Please consider a donation to the Higher Intellect project. See https://preterhuman.net/donate.php or the Donate to Higher Intellect page for more info.

THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING

From Higher Intellect Vintage Wiki
Jump to navigation Jump to search
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
######################################################################
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
**********************************************************************
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+           									   +
+       THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING       +
+											   +
+					   						   +
+											   +
+											   +
+					   BY     					   +
+				     REVELATION	      			   +
+					LOA--ASH					   +
+											   +
+											   +
+											   +
+											   +
+											   +
+ Written: 08/4/96						     Volume: 1 +
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
**********************************************************************
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
######################################################################
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


	This document was written in Windows 95 Word Pad.  The title 
above, and some of the text looks a little screwed up when read in 
anything else, so read it in Word Pad.
	Anyway, for those of you who are wondering "what do the letters 
"LOA" under his handle stand for?"  Well, LOA stands for Legion Of the 
Apocalypse, which is a group of elite hackers and phreakers in my area.  
The current members of LOA are:

Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and 
Phreak Show

	I started LOA when I discovered that there were many good 
hackers and phreakers in my area.  I thought that an organized group of
hackers and phreakers would accomplish much more than an individual
could by himself.  Thus the Legion Of the Apocalypse was formed and has 
been around for a while since.  Our  main goal is to show the public 
what hacking and phreaking is all about and to reveal confidential 
information to the hacking/phreaking community so that we can learn 
more about computers, telephones, electronics, etc. We are hoping to 
get our own World Wide Web page soon, so keep an eye out for it.  It 
will contain all of the hacking, phreaking, computer, telephone,
security, electronics, virus, and carding information that you could 
possibly want.
	Also, if some of you are wondering why I chose the word 
Revelation as my handle, well, Revelation means revealing or 
unveiling, which is exactly what I intend to do as a hacker/phreaker.
 I intend to reveal all the information that I can gather while
hacking and phreaking.
	Anyway, I wrote this document because I have read all the files
that I could get my hands on and noticed that there has never been a
really good file written that guided beginning hackers and phreakers
step by step.
	When I began hacking and started reading all of the beginner
files, I still had many un-answered questions.  My questions were 
eventually answered, but only through LOTS of reading and practice.  
In this file, I hope to give basic step by step instructions that will 
help beginning hackers and phreakers get started.  But, DO NOT think 
that this will save you from having to read alot.  If you want to be a 
hacker/phreaker, reading is the most important thing you can do.  You 
will have to do ALOT of reading no matter what.
	This document was intended for beginners, but it can also be used
as a reference tool for advanced hackers and phreakers.
	Please distribute this document freely.  Give it to anyone that 
you know who is interested in hacking and/or phreaking.  Post it on your 
World Wide Web page, Ftp sites, and BBS's.  Do whatever you want with it 
as long as it stays UNCHANGED.
	As far as I know, this is the most complete and in depth beginners
guide available, that is why I wrote it.  Also, I plan to have new 
volumes come out whenever there has been a significant change in the 
material provided, so keep an eye out for them.  LOA is planning on
starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "[email protected]".   
	This document is divided into three main sections with many
different sub-sections in them.  The Table Of Contents is below:


Table Of Contents:


I. HACKING
		
		A. What is hacking?
		B. Why hack?
		C. Hacking rules
		D. Getting started
		E. Where and how to start hacking
		F. Telenet commands
		G. Telenet dialups
		H. Telenet DNIC's
		I. Telenet NUA's
		J. Basic UNIX hacking
		K. Basic VAX/VMS hacking
		L. Basic PRIME hacking
		M. Password list
		N. Connecting modems to different phone lines
		O. Viruses, Trojans, and Worms

II. PHREAKING

		A. What is phreaking?
		B. Why phreak? 
		C. Phreaking rules
		D. Where and how to start phreaking
		E. Boxes and what they do
		F. Red Box plans
		G. Free calling from COCOT's
		H. ANAC numbers

III. REFERENCE

		A. Hacking and phreaking W.W.W. pages
		B. Good hacking and phreaking text files
		C. Hacking and phreaking Newsgroups
		D. Rainbow Books
		E. Hacking and phreaking magazines
		F. Hacking and phreaking movies
		G. Hacking and phreaking Gopher sites
		H. Hacking and phreaking Ftp sites
		I. Hacking and phreaking BBS's
		J. Cool hackers and phreakers
		K. Hacker's Manifesto
		L. Happy hacking!


* DISCLAIMER *

	"Use this information at your own risk. I Revelation, nor any
other member of LOA, nor the persons providing this file, will NOT 
assume ANY responsibility for the use, misuse, or abuse, of the 
information provided herein. The following information is provided for 
educational purposes ONLY. The informaion is NOT to be used for illegal 
purposes. By reading this file you ARE AGREEING to the following terms:
I understand that using this information is illegal. I agree to, and 
understand, that I am responsible for my own actions. If I get into 
trouble using this information for the wrong reasons, I promise not
to place the blame on Revelation, LOA, or anyone that provided this 
file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.
	This file is basically a compilation of known hacking and
phreaking information and some information gathered from my own 
experience as a hacker/phreaker. I have tried to make sure that 
everything excerpted from other documents was put in quotes and labeled 
with the documents name, and if known, who wrote it. I am sorry if any 
mistakes were made with quoted information."

					*-Revelation-*
					     LOA


I. HACKING


A. What is hacking?


	Hacking is the act of penetrating computer systems to gain
knowledge about the system and how it works.
	Hacking is illegal because we demand free access to ALL data, and 
we get it. This pisses people off and we are outcasted from society, and 
in order to stay out of prison, we must keep our status of being a 
hacker/phreaker a secret.  We can't discuss our findings with anyone but
other members of the hacking/phreaking community for fear of being
punished.  We are punished for wanting to learn. Why is the government
spending huge amounts of time and money to arrest hackers when there are
other much more dangerous people out there. It is the murderers,
rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers.  We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.
	There are only two ways to get rid of hackers and phreakers. 
One is to get rid of computers and telephones, in which case we would 
find other means of getting what we want.(Like that is really going to 
happen.) The other way is to give us what we want, which is free access 
to ALL information. Until one of those two things happen, we are not 
going anywhere.


B. Why hack?
	

	As said above, we hack to gain knowledge about systems and the
way they work. We do NOT want to damage systems in any way. If you do
damage a system, you WILL get caught. But, if you don't damage 
anything, it is very unlikely that you will be noticed, let alone be 
tracked down and arrested, which costs a considerable amount of time 
and money.
	Beginners should read all the files that they can get their
hands on about anything even remotely related to hacking and phreaking,
BEFORE they start hacking. I know it sounds stupid and boring but it
will definetly pay off in the future. The more you read about hacking
and phreaking, the more unlikely it is that you will get caught. Some
of the most useless pieces of information that you read could turn out
to be the most helpful. That is why you need to read everything 
possible.


