textfiles/hacking/icebook1.txt

654 lines
35 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[06.09.92]
_____________ __________ __________
/____ ____/\ / ______/\ / ______/\
\__ / /\___\/ / /\_____\/ / /\_____\/
/ / / / / / / /_/___
/ / / / / / / ______/\
/ / / / / / / /\_____\/
____/ /_/__ / /_/____ / /_/____
/____________/\ /__________/\ /__________/\
\____________\/ \__________\/ \__________\/
HQ: [416] 934-4055
+------------------------------------+
| INNER CIRCLE ELITES (ICE) Present: |
+--------+------------------------------------+---------+
| |
| -- The Hack/PHreak Handbook v1.00 [Release #1] -- |
| |
| by Liquid Jesus |
| |
+-------------------------------------------------------+
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Part I: Introduction
Part II: Rules, Code of Ethics, Warnings
Part III: Definitions of terms
Part IV: Hacking systems: UNIX, VAX, and PRIME
Part V: Datapac, finding systems to hack
Part VI: End of Transmission
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Part I: Introduction
~~~~~~~~~~~~~~~~~~~~
Ok, so it's time to write an introductory phile for all those people
out there who have always wanted to do stuff like they see in the movies but
don't know how. Well, almost like you see in the movies. This file isn't
going to teach you how to launch ICBM's at Russia or anything, but it will
get you to become familiar with some hack/phreak (h/p) terms that are
commonly used. I've tried writting this before but I didn't know where to
start. H/P texts get spread around the world so quickly, that if I wrote a
hack/phreak text on how to get started in the St. Catharines/Niagara area,
people in Europe won't have a clue as to what the hell I was talking about.
But screw it, the way I see things it's better to get people started here
then over there. At least I can see the effects of this file if it's for
local people.
Alot of you may already have knowledge about alot of the systems I'm
going to talk about (VAX, Unix, Primos, etc..) from your university
experiences (alot of universities use VAX's in particular, and you may have
already used the Unix operating system on those good old ICON's in high
school). If you don't have any previous experience with these systems,
don't panic, this file should explain most of what you need to know on
getting started. You may be asking yourself "Why is he writting this file
anyways?". Well, for one, because the phreak community in Niagara SUCKS.
As far as I know, my BBS is the only one supporting h/p areas that are
active. Two, it seems I'm the only one calling long distance because I'm
the only one that CAN (for free). With more people calling for free, the
more of the world will be brought to Niagara (instead of people like myself
going to all continents chasing after things). Also, I'll be
concentrating on the Datapac network, because it's the biggest Canadian
network around and it has local dialups all across the country. Future
releases will get more into detail about other networks such as Tymnet,
Telenet, ItaPAC, etc..
Part II: Rules, Code of Ethics, Warnings
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Before I start talking about anything, I'd like to state some of the
rules to follow, some of the phreak's codes of ethics, and some warnings on
what to do and what NOT to do:
1 - Always share information. A "fone phreak" is someone who shares what
he finds, with other people, that's the whole idea. There's strength
in numbers and there's a hellova lot more chance on cracking a system
that 200 people know about, then cracking a system that one person has
found but chooses to keep it a secret.
2 - Don't destroy information. This is a *must follow* rule. If you have
broken into a computer for some company and can't find anything of
interest, don't start formatting hard drives and screwing up the system.
The chance of getting caught could double or triple as soon as you do
this (ESPECIALLY if you are calling that system through a network,
there's more chance that someone may be watching what you're doing).
Of course it's okay to delete any files that may show that you where IN
the system (log files, incorrect password files, etc..) but don't
kill anything for no reason.
3 - Help others. You'll find most people in the phreak community will be
willing to help you and answer questions as long as you're polite.
You WILL do most of your learning by yourself but there will also be
times when you've got something you have NO CLUE about, and have to ask
someone who does. So once YOU are experienced and someone has a
question, answer it no matter how basic the question may seem.
Remember, everyone was a beginner sometime.
4 - Don't go too far into things you don't know about. There are certain
things out there that only the most experience hackers should screw
with (eg: C.B.I., Cosmos, some 1-800 services, etc..).
