The Official Guide To Hacking And Phreaking

So, you want to know about hacking and phreaking huh? Searched the net

as much as you can for as much information as possible? Have to go to

multiple sites all the time? Giving you a headach? Well, I, American

Anarchist have created the largest hacking/phreaking guide ever...so far.

But I must tell you a few things first. If anyone of you are looking for

hacking Unix information, go somewhere else! This guide will not contain

anything on Unix. That's probably it, well, lets get things started.

----------

A. Hacking

----------

A1. First things first

A2. Hacker's Ethics

A3. Why do we hack? Where to start hacking

A4. Hacker's Equipment

A5. Hacking the Milnet

A6. Hacking AT&T Answering Machines

A7. Hacking Compuserve Online

A8. CNA: Numbers Listing

A9. Computer Underground

------------

B. Phreaking

------------

B1. Why do we phreak? Where to start phreaking

B2. Phreaking rules

B3. Boxes and what they do

B4. Red Box ways

B5. Getting unlisted phone numbers

B6. Cellular Listening with a TV

B7. Free LD Msgs

B8. The Call Waiting Tap

B9. How to block Caller-ID

------------------------------------

C. Hacking and Phreaking Information

------------------------------------

C1. Recommended reading

C2. WWW Sites

C3. Newsgroups

C4. Magazines

C5. Books, Videos, and Mailing Lists

C6. Movies

C7. Gopher sites

C8. FTP Sites

C9. BBS's and IRC channels

C10. Cool hackers and phreakers

C11. The Hacker's Manifesto

C12. Happy Hacking!

A. Hacking

----------

A1. First things first

Got kicked or banned from an IRC/mIRC channel because you asked a

little newbie question? Don't worry, this thing always happens. People

who do that think they were wielding a Unix manual in one hand and think

that anyone who is lower than him thinks he is a god. But he could be a

newbie, acting as an elite. Those are piss-ants. They suck. Pay no

attention to them. Ask him hard questions about hacking/phreaking

(one you think he doesn't know), and he probably won't answer for a

long while or will probably guess and give the wrong answer. This is

a way you can find out if someone is a piss-ant. I have done it before.

Also, this guide will contain just main points of hacking and phreaking,

not long speeches or anything.

A2. Hacker's Ethics

I. Do not intentionally damage *any* system.

II. Do not alter any system files other than ones needed to ensure

your escape from detection and your future access (Trojan Horses,

Altering Logs, and the like are all necessary to your survival for

as long as possible.)

III. Do not leave your (or anyone else's) real name, real handle, or

real phone number on any system that you access illegally. They

*can* and will track you down from your handle!

IV. Be careful who you share information with. Feds are getting

trickier. Generally, if you don't know their voice phone number,

name, and occupation or haven't spoken with them voice on non-info

trading conversations, be wary.

V. Do not leave your real phone number to anyone you don't know. This

includes logging on boards, no matter how k-rad they seem. If you

don't know the sysop, leave a note telling some trustworthy people

that will validate you.

VI. Do not hack government computers. Yes, there are government

systems that are safe to hack, but they are few and far between.

And the government has inifitely more time and resources to track

you down than a company who has to make a profit and justify

expenses.

VII. Don't use codes unless there is *NO* way around it (you don't have

a local telenet or tymnet outdial and can't connect to anything

800...) You use codes long enough, you will get caught. Period.

VIII. Don't be afraid to be paranoid. Remember, you *are* breaking the

law. It doesn't hurt to store everything encrypted on your hard

disk, or keep your notes buried in the backyard or in the trunk of

your car. You may feel a little funny, but you'll feel a lot

funnier when you when you meet Bruno, your transvestite cellmate

who axed his family to death. Watch what you post on boards. Most

of the really great hackers in the country post *nothing* about

the system they're currently working except in the broadest sense

(I'm working on a UNIX, or a COSMOS, or something generic. Not

"I'm hacking into General Electric's Voice Mail System" or

something inane and revealing like that.)

X. Don't be afraid to ask questions. That's what more experienced

hackers are for. Don't expect *everything* you ask to be answered,

though. There are some things (LMOS, for instance) that a begining

hacker shouldn't mess with. You'll either get caught, or screw it

up for others, or both.

XI. Finally, you have to actually hack. You can hang out on boards all

you want, and you can read all the text files in the world, but

until you actually start doing it, you'll never know what it's all

about. There's no thrill quite the same as getting into your first

system (well, ok, I can think of a couple of bigger thrills, but

you get the picture.)

A3. Why do we hack? Where to start hacking

Why do we hack? That is a question asked among very many people.

Why do we hack? Well, I think that the simplest answer there is that we want

to gain access to another computer and take control. We all love to do it.

People would hang around you like you were their idol. "Can you hack for me?

Can you do this? Can you change my grades?" These are some questions asked

to hackers from people who don't know anything about hacking. They want you

to do the work for them. That is a reason there are more newbies than actual

hackers. Newbies want to be known, they want control, they want power. I love

to hack, it gives me something to do when bored or just wanna have fun.

Now to where to start hacking. Get yourself a good scanner and scan some

prefixes and find some col dialups, then do the following: From your terminal,

dial the number you found. Then you should hear a series of beeps (carrier)

which tells you that you are connecting to a remote computer . It should then

say something like "CONNECT 9600" and then identify the system that you are on.

If nothing happens after it says "CONNECT 9600" try hitting 'ENTER' a few times.

If you get a bunch of garbage, adjust your parity, data bits, stop bits, baud

rate, etc., until it becomes clear. That is one way of connecting to a remote

computer. Another way is through Telnet or some other large network. Telnet is

a very large network that has many other networks and remote computers connected

to it. Here is how you would connect to a remote computer through Telnet:

First, you get your local dialup (phone number). Then you dial the number from

your terminal and connect. If you get a bunch of garbage, try changing your

parity to odd and your data bits to 7, this should clear it up. If it just sits

there, hit 'ENTER' and wait a few seconds, then hit 'ENTER' again. Then it will

say "TERMINAL=" and you type in your terminal emulation. If you don't know what

it is, just hit 'ENTER'. Then it will give you a prompt that looks like "@".

From there, you type "c" and then the NUA (Network User Address) that you want

to connect to. After you connect to the NUA, th first thing you need to do is

find out what type of system you are on (i.e. UNIX, VAX/VMS, PRIME, etc.). There

are other things you can do on Telnet besides connecting to an NUA. Some of these

commands and functions are listed here. You can only connect to computers which

accept reverse charging. Telnet is probably the safest place to start hacking

because of the large numbers of calls that they get. Make sure you call during

business hours (late morning or early afternoon), so there are many other people

on-line.

commands

Beginners probably won't use these commands, but I put them here for refrence anyway.

COMMAND FUNCTION

c Connect to a host

stat Shows network post

full Network echo

half Terminal echo

telemail Mail (need ID and password)

mail Mail (need ID and password)

set Select PAD parameters

cont Continue

d Disconnect

hangup Hangs up

access Telnet account (need ID and password)

A4. Hacker's Equipment

Well, to start off to hacking, you're going to need some equipment and

the items listed will probably be the best you can get.

-Good scanner (I recommend ToneLoc and Autoscan)

-Computer (duh!)

-Modem

-A terminal program (like hyper terminal)

-An unzipping utility (like PKZIP or Winzip. Because almost everything you

download off a BBS or site will be in zipped format)

A5. Hacking the Milnet

Milnet is a system used by the Air Force and the Pentagon for communication

use. Milnet is run out of the University of Southern California.

LOGON INFO

The Milnet number is 1-800-368-2217. The ISI MASTER DIAL UP is 213-306-1366.

This is a more tricky logon procedure but if you have balls, you're using a

trunk box , or you are just S-T-U-P-I-D.

ISIE MASTER LOGON PROCEDURE:

<LI>call 213-306-1366

<LI>when the phone stops ringing, you are connected

<LI>enter location number (9 digits) + 1 or 0

<LI>hang up and it will call you

<LI>pick up the phone and hit the '*' on your phone

<LI>hit a carriage return on the computer

<LI>at the 'what class?' prompt, hit RETURN!!!

<LI>then a 'go' prompt will appear and log on as you would the 800 number.

MILNET LOGIN PROCEDURE:

If you're having trouble connecting, try 300 bauds instead of 1200.

It's a pain in the ass, but sometimes the connection will fuck up if you don't.

When the first connection as been made, you will see:

'WELCOME TO DDN. FOR OFFICIAL USE ONLY. TAC LOGIN

CALL NIC 1-800-235-3155 FOR HELP

WRPAT TAC 113 #:36

(you type)@o 1.103YOU ALWAYS TYPE @o then other connections are:

<UL>

<LI>ISIA - 3/103

<LI>ISIB - 10:3/52

<LI>ISID - 10:0/27

<LI>ISIE - 1/103 (THE EXAMPLE)

<LI>ISIF - 2/103

<LI>VAX A - 10:2/27

Next, you see a 'USER-ID'prompt. The first 4 characters vary, but it is

always followed by a '-' and whatever connection you choose.

User-Id: (example) CER5-ISIE or MRW1-ISIE

The first three letters are the intials of the user followed by a

random number (1-9).

Access Code: (example) 2285UNG6A or 22L8KK5CH

An access code will never contain a ( 1, 0, G, Z).

@ USERNAME + PASSWORD i.e. USERNAME SAC.305AREFW-LGTO

THE USERNAME EXPLANATION:

The first three letters will be SAC. This stands for Strategic Air Command.

Following that is a '.' Then the squadron number and the prime mission .

In this case '305AREFW' (305TH AIR REFULING WING). Then a '-' and the

Individual Squadron name 'LGTO' (LOGSITICS GROUND TRANSPORTATION OPERATIONS),

a fancy name for the motor pool.

