💾 Archived View for spam.works › mirrors › textfiles › hacking › icebook2.txt captured on 2023-11-04 at 13:22:42.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-



                -(Exploring the further regions of experience...)-

      
       ###################################################################
       ##        _____________        __________         __________     ##
       ##       /____    ____/\      /   ______/\       /   ______/\    ##
       ##       \__ /   /\___\/     /   /\_____\/      /   /\_____\/    ##
       ##          /   / /         /   / /            /   /_/___        ##
       ##         /   / /         /   / /            /   ______/\       ##
       ##        /   / /         /   / /            /   /\_____\/       ##
       ##   ____/   /_/__       /   /_/____        /   /_/____          ##
       ##  /____________/\     /__________/\      /__________/\         ##
       ##  \____________\/     \__________\/      \__________\/         ##
       ##                                                               ##
       #######            Headquarters: (416) 934-4055             #######
            ##                                                     ##
            #########################################################
            ##        INNER CIRCLE ELITES (ICE) Presents:          ##
            ##  -- The Guide to Hacking & Phreaking [Issue #2] --  ## 
            ##                  by Liquid Jesus                    ##
            #########################################################


_______CONTENTS___________________________________________________________

PART I.......Introduction
PART II......PHreak PHile Extract (Guidelines by The Mentor - LOD/H)
PART III.....Datapac, PADs, and X.25
PART IV......DNIC Listing
PART V.......NUA Examples (Extracted from PHrack vol.3 issue 27)
PART VI......Questions & Answers
PART VII.....End of Transmission
__________________________________________________________________________


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
            ______   ______    ______   _________       _______
           |  __  | |  __  |  |  ___ \ |___   ___|     |_______|
           | |__| | | |  | |  | |__/ /     | |            | | 
           |   ___| | |__| |  |     /      | |            | | 
           |  |     |  __  |  | |\  \      | |          __|_|__
           |__|     |_|  |_|  |_| \__\     |_|         |_______|

                          -+- Introduction -+-


	First off I want to thank all the people who left me feedback
after the release of the first issue.  It's a hellova lot easier to talk
about things people ask about then by picking stuff out of the blue.  It's
only been a couple of days since I finished the first issue but the great
response has prompted me to get my ass hauling an the second.  This issue
will probably have a *large* Q&A section but I'll try and limit the ones I
answer to the ones being most important.  Most people who leave me
feedback on my BBS will have their questions answered in this guide and
I'll have their name at the beginning of the question.  If you ask me
something and you feel it's just such a dumb question that you don't want
to be labelled as the one who asked it, just tell me and I'll change you
to "anonymous".
 
	Ok, I *was* planning on getting into new aspects of h/ping this
issue (credit card fraud, how an NUAs and X.25 works, details about
specific systems, etc..) but most of the feedback I've recieved so far
has had to do with either 800 services and Datapac.  Another large area of
concern is the risk of getting caught.  Well, I'm not going to lie to
anyone... law enforcement is a LOT tougher on phreaks then on pirates. 
With pirating they figure "Ok, the guy probably wouldn't have bought the
game in the first place anyways so it's not like the company is LOOSING
money because he made a copy for himself".  Also, it's a lot more
widespread.  Hack/Phreaks charge money *directly* to places such as
telephone companies and other pay services.  They can get into the corners
of large systems and read about someones personal data until they find it
time to have some fun and start changing things.  When people start
feeling insecure about their own private belongings, they find it VERY
easy to slam the person who made them feel this way.  You've probably
already heard numerous stories about hackers being caught and charged with
computer crimes.  "Computer hackers crack credit codes", "Israeli hacker
cracks military, credit codes", "Fone Phreaks charge millions in unpaid
bills", etc, etc...  it's no longer just the 95% average "nerd with taped
glasses" doing it.  So how do you manage to stay out of trouble?  Well
that's easy, be cautious.  If you find something new you haven't seen
before, ask an experience hacker if it's safe to use.  Also, keep a low
profile.  So what if you feel great about cracking your first system. 
Keep your discussions to h/p-designated BBS's and don't start blabbing
specifics to people you don't know.  Instead of saying "I just got into
General Motors VAX mainframe" you could limit it to "I just hacked a big
VAX" or something.  Just watch what you say.  

	As for what you CAN use, just about anything that someone else
says.  Someone will tell you if something isn't safe, and if it isn't most
of the time they'll also tell you how to use it without getting in di-hoe.
Generally, everything is safe that is posted to the public (eg: on
Alliance, VMB's, BBS's, chat lines, etc..).  Someone also asked me if ALL
950's were unsafe.  Ok, here's the definition of a 950 from the PHreak's
Glossary:

     950  -  (pronounced nine-five-oh, not nine-fifty)  A  nationwide  access
             exchange in most areas. Many LD companies have  extenders 
             located somewhere on this exchange; however, all services on
             this  exchange  are  considered dangerous due to the fact that
             they ALL have the ability to trace. Most 950 services have 
             crystal clear connections.
  
	All 950's have the number 800-950-xxxx (the prefix is 950 hence
it's name.. duhh).  Not ALL are unsafe but there are more unsafe 950's
then other forms of 800 services.  As I said before, you'll hear if one
isn't safe.

	Another thing, before we get started, someone asked me to name
some things that would be good for beginner hackers to start on.  Things
that are very safe.  Well...