C. Hacking rules


1.	Never damage any system. This will only get you into trouble.

2.	Never alter any of the systems files, except for those needed to
insure that you are not detected, and those to insure that you have
access into that computer in the future.

3.	Do not share any information about your hacking projects with
anyone but those you'd trust with your life.

4.	When posting on BBS's (Bulletin Board Systems) be as vague as
possible when describing your current hacking projects.  BBS's CAN
be monitered by law enforcement.

5.	Never use anyone's real name or real phone number when posting
on a BBS. 

6.	Never leave your handle on any systems that you hack in to.

7.	DO NOT hack government computers.

8.	Never speak about hacking projects over your home telephone line.

9.	Be paranoid. Keep all of your hacking materials in a safe place.

10.	To become a real hacker, you have to hack. You can't just sit
around reading text files and hanging out on BBS's. This is not what
hacking is all about.


D. Getting started


	The very first thing you need to do is get a copy of PKZIP 
or some other file unzipping utility.  Nearly everything that you
download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip".
	Then you need to get yourself a good prefix scanner.(also known
as a War Dialer)  This is a program that automatically dials phone 
numbers beginning with the three numbers (prefix) that you specify. It 
checks to see if the number dialed has a carrier.(series of beeps that 
tells you that you have dialed a computer)  Try and find a large 
business area prefix to scan. It is these businesses that have 
interesting computers.  There are many good scanners out there, but I 
would recommend Autoscan or A-Dial. These are very easy to use and get 
the job done quickly and efficiently.


E. Where and how to start hacking


	After you get yourself a good scanner, scan some prefixes and
find some cool dialups, then do the following:  From your terminal,
dial the number you found.  Then you should hear a series of beeps
(carrier) which tells you that you are connecting to a remote computer.
It should then say something like "CONNECT 9600" and then identify the
system that you are on. If nothing happens after it says "CONNECT 9600"
try hitting enter a few times. If you get a bunch of garbage adjust your
parity, data bits, stop bits, baud rate, etc., until it becomes clear.
	That is one way of connecting to a remote computer. Another way is
through Telenet or some other large network.
	Telenet is a very large network that has many other networks and 
remote computers connected to it.
	Ok, here is how you would connect to a remote computer through
Telenet:
	First, you get your local dialup(phone number) from the list that
I have provided in Section G.  Then you dial the number from your 
terminal and connect.(If you get a bunch of garbage try changing your 
parity to odd and your data bits to 7, this should clear it up.)  If 
it just sits there hit enter and wait a few seconds, then hit enter 
again. Then it will say "TERMINAL=" and you type in your terminal
emulation. If you don't know what it is just hit enter. Then it will
give you a prompt that looks like "@". From there you type "c" and then
the NUA (Network User Address) that you want to connect to. After you
connect to the NUA, the first thing you need to do is find out what type
of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.)
	There are other things that you can do on Telenet besides 
connecting to an NUA. Some of these commands and functions are listed in 
the next section.
	You can only connect to computers which accept reverse charging.
The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password.
	Telenet is probably the safest place to start hacking because of
the large numbers of calls that they get. Make sure you call during
business hours (late morning or early afternoon) so there are many
other people on-line.


F. Telenet commands


	Here is a list of some Telenet commands and their functions. This
is only a partial list.  Beginners probably won't use these commands,
but I put them here for reference anyway.

COMMAND					FUNCTION

c						Connect to a host.
stat						Shows network port.
full						Network echo.
half						Terminal echo.
telemail					Mail.(need ID and password)
mail						Mail.(need ID and password)
set						Select PAD parameters
cont						Continue.
d						Disconnect.
hangup					Hangs up.
access					Telenet account.(ID and password)


G. Telenet dialups


	Here is the list of all the Telenet dialups that I know of in 
the U.S.A., including the city, state, and area code:

STATE,CITY:			AREA CODE:			NUMBER:

