The Official Guide To Hacking And Phreaking
So, you want to know about hacking and phreaking huh? Searched the net
as much as you can for as much information as possible? Have to go to
multiple sites all the time? Giving you a headach? Well, I, American
Anarchist have created the largest hacking/phreaking guide ever...so far.
But I must tell you a few things first. If anyone of you are looking for
hacking Unix information, go somewhere else! This guide will not contain
anything on Unix. That's probably it, well, lets get things started.
----------
A. Hacking
----------
A1. First things first
A2. Hacker's Ethics
A3. Why do we hack? Where to start hacking
A4. Hacker's Equipment
A5. Hacking the Milnet
A6. Hacking AT&T Answering Machines
A7. Hacking Compuserve Online
A8. CNA: Numbers Listing
A9. Computer Underground
------------
B. Phreaking
------------
B1. Why do we phreak? Where to start phreaking
B2. Phreaking rules
B3. Boxes and what they do
B4. Red Box ways
B5. Getting unlisted phone numbers
B6. Cellular Listening with a TV
B7. Free LD Msgs
B8. The Call Waiting Tap
B9. How to block Caller-ID
------------------------------------
C. Hacking and Phreaking Information
------------------------------------
C1. Recommended reading
C2. WWW Sites
C3. Newsgroups
C4. Magazines
C5. Books, Videos, and Mailing Lists
C6. Movies
C7. Gopher sites
C8. FTP Sites
C9. BBS's and IRC channels
C10. Cool hackers and phreakers
C11. The Hacker's Manifesto
C12. Happy Hacking!
A. Hacking
----------
A1. First things first
Got kicked or banned from an IRC/mIRC channel because you asked a
little newbie question? Don't worry, this thing always happens. People
who do that think they were wielding a Unix manual in one hand and think
that anyone who is lower than him thinks he is a god. But he could be a
newbie, acting as an elite. Those are piss-ants. They suck. Pay no
attention to them. Ask him hard questions about hacking/phreaking
(one you think he doesn't know), and he probably won't answer for a
long while or will probably guess and give the wrong answer. This is
a way you can find out if someone is a piss-ant. I have done it before.
Also, this guide will contain just main points of hacking and phreaking,
not long speeches or anything.
A2. Hacker's Ethics
I. Do not intentionally damage *any* system.
II. Do not alter any system files other than ones needed to ensure
your escape from detection and your future access (Trojan Horses,
Altering Logs, and the like are all necessary to your survival for
as long as possible.)
III. Do not leave your (or anyone else's) real name, real handle, or
real phone number on any system that you access illegally. They
*can* and will track you down from your handle!
IV. Be careful who you share information with. Feds are getting
trickier. Generally, if you don't know their voice phone number,
name, and occupation or haven't spoken with them voice on non-info
trading conversations, be wary.
V. Do not leave your real phone number to anyone you don't know. This
includes logging on boards, no matter how k-rad they seem. If you
don't know the sysop, leave a note telling some trustworthy people
that will validate you.
VI. Do not hack government computers. Yes, there are government
systems that are safe to hack, but they are few and far between.
And the government has inifitely more time and resources to track
you down than a company who has to make a profit and justify
expenses.
VII. Don't use codes unless there is *NO* way around it (you don't have
a local telenet or tymnet outdial and can't connect to anything
800...) You use codes long enough, you will get caught. Period.
VIII. Don't be afraid to be paranoid. Remember, you *are* breaking the
law. It doesn't hurt to store everything encrypted on your hard
disk, or keep your notes buried in the backyard or in the trunk of
your car. You may feel a little funny, but you'll feel a lot
funnier when you when you meet Bruno, your transvestite cellmate
who axed his family to death. Watch what you post on boards. Most
of the really great hackers in the country post *nothing* about
the system they're currently working except in the broadest sense
(I'm working on a UNIX, or a COSMOS, or something generic. Not
"I'm hacking into General Electric's Voice Mail System" or
something inane and revealing like that.)
X. Don't be afraid to ask questions. That's what more experienced
hackers are for. Don't expect *everything* you ask to be answered,
though. There are some things (LMOS, for instance) that a begining
hacker shouldn't mess with. You'll either get caught, or screw it
up for others, or both.
XI. Finally, you have to actually hack. You can hang out on boards all
you want, and you can read all the text files in the world, but
until you actually start doing it, you'll never know what it's all
about. There's no thrill quite the same as getting into your first
system (well, ok, I can think of a couple of bigger thrills, but
you get the picture.)
A3. Why do we hack? Where to start hacking
Why do we hack? That is a question asked among very many people.
Why do we hack? Well, I think that the simplest answer there is that we want
to gain access to another computer and take control. We all love to do it.
People would hang around you like you were their idol. "Can you hack for me?
Can you do this? Can you change my grades?" These are some questions asked
to hackers from people who don't know anything about hacking. They want you
to do the work for them. That is a reason there are more newbies than actual
hackers. Newbies want to be known, they want control, they want power. I love
to hack, it gives me something to do when bored or just wanna have fun.
Now to where to start hacking. Get yourself a good scanner and scan some
prefixes and find some col dialups, then do the following: From your terminal,
dial the number you found. Then you should hear a series of beeps (carrier)
which tells you that you are connecting to a remote computer . It should then
say something like "CONNECT 9600" and then identify the system that you are on.
If nothing happens after it says "CONNECT 9600" try hitting 'ENTER' a few times.
If you get a bunch of garbage, adjust your parity, data bits, stop bits, baud
rate, etc., until it becomes clear. That is one way of connecting to a remote
computer. Another way is through Telnet or some other large network. Telnet is
a very large network that has many other networks and remote computers connected
to it. Here is how you would connect to a remote computer through Telnet:
First, you get your local dialup (phone number). Then you dial the number from
your terminal and connect. If you get a bunch of garbage, try changing your
parity to odd and your data bits to 7, this should clear it up. If it just sits
there, hit 'ENTER' and wait a few seconds, then hit 'ENTER' again. Then it will
say "TERMINAL=" and you type in your terminal emulation. If you don't know what
it is, just hit 'ENTER'. Then it will give you a prompt that looks like "@".
From there, you type "c" and then the NUA (Network User Address) that you want
to connect to. After you connect to the NUA, th first thing you need to do is
find out what type of system you are on (i.e. UNIX, VAX/VMS, PRIME, etc.). There
are other things you can do on Telnet besides connecting to an NUA. Some of these
commands and functions are listed here. You can only connect to computers which
accept reverse charging. Telnet is probably the safest place to start hacking
because of the large numbers of calls that they get. Make sure you call during
business hours (late morning or early afternoon), so there are many other people
on-line.
commands
Beginners probably won't use these commands, but I put them here for refrence anyway.
COMMAND FUNCTION
c Connect to a host
stat Shows network post
full Network echo
half Terminal echo
telemail Mail (need ID and password)
mail Mail (need ID and password)
set Select PAD parameters
cont Continue
d Disconnect
hangup Hangs up
access Telnet account (need ID and password)
A4. Hacker's Equipment
Well, to start off to hacking, you're going to need some equipment and
the items listed will probably be the best you can get.
-Good scanner (I recommend ToneLoc and Autoscan)
-Computer (duh!)
-Modem
-A terminal program (like hyper terminal)
-An unzipping utility (like PKZIP or Winzip. Because almost everything you
download off a BBS or site will be in zipped format)
A5. Hacking the Milnet
Milnet is a system used by the Air Force and the Pentagon for communication
use. Milnet is run out of the University of Southern California.
LOGON INFO
The Milnet number is 1-800-368-2217. The ISI MASTER DIAL UP is 213-306-1366.
This is a more tricky logon procedure but if you have balls, you're using a
trunk box , or you are just S-T-U-P-I-D.
ISIE MASTER LOGON PROCEDURE:
<LI>call 213-306-1366
<LI>when the phone stops ringing, you are connected
<LI>enter location number (9 digits) + 1 or 0
<LI>hang up and it will call you
<LI>pick up the phone and hit the '*' on your phone
<LI>hit a carriage return on the computer
<LI>at the 'what class?' prompt, hit RETURN!!!
<LI>then a 'go' prompt will appear and log on as you would the 800 number.
MILNET LOGIN PROCEDURE:
If you're having trouble connecting, try 300 bauds instead of 1200.
It's a pain in the ass, but sometimes the connection will fuck up if you don't.
When the first connection as been made, you will see:
'WELCOME TO DDN. FOR OFFICIAL USE ONLY. TAC LOGIN
CALL NIC 1-800-235-3155 FOR HELP
WRPAT TAC 113 #:36
(you type)@o 1.103YOU ALWAYS TYPE @o then other connections are:
<UL>
<LI>ISIA - 3/103
<LI>ISIB - 10:3/52
<LI>ISID - 10:0/27
<LI>ISIE - 1/103 (THE EXAMPLE)
<LI>ISIF - 2/103
<LI>VAX A - 10:2/27
Next, you see a 'USER-ID'prompt. The first 4 characters vary, but it is
always followed by a '-' and whatever connection you choose.
User-Id: (example) CER5-ISIE or MRW1-ISIE
The first three letters are the intials of the user followed by a
random number (1-9).
Access Code: (example) 2285UNG6A or 22L8KK5CH
An access code will never contain a ( 1, 0, G, Z).
@ USERNAME + PASSWORD i.e. USERNAME SAC.305AREFW-LGTO
THE USERNAME EXPLANATION:
The first three letters will be SAC. This stands for Strategic Air Command.
Following that is a '.' Then the squadron number and the prime mission .
In this case '305AREFW' (305TH AIR REFULING WING). Then a '-' and the
Individual Squadron name 'LGTO' (LOGSITICS GROUND TRANSPORTATION OPERATIONS),
a fancy name for the motor pool.
