|
From info-rphh@technologist.com Fri Feb 06 18:57:09 1998 Newsgroups: alt.org.royal-phreakers Subject: alt.org.royal-phreakers & RPHH: Discussions List FAQ v2.2 From: info-rphh@technologist.com Date: Sat, 07 Feb 1998 02:57:09 GMT alt.org.royal-phreakers & RPHH: Discussions List FAQ version 2.2 (February 1998) written by David Dune info-rphh@?technologist.com No major revision to this FAQ has taken place. Only if it changes from 2.* to 3.* etc. is there another major change. This newsgroup was created by me, David Dune, as a discussions outlet for the monthly Royal Phreakers Household Newsletter. Membership to the RPHH and the Newsletter is by invitation only. This group is not moderated for the members to allow full access to the flow of ideas. This means that non members can also post to this newsgroup, naturally a moderated newsgroup hopper would also be able to post, if they knew the news://alt.dev.null tricks... However, by posting in the a.o.r-p, you give the creator permission to sample your text or reproduce it in the RPHH Newsletter, the writer will of course be accredited as the writer, this doesn't always naturally mean the poster of the quoted article. Index 1 Hacking 1.1 How do I Hack? 1.2 How do I become a Hacker? 1.3 Why don't I see phone numbers posted? 1.4 How do I hack the internet? 1.5 Risk factor key. (How much chance?) 2 Phreaking 2.1 How do I Phreak? 2.2 How do I become a phreaker? 2.3 How do I make a <colour> box? 2.4 Can I get Phreaking phone numbers? 2.5 Can I Phreak in <country>? 3 Carding 3.1 What's Carding? 3.2 What can and can't I do? 3.3 Could you give me some Credit Card numbers? 4 Cracking 4.1 How do I Crack this program? 4.2 What programs do I need to Crack? 4.3 Could you post a Crack for <program> v<version>? 5 Viruses 5.1 How do I make a virus? 5.2 Which languages can I use to make a virus? 5.3 Which programs can I use to make a virus? 5.4 How do I get rid of a virus? 6 Protocol 6.1 A list of Protocol. 6.1.1 Do's and Don'ts 6.1.2 Subject 7 Philes 7.1 Where can I get philes? 8 Credits 1 Hacking 1.1 How do I hack? This is an easy question to answer, if you have to ask the question, you're not able to hack yet. The RPHH Newsletter gives some tips, but the best way to learn is by RTFM that you can find if you search the internet. Try Yahoo, http://www.yahoo.com/ or try Alta Vista http://www.altavista.com/. If you then find a specific question you need answered then come back and ask that question. 1.2 How do I become a Hacker? By asking this question you show yourself to be totally stupid, you don't become a Hacker, your either are one or you aren't. What you see as Hacker is a romantic figure on-screen, but it's the person others would rather shun in real life. I don't know if you know the story behind Java, the name, but here is the real story (It shows what hacking is about): Once upon a time their was a young computer designer and programmer, who'd started of as a hacker. Being a good designer and programmer he gladly got exploited by his boss, this would mean he'd spend all his time behind the computer not knowing whether it was night or day. Now as the official story goes he'd just developed a new programming language and after a lot of time he still couldn't come up with a name, he looked out of the window and saw this great oak standing outside, he named the language Oak. That's the popular mith, but it's a lie! He sat in his office not even having a window, because he worked in the inner parts of the office complex and only the most important people like janitors and company executives had windows, he looked up at the screen and down at his mug which was empty. He really could use a strong cup of coffee, because he'd been working for over 48 hours behind his computer figuring out this problem he had. While walking down to the coffee machine he hoped that it wouldn't be the weak mud he'd come to expect from this coffee machine, it was. He walked back to the office contemplating if he should just go home and have a good cup of coffee, then he suddenly realized "coffee"! He'd name this fabulous programming language JAVA, just to remind the programmers of this new language to drink plenty of it when working late. The moral to the story is drink coffee! 1.3 Why don't I see phone numbers posted? Because before you know it everybody is going to be calling in and trying to hack it. Then they'll put a trace on it. I want to be able to hack in peace. 