$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| ###################################################################### @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ********************************************************************** ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + + THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING + + + + + + + + + + BY + + REVELATION + +LOA--ASH + + + + + + + + + + + + Written: 08/4/96 Volume: 1 + ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ********************************************************************** @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ ###################################################################### |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ This document was written in Windows 95 Word Pad. The title above, and some of the text looks a little screwed up when read in anything else, so read it in Word Pad. Anyway, for those of you who are wondering "what do the letters "LOA" under his handle stand for?" Well, LOA stands for Legion Of the Apocalypse, which is a group of elite hackers and phreakers in my area. The current members of LOA are: Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and Phreak Show I started LOA when I discovered that there were many good hackers and phreakers in my area. I thought that an organized group of hackers and phreakers would accomplish much more than an individual could by himself. Thus the Legion Of the Apocalypse was formed and has been around for a while since. Our main goal is to show the public what hacking and phreaking is all about and to reveal confidential information to the hacking/phreaking community so that we can learn more about computers, telephones, electronics, etc. We are hoping to get our own World Wide Web page soon, so keep an eye out for it. It will contain all of the hacking, phreaking, computer, telephone, security, electronics, virus, and carding information that you could possibly want. Also, if some of you are wondering why I chose the word Revelation as my handle, well, Revelation means revealing or unveiling, which is exactly what I intend to do as a hacker/phreaker. I intend to reveal all the information that I can gather while hacking and phreaking. Anyway, I wrote this document because I have read all the files that I could get my hands on and noticed that there has never been a really good file written that guided beginning hackers and phreakers step by step. When I began hacking and started reading all of the beginner files, I still had many un-answered questions. My questions were eventually answered, but only through LOTS of reading and practice. In this file, I hope to give basic step by step instructions that will help beginning hackers and phreakers get started. But, DO NOT think that this will save you from having to read alot. If you want to be a hacker/phreaker, reading is the most important thing you can do. You will have to do ALOT of reading no matter what. This document was intended for beginners, but it can also be used as a reference tool for advanced hackers and phreakers. Please distribute this document freely. Give it to anyone that you know who is interested in hacking and/or phreaking. Post it on your World Wide Web page, Ftp sites, and BBS's. Do whatever you want with it as long as it stays UNCHANGED. As far as I know, this is the most complete and in depth beginners guide available, that is why I wrote it. Also, I plan to have new volumes come out whenever there has been a significant change in the material provided, so keep an eye out for them. LOA is planning on starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "an641839@anon.penet.fi". This document is divided into three main sections with many different sub-sections in them. The Table Of Contents is below: Table Of Contents: I. HACKING A. What is hacking? B. Why hack? C. Hacking rules D. Getting started E. Where and how to start hacking F. Telenet commands G. Telenet dialups H. Telenet DNIC's I. Telenet NUA's J. Basic UNIX hacking K. Basic VAX/VMS hacking L. Basic PRIME hacking M. Password list N. Connecting modems to different phone lines O. Viruses, Trojans, and Worms II. PHREAKING A. What is phreaking? B. Why phreak? C. Phreaking rules D. Where and how to start phreaking E. Boxes and what they do F. Red Box plans G. Free calling from COCOT's H. ANAC numbers III. REFERENCE A. Hacking and phreaking W.W.W. pages B. Good hacking and phreaking text files C. Hacking and phreaking Newsgroups D. Rainbow Books E. Hacking and phreaking magazines F. Hacking and phreaking movies G. Hacking and phreaking Gopher sites H. Hacking and phreaking Ftp sites I. Hacking and phreaking BBS's J. Cool hackers and phreakers K. Hacker's Manifesto L. Happy hacking! * DISCLAIMER * "Use this information at your own risk. I Revelation, nor any other member of LOA, nor the persons providing this file, will NOT assume ANY responsibility for the use, misuse, or abuse, of the information provided herein. The following information is provided for educational purposes ONLY. The informaion is NOT to be used for illegal purposes. By reading this file you ARE AGREEING to the following terms: I understand that using this information is illegal. I agree to, and understand, that I am responsible for my own actions. If I get into trouble using this information for the wrong reasons, I promise not to place the blame on Revelation, LOA, or anyone that provided this file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H. This file is basically a compilation of known hacking and phreaking information and some information gathered from my own experience as a hacker/phreaker. I have tried to make sure that everything excerpted from other documents was put in quotes and labeled with the documents name, and if known, who wrote it. I am sorry if any mistakes were made with quoted information." *-Revelation-* LOA I. HACKING A. What is hacking? Hacking is the act of penetrating computer systems to gain knowledge about the system and how it works. Hacking is illegal because we demand free access to ALL data, and we get it. This pisses people off and we are outcasted from society, and in order to stay out of prison, we must keep our status of being a hacker/phreaker a secret. We can't discuss our findings with anyone but other members of the hacking/phreaking community for fear of being punished. We are punished for wanting to learn. Why is the government spending huge amounts of time and money to arrest hackers when there are other much more dangerous people out there. It is the murderers, rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn. There are only two ways to get rid of hackers and phreakers. One is to get rid of computers and telephones, in which case we would find other means of getting what we want.