(1) university/colledge computers: most have relatively low external
    security and don't keep logs of unsuccessful entry attempts.  An
    example is the Lincoln County Board of Education VAX at 641-1295
    (2400 baud - use VT100 emulation for best results).  Some other
    examples of local small business systems are:
    641-2973 (1200bps) - O.R. MFAS Complex [run on a VAX/VMS] Very SLOW.
    641-5002 (1200bps) - System 288 ISOETEC Communications Inc.
    687-1655 (2400bps) - Q&O Corporate Division (Quebec and Ontario
                         Paper Company) [use VT-100 emulation]
    687-8788 (1200bps) - Hotel Dieu (send hard break after connect.  This
                         one is very hard to hack... I don't even know the
                         format of the login)
    687-3954 (2400bps) - hit ESCape to get menu of companies

(2) computers connected through networks: as there are a massive amount
    of people connected to a network at any given time it isn't practible
    for the network to run traces on everything.  And, through network
    systems you can usually jump around to other systems.  The closest
    network dialups are for Datapac.  Here's a few:
     357-4695  2400 baud     - ICE also has a list of about 50 or so other
     687-1104  2400 baud       Datapac dialups for both 1200 and 2400 baud.
     687-1115  2400 baud       Just ask!
     688-5640  1200 baud
    ..and remember, after you connect enter two periods and hit return
    (EG: .. <cr> ) and from there you enter the system address (which is
    8 digits long)  For some systems to check out see the first release
    of this article (filename: ICE001.TXT)


 	What to stay away from?  Well.. usually government computers
aren't safe to hack unless you know what you're doing (more on this in a
future issue), as well as systems to SOME big companies.  Like calling
direct to AT&T's mainframe and hacking it for hours on end wouldn't be
something you'd wanna do.


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
         ______   ______    ______   _________       ___________
        |  __  | |  __  |  |  ___ \ |___   ___|     |___________|
        | |__| | | |  | |  | |__/ /     | |            | | | |
        |   ___| | |__| |  |     /      | |            | | | |
        |  |     |  __  |  | |\  \      | |          __|_|_|_|__
        |__|     |_|  |_|  |_| \__\     |_|         |___________|

      -+- PHreak PHile Extract: Guidelines by The Mentor - LOD/H -+-


The following was extracted from P/HUN Issue #2 by The Mentor (Legion of
Doom/Legoin of Hackers).  I know I posted my own guidelines in release #1
of this guide but these are a few more you may want to keep in mind:

    As long as there have been computers, there have been hackers.  In the
50's at the Massachusets Institute of Technology (MIT), students devoted
much time and energy to ingenious exploration of the computers.  Rules and
the law were disregarded in their pursuit for the 'hack'.  Just as they
were enthralled with their pursuit of information, so are we.  The thrill
of the hack is not in breaking the law, it's in the pursuit and capture of
knowledge.

I.    Do not intentionally damage *any* system.
II.   Do not alter any system files other than ones needed to ensure your
      escape from detection and your future access (Trojan Horses, Altering
      Logs, and the like are all necessary to your survival for as long as
      possible.)
III.  Do not leave your (or anyone else's) real name, real handle, or real
      phone number on any system that you access illegally.  They *can* and
      will track you down from your handle!
IV.   Be careful who you share information with.  Feds are getting trickier.
      Generally, if you don't know their voice phone number, name, and
      occupation or haven't spoken with them voice on non-info trading
      conversations, be wary.
V.    Do not leave your real phone number to anyone you don't know.  This
      includes logging on boards, no matter how k-rad they seem.  If you
      don't know the sysop, leave a note telling some trustworthy people
      that will validate you.
VI.   Do not hack government computers.  Yes, there are government systems
      that are safe to hack, but they are few and far between.  And the
      government has inifitely more time and resources to track you down than
      a company who has to make a profit and justify expenses.
VII.  Don't use codes unless there is *NO* way around it (you don't have a
      local telenet or tymnet outdial and can't connect to anything 800...)
      You use codes long enough, you will get caught.  Period.
VIII. Don't be afraid to be paranoid.  Remember, you *are* breaking the law.
      It doesn't hurt to store everything encrypted on your hard disk, or
      keep your notes buried in the backyard or in the trunk of your car.
      You may feel a little funny, but you'll feel a lot funnier when you
      when you meet Bruno, your transvestite cellmate who axed his family to
      death.
IX.   Watch what you post on boards.  Most of the really great hackers in the
      country post *nothing* about the system they're currently working
      except in the broadest sense (I'm working on a UNIX, or a COSMOS, or
      something generic.  Not "I'm hacking into General Electric's Voice Mail
      System" or something inane and revealing like that.)
X.    Don't be afraid to ask questions.  That's what more experienced hackers
      are for.  Don't expect *everything* you ask to be answered, though.
      There are some things (LMOS, for instance) that a begining hacker
      shouldn't mess with.  You'll either get caught, or screw it up for
      others, or both.
XI.   Finally, you have to actually hack.  You can hang out on boards all you
      want, and you can read all the text files in the world, but until you
      actually start doing it, you'll never know what it's all about.  There's
      no thrill quite the same as getting into your first system (well, ok,
      I can think of a couple of bigger thrills, but you get the picture.)

   One of the safest places to start your hacking career is on a computer
system belonging to a college.  University computers have notoriously lax
security, and are more used to hackers, as every college computer depart-
ment has one or two, so are less likely to press charges if you should
be detected.  But the odds of them detecting you and having the personel to
committ to tracking you down are slim as long as you aren't destructive.

   If you are already a college student, this is ideal, as you can legally
explore your computer system to your heart's desire, then go out and look
for similar systems that you can penetrate with confidence, as you're already
familar with them.
 
  So if you just want to get your feet wet, call your local college.  Many
of them will provide accounts for local residents at a nominal (under $20)
charge.

   Finally, if you get caught, stay quiet until you get a lawyer.  Don't
volunteer any information, no matter what kind of 'deals' they offer you.
Nothing is binding unless you make the deal through your lawyer, so you
might as well shut up and wait.