The password will not be echoed back and should be entered after the

username/ The new user password as a default is: NEW-UZER-ACNT.

THINGS TO DO:

PROGRAMS AVAILABLE TO SAC USERS and what they are for copied directly

from the help manual:

ADUTY aids in management of additional duty assignments.

(international help - use the ? and <ESC> keys, HELP)

ARCHIVE requests files to be stored on tape for later retrievel.

(type HELP ARCHIVE <RET> at TOPS-20)

CHAT provides near real time communication between terminal users

on the sma host computer. (use ? with CHAT)

DAILY executive appointment scheduling program

DCOPY handles output on DIABLO and XEROX printers

EMACS powerful full-screen text editor

FOLLOW suspense follow up program

FTP provide file transfer capabilities bewteen host computers

FKEYS allows user to define function key (real spiffaruni)

HELP the command used by stupid generals or hackers that have

never used Milnet before

HERMES e-mail

NCPCALC spreadsheet program

PHOTO saves transcripts of seesions

REMIND sends user-created reminders

RIPSORT a sophisticated data sorting program

(dexcribed in SAC's User Manual [sorry])

SCRIBE a powerful text formatter for preparing documents

(ISI's manual, SCRIBE manual - soon on MILNET V.2)

SPELL text file spelling checker

(HELP at TOPS-20 and <DOCUMENTS> diretory international help -?)

SUSCON allows the creating, sending, and clearing of suspense's

(international help - ? and <ESC>, HELP command)

TACOPY used for printing hard copies of files

(international help - ?)

TALK pretty much the same as chat

TIPCOPY predecessor of TACOPY

TEACH-EMACS (SELF EXPLANATORY: GIVES LIST OF COMMANDS)

TN Tel-Net provides multi-host access on MILNET

(HELP at TOPS-20 and <DOCUMENTATION> directory,

international help - use ? and <ESC>)

XED line oriented text editor

(HELP at TOPS-20 and <DOCUMENTATION> directory)

LOGGING OFF

TYPE: @L (pretty tough huh?)

The Milnet ID card if you should be trashing somewhere and find a card

that looks like this, then save it (it will be blue and white)

__________________________________________

/ \

HOST USC-ISIE 26.1.0.103

HOST ADMINISTRATOR GORDON, VICKI L.

--------------------------------------------

DDN CARD HOLDER:

REID, CALVIN E, 1st LT.

CARD 118445

--------------------------------------------

USER ID:CER5-ISIE

ACCESS CODE:2285UNG6A

USERNAME: SAC.305AREFW-LGTO

PASSWORD: NEW-UZER-ACNT

\__________________________________________/

It's also a wallet sized, so you may wish to mug someone who you know

is in the air force (just kidding).

A6. Hacking AT&T Answering Machines

1. Dial telephone and wait for AT&T Answering Machine to answer.

2. Quickly Enter the following string.

1234567898765432135792468642973147 (btw: this is the shortest

4193366994488552277539596372582838 string for entering every

491817161511026203040506070809001 possible 2-digit combo.)

3. You'll know you hit the code because the messages will start playing.

4. Heres a list of TouchTone(c) Commands

 

Listen to messages: 7

Listen to new messages: 6

Stop: #

Rewind Tape: 2

Advance Tape: 5

Clear Messages: 3,3

Record memo: *

Record Announcement: 4,*

Play Announcement: 4,1

Turn System On: 0

Turn System Off: 8,8

A7. Hacking Compuserve Online

Compuserve is a multiuser networked Pay by Hour service. But this can

be beat. At current rates, CIS (Compuserve) charges $6.50 for 300 baud

and $12.75 for 1200/2400 baud, 9600 can only be accessed by Hardwired

clients. Thus you see the need for this file. At the time this was

written, all information in this file was correct. Enough of this,

on to the file.

Logging on to Compuserve

In order to create a Ziff Account on CompuServe you need ...

1) A Telenet, Tymnet, Or CIS Port

2) A Credit Card

3) Above the IQ of a houseplant

That is all you need, I know for some of you the 3rd one is tough, but

try. Ok, you have all this, call your local port, logon to CIS, then

you should get a [User ID:] Prompt, type [177000,5000], this is the

Ziff PCMagnet User Id. Now, if you entered it correctly, then you

should get the [Password:] Prompt, at This type [Pc*Magnet]. You will

next be givena Welcome Message, then, you will get yet another Prompt.

It should ask you for your Agreement Number, type [Z10D8810]. That is

the end of the prompts. Here's where the IQ of above a houseplant comes

into play. You now have to think. It will ask you various questions,

ranging from your country to your Social Security number. Answer them

however you want, but I wouldn't use your real info. If you want the

second password (Needed to access some things), you will have to give

an address where you can drop by and pick it up. Some ideas are sending

to your neighbors,but use your last name, it will end up at your house. That

isn't the safest thing. Or you can rent a Post Office box for about 6

months. Once you have done all this, and answer the questions, and read

the propoganda, you will see [Entering PCMagnet]. You are done.

So what do I do Now?

Ok, if you get this far, you have the IQ of above your fern. You can

go one of two places, CIS or PCMagnet (Where you are now). You can stay

in PCMagnet, but there isn't much there. So, I would type [Go Cis] This

will bring you to Compuserve. Once on CIS, you can do many thing, ranging

from downloading files, to real time chat on forums to online games.

Project Numbers

Some times I will refer to the word Project Number, that is the same

thing as a User ID. Excluding the digits after the comma. If you see an

ID that is [72311,27] then the that User ID's Project Number is[72311]. Simple Eh?

[70000,xxx] - Security Personel or Important Employes

[70003,xxx] - Complementary Account

[70004,xxx] - CompuServe Employe

[70005,xxx] - Radio Shack *Demo* Account. (R Flagged)

[70006,xxx] - Normal Compuserve Employe (Sometimes Wizards)

[70007,xxx] - Complementary Account

[70000,753] - Dan'l, Ghost, or Dan Piskur

[70006,522] - LooLoo, Myrtl, or Patrica Phelps

The [70000] Projects are very interesting accounts, they have very

high powered Flags. (Incedently, a Flag is an option set on the user

account) These accounts have the capability to 'Hang you up' from the

system. These are the only such account that can do so. But as you

will see, they can make things very difficult without hanging you up.

A non [70000] project can get you 'Hung up', they have to call Customer

Service and tell them to Initilize your Port. Thus hanging you up. But

only the [70000] project can suspend your account. The main person to

look out for is [70000,753 - Dan Piskur] he is the Head of Security.

His job is to find you and suspend your account. He does not hesitate

to do this.

The [70006] is also another intersting Project. These accounts are

USUALLY 'Wizards' (A Wizard is a user with very high access Flags)

That does not mean all [70006,xxx] are Wizards, but most are. So

if you see the ID [70006,522] that is a very high accessed Wizard,

she usually uses the name [*LooLoo*] she has Sysop Flags on all forums,

where most Sysops only have it on their specific forum. She also has the

job of finding you , but she must report to Dan'l to get you suspended.

But don't take her for granted, she has the C Flag, she can stop you from

talking, you can function normally,but you can not talk in whatever

Confrence Area she has /gag'ed you on. (/gag is the Command to stop you

from talking) She then reports the User ID to Dan'l. He suspends you.

Case Closed.

Invisable Sysops

Sysops with the C Flag can make them selves invisable while in Confrence.

But this has one bug in it. If you do a [/ust] while in Confrence, the

Inviso sysop will not appear, but if you exit [/ex] and do a [ust] at the

! Prompt, they will appear. Another way is to count the members it say are

in CO at the Forum Top menu [4. Confrencing (9 Participating)] and you go

into CO, and do a ust, count the people, in all channels and Tlk, if there

is an Inviso, there will be one less person when you count the Ust.Maybe

more if there are more Inviso's.

Glossary

Flags : Specific Options on your account.

-C Flag : Specific Account Option - Gives the use of the

/wi commands at CO. (Syntax [/wi ?])

Free Flag : Specific Account Option - Makes time in a

specific forum free. (Ususally 70003 and 70007)

-L Flag : Specific Account Option - Locks a your account

out of a forum.

-R Flag : Specific Account Option - Read Only, means that

the account can not write to the system, read

and download only. (See also Radio Shack Demo)

Gag'ed : An account flag, if you have this flag, you can

not speak while you are in CO or CB. You can not

be seen in the User Listing, except by yourself.

A quick test for this flags is Paging yourself.

If you are gag'ed, there are three ways of

getting rid of this flag, but you have no control over

them

- 1 - Have the Sysop who gag'ed you ungag you.

Only the sysop who gag'ed you can Ungag you!

- 2 - Wait till 5am, when the system resets and

it will clear the flag. (Useful only on CB)

- 3 - The best. When everyone leaves the CO you

were in, your flag will automaticly clear.

[Note. When you are gag'ed, you are only gag'ed in

that specific Forum/Co]

Inviso : When a Sysop is Invisable to all others, but other

sysops. (See also Invisable Sysops)

Project No: The Prefix of the User ID is sometimes called a

Project Number.

Wizard : An Account with capabilites of incredible capacity.

[Usually 70000 or 70006] (Not always)

A8. CNA: Numbers Listing

The word CN/A stands for Customer's Name and Address ... Your

telephone company has set up little bureaus that will answer the

telephone all day and give numbers out to any authorized Bell

employees of the same city or any other city nationwide. The

bureau keeps everyone on file with their name and address,

INCLUDING those that are unlisted. So if you have a phone number

and you want to find out who owns it and where they live, you can

use this little handy system. In short, it is basically used to

get a persons real name and real address through just having a

phone number!