The password will not be echoed back and should be entered after the
username/ The new user password as a default is: NEW-UZER-ACNT.
THINGS TO DO:
PROGRAMS AVAILABLE TO SAC USERS and what they are for copied directly
from the help manual:
ADUTY aids in management of additional duty assignments.
(international help - use the ? and <ESC> keys, HELP)
ARCHIVE requests files to be stored on tape for later retrievel.
(type HELP ARCHIVE <RET> at TOPS-20)
CHAT provides near real time communication between terminal users
on the sma host computer. (use ? with CHAT)
DAILY executive appointment scheduling program
DCOPY handles output on DIABLO and XEROX printers
EMACS powerful full-screen text editor
FOLLOW suspense follow up program
FTP provide file transfer capabilities bewteen host computers
FKEYS allows user to define function key (real spiffaruni)
HELP the command used by stupid generals or hackers that have
never used Milnet before
HERMES e-mail
NCPCALC spreadsheet program
PHOTO saves transcripts of seesions
REMIND sends user-created reminders
RIPSORT a sophisticated data sorting program
(dexcribed in SAC's User Manual [sorry])
SCRIBE a powerful text formatter for preparing documents
(ISI's manual, SCRIBE manual - soon on MILNET V.2)
SPELL text file spelling checker
(HELP at TOPS-20 and <DOCUMENTS> diretory international help -?)
SUSCON allows the creating, sending, and clearing of suspense's
(international help - ? and <ESC>, HELP command)
TACOPY used for printing hard copies of files
(international help - ?)
TALK pretty much the same as chat
TIPCOPY predecessor of TACOPY
TEACH-EMACS (SELF EXPLANATORY: GIVES LIST OF COMMANDS)
TN Tel-Net provides multi-host access on MILNET
(HELP at TOPS-20 and <DOCUMENTATION> directory,
international help - use ? and <ESC>)
XED line oriented text editor
(HELP at TOPS-20 and <DOCUMENTATION> directory)
LOGGING OFF
TYPE: @L (pretty tough huh?)
The Milnet ID card if you should be trashing somewhere and find a card
that looks like this, then save it (it will be blue and white)
__________________________________________
/ \
HOST USC-ISIE 26.1.0.103
HOST ADMINISTRATOR GORDON, VICKI L.
--------------------------------------------
DDN CARD HOLDER:
REID, CALVIN E, 1st LT.
CARD 118445
--------------------------------------------
USER ID:CER5-ISIE
ACCESS CODE:2285UNG6A
USERNAME: SAC.305AREFW-LGTO
PASSWORD: NEW-UZER-ACNT
\__________________________________________/
It's also a wallet sized, so you may wish to mug someone who you know
is in the air force (just kidding).
A6. Hacking AT&T Answering Machines
1. Dial telephone and wait for AT&T Answering Machine to answer.
2. Quickly Enter the following string.
1234567898765432135792468642973147 (btw: this is the shortest
4193366994488552277539596372582838 string for entering every
491817161511026203040506070809001 possible 2-digit combo.)
3. You'll know you hit the code because the messages will start playing.
4. Heres a list of TouchTone(c) Commands
Listen to messages: 7
Listen to new messages: 6
Stop: #
Rewind Tape: 2
Advance Tape: 5
Clear Messages: 3,3
Record memo: *
Record Announcement: 4,*
Play Announcement: 4,1
Turn System On: 0
Turn System Off: 8,8
A7. Hacking Compuserve Online
Compuserve is a multiuser networked Pay by Hour service. But this can
be beat. At current rates, CIS (Compuserve) charges $6.50 for 300 baud
and $12.75 for 1200/2400 baud, 9600 can only be accessed by Hardwired
clients. Thus you see the need for this file. At the time this was
written, all information in this file was correct. Enough of this,
on to the file.
Logging on to Compuserve
In order to create a Ziff Account on CompuServe you need ...
1) A Telenet, Tymnet, Or CIS Port
2) A Credit Card
3) Above the IQ of a houseplant
That is all you need, I know for some of you the 3rd one is tough, but
try. Ok, you have all this, call your local port, logon to CIS, then
you should get a [User ID:] Prompt, type [177000,5000], this is the
Ziff PCMagnet User Id. Now, if you entered it correctly, then you
should get the [Password:] Prompt, at This type [Pc*Magnet]. You will
next be givena Welcome Message, then, you will get yet another Prompt.
It should ask you for your Agreement Number, type [Z10D8810]. That is
the end of the prompts. Here's where the IQ of above a houseplant comes
into play. You now have to think. It will ask you various questions,
ranging from your country to your Social Security number. Answer them
however you want, but I wouldn't use your real info. If you want the
second password (Needed to access some things), you will have to give
an address where you can drop by and pick it up. Some ideas are sending
to your neighbors,but use your last name, it will end up at your house. That
isn't the safest thing. Or you can rent a Post Office box for about 6
months. Once you have done all this, and answer the questions, and read
the propoganda, you will see [Entering PCMagnet]. You are done.
So what do I do Now?
Ok, if you get this far, you have the IQ of above your fern. You can
go one of two places, CIS or PCMagnet (Where you are now). You can stay
in PCMagnet, but there isn't much there. So, I would type [Go Cis] This
will bring you to Compuserve. Once on CIS, you can do many thing, ranging
from downloading files, to real time chat on forums to online games.
Project Numbers
Some times I will refer to the word Project Number, that is the same
thing as a User ID. Excluding the digits after the comma. If you see an
ID that is [72311,27] then the that User ID's Project Number is[72311]. Simple Eh?
[70000,xxx] - Security Personel or Important Employes
[70003,xxx] - Complementary Account
[70004,xxx] - CompuServe Employe
[70005,xxx] - Radio Shack *Demo* Account. (R Flagged)
[70006,xxx] - Normal Compuserve Employe (Sometimes Wizards)
[70007,xxx] - Complementary Account
[70000,753] - Dan'l, Ghost, or Dan Piskur
[70006,522] - LooLoo, Myrtl, or Patrica Phelps
The [70000] Projects are very interesting accounts, they have very
high powered Flags. (Incedently, a Flag is an option set on the user
account) These accounts have the capability to 'Hang you up' from the
system. These are the only such account that can do so. But as you
will see, they can make things very difficult without hanging you up.
A non [70000] project can get you 'Hung up', they have to call Customer
Service and tell them to Initilize your Port. Thus hanging you up. But
only the [70000] project can suspend your account. The main person to
look out for is [70000,753 - Dan Piskur] he is the Head of Security.
His job is to find you and suspend your account. He does not hesitate
to do this.
The [70006] is also another intersting Project. These accounts are
USUALLY 'Wizards' (A Wizard is a user with very high access Flags)
That does not mean all [70006,xxx] are Wizards, but most are. So
if you see the ID [70006,522] that is a very high accessed Wizard,
she usually uses the name [*LooLoo*] she has Sysop Flags on all forums,
where most Sysops only have it on their specific forum. She also has the
job of finding you , but she must report to Dan'l to get you suspended.
But don't take her for granted, she has the C Flag, she can stop you from
talking, you can function normally,but you can not talk in whatever
Confrence Area she has /gag'ed you on. (/gag is the Command to stop you
from talking) She then reports the User ID to Dan'l. He suspends you.
Case Closed.
Invisable Sysops
Sysops with the C Flag can make them selves invisable while in Confrence.
But this has one bug in it. If you do a [/ust] while in Confrence, the
Inviso sysop will not appear, but if you exit [/ex] and do a [ust] at the
! Prompt, they will appear. Another way is to count the members it say are
in CO at the Forum Top menu [4. Confrencing (9 Participating)] and you go
into CO, and do a ust, count the people, in all channels and Tlk, if there
is an Inviso, there will be one less person when you count the Ust.Maybe
more if there are more Inviso's.
Glossary
Flags : Specific Options on your account.
-C Flag : Specific Account Option - Gives the use of the
/wi commands at CO. (Syntax [/wi ?])
Free Flag : Specific Account Option - Makes time in a
specific forum free. (Ususally 70003 and 70007)
-L Flag : Specific Account Option - Locks a your account
out of a forum.
-R Flag : Specific Account Option - Read Only, means that
the account can not write to the system, read
and download only. (See also Radio Shack Demo)
Gag'ed : An account flag, if you have this flag, you can
not speak while you are in CO or CB. You can not
be seen in the User Listing, except by yourself.
A quick test for this flags is Paging yourself.
If you are gag'ed, there are three ways of
getting rid of this flag, but you have no control over
them
- 1 - Have the Sysop who gag'ed you ungag you.
Only the sysop who gag'ed you can Ungag you!
- 2 - Wait till 5am, when the system resets and
it will clear the flag. (Useful only on CB)
- 3 - The best. When everyone leaves the CO you
were in, your flag will automaticly clear.
[Note. When you are gag'ed, you are only gag'ed in
that specific Forum/Co]
Inviso : When a Sysop is Invisable to all others, but other
sysops. (See also Invisable Sysops)
Project No: The Prefix of the User ID is sometimes called a
Project Number.
Wizard : An Account with capabilites of incredible capacity.
[Usually 70000 or 70006] (Not always)
A8. CNA: Numbers Listing
The word CN/A stands for Customer's Name and Address ... Your
telephone company has set up little bureaus that will answer the
telephone all day and give numbers out to any authorized Bell
employees of the same city or any other city nationwide. The
bureau keeps everyone on file with their name and address,
INCLUDING those that are unlisted. So if you have a phone number
and you want to find out who owns it and where they live, you can
use this little handy system. In short, it is basically used to
get a persons real name and real address through just having a
phone number!
