F.A.Q.
Frequently Asked Questions
Written By a Hacker For People Interested in Hacking
 
 I. HACKING

A. What is hacking?

Hacking is the act of penetrating computer systems to gainknowledge about the system and how it works.
Hacking is illegal because we demand free access to ALL data, and we get it. This pisses people off and we are outcasted from society, and in order to stay out of prison, we must keep our status of being a hacker/phreaker a secret.  We can't discuss our findings with anyone but other members of the hacking/phreaking community for fear of being punished.  We are punished for wanting to learn. Why is the governmentspending huge amounts of time and money to arrest hackers when there areother much more dangerous people out there. It is the murderers,rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers.  We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.
There are only two ways to get rid of hackers and phreakers. One is to get rid of computers and telephones, in which case we would find other means of getting what we want.(Like that is really going to happen.) The other way is to give us what we want, which is free access to ALL information. Until one of those two things happen, we are not going anywhere.

B. Why hack?

As said above, we hack to gain knowledge about systems and theway they work. We do NOT want to damage systems in any way. If you dodamage a system, you WILL get caught. But, if you don't damage anything, it is very unlikely that you will be noticed, let alone be tracked down and arrested, which costs a considerable amount of time and money.
Beginners should read all the files that they can get theirhands on about anything even remotely related to hacking and phreaking,BEFORE they start hacking. I know it sounds stupid and boring but itwill definetly pay off in the future. The more you read about hackingand phreaking, the more unlikely it is that you will get caught. Someof the most useless pieces of information that you read could turn outto be the most helpful. That is why you need to read everything possible.

C. Getting started

The very first thing you need to do is get a copy of PKZIP or some other file unzipping utility.  Nearly everything that youdownload from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip".
Then you need to get yourself a good prefix scanner.(also knownas a War Dialer)  This is a program that automatically dials phone numbers beginning with the three numbers (prefix) that you specify. It checks to see if the number dialed has a carrier.(series of beeps that tells you that you have dialed a computer)  Try and find a large business area prefix to scan. It is these businesses that have interesting computers.  There are many good scanners out there, but I would recommend Autoscan or A-Dial. These are very easy to use and get the job done quickly and efficiently.

D. Where and how to start hacking

After you get yourself a good scanner, scan some prefixes andfind some cool dialups, then do the following:  From your terminal,dial the number you found.  Then you should hear a series of beeps(carrier) which tells you that you are connecting to a remote computer.It should then say something like "CONNECT 9600" and then identify thesystem that you are on. If nothing happens after it says "CONNECT 9600"try hitting enter a few times. If you get a bunch of garbage adjust yourparity, data bits, stop bits, baud rate, etc., until it becomes clear.
That is one way of connecting to a remote computer. Another way is through Telenet or some other large network.
Telenet is a very large network that has many other networks and remote computers connected to it.
Ok, here is how you would connect to a remote computer throughTelenet:
First, you get your local dialup(phone number).  Then you dial the number from your terminal and connect.(If you get a bunch of garbage try changing your parity to odd and your data bits to 7, this should clear it up.)  If it just sits there hit enter and wait a few seconds, then hit enter again. Then it will say "TERMINAL=" and you type in your terminalemulation. If you don't know what it is just hit enter. Then it willgive you a prompt that looks like "@". From there you type "c" and thenthe NUA (Network User Address) that you want to connect to. After youconnect to the NUA, the first thing you need to do is find out what typeof system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.)
There are other things that you can do on Telenet besides connecting to an NUA. Some of these commands and functions are listed in the next section.
You can only connect to computers which accept reverse charging.The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password.
Telenet is probably the safest place to start hacking because ofthe large numbers of calls that they get. Make sure you call duringbusiness hours (late morning or early afternoon) so there are manyother people on-line.

E. Basic UNIX hacking
UNIX is probably the most commonly used operating system on Telenet, and is the easiest to hack since it doesn't record bad login attempts.  You know you've found a UNIX system when it gives you a "Login" prompt, and then a "Password" prompt. To get in you should first try the default logins.(Listed below.) If these don't work try some of the passwords listed in Section M. If these don't work try to find backdoors. These are passwords that may have been put in to allow the programmer (or someone else who could be in a position to make a backdoor) to get access into the system. These are usually not known about by anyone but the individual who made it. Try doing some research on the programmer and other people who helped to make the system. And, if these don't work, just try guessing them. The Login (usually the account holders name) has 1-8 characters and the Password is 6-8 characters. Both can be either letters or numbers, or a combination of the two.
Once you get in, you should get a "$" prompt, or some other special character like it. You should only use lower case letters when hacking UNIX, this seems to be standard format. If you type "man [command" at the prompt, it should list all of the commands for that system. Anyway, here are the default Logins and Passwords:
Login:
Password:root

ootroot

systemsys

syssys

systemdaemon

daemonuucp

uucptty

ttytest

testunix

unixunix

testbin

binadm

admadm

adminadmin

admadmin

adminsysman

sysmansysman

syssysman

systemsysadmin

sysadminsysadmin

syssysadmin

systemsysadmin

adminsysadmin

admwho

wholearn

learnuuhost

uuhostguest

guesthost

hostnuucp

nuucprje

rjegames

gamesgames

playersysop

sysoproot

sysopdemo

demo

Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things:/etc/passwdorcat /etc/passwd
The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this:john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john

Broken down, this is what the above password file states:Username: johnEncrypted Password: 234abc56User Number: 9999Group Number: 13Other Information: John JohnsonHome Directory: /home/dir/johnShell: /bin/john
If the password file does not show up under one of the above two commands, then it is probably shadowed.
The following definition of password shadowing was taken from the alt.2600 hack faq:
"Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users."
If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using:UNIX System Type:

Path:

Token:AIX 3

/etc/security/passwd

   ! or

/tcb/auth/files/<first letter of
   #

username>/<username>A/UX 3.Os

/tcb/files/auth/*BSD4.3-Reno

/etc/master.passwd

   *ConvexOS 10

/etc/shadpw

   *Convex0S 11

/etc/shadow

   *DG/UX

/etc/tcb/aa/user

   *EP/IX

/etc/shadow

   xHP-UX

/.secure/etc/passwd

   *IRIX 5

/etc/shadow

   xLinux 1.1

/etc/shadow

   *OSF/1

/etc/passwd[.dir|.pag

   *SCO UNIX #.2.x

/tcb/auth/files/<first letter of
   *

username>/<username>SunOS 4.1+c2

/etc/security/passwd.adjunct

   ##SunOS 5.0

/etc/shadow

   System V 4.0

/etc/shadow

   xSystem V 4.2

/etc/security/* database

   Ultrix 4

/etc/auth[.dir|.pag

   *UNICOS

/etc/udb

   *
Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data:bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob
The characters in the password aging data stand for the following:1. Maximum number of weeks a password can be used without changing.2. Minimum number of weeks a password must be used before being changed.3&4. Last time password was changed, in number of weeks since 1970.
The password aging data can be decoded using the chart below:Character:
 

Number:.

0/

10

21

32

43

54

65

76

87

98

109

11A

12B

13C

14D

15E

16F

17G

18H

19I

20J

21K

22L

23M

24N

25O

26P

27Q

28R

29S

30T

31U

32V

33W

34X

36Z

37a

38b

39c

40d

41e

42f

43g

44h

45i

46j

47k

48l

49m

50n

51o

52p

53q

54r

55s

56t

57u

58v

59w

60x

61y

62z

63
Now, explore the system freely, be careful, and have fun!

K. Basic VAX/VMS hacking
The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's:Username:

Password:SYSTEM

OPERATORSYSTEM

MANAGERSYSTEM

SYSTEMSYSTEM

SYSLIBOPERATOR

OPERATORSYSTEST

UETPSYSTEST

SYSTESTSYSTEST

TESTSYSMAINT

SYSMAINTSYSMAINT

SERVICESYSMAINT

DIGITALFIELD

FIELDFIELD

SERVICEGUEST

GUESTGUEST

unpasswordedDEMO

DEMODEMO

unpasswordedTEST

TESTDECNET

DECNET

Here are some of the VAX/VMS commands:Command:

Function:HELP (H)

Gives help and list of commands.TYPE (T)

View contents of a file.RENAME (REN)

Change name of a file.PURGE (PU)
 
Deletes old versions of a file.PRINT (PR)

Prints a file.DIRECTORY (DIR)

Shows list of files.DIFFERENCES
(DIF)

Shows differences between files.CREATE (CR)

Creates a file.DELETE (DEL)

Deletes a file.COPY (COP)

Copy a file to another.CONTINUE (C)

Continues session.

The password file on VAX's are available when you type in the command:SYS$SYSTEM:SYSUAF.DAT
The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J.
Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced.
But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts.

L. Basic PRIME hacking

PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN <USERNAME>". It should then ask you for your username and password. The default usernames and passwords are listed below:Username:

Password:PRIME

PRIMEPRIME

PRIMOSPRIMOS

PRIMOSPRIMOS

PRIMEPRIMOS_CS

PRIMEPRIMOS_CS

PRIMOSPRIMENET

PRIMENETSYSTEM

SYSTEMSYSTEM

PRIMESYSTEM

PRIMOSNETLINK

NETLINKTEST

TESTGUEST

GUESTGUEST1

GUEST
When you are inside the system, type "NETLINK" and it ahould give you alot of help. This system uses NUA's, too. I might print these in the next volume.M. Password List
The password list was taken from A Novice's Guide To Hacking, by The Legion Of Doom, and from some of my own discoveries. Here is the list of commonly used passwords:Password:aaaacademiaadaadrianaerobicsairplanealbanyalbatrossalbertalexalexanderalgebraaliasalisaalphaalphabetamaamyanaloganchorandyandreaanimalansweranythingarrowarthurassassholeathenaatmospherebacchusbadassbaileybananabanditbanksbassbatmanbeautifulbeautybeaverdanieldannydavedebdebbiedeborahdecemberdesiredesperatedevelopdietdigitaldiscoverydisneydogdroughtduncaneasyeatmeedgesedwineggheadeileeneinsteinelephantelizabethellenemeraldengineengineerenterpriseenzymeeuclidevelynextensionfairwayfeliciafenderfiniteformatgodhelloidiotjesterjohnjohnnyjosephjoshuajudithjugglejuliakathleenkermitkernelknightlambdalarrylazarusleeleroylewislightlisalouislovelynnemacmacintoshmackmaggotmagicmalcolmmarkmarkusmartinmartymarvinmattmastermauricemaximummerlinmetsmichaelmichellemikeminimumnickinicolerascalreallyrebeccaremoterickreaganrobotroboticsrolexronaldroserosebudrosemaryrosesrubenrulesruthsalsaxonschemescottsecretsensorserenitysexsharksharonshitshivashuttlesimonsimplesingersinglesingingsmilesmoochsmothersnatchsnoopysoapsocratesspitspringsubwaysuccesssummersupersupportsurfersuzannetangerinetapetargettaylortelephonetemptationtigertiggertoggletomatotoyotatrivialunhappyunicornunknownurchinutilityvickivirginvirginiawarrenwaterweeniewhatnotwhitneywillwilliamwinstonwilliewizardwonbatyosemitezapN. Connecting modems to different phone lines
 

Ok, if you are really paranoid (or smart) and you don't want to hack from your house for fear of getting caught, you can hook up your modem to other peoples phone lines or to payphones.
If you want to hook your modem to a payphone, do it late at night and at a very secluded payphone. Look along either side of the phone. You should see a small metal tube (which contains the telephone wires) running along the wall. Somewhere along the tube it should widen out into a small box. Pop off the boxes lid and there is a nice little phone jack for ya'. Taking off the lid may be difficult because they are usually pretty secure, but nothing is impossible, so keep trying. Of course, you can only do this with a lap-top computer.
Now, if you want to hook up the modem to someone's house or appartment phone line, you need to get a pair of red and green alligator clips, and an extra modem cord for your lap-top.
After you get those parts, cut the plastic end off of your modem cord and you will see a red wire, a green wire, and two other wires, but you can ignore those. Attach the red alligator clip to the red wire, and attach the green alligator clip to the green wire and you're all set. Now all you need to do is go find a telephone pole or one of those small green boxes that stick out of the ground.(They should have a Bell Systems logo on them.)
On a telephone pole open the little box that has a bunch of wires going to and from it. On the right side of the box you should see what look like two large screws.(These are called "terminals".) One should have a red wire wrapped around it and the other should have a green wire wrapped around it. Attach the red alligator clip the the red wire and the green alligator clip to the green wire, and you're all set. This should get you a dial tone. If it doesn't, make sure that the alligator clips are not touching each other, and that the alligator clips are attached to the exposed end of the wire.
Now, on those green boxes you need to undo all of the screws and shit holding the lid on, and open it up. Then you should find basically the same setup as in the telephone pole. Attach the appropriate wires to the appropriate terminals and you are all set.
This process can also be used to hook up a Beige Box (Lineman's Handset.) when phreaking.O. Viruses, Trojans, and Worms
Just in case some of you are interested, here are the definitions for Viruses, Trojans, and Worms.  These definitions were taken from the alt.2600 hack faq.Trojan:
"Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans."Virus:
"A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore."Worm:
"Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."
REFERENCE