5 - Don't show off by telling people what you've done. Sure it's okay
to talk to other phreaks about your doings, but if you have someone
on a board who you've known for awhile, but doesn't seem to be into the
h/p scene, don't start babbling to him about all the stuff you've
hacked. I've heard a FEW stories about people bragging to other people
that they don't really know, and have arrived in a pile of dung for it.
Only talk about hack/phreak stuff on hack/phreak BBS's.
Well those are most of the things you should follow, sure there's
lots of other rules I could have put up but those are the main ones. I hope
they help. I know there'll always be that ONE person that doesn't share his
info, or that ONE person that will want to destroy every system he finds,
but I hope the majority will be follow those rules.
Oh yah, before I go on, you're probably wondering "What the hell's
the difference between a hacker and a phreak". Well, a hacker is basically
someone who is interested in information, someone who wants to get into
systems to LEARN from them. A phreak is someone who wants to use that
knowledge to his advantage (free phone calls, use of pay services, etc..).
A lot of hackers stay to their own area, hacking local systems, whereas a lot
of phreaks don't even own computers! All you need to phreak is a touchtone
phone (essentially). Of course, a lot of phreaks use their knowledge to
HACK on other systems that they can get to calling long distance, and alot of
hackers get into phreaking for the same reason. I guess the main difference
is that hackers want to learn information, and phreaks are more interested
in sharing it. A little knowledge can be a dangerous thing.
Part III: Definitions of H/P Terms
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ok, not all of these following terms are used JUST in the h/p
community but you should know what they mean. You could be writing down
stuff from a VMB and not know what the hell you're writing down. Knowing
the terminology is important. There's literally HUNDREDS of things I
could list here, but I'll stick to the stuff you need to know... If you
want a full list of terminology call the ICE HQ BBS (416-934-4055) and get
it there.
800 Services - there are MANY types of 800 services (eg: PBX's (Private
Branch eXchanges), 950's, etc..) that allow you to call for free.
PBX's are the most popular service and are used by big companies.
Ok, a company wants it's employees to be able to make long distance
phone calls (for business purposes only of course) so that the calls
are billed directly to the company. The employee would call up the
800 number, enter a code, and then would be switched over to another
line and would hear a dial tone. From here he enters the long distance
number he wants to call. What hackers/phreaks do find these services,
hack out the codes, and use them for themselves. Most 800 services are
limited to calling within North America but I HAVE seen a few that
allow overseas calls. When you call long distance using an 800 service,
it just as a standard connection so uploading and downloading on BBS's
is possible (unlike when calling using PADs - more on this below).
The prob with these services is that once a code is hacked out, it's
spread over VMBs to hundreds of other hackers, and the codes don't
last long.
Amex - American Express credit card
CC - Calling Card. Calling Cards are used widespread in Europe (especially
AT&T's) and North America (usually MCI's - safer to use here.). The
main calling cards that are used by phreaks are AT&T's (also referred
to as ATTs), MCI, Sprint, and even Bell once in awhile. MCI's are
safe to use, I've used a number of them racking up hundreds of dollars
in unpaid long distance calls and haven't been bothered by anyone.
The problem with using calling cards to call for free is that they
don't last long. If you get a calling card over a VMB then chances
are their's a few THOUSAND other phreaks using that same card to call
all over the world within a few hours. It's unusual for a calling
card to last more than a day or two.
CC - Credit Card. Yes, the same abbreviation is used for calling cards as
credit card's. The only thing credit cards are good for basically is
calling up porno lines. They're useless without all the info. Most
of the time when you get a credit card it will just be the card
number (14-16 digit) and the expiry date (month and year eg: 10/93
for Oct. 1993). If by some chance you get a credit card that has
ALL the info (holder's name, SIN #, age, date of birth, issuing
bank, etc...) you've got yourself a hot item. If the card is new
(virgin - nobody else knows about it) you can do a number of things.