Lets say you are constantly being bugged by some little dick and

you don't know his name or address, BUT you have his phone

number.. well you can get his Name & Address just by having his

telephone number! For example, lets say you have this dicks phone

number, and it's (212) 555-1873, then just do the following:

Look up the CN/A Number for that NPA (NPA = AREA CODE) in the

list below. For this example, the NPA is 212 and the CN/A number

is 518-471-8111. So then call up the CN/A # (During regular

hours) and throw a line like, "Hello, This is Operator #321 from

the residential service center in California. And I need to get a

CN/A on a customer at 212-555-1873. Thank You."... Make sure not

too sound like a twelve year old dork or try and sound lame with

a really deep voice, just try to sound as real as possible. Okay,

if you got that far, and you sound pretty convincing, then the

CN/A operator should not in any means, ask questions and you

should get all the info you need!

 

Here is a list of just about EVERY CN/A Number in the Continental

United States, this list was supplied to Legions of Lucifer by

LawBreaker.

ALL 518-571-8111 IS manual. its NY telephone.

Area | Account | Telephone | Call | Time | Requests |

Code | Code | Number | Hours | Zone | per call |

-----+---------+---------------+-----------+------+----------+-----------------

201 | | (304)344-7935 | 8:00-4:10 | E | 3 | manual

202 | | (304)343-7016 | 8:30-4:10 | E | 3 |

203 | | (203)789-6815 | 8:10-4:45 | E | 7 | manual

204 | | (204)949-0900 | 8:30-4:45 | C | N/A |

205 | | (205)555-1212 | 24 hours | C | 2 |

206 | I47128 | (402)572-5858 | 24 hours | C | 2 |

207 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |

208 | I47127 | (402)572-5858 | 24 hours | C | 2 | manual

209 | 1659 or | (415)781-5271 | 7:00-5:00 | P | 5 |

209 | 2826 | | | | N/A |

212 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |

213 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |

214 | SW5167 | (817)461-4769 | 8:00-4:50 | C | 3 |

215 | | (412)633-5600 | 8:30-5:00 | E | 3 |

216 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |

217 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 |

218 | I47126 | (402)572-5858 | 24 hours | All | 2 |

219 | 161 | (317)265-4834 | 7:30-4:45 | E | 3 |

301 | | (304)343-7016 | 8:00-4:10 | E | 3 |

302 | | (412)633-5600 | 8:30-5:00 | E | 3 |

303 | I47126 | (402)572-5858 | 8:00-5:00 | M | 3 |

304 | I47127 | (304)343-1401 | 8:00-4:10 | E | 3 |

305 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |

306 | | (306)777-2878 | 8:00-12:003 M | N/A |

307 | I47127 | (402)572-5858 | 24 hours | C | 2 |

308 | I47126 | (402)572-5858 | 24 hours | C | 2 |

309 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 | automatic

312 | 500 | (312)796-9600 | 24 hours | C | 2 |

313 | 53423 or| (313)424-0900 | 24 hours | E | 20 |

313 | 61728 | | | | N/A |

314 | SW1012 | (816)275-8460 | 8:30-4:30 | C | 3 |

315 | 111 | (518)471-8111 | 8:00-4:55 | E | 16 |

316 | SW2019 | (913)276-6708 | 8:00-4:45 | C | 3 |

317 | 161 | (317)265-4834 | 7:30-4:45 | E | 3 |

318 | | (318)555-1212 | 24 hours | C | 2 |

319 | I47126 | (402)572-5858 | 24 hours | C | 2 |

401 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |

402 | I47126 | (402)572-5858 | 24 hours | C | 2 |

403 | | (403)493-6383 | 8:00-4:30 | M | N/A |

404 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |

405 | SW4070 | (405)236-6121 | 7:30-4:15 | C | 3 |

406 | I47127 | (402)572-5858 | 24 hours | C | 2 |

407 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 | manual

408 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |

409 | SW5167 | (713)961-2397 | 8:00-5:00 | C | 3 |

412 | | (412)633-5600 | 8:30-5:00 | E | 3 |

413 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |

414 | 767 | (608)252-6932 | 8:00-4:30 | C | 1-5 |

415 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |

416 | | (416)443-0542 | 8:30-5:00 | E | N/A |

417 | SW1012 | (816)275-8460 | 8:30-4:30 | C | 3 |

418 | | (514)391-7440 | 8:30-4:45 | | N/A |

419 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |

501 | SW3006 | (405)236-6121 | 7:30-4:30 | C | 3 |

502 | | (502)555-1212 | 24 hours | E | 2 |

503 | I47128 | (402)572-5858 | 24 hours | C | 2 |

504 | | (504)555-1212 | 24 hours | C | 2 |

505 | I47127 | (402)572-5858 | 24 hours | C | 2 |

506 | | (506)694-6541 | 8:15-4:30 | A | N/A |

507 | I47126 | (402)572-5858 | 24 hours | C | 2 |

508 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |

509 | I47128 | (402)572-5858 | 24 hours | C | 2 |

512 | SW5167 | (512)828-2501 | 9:00-5:00 | C | 3 | manual

513 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |

514 | | (514)391-7440 | 8:00-4:30 | E | N/A |

515 | I47126 | (402)572-5858 | 24 hours | C | 2 |

516 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |

517 |53423 or | (313)424-0900 | 24 hours | E | 20 |

517 | 61728 | | | | N/A |

518 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |

519 | | (416)443-0542 | 8:30-5:00 | E | N/A |

601 | | (601)555-1212 | 24 hours | C | 2 |

602 | I47127 | (402)572-5858 | 24 hours | M | 2 |

603 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |

604 | | Contact Local | | | N/A |

604 | |Business Office| | | N/A |

605 | I47126 | (402)572-5858 | 24 hours | C | 2 |

606 | | (606)555-1212 | 24 hours | E | 2 |

607 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |

608 | 767 | (608)252-6932 | 8:30-4:30 | C | 5 |

609 | | (304)344-7935 | 8:00-4:10 | E | 3 |

612 | I47126 | (402)572-5858 | 24 hours | C | 2 |

613 | | (416)443-0542 | 8:30-5:00 | E | N/A |

614 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |

615 | 13402 | (615)373-7663 | 8:00-4:10 | E | 3 |

616 |53423 or | (313)424-0900 | 24 hours | E | 20 |

616 | 61728 | | | | N/A |

617 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |

618 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 |

619 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |

701 | I47126 | (402)572-5858 | 24 hours | C | 2 |

702 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |

703 | | (304)343-1401 | 8:00-4:10 | E | 3 |

704 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |

705 | | (416)443-0542 | 8:30-5:00 | E | N/A |

707 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 | automatic

708 | 500 | (312)796-9600 | 24 hours | C | 2 |

709 | | *NONE* | | | N/A |

712 | I47126 | (402)572-5858 | 24 hours | C | 2 |

713 | SW5167 | (713)961-2397 | 8:00-5:00 | C | 2 |

714 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 | not automated

715 | 767 | (608)252-6932 | 8:00-4:30 | C | 5 |

716 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |

717# | | (412)633-5600 | 8:30-5:00 | E | 3 |

717@ |6630109ATZ (717)245-6829 | | | N/A |

718 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |

719 | I47127 | (402)572-5858 | 8:00-5:00 | M | 5 |

801 | I47127 | (402)572-5858 | 24 hours | C | 2 |

802 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |

803 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |

804 | | (304)343-1401 | 8:00-4:10 | E | 3 |

805 |1659/2826| (415)781-5271 | 8:30-5:00 | P | 5 |

806 | SW5167 | (512)828-2501 | 8:00-5:00 | C | 3 |

807 | | (416)443-0542 | 8:30-5:00 | E | N/A |

808 | | (800)852-8840 | 8:00-6:00 | E | N/A |

809 | | (800)852-8840 | 8:30-5:00 | E | N/A |

812 | 161 | (317)265-4834 | 8:30-4:45 | E | 3 |

813 | 13402 | (803)251-0046 | 8:30-4:30 | E | N/A |

813 |GTE only | (813)442-7229 | 8:00-5:00 | E | N/A |

814 | | (412)633-5600 | 8:30-5:00 | E | 3 |

815 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 |

816 | SW1012 | (816)275-8460 | 8:00-4:45 | C | 3 |

817 | SW5167 | (817)461-4769 | 8:00-5:00 | C | 3 |

818 |1659/2826| (415)781-5271 | 6:45-5:00 | P | 5 |

819 | | (514)391-7440 | 8:00-4:30 | E | N/A |

901 | 13402 | (615)373-7663 | 8:00-4:10 | E | 3 |

902 | | (902)421-4110 | 8:15-4:45 | A | N/A |

904 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |

906 | 61728 | (313)424-0900 | 24 hours | E | 20 |

907 | | *NONE* | | | N/A |

912 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |

913 | SW2019 | (913)276-6708 | 8:00-4:45 | C | 3 |

914 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |

915 | SW5167 | (512)828-2501 | 8:00-5:00 | P | 5 | manual

916 |1659/2826| (415)781-5271 | 8:30-5:00 | P | 5 |

918 | SW4070 | (405)236-6121 | 7:30-4:10 | C | 3 |

919 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-5 |

-----+---------+---------------+-----------+------+----------+-----------------

# - Bell of PA

@ - United

Time Zones: P - Pacific 12:00 pm

M - Mountain 1:00 pm

C - Central 2:00 pm

E - Eastern 3:00 pm

A - Atlantic 4:00 pm

Note: The account code for Centel and CONTEL is CNAT, United

Tel. is 6630109ATZ

Well, that's about it. I tried to find any mistakes that

might have occurred during typing, but there's bound to be one or

two around... Two things to note here:

1> California has 2 codes listed (1659 and 2826). The first is

for people in California, the second is for everyone else outside

of California obtaining a CNA in those area codes.

2> Michigan ALSO has two codes. The first was the one currently

working when I last tried; the second is what the new code will

be if it hasn't been changed already... It's a totally automated

system, so try both codes.