- The Mentor: LOD/H




%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
        ______   ______    ______   _________       _______________
       |  __  | |  __  |  |  ___ \ |___   ___|     |_______________|
       | |__| | | |  | |  | |__/ /     | |            | | | | | |
       |   ___| | |__| |  |     /      | |            | | | | | |
       |  |     |  __  |  | |\  \      | |          __|_|_|_|_|_|__
       |__|     |_|  |_|  |_| \__\     |_|         |_______________|   
    
                     -+- Datapac, PADS, and X.25 -+-

	Ok, to start off, Datapac is a network with dialups ONLY in Canada
(a dialup is the number you call to get into the network eg. 687-1115) that
has all sorts of neat little services you can screw around with.  After you
connect you type two periods and hit return ".. <cr>" and that will tell
Datapac you're their.  From here you can enter any valid 8-digit address
to connect to a host systems.  An example is "74600268" (a VAX system).  
There are thousands of systems connected with Datapac all across Canada.  
If you want to get the specifics on Datapac and how it works enter the 
address "9160 0086" (no space in between though...) and it will give you 
menus and texts of all sorts of things.  So what's so special about Dpac?  
Well, most of the systems connected to it allow access to other networks 
around the world via packet assember/disassembers (PADs).  What a PAD does
is group the data into 128 or 256 byte chunks (normally, this can be
changed.  Using smaller packet sizes reduces PAD delay but may also cost
the company more money because some networks charge by the packet... but
hey, whatever makes your journey easier).  The packet is now transmitted
at speeds ranging from 9600bps to 19200bps (or even faster) to another PAD
where it then takes the data and hands it down to whatever computer
system it's connected to.  A PAD allows two computers that have different
baud rates or communication protocals to talk to each other over a long
distance.

	Although the systems connected directly to Datapac are located in 
Canada you can access any system in the world from it via the X.25 network. 
All of the major networks (Telenet, Tymnet, Datapac, ItaPAC, etc..) offer
connections with X.25 as well as many private companies.  (I don't wanna 
confuse anyone here but I might..).  Ok, as I said before, Datapac
connects to host systems by their 8-digit addresses.   Now pretend this 
8 digit number is like a normal 7 digit phone number (eg. 9344055) without
the area code.  To call outside of Datapac (using an X.25 PAD) you must
add the DNIC in front of it.  The DNIC (Data Network Identification Code)
is kind of like an areacode for networks.  It tells Datapac the area of
the world and which network inside it, that you're calling to.  Currently
Datapac connects DIRECTLY to the U.S. packet switching networks (PSN's) of
SprintNet, BT Tymnet, AT&T Accunet, Fedex, Net Express and Western Union. 
Also, through Teleglobe Canada it can connect to more than 100 networks
throughout the world.  So now you know what a NUA is (well... kinda).  A
NUA (Network User Address) has been conformed to X.121 standards (what's
X.121?  It's the standard set by Study Group 7 of the CCITT (International
Telegraph and Telephone Consultative Committee - you don't have to
remember that) that says an NUA takes the form of a 4 to 14 digit number
with the first four digits being the DNIC.  In this manner X.121 ensures
unique addresses for all data terminal equipment in the world.  Another
thing that you don't need to know is X.75 which defines the signalling
system between to PSN's, but can basically be defined as a network to
network interface (makes sure both networks are talking in the same
"language" so to speak).  Ok got all that?  Remember it for the test on
Friday (hohoho 8-)  I'm just tellin yah how things work in case anyone
actually cares.  Quick review:
X.121 - standard of how NUA's are made up
X.75  - network to network interface (the "language")

Sooo... an NUA is like this:
                                          (1) (DNIC) (FOREIGN ADDRESS)
                                           :     :          :
     One defines the Datapac International.:     :          :
     Prefix (tells Dpac yur callin outside       :          :
     of the network)                             :          :
                                                 :          :
     Packet networks are identified by a ........:          :
     four digit number called a DNIC                        :
     (data network identification code)                     :
                                                            :
     The foreign national address is .......................:
     expressed as an eight to ten digit
     address.

Also, as I stated before, when in Dpac you can change the packet size, but
when calling internationally the packet must be 128 characters.  You
cannot change this.  Ok, an example NUA is QSD:

                            1 2080 57040540
                            :  :     :
                            :  :     :
  Identifies international..:  :     :
  call (1)                     :     :...this is the address within
                               :         Transpac - the host system you're
  DNIC: 2080 - identifier for..:         connecting to.
  the network TRANSPAC in 
  France - the network your
  connecting to

Note: every PSN has a DNIC.  Datapac's is "3020" so if you lived in 
      Italy and hooked up to ItaPAC and wanted to call a VAX at 12345678
      connected with Datapac the NUA would be 1302012345678.  Easy eh?

	So what's so great about all this?  Well just think, if there's 
some tiny little company with a little desktop computer in the basement 
of some small building in Japan, you can connect with it if it's hooked 
up to a packet switching network, or even if it's hooked up to a LAN 
(local area network) providing the LAN server is connected with a PSN.
Also, unlike placing a normal phone call with which you can only be
connected to one place per line, X.25 PADs can have multiple lines
(actually, called channels) so sitting on your one line-one modem micro,
you could be connected to five or more mainframes in different countries
around the world simultaneously.

	Well now you know a little bit more about about 45% of the hacker
world (the other 45% is codes - 800 services (eg: PBX's) and the remaining
10% is the anarchy bit which I've never really been interested in.  Most
people are H/P but their's also the H/P/A (hack/phreak/anarchy) dudez who
spend time trying to construct the atomic bomb from household supplies...


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

        ______   ______    ______   _________       ________________
       |  __  | |  __  |  |  ___ \ |___   ___|     |________________|
       | |__| | | |  | |  | |__/ /     | |            | | \ \  / /
       |   ___| | |__| |  |     /      | |            | |  \ \/ /
       |  |     |  __  |  | |\  \      | |          __|_|___\__/____
       |__|     |_|  |_|  |_| \__\     |_|         |________________|
                                                            
                              -+- DNIC List -+-


	Well seeing as how I babbled on so much the last section about
them, I thought it might be worthwhile to include a DNIC listing  because
chances are you'll need it in the future.  Soo, straight from Datapac's 
Information Service....