(Like that is really going to happen.) The other way is to give us what we want, which is free access to ALL information. Until one of those two things happen, we are not going anywhere. B. Why hack? As said above, we hack to gain knowledge about systems and the way they work. We do NOT want to damage systems in any way. If you do damage a system, you WILL get caught. But, if you don't damage anything, it is very unlikely that you will be noticed, let alone be tracked down and arrested, which costs a considerable amount of time and money. Beginners should read all the files that they can get their hands on about anything even remotely related to hacking and phreaking, BEFORE they start hacking. I know it sounds stupid and boring but it will definetly pay off in the future. The more you read about hacking and phreaking, the more unlikely it is that you will get caught. Some of the most useless pieces of information that you read could turn out to be the most helpful. That is why you need to read everything possible. C. Hacking rules 1.Never damage any system. This will only get you into trouble. 2.Never alter any of the systems files, except for those needed to insure that you are not detected, and those to insure that you have access into that computer in the future. 3.Do not share any information about your hacking projects with anyone but those you'd trust with your life. 4.When posting on BBS's (Bulletin Board Systems) be as vague as possible when describing your current hacking projects. BBS's CAN be monitered by law enforcement. 5.Never use anyone's real name or real phone number when posting on a BBS. 6.Never leave your handle on any systems that you hack in to. 7.DO NOT hack government computers. 8.Never speak about hacking projects over your home telephone line. 9.Be paranoid. Keep all of your hacking materials in a safe place. 10.To become a real hacker, you have to hack. You can't just sit around reading text files and hanging out on BBS's. This is not what hacking is all about. D. Getting started The very first thing you need to do is get a copy of PKZIP or some other file unzipping utility. Nearly everything that you download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip". Then you need to get yourself a good prefix scanner.(also known as a War Dialer) This is a program that automatically dials phone numbers beginning with the three numbers (prefix) that you specify. It checks to see if the number dialed has a carrier.(series of beeps that tells you that you have dialed a computer) Try and find a large business area prefix to scan. It is these businesses that have interesting computers. There are many good scanners out there, but I would recommend Autoscan or A-Dial. These are very easy to use and get the job done quickly and efficiently. E. Where and how to start hacking After you get yourself a good scanner, scan some prefixes and find some cool dialups, then do the following: From your terminal, dial the number you found. Then you should hear a series of beeps (carrier) which tells you that you are connecting to a remote computer. It should then say something like "CONNECT 9600" and then identify the system that you are on. If nothing happens after it says "CONNECT 9600" try hitting enter a few times. If you get a bunch of garbage adjust your parity, data bits, stop bits, baud rate, etc., until it becomes clear. That is one way of connecting to a remote computer. Another way is through Telenet or some other large network. Telenet is a very large network that has many other networks and remote computers connected to it. Ok, here is how you would connect to a remote computer through Telenet: First, you get your local dialup(phone number) from the list that I have provided in Section G. Then you dial the number from your terminal and connect.(If you get a bunch of garbage try changing your parity to odd and your data bits to 7, this should clear it up.) If it just sits there hit enter and wait a few seconds, then hit enter again. Then it will say "TERMINAL=" and you type in your terminal emulation. If you don't know what it is just hit enter. Then it will give you a prompt that looks like "@". From there you type "c" and then the NUA (Network User Address) that you want to connect to. After you connect to the NUA, the first thing you need to do is find out what type of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.) There are other things that you can do on Telenet besides connecting to an NUA. Some of these commands and functions are listed in the next section. You can only connect to computers which accept reverse charging. The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password. Telenet is probably the safest place to start hacking because of the large numbers of calls that they get. Make sure you call during business hours (late morning or early afternoon) so there are many other people on-line. F. Telenet commands Here is a list of some Telenet commands and their functions. This is only a partial list. Beginners probably won't use these commands, but I put them here for reference anyway. COMMANDFUNCTION cConnect to a host. statShows network port. fullNetwork echo. halfTerminal echo. telemailMail.(need ID and password) mailMail.(need ID and password) setSelect PAD parameters contContinue. dDisconnect. hangupHangs up. accessTelenet account.