A9. Computer Underground

Underground Divisions

The Compouter Underground is divided into 5 main branches & 1 minor branch.

The branches are (in no particular order):

1) Phreaks-May also be referred as "phreakers". These people deal

with the telephone grid. They want to learn all they can about it,

they want to control it, which leads to making phone calls for

free (which is illegal). Groups of Phreakers will band together

often and form an organized group and publish articles on the

subject.

2) Hackers-The people who love computer systems & love how to get

into them and control them, etc. A TRUE hacker is not the fuckers

that the Media & Hollywood would have you to believe. There is

nothing wrong with logging onto someone's computer, as long as you

don't delete files or steal trade secrets.

3) Carders-These people are admittedly criminals. They use credit

card numbers, checks, checking account numbers, whatever to obtain

what they want for free. However, this isn't as bad as the Media

makes you think. You are not liable for charges made on your CC

account that you didn't authorize, so the bank has to eat it, and

that's why they have insurance.

4) Anarchists-An Anarchist is one who loves to play with fire,

explosives, etc. This is not all bad either...who cares if you

make an explosion out in the desert to see what would happen?

Although my nickname has "Anarchist" in it, it doesn't mean I just

play with explosives, the "Anarchist" in my nick means I like to

cause havoc, hack, phreak, card, all that shit where ever I go,

and the "American" means by doing by freedom.

5) Warez-They distribute software. They are pirates. Most warez

are distributed by warez groups which exist for the purpose of

getting software out to BBSs before the other group gets that same

program out first.

6) Virus/Trojan Dudes-These people are usually programmers (although

not always) are interested in how viruses and trojan horses work &

how to make them more efficient. For those who don't know, a virus

replicates itself and waits around before doing anything harmful.

The program simply formats your hard drive upon execution is not a

virus, it is a trojan horse. This is the "minor" branch I spoke of

earlier.

Terminology

A. General Underground Terminology

Data: This is the handle of someone who used to be a modemer. He

is now a worm feast (corpse). he has basically pissed off way too

many people by being a lame asshole dick, and got KILLED. His real

name is Stuart Tay, I'm sure you've heard of him. This term is

really great, and has so many uses..."He's a Data"..."He pulled a

Data."

Lamer: This is someone who claims to be knowledgable/active in

some area of the underground, but in fact knows/does nothing. An

example would be a 2400bps user claiming to be a great warez

courier.

Leech: This is someone whoo calls BBSs and just downloads

everything in sight whithout contributing anything (or uploading

garbage just to get credits).

B. Hacking/Phreaking Terminology (not in any order)

Rebecca Bigley/Bitchley: The former chief of security at

TheftyTel, a California private LD service provider. A famed

HackerHunter bitch from hell.

Extender: This is an important phreaking term. It refers to the

number you call when accessing a Long Distance Carrier's service.

An example is 950-1493, which is ThriftyTel's Extender.

ANI: Stands for Automatic Number Identification. If you call a

telephone number that has ANI, your number (and sometimes address)

shows up on a console at their location (or is logged to a printer,

disk file, etc). This is bad, since most private long

distance carriers use it to see who is calling their extenders.

ESS: Electronic Switching System. It is the system most Bell

Organizations use to switch calls. It is what makes horrors like

ANI possible.

Gestapo: This is used to refer to any security/law enforecement

agency. Its meaning should be obvious...

SS: Secret Service. Any similarities between "SS" being used to

refer to Secret Service and the "SS" of Nazi Germany during WWII

is by no means co-incidental.

CNA: Customer/Name Address. Basically, if you have the CNA dialup

for an area code, and someone's phone number is in that area,

code, you can call the CNA dialup and give their phone number,

name and address. This is not as easy as it sounds since some CNA

dialups require talking to the operator, which may be suspicious

of you, plus you need the code. Some CNAs are automated where you

call and enter the number on a phone keypad, then the code. Some

you call with your modem.

COSMOS: The phone company's operating system.

NPA: Numeral Prefix Allocation. An area code in layman's terms.

Code Hacker: A program which repeatedly dials an extender, trying

different codes, and logging on which ones are valid. This is the

main method which most phreaks use to get their phone calls.

Telnet: This is a large network of computers. You call a Telenet

dialup, then if you know a machine's NUA (its address), you type

it in, and connect. This is good because there are Telenet dialups

local to everywhere, and then you can connect to computers on

the network no matter where they are. Other networks like Telenet

include Tymnet and the Internet (the largest network on earth, a

network of networks).

C. Carding/Scamming Terminology

CBI: Credit Bureau Information. It is used to refer to: [1] the

information given by a credit reporting agency [2] the concept

itself [3] a code used to access such a service [4] it is also

used by one such reporting agency (namely Equifax) to refer to

itself. Basically, if you have a CBI access code (normally just

called "a CBI"), you can call a CBI dialup, enter the code,

someone's name and address (or their Social Security Number), and

you will get all credit info on them, including account numbers.

This is quite useful as I'm sure you can see.

Drop Site: This is where the carder would have the carded

merchandise sent to, since only a Data would send the shit to his

own house.

D. Warez Terminology

Cracker: This is the person who breaks the copy protection on a

piece of software. This usually involves using hex editors, etc.,

and it is quite difficult.

Courier: This person whose sole job is to upload the cracked warez

to as many BBSs as possible so as to distribute the softwarea as

widely as possible.

Techniques

I. Phreaking Techniques

Start by getting yourself a code hacking program (my favorite is P-Hack,

another popular one is Code Thief) from a p/h BBS. Set it up for the extender

you are hacking (try 9501493 if you live in Southern California). You'll need

to know the phone number for the extender, the dialing order, and the number

of digits they use in their codes. You also need a list of modem numbers that

will never be busy, but most code hackers come with a list of Telnet dialups

built right in, so you almost never have to worry about it. See, the way this

works is the program figures out a code to try, calls the extender, enters

the code, then the modem number, and if there's a carrier, the code is valid.

You need to know the dialing order since some LD companies have you dial the

phone number first, then the code. You also need to figure out a template to

hack on, which most programs allow you to enter as a series of digits with X's

in it. Any digits will be used verbatim, and an X means "any digit". For example,

if your template was 1X1XXX, the code hacker will randomly generate codes with a

"1" as the first and third digits. Also, most hackers will allow you to enter an

amount of time to delay between hack attempts, and it is very important to use

this feature if the hacker you are using supports it because some hacker busting

procedures use the number of times a number is called within a certain period to

decide if something is shady. I always use 1 minute and 30 seconds as my delay,

and I've never been caught. It is also a good idea to be hacking several extenders

at once if your hacker supports it. Let the thing fly, go to bed, and when you

wake up, the Code Fairy should have left you a nice little present (or several!).

NOTE: I did not go through the details of setting the hacker up to work with your

modem, since I assume you can handle such a task.

Ok, so now you've hacked some

codes, and you're ready to use them. Well, go to a pay phone, dial the extender,

wait for a tone, enter the code (this assumes code-first dialing, of course),

wait for another tone, then enter the area code and phone number you are calling,

and you have just made a call FOR FREE! NOTE: You must ALWAYS use the area code,

even if it's the one you're in. You can also use this to call out-of-state BBSs

for free, and it's especially easy with Telix... You just make the phone number

in your dialing directory "!,,,@,,7146469180" (for example, substitute the number

of the BBS you want to call), and then set up the long distance codes in Telix...set

"!" to the extender, and "@" to the code, and you're set.

Wow! Now you've been using codes for awhile, saving all kind of cash on fone calls,

but, "Is this all?" you ask...well, NO!, it's not.

II. Hacking Techniques

Now we move onto hacking: obtaining illegal access to someone else's computer system.

In the past, any beginner's hacking file would tell you to start with Telnet,

since Telnet used to be full of really low-security systems that any five year

old could hack into. Now, most of the systems on Telenet are so secure (since

every hacker in the world already hacked them), that you probably couldn't hack

into them with an axe. So, if you want to fuck with Telnet (and it's fine if you

do, I still do now-and-then as well), get Dr. Dissector's NUA Attacker (an NUA is

basically the node number of a machine on Telnet), read the docs, and go for it.

The way I'm going to tell you to start hacking should be much easier as well as safer.

It's called Carrier Scanning. What you do is get a Carrier Scanning program

(there are MANY...), and tell it what NPA and Exchange (area code and prefix,

for laymen) you want to scan, and go to sleep. What it will do is call every

number in the exchange, and log which ones answered with a carrier. Then, you

just check the log, and see which ones look cool. A good way to find a good

exchange to scan is to find one that's in a Big Business district, or one where

a large University is. All Universities have big computer systems, and most have

modems.

So now you have a list of carriers in some exchange, and you want to hack.

You'll need to know a bit about operating systems, since once you get in, if

you don't know the OS the machine it running, you can't do much of anything.

III. Carding/Scamming Techniques

Carding (a term a lot of people will use to describe not only actual carding,

but also checking, PO fraud, etc, etc), is the one Underground activity that

can really save you a lot of money, but can also get you thrown in prison really

fast, so, when I mention a safety technique, be sure to follow it, since I haven't

been caught and have been really careful every step of the way.

To get started in your scamming career, I'm going to recommend you pull a

very simple scam that may seem piddly-ass at first, but will help you

discover one thing: whether you can handle being a carder/scammer/whatever

you wanna call it. The scam is very simple: You get a Columbia House (or BMG)

ad from a magazine, order as many CD's as they'll send you without sending

money first, and then never pay. I have over 300 CD's in my collection, and

the only ones I paid for (only about 20) were ones they didn't have. The key

here is to use a BOGUS name, not your own. Sending it to your own house is

fine (the first time anyway, not after), but NEVER use your own name. This

will save your ass. "Must be a practical joke", you'll tell them. After the

first time you do it, if you're going to do it again, use a different address

(but one where you can pick them up at), and a different name.

