what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 72 RSS Feed

9x Articles

9x

The articles below have a plethora of data that covers various elements of both phreaking and hacking.

9x_wms.zip
Posted May 7, 2000
Authored by 9x

the BT work management system

SHA-256 | fdcfed8a6d4e422fbf822e60f9c5a1b4bf9900581a67505160da710158ca3025
9x_vms3.zip
Posted May 7, 2000
Authored by 9x

gr1ps guide to vms [3 of 3]

SHA-256 | a5ebbd6db4f8cf524996b215edf8b9048f4825a299d0cb7b4366adad9d760dcd
9x_vms2.zip
Posted May 7, 2000
Authored by 9x

gr1ps guide to vms [2 of 3]

SHA-256 | a41c9cf3e6e5fb6eed49ceb7a814ad61cf21ef3f039444b94cae69cabbe4f374
9x_vms1.zip
Posted May 7, 2000
Authored by 9x

gr1ps guide to vms [1 of 3]

SHA-256 | 8fac25664ff6f9d5783e081efd562e03ca699a79b59fb7ff50f43f2effad4d77
9x_vmb.zip
Posted May 7, 2000
Authored by 9x

nice list of 800 VMBs

SHA-256 | f4f9c64e4a14a83b5eeb4ebcf4ee7d548775c4c37f599835cb0232f0cb9e78a1
9x_uksw.zip
Posted May 7, 2000
Authored by 9x

UK Switching Systems & line tests

SHA-256 | 2bf9bab84048873e28d3c3bd4a5b80456387439a98584bca0da70d799754bc88
9x_ukpg.zip
Posted May 7, 2000
Authored by 9x

Intermediate UK Phreakers guide

SHA-256 | 80a2a16882e45bdba4fbe723c9f84ca8b4a2fab89b6235c60cb1785e0f9d10c6
9x_tom8k.zip
Posted May 7, 2000
Authored by 9x

Time O Matic's system 8000

SHA-256 | a2979d6c55e0f7d6cd7e177630ec182deee03fe99338cea5c770c30c73c22973
9x_tel.zip
Posted May 7, 2000
Authored by 9x

Telecom. system and structures

SHA-256 | 3fbe69f89056bd56b254084ca04f6a6637e260b07352e729bead8f443093e72c
9x_swtch.zip
Posted May 7, 2000
Authored by 9x

BT network admin spt systems development

SHA-256 | de965a674bf305d20435815d1fcf47e5453f38b6ccca48f9b7627caacc31f32d
9x_swr8.zip
Posted May 7, 2000
Authored by 9x

Switched route of tf setup networks

SHA-256 | c20699a8a2224d2e26ed76117134ee754dd94b06d6f5943cb6d53c91281ecf8e
9x_swbtd.zip
Posted May 7, 2000
Authored by 9x

South Western Bell codes

SHA-256 | 374c26a38be9858984b04bbebb1661619005887f36c5777668347d07bfedf211
9x_style.zip
Posted May 7, 2000
Authored by 9x

Local vs. Net hacking

tags | local
SHA-256 | 94a451f5ab5b16859f1fcf5d7d776e5a28b0e4063678a808163965cd20ceec36
9x_stm.zip
Posted May 7, 2000
Authored by 9x

Skytel Command Refernce Chart

SHA-256 | 97b7411d3905ed2f737753fcc301c21c3ad01af88b0bba6fc84fce0b9b63fd4e
9x_sky.zip
Posted May 7, 2000
Authored by 9x

hacking skytel pager VMBs

SHA-256 | 8c3c514dd2617ee600dd7153adb4abdebe7f3644d8006c650c591c2e54e2de9c
9x_sid2.zip
Posted May 7, 2000
Authored by 9x

More info on SecurID

SHA-256 | 4aedc8f7cac3b5a000adf223ff8494ca855fecb31e89a439bb8db8cf01528a33
9x_sid1.zip
Posted May 7, 2000
Authored by 9x

Inpho on SecurID

SHA-256 | 67704e3d45802e175b755dd5e6008f493cc924b1693d0315d794472d810f5da5
9x_sid.zip
Posted May 7, 2000
Authored by 9x

Cellular System ID List

SHA-256 | db565d05192549b02b3274a3f557d96d76020375edcb4ef0eb5cf6283e1babb4
9x_sglng.zip
Posted May 7, 2000
Authored by 9x

Info on Signalling

SHA-256 | 2e81cd211c6a789aebfdb9fc120ce991d6601cb3d0eb5502d35f5028393faac4
9x_secid.zip
Posted May 7, 2000
Authored by 9x

SecurID All Over

SHA-256 | b0a4f0ba2a083c3c05b2c3f24c9dfec513250e248f7abaa9f3e82a3a86e12c61
9x_scntp.zip
Posted May 7, 2000
Authored by 9x

Exploring UK Prefix assignment

SHA-256 | 7cc16485a4eb7e51a0b0d4f033210c76588e9215cbb398a848ff9bc0e04ee4eb
9x_sat1.zip
Posted May 7, 2000
Authored by 9x

Satellite communications

SHA-256 | 989a61d7ad0d278cf386bfb8693cc106fbd730c0a352700bfd587999be50e145
9x_rolm2.zip
Posted May 7, 2000
Authored by 9x

Followup to hacking PMs

SHA-256 | 0f7dd0156bcd4e773a334d492123be0d10e511b71fa915d0b3e271b5a10970c8
9x_rolm1.zip
Posted May 7, 2000
Authored by 9x

Hacking Rolm PhoneMail

SHA-256 | dfaf7192043771ba52a4dcaf1ee0cb305bc4cdcda161e92d20ed3641b1da8b48
9x_rlmpm.zip
Posted May 7, 2000
Authored by 9x

Some information on ROLM PhoneMail systems

SHA-256 | 04b060cb77710a9183eab875121931ef763643a8d05642e59b83f7fbc8d16ac8
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Telegram Will Now Hand Over IP Addresses, Phone Numbers Of Suspects To Cops
Posted Sep 24, 2024

tags | headline, government, privacy, russia, data loss, france, social
Critical Vulnerabilities In Microchip ASF, MediaTek Expose RCE Risks
Posted Sep 24, 2024

tags | headline, flaw
Move Over, Cobalt Strike. Splinter's The New Post Exploit Menace In Town
Posted Sep 23, 2024

tags | headline, hacker, malware, backdoor
Apple's Latest macOS Release Is Breaking Security Software, Network Connections
Posted Sep 23, 2024

tags | headline, denial of service, flaw, apple
US Indicts Two Over Socially Engineered $230M+ Crypto Heist
Posted Sep 23, 2024

tags | headline, hacker, government, usa, cybercrime, fraud, cryptography
Will The US Presidential Election Define The Future Of Crypto?
Posted Sep 23, 2024

tags | headline, government, usa, cryptography
China Urges Vigilance Against Taiwanese Cyberattacks
Posted Sep 23, 2024

tags | headline, hacker, government, china, cyberwar, taiwan, military
Secret Calculator Hack Brings ChatGPT To The TI-84, Enabling Easy Cheating
Posted Sep 23, 2024

tags | headline, hacker
Exploiting Exploiting Exchange PowerShell After ProxyNotShell: Part 3 – DLL Loading Chain for RCE
Posted Sep 20, 2024

tags | headline, hacker, microsoft, flaw
Using YouTube To Steal Your Files
Posted Sep 20, 2024

tags | headline, hacker, flaw, google
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close