1: you can call up pay services and register with them (eg:
CompuServe, GEnie, BIX, etc) or 2: you can do a mail order and et
yourself that 700 meg hard drive you've always wanted. There are
a couple of drawbacks to do this though. You have to know how much
money the holder has left to spend on the card (yes, you can also
find this out...) and you have to have an empty house to have it
mailed to (or do what some people I know have done - order it
straight to your house). Anyways... I don't think I have to tell
you the advantages of having someone else's credit card information.
If you've got one then use your imagination. And whatever you do,
stay quiet about it. Credit card fraud is a bitchin offence. Major
cc's that are frequently ripped of are American Express, VISA, and
MasterCard.
Codes - Well it's pretty self-explanitory but a code can be anything from
a way to call long distance for free, to a number of a virgin VMB
system, to a backdoor to a porno chat line, to a login to a VAX system.
Codes are basically anything that will let you use a pay service (of
any kind) for free, or something that will get you into somewhere
you're not supposed to be.
PAD - Packet Assembler/Disassembler. That's one name, it's also referred
to by some as a Public Access Device. All it is, is a program that is
tied into a network (eg: X.25) and it allows you to call any other
system in the world that is also connected to the X.25 network via
it's network user address (NUA). Advantages of using a PAD to call
systems is that you get a crystal clear connection - no line noise.
The disadvantage, is since what you type is put into a packet (usually
128 or 256 bytes - but this can be changed), there is a DELAY called
"PAD delay". Eg: you get to prompt that says "Hit any Key to Continue"
so you hit the return key. Text would not continue to come out from
the other end for a few seconds after that. Also, when you're typing
in large amounts of text as in messages, the text you enter will appear
on your screen in chunks at a time. The major disadvantage of calling
through PADs is that upload/downloading isn't possible. There ARE u/d
protocals designed to take pad delay into account but none for
microcomputers yet (or none that I know of). Some people claim to have
gotten (I know, bad grammer) Zmodem to work when calling through a PAD
but I haven't myself.
NUI - Network User Identification. This is similar to an NUA but the
major difference is that it's used by only one person and not an
entire company. Eg: an employee connects to Datapac and enters his
NUI (usually a 6-digit #) and from there he can call any system in
the world via X.25 network. If his company is in Toronto Canada and
he's off on business in France, he can hook up to his companies
system by using his NUI to call. Datapac NUI's are scarce and chances
are you won't be using one that often.
NUA - Network User Address. These are numbers consisting of a variable
number of digits that are used by the X.25 network to connect you to
other systems. An NUA is kind of like a phone number. Eg: the NUA
for an international chat line in France called QSD is 208057040540.
So to connect to QSD I'd get to a PAD, enter the calling command
(usually c1) then the NUA of the system I want to connect to. So at
the PAD prompt (I'll use the PADs on Primos computers called "NetLink"
as an example) I'd enter c1208057040540 [return] and in seconds it
would say something like PAD - Call connected to 208057040540 and I'd
be on QSD. There are thousands of NUAs for all types of systems
ranging from chat lines, to university VAX's, to government mainframes,
to small company computers, to online libraries.
OD - OutDial. This is a phone line that you connect to via it's NUA
and from there it switches you to an average telephone line from
which you can call out using ordinary telephone numbers. Most
major urban areas have an outdial and all outdials are connected to
by it's NUA. An example for Milwaukee Wisconsin, USA is
311041400020 which has a 2400 baud modem attached to it (some outdials
even have 9600 modems attached to them. So if I wanted to call Tone
Town BBS in Milwaukee Wisconsin which has a phone number of
(414)781-3218 I'd connect to my PAD, then connect to the Milwaukee
outdial, and from there I'd type ATZ [return] (to reset the modem at
the outdial), then ATDT7813218 [return] and that would make a local
call from the outdial to the BBS. Lists of outdials and the areas
they're for are availible on most half-decent hack/phreak BBS's. Of
course the only way to get to an outdial is through a PAD and that
will give you PAD delay, but hey, it's a crystal clear connection and
it's free. Outdials (normal ones) only allow you to make local calls
from them although SOME outdials (Global Outdials - GOD's) allow you
to make calls anywhere. I'd say only about 1 in 20 outdials are
GOD's. There's no way to tell the difference, only to try to call
long distance from the outdial and see for yourself. Oh yah, if you
want a menu when you're connected to an outdial, enter "%" and hit
return. You'll get a "READY" prompt then type "?" and hit return for
a menu.