(ID and password) G. Telenet dialups Here is the list of all the Telenet dialups that I know of in the U.S.A., including the city, state, and area code: STATE,CITY:AREA CODE:NUMBER: AL, Anniston205236-9711 AL, Birmingham205328-2310 AL, Decatur205355-0206 AL, Dothan205793-5034 AL, Florence205767-7960 AL, Huntsville205539-2281 AL, Mobile205432-1680 AL, Montgomery205269-0090 AL, Tuscaloosa205752-1472 AZ, Phoenix602254-0244 AZ, Tucson602747-0107 AR, Ft.Smith501782-2852 AR, Little Rock501327-4616 CA, Bakersfield805327-8146 CA, Chico916894-6882 CA, Colton714824-9000 CA, Compton213516-1007 CA, Concord415827-3960 CA, Escondido619741-7756 CA, Eureka707444-3091 CA, Fresno209233-0961 CA, Garden Grove714898-9820 CA, Glendale818507-0909 CA, Hayward415881-1382 CA, Los Angeles213624-2251 CA, Marina Del Rey213306-2984 CA, Merced209383-2557 CA, Modesto209576-2852 CA, Montery408646-9092 CA, Norwalk213404-2237 CA, Oakland415836-4911 CA, Oceanside619430-0613 CA, Palo Alto415856-9995 CA, Pomona714626-1284 CA, Sacramento916448-6262 CA, Salinas408443-4940 CA, San Carlos415591-0726 CA, San Diego619233-0233 CA, San Francisco415956-5777 CA, San Jose408294-9119 CA, San Pedro213548-6141 CA, San Rafael415472-5360 CA, San Ramon415829-6705 CA, Santa Ana714558-7078 CA, Santa Barbara805682-5361 CA, Santa Cruz408429-6937 CA, Santa Rosa707656-6760 CA, Stockton209957-7610 CA, Thousand Oaks805495-3588 CA, Vallejo415724-4200 CA, Ventura805656-6760 CA, Visalia209627-1201 CA, West Covina818915-5151 CA, Woodland Hills818887-3160 C0, Colorado719635-5361 CO, Denver303337-6060 CO, Ft. Collins303493-9131 CO, Grand Junction303241-3004 CO, Greeley303352-8563 CO, Pueblo719542-4053 CT, Bridgeport203335-5055 CT, Danbury203794-9075 CT, Hartford203247-9479 CT, Middletown203344-8217 CT, New Britain203225-7027 CT, New Haven203624-5954 CT, New London203447-8455 CT, Norwalk203866-7404 CT, Stamford203348-0787 CT, Waterbury203753-4512 DE, Dover302678-8328 DE, Newark302454-7710 DC, Washington202429-7896 DC, Washington202429-7800 FL, Boca Raton407338-3701 FL, Cape Coral813275-7924 FL, Cocoa Beach407267-0800 FL, Daytona Beach904255-2629 FL, Ft. Lauderdale305764-4505 FL, Gainsville904338-0220 FL, Jacksonville904353-1818 FL, Lakeland813683-5461 FL, Melbourne407242-8247 FL, Miami305372-0230 FL, Naples813263-3033 FL, Ocala904351-3790 FL, Orlando407422-4099 FL, Pensacola904432-1335 FL, Pompano Beach305941-5445 FL, St. Petersburg813323-4026 FL, Sarasota813923-4563 FL, Tallahassee904681-1902 FL, Tampa813224-9920 FL, West Palm Beach407833-6691 GA, Albany912888-3011 GA, Athens404548-5590 GA, Atlanta404523-0834 GA, Augusta404724-2752 GA, Colombus404571-0556 GA, Macon912743-8844 GA, Rome404234-1428 GA, Savannah912236-2605 HI, Oahu808528-0200 ID, Boise208343-0611 ID, Idaho Falls208529-0406 ID, Lewiston208743-0099 ID, Pocatella208232-1764 IL, Aurora312896-0620 IL, Bloomington309827-7000 IL, Chicago312938-0600 IL, Decatur217429-0235 IL, Dekalb815758-2623 IL, Joliet815726-0070 IL, Peoria309637-8570 IL, Rockford815965-0400 IL, Springfield217753-1373 IL, Urbana217384-6428 IN, Bloomington812332-1344 IN, Evansville812424-7693 IN, Ft. Wayne219426-2268 IN, Gary219882-8800 IN, Indianapolis317299-0024 IN, Kokomo317455-2460 IN, Lafayette317742-6000 IN, Muncie317282-6418 IN, South Bend219233-7104 IN, Terre Haute812232-5329 IA, Ames515233-6300 IA, Cedar Rapids319364-0911 IA, Davenport319324-2445 IA, Des Moines515288-4403 IA, Dubuque319556-0783 IA, Iowa City319351-1421 IA, Sioux City712255-1545 IA, Waterloo319232-5441 KS, Lawrence913843-8124 KS, Manhattan913537-0948 KS, Salina913825-7900 KS, Topeka913233-9880 KS, Wichita316262-5669 KY, Bowling Green502782-7941 KY, Frankfort502875-4654 KY, Lexington606233-0312 KY, Louisville502589-5580 KY, Owensboro502686-8107 LA, Alexandria318445-1053 LA, Baton Rouge504343-0753 LA, Lafayette318233-0002 LA, Lake Charles318436-0518 LA, Monroe318387-6330 LA, New Orleans504524-4094 LA, Shreveport318221-5833 ME, Augusta207622-3123 ME, Brewer207989-3081 ME, Lewiston207784-0105 ME, Portland207761-4000 MD, Annapolis301224-8550 MD, Baltimore301727-6060 MD, Frederick301293-9596 MA, Boston617292-0662 MA, Brockton508580-0721 MA, Fall River508677-4477 MA, Framingham508879-6798 MA, Lawrence508975-2273 MA, Lexington617863-1550 MA, Lowell508937-5214 MA, New Bedford508999-2915 MA, Northampton413586-0510 MA, Pittsfield413499-7741 MA, Salem508744-1559 MA, Springfield413781-3811 MA, Woods Hole508540-7500 MA, Worcester508755-4740 MI, Ann Arbor313996-5995 MI, Battle Creek616968-0929 MI, Detroit313964-2988 MI, Flint313235-8517 MI, Grand Rapids616774-0966 MI, Jackson517782-8111 MI, Kalamazoo616345-3088 MI, Lansing517484-0062 MI, Midland517832-7068 MI, Muskegon616726-5723 MI, Pontiac313332-5120 MI, Port Huron313982-8364 MI, Saginaw517790-5166 MI, Southfield313827-4710 MI, Traverse City616946-2121 MI, Warren313575-9152 MN, Duluth218722-1719 MN, Mankato517388-3780 MN, Minneapolis612341-2459 MN, Rochester507282-5917 MN, St. Cloud612253-2064 MS, Gulfport601863-0024 MS, Jackson601969-0036 MS, Meridian601482-2210 MS, Starkville601324-2155 MO, Columbia314449-4404 MO, Jefferson City314634-5178 MO, Kansas City816221-9900 MO, St. Joseph816279-4797 MO, St. Louis314421-4990 MO, Springfield417864-4814 MT, Billings406245-7649 MT, Great Falls406771-0067 MT, Helena406443-0000 MT, Missoula406721-5900 NE, Lincoln402475-4964 NE, Omaha402341-7733 NV, Las Vegas702737-6861 NV, Reno702827-6900 NH, Concord603224-1024 NH, Durham603868-2924 NH, Manchester603627-8725 NH, Nashua603880-6241 NH, Portsmouth603431-2302 NJ, Atlantic City609348-0561 NJ, Freehold201780-5030 NJ, Hackensack201488-6567 NJ, Marlton609596-1500 NJ, Merchantville609663-9297 NJ, Morristown201455-0275 NJ, New Brunswick201745-2900 NJ, Newark201623-0469 NJ, Passaic201778-5600 NJ, Paterson201684-7560 NJ, Princeton609799-5587 NJ, Rahway201815-1885 NJ, Redbank201571-0003 NJ, Roseland201227-5277 NJ, Sayreville201525-9507 NJ, Trenton609989-8847 NM, Albuquerque505243-4479 NM, Las Cruces505526-9191 NM, Santa Fe505473-3403 NY, Albany518465-8444 NY, Binghampton607772-6642 NY, Buffalo716847-1440 NY, Dear Park516667-5566 NY, Hempstead516292-3800 NY, Ithaca607277-2142 NY, New York