+
+
+
+
+
+
+ BY
+ REVELATION
+ LOA--ASH
+
+
+
+
+
+ Written: 08/4/96 Volume: 1 +
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This document was written in Windows 95 Word Pad. The title
above, and some of the text looks a little screwed up when read in
anything else, so read it in Word Pad.
Anyway, for those of you who are wondering "what do the letters
"LOA" under his handle stand for?" Well, LOA stands for Legion Of the
Apocalypse, which is a group of elite hackers and phreakers in my area.
The current members of LOA are:
Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and
Phreak Show
I started LOA when I discovered that there were many good
hackers and phreakers in my area. I thought that an organized group of
hackers and phreakers would accomplish much more than an individual
could by himself. Thus the Legion Of the Apocalypse was formed and has
been around for a while since. Our main goal is to show the public
what hacking and phreaking is all about and to reveal confidential
information to the hacking/phreaking community so that we can learn
more about computers, telephones, electronics, etc. We are hoping to
get our own World Wide Web page soon, so keep an eye out for it. It
will contain all of the hacking, phreaking, computer, telephone,
security, electronics, virus, and carding information that you could
possibly want.
Also, if some of you are wondering why I chose the word
Revelation as my handle, well, Revelation means revealing or
unveiling, which is exactly what I intend to do as a hacker/phreaker.
I intend to reveal all the information that I can gather while
hacking and phreaking.
Anyway, I wrote this document because I have read all the files
that I could get my hands on and noticed that there has never been a
really good file written that guided beginning hackers and phreakers
step by step.
When I began hacking and started reading all of the beginner
files, I still had many un-answered questions. My questions were
eventually answered, but only through LOTS of reading and practice.
In this file, I hope to give basic step by step instructions that will
help beginning hackers and phreakers get started. But, DO NOT think
that this will save you from having to read alot. If you want to be a
hacker/phreaker, reading is the most important thing you can do. You
will have to do ALOT of reading no matter what.
This document was intended for beginners, but it can also be used
as a reference tool for advanced hackers and phreakers.
Please distribute this document freely. Give it to anyone that
you know who is interested in hacking and/or phreaking. Post it on your
World Wide Web page, Ftp sites, and BBS's. Do whatever you want with it
as long as it stays UNCHANGED.
As far as I know, this is the most complete and in depth beginners
guide available, that is why I wrote it. Also, I plan to have new
volumes come out whenever there has been a significant change in the
material provided, so keep an eye out for them. LOA is planning on
starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "an641839@anon.penet.fi".
This document is divided into three main sections with many
different sub-sections in them. The Table Of Contents is below:
Table Of Contents:
I. PHREAKING
A. What is phreaking?
B. Why phreak?
C. Phreaking rules
D. Where and how to start phreaking
E. Boxes and what they do
F. Red Box plans
G. Free calling from COCOT's
H. ANAC numbers
II. REFERENCE
A. Hacking and phreaking W.W.W. pages
B. Good hacking and phreaking text files
C. Hacking and phreaking Newsgroups
D. Rainbow Books
E. Hacking and phreaking magazines
F. Hacking and phreaking movies
G. Hacking and phreaking Gopher sites
H. Hacking and phreaking Ftp sites
I. Hacking and phreaking BBS's
J. Cool hackers and phreakers
K. Hacker's Manifesto
L. Happy hacking!
* DISCLAIMER *
"Use this information at your own risk. I Revelation, nor any
other member of LOA, nor the persons providing this file, will NOT
assume ANY responsibility for the use, misuse, or abuse, of the
information provided herein. The following information is provided for
educational purposes ONLY. The informaion is NOT to be used for illegal
purposes. By reading this file you ARE AGREEING to the following terms:
I understand that using this information is illegal. I agree to, and
understand, that I am responsible for my own actions. If I get into
trouble using this information for the wrong reasons, I promise not
to place the blame on Revelation, LOA, or anyone that provided this
file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.
