. Hacking and phreaking Newsgroups
D. Rainbow Books
E. Hacking and phreaking magazines
F. Hacking and phreaking movies
G. Hacking and phreaking Gopher sites
H. Hacking and phreaking Ftp sites
I. Hacking and phreaking BBS's
J. Cool hackers and phreakers
K. Hacker's Manifesto
L. Happy hacking!
* DISCLAIMER *
"Use this information at your own risk. I Revelation, nor any
other member of LOA, nor the persons providing this file, will NOT
assume ANY responsibility for the use, misuse, or abuse, of the
information provided herein. The following information is provided for
educational purposes ONLY. The informaion is NOT to be used for illegal
purposes. By reading this file you ARE AGREEING to the following terms:
I understand that using this information is illegal. I agree to, and
understand, that I am responsible for my own actions. If I get into
trouble using this information for the wrong reasons, I promise not
to place the blame on Revelation, LOA, or anyone that provided this
file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.
This file is basically a compilation of known hacking and
phreaking information and some information gathered from my own
experience as a hacker/phreaker. I have tried to make sure that
everything excerpted from other documents was put in quotes and labeled
with the documents name, and if known, who wrote it. I am sorry if any
mistakes were made with quoted information."
*-Revelation-*
LOA
I. HACKING
A. What is hacking?
Hacking is the act of penetrating computer systems to gain
knowledge about the system and how it works.
Hacking is illegal because we demand free access to ALL data, and
we get it. This pisses people off and we are outcasted from society, and
in order to stay out of prison, we must keep our status of being a
hacker/phreaker a secret. We can't discuss our findings with anyone but
other members of the hacking/phreaking community for fear of being
punished. We are punished for wanting to learn. Why is the government
spending huge amounts of time and money to arrest hackers when there are
other much more dangerous people out there. It is the murderers,
rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.
There are only two ways to get rid of hackers and phreakers.
One is to get rid of computers and telephones, in which case we would
find other means of getting what we want.(Like that is really going to
happen.) The other way is to give us what we want, which is free access
to ALL information. Until one of those two things happen, we are not
going anywhere.
B. Why hack?
As said above, we hack to gain knowledge about systems and the
way they work. We do NOT want to damage systems in any way. If you do
damage a system, you WILL get caught. But, if you don't damage
anything, it is very unlikely that you will be noticed, let alone be
tracked down and arrested, which costs a considerable amount of time
and money.
Beginners should read all the files that they can get their
hands on about anything even remotely related to hacking and phreaking,
BEFORE they start hacking. I know it sounds stupid and boring but it
will definetly pay off in the future. The more you read about hacking
and phreaking, the more unlikely it is that you will get caught. Some
of the most useless pieces of information that you read could turn out
to be the most helpful. That is why you need to read everything
possible.
C. Hacking rules
1.Never damage any system. This will only get you into trouble.
2.Never alter any of the systems files, except for those needed to
insure that you are not detected, and those to insure that you have
access into that computer in the future.
3.Do not share any information about your hacking projects with
anyone but those you'd trust with your life.
4.When posting on BBS's (Bulletin Board Systems) be as vague as
possible when describing your current hacking projects. BBS's CAN
be monitered by law enforcement.
5.Never use anyone's real name or real phone number when posting
on a BBS.
6.Never leave your handle on any systems that you hack in to.
7.DO NOT hack government computers.
8.Never speak about hacking projects over your home telephone line.
9.Be paranoid. Keep all of your hacking materials in a safe place.
10.To become a real hacker, you have to hack. You can't just sit
around reading text files and hanging out on BBS's. This is not what
hacking is all about.
D. Getting started
The very first thing you need to do is get a copy of PKZIP
or some other file unzipping utility. Nearly everything that you
download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip".
Then you need to get yourself a good prefix scanner.(also known
as a War Dialer) This is a program that automatically dials phone
numbers beginning with the three numbers (prefix) that you specify. It
checks to see if the number dialed has a carrier.(series of beeps that
tells you that you have dialed a computer) Try and find a large
business area prefix to scan. It is these businesses that have
interesting computers. There are many good scanners out there, but I
would recommend Autoscan or A-Dial. These are very easy to use and get
the job done quickly and efficiently.
E. Where and how to start hacking
After you get yourself a good scanner, scan some prefixes and
find some cool dialups, then do the following: From your terminal,
dial the number you found. Then you should hear a series of beeps
(carrier) which tells you that you are connecting to a remote computer.
It should then say something like "CONNECT 9600" and then identify the
system that you are on. If nothing happens after it says "CONNECT 9600"
try hitting enter a few times. If you get a bunch of garbage adjust your
parity, data bits, stop bits, baud rate, etc., until it becomes clear.
That is one way of connecting to a remote computer. Another way is
through Telenet or some other large network.
Telenet is a very large network that has many other networks and
remote computers connected to it.
Ok, here is how you would connect to a remote computer through
Telenet:
First, you get your local dialup(phone number) from the list that
I have provided in Section G. Then you dial the number from your
terminal and connect.(If you get a bunch of garbage try changing your
parity to odd and your data bits to 7, this should clear it up.) If
it just sits there hit enter and wait a few seconds, then hit enter
again. Then it will say "TERMINAL=" and you type in your terminal
emulation. If you don't know what it is just hit enter. Then it will
give you a prompt that looks like "@". From there you type "c" and then
the NUA (Network User Address) that you want to connect to. After you
connect to the NUA, the first thing you need to do is find out what type
of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.)
There are other things that you can do on Telenet besides
connecting to an NUA. Some of these commands and functions are listed in
the next section.
You can only connect to computers which accept reverse charging.
The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password.
Telenet is probably the safest place to start hacking because of
the large numbers of calls that they get. Make sure you call during
business hours (late morning or early afternoon) so there are many
other people on-line.