1.4 How do hack the internet? It's difficult but fun. Decide what part you want to hack, read the RFC on the subject. RFC stands for Request for Comments, this is basically the whole file on protocol that surrounds the internet. These are the thing your program does in the background while you are using Eudora it's loading SMTP-mail, Netscape's loading a HTML-page it's using HTTP to get the information, Cute FTP is using the FTProtocol or even GOPHER, TFTP and USENET. (It's actually a subliminal message.) Here are a list of ports you can log into to use the knowledge you aquire. port |Interest --------------------------------------------------------------------------------- 13 |Daytime Connection 19 |Chargen (Character Generator) 20 |FTP 21 |FTP-control 23 |TELNET 25 |SMTP 53 |DNS (Domain Name Server) 69 |TFTP (Trivial FTP) 79 |Finger 80 |HTTP 119 |NNTP (USENET) 1024+ |Anything higher is possibly not protected by a |firewall. Although it probably is. 8040 |Used by http://anonymizer.com/ for payed anonynimous |connections 8080 |Used by http://anonymizer.com/ for free anonynimous |connections Naturally ther are thousands if not millions of possibilities for the internet, but RFCs make sure that there are global similarities. Otherwise you'd need millions of programs just to serve the WWW. 1.5 Risk Factor Key. High = any vulnerability that provides an attacker with immediate access into a machine, gains superuser access, or bypasses a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. Medium= any vulnerability that provides information that has a high potential of giving access to an intruder. Example: A misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that possibly can contain an account with a guessable password. Low = any vulnerability that provides information that potentially could lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force. 2 Phreaking 2.1 How do I Phreak? Phreaking is a form of dance made popular in the 1960s and 1970s, but nobody could make free phone calls just by dancing, so they stopped dancing like that. (Thank God!) "Phreaking is the sport of Nobles and peasants alike," somebody once said and it's true. The Mob uses phreaking to make free calls, just like you or I could. Just who the nobles and peasants are? You can it figure out for yourself. Phreaking is also difficult, but not impossible, it's consists of fooling the phone companies computer into thinking you have the right to make a phone calls or mess with the computer. 2.2 How do I become a phreaker? You may think that you can become a phreaker just by using a blue box to make free calls, it isn't that easy. You have to know not only what you're doing, but you have to have purpose. Just using a blue box doesn't make you a phreaker! A child can use a blue box! You have to have some knowledge of the system, you have to want to use the system for the right causes. You have to be able to justify your actions and be able to play and leave without being noticed. Again this isn't a thing you can become, you either are one or you're not! 2.3 How do I make a <colour> box? You get a file on the subject and read, you absorb the information and use it. Again the RPHH Newsletter gives some tips, but the best way to learn is by RTFM that you can find if you search the internet. Try Yahoo, http://www.yahoo.com/ or try Alta Vista http://www.altavista.com/. This FAQ isn't going to tell you, because their are so many different boxes that you'd be overwhelmed by the size of the FAQ. 2.4 Can I get Phreaking phone numbers? Yes, if you can get somebody to give them to you. I won't so don't ask. (see 1.3 for enlightenment) You could use a Prefix-dialer or a War dialer, they phone the numbers and see whether their are in use or not. (Have a look in http://www.yahoo.com/ you get at least 1000 hits.) 2.5 Can I Phreak in <country>? I don't know about all the countries in the world, but you can phreak in the UK. Just send a message to pteknik@djd.ftech.co.uk?subject=UK+Phreaking+FAQ and receive the FAQ. And in the Netherlands (news://hacktic.phreak) 3 Carding 3.1 What's Carding? Carding is the illegal and fraudulent use of a credit card or credit card number to aquire riches and toys. It can also be very dangerous, please don't forget to give the Mob their tribute! (c; 3.2 What can and can't I do? You can't card! You can't go into a shop with security cameras to by stuff, unless you're stupid and want to get caught! The best way is to mail-order the things you want and get them send to a un inhabited house. This way you don't get caught. 