💾 Archived View for spam.works › mirrors › textfiles › hacking › icebook1.txt captured on 2023-11-14 at 09:54:16.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
[06.09.92] _____________ __________ __________ /____ ____/\ / ______/\ / ______/\ \__ / /\___\/ / /\_____\/ / /\_____\/ / / / / / / / /_/___ / / / / / / / ______/\ / / / / / / / /\_____\/ ____/ /_/__ / /_/____ / /_/____ /____________/\ /__________/\ /__________/\ \____________\/ \__________\/ \__________\/ HQ: [416] 934-4055 +------------------------------------+ | INNER CIRCLE ELITES (ICE) Present: | +--------+------------------------------------+---------+ | | | -- The Hack/PHreak Handbook v1.00 [Release #1] -- | | | | by Liquid Jesus | | | +-------------------------------------------------------+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Part I: Introduction Part II: Rules, Code of Ethics, Warnings Part III: Definitions of terms Part IV: Hacking systems: UNIX, VAX, and PRIME Part V: Datapac, finding systems to hack Part VI: End of Transmission %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Part I: Introduction ~~~~~~~~~~~~~~~~~~~~ Ok, so it's time to write an introductory phile for all those people out there who have always wanted to do stuff like they see in the movies but don't know how. Well, almost like you see in the movies. This file isn't going to teach you how to launch ICBM's at Russia or anything, but it will get you to become familiar with some hack/phreak (h/p) terms that are commonly used. I've tried writting this before but I didn't know where to start. H/P texts get spread around the world so quickly, that if I wrote a hack/phreak text on how to get started in the St. Catharines/Niagara area, people in Europe won't have a clue as to what the hell I was talking about. But screw it, the way I see things it's better to get people started here then over there. At least I can see the effects of this file if it's for local people. Alot of you may already have knowledge about alot of the systems I'm going to talk about (VAX, Unix, Primos, etc..) from your university experiences (alot of universities use VAX's in particular, and you may have already used the Unix operating system on those good old ICON's in high school). If you don't have any previous experience with these systems, don't panic, this file should explain most of what you need to know on getting started. You may be asking yourself "Why is he writting this file anyways?". Well, for one, because the phreak community in Niagara SUCKS. As far as I know, my BBS is the only one supporting h/p areas that are active. Two, it seems I'm the only one calling long distance because I'm the only one that CAN (for free). With more people calling for free, the more of the world will be brought to Niagara (instead of people like myself going to all continents chasing after things). Also, I'll be concentrating on the Datapac network, because it's the biggest Canadian network around and it has local dialups all across the country. Future releases will get more into detail about other networks such as Tymnet, Telenet, ItaPAC, etc.. Part II: Rules, Code of Ethics, Warnings ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Before I start talking about anything, I'd like to state some of the rules to follow, some of the phreak's codes of ethics, and some warnings on what to do and what NOT to do: 1 - Always share information. A "fone phreak" is someone who shares what he finds, with other people, that's the whole idea. There's strength in numbers and there's a hellova lot more chance on cracking a system that 200 people know about, then cracking a system that one person has found but chooses to keep it a secret. 2 - Don't destroy information. This is a *must follow* rule. If you have broken into a computer for some company and can't find anything of interest, don't start formatting hard drives and screwing up the system. The chance of getting caught could double or triple as soon as you do this (ESPECIALLY if you are calling that system through a network, there's more chance that someone may be watching what you're doing). Of course it's okay to delete any files that may show that you where IN the system (log files, incorrect password files, etc..) but don't kill anything for no reason. 3 - Help others. You'll find most people in the phreak community will be willing to help you and answer questions as long as you're polite. You WILL do most of your learning by yourself but there will also be times when you've got something you have NO CLUE about, and have to ask someone who does. So once YOU are experienced and someone has a question, answer it no matter how basic the question may seem. Remember, everyone was a beginner sometime. 4 - Don't go too far into things you don't know about. There are certain things out there that only the most experience hackers should screw with (eg: C.B.I., Cosmos, some 1-800 services, etc..). 