Copy Link
Add to Bookmark
Report

The Ultimate Beginners Guide to Hacking and Phreaking

BY
REVELATION
LOA--ASH


Written: 08/4/96 Volume: 1

DrWatson's profile picture
Published in 
Hacking Tutorials
 · 5 years ago

This document was written in Windows 95 Word Pad. The title above, and some of the text looks a little screwed up when read in anything else, so read it in Word Pad.

Anyway, for those of you who are wondering "what do the letters "LOA" under his handle stand for?" Well, LOA stands for Legion Of the Apocalypse, which is a group of elite hackers and phreakers in my area.
The current members of LOA are:

Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and Phreak Show

I started LOA when I discovered that there were many good hackers and phreakers in my area. I thought that an organized group of hackers and phreakers would accomplish much more than an individual could by himself. Thus the Legion Of the Apocalypse was formed and has been around for a while since. Our main goal is to show the public what hacking and phreaking is all about and to reveal confidential information to the hacking/phreaking community so that we can learn more about computers, telephones, electronics, etc. We are hoping to get our own World Wide Web page soon, so keep an eye out for it. It will contain all of the hacking, phreaking, computer, telephone, security, electronics, virus, and carding information that you could possibly want.

Also, if some of you are wondering why I chose the word Revelation as my handle, well, Revelation means revealing or unveiling, which is exactly what I intend to do as a hacker/phreaker. I intend to reveal all the information that I can gather while hacking and phreaking.

Anyway, I wrote this document because I have read all the files that I could get my hands on and noticed that there has never been a really good file written that guided beginning hackers and phreakers step by step.

When I began hacking and started reading all of the beginner files, I still had many un-answered questions. My questions were eventually answered, but only through LOTS of reading and practice. In this file, I hope to give basic step by step instructions that will help beginning hackers and phreakers get started. But, DO NOT think that this will save you from having to read alot. If you want to be a hacker/phreaker, reading is the most important thing you can do. You will have to do ALOT of reading no matter what.

This document was intended for beginners, but it can also be used as a reference tool for advanced hackers and phreakers.

Please distribute this document freely. Give it to anyone that you know who is interested in hacking and/or phreaking. Post it on your World Wide Web page, Ftp sites, and BBS's. Do whatever you want with it as long as it stays UNCHANGED.
As far as I know, this is the most complete and in depth beginners guide available, that is why I wrote it. Also, I plan to have new volumes come out whenever there has been a significant change in the material provided, so keep an eye out for them. LOA is planning on starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "an641839@anon.penet.fi".

This document is divided into three main sections with many different sub-sections in them. The Table Of Contents is below:


Table Of Contents:


I. HACKING

A. What is hacking?
B. Why hack?
C. Hacking rules
D. Getting started
E. Where and how to start hacking
F. Telenet commands
G. Telenet dialups
H. Telenet DNIC's
I. Telenet NUA's
J. Basic UNIX hacking
K. Basic VAX/VMS hacking
L. Basic PRIME hacking
M. Password list
N. Connecting modems to different phone lines
O. Viruses, Trojans, and Worms

II. PHREAKING

A. What is phreaking?
B. Why phreak?
C. Phreaking rules
D. Where and how to start phreaking
E. Boxes and what they do
F. Red Box plans
G. Free calling from COCOT's
H. ANAC numbers

III. REFERENCE

A. Hacking and phreaking W.W.W. pages
B. Good hacking and phreaking text files
C. Hacking and phreaking Newsgroups
D. Rainbow Books
E. Hacking and phreaking magazines
F. Hacking and phreaking movies
G. Hacking and phreaking Gopher sites
H. Hacking and phreaking Ftp sites
I. Hacking and phreaking BBS's
J. Cool hackers and phreakers
K. Hacker's Manifesto
L. Happy hacking!


DISCLAIMER

"Use this information at your own risk. I Revelation, nor any other member of LOA, nor the persons providing this file, will NOT assume ANY responsibility for the use, misuse, or abuse, of the information provided herein. The following information is provided for educational purposes ONLY. The information is NOT to be used for illegal purposes. By reading this file you ARE AGREEING to the following terms: I understand that using this information is illegal. I agree to, and understand, that I am responsible for my own actions. If I get into trouble using this information for the wrong reasons, I promise not to place the blame on Revelation, LOA, or anyone that provided this file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.

This file is basically a compilation of known hacking and phreaking information and some information gathered from my own experience as a hacker/phreaker. I have tried to make sure that everything excerpted from other documents was put in quotes and labeled with the documents name, and if known, who wrote it. I am sorry if any mistakes were made with quoted information."

*-Revelation-*
LOA


I. HACKING


A. What is hacking?


Hacking is the act of penetrating computer systems to gain knowledge about the system and how it works.

Hacking is illegal because we demand free access to ALL data, and we get it. This pisses people off and we are outcasted from society, and in order to stay out of prison, we must keep our status of being a hacker/phreaker a secret. We can't discuss our findings with anyone but other members of the hacking/phreaking community for fear of being punished. We are punished for wanting to learn. Why is the government spending huge amounts of time and money to arrest hackers when there are other much more dangerous people out there. It is the murderers, rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.

There are only two ways to get rid of hackers and phreakers. One is to get rid of computers and telephones, in which case we would find other means of getting what we want.(Like that is really going to happen.) The other way is to give us what we want, which is free access to ALL information. Until one of those two things happen, we are not going anywhere.


B. Why hack?

As said above, we hack to gain knowledge about systems and the way they work. We do NOT want to damage systems in any way. If you do damage a system, you WILL get caught. But, if you don't damage anything, it is very unlikely that you will be noticed, let alone be tracked down and arrested, which costs a considerable amount of time and money.

Beginners should read all the files that they can get their hands on about anything even remotely related to hacking and phreaking, BEFORE they start hacking. I know it sounds stupid and boring but it will definetly pay off in the future. The more you read about hacking and phreaking, the more unlikely it is that you will get caught. Some of the most useless pieces of information that you read could turn out to be the most helpful. That is why you need to read everything possible.


C. Hacking rules


/

listNever damage any system. This will only get you into trouble.

  • Never alter any of the systems files, except for those needed to insure that you are not detected, and those to insure that you have access into that computer in the future.

  • Do not share any information about your hacking projects with anyone but those you'd trust with your life.

  • When posting on BBS's (Bulletin Board Systems) be as vague as possible when describing your current hacking projects. BBS's CAN be monitered by law enforcement.

  • Never use anyone's real name or real phone number when posting on a BBS.

  • Never leave your handle on any systems that you hack in to.

  • DO NOT hack government computers.

  • Never speak about hacking projects over your home telephone line.

  • Be paranoid. Keep all of your hacking materials in a safe place.

  • To become a real hacker, you have to hack. You can't just sit around reading text files and hanging out on BBS's. This is not what hacking is all about.

  • D. Getting started


    The very first thing you need to do is get a copy of PKZIP or some other file unzipping utility. Nearly everything that you download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip".

    Then you need to get yourself a good prefix scanner.(also known as a War Dialer) This is a program that automatically dials phone numbers beginning with the three numbers (prefix) that you specify. It checks to see if the number dialed has a carrier.(series of beeps that tells you that you have dialed a computer) Try and find a large business area prefix to scan. It is these businesses that have interesting computers. There are many good scanners out there, but I would recommend Autoscan or A-Dial. These are very easy to use and get the job done quickly and efficiently.