Lets say you are constantly being bugged by some little dick and
you don't know his name or address, BUT you have his phone
number.. well you can get his Name & Address just by having his
telephone number! For example, lets say you have this dicks phone
number, and it's (212) 555-1873, then just do the following:
Look up the CN/A Number for that NPA (NPA = AREA CODE) in the
list below. For this example, the NPA is 212 and the CN/A number
is 518-471-8111. So then call up the CN/A # (During regular
hours) and throw a line like, "Hello, This is Operator #321 from
the residential service center in California. And I need to get a
CN/A on a customer at 212-555-1873. Thank You."... Make sure not
too sound like a twelve year old dork or try and sound lame with
a really deep voice, just try to sound as real as possible. Okay,
if you got that far, and you sound pretty convincing, then the
CN/A operator should not in any means, ask questions and you
should get all the info you need!
Here is a list of just about EVERY CN/A Number in the Continental
United States, this list was supplied to Legions of Lucifer by
LawBreaker.
ALL 518-571-8111 IS manual. its NY telephone.
Area | Account | Telephone | Call | Time | Requests |
Code | Code | Number | Hours | Zone | per call |
-----+---------+---------------+-----------+------+----------+-----------------
201 | | (304)344-7935 | 8:00-4:10 | E | 3 | manual
202 | | (304)343-7016 | 8:30-4:10 | E | 3 |
203 | | (203)789-6815 | 8:10-4:45 | E | 7 | manual
204 | | (204)949-0900 | 8:30-4:45 | C | N/A |
205 | | (205)555-1212 | 24 hours | C | 2 |
206 | I47128 | (402)572-5858 | 24 hours | C | 2 |
207 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |
208 | I47127 | (402)572-5858 | 24 hours | C | 2 | manual
209 | 1659 or | (415)781-5271 | 7:00-5:00 | P | 5 |
209 | 2826 | | | | N/A |
212 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |
213 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |
214 | SW5167 | (817)461-4769 | 8:00-4:50 | C | 3 |
215 | | (412)633-5600 | 8:30-5:00 | E | 3 |
216 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |
217 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 |
218 | I47126 | (402)572-5858 | 24 hours | All | 2 |
219 | 161 | (317)265-4834 | 7:30-4:45 | E | 3 |
301 | | (304)343-7016 | 8:00-4:10 | E | 3 |
302 | | (412)633-5600 | 8:30-5:00 | E | 3 |
303 | I47126 | (402)572-5858 | 8:00-5:00 | M | 3 |
304 | I47127 | (304)343-1401 | 8:00-4:10 | E | 3 |
305 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |
306 | | (306)777-2878 | 8:00-12:003 M | N/A |
307 | I47127 | (402)572-5858 | 24 hours | C | 2 |
308 | I47126 | (402)572-5858 | 24 hours | C | 2 |
309 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 | automatic
312 | 500 | (312)796-9600 | 24 hours | C | 2 |
313 | 53423 or| (313)424-0900 | 24 hours | E | 20 |
313 | 61728 | | | | N/A |
314 | SW1012 | (816)275-8460 | 8:30-4:30 | C | 3 |
315 | 111 | (518)471-8111 | 8:00-4:55 | E | 16 |
316 | SW2019 | (913)276-6708 | 8:00-4:45 | C | 3 |
317 | 161 | (317)265-4834 | 7:30-4:45 | E | 3 |
318 | | (318)555-1212 | 24 hours | C | 2 |
319 | I47126 | (402)572-5858 | 24 hours | C | 2 |
401 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |
402 | I47126 | (402)572-5858 | 24 hours | C | 2 |
403 | | (403)493-6383 | 8:00-4:30 | M | N/A |
404 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |
405 | SW4070 | (405)236-6121 | 7:30-4:15 | C | 3 |
406 | I47127 | (402)572-5858 | 24 hours | C | 2 |
407 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 | manual
408 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |
409 | SW5167 | (713)961-2397 | 8:00-5:00 | C | 3 |
412 | | (412)633-5600 | 8:30-5:00 | E | 3 |
413 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |
414 | 767 | (608)252-6932 | 8:00-4:30 | C | 1-5 |
415 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |
416 | | (416)443-0542 | 8:30-5:00 | E | N/A |
417 | SW1012 | (816)275-8460 | 8:30-4:30 | C | 3 |
418 | | (514)391-7440 | 8:30-4:45 | | N/A |
419 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |
501 | SW3006 | (405)236-6121 | 7:30-4:30 | C | 3 |
502 | | (502)555-1212 | 24 hours | E | 2 |
503 | I47128 | (402)572-5858 | 24 hours | C | 2 |
504 | | (504)555-1212 | 24 hours | C | 2 |
505 | I47127 | (402)572-5858 | 24 hours | C | 2 |
506 | | (506)694-6541 | 8:15-4:30 | A | N/A |
507 | I47126 | (402)572-5858 | 24 hours | C | 2 |
508 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |
509 | I47128 | (402)572-5858 | 24 hours | C | 2 |
512 | SW5167 | (512)828-2501 | 9:00-5:00 | C | 3 | manual
513 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |
514 | | (514)391-7440 | 8:00-4:30 | E | N/A |
515 | I47126 | (402)572-5858 | 24 hours | C | 2 |
516 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |
517 |53423 or | (313)424-0900 | 24 hours | E | 20 |
517 | 61728 | | | | N/A |
518 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |
519 | | (416)443-0542 | 8:30-5:00 | E | N/A |
601 | | (601)555-1212 | 24 hours | C | 2 |
602 | I47127 | (402)572-5858 | 24 hours | M | 2 |
603 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |
604 | | Contact Local | | | N/A |
604 | |Business Office| | | N/A |
605 | I47126 | (402)572-5858 | 24 hours | C | 2 |
606 | | (606)555-1212 | 24 hours | E | 2 |
607 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |
608 | 767 | (608)252-6932 | 8:30-4:30 | C | 5 |
609 | | (304)344-7935 | 8:00-4:10 | E | 3 |
612 | I47126 | (402)572-5858 | 24 hours | C | 2 |
613 | | (416)443-0542 | 8:30-5:00 | E | N/A |
614 | 161 | (614)464-0511 | 8:00-5:00 | E | 3 |
615 | 13402 | (615)373-7663 | 8:00-4:10 | E | 3 |
616 |53423 or | (313)424-0900 | 24 hours | E | 20 |
616 | 61728 | | | | N/A |
617 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |
618 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 |
619 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |
701 | I47126 | (402)572-5858 | 24 hours | C | 2 |
702 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 |
703 | | (304)343-1401 | 8:00-4:10 | E | 3 |
704 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |
705 | | (416)443-0542 | 8:30-5:00 | E | N/A |
707 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 | automatic
708 | 500 | (312)796-9600 | 24 hours | C | 2 |
709 | | *NONE* | | | N/A |
712 | I47126 | (402)572-5858 | 24 hours | C | 2 |
713 | SW5167 | (713)961-2397 | 8:00-5:00 | C | 2 |
714 |1659/2826| (415)781-5271 | 7:00-5:00 | P | 5 | not automated
715 | 767 | (608)252-6932 | 8:00-4:30 | C | 5 |
716 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |
717# | | (412)633-5600 | 8:30-5:00 | E | 3 |
717@ |6630109ATZ (717)245-6829 | | | N/A |
718 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |
719 | I47127 | (402)572-5858 | 8:00-5:00 | M | 5 |
801 | I47127 | (402)572-5858 | 24 hours | C | 2 |
802 | 411 | (518)471-8111 | 8:00-5:00 | E | 16 |
803 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |
804 | | (304)343-1401 | 8:00-4:10 | E | 3 |
805 |1659/2826| (415)781-5271 | 8:30-5:00 | P | 5 |
806 | SW5167 | (512)828-2501 | 8:00-5:00 | C | 3 |
807 | | (416)443-0542 | 8:30-5:00 | E | N/A |
808 | | (800)852-8840 | 8:00-6:00 | E | N/A |
809 | | (800)852-8840 | 8:30-5:00 | E | N/A |
812 | 161 | (317)265-4834 | 8:30-4:45 | E | 3 |
813 | 13402 | (803)251-0046 | 8:30-4:30 | E | N/A |
813 |GTE only | (813)442-7229 | 8:00-5:00 | E | N/A |
814 | | (412)633-5600 | 8:30-5:00 | E | 3 |
815 | 700 | (217)789-8290 | 8:00-5:00 | C | 2 |
816 | SW1012 | (816)275-8460 | 8:00-4:45 | C | 3 |
817 | SW5167 | (817)461-4769 | 8:00-5:00 | C | 3 |
818 |1659/2826| (415)781-5271 | 6:45-5:00 | P | 5 |
819 | | (514)391-7440 | 8:00-4:30 | E | N/A |
901 | 13402 | (615)373-7663 | 8:00-4:10 | E | 3 |
902 | | (902)421-4110 | 8:15-4:45 | A | N/A |
904 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |
906 | 61728 | (313)424-0900 | 24 hours | E | 20 |
907 | | *NONE* | | | N/A |
912 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-15 |
913 | SW2019 | (913)276-6708 | 8:00-4:45 | C | 3 |
914 | 111 | (518)471-8111 | 8:00-5:00 | E | 16 |
915 | SW5167 | (512)828-2501 | 8:00-5:00 | P | 5 | manual
916 |1659/2826| (415)781-5271 | 8:30-5:00 | P | 5 |
918 | SW4070 | (405)236-6121 | 7:30-4:10 | C | 3 |
919 | 13402 | (803)251-0046 | 8:30-5:00 | E | 3-5 |
-----+---------+---------------+-----------+------+----------+-----------------
# - Bell of PA
@ - United
Time Zones: P - Pacific 12:00 pm
M - Mountain 1:00 pm
C - Central 2:00 pm
E - Eastern 3:00 pm
A - Atlantic 4:00 pm
Note: The account code for Centel and CONTEL is CNAT, United
Tel. is 6630109ATZ
Well, that's about it. I tried to find any mistakes that
might have occurred during typing, but there's bound to be one or
two around... Two things to note here:
1> California has 2 codes listed (1659 and 2826). The first is
for people in California, the second is for everyone else outside
of California obtaining a CNA in those area codes.