City212741-8100 NY, New York City212620-6000 NY, Plattsburgh518562-1890 NY, Poughkeepsie914473-2240 NY, Rochester716454-1020 NY, Syracuse315472-5583 NY, Utica315797-0920 NY, Whit Plains914328-9199 NC, Asheville704252-9134 NC, Charlotte704332-3131 NC, Fayetteville919323-8165 NC, Gastonia704865-4708 NC, Greensboro919273-2851 NC, High Point919889-7494 NC, North Wilkesboro919838-9034 NC, Raleigh919834-8254 NC, Res Tri Park919549-8139 NC, Tarboro919823-0579 NC, Wilmington919763-8313 NC, Winston-Salem919 725-2126 ND, Fargo 701235-7717 ND, Grand Forks701775-7813 ND, Mandan701663-2256 OH, Canton216452-0903 OH, Cincinnati513579-0390 OH, Cleveland216575-1658 OH, Colombus614463-9340 OH, Dayton513461-5254 OH, Elyria216323-5059 OH, Hamilton513863-4116 OH, Kent216678-5115 OH, Lorain216960-1170 OH, Mansfield419526-0686 OH, Sandusky419627-0050 OH, Springfield513324-1520 OH, Toledo419255-7881 OH, Warren216394-0041 OH, Wooster216264-8920 OH, Youngstown216743-1296 OK, Bartlesville918336-3675 OK, Lawton405353-0333 OK, Oklahoma City405232-4546 OK, Stillwater405624-1113 OK, Tulsa918584-3247 OR, Corvallis503754-9273 OR, Eugena503683-1460 OR, Hood River503386-4405 OR, Klamath Falls503882-6282 OR, Medford503779-6343 OR, Portland503295-3028 OR, Salem503378-7712 PA, Allentown215435-3330 PA, Altoona814949-0310 PA, Carlisle717249-9311 PA, Danville717271-0102 PA, Erie814899-2241 PA, Harrisburg717236-6882 PA, Johnstown814535-7576 PA, King Of Prussia215337-4300 PA, Lancaster717295-5405 PA, Philadelphia215574-9462 PA, Pittsburgh412288-9950 PA, Reading215376-8750 PA, Scranton717961-5321 PA, State College814231-1510 PA, Wilkes-Barre717829-3108 PA, Williamsport717494-1796 PA, York717846-6550 RI, Providence401751-7910 SC, Charleston803722-4303 SC, Columbia803254-0695 SC, Greenville803233-3486 SC, Spartenburg803585-1637 SC, Pierre605224-0481 SC, Rapid City605348-2621 SC, Sioux Falls605336-8593 TN, Bristol615968-1130 TN, Chattanooga615756-1161 TN, Clarksville615552-0032 TN, Johnson City615282-6645 TN, Knoxville615525-5500 TN, Memphis901521-0215 TN, Nashville615244-3702 TN, Oak Ridge615481-3590 TX, Abilene915676-9151 TX, Amarillo806373-0458 TX, Athens214677-1712 TX, Austin512928-1130 TX, Brownsville512542-0367 TX, Bryan409822-0159 TX, Corpus Christi512884-9030 TX, Dallas214748-6371 TX, El Paso915532-7907 TX, Ft. Worth817332-4307 TX, Galveston409762-4382 TX, Houston713227-1018 TX, Laredo512724-1791 TX, Longview214236-4205 TX, Lubbock806747-4121 TX, Mcallen512686-5360 TX, Midland915561-9811 TX, Nederland409722-3720 TX, San Angelo915944-7612 TX, San Antonio512225-8004 TX, Sherman214893-4995 TX, Temple817773-9723 TX, Tyler214597-8925 TX, Waco817752-9743 TX, Wichita Falls817322-3774 UT, Ogden801627-1630 UT, Provo801373-0542 UT, Salt Lake City801359-0149 VT, Burlington802864-0808 VT, Montpelier802229-4966 VT, Rutland802775-1676 VT, White River Jct.802 295-7631 VA, Blacksburg703 552-9181 VA, Charlottesville804 977-5330 VA, Covington703 962-2217 VA, Fredericksburg703 371-0188 VA, Harrisonburg703434-7121 VA, Herndon703435-1800 VA, Lynchburg804845-0010 VA, Newport News804596-6600 VA, Norfolk804625-1186 VA, Richmond804788-9902 VA, Roanoke703344-2036 WA, Auburn206939-9982 WA, Bellingham206733-2720 WA, Everett206775-9929 WA, Longview206577-5835 WA, Olympia206754-0460 WA, Richland509943-0649 WA, Seattle206625-9612 WA, Spokane509455-4071 WA, Tacoma206627-1791 WA, Vancouver206693-6914 WA, Wenatchee509663-6227 WA, Yakima509575-1060 WV, Charleston304343-6471 WV, Huntington304523-2802 WV, Morgantown304292-0104 WV, Wheeling304233-7732 WI, Beloit608362-5287 WI, Eau Claire715 836-9295 WI, Green Bay414 432-2815 WI, Kenosha414 552-9242 WI, La Crosse608 784-0560 WI, Madison608 257-5010 WI, Milwaukee414271-3914 WI, Neenah414722-7636 WI, Racine414632-6166 WI, Sheboygan414452-3995 WI, Wausau715845-9584 WI, West Bend414334-2206 WY, Casper307265-5167 WY, Cheyenne307638-4421 WY, Laramie307721-5878 H. Telenet DNIC's Here is the list of all the Telenet DNIC's. These will be defined and explained in the next section: DNIC:NETWORK: 02041Datanet-1 02062DCS 02080Transpac 02284Telepac (Switzerland) 02322Datex-P (Austria) 02392Radaus 02342PSS 02382Datapak (Denmark) 02402Datapak (Sweden) 02405Telepak 02442Finpak 02624Datex-P (West Germany) 02704Luxpac 02724Eirpak 03020Datapac 03028Infogram 03103ITT/UDTS (U.S.A.) 03106Tymnet 03110Telenet 03340Telepac (Mexico) 03400UDTS (Curacau) 04251Isranet 04401DDX-P 04408Venus-P 04501Dacom-Net 04542Intelpak 05052Austpac 05053Midas 05252Telepac (Hong Kong) 05301Pacnet 06550Saponet 07240Interdata 07241Renpac 07421Dompac 09000Dialnet I. Telenet NUA's Here is a list of a few Telenet NUA's and what type of system they are. But first, this is how an NUA is put together: 031106170023700 \ /\ / \ / | | | DNIC Area NUA Code The DNIC says which network connected to Telenet you are using. The area code is the area code for the area that the NUA is in. And the NUA is the address of the computer on Telenet. Please note that an NUA does NOT have to be in your area code for you to connect to it. There are two ways of finding useful NUA's. The first way is to get or write an NUA scanning program. The second way is to get a copy of the Legion Of Doom's Telenet Directory.( Volume 4 of the LOD Technical Journals) Now, here is the list. Remember that these are only a few NUA's. These are NOT all of the Telenet NUA's. All of these NUA's DO accept reverse charging. Also, please note that all of these may not be working by the time you read this and that network congestion frequently makes an NUA inaccessible for a short period of time. NUA:SYSTEM TYPE: 031102010022500VAX 031102010015600UNIX 031102010022000VAX 031102010025900UNIX 031102010046100VAX 031102010025200PRIME 031102010046100VAX 031102010052200VAX 031102020001000PRIME 031102020013200VAX 031102020014100PRIME 031102020014200PRIME 031102020015000VAX 031102020016100UNIX 031102020021400PRIME 031102020024500AOS 031102020030800PRIME 031102020030900PRIME 031102020031200PRIME 031102020033600VAX 031102020033700VAX 031102020034300PRIME 031102020036000HP-3000 031102030007500VAX 031102030002200VM/370 031102030013600PRIME 031102060003200HP-3000 031102060044000VAX 031102060044900NOS 031102060044700VM/370 031102120003900NOS 031102120015200PRIME 031102120026600VAX 031102120026300VAX 031102120026700UNIX 031102120044900UNIX 031102120053900VOS 031102140024000VAX J. Basic UNIX hacking UNIX is probably the most commonly used operating system on Telenet, and is the easiest to hack since it doesn't record bad login attempts. You know you've found a UNIX system when it gives you a "Login" prompt, and then a "Password" prompt. To get in you should first try the default logins.