    E. Where and how to start hacking


    After you get yourself a good scanner, scan some prefixes and find some cool dialups, then do the following: From your terminal, dial the number you found. Then you should hear a series of beeps (carrier) which tells you that you are connecting to a remote computer. It should then say something like "CONNECT 9600" and then identify the system that you are on. If nothing happens after it says "CONNECT 9600" try hitting enter a few times. If you get a bunch of garbage adjust your parity, data bits, stop bits, baud rate, etc., until it becomes clear.

    That is one way of connecting to a remote computer. Another way is through Telenet or some other large network.

    Telenet is a very large network that has many other networks and remote computers connected to it.

    Ok, here is how you would connect to a remote computer through Telenet:

    First, you get your local dialup(phone number) from the list that I have provided in Section G. Then you dial the number from your terminal and connect.(If you get a bunch of garbage try changing your parity to odd and your data bits to 7, this should clear it up.) If it just sits there hit enter and wait a few seconds, then hit enter again. Then it will say "TERMINAL=" and you type in your terminal emulation. If you don't know what it is just hit enter. Then it will give you a prompt that looks like "@". From there you type "c" and then the NUA (Network User Address) that you want to connect to. After you connect to the NUA, the first thing you need to do is find out what type of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.)

    There are other things that you can do on Telenet besides connecting to an NUA. Some of these commands and functions are listed in the next section.

    You can only connect to computers which accept reverse charging.
    The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password.

    Telenet is probably the safest place to start hacking because of the large numbers of calls that they get. Make sure you call during business hours (late morning or early afternoon) so there are many other people on-line.


    F. Telenet commands


    Here is a list of some Telenet commands and their functions. This is only a partial list. Beginners probably won't use these commands, but I put them here for reference anyway.

     
    COMMAND FUNCTION

    c Connect to a host.
    stat Shows network port.
    full Network echo.
    half Terminal echo.
    telemail Mail.(need ID and password)
    mail Mail.(need ID and password)
    set Select PAD parameters
    cont Continue.
    d Disconnect.
    hangup Hangs up.
    access Telenet account.(ID and password)


    G. Telenet dialups


    Here is the list of all the Telenet dialups that I know of in the U.S.A., including the city, state, and area code:

     
    STATE,CITY: AREA CODE: NUMBER:

    AL, Anniston 205 236-9711
    AL, Birmingham 205 328-2310
    AL, Decatur 205 355-0206
    AL, Dothan 205 793-5034
    AL, Florence 205 767-7960
    AL, Huntsville 205 539-2281
    AL, Mobile 205 432-1680
    AL, Montgomery 205 269-0090
    AL, Tuscaloosa 205 752-1472
    AZ, Phoenix 602 254-0244
    AZ, Tucson 602 747-0107
    AR, Ft.Smith 501 782-2852
    AR, Little Rock 501 327-4616
    CA, Bakersfield 805 327-8146
    CA, Chico 916 894-6882
    CA, Colton 714 824-9000
    CA, Compton 213 516-1007
    CA, Concord 415 827-3960
    CA, Escondido 619 741-7756
    CA, Eureka 707 444-3091
    CA, Fresno 209 233-0961
    CA, Garden Grove 714 898-9820
    CA, Glendale 818 507-0909
    CA, Hayward 415 881-1382
    CA, Los Angeles 213 624-2251
    CA, Marina Del Rey 213 306-2984
    CA, Merced 209 383-2557
    CA, Modesto 209 576-2852
    CA, Montery 408 646-9092
    CA, Norwalk 213 404-2237
    CA, Oakland 415 836-4911
    CA, Oceanside 619 430-0613
    CA, Palo Alto 415 856-9995
    CA, Pomona 714 626-1284
    CA, Sacramento 916 448-6262
    CA, Salinas 408 443-4940
    CA, San Carlos 415 591-0726
    CA, San Diego 619 233-0233
    CA, San Francisco 415 956-5777
    CA, San Jose 408 294-9119
    CA, San Pedro 213 548-6141
    CA, San Rafael 415 472-5360
    CA, San Ramon 415 829-6705
    CA, Santa Ana 714 558-7078
    CA, Santa Barbara 805 682-5361
    CA, Santa Cruz 408 429-6937
    CA, Santa Rosa 707 656-6760
    CA, Stockton 209 957-7610
    CA, Thousand Oaks 805 495-3588
    CA, Vallejo 415 724-4200
    CA, Ventura 805 656-6760
    CA, Visalia 209 627-1201
    CA, West Covina 818 915-5151
    CA, Woodland Hills 818 887-3160
    C0, Colorado 719 635-5361
    CO, Denver 303 337-6060
    CO, Ft. Collins 303 493-9131
    CO, Grand Junction 303 241-3004
    CO, Greeley 303 352-8563
    CO, Pueblo 719 542-4053
    CT, Bridgeport 203 335-5055
    CT, Danbury 203 794-9075
    CT, Hartford 203 247-9479
    CT, Middletown 203 344-8217
    CT, New Britain 203 225-7027
    CT, New Haven 203 624-5954
    CT, New London 203 447-8455
    CT, Norwalk 203 866-7404
    CT, Stamford 203 348-0787
    CT, Waterbury 203 753-4512
    DE, Dover 302 678-8328
    DE, Newark 302 454-7710
    DC, Washington 202 429-7896
    DC, Washington 202 429-7800
    FL, Boca Raton 407 338-3701
    FL, Cape Coral 813 275-7924
    FL, Cocoa Beach 407 267-0800
    FL, Daytona Beach 904 255-2629
    FL, Ft. Lauderdale 305 764-4505
    FL, Gainsville 904 338-0220
    FL, Jacksonville 904 353-1818
    FL, Lakeland 813 683-5461
    FL, Melbourne 407 242-8247
    FL, Miami 305 372-0230
    FL, Naples 813 263-3033
    FL, Ocala 904 351-3790
    FL, Orlando 407 422-4099
    FL, Pensacola 904 432-1335
    FL, Pompano Beach 305 941-5445
    FL, St. Petersburg 813 323-4026
    FL, Sarasota 813 923-4563
    FL, Tallahassee 904 681-1902
    FL, Tampa 813 224-9920
    FL, West Palm Beach 407 833-6691
    GA, Albany 912 888-3011
    GA, Athens 404 548-5590
    GA, Atlanta 404 523-0834
    GA, Augusta 404 724-2752
    GA, Colombus 404 571-0556
    GA, Macon 912 743-8844
    GA, Rome 404 234-1428
    GA, Savannah 912 236-2605
    HI, Oahu 808 528-0200
    ID, Boise 208 343-0611
    ID, Idaho Falls 208 529-0406
    ID, Lewiston 208 743-0099
    ID, Pocatella 208 232-1764
    IL, Aurora 312 896-0620
    IL, Bloomington 309 827-7000
    IL, Chicago 312 938-0600
    IL, Decatur 217 429-0235
    IL, Dekalb 815 758-2623
    IL, Joliet 815 726-0070
    IL, Peoria 309 637-8570
    IL, Rockford 815 965-0400
    IL, Springfield 217 753-1373
    IL, Urbana 217 384-6428
    IN, Bloomington 812 332-1344
    IN, Evansville 812 424-7693
    IN, Ft. Wayne 219 426-2268
    IN, Gary 219 882-8800
    IN, Indianapolis 317 299-0024
    IN, Kokomo 317 455-2460
    IN, Lafayette 317 742-6000
    IN, Muncie 317 282-6418
    IN, South Bend 219 233-7104
    IN, Terre Haute 812 232-5329
    IA, Ames 515 233-6300
    IA, Cedar Rapids 319 364-0911
    IA, Davenport 319 324-2445
    IA, Des Moines 515 288-4403
    IA, Dubuque 319 556-0783
    IA, Iowa City 319 351-1421
    IA, Sioux City 712 255-1545
    IA, Waterloo 319 232-5441
    KS, Lawrence 913 843-8124
    KS, Manhattan 913 537-0948
    KS, Salina 913 825-7900
    KS, Topeka 913 233-9880
    KS, Wichita 316 262-5669
    KY, Bowling Green 502 782-7941
    KY, Frankfort 502 875-4654
    KY, Lexington 606 233-0312
    KY, Louisville 502 589-5580
    KY, Owensboro 502 686-8107
    LA, Alexandria 318 445-1053
    LA, Baton Rouge 504 343-0753
    LA, Lafayette 318 233-0002
    LA, Lake Charles 318 436-0518
    LA, Monroe 318 387-6330
    LA, New Orleans 504 524-4094
    LA, Shreveport 318 221-5833
    ME, Augusta 207 622-3123
    ME, Brewer 207 989-3081
    ME, Lewiston 207 784-0105
    ME, Portland 207 761-4000
    MD, Annapolis 301 224-8550
    MD, Baltimore 301 727-6060
    MD, Frederick 301 293-9596
    MA, Boston 617 292-0662
    MA, Brockton 508 580-0721
    MA, Fall River 508 677-4477
    MA, Framingham 508 879-6798
    MA, Lawrence 508 975-2273
    MA, Lexington 617 863-1550
    MA, Lowell 508 937-5214
    MA, New Bedford 508 999-2915
    MA, Northampton 413 586-0510
    MA, Pittsfield 413 499-7741
    MA, Salem 508 744-1559
    MA, Springfield 413 781-3811
    MA, Woods Hole 508 540-7500
    MA, Worcester 508 755-4740
    MI, Ann Arbor 313 996-5995
    MI, Battle Creek 616 968-0929
    MI, Detroit 313 964-2988
    MI, Flint 313 235-8517
    MI, Grand Rapids 616 774-0966
    MI, Jackson 517 782-8111
    MI, Kalamazoo 616 345-3088
    MI, Lansing 517 484-0062
    MI, Midland 517 832-7068
    MI, Muskegon 616 726-5723
    MI, Pontiac 313 332-5120
    MI, Port Huron 313 982-8364
    MI, Saginaw 517 790-5166
    MI, Southfield 313 827-4710
    MI, Traverse City 616 946-2121
    MI, Warren 313 575-9152
    MN, Duluth 218 722-1719
    MN, Mankato 517 388-3780
    MN, Minneapolis 612 341-2459
    MN, Rochester 507 282-5917
    MN, St. Cloud 612 253-2064
    MS, Gulfport 601 863-0024
    MS, Jackson 601 969-0036
    MS, Meridian 601 482-2210
    MS, Starkville 601 324-2155
    MO, Columbia 314 449-4404
    MO, Jefferson City 314 634-5178
    MO, Kansas City 816 221-9900
    MO, St. Joseph 816 279-4797
    MO, St. Louis 314 421-4990
    MO, Springfield 417 864-4814
    MT, Billings 406 245-7649
    MT, Great Falls 406 771-0067
    MT, Helena 406 443-0000
    MT, Missoula 406 721-5900
    NE, Lincoln 402 475-4964
    NE, Omaha 402 341-7733
    NV, Las Vegas 702 737-6861
    NV, Reno 702 827-6900
    NH, Concord 603 224-1024
    NH, Durham 603 868-2924
    NH, Manchester 603 627-8725
    NH, Nashua 603 880-6241
    NH, Portsmouth 603 431-2302
    NJ, Atlantic City 609 348-0561
    NJ, Freehold 201 780-5030
    NJ, Hackensack 201 488-6567
    NJ, Marlton 609 596-1500
    NJ, Merchantville 609 663-9297
    NJ, Morristown 201 455-0275
    NJ, New Brunswick 201 745-2900
    NJ, Newark 201 623-0469
    NJ, Passaic 201 778-5600
    NJ, Paterson 201 684-7560
    NJ, Princeton 609 799-5587
    NJ, Rahway 201 815-1885
    NJ, Redbank 201 571-0003
    NJ, Roseland 201 227-5277
    NJ, Sayreville 201 525-9507
    NJ, Trenton 609 989-8847
    NM, Albuquerque 505 243-4479
    NM, Las Cruces 505 526-9191
    NM, Santa Fe 505 473-3403
    NY, Albany 518 465-8444
    NY, Binghampton 607 772-6642
    NY, Buffalo 716 847-1440
    NY, Dear Park 516 667-5566
    NY, Hempstead 516 292-3800
    NY, Ithaca 607 277-2142
    NY, New York City 212 741-8100
    NY, New York City 212 620-6000
    NY, Plattsburgh 518 562-1890
    NY, Poughkeepsie 914 473-2240
    NY, Rochester 716 454-1020
    NY, Syracuse 315 472-5583
    NY, Utica 315 797-0920
    NY, Whit Plains 914 328-9199
    NC, Asheville 704 252-9134
    NC, Charlotte 704 332-3131
    NC, Fayetteville 919 323-8165
    NC, Gastonia 704 865-4708
    NC, Greensboro 919 273-2851
    NC, High Point 919 889-7494
    NC, North Wilkesboro 919 838-9034
    NC, Raleigh 919 834-8254
    NC, Res Tri Park 919 549-8139
    NC, Tarboro 919 823-0579
    NC, Wilmington 919 763-8313
    NC, Winston-Salem 919 725-2126
    ND, Fargo 701 235-7717
    ND, Grand Forks 701 775-7813
    ND, Mandan 701 663-2256
    OH, Canton 216 452-0903
    OH, Cincinnati 513 579-0390
    OH, Cleveland 216 575-1658
    OH, Colombus 614 463-9340
    OH, Dayton 513 461-5254
    OH, Elyria 216 323-5059
    OH, Hamilton 513 863-4116
    OH, Kent 216 678-5115
    OH, Lorain 216 960-1170
    OH, Mansfield 419 526-0686
    OH, Sandusky 419 627-0050
    OH, Springfield 513 324-1520
    OH, Toledo 419 255-7881
    OH, Warren 216 394-0041
    OH, Wooster 216 264-8920
    OH, Youngstown 216 743-1296
    OK, Bartlesville 918 336-3675
    OK, Lawton 405 353-0333
    OK, Oklahoma City 405 232-4546
    OK, Stillwater 405 624-1113
    OK, Tulsa 918 584-3247
    OR, Corvallis 503 754-9273
    OR, Eugena 503 683-1460
    OR, Hood River 503 386-4405
    OR, Klamath Falls 503 882-6282
    OR, Medford 503 779-6343
    OR, Portland 503 295-3028
    OR, Salem 503 378-7712
    PA, Allentown 215 435-3330
    PA, Altoona 814 949-0310
    PA, Carlisle 717 249-9311
    PA, Danville 717 271-0102
    PA, Erie 814 899-2241
    PA, Harrisburg 717 236-6882
    PA, Johnstown 814 535-7576
    PA, King Of Prussia 215 337-4300
    PA, Lancaster 717 295-5405
    PA, Philadelphia 215 574-9462
    PA, Pittsburgh 412 288-9950
    PA, Reading 215 376-8750
    PA, Scranton 717 961-5321
    PA, State College 814 231-1510
    PA, Wilkes-Barre 717 829-3108
    PA, Williamsport 717 494-1796
    PA, York 717 846-6550
    RI, Providence 401 751-7910
    SC, Charleston 803 722-4303
    SC, Columbia 803 254-0695
    SC, Greenville 803 233-3486
    SC, Spartenburg 803 585-1637
    SC, Pierre 605 224-0481
    SC, Rapid City 605 348-2621
    SC, Sioux Falls 605 336-8593
    TN, Bristol 615 968-1130
    TN, Chattanooga 615 756-1161
    TN, Clarksville 615 552-0032
    TN, Johnson City 615 282-6645
    TN, Knoxville 615 525-5500
    TN, Memphis 901 521-0215
    TN, Nashville 615 244-3702
    TN, Oak Ridge 615 481-3590
    TX, Abilene 915 676-9151
    TX, Amarillo 806 373-0458
    TX, Athens 214 677-1712
    TX, Austin 512 928-1130
    TX, Brownsville 512 542-0367
    TX, Bryan 409 822-0159
    TX, Corpus Christi 512 884-9030
    TX, Dallas 214 748-6371
    TX, El Paso 915 532-7907
    TX, Ft. Worth 817 332-4307
    TX, Galveston 409 762-4382
    TX, Houston 713 227-1018
    TX, Laredo 512 724-1791
    TX, Longview 214 236-4205
    TX, Lubbock 806 747-4121
    TX, Mcallen 512 686-5360
    TX, Midland 915 561-9811
    TX, Nederland 409 722-3720
    TX, San Angelo 915 944-7612
    TX, San Antonio 512 225-8004
    TX, Sherman 214 893-4995
    TX, Temple 817 773-9723
    TX, Tyler 214 597-8925
    TX, Waco 817 752-9743
    TX, Wichita Falls 817 322-3774
    UT, Ogden 801 627-1630
    UT, Provo 801 373-0542
    UT, Salt Lake City 801 359-0149
    VT, Burlington 802 864-0808
    VT, Montpelier 802 229-4966
    VT, Rutland 802 775-1676
    VT, White River Jct. 802 295-7631
    VA, Blacksburg 703 552-9181
    VA, Charlottesville 804 977-5330
    VA, Covington 703 962-2217
    VA, Fredericksburg 703 371-0188
    VA, Harrisonburg 703 434-7121
    VA, Herndon 703 435-1800
    VA, Lynchburg 804 845-0010
    VA, Newport News 804 596-6600
    VA, Norfolk 804 625-1186
    VA, Richmond 804 788-9902
    VA, Roanoke 703 344-2036
    WA, Auburn 206 939-9982
    WA, Bellingham 206 733-2720
    WA, Everett 206 775-9929
    WA, Longview 206 577-5835
    WA, Olympia 206 754-0460
    WA, Richland 509 943-0649
    WA, Seattle 206 625-9612
    WA, Spokane 509 455-4071
    WA, Tacoma 206 627-1791
    WA, Vancouver 206 693-6914
    WA, Wenatchee 509 663-6227
    WA, Yakima 509 575-1060
    WV, Charleston 304 343-6471
    WV, Huntington 304 523-2802
    WV, Morgantown 304 292-0104
    WV, Wheeling 304 233-7732
    WI, Beloit 608 362-5287
    WI, Eau Claire 715 836-9295
    WI, Green Bay 414 432-2815
    WI, Kenosha 414 552-9242
    WI, La Crosse 608 784-0560
    WI, Madison 608 257-5010
    WI, Milwaukee 414 271-3914
    WI, Neenah 414 722-7636
    WI, Racine 414 632-6166
    WI, Sheboygan 414 452-3995
    WI, Wausau 715 845-9584
    WI, West Bend 414 334-2206
    WY, Casper 307 265-5167
    WY, Cheyenne 307 638-4421
    WY, Laramie 307 721-5878