2> Michigan ALSO has two codes. The first was the one currently
working when I last tried; the second is what the new code will
be if it hasn't been changed already... It's a totally automated
system, so try both codes.
A9. Computer Underground
Underground Divisions
The Compouter Underground is divided into 5 main branches & 1 minor branch.
The branches are (in no particular order):
1) Phreaks-May also be referred as "phreakers". These people deal
with the telephone grid. They want to learn all they can about it,
they want to control it, which leads to making phone calls for
free (which is illegal). Groups of Phreakers will band together
often and form an organized group and publish articles on the
subject.
2) Hackers-The people who love computer systems & love how to get
into them and control them, etc. A TRUE hacker is not the fuckers
that the Media & Hollywood would have you to believe. There is
nothing wrong with logging onto someone's computer, as long as you
don't delete files or steal trade secrets.
3) Carders-These people are admittedly criminals. They use credit
card numbers, checks, checking account numbers, whatever to obtain
what they want for free. However, this isn't as bad as the Media
makes you think. You are not liable for charges made on your CC
account that you didn't authorize, so the bank has to eat it, and
that's why they have insurance.
4) Anarchists-An Anarchist is one who loves to play with fire,
explosives, etc. This is not all bad either...who cares if you
make an explosion out in the desert to see what would happen?
Although my nickname has "Anarchist" in it, it doesn't mean I just
play with explosives, the "Anarchist" in my nick means I like to
cause havoc, hack, phreak, card, all that shit where ever I go,
and the "American" means by doing by freedom.
5) Warez-They distribute software. They are pirates. Most warez
are distributed by warez groups which exist for the purpose of
getting software out to BBSs before the other group gets that same
program out first.
6) Virus/Trojan Dudes-These people are usually programmers (although
not always) are interested in how viruses and trojan horses work &
how to make them more efficient. For those who don't know, a virus
replicates itself and waits around before doing anything harmful.
The program simply formats your hard drive upon execution is not a
virus, it is a trojan horse. This is the "minor" branch I spoke of
earlier.
Terminology
A. General Underground Terminology
Data: This is the handle of someone who used to be a modemer. He
is now a worm feast (corpse). he has basically pissed off way too
many people by being a lame asshole dick, and got KILLED. His real
name is Stuart Tay, I'm sure you've heard of him. This term is
really great, and has so many uses..."He's a Data"..."He pulled a
Data."
Lamer: This is someone who claims to be knowledgable/active in
some area of the underground, but in fact knows/does nothing. An
example would be a 2400bps user claiming to be a great warez
courier.
Leech: This is someone whoo calls BBSs and just downloads
everything in sight whithout contributing anything (or uploading
garbage just to get credits).
B. Hacking/Phreaking Terminology (not in any order)
Rebecca Bigley/Bitchley: The former chief of security at
TheftyTel, a California private LD service provider. A famed
HackerHunter bitch from hell.
Extender: This is an important phreaking term. It refers to the
number you call when accessing a Long Distance Carrier's service.
An example is 950-1493, which is ThriftyTel's Extender.
ANI: Stands for Automatic Number Identification. If you call a
telephone number that has ANI, your number (and sometimes address)
shows up on a console at their location (or is logged to a printer,
disk file, etc). This is bad, since most private long
distance carriers use it to see who is calling their extenders.
ESS: Electronic Switching System. It is the system most Bell
Organizations use to switch calls. It is what makes horrors like
ANI possible.
Gestapo: This is used to refer to any security/law enforecement
agency. Its meaning should be obvious...
SS: Secret Service. Any similarities between "SS" being used to
refer to Secret Service and the "SS" of Nazi Germany during WWII
is by no means co-incidental.
CNA: Customer/Name Address. Basically, if you have the CNA dialup
for an area code, and someone's phone number is in that area,
code, you can call the CNA dialup and give their phone number,
name and address. This is not as easy as it sounds since some CNA
dialups require talking to the operator, which may be suspicious
of you, plus you need the code. Some CNAs are automated where you
call and enter the number on a phone keypad, then the code. Some
you call with your modem.
COSMOS: The phone company's operating system.
NPA: Numeral Prefix Allocation. An area code in layman's terms.
Code Hacker: A program which repeatedly dials an extender, trying
different codes, and logging on which ones are valid. This is the
main method which most phreaks use to get their phone calls.
Telnet: This is a large network of computers. You call a Telenet
dialup, then if you know a machine's NUA (its address), you type
it in, and connect. This is good because there are Telenet dialups
local to everywhere, and then you can connect to computers on
the network no matter where they are. Other networks like Telenet
include Tymnet and the Internet (the largest network on earth, a
network of networks).
C. Carding/Scamming Terminology
CBI: Credit Bureau Information. It is used to refer to: [1] the
information given by a credit reporting agency [2] the concept
itself [3] a code used to access such a service [4] it is also
used by one such reporting agency (namely Equifax) to refer to
itself. Basically, if you have a CBI access code (normally just
called "a CBI"), you can call a CBI dialup, enter the code,
someone's name and address (or their Social Security Number), and
you will get all credit info on them, including account numbers.
This is quite useful as I'm sure you can see.
Drop Site: This is where the carder would have the carded
merchandise sent to, since only a Data would send the shit to his
own house.
D. Warez Terminology
Cracker: This is the person who breaks the copy protection on a
piece of software. This usually involves using hex editors, etc.,
and it is quite difficult.
Courier: This person whose sole job is to upload the cracked warez
to as many BBSs as possible so as to distribute the softwarea as
widely as possible.
Techniques
I. Phreaking Techniques
Start by getting yourself a code hacking program (my favorite is P-Hack,
another popular one is Code Thief) from a p/h BBS. Set it up for the extender
you are hacking (try 9501493 if you live in Southern California). You'll need
to know the phone number for the extender, the dialing order, and the number
of digits they use in their codes. You also need a list of modem numbers that
will never be busy, but most code hackers come with a list of Telnet dialups
built right in, so you almost never have to worry about it. See, the way this
works is the program figures out a code to try, calls the extender, enters
the code, then the modem number, and if there's a carrier, the code is valid.
You need to know the dialing order since some LD companies have you dial the
phone number first, then the code. You also need to figure out a template to
hack on, which most programs allow you to enter as a series of digits with X's
in it. Any digits will be used verbatim, and an X means "any digit". For example,
if your template was 1X1XXX, the code hacker will randomly generate codes with a
"1" as the first and third digits. Also, most hackers will allow you to enter an
amount of time to delay between hack attempts, and it is very important to use
this feature if the hacker you are using supports it because some hacker busting
procedures use the number of times a number is called within a certain period to
decide if something is shady. I always use 1 minute and 30 seconds as my delay,
and I've never been caught. It is also a good idea to be hacking several extenders
at once if your hacker supports it. Let the thing fly, go to bed, and when you
wake up, the Code Fairy should have left you a nice little present (or several!).
NOTE: I did not go through the details of setting the hacker up to work with your
modem, since I assume you can handle such a task.
Ok, so now you've hacked some
codes, and you're ready to use them. Well, go to a pay phone, dial the extender,
wait for a tone, enter the code (this assumes code-first dialing, of course),
wait for another tone, then enter the area code and phone number you are calling,
and you have just made a call FOR FREE! NOTE: You must ALWAYS use the area code,
even if it's the one you're in. You can also use this to call out-of-state BBSs
for free, and it's especially easy with Telix... You just make the phone number
in your dialing directory "!,,,@,,7146469180" (for example, substitute the number
of the BBS you want to call), and then set up the long distance codes in Telix...set
"!" to the extender, and "@" to the code, and you're set.
Wow! Now you've been using codes for awhile, saving all kind of cash on fone calls,
but, "Is this all?" you ask...well, NO!, it's not.
II. Hacking Techniques
Now we move onto hacking: obtaining illegal access to someone else's computer system.
In the past, any beginner's hacking file would tell you to start with Telnet,
since Telnet used to be full of really low-security systems that any five year
old could hack into. Now, most of the systems on Telenet are so secure (since
every hacker in the world already hacked them), that you probably couldn't hack
into them with an axe. So, if you want to fuck with Telnet (and it's fine if you
do, I still do now-and-then as well), get Dr. Dissector's NUA Attacker (an NUA is
basically the node number of a machine on Telnet), read the docs, and go for it.
The way I'm going to tell you to start hacking should be much easier as well as safer.
It's called Carrier Scanning. What you do is get a Carrier Scanning program
(there are MANY...), and tell it what NPA and Exchange (area code and prefix,
for laymen) you want to scan, and go to sleep. What it will do is call every
number in the exchange, and log which ones answered with a carrier. Then, you
just check the log, and see which ones look cool. A good way to find a good
exchange to scan is to find one that's in a Big Business district, or one where
a large University is. All Universities have big computer systems, and most have
modems.
So now you have a list of carriers in some exchange, and you want to hack.
You'll need to know a bit about operating systems, since once you get in, if
you don't know the OS the machine it running, you can't do much of anything.
III. Carding/Scamming Techniques
Carding (a term a lot of people will use to describe not only actual carding,
but also checking, PO fraud, etc, etc), is the one Underground activity that
can really save you a lot of money, but can also get you thrown in prison really
fast, so, when I mention a safety technique, be sure to follow it, since I haven't
been caught and have been really careful every step of the way.