5 - Don't show off by telling people what you've done. Sure it's okay to talk to other phreaks about your doings, but if you have someone on a board who you've known for awhile, but doesn't seem to be into the h/p scene, don't start babbling to him about all the stuff you've hacked. I've heard a FEW stories about people bragging to other people that they don't really know, and have arrived in a pile of dung for it. Only talk about hack/phreak stuff on hack/phreak BBS's. Well those are most of the things you should follow, sure there's lots of other rules I could have put up but those are the main ones. I hope they help. I know there'll always be that ONE person that doesn't share his info, or that ONE person that will want to destroy every system he finds, but I hope the majority will be follow those rules. Oh yah, before I go on, you're probably wondering "What the hell's the difference between a hacker and a phreak". Well, a hacker is basically someone who is interested in information, someone who wants to get into systems to LEARN from them. A phreak is someone who wants to use that knowledge to his advantage (free phone calls, use of pay services, etc..). A lot of hackers stay to their own area, hacking local systems, whereas a lot of phreaks don't even own computers! All you need to phreak is a touchtone phone (essentially). Of course, a lot of phreaks use their knowledge to HACK on other systems that they can get to calling long distance, and alot of hackers get into phreaking for the same reason. I guess the main difference is that hackers want to learn information, and phreaks are more interested in sharing it. A little knowledge can be a dangerous thing. Part III: Definitions of H/P Terms ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Ok, not all of these following terms are used JUST in the h/p community but you should know what they mean. You could be writing down stuff from a VMB and not know what the hell you're writing down. Knowing the terminology is important. There's literally HUNDREDS of things I could list here, but I'll stick to the stuff you need to know... If you want a full list of terminology call the ICE HQ BBS (416-934-4055) and get it there. 800 Services - there are MANY types of 800 services (eg: PBX's (Private Branch eXchanges), 950's, etc..) that allow you to call for free. PBX's are the most popular service and are used by big companies. Ok, a company wants it's employees to be able to make long distance phone calls (for business purposes only of course) so that the calls are billed directly to the company. The employee would call up the 800 number, enter a code, and then would be switched over to another line and would hear a dial tone. From here he enters the long distance number he wants to call. What hackers/phreaks do find these services, hack out the codes, and use them for themselves. Most 800 services are limited to calling within North America but I HAVE seen a few that allow overseas calls. When you call long distance using an 800 service, it just as a standard connection so uploading and downloading on BBS's is possible (unlike when calling using PADs - more on this below). The prob with these services is that once a code is hacked out, it's spread over VMBs to hundreds of other hackers, and the codes don't last long. Amex - American Express credit card CC - Calling Card. Calling Cards are used widespread in Europe (especially AT&T's) and North America (usually MCI's - safer to use here.). The main calling cards that are used by phreaks are AT&T's (also referred to as ATTs), MCI, Sprint, and even Bell once in awhile. MCI's are safe to use, I've used a number of them racking up hundreds of dollars in unpaid long distance calls and haven't been bothered by anyone. The problem with using calling cards to call for free is that they don't last long. If you get a calling card over a VMB then chances are their's a few THOUSAND other phreaks using that same card to call all over the world within a few hours. It's unusual for a calling card to last more than a day or two. CC - Credit Card. Yes, the same abbreviation is used for calling cards as credit card's. The only thing credit cards are good for basically is calling up porno lines. They're useless without all the info. Most of the time when you get a credit card it will just be the card number (14-16 digit) and the expiry date (month and year eg: 10/93 for Oct. 1993). If by some chance you get a credit card that has ALL the info (holder's name, SIN #, age, date of birth, issuing bank, etc...) you've got yourself a hot item. If the card is new (virgin - nobody else knows about it) you can do a number of things. 1: you can call up pay services and register with them (eg: CompuServe, GEnie, BIX, etc) or 2: you can do a mail order and et yourself that 700 meg hard drive you've always wanted. There are a couple of drawbacks to do this though. You have to know how much money the holder has left to spend on the card (yes, you can also find this out...) and you have to have an empty house to have it mailed to (or do what some people I know have done - order it straight to your house). Anyways... I don't think I have to tell you the advantages of having someone else's credit card information. If you've got one then use your imagination. And whatever you do, stay quiet about it. Credit card fraud is a bitchin offence. Major cc's that are frequently ripped of are American Express, VISA, and MasterCard. Codes - Well it's pretty self-explanitory but a code can be anything from a way to call long distance for free, to a number of a virgin VMB