VMB - Voice Mail Box. These are neat little devices used by company
employees to recieve voice mail. Essentially what they are is a
1-800 answering machine. It allows the owner to be away on business
and still check for any messages by entering a secret "passcode". When
this passcode is entered the owner can listen to his messages, delete
them, change his greet or do a number of other things. A standard
voice mail system could have up to a thousand or more mail boxes on it.
So what's the use of 'em? When you call a VMB system a recorded message
will come on asking you to enter the voice mailbox number (usually a 3
or 4 digit number) using your average touchtone phone. You enter the
mailbox number of the person you're trying to reach and they're recorded
message (called the "greet") will be played. How they're used? Well
phreaks call up these VMB services and hack out the passcodes of other
people's mailboxes and use it for themselves. This allows phreaks
from all over the country to call up, listen to the greet (which is
usually filled with codes), and leave some codes (if the person has
any) after the beep. EG: I call up Digital Assassin's voice mailbox
at 1-800-268-6683 (just an example), enter 4251 at the recording (an
example of what his mailbox # would be) and his pre-recorded message
would come on listing a bunch of codes to different services, bbs
numbers to call, etc.. then at the beep, if I didn't have any codes
I could advertise my favorite bbs eg: "Hi, this is Liquid Jesus. Call
Psychiatric CyberHell BBS at 416-934-4055. Later" and hang up. If
Digital Assassin was cool he'd put this in his next greet. Most
greets are updated every day or second day. VMB's are the best way
to trade information quickly and the best way to get new codes.
Ok, so you still don't know how to call long distance for free right?
Well from the above mentioned terms, there's 2 different ways:
1 - using 800 services
2 - using a PAD
eg. for 800 service:
I type AT&C <cr> to set my modem's carrier detect ON.
I type ATXD (NOT hitting return yet)
I pick up my touch tone and enter the 800 service (eg: 1-800-123-4567)
at the tone I enter the code, and then I recieve another dialtone.
I enter 1-416-934-4055 (the number of the BBS I'm calling).
When I hear the carrier I hit return (which sends the ATXD to the modem
telling it to connect) and hang up my voice phone and WALLA! I'm
connected.
eg. for a PAD (little more complicated...)
I call up my local Datapac dialup (eg: 687-1115 - a 2400bps dialup)
I enter ".." <cr> (two periods and return to tell Dpac I'm there)
I enter the datapac address of the system I want to connect to eg:20500015
plus <cr> and now I'm connected to that system. I now enter the username
and password or whatever is needed to enter the system. Once in, I get to
the PAD on that system, at the pad I enter the NUA of the OutDial that I
want to connect to. Once connected to the outdial I enter ATZ <cr> then
ATDT<number> <cr> and that will connect me. So basically it's connecting
to Datapac -> system -> pad -> outdial -> BBS
The only way to use either is for someone to tell you EXACTLY how because
each system is different. I don't have any working PADs right now so I
can't give you a working example.
Ok, enough of that.
PART IV: Hacking Systems
~~~~~~~~~~~~~~~~~~~~~~~~
The three computer systems I'm going to talk about are Unix, VAX,
and Prime. Unix's are easy to use, VAX's have very powerful commands, and
Primes... well Primes are relatively SHIT but have *excellent* PAD
software (called "NetLink") and easy to use commands. Jeez, some Prime
systems will even let you boost your own access... (duhh..) but most don't
contain any good info on them. Each have an easy way to identify them.