     DATAPAC INTERNATIONAL IDENTIFICATION CODES (DNIC)

A comprehensive list of the International Packet-Switched networks
which are accessible via the Datapac-Teleglobe gateway is provided
below.  It is current as of 1992 06 09.

COUNTRY               NETWORK          DNIC       DIRECTION
-------               -------          ----       ---------

ANDORA                ANDORPAC         2945       BI-DIR
ANTIGUA               AGANET           3443       INCOMING
ARGENTINA             ARPAC            7220       BI-DIR
                      ARPAC            7222       BI-DIR
AUSTRIA               DATEX-P          2322       BI-DIR
                      DATEX-P TTX      2323       BI-DIR
                      RA               2329       BI-DIR
AUSTRALIA             AUSTPAC          5052       BI-DIR
                      OTC DATA ACCESS  5053       BI-DIR
                      AUSTPAC          5054       BI-DIR
BAHAMAS               BATELCO          3640       BI-DIR
BAHRAIN               BAHNET           4263       BI-DIR
BARBADOS              IDAS             3423       BI-DIR
BELGIUM               DCS              2062       BI-DIR
                      DCS              2068       BI-DIR
                      DCS              2069       BI-DIR
BELIZE                BTLDATAPAVC      7020       BI-DIR
BERMUDA               BERMUDANET       3503       BI-DIR
BRAZIL                INTERDATA        7240       BI-DIR
                      RENPAC           7241       BI-DIR
                      RENPAC           7248       INCOMING
                      RENPAC           7249       INCOMING
BULGARIA              BULPAC           2841       BI-DIR
CAMEROON              CAMPAC           6242       BI-DIR
CAYMAN ISLANDS        IDAS             3463       BI-DIR
CHAD                  CHAD             6222       BI-DIR
CHILE                 ENTEL            7302       BI-DIR
                      CHILE-PAC        7303       INCOMING
                      VTRNET           7305       BI-DIR
                      ENTEL            7300       INCOMING
CHINA                 PTELCOM          4600       BI-DIR
COLOMBIA              COLDAPAQ         7322       BI-DIR
COSTA RICA            RACSAPAC         7120       BI-DIR
                      RACSAPAC         7122       BI-DIR
                      RACSAPAC         7128       BI-DIR
                      RACSAPAC         7129       BI-DIR
CYPRUS                CYTAPAC          2802       BI-DIR
                      CYTAPAC          2807       BI-DIR
                      CYTAPAC          2808       BI-DIR
                      CYTAPAC          2809       BI-DIR
DENMARK               DATAPAK          2382       BI-DIR
                      DATAPAK          2383       BI-DIR
DJIBOUTI              STIPAC           6382       BI-DIR
DOMINICAN REP.        UDTS-I           3701       INCOMING
ESTONIA               ESTONIA          2506       BI-DIR
EGYPT                 ARENTO           6020       BI-DIR
FIJI                  FIJPAC           5420       BI-DIR
FINLAND               DATAPAK          2441       BI-DIR
                      DATAPAK          2442       BI-DIR
                      DATAPAK          9358       BI-DIR
                      DIGIPAK          2443       BI-DIR
FRANCE                TRANSPAC         2080       BI-DIR
                      NTI              2081       BI-DIR
                      TRANSPAC         2089       BI-DIR
                      TRANSPAC         9330       INCOMING
                      TRANSPAC         9331       INCOMING
                      TRANSPAC         9332       INCOMING
                      TRANSPAC         9333       INCOMING
                      TRANSPAC         9334       INCOMING
                      TRANSPAC         9335       INCOMING
                      TRANSPAC         9336       INCOMING
                      TRANSPAC         9337       INCOMING
                      TRANSPAC         9338       INCOMING
                      TRANSPAC         9339       INCOMING
FR ANTILLIES          TRANSPAC         2080       BI-DIR
FR GUIANA             TRANSPAC         2080       BI-DIR
FR POLYNESIA          TOMPAC           5470       BI-DIR
GABON                 GABONPAC         6282       BI-DIR
GERMANY F.R.          DATEX-P          2624       BI-DIR
                      DATEX-C          2627       BI-DIR
GREECE                HELPAK           2022       BI-DIR
                      HELLASPAC        2023       BI-DIR
GREENLAND             KANUPAX          2901       BI-DIR
GUAM                  LSDS-RCA         5350       BI-DIR
                      PACNET           5351       BI-DIR
GUATEMALA             GUATEL           7040       INCOMING
                      MAYAPAC          7042       INCOMING
                      GUATEL           7043       INCOMING
HONDURAS              HONDUTEL         7080       INCOMING
                      HONDUTEL         7082       BI-DIR
                      HONDUTEL         7089       BI-DIR
HONG KONG             INTELPAK         4542       BI-DIR
                      DATAPAK          4545       BI-DIR
                      INET HK          4546       BI-DIR
HUNGARY               DATEX-P          2160       BI-DIR
                      DATEX-P          2161       BI-DIR
ICELAND               ICEPAK           2740       BI-DIR
INDIA                 GPSS             4042       BI-DIR
INDONESIA             SKDP             5101       BI-DIR
IRELAND               EIRPAC           2721       BI-DIR
                      EIRPAC           2724       BI-DIR
ISRAEL                ISRANET          4251       BI-DIR
ITALY                 DARDO            2222       BI-DIR
                      ITAPAC           2227       BI-DIR
IVORY COAST           SYTRANPAC        6122       BI-DIR