    H. Telenet DNIC's



    Here is the list of all the Telenet DNIC's. These will be defined and explained in the next section:

     
    DNIC: NETWORK:

    02041 Datanet-1
    02062 DCS
    02080 Transpac
    02284 Telepac (Switzerland)
    02322 Datex-P (Austria)
    02392 Radaus
    02342 PSS
    02382 Datapak (Denmark)
    02402 Datapak (Sweden)
    02405 Telepak
    02442 Finpak
    02624 Datex-P (West Germany)
    02704 Luxpac
    02724 Eirpak
    03020 Datapac
    03028 Infogram
    03103 ITT/UDTS (U.S.A.)
    03106 Tymnet
    03110 Telenet
    03340 Telepac (Mexico)
    03400 UDTS (Curacau)
    04251 Isranet
    04401 DDX-P
    04408 Venus-P
    04501 Dacom-Net
    04542 Intelpak
    05052 Austpac
    05053 Midas
    05252 Telepac (Hong Kong)
    05301 Pacnet
    06550 Saponet
    07240 Interdata
    07241 Renpac
    07421 Dompac
    09000 Dialnet

    I. Telenet NUA's


    Here is a list of a few Telenet NUA's and what type of system they are. But first, this is how an NUA is put together:

     
    031106170023700
    \ /\ / \ /
    | | |
    DNIC Area NUA
    Code

    The DNIC says which network connected to Telenet you are using.
    The area code is the area code for the area that the NUA is in. And the NUA is the address of the computer on Telenet. Please note that an NUA does NOT have to be in your area code for you to connect to it.

    There are two ways of finding useful NUA's. The first way is to get or write an NUA scanning program. The second way is to get a copy of the Legion Of Doom's Telenet Directory.( Volume 4 of the LOD Technical Journals)

    Now, here is the list. Remember that these are only a few NUA's.
    These are NOT all of the Telenet NUA's. All of these NUA's DO accept reverse charging. Also, please note that all of these may not be working by the time you read this and that network congestion frequently makes an NUA inaccessible for a short period of time.