F. Telenet commands
Here is a list of some Telenet commands and their functions. This
is only a partial list. Beginners probably won't use these commands,
but I put them here for reference anyway.
COMMANDFUNCTION
cConnect to a host.
statShows network port.
fullNetwork echo.
halfTerminal echo.
telemailMail.(need ID and password)
mailMail.(need ID and password)
setSelect PAD parameters
contContinue.
dDisconnect.
hangupHangs up.
accessTelenet account.(ID and password)
G. Telenet dialups
Here is the list of all the Telenet dialups that I know of in
the U.S.A., including the city, state, and area code:
STATE,CITY:AREA CODE:NUMBER:
AL, Anniston205236-9711
AL, Birmingham205328-2310
AL, Decatur205355-0206
AL, Dothan205793-5034
AL, Florence205767-7960
AL, Huntsville205539-2281
AL, Mobile205432-1680
AL, Montgomery205269-0090
AL, Tuscaloosa205752-1472
AZ, Phoenix602254-0244
AZ, Tucson602747-0107
AR, Ft.Smith501782-2852
AR, Little Rock501327-4616
CA, Bakersfield805327-8146
CA, Chico916894-6882
CA, Colton714824-9000
CA, Compton213516-1007
CA, Concord415827-3960
CA, Escondido619741-7756
CA, Eureka707444-3091
CA, Fresno209233-0961
CA, Garden Grove714898-9820
CA, Glendale818507-0909
CA, Hayward415881-1382
CA, Los Angeles213624-2251
CA, Marina Del Rey213306-2984
CA, Merced209383-2557
CA, Modesto209576-2852
CA, Montery408646-9092
CA, Norwalk213404-2237
CA, Oakland415836-4911
CA, Oceanside619430-0613
CA, Palo Alto415856-9995
CA, Pomona714626-1284
CA, Sacramento916448-6262
CA, Salinas408443-4940
CA, San Carlos415591-0726
CA, San Diego619233-0233
CA, San Francisco415956-5777
CA, San Jose408294-9119
CA, San Pedro213548-6141
CA, San Rafael415472-5360
CA, San Ramon415829-6705
CA, Santa Ana714558-7078
CA, Santa Barbara805682-5361
CA, Santa Cruz408429-6937
CA, Santa Rosa707656-6760
CA, Stockton209957-7610
CA, Thousand Oaks805495-3588
CA, Vallejo415724-4200
CA, Ventura805656-6760
CA, Visalia209627-1201
CA, West Covina818915-5151
CA, Woodland Hills818887-3160
C0, Colorado719635-5361
CO, Denver303337-6060
CO, Ft. Collins303493-9131
CO, Grand Junction303241-3004
CO, Greeley303352-8563
CO, Pueblo719542-4053
CT, Bridgeport203335-5055
CT, Danbury203794-9075
CT, Hartford203247-9479
CT, Middletown203344-8217
CT, New Britain203225-7027
CT, New Haven203624-5954
CT, New London203447-8455
CT, Norwalk203866-7404
CT, Stamford203348-0787
CT, Waterbury203753-4512
DE, Dover302678-8328
DE, Newark302454-7710
DC, Washington202429-7896
DC, Washington202429-7800
FL, Boca Raton407338-3701
FL, Cape Coral813275-7924
FL, Cocoa Beach407267-0800
FL, Daytona Beach904255-2629
FL, Ft. Lauderdale305764-4505
FL, Gainsville904338-0220
FL, Jacksonville904353-1818
FL, Lakeland813683-5461
FL, Melbourne407242-8247
FL, Miami305372-0230
FL, Naples813263-3033
FL, Ocala904351-3790
FL, Orlando407422-4099
FL, Pensacola904432-1335
FL, Pompano Beach305941-5445
FL, St. Petersburg813323-4026
FL, Sarasota813923-4563
FL, Tallahassee904681-1902
FL, Tampa813224-9920
FL, West Palm Beach407833-6691
GA, Albany912888-3011
GA, Athens404548-5590
GA, Atlanta404523-0834
GA, Augusta404724-2752
GA, Colombus404571-0556
GA, Macon912743-8844
GA, Rome404234-1428
GA, Savannah912236-2605
HI, Oahu808528-0200
ID, Boise208343-0611
ID, Idaho Falls208529-0406
ID, Lewiston208743-0099
ID, Pocatella208232-1764
IL, Aurora312896-0620
IL, Bloomington309827-7000
IL, Chicago312938-0600
IL, Decatur217429-0235
IL, Dekalb815758-2623
IL, Joliet815726-0070
IL, Peoria309637-8570
IL, Rockford815965-0400
IL, Springfield217753-1373
IL, Urbana217384-6428
IN, Bloomington812332-1344
IN, Evansville812424-7693
IN, Ft. Wayne219426-2268
IN, Gary219882-8800
IN, Indianapolis317299-0024
IN, Kokomo317455-2460
IN, Lafayette317742-6000
IN, Muncie317282-6418
IN, South Bend219233-7104
IN, Terre Haute812232-5329
IA, Ames515233-6300
IA, Cedar Rapids319364-0911
IA, Davenport319324-2445
IA, Des Moines515288-4403
IA, Dubuque319556-0783
IA, Iowa City319351-1421
IA, Sioux City712255-1545
IA, Waterloo319232-5441
KS, Lawrence913843-8124
KS, Manhattan913537-0948
KS, Salina913825-7900
KS, Topeka913233-9880
KS, Wichita316262-5669
KY, Bowling Green502782-7941
KY, Frankfort502875-4654
KY, Lexington606233-0312
KY, Louisville502589-5580
KY, Owensboro502686-8107
LA, Alexandria318445-1053
LA, Baton Rouge504343-0753
LA, Lafayette318233-0002
LA, Lake Charles318436-0518
LA, Monroe318387-6330
LA, New Orleans504524-4094
LA, Shreveport318221-5833
ME, Augusta207622-3123
ME, Brewer207989-3081
ME, Lewiston207784-0105
ME, Portland207761-4000
MD, Annapolis301224-8550
MD, Baltimore301727-6060
MD, Frederick301293-9596
MA, Boston617292-0662
MA, Brockton508580-0721
MA, Fall River508677-4477
MA, Framingham508879-6798
