Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
7Activity
0 of .
Results for:
No results containing your search query
P. 1
The Ultimate Beginner's Guide To Hacking and Phreaking

The Ultimate Beginner's Guide To Hacking and Phreaking

Ratings: (0)|Views: 127 |Likes:
Published by AcE 5p1d0r

More info:

Published by: AcE 5p1d0r on Sep 19, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/27/2013

pdf

text

original

 
THE ULTIMATE BEGINNER’S GUIDE TO HACKING AND PHREAKING
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Volume: 1
**********************************************************************
Table of Contents: I. HACKING 
What is hacking? Why hack? Hacking rules Getting started Where and how to start hacking Telenet commands Telenet dialups Telenet DNIC’s Telenet NUA’s Basic UNIX hacking Basic VAX/VMS hacking Basic PRIME hacking Password list Connecting modems to different phone lines Viruses, Trojans, and Worms 
 
II. PHREAKING 
What is phreaking? Why phreak? Phreaking rules Where and how to start phreaking Boxes and what they do Red Box plans Free calling from COCOT’s ANAC numbers 
III. REFERENCE 
Hacking and phreaking W.W.W. Pages Good hacking and phreaking text files Hacking and phreaking Newsgroups Rainbow Books Hacking and phreaking magazines Hacking and phreaking movies Hacking and phreaking Gopher sites Hacking and phreaking Ftp sites Hacking and phreaking BBS’s Cool hackers and phreakers Hacker’s Manifesto Happy hacking! 
 
* DISCLAIMER *"Use this information at your own risk. I Revelation, nor any other member of LOA, nor thepersons providing this file, will NOT assume ANY responsibility for the use, misuse, or abuse,of the information provided herein. The following information is provided for educationalpurposes ONLY. The informaion is NOT to be used for illegal purposes. By reading this file you ARE AGREEING to the following terms: I understand that using this information isillegal. I agree to, andunderstand, that I am responsible for my own actions. If I get into trouble using thisinformation for the wrong reasons, I promise not to place the blame on Revelation, LOA, oranyone that provided this file. I understand that this information is for educational purposesonly. This file may be used to check your security systems and if you would like a thoroughcheck contact A.S.H.This file is basically a compilation of known hacking and phreaking information and someinformation gathered from my own experience as a hacker/phreaker. I have tried to makesure that everything excerpted from other documents was put in quotes and labeled with thedocuments name, and if known, who wrote it. I am sorry if any mistakes were made withquoted information."*-Revelation-* LOA
I. HACKING A. What is hacking? 
Hacking is the act of penetrating computer systems to gain knowledge about the system andhow it works.Hacking is illegal because we demand free access to ALL data, andwe get it. This pisses people off and we are outcasted from society, and

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
yulypolsky liked this
Samuel Ochigbo liked this
Dan liked this
mirahya liked this
Dan liked this
jeffrocket liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->