JAMAICA               JAMINTEL         3380       INCOMING
JAPAN                 GLOBALNET        4400       BI-DIR
                      DDX              4401       BI-DIR
                      NIS-NET          4406       BI-DIR
                      VENUS-P          4408       BI-DIR
                      VENUS-P          9955       INCOMIMG
                      VENUS-C          4409       BI-DIR
                      VENUS-C          4410       BI-DIR
KENYA                 KENPAC           6390       BI-DIR
KOREA REP             HINET-P          4500       BI-DIR
                      DACOM-NET        4501       BI-DIR
                      DNS              4503       BI-DIR
KUWAIT                BAHNET           4263       BI-DIR
LEBANON               SODETEL          4155       BI-DIR
                      LIBANPAC         4150       BI-DIR
LUXEMBOURG            LUXPAC           2704       BI-DIR
                      LUXPAC           2709       BI-DIR
MACAU                 MACAUPAC         4550       BI-DIR
MADAGASCAR            INFOPAC          6460       BI-DIR
MALAYSIA              MAYPAC           5021       BI-DIR
MAURITIUS             MAURIDATA        6170       BI-DIR
MEXICO                TELEPAC          3340       BI-DIR
MOROCCO               MOROCCO          6040       BI-DIR
MOZAMBIQUE            COMPAC           6435       BI-DIR
NETHERLANDS           DATANET-1        2040       BI-DIR
                      DATANET-1        2041       BI-DIR
                      DABAS            2044       BI-DIR
                      DATANET-1        2049       BI-DIR
N. MARIANAS           PACNET           5351       BI-DIR
NEW CALEDONIA         TOMPAC           5460       BI-DIR
NEW ZEALAND           PACNET           5301       BI-DIR
NIGER                 NIGERPAC         6142       BI-DIR
NORWAY                DATAPAC TTX      2421       BI-DIR
                      DATAPAK          2422       BI-DIR
                      DATAPAC          2423       BI-DIR
PAKISTAN              PSDS             4100       BI-DIR
PANAMA                INTELPAQ         7141       BI-DIR
                      INTELPAQ         7142       BI-DIR
PARAQUAY              ANTELPAC         7447       INCOMING
PERU                  DICOTEL          7160       BI-DIR
PHILIPPINES           CAPWIRE          5150       INCOMING
                      CAPWIRE          5151       BI-DIR
                      PGC              5152       BI-DIR
                      GMCR             5154       BI-DIR
                      ETPI             5156       BI-DIR
PORTUGAL              TELEPAC          2680       BI-DIR
                      SABD             2682       BI-DIR
PUERTO RICO           UDTS             3300       BI-DIR
                      UDTS             3301       BI-DIR
QATAR                 DOHPAC           4271       BI-DIR
REUNION (FR)          TRANSPAC         2080       BI-DIR
RWANDA                RWANDA           6352       BI-DIR
SAN MARINO            X-NET            2922       BI-DIR
SAUDI ARABIA          ALWASEED         4201       BI-DIR
SENEGAL               SENPAC           6081       BI-DIR
SEYCHELLES            INFOLINK         6331       BI-DIR
SINGAPORE             TELEPAC          5252       BI-DIR
                      TELEPAC          5258       BI-DIR
SOLOMON ISLANDS       DATANET          5400       BI-DIR
SOUTH AFRICA          SAPONET          6550       BI-DIR
                      SAPONET          6551       BI-DIR
                      SAPONET          6559       BI-DIR
SRI-LANKA             DATANET          4132       BI-DIR
SPAIN                 TIDA             2141       BI-DIR
                      IBERPAC          2145       BI-DIR
SWEDEN                DATAPAK TTX      2401       BI-DIR
                      DATAPAK-2        2403       BI-DIR
                      DATAPAK-2        2407       BI-DIR
SWITZERLAND           TELEPAC          2284       BI-DIR
                      TELEPAC          2285       BI-DIR
                      TELEPAC          2289       BI-DIR
TAIWAN                PACNET           4872       BI-DIR
                      PACNET           4873       BI-DIR
                      UDAS             4877       BI-DIR
TCHECOSLOVAKA         DATEX-P          2301       BI-DIR
THAILAND              THAIPAC          5200       BI-DIR
                      IDAR             5201       BI-DIR
TONGA                 DATAPAK          5390       BI-DIR
TOGOLESE REP.         TOGOPAC          6152       BI-DIR
TORTOLA               IDAS             3483       INCOMING
TRINIDAD              DATANETT         3745       BI-DIR
                      TEXTET           3740       BI-DIR
TUNISIA               RED25            6050       BI-DIR
TURKEY                TURPAC           2862       BI-DIR
                      TURPAC           2863       BI-DIR
TURKS&CAICOS          IDAS             3763       INCOMING
U ARAB EMIRATES       EMDAN            4241       BI-DIR
                      EMDAN            4243       BI-DIR
                      TEDAS            4310       INCOMING
URUGUAY               URUPAC           7482       BI-DIR
                      URUPAC           7489       BI-DIR
USSR                  IASNET           2502       BI-DIR
U.S. VIRGIN I         UDTS             3320       BI-DIR
U. KINGDOM            IPSS-BTI         2341       BI-DIR
                      PSS-BT           2342       BI-DIR
                      GNS-BT           2343       BI-DIR
                      MERCURY          2350       BI-DIR
                      MERCURY          2351       BI-DIR
                      HULL             2352       BI-DIR
VENEZUELA             VENEXPAQ         7342       BI-DIR
YUGOSLAVIA            YUGOPAC          2201       BI-DIR
ZIMBABWE              ZIMNET           6482       BI-DIR