Well, now you've stole 3,000 CD's from Columbia House, and you haven't

killed yourself from the guilt, what's next? Well, I'm going to describe

Traditional Carding because it was actually the first scam I ever did. I

don't do it anymore, because it's hard to find a good vendor who'll take

cards without a DNA sample or some bullshit, plus it's real dangerous now

that everyone's caught on, but several people here in my area claim to be

still doing it with great success. Traditional Carding used to be the stock

way everyone got their HST's when they first came out and were over $1200,

but now, anyone who sells computer stuff knows that COMPUTER MERCHANDISE+A

CREDIT SALE = FRAUD so they want all kind of info before they'll send anything.

This is ridiculous since if they knew anything, they'd know that the approval

code means they'll get paid regardless if it's fraud or not. The credit company

may try to screw them but the law says APPROVAL=THEY GET PAID. They just have to

fight a bit to get the money. ANYWAY, just because you can't get computer stuff

doesn't mean you can't get all kind of other stuff, sell it, and buy that 3gig hard

drive you've cumming over.

Ok, so here goes... You'll need several things for Traditional Carding:

[a] A Drop Site, [b] A CC account - WITH FULL INFO, and [c] a vendor who

will not require a DNA sample, blood, or some other bullshit before they'll

send the merchandise.

[a] The Drop Site-First off, don't ever send carded stuff to your house.

Only a Data would do that. If you send it to your house, you will get caught,

you will go to jail, and you will get buttfucked. You need a drop site. A drop

site is usually a house where the people that live there are out of town, or

maybe even a vacant place. If you use a vacant place, make sure it isn't obvious

(usually, a "For Sale" sign makes it real obvious), because UPS and FedEx people

aren't as dumb as you think. Write down the address and zip code of the place,

then say it over and over a million times in your head, so it becomes familiar

to you and you can rattle it off like you've lived there forever.

[b] The CC Account-This is very important, since it's very hard to card without

a CC account. There are many ways to get them. One is by looking in someone's

mail, and taking their statements, another is by forwarding their mail, or

trashing (looking in trash for statements, etc), or if you work retail, it's

REAL easy... Once you have the CC number, you're not home yet, you need the

person's name, and BILLING ADDRESS. They won't always ask, but have it just in

case. Also, there is a very common misconception about expiration dates.

THEY DON'T MEAN ANYTHING, AND ANYONE WHO TELLS YOU THEY DO IS AN BLITHERING

IDIOT. You just have to make one up that's 2 or 4 months ahead of what the

current day is. Like if it's July 4, 1993, just say "June 1994", and you'll

be fine.

[c] The Vendor-You're on your own here, since I don't do this anymore.

The way I used to do it is by getting magazines catering to the type of

stuff I'm buying (Computer Shopper for computer shit, Guitar for musical

stuff, you get the idea), then finding a small, non-color ad and using that vendor.

Anyway, now that you have everything together, you need to actually card

the shit. Again, I can't stress this enough, practice the whole thing in

your head so that is sounds natural, and you feel comfortable with it,

because, believe me, they'll spot you if you don't. So, once you've got it,

go to A PAY PHONE (safety tip), call them and order. Give them the drop site

address and the cardholder's name. If they ask "is that the address on the

card?", say no, and then give them a bogus story about the fact that this a

birthday present for a relative in another city, make it up, you get the idea.

And if they say "this is fraud... we *know* who you are! you're dead!"

(or something) hang up, and bail, then start over at step A, and DON'T TRY

TO USE THAT CARD AGAIN, BECAUSE IT *WILL* BE FLAGGED AS "FRAUD ATTEMPTED"!!!

If they ask for a number to call you back at, DO NOT GIVE THEM THE PAY PHONE

NUMBER, try to talk them out of it. Tell them you're at an airport on a

business trip and just remembered to send the gift, etc, just MAKE SURE

IT MATCHES YOUR

OTHER STORY, OR YOU'RE DEAD. If that's doesn't work, give them a

bogus number and forget it. Try again, with a DIFFERENT CARD. If all

goes well, you will have just carded something. Congratulations!

(NOTE: My first card run was when the TI TravelMate 2000 Notebook Computer

first came out, and with 2 megs of RAM, and a 2400bps modem with sendfax,

it cost $3500. I got two of them on the first try, but that was the good

old days...)

A WORD ABOUT CBI: CBI (see terminology section) used to be a good way

to get card numbers: you looked in the phone book for some guy's name

and address, CBI'ed the poor fool, then used his cards. I used to run

like 30 CBIs every day just for the fun of it, until Equifax called me.

I don't use CBI anymore and unless you have a portable computer you can

use clipped onto a phone line somewhere, I don't think you should do it

either.

I mentioned in the Traditional Carding section that carding used to be the

stock way everyone got their high-speed modems. A new way has come out

recently that works quite well... It's called PO Fraud (PO stands for Purchase

Order, it's how most companies buy things). What you do is go to a stationery

store, buy some PO forms, then get a bogus company logo, name, and address,

and photocopy it onto a PO form. Then you call US Robotics, talk to a sales

weasel, and say you're from whatever company and that you need two power

supplies for a Dual Standard. They'll ask how you want to pay, say Purchase

Order. They'll ask you to send the PO. You'll get all the cost info, etc,

TYPE that onto the PO then send it. They'll send you two power supplies, with

an invoice for $21 (the supplies cost $10.50 each) or more, depending on

shipping, etc. PAY THE INVOICE. THIS IS IMPORTANT. YOU ARE GETTING A USR DUAL

STANDARD FOR $21 - IT'S WORTH IT. Then, like a week or two after you get the

power supplies (just chuck 'em, you don't need them anyway), and have paid the

invoice, call back the same sales fool, and say you need a Dual Standard modem.

They'll send it to you on a PO, send them the PO like before, then when the modem

comes, don't pay the invoice. You just grabbed a Dual Standard for $21.

Another scam I used alot last summer was check fraud. The stuff I'm going to

describe here seems quite wimpish at first, but I'm sure you can adapt it to

your needs. Grab someone's checks. Call a pizza place, say you have to be at

work for an emergency meeting (or whatever) in five minutes, but your kids

need food. Tell them you'll send your son/daughter over with a check. Write

out the check, and go pick up your free pizza.

B. Phreaking

------------

B1. Why do we phreak? Where to start phreaking

Phreaking, like hacking, is used to gather information about telephones,

telephone companies, and how they work. There are other benefits as well.

As stated above, you also get free phone calls. But, these are used mainly

to gather more information about the phones, and to allow us free access to

all information.

Where to start phreaking. Well, you can phreak on any telephone, but as

stated above, it is very stupid to do so on your home phone line. First

you need you need to construct the boxes needed for what you want to do.

All of the boxes and their descriptions are listed in the next section.

Most of the boxes are very easy to make, but if your not into making shit,

there are usually alternative ways of making them.

B2. Phreaking rules

1) Never box over your home phone line.

2) You should never talk about phreaking projects over your home phone

line.

3) Never use your real name when phreaking.

4) Be careful who you tell about your phreaking projects.

5) Never leave phreaking materials out in the open. Keep them in a safe

place.

6) Don't get caught.

B3. Boxes and what they do

Acrylic Box steal 3-way calling and other services

Aqua Box stops F.B.I. lock-in-trace

Beige Box lineman's handset

Black Box when called, the caller pays nothing

Blast Box phone microphone amplifier

Blotto Box shorts out all the phones in your area

Blue Box generates 2600hz tone

Brown Box creates party line from 2 phone lines

Bud Box tap neighbor's phone

Chatreuse Box use electricity from your phone line

Cheese Box turns your phone into a payphone

Chrome Box manipulates traffic by remote control

Clear Box free calls on Fortress Phones

Color Box line activated telephone recorder

Copper Box causes crosstalk

Crimson Box hold button

Dark Box re-route calls

Daylogo Box connect to neightbors phone line

Divertor Box re-route calls

DLOC Box creates party line

Green Box generates coin return, coin collect, & ringback

tones

Gold Box dialout router

Infinity Box remotely activated phone tap

Jack Box touch-tone key pad

Light Box in-use light

Lunch Box AM transmitter

Magenta Box connect remote phone line to another remote

phone line

Mauve Box phone tap without cutting into a line

Neon Box external microphone

Noise Box creates line noise

Olive Box external ringer

Party Box creates party line from 2 phone lines

Pearl Box tone generator

Pink Box creates party line from 2 phone lines

Purple Box hold button

Rainbow Box kill trace

Razz Box tap neighbors phone

Red Box genrates tones for free phone calls

Rock Box add music to phone line

Scarlet Box causes interference to neighbors phone line

Silver Box create DTMF tones for A, B, C, and D

Static Box raises voltage on phone

Switch Box add hold, indicator lights, conferencing, etc.

Tan Box line activated telephone recorder

TV Cable Box see sound waves on TV

Urine Box create disturbance on phone

Violet Box keep a payphone from hanging up

White Box DTMF key pad

Yellow Box add an extension phone

For box schematics, goto these FTP sites:

ftp.netcom.com/pub/br/bradleym

ftp.netcom.com/pub/va/vandal

ftp.winternet.com/users/nitehwk

B4. Red Box ways

I am now going to tell you some ways how to make your own red box.

The first way is the way I made my red box.

-Buy Radio Shack part number 43-146 (around $25)

-Unscrew all the screws

-Desolder the crystal which 3579 on it (it's the original crystal)

-Replace it with a 6.5536 MHz crystal (around $5)

-Replace the cover

-You now have a red box.