Unix systems will ask for a "Login:" and "Password:" and will give you
unlimited tries and will never kick you off, although they will NOT tell
you if you've entered a wrong login or password but will just tell you
that ONE of them didn't work (eg: "Invalid login or password"). VAX
systems ask for a "Username:" and "Password:" and will allow only 3
invalid tries before kicking you off. Once in, VAX's will give you a "$"
for a prompt. Prime systems will display a line as soon as you connect
something like:
PRIMENET 22.0.3 VOID
The "Primenet" tells you it's a Prime system, the 22.0.3 is the revision
of PRIMOS the system is running under (it's operation system ie PrimOS)
and the "VOID" is the system nodename upon connect. It will not give you
a "login" prompt but you can either enter "login" and hit return to get
one or just simply type "login <username>" and it will then give you the
"Password:" prompt. Prime systems only give one chance to connect before
they kick you off. Prime systems give an "OK," as a prompt. Now, going
into more detail on Unix's, Vax's, and Primes...
VAX's:
------
The VAX acronym is derived from Virtual Address eXtension. The VAX
computer is designed to use memory addresses beyond the hardware's actual
limits, enabling it to handle programs that are too large to fit into
physical memory. The VAX computer system is a member of the Digital
Equipment Corporation (DEC) computer family. Currently the VAX series
includes models spanning the desktop VAX station to mainframe class
multi-CPU VAX processors. These vary from the superminis, like MicroVAX,
to the older, moderate sized 11/7XX series, to the newer 6000 series.
These computer systems commonly use an operating system known as VMS.
The VMS acronym is for Virtual Memory System. The operands of VMS
are very similar to other operating systems. Back in the days of
stand-alone computer systems, DEC had the idea for streamlining the
operation of their computers for business and engineering. It conceived
VMS as a way of allowing the basic computer management to be done by a user
familiar with any of the multiple systems it made.
How to get into a VAX by default login/passwords:
-------------------------------------------------
When DEC designed the VAX they put in several default accounts to
test them out. These accounts have passwords which don't change from
system to system. The system manager should have removed them before the
system was put online but it is not done all the time. Here are several
defaults for VAX systems:
Username Password
------------ -----------------
DECNET DECNET -- The accounts listed with
* SYSTEST UETP asterisks "*" next to them are
SYSTEST very powerful accounts. Defaults
SYSTEM SYSTEM that have worked for me in the
DEFAULT DEFAULT past are OPERATOR and SYSTEM.
* FIELD FIELD
OPERATIONS OPERATIONS
OPERATOR OPERATOR
* SUPPORT SUPPORT
DEC
OK, so this basically tells you how to recognize when you've connected to
a VAX and possible ways to get in. I'm not going to get into detail about
commands but if you DO manage to get into a VAX system, they give
unlimited descriptions of the commands availible. Just hit HELP at the
prompt and you can get a full description of anything. The online HELP
will explain it better than I can...
PRIME's
-------
[Some of the following information extracted from "Introduction to the
PRIMOS Operation System" by the VOID Hackers..]
One thing about Primes is that they're generally ignored by the average
hacker because of the lack of information on them and unfamiliarity, but
PRIMOS is a very user-friendly operating system. Main Prime owners these
days are corporations and governments. Different models of Primes are the
Prime 250's (ancient) and 750's (also ancient but still in use), the Prime
4150's (a mid-range system) and the huge Prime 9550's (high-end mini's).
Also in the high-end spectrum is the Prime MCXL's (super-mini's) and Prime
workstation clusters. As there are many models, there are just as many
revisions of PRIMOS (the Prime operating system) they run on. About all
you'll see today are Rev. 20.xx, 21.xx, 22.xx or 23.xx but some foreign
packet-switching networks (PSN's) are still running revisions 17.xx,
18.xx, and 19.xx. (such as Brazil's Interdata or Renpac networks). Here
are a list of default logins/passwords for PRIME systems:
User ID Password Comments
___________________________________________________________________________
ADMIN ADMIN, ADMINISTRATOR Administrator account
CMDNC0 CMDNC0 External command UFD maintenance
DEMO DEMO, GUEST Demo account
DIAG DIAG Diagnostic account
FAM FMA File Access Manager
GAMES GAMES Games account (only on schools)
GUEST GUEST, VISITOR Demo account
HELP HELP Help subsystem account
INFO INFO Information account
JCL JCL Job Control Language account
LIB LIB, LIBRARY Library maintenance account
NETMAN NETMAN Network controller account
NETPRIV NETPRIV Network priv account
NEWS NEWS News account
NONETPRIV NONETPRIV Network nopriv account
PRIME PRIME Prime account
PR1ME PR1ME Prime account
PRIMOS PRIMOS Prime account
PRIMOS_CL PRIMOS_CL Prime account
REGIST REGIST User registration account
RJE RJE Remote Job Entry account
STUDENT STUDENT, SCHOOL Student account (only on schools)
SYSADM SYSADM, ADMIN Administrator account
SYSTEM SYSTEM Administrator account
TEST TEST Test account
___________________________________________________________________________
Anyways.. if you do get a successful login and password it will return
something like this (I'll call the username "PRIMEUSER" as an example):
PRIMEUSER (user 87) logged in Sunday, 22 Jan 89 16:15:40.