     
    NUA: SYSTEM TYPE:

    031102010022500 VAX
    031102010015600 UNIX
    031102010022000 VAX
    031102010025900 UNIX
    031102010046100 VAX
    031102010025200 PRIME
    031102010046100 VAX
    031102010052200 VAX
    031102020001000 PRIME
    031102020013200 VAX
    031102020014100 PRIME
    031102020014200 PRIME
    031102020015000 VAX
    031102020016100 UNIX
    031102020021400 PRIME
    031102020024500 AOS
    031102020030800 PRIME
    031102020030900 PRIME
    031102020031200 PRIME
    031102020033600 VAX
    031102020033700 VAX
    031102020034300 PRIME
    031102020036000 HP-3000
    031102030007500 VAX
    031102030002200 VM/370
    031102030013600 PRIME
    031102060003200 HP-3000
    031102060044000 VAX
    031102060044900 NOS
    031102060044700 VM/370
    031102120003900 NOS
    031102120015200 PRIME
    031102120026600 VAX
    031102120026300 VAX
    031102120026700 UNIX
    031102120044900 UNIX
    031102120053900 VOS
    031102140024000 VAX

    J. Basic UNIX hacking

    UNIX is probably the most commonly used operating system on Telenet, and is the easiest to hack since it doesn't record bad login attempts. You know you've found a UNIX system when it gives you a "Login" prompt, and then a "Password" prompt. To get in you should first try the default logins.(Listed below.) If these don't work try some of the passwords listed in Section M. If these don't work try to find backdoors. These are passwords that may have been put in to allow the programmer (or someone else who could be in a position to make a backdoor) to get access into the system. These are usually not known about by anyone but the individual who made it. Try doing some research on the programmer and other people who helped to make the system. And, if these don't work, just try guessing them. The Login (usually the account holders name) has 1-8 characters and the Password is 6-8 characters. Both can be either letters or numbers, or a combination of the two.
    Once you get in, you should get a "$" prompt, or some other special character like it. You should only use lower case letters when hacking UNIX, this seems to be standard format. If you type "man [command]" at the prompt, it should list all of the commands for that system. Anyway, here are the default Logins and Passwords:

     
    Login: Password:

    root root
    root system
    sys sys
    sys system
    daemon daemon
    uucp uucp
    tty tty
    test test
    unix unix
    unix test
    bin bin
    adm adm
    adm admin
    admin adm
    admin admin
    sysman sysman
    sysman sys
    sysman system
    sysadmin sysadmin
    sysadmin sys
    sysadmin system
    sysadmin admin
    sysadmin adm
    who who
    learn learn
    uuhost uuhost
    guest guest
    host host
    nuucp nuucp
    rje rje
    games games
    games player
    sysop sysop
    root sysop
    demo demo

    Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things:

     
    /etc/passwd

    or

     
    cat /etc/passwd

    The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this:

     
    john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john

    Broken down, this is what the above password file states:

     
    Username: john
    Encrypted Password: 234abc56
    User Number: 9999
    Group Number: 13
    Other Information: John Johnson
    Home Directory: /home/dir/john
    Shell: /bin/john

    If the password file does not show up under one of the above two commands, then it is probably shadowed.
    The following definition of password shadowing was taken from the alt.2600 hack faq:
    "Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users."
    If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using:

     
    UNIX System Type: Path: Token:

    AIX 3 /etc/security/passwd !
    or /tcb/auth/files//

    A/UX 3.Os /tcb/files/auth/ *

    BSD4.3-Reno /etc/master.passwd *

    ConvexOS 10 /etc/shadpw *

    Convex0S 11 /etc/shadow *

    DG/UX /etc/tcb/aa/user *

    EP/IX /etc/shadow x

    HP-UX /.secure/etc/passwd *

    IRIX 5 /etc/shadow x

    Linux 1.1 /etc/shadow *

    OSF/1 /etc/passwd[.dir|.pag] *

    SCO UNIX #.2.x /tcb/auth/files//

    SunOS 4.1+c2 /etc/security/passwd.adjunct ##

    SunOS 5.0 /etc/shadow

    System V 4.0 /etc/shadow x

    System V 4.2 /etc/security/ * database

    Ultrix 4 /etc/auth[.dir|.pag] *

    UNICOS /etc/udb *

    Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data:

     
    bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob

    The characters in the password aging data stand for the following:


    1. Maximum number of weeks a password can be used without changing.
    2. Minimum number of weeks a password must be used before being changed.
    3&4. Last time password was changed, in number of weeks since 1970.


    The password aging data can be decoded using the chart below:

     
    Character: Number:

    . 0
    / 1
    0 2
    1 3
    2 4
    3 5
    4 6
    5 7
    6 8
    7 9
    8 10
    9 11
    A 12
    B 13
    C 14
    D 15
    E 16
    F 17
    G 18
    H 19
    I 20
    J 21
    K 22
    L 23
    M 24
    N 25
    O 26
    P 27
    Q 28
    R 29
    S 30
    T 31
    U 32
    V 33
    W 34
    X 35
    Y 36
    Z 37
    a 38
    b 39
    c 40
    d 41
    e 42
    f 43
    g 44
    h 45
    i 46
    j 47
    k 48
    l 49
    m 50
    n 51
    o 52
    p 53
    q 54
    r 55
    s 56
    t 57
    u 58
    v 59
    w 60
    x 61
    y 62
    z 63

    Now, explore the system freely, be careful, and have fun!


    K. Basic VAX/VMS hacking


    The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's:

     
    Username: Password:

    SYSTEM OPERATOR
    SYSTEM MANAGER
    SYSTEM SYSTEM
    SYSTEM SYSLIB
    OPERATOR OPERATOR
    SYSTEST UETP
    SYSTEST SYSTEST
    SYSTEST TEST
    SYSMAINT SYSMAINT
    SYSMAINT SERVICE
    SYSMAINT DIGITAL
    FIELD FIELD
    FIELD SERVICE
    GUEST GUEST
    GUEST unpassworded
    DEMO DEMO
    DEMO unpassworded
    TEST TEST
    DECNET DECNET



    Here are some of the VAX/VMS commands:

     
    Command: Function:

    HELP (H) Gives help and list of commands.
    TYPE (T) View contents of a file.
    RENAME (REN) Change name of a file.
    PURGE (PU) Deletes old versions of a file.
    PRINT (PR) Prints a file.
    DIRECTORY (DIR) Shows list of files.
    DIFFERENCES (DIF) Shows differences between files.
    CREATE (CR) Creates a file.
    DELETE (DEL) Deletes a file.
    COPY (COP) Copy a file to another.
    CONTINUE (C) Continues session.



    The password file on VAX's are available when you type in the command:

     
    SYS$SYSTEM:SYSUAF.DAT

    The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J.
    Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced.
    But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts.


    L. Basic PRIME hacking


    PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN ". It should then ask you for your username and password. The default usernames and passwords are listed below:

     
    Username: Password:

    PRIME PRIME
    PRIME PRIMOS
    PRIMOS PRIMOS
    PRIMOS PRIME
    PRIMOS_CS PRIME
    PRIMOS_CS PRIMOS
    PRIMENET PRIMENET
    SYSTEM SYSTEM
    SYSTEM PRIME
    SYSTEM PRIMOS
    NETLINK NETLINK
    TEST TEST
    GUEST GUEST
    GUEST1 GUEST

    When you are inside the system, type "NETLINK" and it ahould give you alot of help. This system uses NUA's, too. I might print these in the next volume.