This file is basically a compilation of known hacking and
phreaking information and some information gathered from my own
experience as a hacker/phreaker. I have tried to make sure that
everything excerpted from other documents was put in quotes and labeled
with the documents name, and if known, who wrote it. I am sorry if any
mistakes were made with quoted information."
*-Revelation-*
LOA
I. PHREAKING
A. What is phreaking
Phreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls. In the following sections, you will learn some about boxes, what they are, and how they work. You will also learn about the other forms of phreaking.
B. Why phreak?
Phreaking, like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information.
C. Phreaking rules
Most of the same rules apply for hacking and phreaking, so I will only list a few here.
1. Never box over your home phone line.
2. You should never talk about phreaking projects over your home phone line.
3. Never use your real name when phreaking.
4. Be careful who you tell about your phreaking projects.
5. Never leave phreaking materials out in the open. Keep them in a safe place.
6. Don't get caught.
D. Where and how to start phreaking
Well, you can phreak on any telephone, but as stated above, it is very stupid to do so on your home phone line.
First you need you need to construct the boxes needed for what you want to do. All of the boxes and their descriptions are listed in the next section. Most of the boxes are very easy to make, but if your not into making shit, there are usually alternative ways of making them.
E. Boxes and what they do
Box: Description:
Red Box generates tones for free phone calls
Black Box when called, caller pays nothing
Beige Box lineman's handset
Green Box generates coin return tones
Cheese Box turns your phone into a payphone
Acrylic Box steal 3-way calling and other services
Aqua Box stops F.B.I. lock-in-trace
Blast Box phone microphone amplifier
Blotto Box shorts out all phones in your area
Blue Box generates 2600hz tone
Brown Box creates party line
Bud Box tap neighbors phone
Chatreuse Box use electricity from phone
Chrome Box manipulates traffic signals
Clear Box free calls
Color Box phone conversation recorder
Copper Box causes crosstalk interference
Crimson Box hold button
Dark Box re-route calls
Dayglo Box connect to neighbors phone line
Divertor Box re-route calls
DLOC Box create party line
Gold Box dialout router
Infinity Box remote activated phone tap
Jack Box touch-tone key pad
Light Box in-use light
Lunch Box AM transmitter
Magenta Box connect remote phone line to another
Mauve Box phone tap without cutting into the line
Neon Box external microphone
Noise Box creates line noise
Olive Box external ringer
Party Box creates party line
Pearl Box tone generator
Pink Box creates party line
Purple Box hold button
Rainbow Box kill trace
Razz Box tap neighbors phone
Rock Box add music to phone line
Scarlet Box causes interference
Silver Box create DTMF tones for A,B,C, and D
Static Box raises voltage on phone line
Switch Box add services
Tan Box phone conversation recorder
TV Cable Box see sound waves on TV
Urine Box create disturbance on phone headset
Violet Box stop payphone from hanging up
White Box DTMF key pad
Yellow Box add line extension
F. Box Plans
The Red Box is the main tool that you will use so I have included the Red Box plans. The other box plans can be downloaded from the Internet.
Red Box:
There are two ways that you can make a Red Box:
One is to go to Radio Shack and buy a tone dialer and a 6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you can order them from the electronics companies that I have listed at the end of this section.) Open up the tone dialer and replace the existing crystal (big, shiny, metal thing labeled "3.579545Mhz") with the 6.5536Mhz crystal. Now, close it up. You have a red box.
To use it for long distance calls play the tones that add up to the amount of money that the operator requests. For a 25 cents tone press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press 1 *.
And, the second way, which is a much easier method, is to get the Red Box tones from a phreaking program, such as: Omnibox, or Fear's Phreaker Tools. Play the tones as you hold a microcassette recorder about 1-inch away from your computer speakers, and record the tones.