(Listed below.) If these don't work try some of the passwords listed in Section M. If these don't work try to find backdoors. These are passwords that may have been put in to allow the programmer (or someone else who could be in a position to make a backdoor) to get access into the system. These are usually not known about by anyone but the individual who made it. Try doing some research on the programmer and other people who helped to make the system. And, if these don't work, just try guessing them. The Login (usually the account holders name) has 1-8 characters and the Password is 6-8 characters. Both can be either letters or numbers, or a combination of the two. Once you get in, you should get a "$" prompt, or some other special character like it. You should only use lower case letters when hacking UNIX, this seems to be standard format. If you type "man [command]" at the prompt, it should list all of the commands for that system. Anyway, here are the default Logins and Passwords: Login:Password: rootroot rootsystem syssys syssystem daemondaemon uucpuucp ttytty testtest unixunix unixtest binbin admadm admadmin adminadm adminadmin sysmansysman sysmansys sysmansystem sysadminsysadmin sysadminsys sysadminsystem sysadminadmin sysadminadm whowho learnlearn uuhostuuhost guestguest hosthost nuucpnuucp rjerje gamesgames gamesplayer sysopsysop rootsysop demodemo Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things: /etc/passwd or cat /etc/passwd The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this: john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john Broken down, this is what the above password file states: Username: john Encrypted Password: 234abc56 User Number: 9999 Group Number: 13 Other Information: John Johnson Home Directory: /home/dir/john Shell: /bin/john If the password file does not show up under one of the above two commands, then it is probably shadowed. The following definition of password shadowing was taken from the alt.2600 hack faq: "Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users." If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using: UNIX System Type:Path:Token: AIX 3/etc/security/passwd ! or/tcb/auth/files// A/UX 3.Os/tcb/files/auth/* BSD4.3-Reno/etc/master.passwd * ConvexOS 10/etc/shadpw * Convex0S 11/etc/shadow * DG/UX/etc/tcb/aa/user * EP/IX/etc/shadow x HP-UX/.secure/etc/passwd * IRIX 5/etc/shadow x Linux 1.1/etc/shadow * OSF/1/etc/passwd[.dir|.pag] * SCO UNIX #.2.x/tcb/auth/files// SunOS 4.1+c2/etc/security/passwd.adjunct ## SunOS 5.0/etc/shadow System V 4.0/etc/shadow x System V 4.2/etc/security/* database Ultrix 4/etc/auth[.dir|.pag] * UNICOS /etc/udb * Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data: bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob The characters in the password aging data stand for the following: 1. Maximum number of weeks a password can be used without changing. 2. Minimum number of weeks a password must be used before being changed. 3&4. Last time password was changed, in number of weeks since 1970. The password aging data can be decoded using the chart below: Character:Number: .0 /1 02 13 24 35 46 57 68 79 810 911 A12 B13 C14 D15 E16 F17 G18 H19 I20 J21 K22 L23 M24 N25 O26 P27 Q28 R29 S30 T31 U32 V33 W34 X35 Y36 Z37 a38 b39 c40 d41 e42 f43 g44 h45 i46 j47 k48 l49 m50 n51 o52 p53 q54 r55 s56 t57 u58 v59 w60 x61 y62 z63 Now, explore the system freely, be careful, and have fun! K. Basic VAX/VMS hacking The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's: Username:Password: SYSTEMOPERATOR SYSTEMMANAGER SYSTEMSYSTEM SYSTEMSYSLIB OPERATOROPERATOR SYSTESTUETP SYSTESTSYSTEST SYSTESTTEST SYSMAINTSYSMAINT SYSMAINTSERVICE SYSMAINTDIGITAL FIELDFIELD FIELDSERVICE GUESTGUEST GUESTunpassworded DEMODEMO DEMOunpassworded TESTTEST DECNETDECNET Here are some of the VAX/VMS commands: Command:Function: HELP (H)Gives help and list of commands. TYPE (T)View contents of a file. RENAME (REN)Change name of a file. PURGE (PU) Deletes old versions of a file. PRINT (PR)Prints a file. DIRECTORY (DIR)Shows list of files. DIFFERENCES(DIF)Shows differences between files. CREATE (CR)Creates a file. DELETE (DEL)Deletes a file. COPY (COP)Copy a file to another. CONTINUE (C)Continues session. The password file on VAX's are available when you type in the command: SYS$SYSTEM:SYSUAF.DAT The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J. Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced. But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts. L. Basic PRIME hacking PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN ". It should then ask you for your username and password. The default usernames and passwords are listed below: Username:Password: PRIMEPRIME PRIMEPRIMOS PRIMOSPRIMOS PRIMOSPRIME PRIMOS_CSPRIME PRIMOS_CSPRIMOS PRIMENETPRIMENET SYSTEMSYSTEM SYSTEMPRIME SYSTEMPRIMOS NETLINKNETLINK TESTTEST GUESTGUEST GUEST1 GUEST When you are inside the system, type "NETLINK" and it ahould give you alot of help. This system uses NUA's, too. I might print these in the next volume. M. Password List The password list was taken from A Novice's Guide To Hacking, by The Legion Of Doom, and from some of my own discoveries. Here is the list of commonly used passwords: Password: aaa academia ada adrian aerobics airplane albany albatross albert alex alexander algebra alias alisa alpha alphabet ama amy analog anchor andy andrea animal answer anything arrow arthur ass asshole athena atmosphere bacchus badass bailey banana bandit banks bass batman beautiful beauty beaver daniel danny dave deb debbie deborah december desire