CYBER PHREAK'S GUIDE TO HACKING

 

WELCOME TO MY THIRD HACKING FILE. THIS FILE WAS MADE ON THE 17TH OF APRIL 1998. THIS FILE IS A GUIDE ON MY HACKING EXPERIENCE AND WHAT I HAVE LEARNT. PLEASE READ WHAT YOU WANT AND SEND ANY COMMENTS OR IMPROVEMENTS TO :

 

                               all_blacklomu@HOTMAIL.COM

 

CONTENTS...

 

[1] INTRODUCTION

[2] HOW TO BE A TRUE HACKER

[3] HACKING UNIX SYSTEMS

[4] COMMONLY USED UNIX PASSWORDS (THANKS MENTOR!)

[5] PHREAKING

[6] HOW TO GET MONEY FROM A PAY PHONE

[7] WHY HACK?

[8] HOW TO GO AROUND HACKING

[9] WARNING

[10] LAST WORDS

 

DISCLAIMER:

 

PLEASE DON'T USE THIS KNOWLEDGE UNWISELY AND DON'T BLAME IT ON ME. I AM NOT RESPONSIBLE FOR ANY IMPRISONMENTS OR JAIL SENTENCE, FINES ETC. THIS TEXT IS FOR EDUCATIONAL USE ONLY! USE AT YOUR OWN RISK! HACKING IS NOT A GAME!

YOU HAVE BEEN WARNED!

 

CHAPTER 1 : INTRODUCTION

 WELCOME TO THE WORLD OF HACKING. I AM A BEGINNER AND HAVE ONLY HACKED INTO THREE THINGS. A USEFUL HACKING SKILL IS THOUGHT AND LOGIC. THIS TEXT FILE HAS BEEN MADE FOR BEGINNERS AND INTERMEDIATE HACKERS TO GIVE THEM SOME ADVICE. PLEASE SEND ANY COMMENTS ETC. TO :

 

CYBER_PHREAK_98@HOTMAIL.COM

 

ENJOY IT...

 

CHAPTER 2 : HOW TO BE A TRUE HACKER

TO BE A TRUE HACKER IT IS IMPORTANT THAT YOU HACK YOUR OWN WAY. USING A PROGRAM TO HACK MEANS THAT THE PERSON THAT MADE THE PROGRAM HAS HACKED INSTEAD OF YOU. IT IS IMPORTANT NOT TO BOAST BECAUSE YOU NEVER KNOW WHO YOU CAN TRUST AND WHO YOU CAN'T TRUST. TO BE A TRUE HACKER YOU MUST BE CONNECTED TO THE INTERNET AND YOU MUST HAVE INTERNET EXPERIENCE. IT IS IMPORTANT THAT YOU DON'T USE SOMEONE TO HACK FOR YOU AND THEN SAY THAT YOU HACKED IT. TELNET IS A USEFUL WAY TO HACK. YOU CAN SCAN FOR IP PORTS AND THEN TRY AND HACK IT "YOUR OWN WAY".

 

CHAPTER 3 : HACKING UNIX SYSTEMS

I'M NOT VERY GOOD AT UNIX HACKING BECAUSE I'VE NEVER COME ACROSS A UNIX BASED SYSTEM BEFORE. I KNOW THAT YOU MUST ONLY USE LOWER CASE LETTERS OR THE SYSTEM WILL NOT UNDERSTAND THE COMMAND. TO VIEW YOUR ACCOUNT (WHEN YOU'RE IN) YOU TYPE "pwd" (NOTE THAT IT IS IN LOWER CASE). IF ANYONE KNOWS OF ANYWHERE I CAN LEARN MORE ABOUT UNIX THEN PLEASE E-MAIL ME WITH THE DETAILS. YOU CAN VIEW SOME COMMONLY USED PASSWORDS AND DEFAULT LOGINS AT CHAPTER 4 SUPPLIED BY THE MENTOR AND JESTER SLUGGO.