Places to order a 6.5536 MHz crystal

Digi-Key

701 Brooks Avenue South

P.O. Box 677

Thief River Falls, MN 56701-0677

(800)344-4539

Part Number:X415-ND

Part Number:X018-ND

JDR Microdevices:

2233 Branham Lane

San Jose, CA 95124

(800)538-5000

Part Number: 6.5536 MHZ

Tandy Express Order Marketing

401 NE 38th Street

Fort Worth, TX 76106

(800)241-8742

Part Number: 10068625

Alltronics

2300 Zanker Road

San Jose CA 95131

(408)943-9774 Voice

(408)943-9776 Fax

(408)943-0622 BBS

Part Number: 92A057

Mouser

(800)346-6873

Part Number: 332-1066

Blue Saguaro

P.O. Box 37061

Tucson, AZ 85740

Part Number: 1458b

Unicorn Electronics

10000 Canoga Ave, Unit c-2

Chatsworth, CA 91311

Phone: 1-800-824-3432

Part Number: CR6.5

Converting a Tone Dialer into a Red Box

-Radio Shack pocket tone dialer model #43-141 ($24.95 each)

-Three AAA batteries

-Soldering Iron

-Small regular and phillips screwdriver

-Wire clippers

-A 6.5536 MHz crystal

Be sure to get Radio Shack's (also known as "Rat Shack") NEWEST type

of tone dialer. The old ones were gold and brown and looked pretty ugly.

The new ones are black and the corners are rounded off a little more.

They also seem to be more water-resistant and it seems to be easier to

fit the new crystal into these models. You can either order the crystal

through Radio Shack or buy it from an electronic's store. Buying it

through Radio Shack is a real bitch because you have to wait two weeks

for them to order it and most employees don't know what you're talking

about when you ask for it. I've had them INSIST that they can't order

that crystal for me because they don't carry it. If you live in the St.

Louis area as I do, I suggest GateWay Electronics on Page Av in Missouri.

They have a knowledgable staff and their crystals are only about three

bucks a piece. (Compared to Radio Shack's $4.99 each!) Place the dialer

on the table keypad side down and speaker side up. Remove the battery

cover and all batteries. Use the phillips screwdriver to remove all four

screws on the back of the dialer. Now slide the flathead screw-driver

along the side to separate the two halves of the dialer. Slide the

speaker half underneath the keypad so you don't break off the wires.

On the left hand side down near the battery compartment, you'll see a

silver cylinder looking component. This is the crystal you want to remove.

Pull it up with your fingers and break away all the glue that's holding

it down. Use your soldering iron and un-solder it from the circuit board.

You can throw this crystal away as it has no real use in life. Now the

hard part. The new crystal you're putting in is twice as big as the old

one so it's kinda hard to get it in there. There's a few capacitors that

you can bend over to make some more room. You'll also have to bend the leads

to your new crystal inward a little. Solder the new crystal in place of

the old one and you're all set. Snap the two casing halves back together

being careful not to pinch any wires. Put the screws back in and insert

your three AAA batteries. A good idea is to wrap the crystal with scotch

tape or electrical tape. This will prevent contact with other components

since the crystal is so big. You could also simply put a piece of paper

under the crystal. One additional thing you can do it totally remove the

LED light. The only thing this light is good for is running down your

batteries really quick. If you use the unit without the light connected,

you NEVER have to turn the unit's power off and the batteries will last

for a few years before you need to replace them.

Programming your Red Box

First you'll have to program your box's memory to make the right tones.

You'll be using the three priority buttons on the top of your unit.

P1 will be your quarter, P2 your dime and P3 will be the nickel. So

here's how to do it:

(1) Switch the unit on. The red light in the corner should come on

unless you've disconnected it.

(2) Slide the DIAL/STORE switch to the STORE mode.

(3) Press MEMORY, *, *, *, *, *, MEMORY, P1. That programs your quarter.

(4) Press MEMORY, *, *, MEMORY, P2. That programs your dime.

(5) Press MEMORY, *, MEMORY, P3. And that's the nickel.

(6) Slide the DIAL/STORE switch back into the DIAL mode and you're ready

to start phreakin'!

Try pushing the priority buttons now. Each one will emit a different

high-pitched chirping noise. This is what the phone hears when you

deposit money into a pay phone. If you've ever red boxed with a tape

recorder or heard the actual pay phone tones before, you'll notice

that these tones are slightly slower than the real ones. Don't worry,

the pay phone can't ever tell the difference and you rarely find an

operator that can.

The Low-Income Red Box (Walkman)

If you can't afford a real red box or you don't have any soldering experience,

you can use a tape recorder as a red box. There are several ways to record the

tones. One way is to go to a pay phone and call your answering machine or voice

mail. After the beep on your machine, deposit about three dollars in quarters

and hang up. Your three bucks should come back. Go home and on your answering

machine will be a tape with the red box tones. Another way is to find two pay

phones that are next to each other. You'll need a portable tape recorder and a

suction cup telephone pick-up. (The phone pick-ups can be purchased at Radio

Shack for about $3.00.) Pick up the first pay phone (Phone A) and call the other

one (Phone B). Put the suction recorder on Phone A and deposit about three dollars

in Phone B. Hang up both phones and hopefully your money will come back.

A third way is to record the tones directly from someone else who owns a

red box. Pretty easy to figure out.

To play the tones back into the phone when you need them, use either a

portable tape recorder or a walkman with some headphones. Hold the speaker

from the recorder (or the headphones) to the mouthpiece of the phone and

press "play" when asked for money. Make sure not to have the volume up too

loud or the distortion will make a real operator come on the line. You can

also use a big bulky tape recorder or a boom box but you'll look a little

silly when you try to play your tones into the pay phone.

Hallmark Cards

Hallmark has these new cards that actually let you record a message for

your loved ones so when grandma opens the card she hears your voice saying,

"Merry Christmas, Grandma Edna!" Then Grandma Edna will drop the card in

horror, thinking that she's gone completely nuts and probably die of a heart

attack.

After you've shoplifted a few of these cards and taken one apart, you'll

see that that electronics inside are pretty small. You can record your

red box tones on this chip and then conceal the whole mess anywhere you

want and you'll have a tiny red box to use.

Voice Memo Minders

These voice reminders can record tones and are extremely small. You can

either buy one that fits in your pocket or you can buy one that fits on

your key chain. In case you're surrounded by telco security, the F.B.I.,

local police and AT&T's top officials while you're at a pay phone, you can

easily press the "MEMO ERASE" button to get rid of the evidence, though the

police might shoot you when they see you go for the erase button.

Finding a phone that will work

Usually any GTE or Bell phone will work, Bell including Southwestern Bell,

U.S.West, Ameritech, Pacific Bell, etc. You'll know it's a Bell or GTE

phone because their logo will be on the phone. I've noticed in some areas

like Pacific Bell and Ameritech the phones are rigged so that no sound can

enter the mouthpiece of the phone until the call is connected, rendering

your redbox useless. A way around this is to dial "0" and have the operator

dial the call for you.

Privately Owned pay phones are those ugly phones with some kind of generic

logo on them that means some old fat local guy owns it and convinces

innocent store owners to install his phone instead of a Bell phone,

promising him bigger profits. Not a hard promise to keep, considering a

local call sometimes costs 75 cents, they sometimes won't let you dial

toll free numbers and long distance rates are twice as high (or more)

than AT&T which is pretty bad. The best thing to do when you find a

Private pay phone is to squirt a lot of ketchup or mustard into the

coin slot and find a Bell/GTE phone somewhere.

Making long distance calls

Okay, here's the fun part- Calling anywhere in the entire world and

not paying a cent for it. Pick up the phone and dial the number you

want to call in the fashion 1-AREA CODE-NUMBER. For example, if you

want to call the White House in Washington D.C., dial 1-202-456-1414.

You'll hear a click, then a computer voice will say, "Please deposit

$2.85." (The exact amount differs with the location and time of day.)

Mutter, "Fuck you, AT&T..." to yourself, switch on your red box, hold

the speaker of the red box FLUSH with the mouthpiece of the pay phone

and press P1 for your quarters. Pause for a split second in between

each quarter because if you go too fast, you'll get a live operator

wanting to know what the problem is. You are able to go 20 cents over

the amount requested and that will be credited to your call.

After you've put in enough "money", the computerized voice will say in a

cheerful, unsuspecting voice, "Thank you for using AT&T!" and your call

is put through. Every few minutes the voice will come back and ask for

more money.

Local Calls

To red box a local call it takes about a minute or two longer than

if you really paid for it, but those quarters add up so it's definately

worth it. Pick up the phone and dial zero. Tell the operator that you

want to make a local call. If she tells you just to put in a quarter

and dial the number, tell her, "Well, ma'am, there's shit all over the

keypad here and all the buttons are stickin' together and I CAN'T dial

it myself. The only key that works is the zero and THAT'S got this sticky

blue shit all over it. Then there's a half-eatin' Twinkee shoved in the

coin return and dirt all over the four and seven keys..." Keep going on

and on until she asks you what number you want to dial. She'll ask you

for a quarter and connect your call.

Make sure after your call connects that you hear the operator click off.

Some operators are nosey and will just SIT there listening to your

conversation. Once I was explaining to a friend how I placed my call

and suddenly the operator starts lecturing me and telling me she's going

to call security on me. (And this was about three minutes into the

conversation!)

In some cities I've noticed you can trick pay phones into thinking

that a local call is actually a long distance call by dialing 10288

before you dial the local number. So try dialing 10288 or 102881 before

you make your local call and maybe you won't have to deal with that pesky

operator. The only downside of doing this is that the call will "cost"

more and you'll be inturrupted every five minutes to deposit more money.

Red Box frequencies

For you tech-heads out there, here are the actual frequencies that

the red box produces. Actually, this is what a pay phone produces.

When you make a red box out of a Radio Shack tone dialer, the timing

is slowed slighty on the quarter tone.

The "tone" is 1700 hz and 2200 hz mixed together.

A nickel is 66 ms on (1 beep).