(As you can see there's a LOT of different networks around the world!)

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
        ______   ______    ______   _________     __________
       |  __  | |  __  |  |  ___ \ |___   ___|   |__________|
       | |__| | | |  | |  | |__/ /     | |         \ \  / /
       |   ___| | |__| |  |     /      | |          \ \/ /
       |  |     |  __  |  | |\  \      | |        ___\__/___
       |__|     |_|  |_|  |_| \__\     |_|       |__________|
                                                            
                            -+- NUA Extract -+-


	There are tens of thousands of NUAs around the world so I'm not
going to list them all obviously (the list alone would takes megs of
space).  I'll just take a few from PHrack issue #27 (vol.3) so you can
have a looksee of what's out there.  THESE HAVE NOT BEEN TESTED and they
may be out of service by the time you try them out, but chances are
they'll still be there:

 DNIC 
 \  / 
  \/
 2062 22 101 2      ?          Ministry of economic affairs
 2080 57 040 540               QSD (Chat system)
 2284 621100102                Cigy DEC1091
 2284 6411010       DM         DATAMAIL (RSAG)
 2284 681140592                Princeton University High Energy Physics
                               Group Vax 11/750
 2284 681140593                University of Michigan Physics Vax 11/750
 2284 681140596                N.U. Physics Vax 11/750
 2284 681140597                Harvard University High Energy Physics Lab.
                               Vax 8650
 2342 19200190      INFOLINE   PERGAMON INFOLINE LTD. (NFS)
 2342 19200203      IPSH       SHARP, I. P. ASSOCIATES LTD.
 2342 19200220                 BRITISH LIBRARY ON-LINE SYSTEM
 2342 19200222      BLAISE     British Library Information System
 2342 22236236      UWIST      University of Wales
 2342 22339399      CAMBRID    Cambridge University (Phoenix)
 2342 22530303      SWURCC     South-West Universities
 2342 2253030388    SWURCC     South-West Universities Network
 2342 23519111      AERE       Atomic Energy Research Establishment at
                               Harwell
 2343 07813         EUROINFO   Euronet Diane Information Service
 2442 03008         HELVA      High Energy Physics Vax 11/750
 2442 03017                    U of Technology DEC-20
 2442 31006                    Technical University of Tampere VAX
 2624 5241040149               Aachener + Muenchener Versicherung
 2624 5241090528               rmi-aachen
 2624 5241090832               RMI Datentechnik Aachen
 2624 5243340307               OPTEL (Ruehlemann-Box)
 2624 5246190509               Kfz Juelich
 2624 5271040240               Uni Siegen, FB Physik (VAX 11/750)
 2624 5293140196               Handwerkskammer (HWK) Arnsberg
 2624 530000414                GFC-AG
 2624 5611090322               American Express
 2624 5611090347               American Express
 3106 000323                   TRW Defence & Space Systems Group
 3106 000401                   TMCS Public Network
 3106 000633                   Public TYMNET/TRWNET Interlink
 3106 00157878                 BIX
 3106 001659                   BYTE Information Exchange (GUEST,GUEST)
 3106 001663                   People Link
 3106 001819                   TMCS Public Network
 3106 001828        FRX        Faifax Outdial Host (Tymnet)
 3106 001864                   SUNGARDS Central Computer Facility Network
 3106 002677                   The New York Times
 3106 0057878                  BIX
 3106 00584401                 Washington Post
 3110 21200315                 Outdial 300 bps (Area 212)
 3110 21200316                 Outdial 1200 bps (Area 212)
 3110 21200412                 Outdial 2400 bps (Area 212)
 3110 2120041200               New York City Outdial (Area 212)
 3110 21300029                 TRW Defence & Space Systems Group
 3110 3010002000    NLM        National Library of Medicine
 3110 3010002400               The Source
 3110 500061                   Nuclear Research
 3110 608016630                University of Wisconsin
 3110 609004200                Dow-Jones
 3110 6120002500               Honeywell Inform Services Datanetwork
 3110 6170013700               Masachusetts Institute of Technology
 3110 6170013800               Masachusetts Institute of Technology
 3110 6170013900               Masachusetts Institute of Technology
 3110 6170014000               Masachusetts Institute of Technology
 3110 6170127500               Masachusetts Institute of Technology
 3110 6170139000               Masachusetts Institute of Technology
 3110 6170140300               Masachusetts Institute of Technology
 3110 61703088                 Delphi
 3110 61900050                 California Outdial 1200 bps (Area 619)
 3110 7030002000               Litton Computer Services
 3110 7030002100               American Management Systems
 5052 82620000                 VAX in Sidney, Australia


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

        ______   ______    ______   _________     ________________
       |  __  | |  __  |  |  ___ \ |___   ___|   |________________| 
       | |__| | | |  | |  | |__/ /     | |         \ \  / /  | | 
       |   ___| | |__| |  |     /      | |          \ \/ /   | | 
       |  |     |  __  |  | |\  \      | |        ___\__/____|_|__
       |__|     |_|  |_|  |_| \__\     |_|       |________________|

                           -+- Questions & Answers -+-


        A lot of people think they shouldn't bother asking a question
because it's stupid, or it might make them look like a beginner.  Well
without an answer to your question you'll ALWAYS be a beginner.  I will
answer _any_ question no matter how small it may seem and if I can't give
an answer to it I'll find someone who can.  I've been in the h/p scene for
a couple of years now and there's still LOTS of stuff I have no clue about. 
H/Ping goes into all corners of the computer world and other forms of 
electronics and there's no WAY someone can know everything about all of it.
Most people just stick to one party of h/ping and specialize their.  I've
seen people that know the operating system to VAX/VMS inside out but they
don't have a clue as to how a PBX works.  I also know people who can hack
out VMB's in a minute but have never heard of an outdial.  Don't think
that all hack/phreaks know everything about everything cause they don't.
I've got loads of technical journals at hand so I can look up and give a
detailed answer on almost anything if you want one.  If you want me to
explain somethings step-by-step I'll do that too.  Ask and you shall
recieve.  So you ask "why am I being such a nice guy?"  Well as I said
before, the amount of phreaks in Niagara are VERY few and I want to expand
people's knowledge in the area.  When more people are learning, I won't be
the only one answering questions.  One more thing, not all answers in this 
section will be from me.  In this issue they are but in future issues I'll
be taking extracts from other hack philes and from other BBS's.