desperate develop diet digital discovery disney dog drought duncan easy eatme edges edwin egghead eileen einstein elephant elizabeth ellen emerald engine engineer enterprise enzyme euclid evelyn extension fairway felicia fender finite format god hello idiot jester john johnny joseph joshua judith juggle julia kathleen kermit kernel knight lambda larry lazarus lee leroy lewis light lisa louis love lynne mac macintosh mack maggot magic malcolm mark markus martin marty marvin matt master maurice maximum merlin mets michael michelle mike minimum nicki nicole rascal really rebecca remote rick reagan robot robotics rolex ronald rose rosebud rosemary roses ruben rules ruth sal saxon scheme scott secret sensor serenity sex shark sharon shit shiva shuttle simon simple singer single singing smile smooch smother snatch snoopy soap socrates spit spring subway success summer super support surfer suzanne tangerine tape target taylor telephone temptation tiger tigger toggle tomato toyota trivial unhappy unicorn unknown urchin utility vicki virgin virginia warren water weenie whatnot whitney will william winston willie wizard wonbat yosemite zap N. Connecting modems to different phone lines Ok, if you are really paranoid (or smart) and you don't want to hack from your house for fear of getting caught, you can hook up your modem to other peoples phone lines or to payphones. If you want to hook your modem to a payphone, do it late at night and at a very secluded payphone. Look along either side of the phone. You should see a small metal tube (which contains the telephone wires) running along the wall. Somewhere along the tube it should widen out into a small box. Pop off the boxes lid and there is a nice little phone jack for ya'. Taking off the lid may be difficult because they are usually pretty secure, but nothing is impossible, so keep trying. Of course, you can only do this with a lap-top computer. Now, if you want to hook up the modem to someone's house or appartment phone line, you need to get a pair of red and green alligator clips, and an extra modem cord for your lap-top. After you get those parts, cut the plastic end off of your modem cord and you will see a red wire, a green wire, and two other wires, but you can ignore those. Attach the red alligator clip to the red wire, and attach the green alligator clip to the green wire and you're all set. Now all you need to do is go find a telephone pole or one of those small green boxes that stick out of the ground.(They should have a Bell Systems logo on them.) On a telephone pole open the little box that has a bunch of wires going to and from it. On the right side of the box you should see what look like two large screws.(These are called "terminals".) One should have a red wire wrapped around it and the other should have a green wire wrapped around it. Attach the red alligator clip the the red wire and the green alligator clip to the green wire, and you're all set. This should get you a dial tone. If it doesn't, make sure that the alligator clips are not touching each other, and that the alligator clips are attached to the exposed end of the wire. Now, on those green boxes you need to undo all of the screws and shit holding the lid on, and open it up. Then you should find basically the same setup as in the telephone pole. Attach the appropriate wires to the appropriate terminals and you are all set. This process can also be used to hook up a Beige Box (Lineman's Handset.) when phreaking. O. Viruses, Trojans, and Worms Just in case some of you are interested, here are the definitions for Viruses, Trojans, and Worms. These definitions were taken from the alt.2600 hack faq. Trojan: "Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans." Virus: "A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore." Worm: "Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers." II. PHREAKING A. What is phreaking Phreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls. In the following sections, you will learn some about boxes, what they are, and how they work. You will also learn about the other forms of phreaking. B. Why phreak? Phreaking, like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information. C. Phreaking rules Most of the same rules apply for hacking and phreaking, so I will only list a few here. 1.Never box over your home phone line. 2.You should never talk about phreaking projects over your home phone line. 3.Never use your real name when phreaking. 4.Be careful who you tell about your phreaking projects. 5.Never leave phreaking materials out in the open. Keep them in a safe place. 6.Don't get caught. D. Where and how to start phreaking Well, you can phreak on any telephone, but as stated above, it is very stupid to do so on your home phone line. First you need you need to construct the boxes needed for what you want to do. All of the boxes and their descriptions are listed in the next section. Most of the boxes are very easy to make, but if your not into making shit, there are usually alternative ways of making them. E. Boxes and what they do Box:Description: Red Boxgenerates tones for free phone calls Black Boxwhen called, caller pays nothing Beige Boxlineman's handset Green Boxgenerates coin return tones Cheese Boxturns your phone into a payphone Acrylic Boxsteal 3-way calling and other services Aqua Boxstops F.B.I. lock-in-trace Blast Boxphone microphone amplifier Blotto Boxshorts out all phones in your area Blue Boxgenerates 2600hz tone Brown Boxcreates party line Bud Boxtap neighbors phone Chatreuse Boxuse electricity from phone Chrome Boxmanipulates traffic signals Clear Boxfree calls Color Boxphone conversation recorder Copper Boxcauses crosstalk interference Crimson Boxhold button Dark Boxre-route calls Dayglo Boxconnect to neighbors phone line Divertor Boxre-route calls DLOC Boxcreate party line Gold Boxdialout router Infinity Boxremote activated phone tap Jack Boxtouch-tone key pad Light Boxin-use light Lunch BoxAM transmitter Magenta Boxconnect remote phone line to another Mauve Boxphone tap without cutting into the line Neon Boxexternal microphone