A dime is 66ms on, 66ms off, 66ms on (2 beeps).

A quarter is 33ms on, 33ms off repeated 5 times.

Misc. notes

You can not call any of those 900 phone sex numbers with a red box, so

perverts of the world...Sorry, Roy, you're just out of luck. You CAN

call 976 information lines, though!

If you're really desperate for money, you can sell phone calls to people.

Hang around a phone and tell someone who's about to make a call that

you'll give them a free call if they'll give you a quarter. This usually

impresses the hell out of any ordinary person. If you live in a big city,

you can go to the tourist section of town and sell long distance discount

calls to out of state tourists. Consider yourselves warned, though, I've

read a LOT of articles on people getting busted for doing this. One article

even had a picture of a guy in an airport selling calls to people comming

off the plane.

If an operator confronts you and says, "Hey, you're not really putting

in coins, that's a recording!" don't get all nervous and run from the

pay phone. She'll lie and tell you that security is on the way to the

pay phone to put you in jail but she's full of it. Instead, piss her

off by explaining to her in detail exactly what you're doing and how

you're doing it. If she gets an attitude with you, ask to speak with

her supervisor or Service Asisstant. This pisses her off to no end.

When connected with the supervisor, tell her exactly what you think of

her and the company she works for. The worse thing they can really do

is shut off the pay phone.

Operator quotes

a malfunctioning red box or making a local call cause you to have to

deal with a live operator who can get testy when they find out you're

screwing the place that they work for. Here are some responses I've

gotten from them.

1. "Well, son, your TOY doesn't seem to be working today. Why don't you

try PAYING for your call instead?" -Hollywood, CA

2. "What'd you do, record those tones on the train tracks?" - my friend

got this response when trying to use a very poor quality cassette of

red box tones in Wood River, IL

3. "(sigh) Well, I'll put your call through, but next time I want you to

pay real money for your call, okay?" -Galveston, TX

4. "That's it! I'm sick of you kids, I'm calling security RIGHT NOW!"

-Cincinnati, OH

5. "You know you'll go to hell for stealing..." -Portland, OR

6. "I wish I could go over there right now and strangle that kid." -I

overheard an operator in Seattle say this to her supervisor after

they thought I had hung up the phone.

B5. Getting unlisted phone numbers

There are a couple of different ways of doing this. Let's see if this

one will help: Every city has one or more offices dedicated to assigning

numbers to the telephone wire pairs. These offices are called DPAC offices

and are available to service reps who are installing or repairing phones.

To get the DPAC number, a service rep would call the customer service number

for billing information in the town that the number is located in that he is

trying to get the unlisted number of (Got that?). The conversation would go

something like this: "Hi, Amarillo, this is Joe from Anytown business office,

I need the DPAC number for the south side of town." This info is usually

passed out with no problems, so...if the first person you call doesn't have

it, try another. REMEMBER: no one has ANY IDEA who the hell you are when you

are talking on the phone, so you can be anyone you damn well please! (heheheh!)

When you call the DPAC number, just tell them that you need a listing for

either the address that you have, or the name. DPAC DOES NOT SHOW WHETHER THE

NUMBER IS LISTED OR UNLISTED!! Also, if you're going to make a habit of chasing

numbers down, you might want to check into getting a criss-cross directory,

which lists phone numbers by their addresses. It costs a couple-a-hundred $$$,

but it is well worth it if you have to chase more than one or two numbers down!

B6. Cellular Lisening with a TV

TV UHF Channels 70-83 had their allocation changed for trunked land mobile,

and cellular phone use. So, by tuning to those channels, and adjusting the

fine tuning, you be able to hear cellular phone conversations. Each TV

channel covers about 5 MHz with its fine tuning control. So, while you won't

have an exact frequency readout, you'll have a rough idea what frequency,

something is on. The sensitivity isn't too good, but if you are in a city, or right

next to a cell site, you will pick something up. You will aslo pick

up business transmissions on the trunked land mobile band if they are

close. Those transmissions are not illegal to listen to unless their

scrambled, so you can use that old TV to find out which local businesses

went over to 800 MHz.

B7. Free LD Msgs

This is an easy way to get quick messages to someone from a payphone

either LD or when you don't have change to make a call. It works best

using 1-800-COLLECT. Some other carriers will also work, assuming they

use computerized routing of the collect call.

1) Call 1-800-COLLECT (or your other carrier). Enter the # of the

recipient of the message when prompted.

2) When you are asked to say your name, you have about 6 seconds

to record your message. Examples include:

"It's John, call me at 555-1212"

"My plane will get in at 6:55 p.m., Terminal D, USAir"

"Mom, come pick me up at the Gym Doors of the school"

You get the idea.

3) Allow the recieving party to reject the call. They will recieve

your message, and you can hang up. You MUST stay on the line

until you are told that your call has been refused. That will

ensure that the other end heard your message. Also, the "name"

will be repeated twice, so if there is a date or phone number

in it, the recieving party will hear it a second time if they

miss it.

Be aware that although 1-800-COLLECT doesn't screen the "name" that is

recorded, they may notice a large number of refused calls from a reciever.

You shouldn't use this all the time, but it can be handy.

B8. The Call Waiting Tap

So, you have an enemy who talks behind your back, eh? Or, maybe you just

would like to "listen" in on your friend's conversations? Well, if you

have 2 phone lines and call waiting on one of them, you are in luck.

(Only one problem: your friend must also have call waiting!)

Procedure:

[1] Call up your friend with the phone you want to listen with. When

he answers call waiting (he's already on the phone, and you are the

2nd caller), then you either sit there or say: sorry, I have the

wrong number.

[2] Next, you wait until he goes back to the other line (puts you on

hold).

[3] Then, pick up your other line and call ->YOUR<- call waiting.

[4] Answer call waiting

[5] Then go back to him. (Answer, and then click back.. Click ->2<-

times answer, and go back..)

[6] Hang up your second line

[7] You are now on the line!

[8] Listen and be Q U I E T !

He can hear you!

Techniques I use to prevent noise or confusion:

If you have call forwarding, turn it on and forward calls somewhere

before you start listening. If a call comes through on your call

waiting circuit, the people talking (your buddie and his pal) will

not hear anything, but after you answer call waiting and come back,

they will hear the other call hang up (two clicks). If you don't have

call forwarding, I suggest you get it if you are going to make a habit

of this, because it will become a major pain in the ass. When your call

waiting rings, you are removed from the "listening" conversation and

placed back on his hold circuit. In order to get back on, you must

answer the phone and wait for your party when you answer the phone,

tell the guy you are in a hurry and you have to go or you'll call him

back later or something) to hang up. When he or she hangs up, you will

be back on the conversation. Then, one of your pals will say: What was

that? (because of the clicks).. So, try to use call forwarding if you

can. Remember: Have fun, and don't abuse it. I am not sure about it,

because I just discovered it. It is illegal (what isn't these days)

because it is invading privacy". I don't know if the phone company

just did not realize there was a flaw in it, or that was planned for

line testing, I am not sure.

B9. How to block Caller-ID

Some of these methods work in some areas, but not in others.

Dial *67 before you dial the number (141 in the United Kingdom)

Dial your local TelCo and have them add Caller-ID block to your line.

Dial the 0 Operator, adn have him/her to place the call for you.

Dial the call using a pre-paid phone card.

Dial through Security Consultants at (900)PREVENT for U.S. calls.

($1.99/minute) or (900)STONEWALL for international calls ($3.99/minute)

Dial from a pay phone. :)

C. Hacking and Phreaking Information

------------------------------------

C1. Recommended reading

A Novice's Guide To Hacking

Alt.2600 Hack Faq

The Hacker's Handbook

The Official Phreaker's Manual

Rainbow Books

The Hacker Crackdown

Computer Hackers: Rebels With A Cause

The Legion Of Doom Technical Journals

The Ultimate Beginner's Guide To Hacking And Phreaking

The Official Guide To Hacking And Phreaking (of course!)

C2. WWW Sites

http://www.outerlimits.net/lordsome/index.html

http://web2.airmail.net/km/hfiles/free.htm

http://resudox.net/bio/novell.html

http://www.louisville.edu/wrbake01/hack2.html

http://www.intersurf.com/~materva/files.html

http://hightop.nrl.navy.mil/rainbow.html

http://www.rit.edu/~jmb8902/hacking.html

http://www.spatz.com/pecos/index.html

http://pages.prodigy.com/FL/dtgz94a/files2.html

http://www.2600.com

http://att.net/dir800

http://draco.centerline.com:8080/~franl/crypto.html

http://everest.cs.ucdavis.edu/Security.html

http://ice-www.larc.nasa.gov/WWW/security.html

http://lOpht.com

http://lOpht.com/~oblivion/IIRG.html

http://underground.org

http://www.alw.nih.gov/WWW/security.html

http://www.aspentec.com/~frzmtdb/fun/hacker.html

http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html

http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html

http://www.engin.umich.edu/~jgotts/underground/boxes.html

http://www.etext.org/Zines

http://www.inderect.com/www/johnk/

http://www.mgmua.com/hackers/index.html

http://www.paranoia.com/mthreat

http://www.paranoia.com/astrostar/fringe.html

http://www.umcc.umich.edu/~doug/virus-faq.html

http://www.wired.com

C3. Newsgroups

alt.2600

alt.2600.hope.tech

alt.cellular

alt.cellular-phone-tech

alt.comp.virus

alt.cracks

alt.cyberpunk

alt.cyberspace

alt.dcom.telecom

alt.fan.lewiz

alt.hackers

alt.hackintosh

alt.hackers.malicious

alt.security

C4. Magazines

Phrack Magazine

Tap Magazine

2600 Magazine

The Happy Hacker Magazine

Phantasy Magazine

The Treasure Chest Magazine (this is my mag, it isn't on the web yet,

more info later in this guide)

C5. Movies

SNEAKERS

HACKERS (good movie, but too unrealistic)

War Games

C6. Books, Videos, and Mailing Lists

Books

Engineering and Operations in the Bell System

Author: R.F. Rey

Publisher: Bell Telephont Laboratories

Copyright Date: 1983

ISBN: 0-932764-04-5

Although out of date, this book reamins *THE* book on telephony.