The Red Box only works on public telephones, it does not work on COCOT's.(Defined in next section.) It makes the telephone think that you have put money in. Red Boxes do not work on local calls because the phone is not using ACTS (Automated Coin Toll System), unless you call the operator and have her place the call for you. You tell her the number that you want to dial and then when she asks you to put in your money, play the tones. If she asks you why you need her to place the call tell her that one of the buttons is smashed in or something like that. You now have and know how to use a Red Box!
Electronics Companies:
Alltronics
2300 Zanker Road
San Jose, CA 95131
(408)943-9774 -Voice-
(408)943-9776 -Fax-
Blue Saguaro
P.O. Box 37061
Tucson, AZ 85740
Mouser
(800)346-6873
Unicorn Electronics
10000 Canoga Ave. Unit C-2
Chatsworth, CA 91311
1-800-824-3432
G. Free calling from COCOT's
First of all, COCOT stands for "Customer Owned Customer Operated Telephone". These are most likely to be found at resteraunts, amusement parks, etc.
All you have to do to make a free call from a COCOT is dial a 1-800 number (they let you do this for free), say some bullshit and get them to hang up on you. Stay on the line after they hang up, then dial the number that you want to call.
This may not work by the time you read this because COCOT owners are becoming more aware of us every day.
H. ANAC numbers
ANAC stands for "Automated Number Announcment Circuit". In other words, you call the ANAC number in your area and it tells you the number that you are calling from. This is useful when Beige Boxing, or hooking your modem up to other phone lines, to find out what number you are using. The "?" are substituted for unknown numbers. Do some scanning to find them out. Here are the ANAC numbers for the U.S.A. with their area code, and the only one I knew of in the U.K.:
U.S.A.:
Area Code: ANAC Number:
201 958
202 811
203 970
205 300-222-2222
205 300-555-5555
205 300-648-1111
205 300-765-4321
205 300-798-1111
205 300-833-3333
205 557-2311
205 811
205 841-1111
205 908-222-2222
206 411
207 958
209 830-2121
209 211-9779
210 830
212 958
213 114
213 1223
213 211-2345
213 211-2346
213 760-2???
213 61056
214 570
214 790
214 970-222-2222
214 970-611-1111
215 410-????
215 511
215 958
216 200-????
216 331
216 959-9968
217 200-???-????
219 550
219 559
301 958-9968
310 114
310 1223
310 211-2345
310 211-2346
312 200
312 290
312 1-200-8825
312 1-200-555-1212
313 200-200-2002
313 200-222-2222
313 200-???-????
313 200200200200200
314 410-????
315 953
315 958
315 998
317 310-222-2222
317 559-222-2222
317 743-1218
334 5572411
334 5572311
401 200-200-4444
401 222-2222
402 311
404 311
404 940-???-????
404 940
405 890-7777777
405 897
407 200-222-2222
408 300-???-????
408 760
408 940
409 951
409 970-????
410 200-6969
410 200-555-1212
410 811
412 711-6633
412 711-4411
412 999-????
413 958
413 200-555-5555
414 330-2234
415 200-555-1212
415 211-2111
415 2222
415 640
415 760-2878
415 7600-2222
419 311
502 200-2222222
502 997-555-1212
503 611
503 999
504 99882233
504 201-269-1111
504 998
504 99851-0000000000
508 958
508 200-222-1234
508 200-222-2222
508 26011
509 560
510 760-1111
512 830
512 970-????
515 5463
515 811
516 958
516 968
517 200-222-2222
517 200200200200200
518 511
518 997
518 998
603 200-222-2222
606 997-555-1212
606 711
607 993
609 958
610 958
610 958-4100
612 511
614 200
614 517
615 200200200200200
615 2002222222
615 830
616 200-222-2222
617 200-222-1234
617 200-222-2222
617 200-444-4444
617 220-2622
617 958
618 200-???-????
