CYBER PHREAK'S GUIDE TO HACKING
WELCOME TO MY THIRD HACKING FILE. THIS FILE WAS MADE ON
THE 17TH OF APRIL 1998. THIS FILE IS A GUIDE ON MY HACKING EXPERIENCE AND WHAT I
HAVE LEARNT. PLEASE READ WHAT YOU WANT AND SEND ANY COMMENTS OR IMPROVEMENTS TO
:
all_blacklomu@HOTMAIL.COM
CONTENTS...
[1] INTRODUCTION
[2] HOW TO BE A TRUE HACKER
[3] HACKING UNIX SYSTEMS
[4] COMMONLY USED UNIX PASSWORDS (THANKS MENTOR!)
[5] PHREAKING
[6] HOW TO GET MONEY FROM A PAY PHONE
[7] WHY HACK?
[8] HOW TO GO AROUND HACKING
[9] WARNING
[10] LAST WORDS
DISCLAIMER:
PLEASE DON'T USE THIS KNOWLEDGE UNWISELY AND DON'T
BLAME IT ON ME. I AM NOT RESPONSIBLE FOR ANY IMPRISONMENTS OR JAIL SENTENCE,
FINES ETC. THIS TEXT IS FOR EDUCATIONAL USE ONLY! USE AT YOUR OWN RISK! HACKING
IS NOT A GAME!
YOU HAVE BEEN WARNED!
CHAPTER 1 : INTRODUCTION
WELCOME TO THE WORLD OF HACKING. I AM A BEGINNER AND
HAVE ONLY HACKED INTO THREE THINGS. A USEFUL HACKING SKILL IS THOUGHT AND LOGIC.
THIS TEXT FILE HAS BEEN MADE FOR BEGINNERS AND INTERMEDIATE HACKERS TO GIVE THEM
SOME ADVICE. PLEASE SEND ANY COMMENTS ETC. TO :
CYBER_PHREAK_98@HOTMAIL.COM
ENJOY
IT...
CHAPTER 2 : HOW TO BE A TRUE HACKER
TO
BE A TRUE HACKER IT IS IMPORTANT THAT YOU HACK YOUR OWN WAY. USING A PROGRAM TO
HACK MEANS THAT THE PERSON THAT MADE THE PROGRAM HAS HACKED INSTEAD OF YOU. IT
IS IMPORTANT NOT TO BOAST BECAUSE YOU NEVER KNOW WHO YOU CAN TRUST AND WHO YOU
CAN'T TRUST. TO BE A TRUE HACKER YOU MUST BE CONNECTED TO THE INTERNET AND YOU
MUST HAVE INTERNET EXPERIENCE. IT IS IMPORTANT THAT YOU DON'T USE SOMEONE TO
HACK FOR YOU AND THEN SAY THAT YOU HACKED IT. TELNET IS A USEFUL WAY TO HACK.
YOU CAN SCAN FOR IP PORTS AND THEN TRY AND HACK IT "YOUR OWN WAY".
CHAPTER 3 : HACKING UNIX SYSTEMS
I'M
NOT VERY GOOD AT UNIX HACKING BECAUSE I'VE NEVER COME ACROSS A UNIX BASED SYSTEM
BEFORE. I KNOW THAT YOU MUST ONLY USE LOWER CASE LETTERS OR THE SYSTEM WILL NOT
UNDERSTAND THE COMMAND. TO VIEW YOUR ACCOUNT (WHEN YOU'RE IN) YOU TYPE "pwd"
(NOTE THAT IT IS IN LOWER CASE). IF ANYONE KNOWS OF ANYWHERE I CAN LEARN MORE
ABOUT UNIX THEN PLEASE E-MAIL ME WITH THE DETAILS. YOU CAN VIEW SOME COMMONLY
USED PASSWORDS AND DEFAULT LOGINS AT CHAPTER 4 SUPPLIED BY THE MENTOR AND JESTER
SLUGGO.