MA, Lawrence508975-2273
MA, Lexington617863-1550
MA, Lowell508937-5214
MA, New Bedford508999-2915
MA, Northampton413586-0510
MA, Pittsfield413499-7741
MA, Salem508744-1559
MA, Springfield413781-3811
MA, Woods Hole508540-7500
MA, Worcester508755-4740
MI, Ann Arbor313996-5995
MI, Battle Creek616968-0929
MI, Detroit313964-2988
MI, Flint313235-8517
MI, Grand Rapids616774-0966
MI, Jackson517782-8111
MI, Kalamazoo616345-3088
MI, Lansing517484-0062
MI, Midland517832-7068
MI, Muskegon616726-5723
MI, Pontiac313332-5120
MI, Port Huron313982-8364
MI, Saginaw517790-5166
MI, Southfield313827-4710
MI, Traverse City616946-2121
MI, Warren313575-9152
MN, Duluth218722-1719
MN, Mankato517388-3780
MN, Minneapolis612341-2459
MN, Rochester507282-5917
MN, St. Cloud612253-2064
MS, Gulfport601863-0024
MS, Jackson601969-0036
MS, Meridian601482-2210
MS, Starkville601324-2155
MO, Columbia314449-4404
MO, Jefferson City314634-5178
MO, Kansas City816221-9900
MO, St. Joseph816279-4797
MO, St. Louis314421-4990
MO, Springfield417864-4814
MT, Billings406245-7649
MT, Great Falls406771-0067
MT, Helena406443-0000
MT, Missoula406721-5900
NE, Lincoln402475-4964
NE, Omaha402341-7733
NV, Las Vegas702737-6861
NV, Reno702827-6900
NH, Concord603224-1024
NH, Durham603868-2924
NH, Manchester603627-8725
NH, Nashua603880-6241
NH, Portsmouth603431-2302
NJ, Atlantic City609348-0561
NJ, Freehold201780-5030
NJ, Hackensack201488-6567
NJ, Marlton609596-1500
NJ, Merchantville609663-9297
NJ, Morristown201455-0275
NJ, New Brunswick201745-2900
NJ, Newark201623-0469
NJ, Passaic201778-5600
NJ, Paterson201684-7560
NJ, Princeton609799-5587
NJ, Rahway201815-1885
NJ, Redbank201571-0003
NJ, Roseland201227-5277
NJ, Sayreville201525-9507
NJ, Trenton609989-8847
NM, Albuquerque505243-4479
NM, Las Cruces505526-9191
NM, Santa Fe505473-3403
NY, Albany518465-8444
NY, Binghampton607772-6642
NY, Buffalo716847-1440
NY, Dear Park516667-5566
NY, Hempstead516292-3800
NY, Ithaca607277-2142
NY, New York City212741-8100
NY, New York City212620-6000
NY, Plattsburgh518562-1890
NY, Poughkeepsie914473-2240
NY, Rochester716454-1020
NY, Syracuse315472-5583
NY, Utica315797-0920
NY, Whit Plains914328-9199
NC, Asheville704252-9134
NC, Charlotte704332-3131
NC, Fayetteville919323-8165
NC, Gastonia704865-4708
NC, Greensboro919273-2851
NC, High Point919889-7494
NC, North Wilkesboro919838-9034
NC, Raleigh919834-8254
NC, Res Tri Park919549-8139
NC, Tarboro919823-0579
NC, Wilmington919763-8313
NC, Winston-Salem919 725-2126
ND, Fargo 701235-7717
ND, Grand Forks701775-7813
ND, Mandan701663-2256
OH, Canton216452-0903
OH, Cincinnati513579-0390
OH, Cleveland216575-1658
OH, Colombus614463-9340
OH, Dayton513461-5254
OH, Elyria216323-5059
OH, Hamilton513863-4116
OH, Kent216678-5115
OH, Lorain216960-1170
OH, Mansfield419526-0686
OH, Sandusky419627-0050
OH, Springfield513324-1520
OH, Toledo419255-7881
OH, Warren216394-0041
OH, Wooster216264-8920
OH, Youngstown216743-1296
OK, Bartlesville918336-3675
OK, Lawton405353-0333
OK, Oklahoma City405232-4546
OK, Stillwater405624-1113
OK, Tulsa918584-3247
OR, Corvallis503754-9273
OR, Eugena503683-1460
OR, Hood River503386-4405
OR, Klamath Falls503882-6282
OR, Medford503779-6343
OR, Portland503295-3028
OR, Salem503378-7712
PA, Allentown215435-3330
PA, Altoona814949-0310
PA, Carlisle717249-9311
PA, Danville717271-0102
PA, Erie814899-2241
PA, Harrisburg717236-6882
PA, Johnstown814535-7576
PA, King Of Prussia215337-4300
PA, Lancaster717295-5405
PA, Philadelphia215574-9462
PA, Pittsburgh412288-9950
PA, Reading215376-8750
PA, Scranton717961-5321
PA, State College814231-1510
PA, Wilkes-Barre717829-3108
PA, Williamsport717494-1796
PA, York717846-6550
RI, Providence401751-7910
SC, Charleston803722-4303
SC, Columbia803254-0695
SC, Greenville803233-3486
SC, Spartenburg803585-1637
SC, Pierre605224-0481
SC, Rapid City605348-2621
SC, Sioux Falls605336-8593
TN, Bristol615968-1130
TN, Chattanooga615756-1161
TN, Clarksville615552-0032
TN, Johnson City615282-6645
TN, Knoxville615525-5500
TN, Memphis901521-0215
TN, Nashville615244-3702
TN, Oak Ridge615481-3590
TX, Abilene915676-9151
TX, Amarillo806373-0458
TX, Athens214677-1712
TX, Austin512928-1130
TX, Brownsville512542-0367
TX, Bryan409822-0159
TX, Corpus Christi512884-9030
TX, Dallas214748-6371
TX, El Paso915532-7907
TX, Ft. Worth817332-4307
TX, Galveston409762-4382
TX, Houston713227-1018
TX, Laredo512724-1791
TX, Longview214236-4205
TX, Lubbock806747-4121
TX, Mcallen512686-5360
TX, Midland915561-9811
TX, Nederland409722-3720
TX, San Angelo915944-7612
TX, San Antonio512225-8004
TX, Sherman214893-4995
TX, Temple817773-9723
TX, Tyler214597-8925
TX, Waco817752-9743
TX, Wichita Falls817322-3774
