Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
69Activity
0 of .
Results for:
No results containing your search query
P. 1
HACKING AND PHREAKING

HACKING AND PHREAKING

Ratings:

4.88

(25)
|Views: 7,385|Likes:
Published by suman
BEGINNER’S GUIDE TO HACKING AND PHREAKING
BEGINNER’S GUIDE TO HACKING AND PHREAKING

More info:

Published by: suman on Jun 18, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/09/2014

pdf

text

original

 
THE ULTIMATE BEGINNER’S GUIDE TO HACKING AND PHREAKING
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume: 1
**********************************************************************
Table of Contents: I. HACKING 
What is hacking? Why hack? Hacking rules Getting started Where and how to start hacking Telenet commands Telenet dialups Telenet DNIC’s Telenet NUA’s Basic UNIX hacking Basic VAX/VMS hacking Basic PRIME hacking Password list Connecting modems to different phone lines Viruses, Trojans, and Worms 
 
II. PHREAKING 
What is phreaking? Why phreak? Phreaking rules Where and how to start phreaking Boxes and what they do Red Box plans Free calling from COCOT’s ANAC numbers 
III. REFERENCE 
Hacking and phreaking W.W.W. Pages Good hacking and phreaking text files Hacking and phreaking Newsgroups Rainbow Books Hacking and phreaking magazines Hacking and phreaking movies Hacking and phreaking Gopher sites Hacking and phreaking Ftp sites Hacking and phreaking BBS’s Cool hackers and phreakers Hacker’s Manifesto Happy hacking! 
 
* DISCLAIMER *"Use this information at your own risk. I Revelation, nor any other member of LOA, nor thepersons providing this file, will NOT assume ANY responsibility for the use, misuse, or abuse,of the information provided herein. The following information is provided for educationalpurposes ONLY. The informaion is NOT to be used for illegal purposes. By reading this file you ARE AGREEING to the following terms: I understand that using this information isillegal. I agree to, andunderstand, that I am responsible for my own actions. If I get into trouble using thisinformation for the wrong reasons, I promise not to place the blame on Revelation, LOA, oranyone that provided this file. I understand that this information is for educational purposesonly. This file may be used to check your security systems and if you would like a thoroughcheck contact A.S.H.This file is basically a compilation of known hacking and phreaking information and someinformation gathered from my own experience as a hacker/phreaker. I have tried to makesure that everything excerpted from other documents was put in quotes and labeled with thedocuments name, and if known, who wrote it. I am sorry if any mistakes were made withquoted information."*-Revelation-* LOA
I. HACKING A. What is hacking? 
Hacking is the act of penetrating computer systems to gain knowledge about the system andhow it works.Hacking is illegal because we demand free access to ALL data, andwe get it. This pisses people off and we are outcasted from society, and

Activity (69)

You've already reviewed this. Edit your review.
maladola liked this
1 thousand reads
1 hundred reads
sleeben liked this
hassan_maatouk liked this
Dejan Stegić liked this
Andrea Richmond liked this
umeshsharma001 liked this
joeyvandernaald liked this
kulkarnikk liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->