system, to a backdoor to a porno chat line, to a login to a VAX system. Codes are basically anything that will let you use a pay service (of any kind) for free, or something that will get you into somewhere you're not supposed to be. PAD - Packet Assembler/Disassembler. That's one name, it's also referred to by some as a Public Access Device. All it is, is a program that is tied into a network (eg: X.25) and it allows you to call any other system in the world that is also connected to the X.25 network via it's network user address (NUA). Advantages of using a PAD to call systems is that you get a crystal clear connection - no line noise. The disadvantage, is since what you type is put into a packet (usually 128 or 256 bytes - but this can be changed), there is a DELAY called "PAD delay". Eg: you get to prompt that says "Hit any Key to Continue" so you hit the return key. Text would not continue to come out from the other end for a few seconds after that. Also, when you're typing in large amounts of text as in messages, the text you enter will appear on your screen in chunks at a time. The major disadvantage of calling through PADs is that upload/downloading isn't possible. There ARE u/d protocals designed to take pad delay into account but none for microcomputers yet (or none that I know of). Some people claim to have gotten (I know, bad grammer) Zmodem to work when calling through a PAD but I haven't myself. NUI - Network User Identification. This is similar to an NUA but the major difference is that it's used by only one person and not an entire company. Eg: an employee connects to Datapac and enters his NUI (usually a 6-digit #) and from there he can call any system in the world via X.25 network. If his company is in Toronto Canada and he's off on business in France, he can hook up to his companies system by using his NUI to call. Datapac NUI's are scarce and chances are you won't be using one that often. NUA - Network User Address. These are numbers consisting of a variable number of digits that are used by the X.25 network to connect you to other systems. An NUA is kind of like a phone number. Eg: the NUA for an international chat line in France called QSD is 208057040540. So to connect to QSD I'd get to a PAD, enter the calling command (usually c1) then the NUA of the system I want to connect to. So at the PAD prompt (I'll use the PADs on Primos computers called "NetLink" as an example) I'd enter c1208057040540 [return] and in seconds it would say something like PAD - Call connected to 208057040540 and I'd be on QSD. There are thousands of NUAs for all types of systems ranging from chat lines, to university VAX's, to government mainframes, to small company computers, to online libraries. OD - OutDial. This is a phone line that you connect to via it's NUA and from there it switches you to an average telephone line from which you can call out using ordinary telephone numbers. Most major urban areas have an outdial and all outdials are connected to by it's NUA. An example for Milwaukee Wisconsin, USA is 311041400020 which has a 2400 baud modem attached to it (some outdials even have 9600 modems attached to them. So if I wanted to call Tone Town BBS in Milwaukee Wisconsin which has a phone number of (414)781-3218 I'd connect to my PAD, then connect to the Milwaukee outdial, and from there I'd type ATZ [return] (to reset the modem at the outdial), then ATDT7813218 [return] and that would make a local call from the outdial to the BBS. Lists of outdials and the areas they're for are availible on most half-decent hack/phreak BBS's. Of course the only way to get to an outdial is through a PAD and that will give you PAD delay, but hey, it's a crystal clear connection and it's free. Outdials (normal ones) only allow you to make local calls from them although SOME outdials (Global Outdials - GOD's) allow you to make calls anywhere. I'd say only about 1 in 20 outdials are GOD's. There's no way to tell the difference, only to try to call long distance from the outdial and see for yourself. Oh yah, if you want a menu when you're connected to an outdial, enter "%" and hit return. You'll get a "READY" prompt then type "?" and hit return for a menu. VMB - Voice Mail Box. These are neat little devices used by company employees to recieve voice mail. Essentially what they are is a 1-800 answering machine. It allows the owner to be away on business and still check for any messages by entering a secret "passcode". When this passcode is entered the owner can listen to his messages, delete them, change his greet or do a number of other things. A standard voice mail system could have up to a thousand or more mail boxes on it. So what's the use of 'em? When you call a VMB system a recorded message will come on asking you to enter the voice mailbox number (usually a 3 or 4 digit number) using your average touchtone phone. You enter the mailbox number of the person you're trying to reach and they're recorded message (called the "greet") will be played. How they're used? Well phreaks call up these VMB services and hack out the passcodes of other people's mailboxes and use it for themselves. This allows phreaks from all over the country to call up, listen to the greet (which is usually filled with codes), and leave some