UT, Ogden801627-1630
UT, Provo801373-0542
UT, Salt Lake City801359-0149
VT, Burlington802864-0808
VT, Montpelier802229-4966
VT, Rutland802775-1676
VT, White River Jct.802 295-7631
VA, Blacksburg703 552-9181
VA, Charlottesville804 977-5330
VA, Covington703 962-2217
VA, Fredericksburg703 371-0188
VA, Harrisonburg703434-7121
VA, Herndon703435-1800
VA, Lynchburg804845-0010
VA, Newport News804596-6600
VA, Norfolk804625-1186
VA, Richmond804788-9902
VA, Roanoke703344-2036
WA, Auburn206939-9982
WA, Bellingham206733-2720
WA, Everett206775-9929
WA, Longview206577-5835
WA, Olympia206754-0460
WA, Richland509943-0649
WA, Seattle206625-9612
WA, Spokane509455-4071
WA, Tacoma206627-1791
WA, Vancouver206693-6914
WA, Wenatchee509663-6227
WA, Yakima509575-1060
WV, Charleston304343-6471
WV, Huntington304523-2802
WV, Morgantown304292-0104
WV, Wheeling304233-7732
WI, Beloit608362-5287
WI, Eau Claire715 836-9295
WI, Green Bay414 432-2815
WI, Kenosha414 552-9242
WI, La Crosse608 784-0560
WI, Madison608 257-5010
WI, Milwaukee414271-3914
WI, Neenah414722-7636
WI, Racine414632-6166
WI, Sheboygan414452-3995
WI, Wausau715845-9584
WI, West Bend414334-2206
WY, Casper307265-5167
WY, Cheyenne307638-4421
WY, Laramie307721-5878
H. Telenet DNIC's
Here is the list of all the Telenet DNIC's. These
will be defined and explained in the next section:
DNIC:NETWORK:
02041Datanet-1
02062DCS
02080Transpac
02284Telepac (Switzerland)
02322Datex-P (Austria)
02392Radaus
02342PSS
02382Datapak (Denmark)
02402Datapak (Sweden)
02405Telepak
02442Finpak
02624Datex-P (West Germany)
02704Luxpac
02724Eirpak
03020Datapac
03028Infogram
03103ITT/UDTS (U.S.A.)
03106Tymnet
03110Telenet
03340Telepac (Mexico)
03400UDTS (Curacau)
04251Isranet
04401DDX-P
04408Venus-P
04501Dacom-Net
04542Intelpak
05052Austpac
05053Midas
05252Telepac (Hong Kong)
05301Pacnet
06550Saponet
07240Interdata
07241Renpac
07421Dompac
09000Dialnet
I. Telenet NUA's
Here is a list of a few Telenet NUA's and what type of system
they are. But first, this is how an NUA is put together:
031106170023700
\ /\ / \ /
| | |
DNIC Area NUA
Code
The DNIC says which network connected to Telenet you are using.
The area code is the area code for the area that the NUA is in. And
the NUA is the address of the computer on Telenet. Please note that
an NUA does NOT have to be in your area code for you to connect to it.
There are two ways of finding useful NUA's. The first way is to
get or write an NUA scanning program. The second way is to get a copy
of the Legion Of Doom's Telenet Directory.( Volume 4 of the LOD
Technical Journals)
Now, here is the list. Remember that these are only a few NUA's.
These are NOT all of the Telenet NUA's. All of these NUA's DO accept
reverse charging. Also, please note that all of these may not be
working by the time you read this and that network congestion
frequently makes an NUA inaccessible for a short period of time.
NUA:SYSTEM TYPE:
031102010022500VAX
031102010015600UNIX
031102010022000VAX
031102010025900UNIX
031102010046100VAX
031102010025200PRIME
031102010046100VAX
031102010052200VAX
031102020001000PRIME
031102020013200VAX
031102020014100PRIME
031102020014200PRIME
031102020015000VAX
031102020016100UNIX
031102020021400PRIME
031102020024500AOS
031102020030800PRIME
031102020030900PRIME
031102020031200PRIME
031102020033600VAX
031102020033700VAX
031102020034300PRIME
031102020036000HP-3000
031102030007500VAX
031102030002200VM/370
031102030013600PRIME
031102060003200HP-3000
031102060044000VAX
031102060044900NOS
031102060044700VM/370
031102120003900NOS
031102120015200PRIME
031102120026600VAX
031102120026300VAX
031102120026700UNIX
031102120044900UNIX
031102120053900VOS
031102140024000VAX
J. Basic UNIX hacking
UNIX is probably the most commonly used operating system on Telenet, and is the easiest to hack since it doesn't record bad login attempts. You know you've found a UNIX system when it gives you a "Login" prompt, and then a "Password" prompt. To get in you should first try the default logins.(Listed below.) If these don't work try some of the passwords listed in Section M. If these don't work try to find backdoors. These are passwords that may have been put in to allow the programmer (or someone else who could be in a position to make a backdoor) to get access into the system. These are usually not known about by anyone but the individual who made it. Try doing some research on the programmer and other people who helped to make the system. And, if these don't work, just try guessing them. The Login (usually the account holders name) has 1-8 characters and the Password is 6-8 characters. Both can be either letters or numbers, or a combination of the two.