To get started in your scamming career, I'm going to recommend you pull a
very simple scam that may seem piddly-ass at first, but will help you
discover one thing: whether you can handle being a carder/scammer/whatever
you wanna call it. The scam is very simple: You get a Columbia House (or BMG)
ad from a magazine, order as many CD's as they'll send you without sending
money first, and then never pay. I have over 300 CD's in my collection, and
the only ones I paid for (only about 20) were ones they didn't have. The key
here is to use a BOGUS name, not your own. Sending it to your own house is
fine (the first time anyway, not after), but NEVER use your own name. This
will save your ass. "Must be a practical joke", you'll tell them. After the
first time you do it, if you're going to do it again, use a different address
(but one where you can pick them up at), and a different name.
Well, now you've stole 3,000 CD's from Columbia House, and you haven't
killed yourself from the guilt, what's next? Well, I'm going to describe
Traditional Carding because it was actually the first scam I ever did. I
don't do it anymore, because it's hard to find a good vendor who'll take
cards without a DNA sample or some bullshit, plus it's real dangerous now
that everyone's caught on, but several people here in my area claim to be
still doing it with great success. Traditional Carding used to be the stock
way everyone got their HST's when they first came out and were over $1200,
but now, anyone who sells computer stuff knows that COMPUTER MERCHANDISE+A
CREDIT SALE = FRAUD so they want all kind of info before they'll send anything.
This is ridiculous since if they knew anything, they'd know that the approval
code means they'll get paid regardless if it's fraud or not. The credit company
may try to screw them but the law says APPROVAL=THEY GET PAID. They just have to
fight a bit to get the money. ANYWAY, just because you can't get computer stuff
doesn't mean you can't get all kind of other stuff, sell it, and buy that 3gig hard
drive you've cumming over.
Ok, so here goes... You'll need several things for Traditional Carding:
[a] A Drop Site, [b] A CC account - WITH FULL INFO, and [c] a vendor who
will not require a DNA sample, blood, or some other bullshit before they'll
send the merchandise.
[a] The Drop Site-First off, don't ever send carded stuff to your house.
Only a Data would do that. If you send it to your house, you will get caught,
you will go to jail, and you will get buttfucked. You need a drop site. A drop
site is usually a house where the people that live there are out of town, or
maybe even a vacant place. If you use a vacant place, make sure it isn't obvious
(usually, a "For Sale" sign makes it real obvious), because UPS and FedEx people
aren't as dumb as you think. Write down the address and zip code of the place,
then say it over and over a million times in your head, so it becomes familiar
to you and you can rattle it off like you've lived there forever.
[b] The CC Account-This is very important, since it's very hard to card without
a CC account. There are many ways to get them. One is by looking in someone's
mail, and taking their statements, another is by forwarding their mail, or
trashing (looking in trash for statements, etc), or if you work retail, it's
REAL easy... Once you have the CC number, you're not home yet, you need the
person's name, and BILLING ADDRESS. They won't always ask, but have it just in
case. Also, there is a very common misconception about expiration dates.
THEY DON'T MEAN ANYTHING, AND ANYONE WHO TELLS YOU THEY DO IS AN BLITHERING
IDIOT. You just have to make one up that's 2 or 4 months ahead of what the
current day is. Like if it's July 4, 1993, just say "June 1994", and you'll
be fine.
[c] The Vendor-You're on your own here, since I don't do this anymore.
The way I used to do it is by getting magazines catering to the type of
stuff I'm buying (Computer Shopper for computer shit, Guitar for musical
stuff, you get the idea), then finding a small, non-color ad and using that vendor.
Anyway, now that you have everything together, you need to actually card
the shit. Again, I can't stress this enough, practice the whole thing in
your head so that is sounds natural, and you feel comfortable with it,
because, believe me, they'll spot you if you don't. So, once you've got it,
go to A PAY PHONE (safety tip), call them and order. Give them the drop site
address and the cardholder's name. If they ask "is that the address on the
card?", say no, and then give them a bogus story about the fact that this a
birthday present for a relative in another city, make it up, you get the idea.
And if they say "this is fraud... we *know* who you are! you're dead!"
(or something) hang up, and bail, then start over at step A, and DON'T TRY
TO USE THAT CARD AGAIN, BECAUSE IT *WILL* BE FLAGGED AS "FRAUD ATTEMPTED"!!!
If they ask for a number to call you back at, DO NOT GIVE THEM THE PAY PHONE
NUMBER, try to talk them out of it. Tell them you're at an airport on a
business trip and just remembered to send the gift, etc, just MAKE SURE
IT MATCHES YOUR
OTHER STORY, OR YOU'RE DEAD. If that's doesn't work, give them a
bogus number and forget it. Try again, with a DIFFERENT CARD. If all
goes well, you will have just carded something. Congratulations!
(NOTE: My first card run was when the TI TravelMate 2000 Notebook Computer
first came out, and with 2 megs of RAM, and a 2400bps modem with sendfax,
it cost $3500. I got two of them on the first try, but that was the good
old days...)
A WORD ABOUT CBI: CBI (see terminology section) used to be a good way
to get card numbers: you looked in the phone book for some guy's name
and address, CBI'ed the poor fool, then used his cards. I used to run
like 30 CBIs every day just for the fun of it, until Equifax called me.
I don't use CBI anymore and unless you have a portable computer you can
use clipped onto a phone line somewhere, I don't think you should do it
either.
I mentioned in the Traditional Carding section that carding used to be the
stock way everyone got their high-speed modems. A new way has come out
recently that works quite well... It's called PO Fraud (PO stands for Purchase
Order, it's how most companies buy things). What you do is go to a stationery
store, buy some PO forms, then get a bogus company logo, name, and address,
and photocopy it onto a PO form. Then you call US Robotics, talk to a sales
weasel, and say you're from whatever company and that you need two power
supplies for a Dual Standard. They'll ask how you want to pay, say Purchase
Order. They'll ask you to send the PO. You'll get all the cost info, etc,
TYPE that onto the PO then send it. They'll send you two power supplies, with
an invoice for $21 (the supplies cost $10.50 each) or more, depending on
shipping, etc. PAY THE INVOICE. THIS IS IMPORTANT. YOU ARE GETTING A USR DUAL
STANDARD FOR $21 - IT'S WORTH IT. Then, like a week or two after you get the
power supplies (just chuck 'em, you don't need them anyway), and have paid the
invoice, call back the same sales fool, and say you need a Dual Standard modem.
They'll send it to you on a PO, send them the PO like before, then when the modem
comes, don't pay the invoice. You just grabbed a Dual Standard for $21.
Another scam I used alot last summer was check fraud. The stuff I'm going to
describe here seems quite wimpish at first, but I'm sure you can adapt it to
your needs. Grab someone's checks. Call a pizza place, say you have to be at
work for an emergency meeting (or whatever) in five minutes, but your kids
need food. Tell them you'll send your son/daughter over with a check. Write
out the check, and go pick up your free pizza.
B. Phreaking
------------
B1. Why do we phreak? Where to start phreaking
Phreaking, like hacking, is used to gather information about telephones,
telephone companies, and how they work. There are other benefits as well.
As stated above, you also get free phone calls. But, these are used mainly
to gather more information about the phones, and to allow us free access to
all information.
Where to start phreaking. Well, you can phreak on any telephone, but as
stated above, it is very stupid to do so on your home phone line. First
you need you need to construct the boxes needed for what you want to do.
All of the boxes and their descriptions are listed in the next section.
Most of the boxes are very easy to make, but if your not into making shit,
there are usually alternative ways of making them.
B2. Phreaking rules
1) Never box over your home phone line.
2) You should never talk about phreaking projects over your home phone
line.
3) Never use your real name when phreaking.
4) Be careful who you tell about your phreaking projects.
5) Never leave phreaking materials out in the open. Keep them in a safe
place.
6) Don't get caught.
B3. Boxes and what they do
Acrylic Box steal 3-way calling and other services
Aqua Box stops F.B.I. lock-in-trace
Beige Box lineman's handset
Black Box when called, the caller pays nothing
Blast Box phone microphone amplifier
Blotto Box shorts out all the phones in your area
Blue Box generates 2600hz tone
Brown Box creates party line from 2 phone lines
Bud Box tap neighbor's phone
Chatreuse Box use electricity from your phone line
Cheese Box turns your phone into a payphone
Chrome Box manipulates traffic by remote control
Clear Box free calls on Fortress Phones
Color Box line activated telephone recorder
Copper Box causes crosstalk
Crimson Box hold button
Dark Box re-route calls
Daylogo Box connect to neightbors phone line
Divertor Box re-route calls
DLOC Box creates party line
Green Box generates coin return, coin collect, & ringback
tones
Gold Box dialout router
Infinity Box remotely activated phone tap
Jack Box touch-tone key pad
Light Box in-use light
Lunch Box AM transmitter
Magenta Box connect remote phone line to another remote
phone line
Mauve Box phone tap without cutting into a line
Neon Box external microphone
Noise Box creates line noise
Olive Box external ringer
Party Box creates party line from 2 phone lines
Pearl Box tone generator
Pink Box creates party line from 2 phone lines
Purple Box hold button
Rainbow Box kill trace
Razz Box tap neighbors phone
Red Box genrates tones for free phone calls
Rock Box add music to phone line
Scarlet Box causes interference to neighbors phone line
Silver Box create DTMF tones for A, B, C, and D
Static Box raises voltage on phone
Switch Box add hold, indicator lights, conferencing, etc.
Tan Box line activated telephone recorder
TV Cable Box see sound waves on TV
Urine Box create disturbance on phone
Violet Box keep a payphone from hanging up
White Box DTMF key pad
Yellow Box add an extension phone
For box schematics, goto these FTP sites:
ftp.netcom.com/pub/br/bradleym
ftp.netcom.com/pub/va/vandal
ftp.winternet.com/users/nitehwk
B4. Red Box ways
I am now going to tell you some ways how to make your own red box.