Noise Boxcreates line noise Olive Boxexternal ringer Party Boxcreates party line Pearl Boxtone generator Pink Boxcreates party line Purple Boxhold button Rainbow Boxkill trace Razz Boxtap neighbors phone Rock Boxadd music to phone line Scarlet Boxcauses interference Silver Boxcreate DTMF tones for A,B,C, and D Static Boxraises voltage on phone line Switch Boxadd services Tan Boxphone conversation recorder TV Cable Boxsee sound waves on TV Urine Boxcreate disturbance on phone headset Violet Boxstop payphone from hanging up White BoxDTMF key pad Yellow Boxadd line extension F. Box Plans The Red Box is the main tool that you will use so I have included the Red Box plans. The other box plans can be downloaded from the Internet. Red Box: There are two ways that you can make a Red Box: One is to go to Radio Shack and buy a tone dialer and a 6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you can order them from the electronics companies that I have listed at the end of this section.) Open up the tone dialer and replace the existing crystal (big, shiny, metal thing labeled "3.579545Mhz") with the 6.5536Mhz crystal. Now, close it up. You have a red box. To use it for long distance calls play the tones that add up to the amount of money that the operator requests. For a 25 cents tone press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press 1 *. And, the second way, which is a much easier method, is to get the Red Box tones from a phreaking program, such as: Omnibox, or Fear's Phreaker Tools. Play the tones as you hold a microcassette recorder about 1-inch away from your computer speakers, and record the tones. The Red Box only works on public telephones, it does not work on COCOT's.(Defined in next section.) It makes the telephone think that you have put money in. Red Boxes do not work on local calls because the phone is not using ACTS (Automated Coin Toll System), unless you call the operator and have her place the call for you. You tell her the number that you want to dial and then when she asks you to put in your money, play the tones. If she asks you why you need her to place the call tell her that one of the buttons is smashed in or something like that. You now have and know how to use a Red Box! Electronics Companies: Alltronics 2300 Zanker Road San Jose, CA 95131 (408)943-9774 -Voice- (408)943-9776 -Fax- Blue Saguaro P.O. Box 37061 Tucson, AZ 85740 Mouser (800)346-6873 Unicorn Electronics 10000 Canoga Ave. Unit C-2 Chatsworth, CA 91311 1-800-824-3432 G. Free calling from COCOT's First of all, COCOT stands for "Customer Owned Customer Operated Telephone". These are most likely to be found at resteraunts, amusement parks, etc. All you have to do to make a free call from a COCOT is dial a 1-800 number (they let you do this for free), say some bullshit and get them to hang up on you. Stay on the line after they hang up, then dial the number that you want to call. This may not work by the time you read this because COCOT owners are becoming more aware of us every day. H. ANAC numbers ANAC stands for "Automated Number Announcment Circuit". In other words, you call the ANAC number in your area and it tells you the number that you are calling from. This is useful when Beige Boxing, or hooking your modem up to other phone lines, to find out what number you are using. The "?" are substituted for unknown numbers. Do some scanning to find them out. Here are the ANAC numbers for the U.S.A. with their area code, and the only one I knew of in the U.K.: U.S.A.: Area Code:ANAC Number: 201958 202811 203970 205300-222-2222 205300-555-5555 205300-648-1111 205300-765-4321 205300-798-1111 205300-833-3333 205557-2311 205811 205841-1111 205908-222-2222 206411 207958 209830-2121 209211-9779 210830 212958 213114 2131223 213211-2345 213211-2346 213760-2??? 21361056 214570 214790 214970-222-2222 214970-611-1111 215410-???? 215511 215958 216200-???? 216331 216959-9968 217200-???-???? 219550 219559 301958-9968 310114 3101223 310211-2345 310211-2346 312200 312290 3121-200-8825 3121-200-555-1212 313200-200-2002 313200-222-2222 313200-???-???? 313200200200200200 314410-???? 315953 315958 315998 317310-222-2222 317559-222-2222 317743-1218 3345572411 3345572311 401200-200-4444 401222-2222 402311 404311 404940-???-???? 404940 405890-7777777 405897 407200-222-2222 408300-???-???? 408760 408940 409951 409970-???? 410200-6969 410200-555-1212 410811 412711-6633 412711-4411 412999-???? 413958 413200-555-5555 414330-2234 415200-555-1212 415211-2111 4152222 415640 415760-2878 4157600-2222 419311 502200-2222222 502997-555-1212 503611 503999 50499882233 504201-269-1111 504998 50499851-0000000000 508958 508200-222-1234 508200-222-2222 50826011 509560 510760-1111 512830 512970-???? 5155463 515811 516958 516968 517200-222-2222 517200200200200200 518511 518997 518998 603200-222-2222 606997-555-1212 606711 607993 609958 610958 610958-4100 612511 614200 614517 615200200200200200 6152002222222 615830 616200-222-2222 617200-222-1234 617200-222-2222 617200-444-4444 617220-2622 617958 618200-???-???? 618930 619211-2001 619211-2121 703811 704311 707211-2222 7081-200-555-1212 7081-200-8825 708200-6153 708724-9951 708356-9646 713380 713970-???? 713811 714114 714211-2121 714211-2222 716511 716990 717958 718958 8022-222-222-2222 802200-222-2222 8021-700-222-2222 802111-2222 805114 805211-2345 805211-2346 805830 806970-???? 810200200200200200 812410-555-1212 813311 815200-???-???? 817290 817211 818970-611-1111 8181223 818211-2345 903211-2346 904970-611-1111 906200-222-222 9071-200-222-2222 907811 908958 910200 910311 910988 914990-1111 915970-???? 