     
    M. Password List

    The password list was taken from A Novice's Guide To Hacking, by The Legion Of Doom, and from some of my own discoveries. Here is the list of commonly used passwords:

     
    Password:

    aaa
    academia
    ada
    adrian
    aerobics
    airplane
    albany
    albatross
    albert
    alex
    alexander
    algebra
    alias
    alisa
    alpha
    alphabet
    ama
    amy
    analog
    anchor
    andy
    andrea
    animal
    answer
    anything
    arrow
    arthur
    ass
    asshole
    athena
    atmosphere
    bacchus
    badass
    bailey
    banana
    bandit
    banks
    bass
    batman
    beautiful
    beauty
    beaver
    daniel
    danny
    dave
    deb
    debbie
    deborah
    december
    desire
    desperate
    develop
    diet
    digital
    discovery
    disney
    dog
    drought
    duncan
    easy
    eatme
    edges
    edwin
    egghead
    eileen
    einstein
    elephant
    elizabeth
    ellen
    emerald
    engine
    engineer
    enterprise
    enzyme
    euclid
    evelyn
    extension
    fairway
    felicia
    fender
    finite
    format
    god
    hello
    idiot
    jester
    john
    johnny
    joseph
    joshua
    judith
    juggle
    julia
    kathleen
    kermit
    kernel
    knight
    lambda
    larry
    lazarus
    lee
    leroy
    lewis
    light
    lisa
    louis
    love
    lynne
    mac
    macintosh
    mack
    maggot
    magic
    malcolm
    mark
    markus
    martin
    marty
    marvin
    matt
    master
    maurice
    maximum
    merlin
    mets
    michael
    michelle
    mike
    minimum
    nicki
    nicole
    rascal
    really
    rebecca
    remote
    rick
    reagan
    robot
    robotics
    rolex
    ronald
    rose
    rosebud
    rosemary
    roses
    ruben
    rules
    ruth
    sal
    saxon
    scheme
    scott
    secret
    sensor
    serenity
    sex
    shark
    sharon
    shit
    shiva
    shuttle
    simon
    simple
    singer
    single
    singing
    smile
    smooch
    smother
    snatch
    snoopy
    soap
    socrates
    spit
    spring
    subway
    success
    summer
    super
    support
    surfer
    suzanne
    tangerine
    tape
    target
    taylor
    telephone
    temptation
    tiger
    tigger
    toggle
    tomato
    toyota
    trivial
    unhappy
    unicorn
    unknown
    urchin
    utility
    vicki
    virgin
    virginia
    warren
    water
    weenie
    whatnot
    whitney
    will
    william
    winston
    willie
    wizard
    wonbat
    yosemite
    zap

    N. Connecting modems to different phone lines

    Ok, if you are really paranoid (or smart) and you don't want to hack from your house for fear of getting caught, you can hook up your modem to other peoples phone lines or to payphones.
    If you want to hook your modem to a payphone, do it late at night and at a very secluded payphone. Look along either side of the phone. You should see a small metal tube (which contains the telephone wires) running along the wall. Somewhere along the tube it should widen out into a small box. Pop off the boxes lid and there is a nice little phone jack for ya'. Taking off the lid may be difficult because they are usually pretty secure, but nothing is impossible, so keep trying. Of course, you can only do this with a lap-top computer.
    Now, if you want to hook up the modem to someone's house or appartment phone line, you need to get a pair of red and green alligator clips, and an extra modem cord for your lap-top.
    After you get those parts, cut the plastic end off of your modem cord and you will see a red wire, a green wire, and two other wires, but you can ignore those. Attach the red alligator clip to the red wire, and attach the green alligator clip to the green wire and you're all set. Now all you need to do is go find a telephone pole or one of those small green boxes that stick out of the ground.(They should have a Bell Systems logo on them.)
    On a telephone pole open the little box that has a bunch of wires going to and from it. On the right side of the box you should see what look like two large screws.(These are called "terminals".) One should have a red wire wrapped around it and the other should have a green wire wrapped around it. Attach the red alligator clip the the red wire and the green alligator clip to the green wire, and you're all set. This should get you a dial tone. If it doesn't, make sure that the alligator clips are not touching each other, and that the alligator clips are attached to the exposed end of the wire.
    Now, on those green boxes you need to undo all of the screws and shit holding the lid on, and open it up. Then you should find basically the same setup as in the telephone pole. Attach the appropriate wires to the appropriate terminals and you are all set.
    This process can also be used to hook up a Beige Box (Lineman's Handset.) when phreaking.


    O. Viruses, Trojans, and Worms


    Just in case some of you are interested, here are the definitions for Viruses, Trojans, and Worms. These definitions were taken from the alt.2600 hack faq.

    Trojan:

    "Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans."

    Virus:

    "A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore."

    Worm:

    "Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."


    II. PHREAKING


    A. What is phreaking


    Phreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls. In the following sections, you will learn some about boxes, what they are, and how they work. You will also learn about the other forms of phreaking.


    B. Why phreak?


    Phreaking, like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information.


    C. Phreaking rules

    Most of the same rules apply for hacking and phreaking, so I will only list a few here.


    1. Never box over your home phone line.
    2. You should never talk about phreaking projects over your home phone line.
    3. Never use your real name when phreaking.
    4. Be careful who you tell about your phreaking projects.
    5. Never leave phreaking materials out in the open. Keep them in a safe place.
    6. Don't get caught.


    D. Where and how to start phreaking


    Well, you can phreak on any telephone, but as stated above, it is very stupid to do so on your home phone line.
    First you need you need to construct the boxes needed for what you want to do. All of the boxes and their descriptions are listed in the next section. Most of the boxes are very easy to make, but if your not into making shit, there are usually alternative ways of making them.


    E. Boxes and what they do

     
    Box: Description:

    Red Box generates tones for free phone calls
    Black Box when called, caller pays nothing
    Beige Box lineman's handset
    Green Box generates coin return tones
    Cheese Box turns your phone into a payphone
    Acrylic Box steal 3-way calling and other services
    Aqua Box stops F.B.I. lock-in-trace
    Blast Box phone microphone amplifier
    Blotto Box shorts out all phones in your area
    Blue Box generates 2600hz tone
    Brown Box creates party line
    Bud Box tap neighbors phone
    Chatreuse Box use electricity from phone
    Chrome Box manipulates traffic signals
    Clear Box free calls
    Color Box phone conversation recorder
    Copper Box causes crosstalk interference
    Crimson Box hold button
    Dark Box re-route calls
    Dayglo Box connect to neighbors phone line
    Divertor Box re-route calls
    DLOC Box create party line
    Gold Box dialout router
    Infinity Box remote activated phone tap
    Jack Box touch-tone key pad
    Light Box in-use light
    Lunch Box AM transmitter
    Magenta Box connect remote phone line to another
    Mauve Box phone tap without cutting into the line
    Neon Box external microphone
    Noise Box creates line noise
    Olive Box external ringer
    Party Box creates party line
    Pearl Box tone generator
    Pink Box creates party line
    Purple Box hold button
    Rainbow Box kill trace
    Razz Box tap neighbors phone
    Rock Box add music to phone line
    Scarlet Box causes interference
    Silver Box create DTMF tones for A,B,C, and D
    Static Box raises voltage on phone line
    Switch Box add services
    Tan Box phone conversation recorder
    TV Cable Box see sound waves on TV
    Urine Box create disturbance on phone headset
    Violet Box stop payphone from hanging up
    White Box DTMF key pad
    Yellow Box add line extension


    F. Box Plans

    The Red Box is the main tool that you will use so I have included the Red Box plans. The other box plans can be downloaded from the Internet.