The first way is the way I made my red box.
-Buy Radio Shack part number 43-146 (around $25)
-Unscrew all the screws
-Desolder the crystal which 3579 on it (it's the original crystal)
-Replace it with a 6.5536 MHz crystal (around $5)
-Replace the cover
-You now have a red box.
Places to order a 6.5536 MHz crystal
Digi-Key
701 Brooks Avenue South
P.O. Box 677
Thief River Falls, MN 56701-0677
(800)344-4539
Part Number:X415-ND
Part Number:X018-ND
JDR Microdevices:
2233 Branham Lane
San Jose, CA 95124
(800)538-5000
Part Number: 6.5536 MHZ
Tandy Express Order Marketing
401 NE 38th Street
Fort Worth, TX 76106
(800)241-8742
Part Number: 10068625
Alltronics
2300 Zanker Road
San Jose CA 95131
(408)943-9774 Voice
(408)943-9776 Fax
(408)943-0622 BBS
Part Number: 92A057
Mouser
(800)346-6873
Part Number: 332-1066
Blue Saguaro
P.O. Box 37061
Tucson, AZ 85740
Part Number: 1458b
Unicorn Electronics
10000 Canoga Ave, Unit c-2
Chatsworth, CA 91311
Phone: 1-800-824-3432
Part Number: CR6.5
Converting a Tone Dialer into a Red Box
-Radio Shack pocket tone dialer model #43-141 ($24.95 each)
-Three AAA batteries
-Soldering Iron
-Small regular and phillips screwdriver
-Wire clippers
-A 6.5536 MHz crystal
Be sure to get Radio Shack's (also known as "Rat Shack") NEWEST type
of tone dialer. The old ones were gold and brown and looked pretty ugly.
The new ones are black and the corners are rounded off a little more.
They also seem to be more water-resistant and it seems to be easier to
fit the new crystal into these models. You can either order the crystal
through Radio Shack or buy it from an electronic's store. Buying it
through Radio Shack is a real bitch because you have to wait two weeks
for them to order it and most employees don't know what you're talking
about when you ask for it. I've had them INSIST that they can't order
that crystal for me because they don't carry it. If you live in the St.
Louis area as I do, I suggest GateWay Electronics on Page Av in Missouri.
They have a knowledgable staff and their crystals are only about three
bucks a piece. (Compared to Radio Shack's $4.99 each!) Place the dialer
on the table keypad side down and speaker side up. Remove the battery
cover and all batteries. Use the phillips screwdriver to remove all four
screws on the back of the dialer. Now slide the flathead screw-driver
along the side to separate the two halves of the dialer. Slide the
speaker half underneath the keypad so you don't break off the wires.
On the left hand side down near the battery compartment, you'll see a
silver cylinder looking component. This is the crystal you want to remove.
Pull it up with your fingers and break away all the glue that's holding
it down. Use your soldering iron and un-solder it from the circuit board.
You can throw this crystal away as it has no real use in life. Now the
hard part. The new crystal you're putting in is twice as big as the old
one so it's kinda hard to get it in there. There's a few capacitors that
you can bend over to make some more room. You'll also have to bend the leads
to your new crystal inward a little. Solder the new crystal in place of
the old one and you're all set. Snap the two casing halves back together
being careful not to pinch any wires. Put the screws back in and insert
your three AAA batteries. A good idea is to wrap the crystal with scotch
tape or electrical tape. This will prevent contact with other components
since the crystal is so big. You could also simply put a piece of paper
under the crystal. One additional thing you can do it totally remove the
LED light. The only thing this light is good for is running down your
batteries really quick. If you use the unit without the light connected,
you NEVER have to turn the unit's power off and the batteries will last
for a few years before you need to replace them.
Programming your Red Box
First you'll have to program your box's memory to make the right tones.
You'll be using the three priority buttons on the top of your unit.
P1 will be your quarter, P2 your dime and P3 will be the nickel. So
here's how to do it:
(1) Switch the unit on. The red light in the corner should come on
unless you've disconnected it.
(2) Slide the DIAL/STORE switch to the STORE mode.
(3) Press MEMORY, *, *, *, *, *, MEMORY, P1. That programs your quarter.
(4) Press MEMORY, *, *, MEMORY, P2. That programs your dime.
(5) Press MEMORY, *, MEMORY, P3. And that's the nickel.
(6) Slide the DIAL/STORE switch back into the DIAL mode and you're ready
to start phreakin'!
Try pushing the priority buttons now. Each one will emit a different
high-pitched chirping noise. This is what the phone hears when you
deposit money into a pay phone. If you've ever red boxed with a tape
recorder or heard the actual pay phone tones before, you'll notice
that these tones are slightly slower than the real ones. Don't worry,
the pay phone can't ever tell the difference and you rarely find an
operator that can.
The Low-Income Red Box (Walkman)
If you can't afford a real red box or you don't have any soldering experience,
you can use a tape recorder as a red box. There are several ways to record the
tones. One way is to go to a pay phone and call your answering machine or voice
mail. After the beep on your machine, deposit about three dollars in quarters
and hang up. Your three bucks should come back. Go home and on your answering
machine will be a tape with the red box tones. Another way is to find two pay
phones that are next to each other. You'll need a portable tape recorder and a
suction cup telephone pick-up. (The phone pick-ups can be purchased at Radio
Shack for about $3.00.) Pick up the first pay phone (Phone A) and call the other
one (Phone B). Put the suction recorder on Phone A and deposit about three dollars
in Phone B. Hang up both phones and hopefully your money will come back.
A third way is to record the tones directly from someone else who owns a
red box. Pretty easy to figure out.
To play the tones back into the phone when you need them, use either a
portable tape recorder or a walkman with some headphones. Hold the speaker
from the recorder (or the headphones) to the mouthpiece of the phone and
press "play" when asked for money. Make sure not to have the volume up too
loud or the distortion will make a real operator come on the line. You can
also use a big bulky tape recorder or a boom box but you'll look a little
silly when you try to play your tones into the pay phone.
Hallmark Cards
Hallmark has these new cards that actually let you record a message for
your loved ones so when grandma opens the card she hears your voice saying,
"Merry Christmas, Grandma Edna!" Then Grandma Edna will drop the card in
horror, thinking that she's gone completely nuts and probably die of a heart
attack.
After you've shoplifted a few of these cards and taken one apart, you'll
see that that electronics inside are pretty small. You can record your
red box tones on this chip and then conceal the whole mess anywhere you
want and you'll have a tiny red box to use.
Voice Memo Minders
These voice reminders can record tones and are extremely small. You can
either buy one that fits in your pocket or you can buy one that fits on
your key chain. In case you're surrounded by telco security, the F.B.I.,
local police and AT&T's top officials while you're at a pay phone, you can
easily press the "MEMO ERASE" button to get rid of the evidence, though the
police might shoot you when they see you go for the erase button.
Finding a phone that will work
Usually any GTE or Bell phone will work, Bell including Southwestern Bell,
U.S.West, Ameritech, Pacific Bell, etc. You'll know it's a Bell or GTE
phone because their logo will be on the phone. I've noticed in some areas
like Pacific Bell and Ameritech the phones are rigged so that no sound can
enter the mouthpiece of the phone until the call is connected, rendering
your redbox useless. A way around this is to dial "0" and have the operator
dial the call for you.
Privately Owned pay phones are those ugly phones with some kind of generic
logo on them that means some old fat local guy owns it and convinces
innocent store owners to install his phone instead of a Bell phone,
promising him bigger profits. Not a hard promise to keep, considering a
local call sometimes costs 75 cents, they sometimes won't let you dial
toll free numbers and long distance rates are twice as high (or more)
than AT&T which is pretty bad. The best thing to do when you find a
Private pay phone is to squirt a lot of ketchup or mustard into the
coin slot and find a Bell/GTE phone somewhere.
Making long distance calls
Okay, here's the fun part- Calling anywhere in the entire world and
not paying a cent for it. Pick up the phone and dial the number you
want to call in the fashion 1-AREA CODE-NUMBER. For example, if you
want to call the White House in Washington D.C., dial 1-202-456-1414.
You'll hear a click, then a computer voice will say, "Please deposit
$2.85." (The exact amount differs with the location and time of day.)
Mutter, "Fuck you, AT&T..." to yourself, switch on your red box, hold
the speaker of the red box FLUSH with the mouthpiece of the pay phone
and press P1 for your quarters. Pause for a split second in between
each quarter because if you go too fast, you'll get a live operator
wanting to know what the problem is. You are able to go 20 cents over
the amount requested and that will be credited to your call.
After you've put in enough "money", the computerized voice will say in a
cheerful, unsuspecting voice, "Thank you for using AT&T!" and your call
is put through. Every few minutes the voice will come back and ask for
more money.
Local Calls
To red box a local call it takes about a minute or two longer than
if you really paid for it, but those quarters add up so it's definately
worth it. Pick up the phone and dial zero. Tell the operator that you
want to make a local call. If she tells you just to put in a quarter
and dial the number, tell her, "Well, ma'am, there's shit all over the
keypad here and all the buttons are stickin' together and I CAN'T dial
it myself. The only key that works is the zero and THAT'S got this sticky
blue shit all over it. Then there's a half-eatin' Twinkee shoved in the
coin return and dirt all over the four and seven keys..." Keep going on
and on until she asks you what number you want to dial. She'll ask you
for a quarter and connect your call.
Make sure after your call connects that you hear the operator click off.