codes (if the person has any) after the beep. EG: I call up Digital Assassin's voice mailbox at 1-800-268-6683 (just an example), enter 4251 at the recording (an example of what his mailbox # would be) and his pre-recorded message would come on listing a bunch of codes to different services, bbs numbers to call, etc.. then at the beep, if I didn't have any codes I could advertise my favorite bbs eg: "Hi, this is Liquid Jesus. Call Psychiatric CyberHell BBS at 416-934-4055. Later" and hang up. If Digital Assassin was cool he'd put this in his next greet. Most greets are updated every day or second day. VMB's are the best way to trade information quickly and the best way to get new codes. Ok, so you still don't know how to call long distance for free right? Well from the above mentioned terms, there's 2 different ways: 1 - using 800 services 2 - using a PAD eg. for 800 service: I type AT&C <cr> to set my modem's carrier detect ON. I type ATXD (NOT hitting return yet) I pick up my touch tone and enter the 800 service (eg: 1-800-123-4567) at the tone I enter the code, and then I recieve another dialtone. I enter 1-416-934-4055 (the number of the BBS I'm calling). When I hear the carrier I hit return (which sends the ATXD to the modem telling it to connect) and hang up my voice phone and WALLA! I'm connected. eg. for a PAD (little more complicated...) I call up my local Datapac dialup (eg: 687-1115 - a 2400bps dialup) I enter ".." <cr> (two periods and return to tell Dpac I'm there) I enter the datapac address of the system I want to connect to eg:20500015 plus <cr> and now I'm connected to that system. I now enter the username and password or whatever is needed to enter the system. Once in, I get to the PAD on that system, at the pad I enter the NUA of the OutDial that I want to connect to. Once connected to the outdial I enter ATZ <cr> then ATDT<number> <cr> and that will connect me. So basically it's connecting to Datapac -> system -> pad -> outdial -> BBS The only way to use either is for someone to tell you EXACTLY how because each system is different. I don't have any working PADs right now so I can't give you a working example. Ok, enough of that. PART IV: Hacking Systems ~~~~~~~~~~~~~~~~~~~~~~~~ The three computer systems I'm going to talk about are Unix, VAX, and Prime. Unix's are easy to use, VAX's have very powerful commands, and Primes... well Primes are relatively SHIT but have *excellent* PAD software (called "NetLink") and easy to use commands. Jeez, some Prime systems will even let you boost your own access... (duhh..) but most don't contain any good info on them. Each have an easy way to identify them. Unix systems will ask for a "Login:" and "Password:" and will give you unlimited tries and will never kick you off, although they will NOT tell you if you've entered a wrong login or password but will just tell you that ONE of them didn't work (eg: "Invalid login or password"). VAX systems ask for a "Username:" and "Password:" and will allow only 3 invalid tries before kicking you off. Once in, VAX's will give you a "$" for a prompt. Prime systems will display a line as soon as you connect something like: PRIMENET 22.0.3 VOID The "Primenet" tells you it's a Prime system, the 22.0.3 is the revision of PRIMOS the system is running under (it's operation system ie PrimOS) and the "VOID" is the system nodename upon connect. It will not give you a "login" prompt but you can either enter "login" and hit return to get one or just simply type "login <username>" and it will then give you the "Password:" prompt. Prime systems only give one chance to connect before they kick you off. Prime systems give an "OK," as a prompt. Now, going into more detail on Unix's, Vax's, and Primes... VAX's: ------ The VAX acronym is derived from Virtual Address eXtension. The VAX computer is designed to use memory addresses beyond the hardware's actual limits, enabling it to handle programs that are too large to fit into physical memory. The VAX computer system is a member of the Digital Equipment Corporation (DEC) computer family. Currently the VAX series includes models spanning the desktop VAX station to mainframe class multi-CPU VAX processors. These vary from the superminis, like MicroVAX, to the older, moderate sized 11/7XX series, to the newer 6000 series. These computer systems commonly use an operating system known as VMS. The VMS acronym is for Virtual Memory System. The operands of VMS are very similar to other operating systems. Back in the days of stand-alone computer systems, DEC had the idea for streamlining the operation of their computers for business and engineering. It conceived VMS as a way of allowing the basic computer management to be done by a user familiar with any of the multiple systems it made. How to get into a VAX by default login/passwords: ------------------------------------------------- When DEC designed the VAX they put in several default accounts to test them out. These accounts have passwords which don't change from system to system. The system manager should have removed them before the system was put online but it is not done all the time. Here are several defaults for VAX systems: Username Password ------------ ----------------- DECNET DECNET -- The accounts listed with