AL, Anniston		205				236-9711
AL, Birmingham		205				328-2310
AL, Decatur			205				355-0206
AL, Dothan			205				793-5034
AL, Florence		205				767-7960
AL, Huntsville		205				539-2281
AL, Mobile			205				432-1680
AL, Montgomery		205				269-0090
AL, Tuscaloosa		205				752-1472
AZ, Phoenix			602				254-0244
AZ, Tucson			602				747-0107
AR, Ft.Smith		501				782-2852
AR, Little Rock		501				327-4616 
CA, Bakersfield		805				327-8146
CA, Chico			916				894-6882
CA, Colton			714				824-9000
CA, Compton			213				516-1007
CA, Concord			415				827-3960
CA, Escondido		619				741-7756
CA, Eureka			707				444-3091
CA, Fresno			209				233-0961
CA, Garden Grove		714				898-9820
CA, Glendale		818				507-0909
CA, Hayward			415				881-1382
CA, Los Angeles		213				624-2251
CA, Marina Del Rey	213				306-2984
CA, Merced			209				383-2557
CA, Modesto			209				576-2852
CA, Montery			408				646-9092
CA, Norwalk			213				404-2237
CA, Oakland			415				836-4911
CA, Oceanside		619				430-0613
CA, Palo Alto		415				856-9995
CA, Pomona			714				626-1284
CA, Sacramento		916				448-6262
CA, Salinas			408				443-4940
CA, San Carlos		415				591-0726
CA, San Diego		619				233-0233
CA, San Francisco		415				956-5777
CA, San Jose		408				294-9119
CA, San Pedro		213				548-6141
CA, San Rafael		415				472-5360
CA, San Ramon		415				829-6705
CA, Santa Ana		714				558-7078
CA, Santa Barbara		805				682-5361
CA, Santa Cruz		408				429-6937
CA, Santa Rosa		707				656-6760
CA, Stockton		209				957-7610
CA, Thousand Oaks		805				495-3588
CA, Vallejo			415				724-4200
CA, Ventura			805				656-6760
CA, Visalia			209				627-1201
CA, West Covina		818				915-5151
CA, Woodland Hills	818				887-3160
C0, Colorado		719				635-5361
CO, Denver			303				337-6060
CO, Ft. Collins		303				493-9131
CO, Grand Junction	303				241-3004
CO, Greeley			303				352-8563
CO, Pueblo			719				542-4053
CT, Bridgeport		203				335-5055
CT, Danbury			203				794-9075
CT, Hartford		203				247-9479
CT, Middletown		203				344-8217
CT, New Britain		203				225-7027
CT, New Haven		203				624-5954
CT, New London		203				447-8455
CT, Norwalk			203				866-7404
CT, Stamford		203				348-0787
CT, Waterbury		203				753-4512
DE, Dover			302				678-8328
DE, Newark			302				454-7710
DC, Washington		202				429-7896
DC, Washington		202				429-7800
FL, Boca Raton		407				338-3701
FL, Cape Coral		813				275-7924
FL, Cocoa Beach		407				267-0800
FL, Daytona Beach		904				255-2629
FL, Ft. Lauderdale	305				764-4505
FL, Gainsville		904				338-0220
FL, Jacksonville		904				353-1818
FL, Lakeland		813				683-5461
FL, Melbourne		407				242-8247
FL, Miami			305				372-0230
FL, Naples			813				263-3033
FL, Ocala			904				351-3790
FL, Orlando			407				422-4099
FL, Pensacola		904				432-1335
FL, Pompano Beach		305				941-5445
FL, St. Petersburg	813				323-4026
FL, Sarasota		813				923-4563
FL, Tallahassee		904				681-1902
FL, Tampa			813				224-9920
FL, West Palm Beach	407				833-6691
GA, Albany			912				888-3011
GA, Athens			404				548-5590
GA, Atlanta			404				523-0834
GA, Augusta			404				724-2752
GA, Colombus		404				571-0556
GA, Macon			912				743-8844
GA, Rome			404				234-1428
GA, Savannah		912				236-2605
HI, Oahu			808				528-0200
ID, Boise			208				343-0611
ID, Idaho Falls		208				529-0406
ID, Lewiston		208				743-0099
ID, Pocatella		208				232-1764
IL, Aurora			312				896-0620
IL, Bloomington		309				827-7000
IL, Chicago			312				938-0600
IL, Decatur			217				429-0235
IL, Dekalb			815				758-2623
IL, Joliet			815				726-0070
IL, Peoria			309				637-8570
IL, Rockford		815				965-0400
IL, Springfield		217				753-1373
IL, Urbana			217				384-6428
IN, Bloomington		812				332-1344
IN, Evansville		812				424-7693
IN, Ft. Wayne		219				426-2268
IN, Gary			219				882-8800
IN, Indianapolis		317				299-0024
IN, Kokomo			317				455-2460
IN, Lafayette		317				742-6000
IN, Muncie			317				282-6418
IN, South Bend		219				233-7104
IN, Terre Haute		812				232-5329
IA, Ames			515				233-6300
IA, Cedar Rapids		319				364-0911
IA, Davenport		319				324-2445
IA, Des Moines		515				288-4403
IA, Dubuque			319				556-0783
IA, Iowa City		319				351-1421
IA, Sioux City		712				255-1545
IA, Waterloo		319				232-5441
KS, Lawrence		913				843-8124
KS, Manhattan		913				537-0948
KS, Salina			913				825-7900
KS, Topeka			913				233-9880
KS, Wichita			316				262-5669
KY, Bowling Green		502				782-7941
KY, Frankfort		502				875-4654
KY, Lexington		606				233-0312
KY, Louisville		502				589-5580 
KY, Owensboro		502				686-8107 
LA, Alexandria		318				445-1053 
LA, Baton Rouge		504				343-0753 
LA, Lafayette		318				233-0002 
LA, Lake Charles		318				436-0518 
LA, Monroe			318				387-6330
LA, New Orleans		504				524-4094
LA, Shreveport		318				221-5833
ME, Augusta			207				622-3123
ME, Brewer			207				989-3081
ME, Lewiston		207				784-0105
ME, Portland		207				761-4000
MD, Annapolis		301				224-8550
MD, Baltimore		301				727-6060
MD, Frederick		301				293-9596
MA, Boston			617				292-0662
MA, Brockton		508				580-0721
MA, Fall River		508				677-4477
MA, Framingham		508				879-6798
MA, Lawrence		508				975-2273
MA, Lexington		617				863-1550
MA, Lowell			508				937-5214
MA, New Bedford		508				999-2915
MA, Northampton		413				586-0510
MA, Pittsfield		413				499-7741
MA, Salem			508				744-1559
MA, Springfield		413				781-3811
MA, Woods Hole		508				540-7500
MA, Worcester		508				755-4740
MI, Ann Arbor		313				996-5995
MI, Battle Creek		616				968-0929
MI, Detroit			313				964-2988
MI, Flint			313				235-8517
MI, Grand Rapids		616				774-0966  
MI, Jackson			517				782-8111  			
MI, Kalamazoo		616				345-3088
MI, Lansing			517				484-0062
MI, Midland			517				832-7068
MI, Muskegon		616				726-5723
MI, Pontiac			313				332-5120
MI, Port Huron		313				982-8364
MI, Saginaw			517				790-5166
MI, Southfield		313				827-4710
MI, Traverse City		616				946-2121
MI, Warren			313				575-9152
MN, Duluth			218				722-1719
MN, Mankato			517				388-3780
MN, Minneapolis		612				341-2459
MN, Rochester		507				282-5917
MN, St. Cloud		612				253-2064
MS, Gulfport		601				863-0024
MS, Jackson			601				969-0036
MS, Meridian		601				482-2210
MS, Starkville		601				324-2155
MO, Columbia		314				449-4404
MO, Jefferson City	314				634-5178
MO, Kansas City		816				221-9900
MO, St. Joseph		816				279-4797
MO, St. Louis		314				421-4990
MO, Springfield		417				864-4814
MT, Billings		406				245-7649
MT, Great Falls		406				771-0067
MT, Helena			406				443-0000
MT, Missoula		406				721-5900
NE, Lincoln			402				475-4964
NE, Omaha			402				341-7733
NV, Las Vegas		702				737-6861
NV, Reno			702				827-6900
NH, Concord			603				224-1024
NH, Durham			603				868-2924
NH, Manchester		603				627-8725
NH, Nashua			603				880-6241
NH, Portsmouth		603				431-2302
NJ, Atlantic City		609				348-0561
NJ, Freehold		201				780-5030
NJ, Hackensack		201				488-6567
NJ, Marlton			609				596-1500
NJ, Merchantville		609				663-9297
NJ, Morristown		201				455-0275
NJ, New Brunswick		201				745-2900
NJ, Newark			201				623-0469
NJ, Passaic			201				778-5600
NJ, Paterson		201				684-7560
NJ, Princeton		609				799-5587
NJ, Rahway			201				815-1885
NJ, Redbank			201				571-0003
NJ, Roseland		201				227-5277
NJ, Sayreville		201				525-9507
NJ, Trenton			609				989-8847
NM, Albuquerque		505				243-4479
NM, Las Cruces		505				526-9191
NM, Santa Fe		505				473-3403
NY, Albany			518				465-8444
NY, Binghampton		607				772-6642
NY, Buffalo			716				847-1440
NY, Dear Park		516				667-5566
NY, Hempstead		516				292-3800
NY, Ithaca			607				277-2142
NY, New York City		212				741-8100
NY, New York City		212				620-6000
NY, Plattsburgh		518				562-1890
NY, Poughkeepsie		914				473-2240
NY, Rochester		716				454-1020
NY, Syracuse		315				472-5583
NY, Utica			315				797-0920
NY, Whit Plains		914				328-9199
NC, Asheville		704				252-9134
NC, Charlotte		704				332-3131
NC, Fayetteville		919				323-8165
NC, Gastonia		704				865-4708
NC, Greensboro		919				273-2851
NC, High Point		919				889-7494
NC, North Wilkesboro	919				838-9034
NC, Raleigh			919				834-8254
NC, Res Tri Park		919				549-8139
NC, Tarboro			919				823-0579
NC, Wilmington		919				763-8313
NC, Winston-Salem		919			      725-2126 
ND, Fargo 			701				235-7717
ND, Grand Forks		701				775-7813
ND, Mandan			701				663-2256
OH, Canton			216				452-0903
OH, Cincinnati		513				579-0390
OH, Cleveland		216				575-1658
OH, Colombus		614				463-9340
OH, Dayton			513				461-5254
OH, Elyria			216				323-5059
OH, Hamilton		513				863-4116
OH, Kent			216				678-5115
OH, Lorain			216				960-1170
OH, Mansfield		419				526-0686
OH, Sandusky		419				627-0050
OH, Springfield		513				324-1520
OH, Toledo			419				255-7881
OH, Warren			216				394-0041
OH, Wooster			216				264-8920
OH, Youngstown		216				743-1296
OK, Bartlesville		918				336-3675
OK, Lawton			405				353-0333
OK, Oklahoma City		405				232-4546
OK, Stillwater		405				624-1113
OK, Tulsa			918				584-3247
OR, Corvallis		503				754-9273
OR, Eugena			503				683-1460
OR, Hood River		503				386-4405
OR, Klamath Falls		503				882-6282
OR, Medford			503				779-6343
OR, Portland		503				295-3028
OR, Salem			503				378-7712
PA, Allentown		215				435-3330
PA, Altoona			814				949-0310
PA, Carlisle		717				249-9311
PA, Danville		717				271-0102
PA, Erie			814				899-2241
PA, Harrisburg		717				236-6882
PA, Johnstown		814				535-7576
PA, King Of Prussia	215				337-4300
PA, Lancaster		717				295-5405
PA, Philadelphia		215				574-9462
PA, Pittsburgh		412				288-9950
PA, Reading			215				376-8750
PA, Scranton		717				961-5321
PA, State College		814				231-1510
PA, Wilkes-Barre		717				829-3108
PA, Williamsport		717				494-1796
PA, York			717				846-6550
RI, Providence		401				751-7910
SC, Charleston		803				722-4303
SC, Columbia		803				254-0695
SC, Greenville		803				233-3486
SC, Spartenburg		803				585-1637
SC, Pierre			605				224-0481
SC, Rapid City		605				348-2621
SC, Sioux Falls		605				336-8593
TN, Bristol			615				968-1130
TN, Chattanooga		615				756-1161
TN, Clarksville		615				552-0032
TN, Johnson City		615				282-6645
TN, Knoxville		615				525-5500
TN, Memphis			901				521-0215
TN, Nashville		615				244-3702
TN, Oak Ridge		615				481-3590
TX, Abilene			915				676-9151
TX, Amarillo		806				373-0458
TX, Athens			214				677-1712
TX, Austin			512				928-1130
TX, Brownsville		512				542-0367
TX, Bryan			409				822-0159
TX, Corpus Christi	512				884-9030
TX, Dallas			214				748-6371
TX, El Paso			915				532-7907
TX, Ft. Worth		817				332-4307
TX, Galveston		409				762-4382
TX, Houston			713				227-1018
TX, Laredo			512				724-1791
TX, Longview		214				236-4205
TX, Lubbock			806				747-4121
TX, Mcallen			512				686-5360
TX, Midland			915				561-9811
TX, Nederland		409				722-3720
TX, San Angelo		915				944-7612
TX, San Antonio		512				225-8004
TX, Sherman			214				893-4995
TX, Temple			817				773-9723
TX, Tyler			214				597-8925
TX, Waco			817				752-9743
TX, Wichita Falls		817				322-3774
UT, Ogden			801				627-1630
UT, Provo			801				373-0542
UT, Salt Lake City	801				359-0149
VT, Burlington		802				864-0808
VT, Montpelier		802				229-4966
VT, Rutland			802				775-1676
VT, White River Jct.	802			      295-7631 
VA, Blacksburg		703			      552-9181 
VA, Charlottesville	804			      977-5330 
VA, Covington		703			      962-2217 
VA, Fredericksburg	703			      371-0188 
VA, Harrisonburg		703				434-7121
VA, Herndon			703				435-1800
VA, Lynchburg		804				845-0010
VA, Newport News		804				596-6600
VA, Norfolk			804				625-1186
VA, Richmond		804				788-9902
VA, Roanoke			703				344-2036
WA, Auburn			206				939-9982
WA, Bellingham		206				733-2720
WA, Everett			206				775-9929
WA, Longview		206				577-5835
WA, Olympia			206				754-0460
WA, Richland		509				943-0649
WA, Seattle			206				625-9612
WA, Spokane			509				455-4071
WA, Tacoma			206				627-1791
WA, Vancouver		206				693-6914
WA, Wenatchee		509				663-6227
WA, Yakima			509				575-1060
WV, Charleston		304				343-6471
WV, Huntington		304				523-2802
WV, Morgantown		304				292-0104
WV, Wheeling		304				233-7732
WI, Beloit			608				362-5287
WI, Eau Claire		715		            836-9295 
WI, Green Bay		414		            432-2815 
WI, Kenosha			414			      552-9242
WI, La Crosse		608			      784-0560 
WI, Madison			608			      257-5010 
WI, Milwaukee		414				271-3914
WI, Neenah			414				722-7636
WI, Racine			414				632-6166
WI, Sheboygan		414				452-3995
WI, Wausau			715				845-9584
WI, West Bend		414				334-2206
WY, Casper			307				265-5167
WY, Cheyenne		307				638-4421
WY, Laramie			307				721-5878			  						      					 					
H. Telenet DNIC's
	