        Ok, hours after I released the first ICE H/P Handbook I had
feedback waiting for me on my board.  That's great.  The more the merrier.
If you have a question (L)eave Feedback to me on my BBS: 416-934-4055 (no,
you don't have to be a member to do this... guests can leave feedback as
well).


[QUESTION #1 from Darkwing Duck]:

  Ok, umm, I've read MOST of your H/P book (I'm on line 512 now).  What I'd
like to know is about Datapac.  When I call and look around is this illegal
(stupid question), ok, but can I get caught?
--------------------------------------------------------------------------
        No, it's not a stupid question.  When I first started out the
major thing that worried me and kept me from trying new things was getting
caught.  Datapac is a public service, and if you're just snooping around
not causing any harm, you won't get into trouble.  I have *heard* stories
of some people getting into dung for scanning Datapac, but myself as well
as other members of ICE and other people I know have been scanning Datapac
extensively for a _long_ time and nothing has every happened to me or them. 
Remember, Datapac is a huge network that goes all across Canada and also
accepts calls from overseas.  It has hundreds of dialups over the country.
This allows for thousands of people to be accessing it simultaneously.
Datapac doesn't have the time, money (well, maybe), or manpower to moniter
the doings of every user connected to it.


[QUESTION #2 from Darkwing Duck]:
 
        I'd like to call some LD BBS's (preferably h/p or pirate boards),
using the 800 services, now, can I get caught?  
--------------------------------------------------------------------------
        Most (I'd say about 95%) of the codes you hear being spread around
H/P BBS's, VMB's etc.. are safe to use.  If they're not, the person who
posted it will say so.  There has been problems with some 950 services
doing random traces in the past and some services have even posted fake
FBI warnings (remember, the FBI is an AMERICAN agency... they're not going
to go after people in Canada when they've got enough work to do in their
own country.  And as for the RCMP computer crime unit... they're a little
bit behind the times).  There's so many people using these ways to call LD
for free at the same time that it's impossible to do traces of all of them.
Of course if someone uses this 800 service to call a long distance computer
somewhere else, and goes in and destroys that system, well of course that
will increase the chance of getting caught.  But if you're using them to
call BBS's you're safe.


[QUESTION #3 from Anonymous]:
 
        I'm not quite sure of what the point of using a Datapac is.  Is it
to call networks and not get caught?
--------------------------------------------------------------------------
        Well first, Datapac _is_ a network.  From it you can also connect
to other networks though.  Their are a number of reasons of using it.
For one, most of the systems connected with it have PAD (Packet
Assembler/Disassembler) software, which allows you to call other systems
around the world via their NUA (network user address).  The advantages of
using a PAD to call out from Datapac, is that you get a crystal-clear
connection: no line noise.  PADs allow two remote systems to talk to each
other even though they may be connected at different baud rates or using
different protocals.  Transmissions between PADs in networks zip around at
speeds of 9600-19200 baud (even though you may be calling on a 1200 or 2400
baud modem, the modems in the network are going at light speed) and have 
built in error correcting protocals.  Also, once you connect to Datapac you
have access to other networks: Telenet, Tymnet, ItaPAC, JANET, SBDN, 
PandaNet, THENet, and a whole host of others.  All of which  have thousands
of separate systems connected to them.
 

[QUESTION #4 from Darkwing Duck]:

        When using 800 services, am I SUPPOSED to watch out for 950's and
PBX's?
--------------------------------------------------------------------------
	No.  950's and PBX's are WATS (Wide Area Telecommunications Service)
and this is what people use to call ld for free.  If you hear of a 950 use
it unless you hear otherwise.  Or if you're still unsure, call through a
diverter (a diverter is an 800 service that allows people to call other
800 numbers outside of their calling area).

  
[QUESTION #5 from Darkwing Duck]:

       Using Datapac, I call out to lets say Air Canada (an example from
the handbook).  Now, I connect, then I'm trying to break in (no I KNOW this
is illegal) but what are the chances of me getting caught?
--------------------------------------------------------------------------
	Well I've been into bigger places than Air Canada even after
hacking for hours, and still haven't been caught or warned or anything.
Even though a system might keep track of unsuccessful login attempts, it
won't say where those attempts were made from.  Companies generally won't
start running traces unless they really feel threatened by the possible
intruder.  Systems are hacked on all the time so it wouldn't be practible
for the company to start ordering the phone company to trace every time a
new hacker came along.  So in other words, I wouldn't worry about getting
caught.  But, if by some odd chance someone DID call you or anything, you
just say someone told you it was a private bbs system and you forgot what
the login/password was or something.  Just play dumb.


[QUESTION #6 from The Unit]:

	Can you explain a few more things in a little more detail for me?
Like, in the h/p message sections, they were talking about codes to dial
out ld, what exactically do they mean when they write " +code+#### " stuff
like that (put numbers in for #)
--------------------------------------------------------------------------
	Ok, most of the time when someone posts a long distance service it
will be something like (example):
            1-800-123-4567+09+acn
   or even  8/123-4567+09+acn
If you seem something with 8/ that means it's a 1-800 (we're just too lazy
to type 1-800 I guess)... "09" would be what you enter to get to the other
line that lets you dial out (when calling 800 services you call on one
line to get to it (an INWATS) and then once it answers you have to type in
a code that will switch you to the line that lets dial out (an OUTWATS). 
BTW: a WATS is a "Wide Area Telecommunications Service".  So you'd call up
1-800-123-4567 on you're trusty TOUCHTONE phone (if you've got only a
pulse phone you might as well not even be reading this file) then once you
hear it answer you will usually either hear a recording or it will go
right to another dialtone.  This is where you enter "09" and then it will
either go from the recording to a dialtone or just stay at a dialtone if
it already was.  Now you enter your ACN.  An ACN is Area Code Number (eg:
416-934-4055).  Alot of the time it will say 1+acn because the 1 is
required to call long distance.  It depends on the service.  Also,
whenever you see a code posted and the "+" are in it.. all the plus signs
mean is "wait for something and then enter the next thing".  Sometimes you
may get some huge code like 8/123-4567+1+09+acn+code or something like
that where you're required to call the 800 number, enter a number, wait
for something (either a message to end or a beep, or whatever) then enter
another number or set of numbers, then the areacode number you wanna call,
then a code (which of course was already hacked out by either yourself or
another phreak).
	Other times you'll see something like:  800-123-4567+5dig+acn and
that means the code consists of 5 digits but nothing has been hacked out
yet (so if you've got time work on it).  OR, you're see some that have a
template like (I'll give an example of a 7 digit code): 
                       800-123-4567  536xxxx
which means that someone has found a lot of codes on it with the first
numbers being "536".  A lot of companies put their codes in groups.  MOST
long distance services WILL require a code of a sort which will range
anywhere from 3 digits (easy to hack out) to 9 digits (very hard without a
template).

