FOD presents: The Official Guide To Hacking And Phreaking by American Anarchist Forces Of Darkness January 1997 Happy New Year! *********************************************************************** *Note: American Anarchist gives anyone permission to reproduce, copy, * *redistribute, pass around, upload to BBS/web sites, and anything like* *that as long as you don't edit this guide in any way. Thank you. * *American Anarchist * *********************************************************************** So, you want to know about hacking and phreaking huh? Searched the net as much as you can for as much information as possible? Have to go to multiple sites all the time? Giving you a headach? Well, I, American Anarchist have created the largest hacking/phreaking guide ever...so far. But I must tell you a few things first. If anyone of you are looking for hacking Unix information, go somewhere else! This guide will not contain anything on Unix. That's probably it, well, lets get things started. ---------- A. Hacking ---------- A1. First things first A2. Hacker's Ethics A3. Why do we hack? Where to start hacking A4. Hacker's Equipment A5. Hacking the Milnet A6. Hacking AT&T Answering Machines A7. Hacking Compuserve Online A8. CNA: Numbers Listing A9. Computer Underground ------------ B. Phreaking ------------ B1. Why do we phreak? Where to start phreaking B2. Phreaking rules B3. Boxes and what they do B4. Red Box ways B5. Getting unlisted phone numbers B6. Cellular Listening with a TV B7. Free LD Msgs B8. The Call Waiting Tap B9. How to block Caller-ID ------------------------------------ C. Hacking and Phreaking Information ------------------------------------ C1. Recommended reading C2. WWW Sites C3. Newsgroups C4. Magazines C5. Books, Videos, and Mailing Lists C6. Movies C7. Gopher sites C8. FTP Sites C9. BBS's and IRC channels C10. Cool hackers and phreakers C11. The Hacker's Manifesto C12. Happy Hacking! A. Hacking ---------- A1. First things first Got kicked or banned from an IRC/mIRC channel because you asked a little newbie question? Don't worry, this thing always happens. People who do that think they were wielding a Unix manual in one hand and think that anyone who is lower than him thinks he is a god. But he could be a newbie, acting as an elite. Those are piss-ants. They suck. Pay no attention to them. Ask him hard questions about hacking/phreaking (one you think he doesn't know), and he probably won't answer for a long while or will probably guess and give the wrong answer. This is a way you can find out if someone is a piss-ant. I have done it before. Also, this guide will contain just main points of hacking and phreaking, not long speeches or anything. A2. Hacker's Ethics I. Do not intentionally damage *any* system. II. Do not alter any system files other than ones needed to ensure your escape from detection and your future access (Trojan Horses, Altering Logs, and the like are all necessary to your survival for as long as possible.) III. Do not leave your (or anyone else's) real name, real handle, or real phone number on any system that you access illegally. They *can* and will track you down from your handle! IV. Be careful who you share information with. Feds are getting trickier. Generally, if you don't know their voice phone number, name, and occupation or haven't spoken with them voice on non-info trading conversations, be wary. V. Do not leave your real phone number to anyone you don't know. This includes logging on boards, no matter how k-rad they seem. If you don't know the sysop, leave a note telling some trustworthy people that will validate you. VI. Do not hack government computers. Yes, there are government systems that are safe to hack, but they are few and far between. And the government has inifitely more time and resources to track you down than a company who has to make a profit and justify expenses. VII. Don't use codes unless there is *NO* way around it (you don't have a local telenet or tymnet outdial and can't connect to anything 800...) You use codes long enough, you will get caught. Period. VIII. Don't be afraid to be paranoid. Remember, you *are* breaking the law. It doesn't hurt to store everything encrypted on your hard disk, or keep your notes buried in the backyard or in the trunk of your car. You may feel a little funny, but you'll feel a lot funnier when you when you meet Bruno, your transvestite cellmate who axed his family to death. Watch what you post on boards. Most of the really great hackers in the country post *nothing* about the system they're currently working except in the broadest sense (I'm working on a UNIX, or a COSMOS, or something generic. Not "I'm hacking into General Electric's Voice Mail System" or something inane and revealing like that.) X. Don't be afraid to ask questions. That's what more experienced hackers are for. Don't expect *everything* you ask to be answered, though. There are some things (LMOS, for instance) that a begining hacker shouldn't mess with. You'll either