618 930
619 211-2001
619 211-2121
703 811
704 311
707 211-2222
708 1-200-555-1212
708 1-200-8825
708 200-6153
708 724-9951
708 356-9646
713 380
713 970-????
713 811
714 114
714 211-2121
714 211-2222
716 511
716 990
717 958
718 958
802 2-222-222-2222
802 200-222-2222
802 1-700-222-2222
802 111-2222
805 114
805 211-2345
805 211-2346
805 830
806 970-????
810 200200200200200
812 410-555-1212
813 311
815 200-???-????
817 290
817 211
818 970-611-1111
818 1223
818 211-2345
903 211-2346
904 970-611-1111
906 200-222-222
907 1-200-222-2222
907 811
908 958
910 200
910 311
910 988
914 990-1111
915 970-????
916 211-2222
916 461
919 200
919 711
U.K.:
175
II. REFERENCE
A. Hacking and phreaking WWW. sites
Here is a list of some World Wide Web sites that contain hacking, phreaking, computer, virus, carding, security, etc. material:
Site Address:
http://www.outerlimits.net/lordsome/index.html (Hacker's Layer)
http://web2.airmail.net/km/hfiles/free.htm (Hacker's Hideout)
http://resudox.net/bio/novell.html
http://www.louisville.edu/wrbake01/hack2.html
http://www.intersurf.com/~materva/files.html
http://hightop.nrl.navy.mil/rainbow.html
http://www.rit.edu/~jmb8902/hacking.html
http://www.spatz.com/pecos/index.html
http://pages.prodigy.com/FL/dtgz94a/files2.html
http://www.2600.com (alt.2600)
http://att.net/dir800
http://draco.centerline.com:8080/~franl/crypto.html
http://everest.cs.ucdavis.edu/Security.html
http://ice-www.larc.nasa.gov/WWW/security.html
http://lOpht.com (lOpht)
http://lOpht.com/~oblivion/IIRG.html
http://underground.org
http://www.alw.nih.gov/WWW/security.html
http://www.aspentec.com/~frzmtdb/fun/hacker.html
http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
http://www.engin.umich.edu/~jgotts/underground/boxes.html
http://www.etext.org/Zines
http://www.inderect.com/www/johnk/
http://www.mgmua.com/hackers/index.html
http://www.paranoia.com/mthreat
http://www.paranoia.com/astrostar/fringe.html
http://www.umcc.umich.edu/~doug/virus-faq.html
http://www.wired.com
B. Good hacking and phreaking text files
All of these files are available by download from the Internet.
File Name:
A Novice's Guide To Hacking
Alt.2600 Hack Faq
The Hacker's Handbook
The Official Phreaker's Manual
Rainbow Books (Listed in Section D.)
The Hacker Crackdown
Computer Hackers: Rebels With A Cause
The Legion Of Doom Technical Journals
The Ultimate Beginner's Guide To Hacking And Phreaking (Of course!)