This book is 100% Bell, and is loved by phreaks the world over.

Including me.

Telephony: Today and Tomorrow

Author: Dimitris N. Chorafas

Publisher: Prentice-Hall

Copyright Date: 1984

ISBN: 0-13-902700-9

The Telecommunications Fact Book and Illustrated Dictionary

Author: Ahmed S. Khan

Publisher: Delmar Publishers, Inc.

Copyright Date: 1992

ISBN: 0-8273-4615-8

I find this dictionary to be an excellent refrence book on

telephony, and I recommend it to anyone with serious intentions in

the field.

Tandy/Radio Shack Cellular Hardware

Author: Judas Gerard and Damien Thorn

Publisher: Phoenix Rising Communications

Copyright Date: 1994

ISBN:

The Phone Book

Author: Carl Oppendahl

Publisher: Consumer Reports

Copyright Date:

ISBN: 0-89043-364-x

Listing of every cellular ID in the U.S., plus roaming ports, and

info numbers for each carrier.

Principles of Caller I.D.

Author:

Publisher: International MicroPower Corp.

Copyright Date:

ISBN:

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

Author: Bruce Sterling

Publisher: Bantam Books

Copyright Date: 1982

ISBN: 0-553-56370-X

Bruce Sterling has recently released the book FREE to the net. The

book is much easier to read in print form, and the paperback is

only $5.99. Either way you read it, you will be glad you did. Mr.

Sterling is an excellent science fiction author and has brought

his talent with words to bear on the hacking culture. A very

enjoyable reading experience.

Cyberpunk

Author: Katie Hafner and John Markoff

Publisher: Simon and Schuster

Copyright Date: 1991

ISBN: 0-671-77879-X

The Cuckoo's Egg

Author: Cliff Stoll

Publisher: Simon and Schuster

Copyright Date: 1989

ISBN: 0-671-72688-9

Hackers: Heroes of the Computer Revolution

Author: Steven Levy

Publisher: Doubleday

Copyright Date: 1984

ISBN: 0-440-13495-6

The Hacker's Handbook

Author: Hugo Cornwall

Publisher: E. Arthur Brown Company

Copyright Date:

ISBN: 0-912579-06-4

Videos

'Unauthorized Access' by Annaliza Savage

$25 on VH S format in 38-min

Savage Productions

1803 Mission St., #406

Santa Cruz, CA 95060

Hacker's '95 - a Phon-E & R.F. Burns Production

See the video Emmanuel Goldstein thought would have the Feds knocking

at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y

fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric

BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the

Secret Service briefing on Operation Cyber Snare (recent cell busts)

Talks on Crypto, HERF, the Feds, etc. All information is presented

for educational purposes only. Not for sale to government or law

enforcement organizations. Running time aproximately 90 minutes.

$25.00 NTSC VHS

$35.00 PAL/Secam VHS

Custom Video Productions

(908)842-6378

videocvp@ix.netcom.com

Mailing Lists

Computers and Society

Reflector Address: Comp-Soc@limbo.intuitive.com

Registration Address: taylor@limbo.intuitive.com

Cypherpunks

Registration Address: Send a message to majordomo@toad.com

containing the line "subscribe cypherpunks"

WWW Security

Registration Address: www-security@ns2.rutgers.edu

phruwt-l (Macintosh H/P)

Registration Address: Send a message to filbert@netcom.com

with the subject "phruwt-l"

C7. Gopher sites

ba.com

csrc.ncsl.nist.gov

gopher.acm.org

gopher.cpsr.org

gopher.cs.uwm

gopher.eff.org

oss.net

spy.org

wiretap.spies.com

C8. FTP sites

2600.com

agl.gatech.edu/pub

asylum.sf.ca.us

clark.net/pub/jcase

ftp.armory.com/pub/user/kmartind

ftp.armory.com/pub/user/swallow

ftp.fc.net/pub/defcon/BBEEP

ftp.fc.net/pub/phrack

ftp.giga.or.at/pub/hacker

ftp.lava.net/users/oracle

ftp.microserve.net/ppp-pop/strata/mac

ftp.near.net/security/archives/phrack

ftp.netcom.com/pub/br/bradelym

ftp.netcom.com/pub/daemon9

ftp.netcom.com/pub/zz/zzyzx

ftp.primenet.com/users/k/kludge

C9. BBS's and IRC channels

BBS's

Salted Slug Systems 408-454-9368

Lies Unlimited 415-583-4102

Tomorrow's Order of Magnitude 408-961-9315

My Dog Bit Jesus 510-658-8078

Surf Board 412-785-DATA

T.A.P. 801-969-1139

Tropo Island 801-484-1742

Motel West 801-466-6954

The Legion Outpost 415-521-7413

C.A.M.E.L.O.T. 415-887-0983

RAT HEAD 415-524-3649

International House of Leeches 415-527-9444

Lunatic Labs 213-655-0691

The Vault AE/BBS System 218-724-4210

The Pipeline BBS/Cat-Fur 718-351-5678

Terrapin Station AE 505-865-0883

The Galaxy 708-690-4958

Bell Labs 708-964-7250

The Broadway Show 718-615-0580

Stronghold North 612-588-7856

Stronghold East Elite (LOGIN:SUPERSCAM) 516-549-0268

P-80 International Information Systems 304-744-2253

Interpol BBS! +46-758-73838

Underground Asylum 215-944-0719!

SIC GROUP VMB! 800-438-2300

Wanderjahr 404-998-5676

The Entropy 412-872-0115

ThE PhRoZeN PhOrEsT 916-393-5646

Swashbuckler's BBS 416-229-6834

The Exucitive's Inn 915-581-5145

The FreeWorld II 301-668-7657

The Morgue 201-376-4462

The Armoury 201-267-1207

The Lunatic Phrings BBS 312-965-3677

Mistywood BBS/AE/CF 818-335-5651

Mistywood // BBS 602-220-9363

The Wizards Guild 409-696-8226

Den o/Crude Tort 617-832-9229

Sirius Cybernetics 808-528-2436

The New Dork Sublime 415-864-DORK

The Shrine 206-794-6674

Planet Mirth 510-786-6560

PLA BBS Online 618-797-6560

BBS Texas Line 512-883-7543

Sonic Youth Systems 512-851-8317

IRC channels

#2600

#cellular

#hack

#phreak

#linux

#realhack

#root

#unix

#warez

C10. Cool hackers and phreakers

Yes, there are many cool hackers and phreakers in the world, bu these

are the coolest.

Silicon Toad

Logik Bomb/Net Assasin

oleBuzzard

Lord Somer

Weezel

radfaraf

CyberDoc

OFFSPR|NG

Revelation

Thanks for all your help guys.

C11. The Hacker's Manifesto

Another one got caught today, it's all over the papers.

"Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after

Bank Tampering"...Damn kids. They're all alike. But did you, in your

three-piece psychology and 1950's technobrain, ever take a look behind

the eyes of the hacker? Did you ever wonder what made him tick, what

forces shaped him, what may have molded him? I am a hacker, enter my world...

Mine is a world that begins with school...I'm smarter than most of the

other kids, this crap they teach us bores me...Damn underachiever. They're

all alike. I'm in junior high or high school. I've listened to teachers

explain for the fifteenth time how to reduce a fraction. I understand it.

"No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid.

Probably copied it. They're all alike. I made a discovery today. I found

a computer. Wait a second, this is cool. It does what I want it to. If

it makes a mistake, it's because I screwed it up. Not because it doesn't

like me...Or feels threatened by me... Or thinks I'm a smart ass...Or

doesn't like teaching and shouldn't be here...Damn kid. All he does is

play games. They're all alike. And then it happened... a door opened

to a world... rushing through the phone line like heroin through an

addict's veins, an electronic pulse is sent out, a refuge from the

day-to-day incompetencies is sought...a board is found. "This is

it... this is where I belong..." I know everyone here... even if

I've never met them, never talked to them, may never hear from them

again... I know you all...Damn kid. Tying up the phone line again.

They're all alike...You bet your ass we're all alike... we've been

spoon-fed baby food at school when we hungered for steak...the bits

of meat that you did let slip through were pre-chewed and tasteless.

We've been dominated by sadists, or ignored by the apathetic. The few

that had something to teach found us willing pupils, but those few are

like drops of water in the desert.

This is our world now...the world of the electron and the switch,

the beauty of the baud. We make use of a service already existing

without paying for what could be dirt-cheap if it wasn't run by

profiteering gluttons, and you call us criminals. We explore... and

you call us criminals. We seek after knowledge... and you call us

criminals. We exist without skin color, without nationality, without

religious bias... and you call us criminals. You build atomic bombs,

you wage wars, you murder, cheat, and lie to us and try to make us believe

it's for our own good, yet we're the criminals. Yes, I am a criminal.

My crime is that of curiosity. My crime is that of judging people by what

they say and think, not what they look like. My crime is that of outsmarting

you, something that you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this individual,

but you can't stop us all...after all, we're all alike.

+++The Mentor+++

C12. Happy Hacking!

Be careful out there and have fun. I hope you have enjoyed this guide

and found it informative and educational. Look out for my magazine The

Treasure Chest on the web. I have mad a few issues that are quite big

and will put them on the web sometime soon (if you want to subscribe,

email me at ewendt@atl.mindspring.com). I also helped I have helped you

how to hack and phreak. Thank you.

"The American Anarchist is here and he takes control"

-American Anarchist-