[QUESTION #7 from Iron Fist]:

	People have explained what a pad is but I'm still not too sure.  I
know you use them in networks but how?
--------------------------------------------------------------------------
	When you're connected to a host system on a network (say a PRIME
system for example), chances are that system will have a packet
assembler/disassembler connected to it.  This isn't a piece of hardware or
something you can see.  It's a program (on Primos computers this program
is called "Netlink", on VAX's you can use the "set host" command) that 
assembles data into packets of 128 or 256 byte chunks.  The program then 
sends it to a 9600-19200 baud modem that is connected with another system.  
From here it goes to the other system, who's pad software disassembles the 
packet.  Say you're connected to a university in England and it displays
the prompt "Hit 'C' to Continue".  You hit "C".  It goes from your
computer, to the packet switching network your connected to (eg: Datapac)
to the host system your connected to, is put into a 128 or 256 byte
packet, is sent through the fone lines via the X.25 network to the other
computer you're connected to.
	Ok, that's great but how do you actually place a call?  Well, when
you're at the PAD prompt (which can be anything eg: "DevelNet X.25:" or
what Netlink uses which is just a "@" symbol) enter either "?" or "help"
to get a list of commands.  Usually the command to call out is "c" but
this can vary according to the program.  The format of the NUA can also
vary.  If I'm calling QSD in France (NUA: 208057040540) from a Prime 
computer the command would be "c 12080:57040540".  The Netlink program 
demands a colon after the DNIC.  But the most common format is c+1+nua.


[QUESTION #8 from Iron Fist]:

	How do I get a list of VMB's or NUA's that are valid (current)?
--------------------------------------------------------------------------
	The best way to get an up to date list of anything is your
favorite hack/phreak BBS.  Or, if you have a VMB that you call, there.  


[QUESTION #9 from Anonymous]:

	What is the best computer to hack with?  I only have a 64 but can
I still do all the same stuff as other people?
--------------------------------------------------------------------------
	Some of the best hacking/scanning programs are for the C-64 and
some of the best h/p BBS's are run on the Commie.  One that used to be
good (haven't called in awhile) is Meltdown in Hamilton/Ontario at
416-648-8175 (12-24oo baud).


%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
        ______   ______    ______   _________     ____________________
       |  __  | |  __  |  |  ___ \ |___   ___|   |____________________|
       | |__| | | |  | |  | |__/ /     | |         \ \  / /  | | | |
       |   ___| | |__| |  |     /      | |          \ \/ /   | | | |
       |  |     |  __  |  | |\  \      | |        ___\__/____|_|_|_|__
       |__|     |_|  |_|  |_| \__\     |_|       |____________________|

                        -+- End of Transmission -+-


	Well this one took a little longer than I had wanted (a whole 2
days - but those were 2 days of nonstop writing).  I'm hoping someone else
will write something in the next issue.  I'm going to ask Technazz to do
an article on something but he's a buzy person, so if *anyone* wants to
write in this just tell me.  It can be something that's only a paragraph
if yah want.  Anything.  What I don't have too much knowledge on is other
networks (Tymnet, Telenet, etc..) so if someone wants to do something on
that...

	Ok, well keep the questions comming to me cause it's easier for me
to talk about stuff that way.  Call ICE HQ at [416] 934-4055 and (L)eave
Feedback.  You don't even have to be a registered user to do that so call
call call.  Tell me what you think about these "hackbooks" and what you
wanna see in 'em (or don't wanna see in 'em for that matter).

	What to look for in the next release?  Hmmm... I'm not even sure
yet.  I think I'll release a tech journal compilation with extracts from
PHrack, PHun, and LoD/H.  Maybe type out a few newspaper articles lying
around, who knows.  Oh well, I'll have more of an idea when people leave
me some feedback.  Where can I (and other ICE members) be contacted?

    PSYCHIATRIC CYBERHELL BBS (ICE WHQ): 416-934-4055  [12/2400bps]

	Currently the only H/P supporting BBS in Niagara (and even if
there was another it'd still be the best! ehehhe)..  and here's how I can
be contacted internationally:

...aah the suffering - the sweet suffering... 

Contact Liquid Jesus of ICE/Nightbreed globally:

InterNet/UUCP........ liquid_jesus@pegasus.ch
Canada............... ICE WHQ: (416)934-4055, (416)934-6795
United States........ Town Town BBS (Paradise USA HQ): (414)781-3218
France (direct)...... +33 36431515 (type "THELINE") mailbox name: ICE92
France (via X.25).... 208057040540 (mailbox name: ICE92)
Switzerland.(direct). +41 (0)71 715577 (10 lines) (username: Liquid_Jesus)
Switzerland (X.25)... 228475212574 (Same as above)
Iceland (direct)..... 354-1-78099, 670990
Iceland (X.25)....... 274011991000 (username: AmiPhreak)
Iceland via X.25..... 274011991000


Thanx to...  Mentor(LOD/H), TAP Online, DIS