	
	Here is the list of all the Telenet DNIC's. These 
will be defined and explained in the next section:

DNIC:				NETWORK:			

02041				Datanet-1
02062				DCS
02080				Transpac
02284				Telepac (Switzerland)
02322				Datex-P (Austria)
02392				Radaus
02342				PSS
02382				Datapak (Denmark)
02402				Datapak (Sweden)
02405				Telepak
02442				Finpak
02624				Datex-P (West Germany)
02704				Luxpac
02724				Eirpak
03020				Datapac
03028				Infogram
03103				ITT/UDTS (U.S.A.)
03106				Tymnet
03110				Telenet
03340				Telepac (Mexico)
03400				UDTS (Curacau)
04251				Isranet
04401				DDX-P
04408				Venus-P
04501				Dacom-Net
04542				Intelpak
05052				Austpac
05053				Midas
05252				Telepac (Hong Kong)
05301				Pacnet
06550				Saponet
07240				Interdata
07241				Renpac
07421				Dompac
09000				Dialnet


I. Telenet NUA's


	Here is a list of a few Telenet NUA's and what type of system
they are. But first, this is how an NUA is put together:

			031106170023700
                  \   /\ /  \ /
			  |   |    |	
                  DNIC Area  NUA
                       Code  

	The DNIC says which network connected to Telenet you are using.
The area code is the area code for the area that the NUA is in.  And
the NUA is the address of the computer on Telenet.  Please note that
an NUA does NOT have to be in your area code for you to connect to it.
	There are two ways of finding useful NUA's.  The first way is to
get or write an NUA scanning program.  The second way is to get a copy 
of the Legion Of Doom's Telenet Directory.( Volume 4 of the LOD 
Technical Journals)
	Now, here is the list. Remember that these are only a few NUA's.
These are NOT all of the Telenet NUA's.  All of these NUA's DO accept
reverse charging.  Also, please note that all of these may not be 
working by the time you read this and that network congestion
frequently makes an NUA inaccessible for a short period of time.