Some operators are nosey and will just SIT there listening to your
conversation. Once I was explaining to a friend how I placed my call
and suddenly the operator starts lecturing me and telling me she's going
to call security on me. (And this was about three minutes into the
conversation!)
In some cities I've noticed you can trick pay phones into thinking
that a local call is actually a long distance call by dialing 10288
before you dial the local number. So try dialing 10288 or 102881 before
you make your local call and maybe you won't have to deal with that pesky
operator. The only downside of doing this is that the call will "cost"
more and you'll be inturrupted every five minutes to deposit more money.
Red Box frequencies
For you tech-heads out there, here are the actual frequencies that
the red box produces. Actually, this is what a pay phone produces.
When you make a red box out of a Radio Shack tone dialer, the timing
is slowed slighty on the quarter tone.
The "tone" is 1700 hz and 2200 hz mixed together.
A nickel is 66 ms on (1 beep).
A dime is 66ms on, 66ms off, 66ms on (2 beeps).
A quarter is 33ms on, 33ms off repeated 5 times.
Misc. notes
You can not call any of those 900 phone sex numbers with a red box, so
perverts of the world...Sorry, Roy, you're just out of luck. You CAN
call 976 information lines, though!
If you're really desperate for money, you can sell phone calls to people.
Hang around a phone and tell someone who's about to make a call that
you'll give them a free call if they'll give you a quarter. This usually
impresses the hell out of any ordinary person. If you live in a big city,
you can go to the tourist section of town and sell long distance discount
calls to out of state tourists. Consider yourselves warned, though, I've
read a LOT of articles on people getting busted for doing this. One article
even had a picture of a guy in an airport selling calls to people comming
off the plane.
If an operator confronts you and says, "Hey, you're not really putting
in coins, that's a recording!" don't get all nervous and run from the
pay phone. She'll lie and tell you that security is on the way to the
pay phone to put you in jail but she's full of it. Instead, piss her
off by explaining to her in detail exactly what you're doing and how
you're doing it. If she gets an attitude with you, ask to speak with
her supervisor or Service Asisstant. This pisses her off to no end.
When connected with the supervisor, tell her exactly what you think of
her and the company she works for. The worse thing they can really do
is shut off the pay phone.
Operator quotes
a malfunctioning red box or making a local call cause you to have to
deal with a live operator who can get testy when they find out you're
screwing the place that they work for. Here are some responses I've
gotten from them.
1. "Well, son, your TOY doesn't seem to be working today. Why don't you
try PAYING for your call instead?" -Hollywood, CA
2. "What'd you do, record those tones on the train tracks?" - my friend
got this response when trying to use a very poor quality cassette of
red box tones in Wood River, IL
3. "(sigh) Well, I'll put your call through, but next time I want you to
pay real money for your call, okay?" -Galveston, TX
4. "That's it! I'm sick of you kids, I'm calling security RIGHT NOW!"
-Cincinnati, OH
5. "You know you'll go to hell for stealing..." -Portland, OR
6. "I wish I could go over there right now and strangle that kid." -I
overheard an operator in Seattle say this to her supervisor after
they thought I had hung up the phone.
B5. Getting unlisted phone numbers
There are a couple of different ways of doing this. Let's see if this
one will help: Every city has one or more offices dedicated to assigning
numbers to the telephone wire pairs. These offices are called DPAC offices
and are available to service reps who are installing or repairing phones.
To get the DPAC number, a service rep would call the customer service number
for billing information in the town that the number is located in that he is
trying to get the unlisted number of (Got that?). The conversation would go
something like this: "Hi, Amarillo, this is Joe from Anytown business office,
I need the DPAC number for the south side of town." This info is usually
passed out with no problems, so...if the first person you call doesn't have
it, try another. REMEMBER: no one has ANY IDEA who the hell you are when you
are talking on the phone, so you can be anyone you damn well please! (heheheh!)
When you call the DPAC number, just tell them that you need a listing for
either the address that you have, or the name. DPAC DOES NOT SHOW WHETHER THE
NUMBER IS LISTED OR UNLISTED!! Also, if you're going to make a habit of chasing
numbers down, you might want to check into getting a criss-cross directory,
which lists phone numbers by their addresses. It costs a couple-a-hundred $$$,
but it is well worth it if you have to chase more than one or two numbers down!
B6. Cellular Lisening with a TV
TV UHF Channels 70-83 had their allocation changed for trunked land mobile,
and cellular phone use. So, by tuning to those channels, and adjusting the
fine tuning, you be able to hear cellular phone conversations. Each TV
channel covers about 5 MHz with its fine tuning control. So, while you won't
have an exact frequency readout, you'll have a rough idea what frequency,
something is on. The sensitivity isn't too good, but if you are in a city, or right
next to a cell site, you will pick something up. You will aslo pick
up business transmissions on the trunked land mobile band if they are
close. Those transmissions are not illegal to listen to unless their
scrambled, so you can use that old TV to find out which local businesses
went over to 800 MHz.
B7. Free LD Msgs
This is an easy way to get quick messages to someone from a payphone
either LD or when you don't have change to make a call. It works best
using 1-800-COLLECT. Some other carriers will also work, assuming they
use computerized routing of the collect call.
1) Call 1-800-COLLECT (or your other carrier). Enter the # of the
recipient of the message when prompted.
2) When you are asked to say your name, you have about 6 seconds
to record your message. Examples include:
"It's John, call me at 555-1212"
"My plane will get in at 6:55 p.m., Terminal D, USAir"
"Mom, come pick me up at the Gym Doors of the school"
You get the idea.
3) Allow the recieving party to reject the call. They will recieve
your message, and you can hang up. You MUST stay on the line
until you are told that your call has been refused. That will
ensure that the other end heard your message. Also, the "name"
will be repeated twice, so if there is a date or phone number
in it, the recieving party will hear it a second time if they
miss it.
Be aware that although 1-800-COLLECT doesn't screen the "name" that is
recorded, they may notice a large number of refused calls from a reciever.
You shouldn't use this all the time, but it can be handy.
B8. The Call Waiting Tap
So, you have an enemy who talks behind your back, eh? Or, maybe you just
would like to "listen" in on your friend's conversations? Well, if you
have 2 phone lines and call waiting on one of them, you are in luck.
(Only one problem: your friend must also have call waiting!)
Procedure:
[1] Call up your friend with the phone you want to listen with. When
he answers call waiting (he's already on the phone, and you are the
2nd caller), then you either sit there or say: sorry, I have the
wrong number.
[2] Next, you wait until he goes back to the other line (puts you on
hold).
[3] Then, pick up your other line and call ->YOUR<- call waiting.
[4] Answer call waiting
[5] Then go back to him. (Answer, and then click back.. Click ->2<-
times answer, and go back..)
[6] Hang up your second line
[7] You are now on the line!
[8] Listen and be Q U I E T !
He can hear you!
Techniques I use to prevent noise or confusion:
If you have call forwarding, turn it on and forward calls somewhere
before you start listening. If a call comes through on your call
waiting circuit, the people talking (your buddie and his pal) will
not hear anything, but after you answer call waiting and come back,
they will hear the other call hang up (two clicks). If you don't have
call forwarding, I suggest you get it if you are going to make a habit
of this, because it will become a major pain in the ass. When your call
waiting rings, you are removed from the "listening" conversation and
placed back on his hold circuit. In order to get back on, you must
answer the phone and wait for your party when you answer the phone,
tell the guy you are in a hurry and you have to go or you'll call him
back later or something) to hang up. When he or she hangs up, you will
be back on the conversation. Then, one of your pals will say: What was
that? (because of the clicks).. So, try to use call forwarding if you
can. Remember: Have fun, and don't abuse it. I am not sure about it,
because I just discovered it. It is illegal (what isn't these days)
because it is invading privacy". I don't know if the phone company
just did not realize there was a flaw in it, or that was planned for
line testing, I am not sure.
B9. How to block Caller-ID
Some of these methods work in some areas, but not in others.
Dial *67 before you dial the number (141 in the United Kingdom)
Dial your local TelCo and have them add Caller-ID block to your line.
Dial the 0 Operator, adn have him/her to place the call for you.
Dial the call using a pre-paid phone card.
Dial through Security Consultants at (900)PREVENT for U.S. calls.
($1.99/minute) or (900)STONEWALL for international calls ($3.99/minute)
Dial from a pay phone. :)
C. Hacking and Phreaking Information
------------------------------------
C1. Recommended reading
A Novice's Guide To Hacking
Alt.2600 Hack Faq
The Hacker's Handbook
The Official Phreaker's Manual
Rainbow Books
The Hacker Crackdown
Computer Hackers: Rebels With A Cause
The Legion Of Doom Technical Journals
The Ultimate Beginner's Guide To Hacking And Phreaking
The Official Guide To Hacking And Phreaking (of course!)