get caught, or screw it up for others, or both. XI. Finally, you have to actually hack. You can hang out on boards all you want, and you can read all the text files in the world, but until you actually start doing it, you'll never know what it's all about. There's no thrill quite the same as getting into your first system (well, ok, I can think of a couple of bigger thrills, but you get the picture.) A3. Why do we hack? Where to start hacking Why do we hack? That is a question asked among very many people. Why do we hack? Well, I think that the simplest answer there is that we want to gain access to another computer and take control. We all love to do it. People would hang around you like you were their idol. "Can you hack for me? Can you do this? Can you change my grades?" These are some questions asked to hackers from people who don't know anything about hacking. They want you to do the work for them. That is a reason there are more newbies than actual hackers. Newbies want to be known, they want control, they want power. I love to hack, it gives me something to do when bored or just wanna have fun. Now to where to start hacking. Get yourself a good scanner and scan some prefixes and find some col dialups, then do the following: From your terminal, dial the number you found. Then you should hear a series of beeps (carrier) which tells you that you are connecting to a remote computer . It should then say something like "CONNECT 9600" and then identify the system that you are on. If nothing happens after it says "CONNECT 9600" try hitting 'ENTER' a few times. If you get a bunch of garbage, adjust your parity, data bits, stop bits, baud rate, etc., until it becomes clear. That is one way of connecting to a remote computer. Another way is through Telnet or some other large network. Telnet is a very large network that has many other networks and remote computers connected to it. Here is how you would connect to a remote computer through Telnet: First, you get your local dialup (phone number). Then you dial the number from your terminal and connect. If you get a bunch of garbage, try changing your parity to odd and your data bits to 7, this should clear it up. If it just sits there, hit 'ENTER' and wait a few seconds, then hit 'ENTER' again. Then it will say "TERMINAL=" and you type in your terminal emulation. If you don't know what it is, just hit 'ENTER'. Then it will give you a prompt that looks like "@". From there, you type "c" and then the NUA (Network User Address) that you want to connect to. After you connect to the NUA, th first thing you need to do is find out what type of system you are on (i.e. UNIX, VAX/VMS, PRIME, etc.). There are other things you can do on Telnet besides connecting to an NUA. Some of these commands and functions are listed here. You can only connect to computers which accept reverse charging. Telnet is probably the safest place to start hacking because of the large numbers of calls that they get. Make sure you call during business hours (late morning or early afternoon), so there are many other people on-line. commands Beginners probably won't use these commands, but I put them here for refrence anyway. COMMAND FUNCTION c Connect to a host stat Shows network post full Network echo half Terminal echo telemail Mail (need ID and password) mail Mail (need ID and password) set Select PAD parameters cont Continue d Disconnect hangup Hangs up access Telnet account (need ID and password) A4. Hacker's Equipment Well, to start off to hacking, you're going to need some equipment and the items listed will probably be the best you can get. -Good scanner (I recommend ToneLoc and Autoscan) -Computer (duh!) -Modem -A terminal program (like hyper terminal) -An unzipping utility (like PKZIP or Winzip. Because almost everything you download off a BBS or site will be in zipped format) A5. Hacking the Milnet Milnet is a system used by the Air Force and the Pentagon for communication use. Milnet is run out of the University of Southern California. LOGON INFO The Milnet number is 1-800-368-2217. The ISI MASTER DIAL UP is 213-306-1366. This is a more tricky logon procedure but if you have balls, you're using a trunk box , or you are just S-T-U-P-I-D. ISIE MASTER LOGON PROCEDURE:
  • call 213-306-1366
  • when the phone stops ringing, you are connected
  • enter location number (9 digits) + 1 or 0
  • hang up and it will call you
  • pick up the phone and hit the '*' on your phone
  • hit a carriage return on the computer
  • at the 'what class?' prompt, hit RETURN!!!
  • then a 'go' prompt will appear and log on as you would the 800 number. MILNET LOGIN PROCEDURE: If you're having trouble connecting, try 300 bauds instead of 1200. It's a pain in the ass, but sometimes the connection will fuck up if you don't. When the first connection as been made, you will see: 'WELCOME TO DDN. FOR OFFICIAL USE ONLY. TAC LOGIN CALL NIC 1-800-235-3155 FOR HELP WRPAT TAC 113 #:36 (you type)@o 1.103YOU ALWAYS TYPE @o then other connections are: