A. What is hacking?
Hacking is the act of penetrating computer systems to gainknowledge
about the system and how it works.
Hacking is illegal because we demand free access to ALL data, and we
get it. This pisses people off and we are outcasted from society, and in
order to stay out of prison, we must keep our status of being a hacker/phreaker
a secret. We can't discuss our findings with anyone but other members
of the hacking/phreaking community for fear of being punished. We
are punished for wanting to learn. Why is the governmentspending huge amounts
of time and money to arrest hackers when there areother much more dangerous
people out there. It is the murderers,rapists, terrorists, kidnappers,
and burglers who should be punished for what they have done, not hackers.
We do NOT pose a threat to anyone. We are NOT out to hurt people or there
computers. I admit that there are some people out there who call themselves
hackers and who deliberately damage computers. But these people are criminals,
NOT hackers. I don't care what the government says, we are NOT criminals.
We are NOT trying to alter or damage any system. This is widely misunderstood.
Maybe one day people will believe us when we say that all we want is to
learn.
There are only two ways to get rid of hackers and phreakers. One is
to get rid of computers and telephones, in which case we would find other
means of getting what we want.(Like that is really going to happen.) The
other way is to give us what we want, which is free access to ALL information.
Until one of those two things happen, we are not going anywhere.
B. Why hack?
As said above, we hack to gain knowledge about systems and theway they
work. We do NOT want to damage systems in any way. If you dodamage a system,
you WILL get caught. But, if you don't damage anything, it is very unlikely
that you will be noticed, let alone be tracked down and arrested, which
costs a considerable amount of time and money.
Beginners should read all the files that they can get theirhands on
about anything even remotely related to hacking and phreaking,BEFORE they
start hacking. I know it sounds stupid and boring but itwill definetly
pay off in the future. The more you read about hackingand phreaking, the
more unlikely it is that you will get caught. Someof the most useless pieces
of information that you read could turn outto be the most helpful. That
is why you need to read everything possible.
C. Getting started
The very first thing you need to do is get a copy of PKZIP or some other
file unzipping utility. Nearly everything that youdownload from the
Internet or from a BBS will be zipped. A zipped file is a file that has
been compressed. Zipped files end with the extension ".zip".
Then you need to get yourself a good prefix scanner.(also knownas a
War Dialer) This is a program that automatically dials phone numbers
beginning with the three numbers (prefix) that you specify. It checks to
see if the number dialed has a carrier.(series of beeps that tells you
that you have dialed a computer) Try and find a large business area
prefix to scan. It is these businesses that have interesting computers.
There are many good scanners out there, but I would recommend Autoscan
or A-Dial. These are very easy to use and get the job done quickly and
efficiently.
D. Where and how to start hacking
After you get yourself a good scanner, scan some prefixes andfind some
cool dialups, then do the following: From your terminal,dial the
number you found. Then you should hear a series of beeps(carrier)
which tells you that you are connecting to a remote computer.It should
then say something like "CONNECT 9600" and then identify thesystem that
you are on. If nothing happens after it says "CONNECT 9600"try hitting
enter a few times. If you get a bunch of garbage adjust yourparity, data
bits, stop bits, baud rate, etc., until it becomes clear.
That is one way of connecting to a remote computer. Another way is
through Telenet or some other large network.
Telenet is a very large network that has many other networks and remote
computers connected to it.
Ok, here is how you would connect to a remote computer throughTelenet:
First, you get your local dialup(phone number). Then you dial
the number from your terminal and connect.(If you get a bunch of garbage
try changing your parity to odd and your data bits to 7, this should clear
it up.) If it just sits there hit enter and wait a few seconds, then
hit enter again. Then it will say "TERMINAL=" and you type in your terminalemulation.
If you don't know what it is just hit enter. Then it willgive you a prompt
that looks like "@". From there you type "c" and thenthe NUA (Network User
Address) that you want to connect to. After youconnect to the NUA, the
first thing you need to do is find out what typeof system you are on.(i.e.
UNIX, VAX/VMS, PRIME, etc.)
There are other things that you can do on Telenet besides connecting
to an NUA. Some of these commands and functions are listed in the next
section.
You can only connect to computers which accept reverse charging.The
only way you can connect to computers that don't accept reverse charging
is if you have a Telenet account. You can try hacking these. To do this,
at the "@" prompt type "access". It will then ask you for your Telenet
ID and password.
Telenet is probably the safest place to start hacking because ofthe
large numbers of calls that they get. Make sure you call duringbusiness
hours (late morning or early afternoon) so there are manyother people on-line.
E. Basic UNIX hacking
UNIX is probably the most commonly used operating system on Telenet,
and is the easiest to hack since it doesn't record bad login attempts.
You know you've found a UNIX system when it gives you a "Login" prompt,
and then a "Password" prompt. To get in you should first try the default
logins.(Listed below.) If these don't work try some of the passwords listed
in Section M. If these don't work try to find backdoors. These are passwords
that may have been put in to allow the programmer (or someone else who
could be in a position to make a backdoor) to get access into the system.
These are usually not known about by anyone but the individual who made
it. Try doing some research on the programmer and other people who helped
to make the system. And, if these don't work, just try guessing them. The
Login (usually the account holders name) has 1-8 characters and the Password
is 6-8 characters. Both can be either letters or numbers, or a combination
of the two.
Once you get in, you should get a "$" prompt, or some other special
character like it. You should only use lower case letters when hacking
UNIX, this seems to be standard format. If you type "man [command" at the
prompt, it should list all of the commands for that system. Anyway, here
are the default Logins and Passwords:
Login:
Password:root
ootroot
systemsys
syssys
systemdaemon
daemonuucp
uucptty
ttytest
testunix
unixunix
testbin
binadm
admadm
adminadmin
admadmin
adminsysman
sysmansysman
syssysman
systemsysadmin
sysadminsysadmin
syssysadmin
systemsysadmin
adminsysadmin
admwho
wholearn
learnuuhost
uuhostguest
guesthost
hostnuucp
nuucprje
rjegames
gamesgames
playersysop
sysoproot
sysopdemo
demo
Once you are in, the first thing that you need to do is save the password
file to your hard drive or to a disk. The password file contains the Logins
and Passwords. The passwords are encoded. To get the UNIX password file,
depending on what type of UNIX you are in, you can type one of the following
things:/etc/passwdorcat /etc/passwd
The first one is the standard command, but there are other commands
as well, like the second one. Once you get the password file, it should
look like this:john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john
Broken down, this is what the above password file states:Username: johnEncrypted
Password: 234abc56User Number: 9999Group Number: 13Other Information: John
JohnsonHome Directory: /home/dir/johnShell: /bin/john
If the password file does not show up under one of the above two commands,
then it is probably shadowed.
The following definition of password shadowing was taken from the alt.2600
hack faq:
"Password shadowing is a security system where the encrypted password
field is replaced with a special token and the encrypted password is stored
in a seperate file which is not readable by normal system users."
If the password file is shadowed, you can find it in one of the following
places, depending on the type of UNIX you are using:UNIX System Type:
Path:
Token:AIX 3
/etc/security/passwd
! or
/tcb/auth/files/<first letter of
#
username>/<username>A/UX 3.Os
/tcb/files/auth/*BSD4.3-Reno
/etc/master.passwd
*ConvexOS 10
/etc/shadpw
*Convex0S 11
/etc/shadow
*DG/UX
/etc/tcb/aa/user
*EP/IX
/etc/shadow
xHP-UX
/.secure/etc/passwd
*IRIX 5
/etc/shadow
xLinux 1.1
/etc/shadow
*OSF/1
/etc/passwd[.dir|.pag
*SCO UNIX #.2.x
/tcb/auth/files/<first letter of
*
username>/<username>SunOS 4.1+c2
/etc/security/passwd.adjunct
##SunOS 5.0
/etc/shadow
System V 4.0
/etc/shadow
xSystem V 4.2
/etc/security/* database
Ultrix 4
/etc/auth[.dir|.pag
*UNICOS
/etc/udb
*
Some passwords can only be used for a certain amount of time without
having to be changed, this is called password aging. In the password file
example below, the "C.a4" is the password aging data:bob:123456,C.a4:6348:45:Bob
Wilson:/home/dir/bob:/bin/bob
The characters in the password aging data stand for the following:1.
Maximum number of weeks a password can be used without changing.2. Minimum
number of weeks a password must be used before being changed.3&4. Last
time password was changed, in number of weeks since 1970.
The password aging data can be decoded using the chart below:Character:
Number:.
0/
10
21
32
43
54
65
76
87
98
109
11A
12B
13C
14D
15E
16F
17G
18H
19I
20J
21K
22L
23M
24N
25O
26P
27Q
28R
29S
30T
31U
32V
33W
34X
36Z
37a
38b
39c
40d
41e
42f
43g
44h
45i
46j
47k
48l
49m
50n
51o
52p
53q
54r
55s
56t
57u
58v
59w
60x
61y
62z
63
Now, explore the system freely, be careful, and have fun!
K. Basic VAX/VMS hacking
The VAX system runs the VMS (Virtual Memory System) operating system.
You know that you have a VAX system when you get a "username" prompt. Type
in capital letters, this seems to be standard on VAX's. Type "HELP" and
it gives you all of the help that you could possibly want. Here are the
default usernames and passwords for VAX's:Username:
Password:SYSTEM
OPERATORSYSTEM
MANAGERSYSTEM
SYSTEMSYSTEM
SYSLIBOPERATOR
OPERATORSYSTEST
UETPSYSTEST
SYSTESTSYSTEST
TESTSYSMAINT
SYSMAINTSYSMAINT
SERVICESYSMAINT
DIGITALFIELD
FIELDFIELD
SERVICEGUEST
GUESTGUEST
unpasswordedDEMO
DEMODEMO
unpasswordedTEST
TESTDECNET
DECNET
Here are some of the VAX/VMS commands:Command:
Function:HELP (H)
Gives help and list of commands.TYPE (T)
View contents of a file.RENAME (REN)
Change name of a file.PURGE (PU)
Deletes old versions of a file.PRINT (PR)
Prints a file.DIRECTORY (DIR)
Shows list of files.DIFFERENCES
(DIF)
Shows differences between files.CREATE (CR)
Creates a file.DELETE (DEL)
Deletes a file.COPY (COP)
Copy a file to another.CONTINUE (C)
Continues session.
The password file on VAX's are available when you type in the command:SYS$SYSTEM:SYSUAF.DAT
The password file on most VAX's are usually not available to normal
system users, but try it anyway. If the default logins don't work, use
the same means of finding one as stated in Section J.
Be VERY careful when hacking VAX's becuase they record every bad login
attempt. They are sometimes considered one of the most secure systems.
Because of this, I advise not to try hacking these until you are more advanced.
But, when you are an advanced hacker, or if you are already an advanced
hacker, I advise that you try a few passwords at a time and then wait and
try a few more the next day and so on, because when the real user logs
on it displays all of the bad login attempts.
L. Basic PRIME hacking
PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN <USERNAME>". It should then ask you for your username and password. The default usernames and passwords are listed below:Username:
Password:PRIME
PRIMEPRIME
PRIMOSPRIMOS
PRIMOSPRIMOS
PRIMEPRIMOS_CS
PRIMEPRIMOS_CS
PRIMOSPRIMENET
PRIMENETSYSTEM
SYSTEMSYSTEM
PRIMESYSTEM
PRIMOSNETLINK
NETLINKTEST
TESTGUEST
GUESTGUEST1
GUEST
When you are inside the system, type "NETLINK" and it ahould give you
alot of help. This system uses NUA's, too. I might print these in the next
volume.M. Password List
The password list was taken from A Novice's Guide To Hacking, by The
Legion Of Doom, and from some of my own discoveries. Here is the list of
commonly used passwords:Password:aaaacademiaadaadrianaerobicsairplanealbanyalbatrossalbertalexalexanderalgebraaliasalisaalphaalphabetamaamyanaloganchorandyandreaanimalansweranythingarrowarthurassassholeathenaatmospherebacchusbadassbaileybananabanditbanksbassbatmanbeautifulbeautybeaverdanieldannydavedebdebbiedeborahdecemberdesiredesperatedevelopdietdigitaldiscoverydisneydogdroughtduncaneasyeatmeedgesedwineggheadeileeneinsteinelephantelizabethellenemeraldengineengineerenterpriseenzymeeuclidevelynextensionfairwayfeliciafenderfiniteformatgodhelloidiotjesterjohnjohnnyjosephjoshuajudithjugglejuliakathleenkermitkernelknightlambdalarrylazarusleeleroylewislightlisalouislovelynnemacmacintoshmackmaggotmagicmalcolmmarkmarkusmartinmartymarvinmattmastermauricemaximummerlinmetsmichaelmichellemikeminimumnickinicolerascalreallyrebeccaremoterickreaganrobotroboticsrolexronaldroserosebudrosemaryrosesrubenrulesruthsalsaxonschemescottsecretsensorserenitysexsharksharonshitshivashuttlesimonsimplesingersinglesingingsmilesmoochsmothersnatchsnoopysoapsocratesspitspringsubwaysuccesssummersupersupportsurfersuzannetangerinetapetargettaylortelephonetemptationtigertiggertoggletomatotoyotatrivialunhappyunicornunknownurchinutilityvickivirginvirginiawarrenwaterweeniewhatnotwhitneywillwilliamwinstonwilliewizardwonbatyosemitezapN.
Connecting modems to different phone lines
Ok, if you are really paranoid (or smart) and you don't want to hack
from your house for fear of getting caught, you can hook up your modem
to other peoples phone lines or to payphones.
If you want to hook your modem to a payphone, do it late at night and
at a very secluded payphone. Look along either side of the phone. You should
see a small metal tube (which contains the telephone wires) running along
the wall. Somewhere along the tube it should widen out into a small box.
Pop off the boxes lid and there is a nice little phone jack for ya'. Taking
off the lid may be difficult because they are usually pretty secure, but
nothing is impossible, so keep trying. Of course, you can only do this
with a lap-top computer.
Now, if you want to hook up the modem to someone's house or appartment
phone line, you need to get a pair of red and green alligator clips, and
an extra modem cord for your lap-top.
After you get those parts, cut the plastic end off of your modem cord
and you will see a red wire, a green wire, and two other wires, but you
can ignore those. Attach the red alligator clip to the red wire, and attach
the green alligator clip to the green wire and you're all set. Now all
you need to do is go find a telephone pole or one of those small green
boxes that stick out of the ground.(They should have a Bell Systems logo
on them.)
On a telephone pole open the little box that has a bunch of wires going
to and from it. On the right side of the box you should see what look like
two large screws.(These are called "terminals".) One should have a red
wire wrapped around it and the other should have a green wire wrapped around
it. Attach the red alligator clip the the red wire and the green alligator
clip to the green wire, and you're all set. This should get you a dial
tone. If it doesn't, make sure that the alligator clips are not touching
each other, and that the alligator clips are attached to the exposed end
of the wire.
Now, on those green boxes you need to undo all of the screws and shit
holding the lid on, and open it up. Then you should find basically the
same setup as in the telephone pole. Attach the appropriate wires to the
appropriate terminals and you are all set.
This process can also be used to hook up a Beige Box (Lineman's Handset.)
when phreaking.O. Viruses, Trojans, and Worms
Just in case some of you are interested, here are the definitions for
Viruses, Trojans, and Worms. These definitions were taken from the
alt.2600 hack faq.Trojan:
"Remember the Trojan Horse? Bad guys hid inside it until they could
get into the city to do their evil deed. A Trojan computer program is similiar.
It is a program which does an unauthorized function, hidden inside an authorized
program. It does something other than it claims to do, usually something
malicious (although not necessarily!), and it is intended by the author
to do whatever it does. If it is not intentional, it is called a bug or,
in some cases, a feature :) Some Virus scanning programs detect some Trojans.
Some scanning programs don't detect any Trojans. No Virus scanners detect
all Trojans."Virus:
"A Virus is an independent program which reproduces itself. It may
attach itself to other programs, it may create copies of itself (as in
companion Viruses). It may damage or corrupt data, change data, or degrade
the performance of your system by utilizing resources such as memory or
disk space. Some Viruse scanners detect some Viruses. No Virus scanners
detect all Viruses. No Virus scanner can protect against any and all Viruses,
known and unknown, now and forevermore."Worm:
"Made famous by Robert Morris, Jr., Worms are programs which reproduce
by copying themselves over and over, system to system, using up resources
and sometimes slowing down the system. They are self contained and use
the networks to spread, in much the same way that Viruses use files to
spread. Some people say the solution to Viruses and worms is to just not
have any files or networks. They are probably correct. We could include
computers."
REFERENCE
A. Good hacking and phreaking text files
All of these files are available by download from the Internet.
File Name:A Novice's Guide To Hacking
Alt.2600
Hack Faq
The Hacker's Handbook
The Official Phreaker's ManualRainbow Books
The Hacker Crackdown
Computer Hackers: Rebels With A Cause
The Legion Of Doom
Technical Journals
B. Hacking and phreaking Newsgroups
alt.2600
alt.2600.hope.techalt.cellular
alt.cellular-phone
techalt.comp.virus
alt.cracks
alt.cyberpunkalt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.maliciousalt.security
C. Rainbow Books
The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:Infosec Awareness DivisionATTN: x711/IAOCFort George G. Meade, MD 20755-6000or call:(410)766-8729
Here is the list of all the Rainbow Books and their descriptions:Color:
Description:Orange 1
D.O.D. Trusted Computer SystemsGreen
D.O.D. Password ManagementYellow
Computer Security RequirementsYellow 2
Computer Security RequirementsTan
Understanding Audit In Trusted SystemsBright Blue
Trusted Product EvaluationNeon Orange
Understanding Discretionary AccessTeal Green
Glossary Of Computer TermsOrange 2
Understanding ConfigurationsRed
Interpretation Of EvaluationBurgundy
Understanding Design DocumentationDark Lavender
Understanding Trusted DistrobutionVenice Blue
Computer Security Sub-SystemsAqua
Understanding Security ModelingDark Red
Interpretations Of EnvironmentsPink
Rating Maintenence PhasePurple
Formal Verification SystemsBrown
Understanding Trusted FacilitiesYellow-Green
Writing Trusted Facility ManualsLight Blue
Understanding Identification And
Authentication In Trusted SystemsBlue
Product Evaluation QuestionaireGray
Selecting Access Control ListLavander
Data Base Management InterpretationYellow 3
Understanding Trusted RecoveryBright Orange
Understanding Security TestingPurple 1
Guide To System ProcurementPurple 2
Guide To System ProcurementPurple 3
Guide To System ProcurementPurple 4
Guide To System ProcurementGreen
Understanding Data RemanenceHot Peach
Writing Security FeaturesTurquiose
Understanding Information Security
Violet
Controlled Access Protection Light Pink
Understanding Covert Channels
D. Cool hacking and phreaking magazines
Phrack Magazine
2600 Magazine
Tap Magazine
Phantasy Magazine
E. Hacking and phreaking movies
Movie:Hackers
War Games
G. Hacking and phreaking Gopher sites
Address:ba.comcsrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.orgoss.netspy.org
wiretap.spies.comH.
Hacking and phreaking Ftp sitesAddress:
2600.comagl.gatech.edu/pub
asylum.sf.ca.usclark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrackftp.giga.or.at/pub/hackerftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/macftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge
H. Hacking and phreaking BBS's
BBS's are Bulletin Board Systems on which hackers and phreakers can
post messages to each other.
Here is a list of some BBS's that I know of. If you know of any other
BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note
that some of these may be old and not running.Area Code:
Phone Number:
Name:203-832-8441
Rune Stone2104-93-9975
The Truth Sayer's Domain303-343-4053
Hacker's Haven315-656-5135
Independent Nation315-656-5135
UtOPiA617-855-2923
Maas-Neotek708-676-9855
Apocalypse 2000-713-579-2276
KOdE AbOdE806-747-0802
Static Line908-526-4384
Area 51502-499-8933
Blitzkrieg510-935-5845
Screaming Electron408-747-0778
The Shrine708-459-7267
The Hell Pit415-345-2134
Castle Brass415-697-1320
Written by: LOA--ASH