Once you get in, you should get a "$" prompt, or some other special character like it. You should only use lower case letters when hacking UNIX, this seems to be standard format. If you type "man [command]" at the prompt, it should list all of the commands for that system. Anyway, here are the default Logins and Passwords:
Login:Password:
rootroot
rootsystem
syssys
syssystem
daemondaemon
uucpuucp
ttytty
testtest
unixunix
unixtest
binbin
admadm
admadmin
adminadm
adminadmin
sysmansysman
sysmansys
sysmansystem
sysadminsysadmin
sysadminsys
sysadminsystem
sysadminadmin
sysadminadm
whowho
learnlearn
uuhostuuhost
guestguest
hosthost
nuucpnuucp
rjerje
gamesgames
gamesplayer
sysopsysop
rootsysop
demodemo
Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things:
/etc/passwd
or
cat /etc/passwd
The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this:
Broken down, this is what the above password file states:
Username: john
Encrypted Password: 234abc56
User Number: 9999
Group Number: 13
Other Information: John Johnson
Home Directory: /home/dir/john
Shell: /bin/john
If the password file does not show up under one of the above two commands, then it is probably shadowed.
The following definition of password shadowing was taken from the alt.2600 hack faq:
"Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users."
If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using:
UNIX System Type:Path:Token:
AIX 3/etc/security/passwd !
or/tcb/auth/files/<first letter of #
username>/<username>
A/UX 3.Os/tcb/files/auth/*
BSD4.3-Reno/etc/master.passwd *
ConvexOS 10/etc/shadpw *
Convex0S 11/etc/shadow *
DG/UX/etc/tcb/aa/user *
EP/IX/etc/shadow x
HP-UX/.secure/etc/passwd *
IRIX 5/etc/shadow x
Linux 1.1/etc/shadow *
OSF/1/etc/passwd[.dir|.pag] *
SCO UNIX #.2.x/tcb/auth/files/<first letter of *
username>/<username>
SunOS 4.1+c2/etc/security/passwd.adjunct ##
SunOS 5.0/etc/shadow
System V 4.0/etc/shadow x
System V 4.2/etc/security/* database
Ultrix 4/etc/auth[.dir|.pag] *
UNICOS /etc/udb *
Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data:
The characters in the password aging data stand for the following:
1. Maximum number of weeks a password can be used without changing.
2. Minimum number of weeks a password must be used before being changed.
3&4. Last time password was changed, in number of weeks since 1970.
The password aging data can be decoded using the chart below:
Character:Number:
.0
/1
02
13
24
35
46
57
68
79
810
911
A12
B13
C14
D15
E16
F17
G18
H19
I20
J21
K22
L23
M24
N25
O26
P27
Q28
R29
S30
T31
U32
V33
W34
X35
Y36
Z37
a38
b39
c40
d41
e42
f43
g44
h45
i46
j47
k48
l49
m50
n51
o52
p53
q54
r55
s56
t57
u58
v59
w60
x61
y62
z63
Now, explore the system freely, be careful, and have fun!
K. Basic VAX/VMS hacking
The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's:
Username:Password:
SYSTEMOPERATOR
SYSTEMMANAGER
SYSTEMSYSTEM
SYSTEMSYSLIB
OPERATOROPERATOR
SYSTESTUETP
SYSTESTSYSTEST
SYSTESTTEST
SYSMAINTSYSMAINT
SYSMAINTSERVICE
SYSMAINTDIGITAL
FIELDFIELD
FIELDSERVICE
GUESTGUEST
GUESTunpassworded
DEMODEMO
DEMOunpassworded
TESTTEST
DECNETDECNET
Here are some of the VAX/VMS commands:
Command:Function:
HELP (H)Gives help and list of commands.
TYPE (T)View contents of a file.
RENAME (REN)Change name of a file.
PURGE (PU) Deletes old versions of a file.
PRINT (PR)Prints a file.
DIRECTORY (DIR)Shows list of files.
DIFFERENCES(DIF)Shows differences between files.
CREATE (CR)Creates a file.
DELETE (DEL)Deletes a file.
COPY (COP)Copy a file to another.
CONTINUE (C)Continues session.
The password file on VAX's are available when you type in the command:
SYS$SYSTEM:SYSUAF.DAT
The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J.
Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced.
But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts.
L. Basic PRIME hacking
PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN <USERNAME>". It should then ask you for your username and password. The default usernames and passwords are listed below:
Username:Password:
PRIMEPRIME
PRIMEPRIMOS
PRIMOSPRIMOS
PRIMOSPRIME
PRIMOS_CSPRIME
PRIMOS_CSPRIMOS
PRIMENETPRIMENET
SYSTEMSYSTEM
SYSTEMPRIME
SYSTEMPRIMOS
NETLINKNETLINK
TESTTEST
GUESTGUEST
GUEST1 GUEST
When you are inside the system, type "NETLINK" and it ahould give you alot of help. This system uses NUA's, too. I might print these in the next volume.
M. Password List
The password list was taken from A Novice's Guide To Hacking, by The Legion Of Doom, and from some of my own discoveries. Here is the list of commonly used passwords:
Password:
aaa
academia
ada
adrian
aerobics
airplane
albany
albatross
albert
alex
alexander
algebra
alias
alisa
alpha
alphabet
ama
amy
analog
anchor
andy
andrea
animal
answer
anything
arrow
arthur
ass
asshole
athena
atmosphere
bacchus
badass
bailey
banana
bandit
banks
bass
batman
beautiful
beauty
beaver
daniel
danny
dave
deb
debbie
deborah
december
desire
desperate
develop
diet
digital
discovery
disney
dog
drought
duncan
easy
eatme
edges
edwin
egghead
eileen
einstein
elephant
elizabeth
ellen
emerald
engine
engineer
enterprise
enzyme
euclid
evelyn
extension
fairway
felicia
fender
finite
format
god
hello
idiot
jester
john
johnny
joseph
joshua
judith
juggle
julia
kathleen
kermit
kernel
knight
lambda
larry
lazarus
lee
leroy
lewis
light
lisa
louis
love
lynne
mac
macintosh
mack
maggot
magic
malcolm
mark
markus
martin
marty
marvin
matt
master
maurice
maximum
merlin
mets
michael
michelle
mike
minimum
nicki
nicole
rascal
really
rebecca
remote
rick
reagan
robot
robotics
rolex
ronald
rose
rosebud
rosemary
roses
ruben
rules
ruth
sal
saxon
scheme
scott
secret
sensor
serenity
sex
shark
sharon
shit
shiva
shuttle
simon
simple
singer
single
singing
smile
smooch
smother
snatch
snoopy
soap
socrates
spit
spring
subway
success
summer
super
support
surfer
suzanne
tangerine
tape
target
taylor
telephone
temptation
tiger
tigger
toggle
tomato
toyota
trivial
unhappy
unicorn
unknown
urchin
utility
vicki
virgin
virginia
warren
water
weenie
whatnot
whitney
will
william
winston
willie
wizard
wonbat
yosemite
zap
N. Connecting modems to different phone lines
Ok, if you are really paranoid (or smart) and you don't want to hack from your house for fear of getting caught, you can hook up your modem to other peoples phone lines or to payphones.
If you want to hook your modem to a payphone, do it late at night and at a very secluded payphone. Look along either side of the phone. You should see a small metal tube (which contains the telephone wires) running along the wall. Somewhere along the tube it should widen out into a small box. Pop off the boxes lid and there is a nice little phone jack for ya'. Taking off the lid may be difficult because they are usually pretty secure, but nothing is impossible, so keep trying. Of course, you can only do this with a lap-top computer.
Now, if you want to hook up the modem to someone's house or appartment phone line, you need to get a pair of red and green alligator clips, and an extra modem cord for your lap-top.
After you get those parts, cut the plastic end off of your modem cord and you will see a red wire, a green wire, and two other wires, but you can ignore those. Attach the red alligator clip to the red wire, and attach the green alligator clip to the green wire and you're all set. Now all you need to do is go find a telephone pole or one of those small green boxes that stick out of the ground.(They should have a Bell Systems logo on them.)
On a telephone pole open the little box that has a bunch of wires going to and from it. On the right side of the box you should see what look like two large screws.(These are called "terminals".) One should have a red wire wrapped around it and the other should have a green wire wrapped around it. Attach the red alligator clip the the red wire and the green alligator clip to the green wire, and you're all set. This should get you a dial tone. If it doesn't, make sure that the alligator clips are not touching each other, and that the alligator clips are attached to the exposed end of the wire.
Now, on those green boxes you need to undo all of the screws and shit holding the lid on, and open it up. Then you should find basically the same setup as in the telephone pole. Attach the appropriate wires to the appropriate terminals and you are all set.
This process can also be used to hook up a Beige Box (Lineman's Handset.) when phreaking.
O. Viruses, Trojans, and Worms
Just in case some of you are interested, here are the definitions for Viruses, Trojans, and Worms. These definitions were taken from the alt.2600 hack faq.
Trojan:
"Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans."
Virus:
"A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore."
Worm:
"Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."
II. PHREAKING
A. What is phreaking
Phreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls. In the following sections, you will learn some about boxes, what they are, and how they work. You will also learn about the other forms of phreaking.
B. Why phreak?
Phreaking, like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information.
C. Phreaking rules
Most of the same rules apply for hacking and phreaking, so I will only list a few here.
1.Never box over your home phone line.
2.You should never talk about phreaking projects over your home phone line.
3.Never use your real name when phreaking.
4.Be careful who you tell about your phreaking projects.
5.Never leave phreaking materials out in the open. Keep them in a safe place.
6.Don't get caught.
D. Where and how to start phreaking
Well, you can phreak on any telephone, but as stated above, it is very stupid to do so on your home phone line.
First you need you need to construct the boxes needed for what you want to do. All of the boxes and their descriptions are listed in the next section. Most of the boxes are very easy to make, but if your not into making shit, there are usually alternative ways of making them.
E. Boxes and what they do
Box:Description:
Red Boxgenerates tones for free phone calls
Black Boxwhen called, caller pays nothing
Beige Boxlineman's handset
Green Boxgenerates coin return tones
Cheese Boxturns your phone into a payphone
Acrylic Boxsteal 3-way calling and other services
Aqua Boxstops F.B.I. lock-in-trace
Blast Boxphone microphone amplifier
Blotto Boxshorts out all phones in your area
Blue Boxgenerates 2600hz tone
Brown Boxcreates party line
Bud Boxtap neighbors phone
Chatreuse Boxuse electricity from phone
Chrome Boxmanipulates traffic signals
Clear Boxfree calls
Color Boxphone conversation recorder
Copper Boxcauses crosstalk interference
Crimson Boxhold button
Dark Boxre-route calls
Dayglo Boxconnect to neighbors phone line
Divertor Boxre-route calls
DLOC Boxcreate party line
Gold Boxdialout router
Infinity Boxremote activated phone tap
Jack Boxtouch-tone key pad
Light Boxin-use light
Lunch BoxAM transmitter
Magenta Boxconnect remote phone line to another
Mauve Boxphone tap without cutting into the line
Neon Boxexternal microphone
Noise Boxcreates line noise
Olive Boxexternal ringer
Party Boxcreates party line
Pearl Boxtone generator
Pink Boxcreates party line
Purple Boxhold button
Rainbow Boxkill trace
Razz Boxtap neighbors phone
Rock Boxadd music to phone line
Scarlet Boxcauses interference
Silver Boxcreate DTMF tones for A,B,C, and D
Static Boxraises voltage on phone line
Switch Boxadd services
Tan Boxphone conversation recorder
TV Cable Boxsee sound waves on TV
Urine Boxcreate disturbance on phone headset
Violet Boxstop payphone from hanging up
White BoxDTMF key pad
Yellow Boxadd line extension
F. Box Plans
The Red Box is the main tool that you will use so I have included the Red Box plans. The other box plans can be downloaded from the Internet.
Red Box:
There are two ways that you can make a Red Box:
One is to go to Radio Shack and buy a tone dialer and a 6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you can order them from the electronics companies that I have listed at the end of this section.) Open up the tone dialer and replace the existing crystal (big, shiny, metal thing labeled "3.579545Mhz") with the 6.5536Mhz crystal. Now, close it up. You have a red box.
To use it for long distance calls play the tones that add up to the amount of money that the operator requests. For a 25 cents tone press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press 1 *.
And, the second way, which is a much easier method, is to get the Red Box tones from a phreaking program, such as: Omnibox, or Fear's Phreaker Tools. Play the tones as you hold a microcassette recorder about 1-inch away from your computer speakers, and record the tones.
The Red Box only works on public telephones, it does not work on COCOT's.(Defined in next section.) It makes the telephone think that you have put money in. Red Boxes do not work on local calls because the phone is not using ACTS (Automated Coin Toll System), unless you call the operator and have her place the call for you. You tell her the number that you want to dial and then when she asks you to put in your money, play the tones. If she asks you why you need her to place the call tell her that one of the buttons is smashed in or something like that. You now have and know how to use a Red Box!
Electronics Companies:
Alltronics
2300 Zanker Road
San Jose, CA 95131
(408)943-9774 -Voice-
(408)943-9776 -Fax-
Blue Saguaro
P.O. Box 37061
Tucson, AZ 85740
Mouser
(800)346-6873
Unicorn Electronics
10000 Canoga Ave. Unit C-2
Chatsworth, CA 91311
1-800-824-3432
G. Free calling from COCOT's
First of all, COCOT stands for "Customer Owned Customer Operated Telephone". These are most likely to be found at resteraunts, amusement parks, etc.
All you have to do to make a free call from a COCOT is dial a 1-800 number (they let you do this for free), say some bullshit and get them to hang up on you. Stay on the line after they hang up, then dial the number that you want to call.
This may not work by the time you read this because COCOT owners are becoming more aware of us every day.
H. ANAC numbers
ANAC stands for "Automated Number Announcment Circuit". In other words, you call the ANAC number in your area and it tells you the number that you are calling from. This is useful when Beige Boxing, or hooking your modem up to other phone lines, to find out what number you are using. The "?" are substituted for unknown numbers. Do some scanning to find them out. Here are the ANAC numbers for the U.S.A. with their area code, and the only one I knew of in the U.K.:
U.S.A.:
Area Code:ANAC Number:
201958
202811
203970
205300-222-2222
205300-555-5555
205300-648-1111
205300-765-4321
205300-798-1111
205300-833-3333
205557-2311
205811
205841-1111
205908-222-2222
206411
207958
209830-2121
209211-9779
210830
212958
213114
2131223
213211-2345
213211-2346
213760-2???
21361056
214570
214790
214970-222-2222
214970-611-1111
215410-????
215511
215958
216200-????
216331
216959-9968
217200-???-????
219550
219559
301958-9968
310114
3101223
310211-2345
310211-2346
312200
312290
3121-200-8825
3121-200-555-1212
313200-200-2002
313200-222-2222
313200-???-????
313200200200200200
314410-????
315953
315958
315998
317310-222-2222
317559-222-2222
317743-1218
3345572411
3345572311
401200-200-4444
401222-2222
402311
404311
404940-???-????
404940
405890-7777777
405897
407200-222-2222
408300-???-????
408760
408940
409951
409970-????
410200-6969
410200-555-1212
410811
412711-6633
412711-4411
412999-????
413958
413200-555-5555
414330-2234
415200-555-1212
415211-2111
4152222
415640
415760-2878
4157600-2222
419311
502200-2222222
502997-555-1212
503611
503999
50499882233
504201-269-1111
504998
50499851-0000000000
508958
508200-222-1234
508200-222-2222
50826011
509560
510760-1111
512830
512970-????
5155463
515811
516958
516968
517200-222-2222
517200200200200200
518511
518997
518998
603200-222-2222
606997-555-1212
606711
607993
609958
610958
610958-4100
612511
614200
614517
615200200200200200
6152002222222
615830
616200-222-2222
617200-222-1234
617200-222-2222
617200-444-4444
617220-2622
617958
618200-???-????
618930
619211-2001
619211-2121
703811
704311
707211-2222
7081-200-555-1212
7081-200-8825
708200-6153
708724-9951
708356-9646
713380
713970-????