NUA:							SYSTEM TYPE:

031102010022500					VAX
031102010015600					UNIX
031102010022000					VAX
031102010025900					UNIX
031102010046100					VAX
031102010025200					PRIME
031102010046100					VAX
031102010052200					VAX
031102020001000					PRIME
031102020013200					VAX
031102020014100					PRIME
031102020014200					PRIME
031102020015000					VAX
031102020016100					UNIX
031102020021400					PRIME
031102020024500					AOS
031102020030800					PRIME
031102020030900					PRIME
031102020031200					PRIME
031102020033600					VAX
031102020033700					VAX
031102020034300					PRIME
031102020036000					HP-3000 
031102030007500					VAX
031102030002200					VM/370
031102030013600					PRIME
031102060003200					HP-3000
031102060044000					VAX
031102060044900					NOS
031102060044700					VM/370
031102120003900					NOS
031102120015200					PRIME
031102120026600					VAX
031102120026300					VAX
031102120026700					UNIX
031102120044900					UNIX
031102120053900					VOS
031102140024000					VAX


J. Basic UNIX hacking

	UNIX is probably the most commonly used operating system on Telenet, and is the easiest to hack since it doesn't record bad login attempts.  You know you've found a UNIX system when it gives you a "Login" prompt, and then a "Password" prompt. To get in you should first try the default logins.(Listed below.) If these don't work try some of the passwords listed in Section M. If these don't work try to find backdoors. These are passwords that may have been put in to allow the programmer (or someone else who could be in a position to make a backdoor) to get access into the system. These are usually not known about by anyone but the individual who made it. Try doing some research on the programmer and other people who helped to make the system. And, if these don't work, just try guessing them. The Login (usually the account holders name) has 1-8 characters and the Password is 6-8 characters. Both can be either letters or numbers, or a combination of the two.
	Once you get in, you should get a "$" prompt, or some other special character like it. You should only use lower case letters when hacking UNIX, this seems to be standard format. If you type "man [command]" at the prompt, it should list all of the commands for that system. Anyway, here are the default Logins and Passwords:


Login:				Password:

root					root
root					system
sys					sys
sys					system
daemon				daemon
uucp					uucp
tty					tty
test					test
unix					unix
unix					test
bin					bin
adm					adm
adm					admin
admin					adm
admin					admin
sysman				sysman
sysman				sys
sysman				system
sysadmin				sysadmin
sysadmin				sys
sysadmin				system
sysadmin				admin
sysadmin				adm
who					who
learn					learn
uuhost				uuhost
guest					guest
host					host
nuucp					nuucp
rje					rje
games					games
games					player
sysop					sysop
root					sysop
demo					demo


	Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things:

/etc/passwd
or
cat /etc/passwd  

	The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this:


john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john

	
	Broken down, this is what the above password file states:


Username: john
Encrypted Password: 234abc56
User Number: 9999
Group Number: 13
Other Information: John Johnson
Home Directory: /home/dir/john
Shell: /bin/john


	If the password file does not show up under one of the above two commands, then it is probably shadowed.
	The following definition of password shadowing was taken from the alt.2600 hack faq:
	"Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users."
	If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using:


UNIX System Type:		Path:						Token:

AIX 3				/etc/security/passwd			   ! 
or				/tcb/auth/files/<first letter of	   #	
				username>/<username>

A/UX 3.Os			/tcb/files/auth/*

BSD4.3-Reno			/etc/master.passwd			   *

ConvexOS 10			/etc/shadpw					   *

Convex0S 11			/etc/shadow					   *

DG/UX				/etc/tcb/aa/user				   *

EP/IX				/etc/shadow					   x

HP-UX				/.secure/etc/passwd			   *

IRIX 5			/etc/shadow					   x

Linux 1.1			/etc/shadow					   *

OSF/1				/etc/passwd[.dir|.pag]			   *

SCO UNIX #.2.x		/tcb/auth/files/<first letter of	   *
				username>/<username>

SunOS 4.1+c2		/etc/security/passwd.adjunct		   ##

SunOS 5.0			/etc/shadow					   

System V 4.0		/etc/shadow					   x

System V 4.2		/etc/security/* database		   

Ultrix 4			/etc/auth[.dir|.pag]			   *

UNICOS		 	/etc/udb					   *


	Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data:


bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob


	The characters in the password aging data stand for the following:


1. Maximum number of weeks a password can be used without changing.
2. Minimum number of weeks a password must be used before being changed.
3&4. Last time password was changed, in number of weeks since 1970.


	The password aging data can be decoded using the chart below:

Character:			Number:

.				0
/				1
0				2
1				3
2				4
3				5
4				6
5				7
6				8
7				9
8				10
9				11
A				12
B				13
C				14
D				15	
E				16
F				17
G				18
H				19	
I				20
J				21
K				22
L				23
M				24
N				25
O				26
P				27
Q				28
R				29
S				30
T				31
U				32
V				33
W				34
X				35
Y				36
Z				37
a				38
b				39
c				40
d				41
e				42
f				43
g				44
h				45
i				46
j				47
k				48
l				49
m				50
n				51
o				52
p				53
q				54
r				55
s				56
t				57
u				58
v				59
w				60
x				61
y				62
z				63


	Now, explore the system freely, be careful, and have fun!


K. Basic VAX/VMS hacking


	The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's:

Username:				Password:

SYSTEM				OPERATOR
SYSTEM				MANAGER
SYSTEM				SYSTEM
SYSTEM				SYSLIB
OPERATOR				OPERATOR
SYSTEST				UETP
SYSTEST				SYSTEST
SYSTEST				TEST
SYSMAINT				SYSMAINT
SYSMAINT				SERVICE
SYSMAINT				DIGITAL
FIELD					FIELD
FIELD					SERVICE
GUEST					GUEST
GUEST					unpassworded
DEMO					DEMO
DEMO					unpassworded
TEST					TEST
DECNET				DECNET


	
	Here are some of the VAX/VMS commands:


Command:				Function:

HELP (H)				Gives help and list of commands.
TYPE (T)				View contents of a file.
RENAME (REN)			Change name of a file.
PURGE (PU)	 			Deletes old versions of a file.
PRINT (PR)				Prints a file.
DIRECTORY (DIR)			Shows list of files.
DIFFERENCES	(DIF)			Shows differences between files.
CREATE (CR)				Creates a file.
DELETE (DEL)			Deletes a file.
COPY (COP)				Copy a file to another.
CONTINUE (C)			Continues session.