3.3 Could you give me some Credit Card numbers? No, because that is a felony and I want to max the card on my own! 4 Cracking 4.1 How do I Crack this program? You learn assembly and play around with the program! It's as simple as changing a printed statement into something rude or as handy as making cheat-codes or removing the registering facility. However if you are not going to pay for the program don't use a fake code for registering, that's like taking money out of your own pocket. If you do that their may not be a 2.2 or higher, because the programmer can't earn any money of the program. (Unless it's a Microsoft product, then you can steal away.) 4.2 What programs do I need to Crack? A dis-assembler would be handy and a decompressive tool, because most programs have stupid integrity saving additions! Just get a philes on cracking and play around with it. 4.3 Could you post a Crack for <program> v<version>? No, because this isn't a binaries group. If it gets cluttered up with stupid Cracks and Warez your server may remove it. (That's if your server already carries it.) If you really want a Crack for a program write it yourself! 5 Viruses 5.1 How do I make a virus? Learn a programming language and try to make one. 5.2 Which languages can I use to make a virus? Most languages can be used, I've seen viruses written in BASIC, C/C++, ASM and more. Just pick out a language and have a play. If your system gets destroyed then it works, doesn't it... 5.3 Which programs can I use to make a virus? Most programs that are meant for programming, I like Borland's C++, but I've used TASM, QBASIC and others. 5.4 How do I get rid of a virus? Did you get a virus scanner? If not then you're a bigger fool than I thought you were. Get one at http://www.mcafee.com, http://www.esafe.com or http://www.data-fellows.com, or goto a different AV homepage. 6 Protocol 6.1 A list of Protocol. 6.1.1 Do's and Don'ts Don't post binaries! Use news://alt.binaries.warez.* Don't flame people! Use news://alt.flame Don't start or engage in posts concerning peoples ID! Don't post SPAM! Unless it's the canned kind. Don't ask questions covered by the FAQ! Don't ask to be posted personally! (If you want to be posted personally add "poster" to the "Followup-To:" Field.) Don't post other people's addresses! (On-line or not!) Don't forget to kill-file people who don't follow protocol! Do have fun! Do kill-file people who don't follow protocol! Do follow protocol! If you feel people have responded enough to the thread, or shouldn't respond to your post, then paste news://alt.dev.null in the "Followup-To:" Field. (As I have done.) 6.1.2 Subject To make the reading of post easier I've devised a way to keep the subject-headers clear. code | Interest --------------------------------- OT.. | Off Topic PR.. | PRactice TH.. | THeory ..CR | CRacking ..CC | Credit Cards ..CH | CHips (cards) ..HK | HacKing ..PH | PHreaking ..VI | Viruses Example 1: Subject: THVI Polymorphic Macro Virus (PMV) That would be a post theorizing on the "PMV" theory. Example 2: Subject: PRVI was Re: THVI Polymorphic Macro Virus (PMV) That would be a post setting into practice (or presenting a usable piece of code) for a "PMV" or the reaction to the "PMV" theory. 6.2 What's the reason for this protocol? It so everybody who reads the newsgroup or the discussion list knows exactly what lies in their field and what doesn't. Anybody who comes across the subject: "Telephone loaders" could think that it has something exclusively to do with Phreaking, it doesn't! with the subject: "THCC Telephone loaders" you can instantly see that it has to do with Credit Card loaders (probably Chip cards) or the subject: "THCH Telephone loaders" which is certainly Chip card loaders. 7 Philes 7.1 Where can I get philes? You can get them from http://www.yahoo.com/, http://www.altavista.com/, etc. The place to get back editions of the newsletter is http://www.asper.force9.co.uk/. You can also get back editions of the Newsletter from some mirrors. 8 Credits This FAQ was created by David Dune, any similarity to a different FAQ is to be expected, but no information has been directly copied from a different FAQ. However these people contributed in the information given here. Pyro Teknik <pteknik@?djd.ftech.co.uk> The UK Phone Phreaking F.A.Q. Release 1.9 (July 1997) http://spasm.redcat.org.uk/~pteknik Phrack Magazine phrack@?well.sf.ca.us http://freeside.com/phrack.html http://www.fc.net/phrack/pftp.html Death Jester deathjester@?technologist.com CERT cert@cert.org Phone: +1 412-268-7090 Fax: +1 412-268-6989 CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213-3890 USA Anon Creator of the news://alt.comp.virus.source.code FAQ Eli the Bearded Maintainer of the news://alt.dev.null FAQ Anybody forgot to mention forgive me my memory is failing In any stand alone e-mail addresses please remove the ? after the @ to reply. If you don't have any hypertext links in your text, remove everything after .com?, .org?, etc... (Including the ?)