Welcome to PRIMOS version 21.0.3
Copyright (c) 1988, Prime Computer, Inc.
Serial #<serial_number> (company_name)
Last login Wednesday, 18 Jan 89 23:37:48.
'serial_number' and 'company_name' will be replaced by the actual serial number
and company name of the company that owns the Prime computer site.
Once you're in PRIMOS will give you one of two prompts: "OK," or "ER!".
Both are the same, the later just means the previous command you entered
had an error (ie: invalid command).
Ok, to get a list of commands and descriptions type "HELP" for a list of
commands and " <Command Name> HELP " or " HELP <command Name> " for
additional information on that command.
UNIX:
-----
There's too much information on the Unix system for me to decide where to
begin so I'll just state the basics. I'll give you a big file that
explains Unix's inside-out upon request. Ok, Unix systems as stated
before are identified with the "login:" and "password:" prompts. Unix's
will give unlimited attempts to get a correct login/password combination.
Powerful default logins are "root, daemon, sysadm, sysadmin, spool" with
the "root" login being the most powerful of all.
PART V: DATAPAC, FINDING SYSTEMS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Ok, so you wanna get out there and get started right? Ok, well if
you live in the St. Catharines/Niagara area of Ontario what you do is call
up your local Datapac dialup (eg: 687-1104, 687-1115) and once you're
connected you must enter 2 periods and hit return ".. <cr>" and you'll get
something like
DATAPAC: 3720 1350
or something... The first thing you need to know about Datapac is that the
addresses of the systems connected to it are 8 digits long (when in
standard format... some are up to 20 digits long). Most have the first
digit higher than "1" and the forth digit a "0". The good thing about
Datapac is that it has an extensive online help system. To reach this
enter the address "92100086" and hit return. It will give a menu and you
can go from there are read up about Datapac as much as you want.
Scanning Datapac:
Ok, the best way to find other systems hooked up with datapac is to scan
for them. First, decide on what numbers you're going to scan. Eg: if you
wanted to scan from say 71500000 up, set a macro key to "715000" and enter
the macro+01 then macro+02 then macro+03 etc. etc... if there's nothing
at that address you'll recieve a "DATAPAC - Invalid Address" response.
One thing to keep in mind: after every 8 invalid addresses you enter IN A
ROW, Datapac will hang up on you. Therefore, you MUST enter an address
that connects to a system every 8 unsuccessful tries. An example is a
system at "20800315" which will connect you to a system and immediately
kick you back to Datapack. Enter this address after every 8 invalid
addresses when scanning. This will keep you from being kicked off for
invalid attempts. Eg: If I was scanning 205000xx I'd enter 205000 in a
macro, enter macro+00, macro+01, macro+02, etc.. and if I got to macro+07
(which would be 20500007) I'd enter the other macro (20800315) and that
would keep me from being kicked of datapac. Then I could keep scanning...
You'll come across alot of weird systems when scanning Dpac. Most will be
either Unix, Prime, or VAX systems but you'll get alot that say stuff like
"Service=" or "Password>" or just really screwed up stuff. If you ever
get to a Unix (which gives you unlimited tries to login) and want to get
back to Datapac enter 2 CTRL-D's and hit return at the "Login:" prompt.
