Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
320Activity
0 of .
Results for:
No results containing your search query
P. 1
Hacking

Hacking

Ratings:

4.6

(1)
|Views: 1,560|Likes:
Published by Ethan Hunt

More info:

Published by: Ethan Hunt on Jul 29, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/09/2013

pdf

text

original

 
THE ULTIMATE BEGINNER’S GUIDE TO HACKING AND PHREAKING
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume: 1
**********************************************************************
Table of Contents: I. HACKING 
What is hacking? Why hack? Hacking rules Getting started Where and how to start hacking Telenet commands Telenet dialups Telenet DNIC’s Telenet NUA’s Basic UNIX hacking Basic VAX/VMS hacking Basic PRIME hacking Password list Connecting modems to different phone lines Viruses, Trojans, and Worms 
 
II. PHREAKING 
What is phreaking? Why phreak? Phreaking rules Where and how to start phreaking Boxes and what they do Red Box plans Free calling from COCOT’s ANAC numbers 
III. REFERENCE 
Hacking and phreaking W.W.W. Pages Good hacking and phreaking text files Hacking and phreaking Newsgroups Rainbow Books Hacking and phreaking magazines Hacking and phreaking movies Hacking and phreaking Gopher sites Hacking and phreaking Ftp sites Hacking and phreaking BBS’s Cool hackers and phreakers Hacker’s Manifesto Happy hacking! 
 
* DISCLAIMER *"Use this information at your own risk. I Revelation, nor any other member of LOA, nor thepersons providing this file, will NOT assume ANY responsibility for the use, misuse, or abuse,of the information provided herein. The following information is provided for educationalpurposes ONLY. The informaion is NOT to be used for illegal purposes. By reading this file you ARE AGREEING to the following terms: I understand that using this information isillegal. I agree to, andunderstand, that I am responsible for my own actions. If I get into trouble using thisinformation for the wrong reasons, I promise not to place the blame on Revelation, LOA, oranyone that provided this file. I understand that this information is for educational purposesonly. This file may be used to check your security systems and if you would like a thoroughcheck contact A.S.H.This file is basically a compilation of known hacking and phreaking information and someinformation gathered from my own experience as a hacker/phreaker. I have tried to makesure that everything excerpted from other documents was put in quotes and labeled with thedocuments name, and if known, who wrote it. I am sorry if any mistakes were made withquoted information."*-Revelation-* LOA
I. HACKING A. What is hacking? 
Hacking is the act of penetrating computer systems to gain knowledge about the system andhow it works.Hacking is illegal because we demand free access to ALL data, andwe get it. This pisses people off and we are outcasted from society, and

Activity (320)

You've already reviewed this. Edit your review.
Brian Miranda liked this
Brian Miranda liked this
hassan_maatouk liked this
Pikie Areff liked this
parashar007 liked this
swerna liked this
nono heryana liked this
tejasviv liked this
zahrul azha liked this
Dan liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->