hacking and phreaking.doc

(168 KB) Pobierz
Hacking how-to manual for beginners

 

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

+                                                                                                                                                                            +

+       THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING    

+                                                                                                                                                                  +

+                                                                                                                                                                     +

+                                                                                                                                                                  +

+                                                                                                                                                                  +

+                                                                         BY                                                                                   +

+                                                             REVELATION                                                                                  +

+                                                                      LOA--ASH                                                                              +

+                                                                                                                                                                  +

+                                                                                                                                                                  +

+                                                                                                                                                                  +

+                                                                                                                                                                  +

+                                                                                                                                                                  +

+ Written: 08/4/96                                                                                         Volume: 1 +

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

 

 

              This document was written in Windows 95 Word Pad.  The title

above, and some of the text looks a little screwed up when read in

anything else, so read it in Word Pad.

              Anyway, for those of you who are wondering "what do the letters

"LOA" under his handle stand for?"  Well, LOA stands for Legion Of the

Apocalypse, which is a group of elite hackers and phreakers in my area. 

The current members of LOA are:

 

Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and

Phreak Show

 

              I started LOA when I discovered that there were many good

hackers and phreakers in my area.  I thought that an organized group of

hackers and phreakers would accomplish much more than an individual

could by himself.  Thus the Legion Of the Apocalypse was formed and has

been around for a while since.  Our  main goal is to show the public

what hacking and phreaking is all about and to reveal confidential

information to the hacking/phreaking community so that we can learn

more about computers, telephones, electronics, etc. We are hoping to

get our own World Wide Web page soon, so keep an eye out for it.  It

will contain all of the hacking, phreaking, computer, telephone,

security, electronics, virus, and carding information that you could

possibly want.

              Also, if some of you are wondering why I chose the word

Revelation as my handle, well, Revelation means revealing or

unveiling, which is exactly what I intend to do as a hacker/phreaker.

I intend to reveal all the information that I can gather while

hacking and phreaking.

              Anyway, I wrote this document because I have read all the files

that I could get my hands on and noticed that there has never been a

really good file written that guided beginning hackers and phreakers

step by step.

              When I began hacking and started reading all of the beginner

files, I still had many un-answered questions.  My questions were

eventually answered, but only through LOTS of reading and practice. 

In this file, I hope to give basic step by step instructions that will

help beginning hackers and phreakers get started.  But, DO NOT think

that this will save you from having to read alot.  If you want to be a

hacker/phreaker, reading is the most important thing you can do.  You

will have to do ALOT of reading no matter what.

              This document was intended for beginners, but it can also be used

as a reference tool for advanced hackers and phreakers.

              Please distribute this document freely.  Give it to anyone that

you know who is interested in hacking and/or phreaking.  Post it on your

World Wide Web page, Ftp sites, and BBS's.  Do whatever you want with it

as long as it stays UNCHANGED.

              As far as I know, this is the most complete and in depth beginners

guide available, that is why I wrote it.  Also, I plan to have new

volumes come out whenever there has been a significant change in the

material provided, so keep an eye out for them.  LOA is planning on

starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "an641839@anon.penet.fi".  

              This document is divided into three main sections with many

different sub-sections in them.  The Table Of Contents is below:

 

 

Table Of Contents:

 

 

I. HACKING

                           

                            A. What is hacking?

                            B. Why hack?

                            C. Hacking rules

                            D. Getting started

                            E. Where and how to start hacking

                            F. Telenet commands

                            G. Telenet dialups

                            H. Telenet DNIC's

                            I. Telenet NUA's

                            J. Basic UNIX hacking

                            K. Basic VAX/VMS hacking

                            L. Basic PRIME hacking

                            M. Password list

                            N. Connecting modems to different phone lines

                            O. Viruses, Trojans, and Worms

 

II. PHREAKING

 

                            A. What is phreaking?

                            B. Why phreak?

                            C. Phreaking rules

                            D. Where and how to start phreaking

                            E. Boxes and what they do

                            F. Red Box plans

                            G. Free calling from COCOT's

                            H. ANAC numbers

 

III. REFERENCE

 

                            A. Hacking and phreaking W.W.W. pages

                            B. Good hacking and phreaking text files

                            C. Hacking and phreaking Newsgroups

                            D. Rainbow Books

                            E. Hacking and phreaking magazines

                            F. Hacking and phreaking movies

                            G. Hacking and phreaking Gopher sites

                            H. Hacking and phreaking Ftp sites

                            I. Hacking and phreaking BBS's

                            J. Cool hackers and phreakers

                            K. Hacker's Manifesto

                            L. Happy hacking!

 

 

* DISCLAIMER *

 

              "Use this information at your own risk. I Revelation, nor any

other member of LOA, nor the persons providing this file, will NOT

assume ANY responsibility for the use, misuse, or abuse, of the

information provided herein. The following information is provided for

educational purposes ONLY. The informaion is NOT to be used for illegal

purposes. By reading this file you ARE AGREEING to the following terms:

I understand that using this information is illegal. I agree to, and

understand, that I am responsible for my own actions. If I get into

trouble using this information for the wrong reasons, I promise not

to place the blame on Revelation, LOA, or anyone that provided this

file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.

              This file is basically a compilation of known hacking and

phreaking information and some information gathered from my own

experience as a hacker/phreaker. I have tried to make sure that

everything excerpted from other documents was put in quotes and labeled

with the documents name, and if known, who wrote it. I am sorry if any

mistakes were made with quoted information."

 

                                                                      *-Revelation-*

                                                                           LOA

 

 

I. HACKING

 

 

A. What is hacking?

 

 

              Hacking is the act of penetrating computer systems to gain

knowledge about the system and how it works.

              Hacking is illegal because we demand free access to ALL data, and

we get it. This pisses people off and we are outcasted from society, and

in order to stay out of prison, we must keep our status of being a

hacker/phreaker a secret.  We can't discuss our findings with anyone but

other members of the hacking/phreaking community for fear of being

punished.  We are punished for wanting to learn. Why is the government

spending huge amounts of time and money to arrest hackers when there are

other much more dangerous people out there. It is the murderers,

rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers.  We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.

              There are only two ways to get rid of hackers and phreakers.

One is to get rid of computers and telephones, in which case we would

find other means of getting what we want.(Like that is really going to

happen.) The other way is to give us what we want, which is free access

to ALL information. Until one of those two things happen, we are not

going anywhere.

 

 

B. Why hack?

             

 

              As said above, we hack to gain knowledge about systems and the

way they work. We do NOT want to damage systems in any way. If you do

damage a system, you WILL get caught. But, if you don't damage

anything, it is very unlikely that you will be noticed, let alone be

tracked down and arrested, which costs a considerable amount of time

and money.

              Beginners should read all the files that they can get their

hands on about anything even remotely related to hacking and phreaking,

BEFORE they start hacking. I know it sounds stupid and boring but it

will definetly pay off in the future. The more you read about hacking

and phreaking, the more unlikely it is that you will get caught. Some

of the most useless pieces of information that you read could turn out

to be the most helpful. That is why you need to read everything

possible.

 

 

C. Hacking rules

 

 

1.              Never damage any system. This will only get you into trouble.

 

2.              Never alter any of the systems files, except for those needed to

insure that you are not detected, and those to insure that you have

access into that computer in the future.

 

3.              Do not share any information about your hacking projects with

anyone but those you'd trust with your life.

 

4.              When posting on BBS's (Bulletin Board Systems) be as vague as

possible when describing your cur...

Zgłoś jeśli naruszono regulamin