	
	The password file on VAX's are available when you type in the command:

SYS$SYSTEM:SYSUAF.DAT

	The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J.
	Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced.
	But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts.


L. Basic PRIME hacking


	PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN <USERNAME>". It should then ask you for your username and password. The default usernames and passwords are listed below:

Username:			Password:

PRIME				PRIME
PRIME				PRIMOS
PRIMOS			PRIMOS
PRIMOS			PRIME
PRIMOS_CS			PRIME
PRIMOS_CS			PRIMOS
PRIMENET			PRIMENET
SYSTEM			SYSTEM
SYSTEM			PRIME
SYSTEM			PRIMOS
NETLINK			NETLINK
TEST				TEST
GUEST				GUEST
GUEST1 			GUEST


	When you are inside the system, type "NETLINK" and it ahould give you alot of help. This system uses NUA's, too. I might print these in the next volume.


M. Password List


	The password list was taken from A Novice's Guide To Hacking, by The Legion Of Doom, and from some of my own discoveries. Here is the list of commonly used passwords:

Password:

aaa
academia
ada
adrian
aerobics
airplane
albany
albatross
albert
alex
alexander
algebra
alias
alisa
alpha
alphabet
ama
amy
analog
anchor
andy
andrea
animal
answer
anything
arrow
arthur
ass
asshole
athena
atmosphere
bacchus
badass
bailey
banana
bandit
banks
bass
batman
beautiful
beauty
beaver
daniel
danny
dave
deb
debbie
deborah
december
desire
desperate
develop
diet
digital
discovery
disney
dog
drought
duncan
easy
eatme
edges
edwin
egghead
eileen
einstein
elephant
elizabeth
ellen
emerald
engine
engineer
enterprise
enzyme
euclid
evelyn
extension
fairway
felicia
fender
finite
format
god
hello
idiot
jester
john
johnny
joseph
joshua
judith
juggle
julia
kathleen
kermit
kernel
knight
lambda
larry
lazarus
lee
leroy
lewis
light
lisa
louis
love
lynne
mac
macintosh
mack
maggot
magic
malcolm
mark
markus
martin
marty
marvin
matt
master
maurice
maximum
merlin
mets
michael
michelle
mike
minimum
nicki
nicole
rascal
really
rebecca
remote
rick
reagan
robot
robotics
rolex
ronald
rose
rosebud
rosemary
roses
ruben
rules
ruth
sal
saxon
scheme
scott
secret
sensor
serenity
sex
shark
sharon
shit
shiva
shuttle
simon
simple
singer
single
singing
smile
smooch
smother
snatch
snoopy
soap
socrates
spit
spring
subway
success
summer
super
support
surfer
suzanne
tangerine
tape
target
taylor
telephone
temptation
tiger
tigger
toggle
tomato
toyota
trivial
unhappy
unicorn
unknown
urchin
utility
vicki
virgin
virginia
warren
water
weenie
whatnot
whitney
will
william
winston
willie
wizard
wonbat
yosemite
zap


N. Connecting modems to different phone lines	 
		

	Ok, if you are really paranoid (or smart) and you don't want to hack from your house for fear of getting caught, you can hook up your modem to other peoples phone lines or to payphones.
	If you want to hook your modem to a payphone, do it late at night and at a very secluded payphone. Look along either side of the phone. You should see a small metal tube (which contains the telephone wires) running along the wall. Somewhere along the tube it should widen out into a small box. Pop off the boxes lid and there is a nice little phone jack for ya'. Taking off the lid may be difficult because they are usually pretty secure, but nothing is impossible, so keep trying. Of course, you can only do this with a lap-top computer.
	Now, if you want to hook up the modem to someone's house or appartment phone line, you need to get a pair of red and green alligator clips, and an extra modem cord for your lap-top.
	After you get those parts, cut the plastic end off of your modem cord and you will see a red wire, a green wire, and two other wires, but you can ignore those. Attach the red alligator clip to the red wire, and attach the green alligator clip to the green wire and you're all set. Now all you need to do is go find a telephone pole or one of those small green boxes that stick out of the ground.(They should have a Bell Systems logo on them.)
	On a telephone pole open the little box that has a bunch of wires going to and from it. On the right side of the box you should see what look like two large screws.(These are called "terminals".) One should have a red wire wrapped around it and the other should have a green wire wrapped around it. Attach the red alligator clip the the red wire and the green alligator clip to the green wire, and you're all set. This should get you a dial tone. If it doesn't, make sure that the alligator clips are not touching each other, and that the alligator clips are attached to the exposed end of the wire.
	Now, on those green boxes you need to undo all of the screws and shit holding the lid on, and open it up. Then you should find basically the same setup as in the telephone pole. Attach the appropriate wires to the appropriate terminals and you are all set. 
	This process can also be used to hook up a Beige Box (Lineman's Handset.) when phreaking.


O. Viruses, Trojans, and Worms


	Just in case some of you are interested, here are the definitions for Viruses, Trojans, and Worms.  These definitions were taken from the alt.2600 hack faq.

Trojan:

	"Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans."

Virus:

	"A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore."

Worm:

	"Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."


II. PHREAKING


A. What is phreaking

	
	Phreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls. In the following sections, you will learn some about boxes, what they are, and how they work. You will also learn about the other forms of phreaking.


B. Why phreak?


	Phreaking, like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information.


C. Phreaking rules



	Most of the same rules apply for hacking and phreaking, so I will only list a few here.


1.	Never box over your home phone line.
2.	You should never talk about phreaking projects over your home phone line.
3.	Never use your real name when phreaking.
4.	Be careful who you tell about your phreaking projects.
5.	Never leave phreaking materials out in the open. Keep them in a safe place.
6.	Don't get caught.


D. Where and how to start phreaking


	Well, you can phreak on any telephone, but as stated above, it is very stupid to do so on your home phone line. 
	First you need you need to construct the boxes needed for what you want to do. All of the boxes and their descriptions are listed in the next section. Most of the boxes are very easy to make, but if your not into making shit, there are usually alternative ways of making them.


E. Boxes and what they do


Box:					Description:

Red Box				generates tones for free phone calls

Black Box				when called, caller pays nothing

Beige Box				lineman's handset

Green Box				generates coin return tones

Cheese Box				turns your phone into a payphone

Acrylic Box				steal 3-way calling and other services

Aqua Box				stops F.B.I. lock-in-trace

Blast Box				phone microphone amplifier

Blotto Box				shorts out all phones in your area

Blue Box				generates 2600hz tone

Brown Box				creates party line

Bud Box				tap neighbors phone 

Chatreuse Box			use electricity from 					phone

Chrome Box				manipulates traffic 					signals

Clear Box				free calls

Color Box				phone conversation 					recorder

Copper Box				causes crosstalk 					interference

Crimson Box				hold button

Dark Box				re-route calls

Dayglo Box				connect to neighbors phone line

Divertor Box			re-route calls

DLOC Box				create party line

Gold Box				dialout router

Infinity Box			remote activated phone 					tap

Jack Box				touch-tone key pad

Light Box				in-use light

Lunch Box				AM transmitter

Magenta Box				connect remote phone line to 					another

Mauve Box				phone tap without cutting into 					the line

Neon Box				external microphone

Noise Box				creates line noise

Olive Box				external ringer

Party Box				creates party line

Pearl Box				tone generator

Pink Box				creates party line

Purple Box				hold button

Rainbow Box				kill trace

Razz Box				tap neighbors phone

Rock Box				add music to phone line

Scarlet Box				causes interference

Silver Box				create DTMF tones for A,B,C, and 					D

Static Box				raises voltage on phone 					line

Switch Box				add services 

Tan Box				phone conversation 					recorder

TV Cable Box			see sound waves on TV

Urine Box				create disturbance on phone 					headset

Violet Box				stop payphone from hanging 					up

White Box				DTMF key pad 

Yellow Box				add line extension 


F. Box Plans


	The Red Box is the main tool that you will use so I have included the Red Box plans. The other box plans can be downloaded from the Internet.

Red Box:

	There are two ways that you can make a Red Box:

	One is to go to Radio Shack and buy a tone dialer and a 6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you can order them from the electronics companies that I have listed at the end of this section.) Open up the tone dialer and replace the existing crystal (big, shiny, metal thing labeled "3.579545Mhz") with the 6.5536Mhz crystal. Now, close it up. You have a red box. 
	To use it for long distance calls play the tones that add up to the amount of money that the operator requests. For a 25 cents tone press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press 1 *.
	And, the second way, which is a much easier method, is to get the Red Box tones from a phreaking program, such as: Omnibox, or Fear's Phreaker Tools. Play the tones as you hold a microcassette recorder about 1-inch away from your computer speakers, and record the tones.
	The Red Box only works on public telephones, it does not work on COCOT's.(Defined in next section.) It makes the telephone think that you have put money in. Red Boxes do not work on local calls because the phone is not using ACTS (Automated Coin Toll System), unless you call the operator and have her place the call for you. You tell her the number that you want to dial and then when she asks you to put in your money, play the tones. If she asks you why you need her to place the call tell her that one of the buttons is smashed in or something like that. You now have and know how to use a Red Box!

Electronics Companies:

Alltronics
2300 Zanker Road
San Jose, CA 95131
(408)943-9774  -Voice-
(408)943-9776  -Fax-

Blue Saguaro
P.O. Box 37061
Tucson, AZ 85740

Mouser
(800)346-6873

Unicorn Electronics
10000 Canoga Ave. Unit C-2
Chatsworth, CA 91311
1-800-824-3432


G. Free calling from COCOT's


	First of all, COCOT stands for "Customer Owned Customer Operated Telephone". These are most likely to be found at resteraunts, amusement parks, etc. 
	All you have to do to make a free call from a COCOT is dial a 1-800 number (they let you do this for free), say some bullshit and get them to hang up on you. Stay on the line after they hang up, then dial the number that you want to call.
	This may not work by the time you read this because COCOT owners are becoming more aware of us every day.


H. ANAC numbers


	ANAC stands for "Automated Number Announcment Circuit". In other words, you call the ANAC number in your area and it tells you the number that you are calling from. This is useful when Beige Boxing, or hooking your modem up to other phone lines, to find out what number you are using. The "?" are substituted for unknown numbers. Do some scanning to find them out. Here are the ANAC numbers for the U.S.A. with their area code, and the only one I knew of in the U.K.:

U.S.A.:

Area Code:				ANAC Number:

201					958
202					811
203					970
205					300-222-2222
205					300-555-5555
205					300-648-1111
205					300-765-4321
205					300-798-1111
205					300-833-3333
205					557-2311
205					811
205					841-1111
205					908-222-2222
206					411
207					958
209					830-2121
209					211-9779
210					830
212					958
213					114
213					1223
213					211-2345
213					211-2346
213					760-2???
213					61056
214					570
214					790
214					970-222-2222
214					970-611-1111
215					410-????
215					511
215					958
216					200-????
216					331
216					959-9968
217					200-???-????
219					550
219					559
301					958-9968
310					114
310					1223
310					211-2345
310					211-2346
312					200
312					290
312					1-200-8825
312					1-200-555-1212
313					200-200-2002
313					200-222-2222					
313					200-???-????
313					200200200200200
314					410-????
315					953
315					958
315					998
317					310-222-2222
317					559-222-2222
317					743-1218
334					5572411
334					5572311
401					200-200-4444
401					222-2222
402					311
404					311
404					940-???-????
404					940
405					890-7777777					
405					897
407					200-222-2222
408					300-???-????
408					760
408					940
409					951
409					970-????
410					200-6969
410					200-555-1212
410					811
412					711-6633
412					711-4411
412					999-????
413					958
413					200-555-5555
414					330-2234
415					200-555-1212
415					211-2111
415					2222
415					640
415					760-2878
415					7600-2222
419					311
502					200-2222222
502					997-555-1212
503					611
503					999
504					99882233
504					201-269-1111
504					998
504					99851-0000000000
508					958
508					200-222-1234
508					200-222-2222
508					26011
509					560
510					760-1111
512					830
512					970-????
515					5463
515					811
516					958
516					968
517					200-222-2222
517					200200200200200
518					511
518					997
518					998
603					200-222-2222					
606					997-555-1212
606					711
607					993
609					958
610					958
610					958-4100
612					511
614					200
614					517
615					200200200200200
615					2002222222
615					830
616					200-222-2222
617					200-222-1234
617					200-222-2222
617					200-444-4444
617					220-2622
617					958
618					200-???-????
618					930
619					211-2001
619					211-2121
703					811
704					311
707					211-2222
708					1-200-555-1212
708					1-200-8825
708					200-6153
708					724-9951
708					356-9646
713					380
713					970-????
713					811
714					114
714					211-2121
714					211-2222
716					511
716					990
717					958
718					958
802					2-222-222-2222
802					200-222-2222
802					1-700-222-2222
802					111-2222
805					114
805					211-2345
805					211-2346
805					830
806					970-????
810					200200200200200
812					410-555-1212
813					311
815					200-???-????
817					290
817					211
818					970-611-1111
818					1223
818					211-2345
903					211-2346
904					970-611-1111
906					200-222-222
907					1-200-222-2222
907					811
908					958
910					200
910					311
910					988
914					990-1111
915					970-????
916					211-2222
916					461
919					200
919					711

U.K.:

175


III. REFERENCE


A. Hacking and phreaking WWW. sites
    

	Here is a list of some World Wide Web sites that contain hacking, phreaking, computer, virus, carding, security, etc. material:

Site Address:

http://www.outerlimits.net/lordsome/index.html (Hacker's Layer)
http://web2.airmail.net/km/hfiles/free.htm     (Hacker's Hideout)
http://resudox.net/bio/novell.html
http://www.louisville.edu/wrbake01/hack2.html
http://www.intersurf.com/~materva/files.html
http://hightop.nrl.navy.mil/rainbow.html
http://www.rit.edu/~jmb8902/hacking.html
http://www.spatz.com/pecos/index.html
http://pages.prodigy.com/FL/dtgz94a/files2.html
http://www.2600.com					(alt.2600)
http://att.net/dir800
http://draco.centerline.com:8080/~franl/crypto.html
http://everest.cs.ucdavis.edu/Security.html
http://ice-www.larc.nasa.gov/WWW/security.html
http://lOpht.com						(lOpht)
http://lOpht.com/~oblivion/IIRG.html
http://underground.org
http://www.alw.nih.gov/WWW/security.html
http://www.aspentec.com/~frzmtdb/fun/hacker.html
http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
http://www.engin.umich.edu/~jgotts/underground/boxes.html
http://www.etext.org/Zines
http://www.inderect.com/www/johnk/
http://www.mgmua.com/hackers/index.html
http://www.paranoia.com/mthreat
http://www.paranoia.com/astrostar/fringe.html
http://www.umcc.umich.edu/~doug/virus-faq.html
http://www.wired.com


B. Good hacking and phreaking text files


	All of these files are available by download from the Internet.


File Name:


A Novice's Guide To Hacking

Alt.2600 Hack Faq

The Hacker's Handbook

The Official Phreaker's Manual

Rainbow Books (Listed in Section D.)

The Hacker Crackdown

Computer Hackers: Rebels With A Cause

The Legion Of Doom Technical Journals

The Ultimate Beginner's Guide To Hacking And Phreaking (Of course!)


C. Hacking and phreaking Newsgroups


alt.2600
alt.2600.hope.tech
alt.cellular
alt.cellular-phone-tech
alt.comp.virus
alt.cracks
alt.cyberpunk
alt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.malicious
alt.security


D. Rainbow Books


	The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:

Infosec Awareness Division
ATTN: x711/IAOC
Fort George G. Meade, MD 20755-6000

or call:
(410)766-8729

	
	Here is the list of all the Rainbow Books and their descriptions:


Color:				Description:

Orange 1				D.O.D. Trusted Computer Systems

Green					D.O.D. Password Management

Yellow				Computer Security Requirements

Yellow 2				Computer Security Requirements

Tan					Understanding Audit In Trusted Systems

Bright Blue				Trusted Product Evaluation

Neon Orange				Understanding Discretionary Access

Teal Green				Glossary Of Computer Terms

Orange 2				Understanding Configurations

Red					Interpretation Of Evaluation

Burgundy				Understanding Design Documentation

Dark Lavender			Understanding Trusted Distrobution

Venice Blue				Computer Security Sub-Systems

Aqua					Understanding Security Modeling

Dark Red				Interpretations Of Environments

Pink					Rating Maintenence Phase

Purple				Formal Verification Systems

Brown					Understanding Trusted Facilities

Yellow-Green			Writing Trusted Facility Manuals

Light Blue				Understanding Identification And 					Authentication In Trusted Systems

Blue					Product Evaluation Questionaire

Gray					Selecting Access Control List

Lavander				Data Base Management Interpretation

Yellow 3				Understanding Trusted Recovery

Bright Orange			Understanding Security Testing

Purple 1				Guide To System Procurement

Purple 2				Guide To System Procurement

Purple 3				Guide To System Procurement

Purple 4				Guide To System Procurement

Green					Understanding Data Remanence

Hot Peach				Writing Security Features

Turquiose				Understanding Information Security 
				
Violet				Controlled Access Protection 

Light Pink				Understanding Covert Channels 


E. Cool hacking and phreaking magazines


Phrack Magazine

2600 Magazine

Tap Magazine

Phantasy Magazine


F. Hacking and phreaking movies				


Movie:


Hackers

War Games


G. Hacking and phreaking Gopher sites


Address:

ba.com
csrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.org
oss.net
spy.org
wiretap.spies.com


H. Hacking and phreaking Ftp sites


Address:

2600.com
agl.gatech.edu/pub
asylum.sf.ca.us
clark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrack
ftp.giga.or.at/pub/hacker
ftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/mac
ftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge


I. Hacking and phreaking BBS's


	BBS's are Bulletin Board Systems on which hackers and phreakers can post messages to each other.
	Here is a list of some BBS's that I know of. If you know of any other BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note that some of these may be old and not running.


Area Code:		Phone Number:			Name:

203			832-8441				Rune Stone
210			493-9975				The Truth Sayer's Domain
303			343-4053				Hacker's Haven
315			656-5135				Independent Nation
315			656-5135				UtOPiA	          617			855-2923				Maas-Neotek
708			676-9855				Apocalypse 2000
713			579-2276				KOdE AbOdE
806			747-0802				Static Line
908			526-4384				Area 51
502			499-8933				Blitzkrieg
510			935-5845				...Screaming Electron
408			747-0778				The Shrine
708			459-7267				The Hell Pit
415			345-2134				Castle Brass
415			697-1320				7 Gates Of Hell 

J. Cool hackers and phreakers


	Yes there are many, many, cool hackers and phreakers out there, but these are some that 
helped me to get this file out on the Internet. I did not list a few people because I only
knew their real name, and I don't want to use their real name without their permission.

Handle:					


Silicon Toad

Logik Bomb/Net Assasin

oleBuzzard			

Lord Somer

Weezel

	
	Thanks for your help guys.


K. Hacker's Manifesto


	"This is our world now...the world of the electron and the switch, the beauty of the baud.
We make use of a service already existing without paying for what could be dirt cheep if it 
wasn't run by profiteering gluttons, and you call us criminals. We explore...and you call us 
criminals. We exist without skin color, without nationality, without religious bias...and you 
call us criminals. You build atomic bombs, wage wars, murder, cheat, and lie to us and try to 
make us believe it is for our own good, yet we're the criminals.
	Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by 
what they say and think, not what they look like. My crime is that of outsmarting you, something 
that you will never forgive me for. I am a hacker and this is my manifesto. You may stop this 
individual, but you can't stop us all...after all, we're all alike."

				+++The Mentor+++


K. Happy hacking!


	Be careful and have fun. Remember to keep your eye out for the next volume of 
      The Ultimate Beginner's Guide To Hacking And Phreaking and the Legion Of the Apocalypse 
      W.W.W. page. Oh, and keep looking for our on-line magazine, too, it should be coming out 
      soon. Well, I hope you enjoyed the file and found it informative. I also hope that I 
      helped get you started in hacking and phreaking.

                       "The Revelation is here."
				
				    *-Revelation-*
                               LOA--ASH
					

EOF