CHAPTER 4 : COMMONLY USED PASSWORDS AND
DEFUALT LOGINS
Common default logins
-----------------------
login; Password:
root root,system,etc..
sys sys,system
daemon daemon
uucp uucp
tty tty
test test
unix unix
bin bin
adm adm
who who
learn
learn
uuhost uuhost
nuucp nuucp
Password List
==========
aaa
daniel
jester
rascal
academia danny
johnny
really
ada
dave
joseph
rebecca
adrian deb
joshua
remote
aerobics debbie
judith
rick
airplane
deborah
juggle
reagan
albany december
julia
robot
albatross desperate
kathleen
robotics
albert develop
kermit
rolex
alex
diet
kernel
ronald
alexander digital
knight
rosebud
algebra discovery
lambda
rosemary
alias
disney
larry
roses
alpha
dog
lazarus
ruben
alphabet drought
lee
rules
ama
duncan
leroy
ruth
amy
easy
lewis
sal
analog eatme
light
saxon
anchor edges
lisa
scheme
andy
edwin
louis
scott
andrea egghead
lynne
scotty
animal eileen
mac
secret
answer einstein
macintosh
sensor
anything elephant
mack
serenity
arrow
elizabeth
maggot
sex
arthur ellen
magic
shark
asshole emerald
malcolm
sharon
athena engine
mark
shit
atmosphere engineer
markus
shiva
bacchus enterprise
marty
shuttle
badass enzyme
marvin
simon
bailey euclid
master
simple
banana evelyn
maurice
singer
bandit extension
merlin
single
banks
fairway
mets
smile
bass
felicia
michael
smiles
batman fender
michelle
smooch
beauty fermat
mike
smother
beaver finite
minimum
snatch
beethoven flower
minsky
snoopy
beloved foolproof
mogul
soap
benz
football
moose
socrates
beowulf format
mozart spit
berkeley forsythe
nancy
spring
berlin fourier
napoleon
subway
beta
fred
network
success
beverly friend
newton
summer
bob
frighten
next
super
brenda fun
olivia
support
brian
gabriel
oracle
surfer
bridget garfield
orca
suzanne
broadway gauss
orwell
tangerine
bumbling george
osiris
tape
cardinal gertrude
outlaw
target
carmen gibson
oxford
taylor
carolina ginger
pacific
telephone
caroline gnu
painless
temptation
castle
golf
pam
tiger
cat
golfer
paper
toggle
celtics gorgeous
password
tomato
change graham
pat
toyota
charles gryphon
patricia
trivial
charming guest
penguin
unhappy
charon guitar
pete
unicorn
chester hacker
peter
unknown
cigar
harmony
philip
urchin
classic harold
phoenix
utility
coffee harvey
pierre
vicky
coke
heinlein
pizza
virginia
collins hello
plover
warren
comrade help
polynomial
water
computer herbert
praise
weenie
condo
honey
prelude
whatnot
condom horse
prince
whitney
cookie imperial
protect
will
cooper include
pumpkin
william
create ingres
puppet
willie
creation innocuous
rabbit
winston
creator irishman
rachmaninoff
wizard
cretin
isis
rainbow
wombat
daemon japan
raindrop
yosemite
dancer jessica
random
zap
CHAPTER 5 : PHREAKING
I'VE
NEVER PHREAKED BEFORE (FUNNY HOW I GOT MY NAME THOUGH!), BUT I UNDERSTAND HOW IT
IS DONE. YOU HAVE A BOX THAT MAKES A PHONE TONE. YOU HOLD THIS TO THE RECIEVER
(THAT'S THE PLACE YOU SPEAK IN) AND WHEN THE PHONE ASKS FOR CREDIT THEN YOU
SOUND THE BOX. YOU CAN GET DIFFERENT KINDS OF BOXES THAT EACH DO SOMETHING ELSE.
EACH BOX IS NAMED AFTER A COLOUR. I THINK THAT IT IS EASIER IF YOU RECORD THE
TONES FROM A COMPUTER PHREAK BOX (THAT IS MADE ON THE COMPUTER) AND USE IT
INSTEAD OF A REAL BOX WHICH REQUIRES CERTAIN ITEMS.
CHAPTER 6 : HOW TO GET MONEY FROM A PAY PHONE
THIS
CHAPTER COULD GET YOU SOME CASH EASILY...
STEP
1 : FIND A PAY PHONE THAT IS OFTEN USED (NOT TOO OFTEN THOUGH)
STEP
2 : PUSH THE HANG UP LEVER DOWN AND PUT PUTTY TO KEEP IT DOWN.
STEP
3 : PUSH TISSUE UP THE REJECT TUNNEL AND
MAKE SURE IT ISN'T VISIBLE BY ANYONE ELSE BUT YOU.
STEP
4 : STICK THE REJECT TUNNEL DOOR BACK WITH PUTTY SO THAT THE DOOR IS POINTING
INWARDS.
STEP
5 : LEAVE THE PHONE AND COME BACK A COUPLE OF DAYS LATER TO COLLECT THE MONEY BY
PULLING DOWN THE TISSUE.
CHAPTER 7 : WHY HACK?
MOST
PEOPLE THINK THAT THE POINT IN HACKING IS TO PLANT VIRUSES INTO SOMEONE'S
COMPUTER SYSTEM THEREFORE MUCKING IT UP. PEOPLE WHO THINK THAT ARE WRONG.
HACKERS HACK TO GET INFORMATION. HACKERS DON'T JUST DO IT FOR NO REASON. IT'S
FOR REVENGE, SAVING THE WORLD, FUN ETC. IF HACKERS PLANT VIRUSES THEN IT IS FOR
A GOOD REASON. MAYBE TO STOP SOMEONE FROM PUBLISHING SOMETHING THAT HACKERS
DON'T WANT TO BE PUBLISHED. IT CAN BE ANY REASON. HACKERS ARE A HELP FOR
SECURITY BECAUSE WE TEST OUT THEIR SECURITY (THAT'S MY EXCUSE).
CHAPTER 8 : HOW TO GET AROUND HACKING
THIS
IS HOW I HACKED INTO A FRIEND'S WEB PAGE FILES...
STEP
1 : GET TO KNOW THE VICTIM WELL AND GATHER INFO ABOUT HIS/HER FAVOURITE THINGS.
STEP
2 : GET THEIR LOGIN NAME ON THEIR E-MAIL (E.G. FRED.BLOGGS@DUR.COM = FRED.BLOGGS)
STEP
3 : TRY OUT SOME LOGIN NAMES AT THEIR WEB PAGE SERVER.
STEP
4 : WHEN THE SERVER SAYS THAT THE LOGIN PASSWORD IS INCORRECT THEN YOU KNOW THAT
THE LOGIN NAME IS RIGHT.
STEP
5 : FROM THE INFORMATION THAT YOU GOT AT STEP 1 TRY AND FIGURE OUT THE PASSWORD
AND YOU'RE IN.
STEP
6 : ONCE IN IT IS WISE TO CHANGE THE PASSWORD!
CHAPTER 9 : WARNING
PLEASE
DO NOT USE THIS INFORMATION ON GOVERNMENT OR SERIOUS COMPANIES. YOU CAN GET
ARRESTED FOR E-MAIL BOMBING/HACKING INTO THESE PLACES. IT IS BEST TO STAY WELL
CLEAR OF ANY OF THE BIG STUFF. IF YOU DO MANAGE TO GET INTO ONE (BAD IDEA!)
DON'T DO ANYTHING STUPID LIKE CHANGE THEIR PASSWORD OR PLANT A VIRUS. ONLY HACK
AT YOUR OWN RISK. I ADMIT THAT IT SOUNDS FUN, BUT DON'T LET
THAT THOUGHT LAND YOU IN JAIL AND GET KICKED OUT OF SCHOOL. HACKING IS
DANGEROUS AND SHOULD NOT BE USED ON THOSE BIG COMPANIES LIKE MICROSOFT OR
SOMETHING.
CHAPTER 10 : LAST WORDS
WELL
I'D LIKE TO THANK YOU FOR READING THIS TEXT FILE. IT HAS TAKEN ME ABOUT ONE HOUR
TO TYPE OUT. I HOPE YOU FOUND THIS USEFUL AND UNDERSTAND A BIT MORE ABOUT
HACKING. PLEASE VISIT MY SITE IF YOU HAVE TIME WHICH IS AT :
HTTP://WWW.GEOCITIES.COM/SILICONVALLEY/WAY/1200/
THANK
YOU AGAIN FOR READING! PLEASE SEND COMMENTS ETC. TO MY
E-MAIL
ADDRESS. THIS INFORMATION SHOULD BE USEFUL FOR BEGINNERS OR INTERMEDIATE
HACKERS. SO UNTIL ANOTHER TIME, SEEYA.
CYBER PHREAK'S GUIDE TO HACKING BY CYBER PHREAK
"CHALLENGE THE PHREAK, DIE LIKE A
GEEK"