    Red Box:

    There are two ways that you can make a Red Box:

    One is to go to Radio Shack and buy a tone dialer and a 6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you can order them from the electronics companies that I have listed at the end of this section.) Open up the tone dialer and replace the existing crystal (big, shiny, metal thing labeled "3.579545Mhz") with the 6.5536Mhz crystal. Now, close it up. You have a red box.
    To use it for long distance calls play the tones that add up to the amount of money that the operator requests. For a 25 cents tone press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press 1 *.
    And, the second way, which is a much easier method, is to get the Red Box tones from a phreaking program, such as: Omnibox, or Fear's Phreaker Tools. Play the tones as you hold a microcassette recorder about 1-inch away from your computer speakers, and record the tones.
    The Red Box only works on public telephones, it does not work on COCOT's.(Defined in next section.) It makes the telephone think that you have put money in. Red Boxes do not work on local calls because the phone is not using ACTS (Automated Coin Toll System), unless you call the operator and have her place the call for you. You tell her the number that you want to dial and then when she asks you to put in your money, play the tones. If she asks you why you need her to place the call tell her that one of the buttons is smashed in or something like that. You now have and know how to use a Red Box!

    Electronics Companies:

    Alltronics
    2300 Zanker Road
    San Jose, CA 95131
    (408)943-9774 -Voice-
    (408)943-9776 -Fax-

    Blue Saguaro
    P.O. Box 37061
    Tucson, AZ 85740

    Mouser
    (800)346-6873

    Unicorn Electronics
    10000 Canoga Ave. Unit C-2
    Chatsworth, CA 91311
    1-800-824-3432


    G. Free calling from COCOT's


    First of all, COCOT stands for "Customer Owned Customer Operated Telephone". These are most likely to be found at resteraunts, amusement parks, etc.
    All you have to do to make a free call from a COCOT is dial a 1-800 number (they let you do this for free), say some bullshit and get them to hang up on you. Stay on the line after they hang up, then dial the number that you want to call.
    This may not work by the time you read this because COCOT owners are becoming more aware of us every day.


    H. ANAC numbers


    ANAC stands for "Automated Number Announcment Circuit". In other words, you call the ANAC number in your area and it tells you the number that you are calling from. This is useful when Beige Boxing, or hooking your modem up to other phone lines, to find out what number you are using. The "?" are substituted for unknown numbers. Do some scanning to find them out. Here are the ANAC numbers for the U.S.A. with their area code, and the only one I knew of in the U.K.:

     
    U.S.A.:

    Area Code: ANAC Number:

    201 958
    202 811
    203 970
    205 300-222-2222
    205 300-555-5555
    205 300-648-1111
    205 300-765-4321
    205 300-798-1111
    205 300-833-3333
    205 557-2311
    205 811
    205 841-1111
    205 908-222-2222
    206 411
    207 958
    209 830-2121
    209 211-9779
    210 830
    212 958
    213 114
    213 1223
    213 211-2345
    213 211-2346
    213 760-2???
    213 61056
    214 570
    214 790
    214 970-222-2222
    214 970-611-1111
    215 410-????
    215 511
    215 958
    216 200-????
    216 331
    216 959-9968
    217 200-???-????
    219 550
    219 559
    301 958-9968
    310 114
    310 1223
    310 211-2345
    310 211-2346
    312 200
    312 290
    312 1-200-8825
    312 1-200-555-1212
    313 200-200-2002
    313 200-222-2222
    313 200-???-????
    313 200200200200200
    314 410-????
    315 953
    315 958
    315 998
    317 310-222-2222
    317 559-222-2222
    317 743-1218
    334 5572411
    334 5572311
    401 200-200-4444
    401 222-2222
    402 311
    404 311
    404 940-???-????
    404 940
    405 890-7777777
    405 897
    407 200-222-2222
    408 300-???-????
    408 760
    408 940
    409 951
    409 970-????
    410 200-6969
    410 200-555-1212
    410 811
    412 711-6633
    412 711-4411
    412 999-????
    413 958
    413 200-555-5555
    414 330-2234
    415 200-555-1212
    415 211-2111
    415 2222
    415 640
    415 760-2878
    415 7600-2222
    419 311
    502 200-2222222
    502 997-555-1212
    503 611
    503 999
    504 99882233
    504 201-269-1111
    504 998
    504 99851-0000000000
    508 958
    508 200-222-1234
    508 200-222-2222
    508 26011
    509 560
    510 760-1111
    512 830
    512 970-????
    515 5463
    515 811
    516 958
    516 968
    517 200-222-2222
    517 200200200200200
    518 511
    518 997
    518 998
    603 200-222-2222
    606 997-555-1212
    606 711
    607 993
    609 958
    610 958
    610 958-4100
    612 511
    614 200
    614 517
    615 200200200200200
    615 2002222222
    615 830
    616 200-222-2222
    617 200-222-1234
    617 200-222-2222
    617 200-444-4444
    617 220-2622
    617 958
    618 200-???-????
    618 930
    619 211-2001
    619 211-2121
    703 811
    704 311
    707 211-2222
    708 1-200-555-1212
    708 1-200-8825
    708 200-6153
    708 724-9951
    708 356-9646
    713 380
    713 970-????
    713 811
    714 114
    714 211-2121
    714 211-2222
    716 511
    716 990
    717 958
    718 958
    802 2-222-222-2222
    802 200-222-2222
    802 1-700-222-2222
    802 111-2222
    805 114
    805 211-2345
    805 211-2346
    805 830
    806 970-????
    810 200200200200200
    812 410-555-1212
    813 311
    815 200-???-????
    817 290
    817 211
    818 970-611-1111
    818 1223
    818 211-2345
    903 211-2346
    904 970-611-1111
    906 200-222-222
    907 1-200-222-2222
    907 811
    908 958
    910 200
    910 311
    910 988
    914 990-1111
    915 970-????
    916 211-2222
    916 461
    919 200
    919 711

    U.K.:

    175

    III. REFERENCE


    A. Hacking and phreaking WWW. sites

    Here is a list of some World Wide Web sites that contain hacking, phreaking, computer, virus, carding, security, etc. material:

    Site Address:

    http://www.outerlimits.net/lordsome/index.html (Hacker's Layer)
    http://web2.airmail.net/km/hfiles/free.htm (Hacker's Hideout)
    http://resudox.net/bio/novell.html
    http://www.louisville.edu/wrbake01/hack2.html
    http://www.intersurf.com/~materva/files.html
    http://hightop.nrl.navy.mil/rainbow.html
    http://www.rit.edu/~jmb8902/hacking.html
    http://www.spatz.com/pecos/index.html
    http://pages.prodigy.com/FL/dtgz94a/files2.html
    http://www.2600.com (alt.2600)
    http://att.net/dir800
    http://draco.centerline.com:8080/~franl/crypto.html
    http://everest.cs.ucdavis.edu/Security.html
    http://ice-www.larc.nasa.gov/WWW/security.html
    http://lOpht.com (lOpht)
    http://lOpht.com/~oblivion/IIRG.html
    http://underground.org
    http://www.alw.nih.gov/WWW/security.html
    http://www.aspentec.com/~frzmtdb/fun/hacker.html
    http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
    http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
    http://www.engin.umich.edu/~jgotts/underground/boxes.html
    http://www.etext.org/Zines
    http://www.inderect.com/www/johnk/
    http://www.mgmua.com/hackers/index.html
    http://www.paranoia.com/mthreat
    http://www.paranoia.com/astrostar/fringe.html
    http://www.umcc.umich.edu/~doug/virus-faq.html
    http://www.wired.com


    B. Good hacking and phreaking text files


    All of these files are available by download from the Internet.