C. Hacking and phreaking Newsgroups
alt.2600
alt.2600.hope.tech
alt.cellular
alt.cellular-phone-tech
alt.comp.virus
alt.cracks
alt.cyberpunk
alt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.malicious
alt.security
D. Rainbow Books
The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:
Infosec Awareness Division
ATTN: x711/IAOC
Fort George G. Meade, MD 20755-6000
or call:
(410)766-8729
Here is the list of all the Rainbow Books and their descriptions:
Color: Description:
Orange 1 D.O.D. Trusted Computer Systems
Green D.O.D. Password Management
Yellow Computer Security Requirements
Yellow 2 Computer Security Requirements
Tan Understanding Audit In Trusted Systems
Bright Blue Trusted Product Evaluation
Neon Orange Understanding Discretionary Access
Teal Green Glossary Of Computer Terms
Orange 2 Understanding Configurations
Red Interpretation Of Evaluation
Burgundy Understanding Design Documentation
Dark Lavender Understanding Trusted Distrobution
Venice Blue Computer Security Sub-Systems
Aqua Understanding Security Modeling
Dark Red Interpretations Of Environments
Pink Rating Maintenence Phase
Purple Formal Verification Systems
Brown Understanding Trusted Facilities
Yellow-Green Writing Trusted Facility Manuals
Light Blue Understanding Identification And Authentication In Trusted Systems
Blue Product Evaluation Questionaire
Gray Selecting Access Control List
Lavander Data Base Management Interpretation
Yellow 3 Understanding Trusted Recovery
Bright Orange Understanding Security Testing
Purple 1 Guide To System Procurement
Purple 2 Guide To System Procurement
Purple 3 Guide To System Procurement
Purple 4 Guide To System Procurement
Green Understanding Data Remanence
Hot Peach Writing Security Features
Turquiose Understanding Information Security
Violet Controlled Access Protection
Light Pink Understanding Covert Channels
E. Cool hacking and phreaking magazines
Phrack Magazine
2600 Magazine
Tap Magazine
Phantasy Magazine
F. Hacking and phreaking movies
Movie:
Hackers
War Games
G. Hacking and phreaking Gopher sites
Address:
ba.com
csrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.org
oss.net
spy.org
wiretap.spies.com
H. Hacking and phreaking Ftp sites
Address:
2600.com
agl.gatech.edu/pub
asylum.sf.ca.us
clark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrack
ftp.giga.or.at/pub/hacker
ftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/mac
ftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge
I. Hacking and phreaking BBS's
BBS's are Bulletin Board Systems on which hackers and phreakers can post messages to each other.
Here is a list of some BBS's that I know of. If you know of any other BBS's, please E-Mail me via the A.S.H. E-Mail address. Also, Please note that some of these may be old and not running.
Area Code: Phone Number: Name:
203 832-8441 Rune Stone
210 493-9975 The Truth Sayer's Domain
303 343-4053 Hacker's Haven
315 656-5135 Independent Nation
315 656-5135 UtOPiA 617 855-2923 Maas-Neotek
708 676-9855 Apocalypse 2000
713 579-2276 KOdE AbOdE
806 747-0802 Static Line
908 526-4384 Area 51
502 499-8933 Blitzkrieg
510 935-5845 ...Screaming Electron
408 747-0778 The Shrine
708 459-7267 The Hell Pit
415 345-2134 Castle Brass
415 697-1320 7 Gates Of Hell
J. Cool hackers and phreakers
Yes there are many, many, cool hackers and phreakers out there, but these are some that
helped me to get this file out on the Internet. I did not list a few people because I only
knew their real name, and I don't want to use their real name without their permission.
Handle:
Silicon Toad
Logik Bomb/Net Assasin
oleBuzzard
Lord Somer
Weezel
Thanks for your help guys.
K. Hacker's Manifesto
"This is our world now...the world of the electron and the switch, the beauty of the baud.
We make use of a service already existing without paying for what could be dirt cheep if it
wasn't run by profiteering gluttons, and you call us criminals. We explore...and you call us
criminals. We exist without skin color, without nationality, without religious bias...and you
call us criminals. You build atomic bombs, wage wars, murder, cheat, and lie to us and try to
make us believe it is for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by
what they say and think, not what they look like. My crime is that of outsmarting you, something
that you will never forgive me for. I am a hacker and this is my manifesto. You may stop this
individual, but you can't stop us all...after all, we're all alike."
+++The Mentor+++
K. Happy hacking!
Be careful and have fun. Remember to keep your eye out for the next volume of
The Ultimate Beginner's Guide To Hacking And Phreaking and the Legion Of the Apocalypse
W.W.W. page. Oh, and keep looking for our on-line magazine, too, it should be coming out
soon. Well, I hope you enjoyed the file and found it informative. I also hope that I
helped get you started in hacking and phreaking.
"The Revelation is here."
*-Revelation-*
LOA--ASH
EOF
|