C2. WWW Sites
http://www.outerlimits.net/lordsome/index.html
http://web2.airmail.net/km/hfiles/free.htm
http://resudox.net/bio/novell.html
http://www.louisville.edu/wrbake01/hack2.html
http://www.intersurf.com/~materva/files.html
http://hightop.nrl.navy.mil/rainbow.html
http://www.rit.edu/~jmb8902/hacking.html
http://www.spatz.com/pecos/index.html
http://pages.prodigy.com/FL/dtgz94a/files2.html
http://www.2600.com
http://att.net/dir800
http://draco.centerline.com:8080/~franl/crypto.html
http://everest.cs.ucdavis.edu/Security.html
http://ice-www.larc.nasa.gov/WWW/security.html
http://lOpht.com
http://lOpht.com/~oblivion/IIRG.html
http://underground.org
http://www.alw.nih.gov/WWW/security.html
http://www.aspentec.com/~frzmtdb/fun/hacker.html
http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
http://www.engin.umich.edu/~jgotts/underground/boxes.html
http://www.etext.org/Zines
http://www.inderect.com/www/johnk/
http://www.mgmua.com/hackers/index.html
http://www.paranoia.com/mthreat
http://www.paranoia.com/astrostar/fringe.html
http://www.umcc.umich.edu/~doug/virus-faq.html
http://www.wired.com
C3. Newsgroups
alt.2600
alt.2600.hope.tech
alt.cellular
alt.cellular-phone-tech
alt.comp.virus
alt.cracks
alt.cyberpunk
alt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.malicious
alt.security
C4. Magazines
Phrack Magazine
Tap Magazine
2600 Magazine
The Happy Hacker Magazine
Phantasy Magazine
The Treasure Chest Magazine (this is my mag, it isn't on the web yet,
more info later in this guide)
C5. Movies
SNEAKERS
HACKERS (good movie, but too unrealistic)
War Games
C6. Books, Videos, and Mailing Lists
Books
Engineering and Operations in the Bell System
Author: R.F. Rey
Publisher: Bell Telephont Laboratories
Copyright Date: 1983
ISBN: 0-932764-04-5
Although out of date, this book reamins *THE* book on telephony.
This book is 100% Bell, and is loved by phreaks the world over.
Including me.
Telephony: Today and Tomorrow
Author: Dimitris N. Chorafas
Publisher: Prentice-Hall
Copyright Date: 1984
ISBN: 0-13-902700-9
The Telecommunications Fact Book and Illustrated Dictionary
Author: Ahmed S. Khan
Publisher: Delmar Publishers, Inc.
Copyright Date: 1992
ISBN: 0-8273-4615-8
I find this dictionary to be an excellent refrence book on
telephony, and I recommend it to anyone with serious intentions in
the field.
Tandy/Radio Shack Cellular Hardware
Author: Judas Gerard and Damien Thorn
Publisher: Phoenix Rising Communications
Copyright Date: 1994
ISBN:
The Phone Book
Author: Carl Oppendahl
Publisher: Consumer Reports
Copyright Date:
ISBN: 0-89043-364-x
Listing of every cellular ID in the U.S., plus roaming ports, and
info numbers for each carrier.
Principles of Caller I.D.
Author:
Publisher: International MicroPower Corp.
Copyright Date:
ISBN:
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-X
Bruce Sterling has recently released the book FREE to the net. The
book is much easier to read in print form, and the paperback is
only $5.99. Either way you read it, you will be glad you did. Mr.
Sterling is an excellent science fiction author and has brought
his talent with words to bear on the hacking culture. A very
enjoyable reading experience.
Cyberpunk
Author: Katie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X
The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9
Hackers: Heroes of the Computer Revolution
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6
The Hacker's Handbook
Author: Hugo Cornwall
Publisher: E. Arthur Brown Company
Copyright Date:
ISBN: 0-912579-06-4
Videos
'Unauthorized Access' by Annaliza Savage
$25 on VH S format in 38-min
Savage Productions
1803 Mission St., #406
Santa Cruz, CA 95060
Hacker's '95 - a Phon-E & R.F. Burns Production
See the video Emmanuel Goldstein thought would have the Feds knocking
at his door. Coverage of Summercon'95 Coverage of Defcon III The big Y
fiasco at Summercon PMF (narc) interviews Emmanuel Goldstein & Eric
BloodAxe. Trip to Area 51 and interview with Psyhospy Coverage of the
Secret Service briefing on Operation Cyber Snare (recent cell busts)
Talks on Crypto, HERF, the Feds, etc. All information is presented
for educational purposes only. Not for sale to government or law
enforcement organizations. Running time aproximately 90 minutes.
$25.00 NTSC VHS
$35.00 PAL/Secam VHS
Custom Video Productions
(908)842-6378
videocvp@ix.netcom.com
Mailing Lists
Computers and Society
Reflector Address: Comp-Soc@limbo.intuitive.com
Registration Address: taylor@limbo.intuitive.com
Cypherpunks
Registration Address: Send a message to majordomo@toad.com
containing the line "subscribe cypherpunks"
WWW Security
Registration Address: www-security@ns2.rutgers.edu
phruwt-l (Macintosh H/P)
Registration Address: Send a message to filbert@netcom.com
with the subject "phruwt-l"
C7. Gopher sites
ba.com
csrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.org
oss.net
spy.org
wiretap.spies.com
C8. FTP sites
2600.com
agl.gatech.edu/pub
asylum.sf.ca.us
clark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrack
ftp.giga.or.at/pub/hacker
ftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/mac
ftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge
C9. BBS's and IRC channels
BBS's
Salted Slug Systems 408-454-9368
Lies Unlimited 415-583-4102
Tomorrow's Order of Magnitude 408-961-9315
My Dog Bit Jesus 510-658-8078
Surf Board 412-785-DATA
T.A.P. 801-969-1139
Tropo Island 801-484-1742
Motel West 801-466-6954
The Legion Outpost 415-521-7413
C.A.M.E.L.O.T. 415-887-0983
RAT HEAD 415-524-3649
International House of Leeches 415-527-9444
Lunatic Labs 213-655-0691
The Vault AE/BBS System 218-724-4210
The Pipeline BBS/Cat-Fur 718-351-5678
Terrapin Station AE 505-865-0883
The Galaxy 708-690-4958
Bell Labs 708-964-7250
The Broadway Show 718-615-0580
Stronghold North 612-588-7856
Stronghold East Elite (LOGIN:SUPERSCAM) 516-549-0268
P-80 International Information Systems 304-744-2253
Interpol BBS! +46-758-73838
Underground Asylum 215-944-0719!
SIC GROUP VMB! 800-438-2300
Wanderjahr 404-998-5676
The Entropy 412-872-0115
ThE PhRoZeN PhOrEsT 916-393-5646
Swashbuckler's BBS 416-229-6834
The Exucitive's Inn 915-581-5145
The FreeWorld II 301-668-7657
The Morgue 201-376-4462
The Armoury 201-267-1207
The Lunatic Phrings BBS 312-965-3677
Mistywood BBS/AE/CF 818-335-5651
Mistywood // BBS 602-220-9363
The Wizards Guild 409-696-8226
Den o/Crude Tort 617-832-9229
Sirius Cybernetics 808-528-2436
The New Dork Sublime 415-864-DORK
The Shrine 206-794-6674
Planet Mirth 510-786-6560
PLA BBS Online 618-797-6560
BBS Texas Line 512-883-7543
Sonic Youth Systems 512-851-8317
IRC channels
#2600
#cellular
#hack
#phreak
#linux
#realhack
#root
#unix
#warez
C10. Cool hackers and phreakers
Yes, there are many cool hackers and phreakers in the world, bu these
are the coolest.
Silicon Toad
Logik Bomb/Net Assasin
oleBuzzard
Lord Somer
Weezel
radfaraf
CyberDoc
OFFSPR|NG
Revelation
Thanks for all your help guys.
C11. The Hacker's Manifesto
Another one got caught today, it's all over the papers.
"Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after
Bank Tampering"...Damn kids. They're all alike. But did you, in your
three-piece psychology and 1950's technobrain, ever take a look behind
the eyes of the hacker? Did you ever wonder what made him tick, what
forces shaped him, what may have molded him? I am a hacker, enter my world...
Mine is a world that begins with school...I'm smarter than most of the
other kids, this crap they teach us bores me...Damn underachiever. They're
all alike. I'm in junior high or high school. I've listened to teachers
explain for the fifteenth time how to reduce a fraction. I understand it.
"No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid.
Probably copied it. They're all alike. I made a discovery today. I found
a computer. Wait a second, this is cool. It does what I want it to. If
it makes a mistake, it's because I screwed it up. Not because it doesn't
like me...Or feels threatened by me... Or thinks I'm a smart ass...Or
doesn't like teaching and shouldn't be here...Damn kid. All he does is
play games. They're all alike. And then it happened... a door opened
to a world... rushing through the phone line like heroin through an
addict's veins, an electronic pulse is sent out, a refuge from the
day-to-day incompetencies is sought...a board is found. "This is
it... this is where I belong..." I know everyone here... even if
I've never met them, never talked to them, may never hear from them
again... I know you all...Damn kid. Tying up the phone line again.
They're all alike...You bet your ass we're all alike... we've been
spoon-fed baby food at school when we hungered for steak...the bits
of meat that you did let slip through were pre-chewed and tasteless.
We've been dominated by sadists, or ignored by the apathetic. The few
that had something to teach found us willing pupils, but those few are
like drops of water in the desert.
This is our world now...the world of the electron and the switch,
the beauty of the baud. We make use of a service already existing
without paying for what could be dirt-cheap if it wasn't run by
profiteering gluttons, and you call us criminals. We explore... and
you call us criminals. We seek after knowledge... and you call us
criminals. We exist without skin color, without nationality, without
religious bias... and you call us criminals. You build atomic bombs,
you wage wars, you murder, cheat, and lie to us and try to make us believe
it's for our own good, yet we're the criminals. Yes, I am a criminal.
My crime is that of curiosity. My crime is that of judging people by what
they say and think, not what they look like. My crime is that of outsmarting
you, something that you will never forgive me for.
I am a hacker, and this is my manifesto. You may stop this individual,
but you can't stop us all...after all, we're all alike.
+++The Mentor+++
C12. Happy Hacking!
Be careful out there and have fun. I hope you have enjoyed this guide
and found it informative and educational. Look out for my magazine The
Treasure Chest on the web. I have mad a few issues that are quite big
and will put them on the web sometime soon (if you want to subscribe,
email me at ewendt@atl.mindspring.com). I also helped I have helped you
how to hack and phreak. Thank you.
"The American Anarchist is here and he takes control"
-American Anarchist-