    File Name:


    A Novice's Guide To Hacking

    Alt.2600 Hack Faq

    The Hacker's Handbook

    The Official Phreaker's Manual

    Rainbow Books (Listed in Section D.)

    The Hacker Crackdown

    Computer Hackers: Rebels With A Cause

    The Legion Of Doom Technical Journals

    The Ultimate Beginner's Guide To Hacking And Phreaking (Of course!)


    C. Hacking and phreaking Newsgroups


    alt.2600
    alt.2600.hope.tech
    alt.cellular
    alt.cellular-phone-tech
    alt.comp.virus
    alt.cracks
    alt.cyberpunk
    alt.cyberspace
    alt.dcom.telecom
    alt.fan.lewiz
    alt.hackers
    alt.hackintosh
    alt.hackers.malicious
    alt.security


    D. Rainbow Books


    The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:

    Infosec Awareness Division
    ATTN: x711/IAOC
    Fort George G. Meade, MD 20755-6000

    or call:
    (410)766-8729


    Here is the list of all the Rainbow Books and their descriptions:

     
    Color: Description:

    Orange 1 D.O.D. Trusted Computer Systems
    Green D.O.D. Password Management
    Yellow Computer Security Requirements
    Yellow 2 Computer Security Requirements
    Tan Understanding Audit In Trusted Systems
    Bright Blue Trusted Product Evaluation
    Neon Orange Understanding Discretionary Access
    Teal Green Glossary Of Computer Terms
    Orange 2 Understanding Configurations
    Red Interpretation Of Evaluation
    Burgundy Understanding Design Documentation
    Dark Lavender Understanding Trusted Distrobution
    Venice Blue Computer Security Sub-Systems
    Aqua Understanding Security Modeling
    Dark Red Interpretations Of Environments
    Pink Rating Maintenence Phase
    Purple Formal Verification Systems
    Brown Understanding Trusted Facilities
    Yellow-Green Writing Trusted Facility Manuals
    Light Blue Understanding Identification And Authentication In Trusted Systems
    Blue Product Evaluation Questionaire
    Gray Selecting Access Control List
    Lavander Data Base Management Interpretation
    Yellow 3 Understanding Trusted Recovery
    Bright Orange Understanding Security Testing
    Purple 1 Guide To System Procurement
    Purple 2 Guide To System Procurement
    Purple 3 Guide To System Procurement
    Purple 4 Guide To System Procurement
    Green Understanding Data Remanence
    Hot Peach Writing Security Features
    Turquiose Understanding Information Security
    Violet Controlled Access Protection
    Light Pink Understanding Covert Channels

    E. Cool hacking and phreaking magazines


    Phrack Magazine

    2600 Magazine

    Tap Magazine

    Phantasy Magazine


    F. Hacking and phreaking movies


    Movie:


    Hackers

    War Games


    G. Hacking and phreaking Gopher sites


    Address:

    ba.com
    csrc.ncsl.nist.gov
    gopher.acm.org
    gopher.cpsr.org
    gopher.cs.uwm
    gopher.eff.org
    oss.net
    spy.org
    wiretap.spies.com


    H. Hacking and phreaking Ftp sites


    Address:

    2600.com
    agl.gatech.edu/pub
    asylum.sf.ca.us
    clark.net/pub/jcase
    ftp.armory.com/pub/user/kmartind
    ftp.armory.com/pub/user/swallow
    ftp.fc.net/pub/defcon/BBEEP
    ftp.fc.net/pub/phrack
    ftp.giga.or.at/pub/hacker
    ftp.lava.net/users/oracle
    ftp.microserve.net/ppp-pop/strata/mac
    ftp.near.net/security/archives/phrack
    ftp.netcom.com/pub/br/bradelym
    ftp.netcom.com/pub/daemon9
    ftp.netcom.com/pub/zz/zzyzx
    ftp.primenet.com/users/k/kludge


    I. Hacking and phreaking BBS's


    BBS's are Bulletin Board Systems on which hackers and phreakers can post messages to each other.
    Here is a list of some BBS's that I know of. If you know of any other BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note that some of these may be old and not running.

     
    Area Code: Phone Number: Name:

    203 832-8441 Rune Stone
    210 493-9975 The Truth Sayer's Domain
    303 343-4053 Hacker's Haven
    315 656-5135 Independent Nation
    315 656-5135 UtOPiA
    617 855-2923 Maas-Neotek
    708 676-9855 Apocalypse 2000
    713 579-2276 KOdE AbOdE
    806 747-0802 Static Line
    908 526-4384 Area 51
    502 499-8933 Blitzkrieg
    510 935-5845 ...Screaming Electron
    408 747-0778 The Shrine
    708 459-7267 The Hell Pit
    415 345-2134 Castle Brass
    415 697-1320 7 Gates Of Hell

    J. Cool hackers and phreakers


    Yes there are many, many, cool hackers and phreakers out there, but these are some that helped me to get this file out on the Internet. I did not list a few people because I only knew their real name, and I don't want to use their real name without their permission.

    Handle:


    Silicon Toad

    Logik Bomb/Net Assasin

    oleBuzzard

    Lord Somer

    Weezel


    Thanks for your help guys.


    K. Hacker's Manifesto


    "This is our world now...the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt cheep if it wasn't run by profiteering gluttons, and you call us criminals. We explore...and you call us criminals. We exist without skin color, without nationality, without religious bias...and you call us criminals. You build atomic bombs, wage wars, murder, cheat, and lie to us and try to make us believe it is for our own good, yet we're the criminals.

    Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker and this is my manifesto. You may stop this individual, but you can't stop us all...after all, we're all alike."

    +++The Mentor+++


    K. Happy hacking!


    Be careful and have fun. Remember to keep your eye out for the next volume of The Ultimate Beginner's Guide To Hacking And Phreaking and the Legion Of the Apocalypse W.W.W. page. Oh, and keep looking for our on-line magazine, too, it should be coming out soon. Well, I hope you enjoyed the file and found it informative. I also hope that I helped get you started in hacking and phreaking.

    "The Revelation is here."

    *-Revelation-*
    LOA--ASH

    EOF

    ← previous
    next →
    loading
    sending ...
    New to Neperos ? Sign Up for free
    download Neperos App from Google Play
    install Neperos as PWA

    Let's discover also

    Recent Articles

    Recent Comments

    Neperos cookies
    This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

    By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

    By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
    OK
    REJECT