|
Hacking Menu |
||||
| rules | notes WWWBoard | beginer | math teory | net password |
| unix pass | ISP Pass | Web Pages | NT Passwd | PC Hacking FAQ |
|
Crack Menu |
||||
| crack faq | inside crack | Crack mail | TakeoverChan/nick | Program Files |
THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING
Table Of Contents:
I. HACKING
A. What is hacking?
B. Why hack?
C. Hacking rules
D. Getting started
E. Where and how to start hacking
F. Telenet commands
* DISCLAIMER *
"Use this information at your own risk. I Revelation, nor any other member of
LOA, nor the persons providing this file, will NOT assume ANY responsibility for
the use, misuse, or abuse, of the
information provided herein. The following information is provided for
educational purposes ONLY. The informaion is NOT to be used for illegal
purposes. By reading this file you ARE AGREEING to the following terms:
I understand that using this information is illegal. I agree to, and understand,
that I am responsible for my own actions. If I get into trouble using this
information for the wrong reasons, I promise not
to place the blame on Revelation, LOA, or anyone that provided this file. I
understand that this information is for educational purposes only. This file may
be used to check your security systems and if you would like a thorough check
contact A.S.H.This file is basically a compilation of known hacking and
phreaking information and some information gathered from my own experience as a
hacker/phreaker. I have tried to make sure that everything excerpted from other
documents was put in quotes and labeled with the documents name, and if known,
who wrote it. I am sorry if any
mistakes were made with quoted information."
I. HACKING
A. What is hacking?
Hacking is the act of penetrating computer systems to gain knowledge about the
system and how it works.Hacking is illegal because we demand free access to ALL
data, and we get it. This pisses people off and we are outcasted from society,
and in order to stay out of prison, we must keep our status of being a
hacker/phreaker a secret. We can't discuss our findings with anyone but other
members of the hacking/phreaking community for fear of being punished. We are
punished for wanting to learn. Why is the government spending huge amounts of
time and money to arrest hackers when there are other much more dangerous people
out there. It is the murderers,
rapists, terrorists, kidnappers, and burglers who should be punished for what
they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out
to hurt people or there computers. I admit that there are some people out there
who call themselves hackers and who deliberately damage computers. But these
people are criminals, NOT hackers. I don't care what the government says, we are
NOT criminals. We are NOT trying to alter or damage any system. This is widely
misunderstood. Maybe one day people will believe us when we say that all we want
is to learn.
There are only two ways to get rid of hackers and phreakers. One is to get rid
of computers and telephones, in which case we would find other means of getting
what we want.(Like that is really going to happen.) The other way is to give us
what we want, which is free access
to ALL information. Until one of those two things happen, we are not going
anywhere.
B. Why hack?
As said above, we hack to gain knowledge about systems and the way they work. We
do NOT want to damage systems in any way. If you do damage a system, you WILL
get caught. But, if you don't damage anything, it is very unlikely that you will
be noticed, let alone be tracked down and arrested, which costs a considerable
amount of time and money.Beginners should read all the files that they can get
their hands on about anything even remotely related to hacking and phreaking,
BEFORE they start hacking. I know it sounds stupid and boring but it will
definetly pay off in the future. The more you read about hacking and phreaking,
the more unlikely it is that you will get caught. Some
of the most useless pieces of information that you read could turn out to be the
most helpful. That is why you need to read everything possible.
C. Hacking rules
1. Never damage any system. This will only get you into trouble.
2. Never alter any of the systems files, except for those needed to insure that
you are not detected, and those to insure that you have access into
that computer in the future.
3. Do not share any information about your hacking projects with anyone but
those you'd trust with your life.
4. When posting on BBS's (Bulletin Board Systems) be as vague as possible when
describing your current hacking projects. BBS's CAN be monitered by
law enforcement.
5. Never use anyone's real name or real phone number when posting on a BBS.
6. Never leave your handle on any systems that you hack in to.
7. DO NOT hack government computers.
8. Never speak about hacking projects over your home telephone line.
9. Be paranoid. Keep all of your hacking materials in a safe place.
10. To become a real hacker, you have to hack. You can't just sit around reading
text files and hanging out on BBS's. This is not what hacking is all about.
D. Getting started
The very first thing you need to do is get a copy of PKZIP or some other file
unzipping utility. Nearly everything that you download from the Internet or from
a BBS will be zipped. A zipped file is
a file that has been compressed. Zipped files end with the extension ".zip".Then
you need to get yourself a good prefix scanner.(also known as a War Dialer) This
is a program that automatically dials phone numbers beginning with the three
numbers (prefix) that you specify. It checks to see if the number dialed has a
carrier.(series of beeps that tells you that you have dialed a computer) Try and
find a large business area prefix to scan. It is these businesses that have
interesting computers. There are many good scanners out there, but I would
recommend Autoscan or A-Dial. These are very easy to use and get the job done
quickly and efficiently.
E. Where and how to start hacking
After you get yourself a good scanner, scan some prefixes and find some cool
dialups, then do the following: From your terminal,dial the number you found.
Then you should hear a series of beeps
(carrier) which tells you that you are connecting to a remote computer.It should
then say something like "CONNECT 9600" and then identify the system that you are
on. If nothing happens after it says "CONNECT 9600" try hitting enter a few
times. If you get a bunch of garbage adjust your parity, data bits, stop bits,
baud rate, etc., until it becomes clear.That is one way of connecting to a
remote computer. Another way is through Telenet or some other large network.
Telenet is a very large network that has many other networks and remote
computers connected to it.
Ok, here is how you would connect to a remote computer through Telenet:
First, you get your local dialup(phone number) from the list that I have
provided in Section G. Then you dial the number from your terminal and
connect.(If you get a bunch of garbage try changing your parity to odd and your
data bits to 7, this should clear it up.) If it just sits there hit enter and
wait a few seconds, then hit enter again. Then it will say "TERMINAL=" and you
type in your terminal
emulation. If you don't know what it is just hit enter. Then it will give you a
prompt that looks like "@". From there you type "c" and then the NUA
(Network User Address) that you want to connect to. After you connect to the
NUA, the first thing you need to do is find out what type
of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.) There are other
things that you can do on Telenet besides connecting to an NUA. Some of these
commands and functions are listed in
the next section.You can only connect to computers which accept reverse
charging.The only way you can connect to computers that don't accept reverse
charging is if you have a Telenet account. You can try hacking these. To do
this, at the "@" prompt type "access". It will then ask you for your Telenet ID
and password.Telenet is probably the safest place to start hacking because of
the large numbers of calls that they get. Make sure you call during business
hours (late morning or early afternoon) so there are many other people on-line.
F. Telenet commands
Here is a list of some Telenet commands and their functions. This is only a
partial list. Beginners probably won't use these commands,but I put them here
for reference anyway.
| COMMAND FUNCTION |
| Commands | Function |
| stat | Shows network port. |
| full | Network echo. |
| half | Terminal echo. |
| telemail | Mail.(need ID and password) |
| Mail.(need ID and password) | |
| set | Select PAD parameters |
| cont | Continue. |
| d | Disconnect. |
| hangup | Hangs up. |
| access | Telenet account.(ID and password) |
| c | Connect to a host. |
- = - = -
= - = - = - = - = - = - = - = - = - = - = - = -
StopWar
Contact information:
Email - MohamadAzmie@Hotmail.Com
Http:// - MasterZCrew.Cjb.Net & HackerMasterZ.Cjb.Net
- = - = - = - = - = - = - = - = - = - = - = - = - = - = -
Copyrighted (C) 2002
by StopWar All rights Reserved MasterZCrew, Inc.