713811
714114
714211-2121
714211-2222
716511
716990
717958
718958
8022-222-222-2222
802200-222-2222
8021-700-222-2222
802111-2222
805114
805211-2345
805211-2346
805830
806970-????
810200200200200200
812410-555-1212
813311
815200-???-????
817290
817211
818970-611-1111
8181223
818211-2345
903211-2346
904970-611-1111
906200-222-222
9071-200-222-2222
907811
908958
910200
910311
910988
914990-1111
915970-????
916211-2222
916461
919200
919711
U.K.:
175
III. REFERENCE
A. Hacking and phreaking WWW. sites
Here is a list of some World Wide Web sites that contain hacking, phreaking, computer, virus, carding, security, etc. material:
All of these files are available by download from the Internet.
File Name:
A Novice's Guide To Hacking
Alt.2600 Hack Faq
The Hacker's Handbook
The Official Phreaker's Manual
Rainbow Books (Listed in Section D.)
The Hacker Crackdown
Computer Hackers: Rebels With A Cause
The Legion Of Doom Technical Journals
The Ultimate Beginner's Guide To Hacking And Phreaking (Of course!)
C. Hacking and phreaking Newsgroups
alt.2600
alt.2600.hope.tech
alt.cellular
alt.cellular-phone-tech
alt.comp.virus
alt.cracks
alt.cyberpunk
alt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.malicious
alt.security
D. Rainbow Books
The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:
Infosec Awareness Division
ATTN: x711/IAOC
Fort George G. Meade, MD 20755-6000
or call:
(410)766-8729
Here is the list of all the Rainbow Books and their descriptions:
Color:Description:
Orange 1D.O.D. Trusted Computer Systems
GreenD.O.D. Password Management
YellowComputer Security Requirements
Yellow 2Computer Security Requirements
TanUnderstanding Audit In Trusted Systems
Bright BlueTrusted Product Evaluation
Neon OrangeUnderstanding Discretionary Access
Teal GreenGlossary Of Computer Terms
Orange 2Understanding Configurations
RedInterpretation Of Evaluation
BurgundyUnderstanding Design Documentation
Dark LavenderUnderstanding Trusted Distrobution
Venice BlueComputer Security Sub-Systems
AquaUnderstanding Security Modeling
Dark RedInterpretations Of Environments
PinkRating Maintenence Phase
PurpleFormal Verification Systems
BrownUnderstanding Trusted Facilities
Yellow-GreenWriting Trusted Facility Manuals
Light BlueUnderstanding Identification And Authentication In Trusted Systems
BlueProduct Evaluation Questionaire
GraySelecting Access Control List
LavanderData Base Management Interpretation
Yellow 3Understanding Trusted Recovery
Bright OrangeUnderstanding Security Testing
Purple 1Guide To System Procurement
Purple 2Guide To System Procurement
Purple 3Guide To System Procurement
Purple 4Guide To System Procurement
GreenUnderstanding Data Remanence
Hot PeachWriting Security Features
TurquioseUnderstanding Information Security
VioletControlled Access Protection
Light PinkUnderstanding Covert Channels
E. Cool hacking and phreaking magazines
Phrack Magazine
2600 Magazine
Tap Magazine
Phantasy Magazine
F. Hacking and phreaking movies
Movie:
Hackers
War Games
G. Hacking and phreaking Gopher sites
Address:
ba.com
csrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.org
oss.net
spy.org
wiretap.spies.com
H. Hacking and phreaking Ftp sites
Address:
2600.com
agl.gatech.edu/pub
asylum.sf.ca.us
clark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrack
ftp.giga.or.at/pub/hacker
ftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/mac
ftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge
I. Hacking and phreaking BBS's
BBS's are Bulletin Board Systems on which hackers and phreakers can post messages to each other.
Here is a list of some BBS's that I know of. If you know of any other BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note that some of these may be old and not running.
Area Code:Phone Number:Name:
203832-8441Rune Stone
210493-9975The Truth Sayer's Domain
303343-4053Hacker's Haven
315656-5135Independent Nation
315656-5135UtOPiA 617855-2923Maas-Neotek
708676-9855Apocalypse 2000
713579-2276KOdE AbOdE
806747-0802Static Line
908526-4384Area 51
502499-8933Blitzkrieg
510935-5845...Screaming Electron
408747-0778The Shrine
708459-7267The Hell Pit
415345-2134Castle Brass
415697-13207 Gates Of Hell
J. Cool hackers and phreakers
Yes there are many, many, cool hackers and phreakers out there, but these are some that
helped me to get this file out on the Internet. I did not list a few people because I only
knew their real name, and I don't want to use their real name without their permission.
Handle:
Silicon Toad
Logik Bomb/Net Assasin
oleBuzzard
Lord Somer
Weezel
Thanks for your help guys.
K. Hacker's Manifesto
"This is our world now...the world of the electron and the switch, the beauty of the baud.
We make use of a service already existing without paying for what could be dirt cheep if it
wasn't run by profiteering gluttons, and you call us criminals. We explore...and you call us
criminals. We exist without skin color, without nationality, without religious bias...and you
call us criminals. You build atomic bombs, wage wars, murder, cheat, and lie to us and try to
make us believe it is for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by
what they say and think, not what they look like. My crime is that of outsmarting you, something
that you will never forgive me for. I am a hacker and this is my manifesto. You may stop this
individual, but you can't stop us all...after all, we're all alike."
+++The Mentor+++
K. Happy hacking!
Be careful and have fun. Remember to keep your eye out for the next volume of
The Ultimate Beginner's Guide To Hacking And Phreaking and the Legion Of the Apocalypse
W.W.W. page. Oh, and keep looking for our on-line magazine, too, it should be coming out
soon. Well, I hope you enjoyed the file and found it informative. I also hope that I