 

CHAPTER 4 : COMMONLY USED PASSWORDS AND DEFUALT LOGINS

               

        Common default logins

                -----------------------

 

              login;       Password:

 

              root         root,system,etc..

              sys          sys,system

              daemon       daemon

              uucp         uucp

              tty          tty

              test         test

              unix         unix

              bin          bin

              adm          adm

              who          who

              learn        learn

              uuhost       uuhost

              nuucp        nuucp

 

                 Password List

                                  ==========

 

     aaa                daniel             jester             rascal

     academia           danny              johnny             really

     ada                dave               joseph             rebecca

     adrian             deb                joshua             remote

     aerobics           debbie             judith             rick

     airplane           deborah            juggle             reagan

     albany             december           julia              robot

     albatross          desperate          kathleen           robotics

     albert             develop            kermit             rolex

     alex               diet               kernel             ronald

     alexander          digital            knight             rosebud

     algebra            discovery          lambda             rosemary

     alias              disney             larry              roses

     alpha              dog                lazarus            ruben

     alphabet           drought            lee                rules

     ama                duncan             leroy              ruth

     amy                easy               lewis              sal

     analog             eatme              light              saxon

     anchor             edges              lisa               scheme

     andy               edwin              louis              scott

     andrea             egghead            lynne              scotty

     animal             eileen             mac                secret

     answer             einstein           macintosh          sensor

     anything           elephant           mack               serenity

     arrow              elizabeth          maggot             sex

     arthur             ellen              magic              shark

     asshole            emerald            malcolm            sharon

     athena             engine             mark               shit

     atmosphere         engineer           markus             shiva

     bacchus            enterprise         marty              shuttle

     badass             enzyme             marvin             simon

     bailey             euclid             master             simple

     banana             evelyn             maurice            singer

     bandit             extension          merlin             single

     banks              fairway            mets               smile

     bass               felicia            michael            smiles

     batman             fender             michelle           smooch

     beauty             fermat             mike               smother

     beaver             finite             minimum            snatch

     beethoven          flower             minsky             snoopy

     beloved            foolproof          mogul              soap

     benz               football           moose              socrates

     beowulf            format             mozart             spit

     berkeley           forsythe           nancy              spring

     berlin             fourier            napoleon           subway

     beta               fred               network            success

     beverly            friend             newton             summer

     bob                frighten           next               super

     brenda             fun                olivia             support

     brian              gabriel            oracle             surfer

     bridget            garfield           orca               suzanne

     broadway           gauss              orwell             tangerine

     bumbling           george             osiris             tape

     cardinal           gertrude           outlaw             target

     carmen             gibson             oxford             taylor

     carolina           ginger             pacific            telephone

     caroline           gnu                painless           temptation

     castle             golf               pam                tiger

     cat                golfer             paper              toggle

     celtics            gorgeous           password           tomato

     change             graham             pat                toyota

     charles            gryphon            patricia           trivial

     charming           guest              penguin            unhappy

     charon             guitar             pete               unicorn

     chester            hacker             peter              unknown

     cigar              harmony            philip             urchin

     classic            harold             phoenix            utility

     coffee             harvey             pierre             vicky

     coke               heinlein           pizza              virginia

     collins            hello              plover             warren

     comrade            help               polynomial         water

     computer           herbert            praise             weenie

     condo              honey              prelude            whatnot

     condom             horse              prince             whitney

     cookie             imperial           protect            will

     cooper             include            pumpkin            william

     create             ingres             puppet             willie

     creation           innocuous          rabbit             winston

     creator            irishman           rachmaninoff       wizard

     cretin             isis               rainbow            wombat

     daemon             japan              raindrop           yosemite

     dancer             jessica            random             zap

 

 

CHAPTER 5 : PHREAKING

I'VE NEVER PHREAKED BEFORE (FUNNY HOW I GOT MY NAME THOUGH!), BUT I UNDERSTAND HOW IT IS DONE. YOU HAVE A BOX THAT MAKES A PHONE TONE. YOU HOLD THIS TO THE RECIEVER (THAT'S THE PLACE YOU SPEAK IN) AND WHEN THE PHONE ASKS FOR CREDIT THEN YOU SOUND THE BOX. YOU CAN GET DIFFERENT KINDS OF BOXES THAT EACH DO SOMETHING ELSE. EACH BOX IS NAMED AFTER A COLOUR. I THINK THAT IT IS EASIER IF YOU RECORD THE TONES FROM A COMPUTER PHREAK BOX (THAT IS MADE ON THE COMPUTER) AND USE IT INSTEAD OF A REAL BOX WHICH REQUIRES CERTAIN ITEMS.

 

CHAPTER 6 : HOW TO GET MONEY FROM A PAY PHONE

THIS CHAPTER COULD GET YOU SOME CASH EASILY...

 

STEP 1 : FIND A PAY PHONE THAT IS OFTEN USED (NOT TOO OFTEN THOUGH)

 

STEP 2 : PUSH THE HANG UP LEVER DOWN AND PUT PUTTY TO KEEP IT DOWN.

 

STEP 3 : PUSH TISSUE UP THE REJECT TUNNEL  AND MAKE SURE IT ISN'T VISIBLE BY ANYONE ELSE BUT YOU.

 

STEP 4 : STICK THE REJECT TUNNEL DOOR BACK WITH PUTTY SO THAT THE DOOR IS POINTING INWARDS.

 

STEP 5 : LEAVE THE PHONE AND COME BACK A COUPLE OF DAYS LATER TO COLLECT THE MONEY BY PULLING DOWN THE TISSUE.

 

CHAPTER 7 : WHY HACK?

MOST PEOPLE THINK THAT THE POINT IN HACKING IS TO PLANT VIRUSES INTO SOMEONE'S COMPUTER SYSTEM THEREFORE MUCKING IT UP. PEOPLE WHO THINK THAT ARE WRONG. HACKERS HACK TO GET INFORMATION. HACKERS DON'T JUST DO IT FOR NO REASON. IT'S FOR REVENGE, SAVING THE WORLD, FUN ETC. IF HACKERS PLANT VIRUSES THEN IT IS FOR A GOOD REASON. MAYBE TO STOP SOMEONE FROM PUBLISHING SOMETHING THAT HACKERS DON'T WANT TO BE PUBLISHED. IT CAN BE ANY REASON. HACKERS ARE A HELP FOR SECURITY BECAUSE WE TEST OUT THEIR SECURITY (THAT'S MY EXCUSE).

 

CHAPTER 8 : HOW TO GET AROUND HACKING

THIS IS HOW I HACKED INTO A FRIEND'S WEB PAGE FILES...

 

STEP 1 : GET TO KNOW THE VICTIM WELL AND GATHER INFO ABOUT HIS/HER FAVOURITE THINGS.

 

STEP 2 : GET THEIR LOGIN NAME ON THEIR E-MAIL (E.G. FRED.BLOGGS@DUR.COM = FRED.BLOGGS)

 

STEP 3 : TRY OUT SOME LOGIN NAMES AT THEIR WEB PAGE SERVER.

 

STEP 4 : WHEN THE SERVER SAYS THAT THE LOGIN PASSWORD IS INCORRECT THEN YOU KNOW THAT THE LOGIN NAME IS RIGHT.

 

STEP 5 : FROM THE INFORMATION THAT YOU GOT AT STEP 1 TRY AND FIGURE OUT THE PASSWORD AND YOU'RE IN.

 

STEP 6 : ONCE IN IT IS WISE TO CHANGE THE PASSWORD!

 

CHAPTER 9 : WARNING

PLEASE DO NOT USE THIS INFORMATION ON GOVERNMENT OR SERIOUS COMPANIES. YOU CAN GET ARRESTED FOR E-MAIL BOMBING/HACKING INTO THESE PLACES. IT IS BEST TO STAY WELL CLEAR OF ANY OF THE BIG STUFF. IF YOU DO MANAGE TO GET INTO ONE (BAD IDEA!) DON'T DO ANYTHING STUPID LIKE CHANGE THEIR PASSWORD OR PLANT A VIRUS. ONLY HACK AT YOUR OWN RISK. I ADMIT THAT IT SOUNDS FUN, BUT DON'T LET  THAT THOUGHT LAND YOU IN JAIL AND GET KICKED OUT OF SCHOOL. HACKING IS DANGEROUS AND SHOULD NOT BE USED ON THOSE BIG COMPANIES LIKE MICROSOFT OR SOMETHING.

 

CHAPTER 10 : LAST WORDS

WELL I'D LIKE TO THANK YOU FOR READING THIS TEXT FILE. IT HAS TAKEN ME ABOUT ONE HOUR TO TYPE OUT. I HOPE YOU FOUND THIS USEFUL AND UNDERSTAND A BIT MORE ABOUT HACKING. PLEASE VISIT MY SITE IF YOU HAVE TIME WHICH IS AT :

 

HTTP://WWW.GEOCITIES.COM/SILICONVALLEY/WAY/1200/

 

THANK YOU AGAIN FOR READING! PLEASE SEND COMMENTS ETC. TO MY        

E-MAIL ADDRESS. THIS INFORMATION SHOULD BE USEFUL FOR BEGINNERS OR INTERMEDIATE HACKERS. SO UNTIL ANOTHER TIME, SEEYA.

 

 

 CYBER PHREAK'S GUIDE TO HACKING BY CYBER PHREAK

 

"CHALLENGE THE PHREAK, DIE LIKE A GEEK"