UNRESPONSIVE SYSTEMS:
Some systems will connect and be unresponsive. When this happens try
sending a hard break (or a bunch of them) or try the CTRL-<key> keys going
through the alphabet. If you're convinced you've tried everything and the
system still isn't responding just hangup and call Datapac back up.
Most of the responses you get while scanning will be
DATAPAC - Invalid Address
but once in awhile you'll get something like
DATAPAC - Remote Directive
or
DATAPAC - Incompatible Destination
or something else... Don't worry about writing down these addresses
because they're useless. The only one (besides DATAPAC - Call Connected
of course) to keep track of is "DATAPAC - Collect Call Refused". This
means that the system at the address you entered will not pay for the
connection. It is still possible to reach that system by using a PAD so
don't throw those addresses away.
If you've done alot of scanning and still can't find anything of interest
here's a few things you can check out:
ADDRESS: SYSTEM IT CONNECTS TO:
-------- -------------------------------------------------------------
20800015 VAX system
31500475 PRIME system
20800121 Another VAX system
20800095 something to screw around with
20800122 Canadian Chambers of Commerce Database
33400672 another thing to screw around with...
41100043 Info Globe Database
41500077 Humber College
43601541 Canada Life Insurance
43700265 Rehabilitation Services of Canada (VAX system)
44400224 Infomart Online (VAX)
44400053 IBM Information Services
59100088 Athabasca University
67200056 Alberta Research Council (MicroVAX)
70800051 Air Canada (UNIX)
92100086 Datapac Information System
All of those were taken from the I.C.E. Datapac Address List (over 200
systems listed... check it out - availible on my BBS - ICE HQ)
Ok.. I've talked a little more than I planned to but there's still alot
more I want to tell you about. This is just the first version of this
handbook so whatever you want to know about, call my BBS and leave me
feedback and I'll make SURE your question is answered in the next release
no matter how small it may be. If you or someone you know would like to be
a guest writer, let me know and tell me what you're gonna talk about, or
just send in a text file and I'll look at it and put it in the next
release.
This first release is just to open people's eyes to the h/p society and
the questions can flow from here. When I know what people want to know
about (specifically.. it's very hard to explain hack/phreaking in general)
I'll know what to put in the next release. There are of course, some
things you have to be familiar with before I can start going into detail
about them.
Please call my BBS and leave any comments or suggestions about this so I
can make the next release better. This is a sort of "alpha" release...
Some H/P BBS's to check out:
---------------------------
416-648-8175 Meltdown - lotsa messages and codes
414-781-3218 Tone Town - 330 megs, good h/p file section
510-946-1737 PH.B.I. - excellent text files!
and of course, my BBS:
!!!!! -+- PSYCHIATRIC CYBERHELL (ICE HQ): (416) 934-4055 -+- !!!!!!
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
If this is the sort of thing you might be interested in, then my BBS is
the ONLY BBS in Niagara supporting active H/P message and file areas and
gets calls from phreaks worldwide. Get in the message bases there and ask
questions because they'll be answered by people with EXPERIENCE.
MY BBS ONCE AGAIN: 416-934-4055 - St. Catharines
Tell me you got the number from this text file!!!!!
**************************************************************************
If you ARE experience and just happen to have come across this file and
you live somewhere else in the world and just wanna say hi or whatever.. I
can be contacted in the following countries:
InterNet/UUCP........ liquid_jesus@pegasus.ch
Canada............... ICE WHQ: (416)934-4055, Club Z BBS: (416)934-6795
United States........ Tone Town BBS: (414)781-3218
France (direct)...... +33 36431515 (type "THELINE") mailbox name: ICE92
France (via X.25).... 208057040540 (mailbox name: ICE92)
Switzerland.(direct). +41 (0)71 715577 (10 lines) (username: Liquid_Jesus)
Switzerland (X.25)... 228475212574 (Same as above)
Iceland (direct)..... 354-1-78099, 670990
Iceland (X.25)....... 274011991000 (username: AmiPhreak)
**************************************************************************
Ok, I want LOTS of feedback on this phile so send me LOTS of mail on it!
-Liquid Jesus