916211-2222 916461 919200 919711 U.K.: 175 III. REFERENCE A. Hacking and phreaking WWW. sites Here is a list of some World Wide Web sites that contain hacking, phreaking, computer, virus, carding, security, etc. material: Site Address: http://www.outerlimits.net/lordsome/index.html (Hacker's Layer) http://web2.airmail.net/km/hfiles/free.htm (Hacker's Hideout) http://resudox.net/bio/novell.html http://www.louisville.edu/wrbake01/hack2.html http://www.intersurf.com/~materva/files.html http://hightop.nrl.navy.mil/rainbow.html http://www.rit.edu/~jmb8902/hacking.html http://www.spatz.com/pecos/index.html http://pages.prodigy.com/FL/dtgz94a/files2.html http://www.2600.com(alt.2600) http://att.net/dir800 http://draco.centerline.com:8080/~franl/crypto.html http://everest.cs.ucdavis.edu/Security.html http://ice-www.larc.nasa.gov/WWW/security.html http://lOpht.com(lOpht) http://lOpht.com/~oblivion/IIRG.html http://underground.org http://www.alw.nih.gov/WWW/security.html http://www.aspentec.com/~frzmtdb/fun/hacker.html http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html http://www.engin.umich.edu/~jgotts/underground/boxes.html http://www.etext.org/Zines http://www.inderect.com/www/johnk/ http://www.mgmua.com/hackers/index.html http://www.paranoia.com/mthreat http://www.paranoia.com/astrostar/fringe.html http://www.umcc.umich.edu/~doug/virus-faq.html http://www.wired.com B. Good hacking and phreaking text files All of these files are available by download from the Internet. File Name: A Novice's Guide To Hacking Alt.2600 Hack Faq The Hacker's Handbook The Official Phreaker's Manual Rainbow Books (Listed in Section D.) The Hacker Crackdown Computer Hackers: Rebels With A Cause The Legion Of Doom Technical Journals The Ultimate Beginner's Guide To Hacking And Phreaking (Of course!) C. Hacking and phreaking Newsgroups alt.2600 alt.2600.hope.tech alt.cellular alt.cellular-phone-tech alt.comp.virus alt.cracks alt.cyberpunk alt.cyberspace alt.dcom.telecom alt.fan.lewiz alt.hackers alt.hackintosh alt.hackers.malicious alt.security D. Rainbow Books The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below: Infosec Awareness Division ATTN: x711/IAOC Fort George G. Meade, MD 20755-6000 or call: (410)766-8729 Here is the list of all the Rainbow Books and their descriptions: Color:Description: Orange 1D.O.D. Trusted Computer Systems GreenD.O.D. Password Management YellowComputer Security Requirements Yellow 2Computer Security Requirements TanUnderstanding Audit In Trusted Systems Bright BlueTrusted Product Evaluation Neon OrangeUnderstanding Discretionary Access Teal GreenGlossary Of Computer Terms Orange 2Understanding Configurations RedInterpretation Of Evaluation BurgundyUnderstanding Design Documentation Dark LavenderUnderstanding Trusted Distrobution Venice BlueComputer Security Sub-Systems AquaUnderstanding Security Modeling Dark RedInterpretations Of Environments PinkRating Maintenence Phase PurpleFormal Verification Systems BrownUnderstanding Trusted Facilities Yellow-GreenWriting Trusted Facility Manuals Light BlueUnderstanding Identification And Authentication In Trusted Systems BlueProduct Evaluation Questionaire GraySelecting Access Control List LavanderData Base Management Interpretation Yellow 3Understanding Trusted Recovery Bright OrangeUnderstanding Security Testing Purple 1Guide To System Procurement Purple 2Guide To System Procurement Purple 3Guide To System Procurement Purple 4Guide To System Procurement GreenUnderstanding Data Remanence Hot PeachWriting Security Features TurquioseUnderstanding Information Security VioletControlled Access Protection Light PinkUnderstanding Covert Channels E. Cool hacking and phreaking magazines Phrack Magazine 2600 Magazine Tap Magazine Phantasy Magazine F. Hacking and phreaking movies Movie: Hackers War Games G. Hacking and phreaking Gopher sites Address: ba.com csrc.ncsl.nist.gov gopher.acm.org gopher.cpsr.org gopher.cs.uwm gopher.eff.org oss.net spy.org wiretap.spies.com H. Hacking and phreaking Ftp sites Address: 2600.com agl.gatech.edu/pub asylum.sf.ca.us clark.net/pub/jcase ftp.armory.com/pub/user/kmartind ftp.armory.com/pub/user/swallow ftp.fc.net/pub/defcon/BBEEP ftp.fc.net/pub/phrack ftp.giga.or.at/pub/hacker ftp.lava.net/users/oracle ftp.microserve.net/ppp-pop/strata/mac ftp.near.net/security/archives/phrack ftp.netcom.com/pub/br/bradelym ftp.netcom.com/pub/daemon9 ftp.netcom.com/pub/zz/zzyzx ftp.primenet.com/users/k/kludge I. Hacking and phreaking BBS's BBS's are Bulletin Board Systems on which hackers and phreakers can post messages to each other. Here is a list of some BBS's that I know of. If you know of any other BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note that some of these may be old and not running. Area Code:Phone Number:Name: 203832-8441Rune Stone 210493-9975The Truth Sayer's Domain 303343-4053Hacker's Haven 315656-5135Independent Nation 315656-5135UtOPiA 617855-2923Maas-Neotek 708676-9855Apocalypse 2000 713579-2276KOdE AbOdE 806747-0802Static Line 908526-4384Area 51 502499-8933Blitzkrieg 510935-5845...Screaming Electron 408747-0778The Shrine 708459-7267The Hell Pit 415345-2134Castle Brass 415697-13207 Gates Of Hell J. Cool hackers and phreakers Yes there are many, many, cool hackers and phreakers out there, but these are some that helped me to get this file out on the Internet. I did not list a few people because I only knew their real name, and I don't want to use their real name without their permission. Handle: Silicon Toad Logik Bomb/Net Assasin oleBuzzard Lord Somer Weezel Thanks for your help guys. K. Hacker's Manifesto "This is our world now...the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt cheep if it wasn't run by profiteering gluttons, and you call us criminals. We explore...and you call us criminals. We exist without skin color, without nationality, without religious bias...and you call us criminals. You build atomic bombs, wage wars, murder, cheat, and lie to us and try to make us believe it is for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker and this is my manifesto. You may stop this individual, but you can't stop us all...after all, we're all alike." +++The Mentor+++ K. Happy hacking! Be careful and have fun. Remember to keep your eye out for the next volume of The Ultimate Beginner's Guide To Hacking And Phreaking and the Legion Of the Apocalypse W.W.W. page. Oh, and keep looking for our on-line magazine, too, it should be coming out soon. Well, I hope you enjoyed the file and found it informative. I also hope that I helped get you started in hacking and phreaking. "The Revelation is here." *-Revelation-* LOA--ASH EOF