A. Good hacking and phreaking text files
All of these files are available by download from the Internet.
File Name:A Novice's Guide To Hacking
Alt.2600
Hack Faq
The Hacker's Handbook
The Official Phreaker's ManualRainbow Books
The Hacker Crackdown
Computer Hackers: Rebels With A Cause
The Legion Of Doom
Technical Journals

B. Hacking and phreaking Newsgroups
alt.2600
alt.2600.hope.techalt.cellular
alt.cellular-phone
techalt.comp.virus
alt.cracks
alt.cyberpunkalt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.maliciousalt.security

C. Rainbow Books

The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:Infosec Awareness DivisionATTN: x711/IAOCFort George G. Meade, MD 20755-6000or call:(410)766-8729

Here is the list of all the Rainbow Books and their descriptions:Color:

Description:Orange 1

D.O.D. Trusted Computer SystemsGreen

D.O.D. Password ManagementYellow

Computer Security RequirementsYellow 2

Computer Security RequirementsTan

Understanding Audit In Trusted SystemsBright Blue

Trusted Product EvaluationNeon Orange

Understanding Discretionary AccessTeal Green

Glossary Of Computer TermsOrange 2

Understanding ConfigurationsRed

Interpretation Of EvaluationBurgundy

Understanding Design DocumentationDark Lavender

Understanding Trusted DistrobutionVenice Blue

Computer Security Sub-SystemsAqua

Understanding Security ModelingDark Red

Interpretations Of EnvironmentsPink

Rating Maintenence PhasePurple

Formal Verification SystemsBrown

Understanding Trusted FacilitiesYellow-Green

Writing Trusted Facility ManualsLight Blue

Understanding Identification And

Authentication In Trusted SystemsBlue

Product Evaluation QuestionaireGray

Selecting Access Control ListLavander

Data Base Management InterpretationYellow 3

Understanding Trusted RecoveryBright Orange

Understanding Security TestingPurple 1

Guide To System ProcurementPurple 2

Guide To System ProcurementPurple 3

Guide To System ProcurementPurple 4

Guide To System ProcurementGreen

Understanding Data RemanenceHot Peach

Writing Security FeaturesTurquiose

Understanding Information Security

Violet

Controlled Access Protection Light Pink

Understanding Covert Channels

D. Cool hacking and phreaking magazines

Phrack Magazine

2600 Magazine

Tap Magazine

Phantasy Magazine

E. Hacking and phreaking movies

Movie:Hackers

War Games

G. Hacking and phreaking Gopher sites
Address:ba.comcsrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.orgoss.netspy.org
wiretap.spies.comH.

Hacking and phreaking Ftp sitesAddress:
2600.comagl.gatech.edu/pub
asylum.sf.ca.usclark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrackftp.giga.or.at/pub/hackerftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/macftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge

H. Hacking and phreaking BBS's
BBS's are Bulletin Board Systems on which hackers and phreakers can post messages to each other.
Here is a list of some BBS's that I know of. If you know of any other BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note that some of these may be old and not running.Area Code:

Phone Number:

Name:203-832-8441

Rune Stone2104-93-9975

The Truth Sayer's Domain303-343-4053

Hacker's Haven315-656-5135

Independent Nation315-656-5135

UtOPiA617-855-2923

Maas-Neotek708-676-9855

Apocalypse 2000-713-579-2276

KOdE AbOdE806-747-0802

Static Line908-526-4384

Area 51502-499-8933

Blitzkrieg510-935-5845

Screaming Electron408-747-0778

The Shrine708-459-7267

The Hell Pit415-345-2134

Castle Brass415-697-1320
 
 

Written by:  LOA--ASH