Saturday, April 21, 2012

The Making Of A Hacker


                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 7 of 12

               <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:>
               <:>                                          <:>
               <:>          The Making Of A Hacker          <:>
               <:>                                          <:>
               <:>        by Framstag of West Germany       <:>
               <:>                                          <:>
               <:>                June 2, 1989              <:>
               <:>                                          <:>
               <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:>


Prologue For None VMS Users
~~~~~~~~~~~~~~~~~~~~~~~~~~~
     DECnet is the network for DEC machines, in most cases you can say VAXes.
DECnet allows you to do:   - e-mail
                           - file transfer
                           - remote login
                           - remote command
                           - remote job entry
                           - PHONE
     PHONE is an interactive communication between users and is equal to TALK
on UNIX or a "deluxe"-CHAT on VM/CMS.

     BELWUE, the university network of the state Baden-Wuerttemberg in
West Germany contains (besides other networks) a DECnet with about 400 VAXes.
On every VAX there is standard-account called DECNET with pw:= DECNET, which is
not reachable via remote login.  This account is provided for several
DECnet-Utilities and as a pseudo-guest-account.  The DECNET-account has very
restricted privileges:  You cannot edit a file or make another remote login.

    The HELP-menu is equipped by the system and is similar to the MAN command
on UNIX.

    More information on DECnet can be found in "Looking Around In DECnet" by
Deep Thought in this very issue of Phrack Inc.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

     Here, at the University of Ulm, we have an *incredibly* ignorant computer
center staff, with an even bigger lack of system-literature (besides the 80 kg
of VAX/VMS-manuals).  The active may search for information by himself, which
is over the level of "run," "FORTRAN," or "logout."  My good luck that I have
other accounts in the BELWUE-DECnet, where more information is offered for the
users.  I am a regular student in Ulm and all my accounts are completely legal
and corresponding to the German laws.  I don't call myself a "hacker," I feel
more like a "user" (...it's more a defining-problem).

     In the HELP-menu in a host in Tuebingen I found the file netdcl.com and
the corresponding explanation, which sends commands to the DECNET-Account of
other VAXes and executes them there (remote command).  The explanation in the
HELP-menu was idiot-proof -- therefore for me, too :-)

     With the command "$ mcr ncp show known nodes" you can obtain a list of all
netwide active VAXes, as is generally known, and so I pinged all these VAXes to
look for more information for a knowledge-thirsty user.  With "help", "dir" and
other similar commands I look around on those DECnet accounts, always watching
for topics related to the BELWUE-network.  It's a pity, that 2/3 of all VAXes
have locked the DECNET-Account for NETDCL.COM.  Their system managers are
probably afraid of unauthorized access, but I cannot imagine how there could be
such an unauthorized access, because you cannot log on this account -- no
chance for trojan horses, etc.

     Some system managers called me back after I visited their VAX to chat with
me about the network and asked me if they could help me in any way. One sysop
from Stuttgart even sent me a version of NETDCL.COM for the ULTRIX operation
system.

     Then, after a month, the  H O R R O R  came over me in shape of a the
following mail:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
From:   TUEBINGEN::SYSTEM       31-MAY-1989 15:31:11.38
To:     FRAMSTAG
CC:
Subj:   don't make any crap, or you'll be kicked out!

From:   ITTGPX::SYSTEM       29-MAY-1989 16:46
To:     TUEBINGEN::SYSTEM
Subj:   System-breaking-in 01-May-1989

To the system manager of the Computer TUEBINGEN,

On May 1st 1989 we had a System-breaking-in in our DECNET-account, which
started from your machine.  By help of our accounting we ascertained your user
FRAMSTAG to have emulated an interactive log-on on our backbone-node and on
every machine of our VAX-cluster with the "trojan horse" NETDCL.COM.  Give us
this user's name and address and dear up the occurrence completely.  We point
out that the user is punishable.  In case of repetition we would be forced to
take corresponding measures.  We will check whether our system got injured.  If
not, this time we will disregard any measure.  Inform us via DECnet about your
investigation results -- we are attainable by the nodenumber 1084::system

Dipl.-Ing. Michael Hager
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

     My system manager threatened me with the deleting of my account, if I
would not immediately enlighten the affair.  *Gulp*!
     I was conscious about my innocence, but how to tell it to the others?  I
explained, step by step, everything to my system manager.  He then understood
after a while, but the criminal procedure still hovered over me... so, I took
quickly to my keyboard, to compose file of explanations and to send it to that
angry system manager in Stuttgart (node 1084 is an institute there).  But no
way out:  He had run out of disk quota and my explanation-mail sailed into the
nirwana:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
$ mail explanation
  To:   1084::system
%MAIL-E, error sending to user SYSTEM at 1084
%MAIL-E-OPENOUT, error opening SYS$SYSROOT:[SYSMGR]MAIL$00040092594FD194.MAI;
as output
-RMS-E-CRE, ACP file create failed
-SYSTEM-F-EXDISKQUOTA, disk quota exceeded
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

     Also the attempt of a connection with the PHONE-facilty failed:  In his
borderless hacker-paranoia, he cut off his PHONE... and nowhere is a list with
the REAL-addresses of the virtual DECnet-addresses available (to prevent
hacking).  Now I stood there with the brand "DANGEROUS HACKER!" and I had no
chance to vindicate myself.  I poured out my troubles to an acquaintance of
mine, who is a sysop in the computer-center in Freiburg.  He asked other sysops
and managers thru the whole BELWUE-network until someone gave him a telephone
number after a few days -- and that was the right one!

     I phoned to this Hager and told him what I had done with his
DECnet-account and also what NOT.  I wanted to know which crime I had
committed.  He promptly cancelled all of his reproaches, but he did not excuse
his defamous incriminations.  I entreated him to inform my system manager in
Tuebingen that I have done nothing illegal and to stop him from erasing my
account.  This happens already to a fellow student of mine (in this case, Hager
was also guilty).  He promised me that he would officially cancel his
reproaches.

     After over a week this doesn't happen (I'm allowed to use my account
further on).  In return for it, I received a new mail from Hager on another
account of mine:

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
From:   1084::HAGER         1-JUN-1989 12:51
To:     50180::STUD_11
Subj:   System-breaking-in

On June 1st 1989 you have committed a system-breaking-in on at least one of our
VAXes.  We were able to register this occurrence.  We would be forced to take
further measure if you did not dear up the occurrence completely until June
6th.

Of course the expenses involved would be imposed on you.  Hence enlightenment
must be in your own interest.

We are attainable via DECnet-mail with the address 1084::HAGER or via following
address:

Institut fuer Technische Thermodynamik und Thermische Verfahrenstechnik
Dipl.-Ing. M. Hager    Tel.: 0711/685-6109
Dipl.-Ing. M. Mrzyglod Tel.: 0711/685-3398
Pfaffenwaldring 9/10-1
7000 Stuttgart-80

 M. Hager
 M. Mrzyglod
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---

This was the reaction of my attempt: "$ PHONE 1084::SYSTEM".  I have not
answered to this mail.  I AM SICK OF IT!


                                   Framstag
                          (FRAMSTAG@DTUPEV5A.BITNET)

         With Special Thanks For Translation Assistance To Schrulli B.
_______________________________________________________________________________

ÿÿ

Phrack Inc.




                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 3 of 12

       <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
       <>                                                            <>
       <>                   Introduction to MIDNET                   <>
       <>                   ~~~~~~~~~~~~~~~~~~~~~~                   <>
       <>        Chapter Seven Of The Future Transcendent Saga       <>
       <>                                                            <>
       <>               A More Indepth Look Into NSFnet              <>
       <>             National Science Foundation Network            <>
       <>                                                            <>
       <>                Presented by Knight Lightning               <>
       <>                        June 16, 1989                       <>
       <>                                                            <>
       <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>


Prologue
~~~~~~~~
If you are not already familiar with NSFnet, I would suggest that you read:

"Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13), and definitely;
"NSFnet:  National Science Foundation Network" (Phrack Inc., Volume Three,
                                                Issue 26, File 4 of 11).


Table Of Contents
~~~~~~~~~~~~~~~~~
*  Introduction
*  The DOD Protocol Suite
*  Names and Addresses In A Network
*  Telnet (*NOT* Telenet)
*  File Transfer
*  Mail


Introduction
~~~~~~~~~~~~
MIDNET is a regional computer network that is part of the NSFnet, the National
Science Foundation Network.  Currently, eleven mid-United States universities
are connected to each other and to the NSFnet via MIDnet:

UA  - University of Arkansas at Fayetteville
ISU - Iowa State University at Ames
UI  - University of Iowa at Iowa City
KSU - Kansas State University at Manhattan
KU  - University of Kansas at Lawrence
UMC - University of Missouri at Columbia
WU  - Washington University at St. Louis, Missouri
UNL - University of Nebraska at Lincoln
OSU - Oklahoma State University at Stillwater
UT  - University of Tulsa (Oklahoma)
OU  - University of Oklahoma at Norman

Researchers at any of these universities that have funded grants can access the
six supercomputer centers funded by the NSF:

John Von Neuman Supercomputer Center
National Center for Atmospheric Research
Cornell National Supercomputer Facility
National Center for Supercomputing Applications
Pittsburgh Supercomputing Center
San Diego Supercomputing Center

In addition, researchers and scientists can communicate with each other over a
vast world-wide computer network that includes the NSFnet, ARPAnet, CSnet,
BITnet, and others that you have read about in The Future Transcendent Saga.
Please refer to "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13)
for more details.

MIDnet is just one of several regional computer networks that comprise the
NSFnet system.  Although all of these regional computer networks work the same,
MIDnet is the only one that I have direct access to and so this file is written
from a MIDnet point of view.  For people who have access to the other regional
networks of NSFnet, the only real differences depicted in this file that would
not apply to the other regional networks are the universities that are served
by MIDnet as opposed to:

NYSERnet  in New York State
SURAnet   in the southeastern United States
SEQSUInet in Texas
BARRnet   in the San Francisco area
MERIT     in Michigan

           (There are others that are currently being constructed.)

These regional networks all hook into the NSFnet backbone, which is a network
that connects the six supercomputer centers.  For example, a person at Kansas
State University can connect with a supercomputer via MIDnet and the NSFnet
backbone.  That researcher can also send mail to colleagues at the University
of Delaware by using MIDnet, NSFnet and SURAnet.  Each university has its own
local computer network which connects on-campus computers as well as providing
a means to connecting to a regional network.

Some universities are already connected to older networks such as CSnet, the
ARPAnet and BITnet.  In principal, any campus connected to any of these
networks can access anyone else in any other network since there are gateways
between the networks.

Gateways are specialized computers that forward network traffic, thereby
connecting networks.  In practice, these wide-area networks use different
networking technology which make it impossible to provide full functionality
across the gateways.  However, mail is almost universally supported across all
gateways, so that a person at a BITnet site can send mail messages to a
colleague at an ARPAnet site (or anywhere else for that matter).  You should
already be somewhat familiar with this, but if not refer to;

"Limbo To Infinity" (Phrack Inc., Volume Two, Issue 24, File 3 of 13) and
"Internet Domains" (Phrack Inc., Volume Three, Issue 26, File 8 of 11)

Computer networks rely on hardware and software that allow computers to
communicate.  The language that enables network communication is called a
protocol.  There are many different protocols in use today.  MIDnet uses the
TCP/IP protocols, also known as the DOD (Department of Defense) Protocol Suite.

Other networks that use TCP/IP include ARPAnet, CSnet and the NSFnet.  In fact,
all the regional networks that are linked to the NSFnet backbone are required
to use TCP/IP.  At the local campus level, TCP/IP is often used, although other
protocols such as IBM's SNA and DEC's DECnet are common.  In order to
communicate with a computer via  MIDnet and the NSFnet, a computer at a campus
must use TCP/IP directly or use a gateway that will translate its protocols
into TCP/IP.

The Internet is a world-wide computer network that is the conglomeration of
most of the large wide area networks, including ARPAnet, CSnet, NSFnet, and the
regionals, such as MIDnet.  To a lesser degree, other networks such as BITnet
that can send mail to hosts on these networks are included as part of the
Internet.  This huge network of networks, the Internet, as you have by now read
all about in the pages of Phrack Inc., is a rapidly growing and very complex
entity that allows sophisticated communication between scientists, students,
government officials and others.  Being a part of this community is both
exciting and challenging.

This chapter of the Future Transcendent Saga gives a general description of the
protocols and software used in MIDnet and the NSFNet.  A discussion of several
of the more commonly used networking tools is also included to enable you to
make practical use of the network as soon as possible.


The DOD Protocol Suite
~~~~~~~~~~~~~~~~~~~~~~
The DOD Protocol Suite includes many different protocols.  Each protocol is a
specification of how communication is to occur between computers.  Computer
hardware and software vendors use the protocol to create programs and sometimes
specialized hardware in order to implement the network function intended by the
protocol.  Different implementations of the same protocol exist for the varied
hardware and operating systems found in a network.

The three most commonly used network functions are:

Mail          -- Sending and receiving messages
File Transfer -- Sending and receiving files
Remote Login  -- Logging into a distant computer

Of these, mail is probably the most commonly used.

In the TCP/IP world, there are three different protocols that realize these
functions:

SMTP   -- (Simple Mail Transfer Protocol) Mail
FTP    -- (File Transfer Protocol) sending and receiving files
Telnet -- Remote login

How to use these protocols is discussed in the next section.  At first glance,
it is not obvious why these three functions are the most common.  After all,
mail and file transfer seem to be the same thing.  However, mail messages are
not identical to files, since they are usually comprised of only ASCII
characters and are sequential in structure.  Files may contain binary data and
have complicated, non-sequential structures.  Also, mail messages can usually
tolerate some errors in transmission whereas files should not contain any
errors.  Finally, file transfers usually occur in a secure setting (i.e. The
users who are transferring files know each other's names and passwords and are
permitted to transfer the file, whereas mail can be sent to anybody as long as
their name is known).

While mail and transfer accomplish the transfer of raw information from one
computer to another, Telnet allows a distant user to process that information,
either by logging in to a remote computer or by linking to another terminal.
Telnet is most often used to remotely log in to a distant computer, but it is
actually a general-purpose communications protocol.  I have found it incredibly
useful over the last year.  In some ways, it could be used for a great deal of
access because you can directly connect to another computer anywhere that has
TCP/IP capabilities, however please note that Telnet is *NOT* Telenet.

There are other functions that some networks provide, including the following:

- Name to address translation for networks, computers and people
- The current time
- Quote of the day or fortune
- Printing on a remote printer, or use of any other remote peripheral
- Submission of batch jobs for non-interactive execution
- Dialogues and conferencing between multiple users
- Remote procedure call (i.e. Distributing program execution over several
                              remote computers)
- Transmission of voice or video information

Some of these functions are still in the experimental stages and require faster
computer networks than currently exist.  In the future, new functions will
undoubtedly be invented and existing ones improved.

The DOD Protocol Suite is a layered network architecture, which means that
network functions are performed by different programs that work independently
and in harmony with each other.  Not only are there different programs but
there are different protocols.  The protocols SMTP, FTP and Telnet are
described above.  Protocols have been defined for getting the current time, the
quote of the day, and for translating names.  These protocols are called
applications protocols because users directly interact with the programs that
implement these protocols.

The Transmission Control Protocol, TCP, is used by many of the application
protocols.  Users almost never interact with TCP directly.  TCP establishes a
reliable end-to-end connection between two processes on remote computers.  Data
is sent through a network in small chunks called packets to improve reliability
and performance.  TCP ensures that packets arrive in order and without errors.
If a packet does have errors, TCP requests that the packet be retransmitted.

In turn, TCP calls upon IP, Internet Protocol, to move the data from one
network to another.  IP is still not the lowest layer of the architecture,
since there is usually a "data link layer protocol" below it.  This can be any
of a number of different protocols, two very common ones being X.25 and
Ethernet.

FTP, Telnet and SMTP are called "application protocols", since they are
directly used by applications programs that enable users to make use of the
network.  Network applications are the actual programs that implement these
protocols and provide an interface between the user and the computer.  An
implementation of a network protocol is a program or package of programs that
provides the desired network function such as file transfer.  Since computers
differ from vendor to vendor (e.g. IBM, DEC, CDC), each computer must have its
own implementation of these protocols.  However, the protocols are standardized
so that computers can interoperate over the network (i.e. Can understand and
process each other's data).  For example, a TCP packet generated by an IBM
computer can be read and processed by a DEC computer.

In many instances, network applications programs use the name of the protocol.
For example, the program that transfers files may be called "FTP" and the
program that allows remote logins may be called "Telnet."  Sometimes these
protocols are incorporated into larger packages, as is common with SMTP.  Many
computers have mail programs that allow users on the same computer to send mail
to each other.  SMTP functions are often added to these mail programs so that
users can also send and receive mail through a network.  In such cases, there
is no separate program called SMTP that the user can access, since the mail
program provides the user interface to this network function.

Specific implementation of network protocols, such as FTP, are tailored to the
computer hardware and operating system on which they are used.  Therefore, the
exact user interface varies from one implementation to another.  For example,
the FTP protocol specifies a set of FTP commands which each FTP implementation
must understand and process.  However, these are usually placed at a low level,
often invisible to the user, who is given a higher set of commands to use.

These higher-level commands are not standardized so they may vary from one
implementation of FTP to another.  For some operating systems, not all of these
commands make equal sense, such as "Change Directory," or may have different
meanings.  Therefore the specific user interface that the user sees will
probably differ.

This file describes a generic implementation of the standard TCP/IP application
protocols.  Users must consult local documentation for specifics at their
sites.


Names and Addresses In A Network
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In DOD Protocol Suite, each network is given a unique identifying number.  This
number is assigned by a central authority, namely the Network Information
Center run by SRI, abbreviated as SRI-NIC, in order to prevent more than one
network from having the same network number.  For example, the ARPAnet has
network number 10 while MIDnet has a longer number, namely 128.242.

Each host in a network has a unique identification so other hosts can specify
them unambiguously.  Host numbers are usually assigned by the organization that
manages the network, rather than one central authority.  Host numbers do not
need to be unique throughout the whole Internet but two hosts on the same
network need to have unique host numbers.

The combination of the network number and the host number is called the IP
address of the host and is specified as a 32-bit binary number.  All IP
addresses in the Internet are expressible as 32-bit numbers, although they are
often written in dotted decimal notation.  Dotted decimal notation breaks the
32-bit number into four eight-bit parts or octets and each octet is specified
as a decimal number.  For example, 00000001 is the binary octet that specifies
the decimal number 1, while 11000000 specifies 192.  Dotted decimal notation
makes IP addresses much easier to read and remember.

Computers in the Internet are also identified by hostnames, which are strings
of characters, such as "phrackvax."  However, IP packets must specify the
32-bit IP address instead of the hostname so  some way to translating hostnames
to IP addresses must exist.

One way is to have a table of hostnames and their corresponding IP addresses,
called a hosttable.  Nearly every TCP/IP implementation has such a hosttable,
although the weaknesses of this method are forcing a shift to a new scheme
called the domain name system.  In UNIX systems, the hosttable is often called
"/etc/hosts."  You can usually read this file and find out what the IP
addresses of various hosts are.  Other systems may call this file by a
different name and make it unavailable for public viewing.

Users of computers are generally given accounts to which all charges for
computer use are billed.  Even if computer time is free at an installation,
accounts are used to distinguish between the users and enforce file
protections.  The generic term "username" will be used in this file to refer to
the name by which the computer account is accessed.

In the early days of the ARPAnet which was the first network to use the TCP/IP
protocols, computer users were identified by their username, followed by a
commercial "at" sign (@), followed by the hostname on which the account
existed.  Networks were not given names, per se, although the IP address
specified a network number.

For example, "knight@phrackvax" referred to user "knight" on host "phrackvax."
This did not specify which network "phrackvax" was on, although that
information could be obtained by examining the hosttable and the IP address for
"phrackvax."  (However, "phrackvax" is a ficticious hostname used for this
presentation.)

As time went on, every computer on the network had to have an entry in its
hosttable for every other computer on the network.  When several networks
linked together to form the Internet, the problem of maintaining this central
hosttable got out of hand.  Therefore, the domain name scheme was introduced to
split up the hosttable and make it smaller and easier to maintain.

In the new domain name scheme, users are still identified by their usernames,
but hosts are now identified by their hostname and any and all domains of which
they are a part.  For example, the following address,
"KNIGHT@UMCVMB.MISSOURI.EDU" specifies username "KNIGHT" on host "UMCVMB".
However, host "UMCVMB" is a part of the domain "MISSOURI" " which is in turn
part of the domain "EDU".  There are other domains in "EDU", although only one
is named "MISSOURI".  In the domain "MISSOURI", there is only one host named
"UMCVMB".

However, other domains in "EDU" could theoretically have hosts named "UMCVMB"
(although I would say that this is rather unlikely in this example).  Thus the
combination of hostname and all its domains makes it unique.  The method of
translating such names into IP addresses is no longer as straightforward as
looking up the hostname in a table.  Several protocols and specialized network
software called nameservers and resolvers implement the domain name scheme.

Not all TCP/IP implementations support domain names because it is rather new.
In those cases, the local hosttable provides the only way to translate
hostnames to IP addresses.  The system manager of that computer will have to
put an entry into the hosttable for every host that users may want to connect
to.  In some cases, users may consult the nameserver themselves to find out the
IP address for a given hostname and then use that IP address directly instead
of a hostname.

I have selected a few network hosts to demonstrate how a host system can be
specified by both the hostname and host numerical address.  Some of the nodes I
have selected are also nodes on BITnet, perhaps even some of the others that I
do not make a note of due a lack of omniscent awareness about each and every
single host system in the world :-)

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Numerical      Hostname                   Location                       BITnet
---------      --------                   --------                       ------
18.72.0.39     ATHENA.MIT.EDU             (Mass. Institute of Technology)     ?
26.0.0.73      SRI-NIC.ARPA               (DDN Network Information Center)    -
36.21.0.13     MACBETH.STANFORD.EDU       (Stanford University)               ?
36.21.0.60     PORTIA.STANFORD.EDU        (Stanford University)               ?
128.2.11.131   ANDREW.CMU.EDU             (Carnegie Mellon University)   ANDREW
128.3.254.13   LBL.GOV                    (Lawrence Berkeley Labrotories)   LBL
128.6.4.7      RUTGERS.RUTGERS.EDU        (Rutgers University)                ?
128.59.99.1    CUCARD.MED.COLUMBIA.EDU    (Columbia University)               ?
128.102.18.3   AMES.ARC.NASA.GOV          (Ames Research Center [NASA])       -
128.103.1.1    HARVARD.EDU                (Harvard University)          HARVARD
128.111.24.40  HUB.UCSB.EDU               (Univ. Of Calif-Santa Barbara)      ?
128.115.14.1   LLL-WINKEN.LLNL.GOV        (Lawrence Livermore Labratories)    -
128.143.2.7    UVAARPA.VIRGINIA.EDU       (University of Virginia)            ?
128.148.128.40 BROWNVM.BROWN.EDU          (Brown University)              BROWN
128.163.1.5    UKCC.UKY.EDU               (University of Kentucky)         UKCC
128.183.10.4   NSSDCA.GSFC.NASA.GOV       (Goddard Space Flight Center [NASA])-
128.186.4.18   RAI.CC.FSU.EDU             (Florida State University)        FSU
128.206.1.1    UMCVMB.MISSOURI.EDU        (Univ. of Missouri-Columbia)   UMCVMB
128.208.1.15   MAX.ACS.WASHINGTON.EDU     (University of Washington)        MAX
128.228.1.2    CUNYVM.CUNY.EDU            (City University of New York)  CUNYVM
129.10.1.6     NUHUB.ACS.NORTHEASTERN.EDU (Northeastern University)       NUHUB
131.151.1.4    UMRVMA.UMR.EDU             (University of Missouri-Rolla) UMRVMA
192.9.9.1      SUN.COM                    (Sun Microsystems, Inc.)            -
192.33.18.30   VM1.NODAK.EDU              (North Dakota State Univ.)    NDSUVM1
192.33.18.50   PLAINS.NODAK.EDU           (North Dakota State Univ.)    NDSUVAX

Please Note:  Not every system on BITnet has an IP address.  Likewise, not
              every system that has an IP address is on BITnet.  Also, while
              some locations like Stanford University may have nodes on BITnet
              and have hosts on the IP as well, this does not neccessarily
              imply that the systems on BITnet and on IP (the EDU domain in
              this case) are the same systems.

              Attempts to gain unauthorized access to systems on the Internet
              are not tolerated and is legally a federal offense.  At some
              hosts, they take this very seriously, especially the government
              hosts such as NASA's Goddard Space Flight Center, where they do
              not mind telling you so at the main prompt when you connect to
              their system.

              However, some nodes are public access to an extent.  The DDN
              Network Information Center can be used by anyone.  The server and
              database there have proven to be an invaluable source of
              information when locating people, systems, and other information
              that is related to the Internet.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Telnet

~~~~~~
Remote login refers to logging in to a remote computer from a terminal
connected to a local computer.  Telnet is the standard protocol in the DOD
Protocol Suite for accomplishing this.  The "rlogin" program, provided with
Berkeley UNIX systems and some other systems, also enables remote login.

For purposes of discussion, the "local computer" is the computer to which your
terminal is directly connected while the "remote computer" is the computer on
the network to which you are communicating and to which your terminal is *NOT*
directly connected.

Since some computers use a different method of attaching terminals to
computers, a better definition would be the following:  The "local computer" is
the computer that you are currently using and the "remote computer" is the
computer on the network with which you are or will be communicating.  Note that
the terms "host" and "computer" are synonymous in the following discussion.

To use Telnet, simply enter the command: TELNET

The prompt that Telnet gives is:  Telnet>

(However, you can specify where you want to Telnet to immediately and bypass
the the prompts and other delays by issuing the command:  TELNET [location].)

There is help available by typing in ?.  This prints a list of all the valid
subcommands that Telnet provides with a one-line explanation.

Telnet> ?

To connect to to another computer, use the open subcommand to open a connection
to that computer.  For example, to connect to the host "UMCVMB.MISSOURI.EDU",
do "open umcvmb.missouri.edu"

Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu" into an
IP address and will send a packet to that host requesting login.  If the remote
host decides to let you attempt a login, it prompts you for your username and
password.  If the host does not respond, Telnet will "time out" (i.e. Wait for
a reasonable amount of time such as 20 seconds) and then terminate with a
message such as "Host not responding."

If your computer does not have an entry for a remote host in its hosttable and
it cannot resolve the name, you can use the IP address explicitly in the telnet
command.  For example,

TELNET 26.0.0.73 (Note:  This is the IP address for the DDN Network Information
                 Center [SRI-NIC.ARPA])

If you are successful in logging in, your terminal is connected to the remote
host.  For all intents and purposes, your terminal is directly hard-wired to
that host and you should be able to do anything on your remote terminal that
you can do at any local terminal.  There are a few exceptions to this rule,
however.

Telnet provides a network escape character, such as CONTROL-T. You can find out
what the escape character is by entering the "status" subcommand:

Telnet> status

You can change the escape character by entering the "escape" subcommand:

Telnet> escape

When you type in the escape character, the Telnet prompt returns to your screen
and you can enter subcommands.  For example, to break the connection, which
usually logs you off the remote host, enter the subcommand "quit":

Telnet> quit

Your Telnet connection usually breaks when you log off the remote host, so the
"quit" subcommand is not usually used to log off.

When you are logged in to a remote computer via Telnet, remember that there is
a time delay between your local computer and the remote one.  This often
becomes apparent to users when scrolling a long file across the terminal screen
nd they wish to cancel the scrolling by typing CONTROL-C or something similar.
After typing the special control character, the scrolling continues.  The
special control character takes a certain amount of time to reach the remote
computer which is still scrolling information.  Thus response from the remote
computer will not likely be as quick as response from a local computer.

Once you are remotely logged on, the computer you are logged on to effectively
becomes your "local computer," even though your original "local computer" still
considers you logged on.  You can log on to a third computer which would then
become your "local computer" and so on.  As you log out of each session, your
previous session becomes active again.


File Transfer
~~~~~~~~~~~~~

FTP is the program that allows files to be sent from one computer to another.
"FTP" stands for "File Transfer Protocol".

When you start using FTP, a communications channel with another computer on the
network is opened.  For example, to start using FTP and initiate a file
transfer session with a computer on the network called "UMCVMB", you would
issue the following subcommand:

FTP UMCVMB.MISSOURI.EDU

Host "UMCVMB" will prompt you for an account name and password.  If your login
is correct, FTP will tell you so, otherwise it will say "login incorrect."  Try
again or abort the FTP program.  (This is usually done by typing a special
control character such as CONTROL-C.  The "program abort" character varies from
system to system.)

Next you will see the FTP prompt, which is:

Ftp>

There are a number of subcommands of FTP.  The subcommand "?" will list these
commands and a brief description of each one.

You can initiate a file transfer in either direction with FTP, either from the
remote host or to the remote host.  The "get" subcommand initiates a file
transfer from the remote host (i.e. Tells the remote computer to send the file
to the local computer [the one on which you issued the "ftp" command]).  Simply
enter "get" and  FTP will prompt you for the remote host's file name and the
(new) local host's file name.  Example:

Ftp> get
Remote file name?
theirfile
local file name?
myfile

ou can abbreviate this by typing both file names on the same line as the "get"
subcommand.  If you do not specify a local file name, the new local file will
be called the same thing as the remote file.  Valid FTP subcommands to get a
file include the following:

get theirfile myfile
get doc.x25

The "put" subcommand works in a similar fashion and is used to send a file from
the local computer to the remote computer.  Enter the command "put" and FTP
will prompt you for the local file name and then the remote file name.  If the
transfer cannot be done because the file doesn't exist or for some other
reason, FTP will print an error message.

There are a number of other subcommands in FTP that allow you to do many more
things.  Not all of these are standard so consult your local documentation or
type a question mark at the FTP prompt.  Some functions often built into FTP
include the ability to look at files before getting or putting them, the
ability to change directories, the ability to delete files on the remote
computer, and the ability to list the directory on the remote host.

An intriguing capability of many FTP implementations is "third party
transfers."  For example, if you are logged on computer A and you want to cause
computer B to send a file to computer C, you can use FTP to connect to computer
B and use the "rmtsend" command.  Of course, you have to know usernames and
passwords on all three computers, since FTP never allows you to peek into
someone's directory and files unless you know their username and password.

The "cd" subcommand changes your working directory on the remote host.  The
"lcd" subcommand changes the directory on the local host.  For UNIX systems,
the meaning of these subcommands is obvious.  Other systems, especially those
that do not have directory-structured file system, may not implement these
commands or may implement them in a different manner.

The "dir" and "ls" subcommands do the same thing, namely list the files in the
working directory of of the remote host.

The "list" subcommand shows the contents of a file without actually putting it
into a file on the local computer.  This would be helpful if you just wanted to
inspect a file.  You could interrupt it before it reached the end of the file
by typing CONTROL-C or some other special character.  This is dependent on your
FTP implementation.

The "delete" command can delete files on the remote host.  You can also make
and remove directories on the remote host with "mkdir" and "rmdir".  The
"status" subcommand will tell you if you are connected and with whom and what
the state of all your options are.

If you are transferring binary files or files with any non-printable
characters, turn binary mode on by entering the "binary" subcommand:

binary

To resume non-binary transfers, enter the "ascii" subcommand.

Transferring a number of files can be done easily by using "mput" (multiple
put) and "mget" (multiple get).  For example, to get every file in a particular
directory, first issue a "cd" command to  change to that directory and then an
"mget" command with an asterisk to indicate every file:

cd somedirectory
mget *

When you are done, use the "close" subcommand to break the communications link.
You will still be in FTP, so you must use the "bye" subcommand to exit FTP and
return to the command level.  The "quit" subcommand will close the connection
and exit from FTP at the same time.


Mail
~~~~
Mail is the simplest network facility to use in many ways.  All you have to do
is to create your message, which can be done with a file editor or on the spur
of the moment, and then send it.  Unlike FTP and Telnet, you do not need to
know the password of the username on the remote computer.  This is so because
you cannot change or access the files of the remote user nor can you use their
account to run programs.  All you can do is to send a message.

There is probably a program on your local computer which does mail between
users on that computer.  Such a program is called a mailer.  This may or may
not be the way to send or receive mail from other computers on the network,
although integrated mailers are more and more common.  UNIX mailers will be
used as an example in this discussion.

Note that the protocol which is used to send and receive mail over a TCP/IP
network is called SMTP, the "Simple Mail Transfer Protocol."  Typically, you
will not use any program called SMTP, but rather your local mail program.

UNIX mailers are usually used by invoking a program named "mail".  To receive
new mail, simply type "mail".

There are several varieties of UNIX mailers in existence.  Consult your local
documentation for details.  For example, the command "man mail" prints out the
manual pages for the mail program on your computer.

To send mail, you usually specify the address of the recipient on the mail
command.  For example: "mail knight@umcvmb.missouri.edu" will send the
following message to username "knight" on host "umcvmb".

You can usually type in your message one line at a time, pressing RETURN after
each line and typing CONTROL-D to end the message. Other facilities to include
already-existing files sometimes exist.  For example, Berkeley UNIXes allow you
to enter commands similar to the following to include a file in your current
mail message:

r myfile

In this example, the contents of "myfile" are inserted into the message at this
point.

Most UNIX systems allow you to send a file through the mail by using input
redirection.  For example:

mail knight@umcvmb.missouri.edu < myfile

In this example, the contents of "myfile" are sent as a message to "knight" on
"umcvmb."

Note that in many UNIX systems the only distinction between mail bound for
another user on the same computer and another user on a remote computer is
simply the address specified.  That is, there is no hostname for local
recipients.  Otherwise, mail functions in exactly the same way.  This is common
for integrated mail packages.  The system knows whether to send the mail
locally or through the network based on the address and the user is shielded
from any other details.


                  "The Quest For Knowledge Is Without End..."
_______________________________________________________________________________


Phreaker's Phunhouse Courtesy of Exodus

Phreaker's Phunhouse                   Courtesy of Exodus


    The long awaited prequil to Phreaker's Guide has finally arrived.
Conceived from the boredom and loneliness that could only be derived from:
The Traveler!  But now, he has returned in full strength (after a small
vacation) and is here to 'World Premiere' the new files everywhere. Stay
cool. This is the prequil to the first one, so just relax. This is not made
to be an exclusive ultra elite file, so kinda calm down and watch in the
background if you are too cool for it.

/-/   Phreak Dictionary   /-/

     Here you will find some of the basic but necessary terms that should be
known by any phreak who wants to be respected at all.

         Phreak  : 1. The action of using mischevious and mostly illegal
                      ways in order to not pay for some sort of tele-
                      communications bill, order, transfer, or other service.
                      It often involves usage of highly illegal boxes and
                      machines in order to defeat the security that is set
                      up to avoid this sort of happening. [fr'eaking]. v.

                   2. A person who uses the above methods of destruction and
                      chaos in order to make a better life for all.  A true
                      phreaker will not not go against his fellows or narc
                      on people who have ragged on him or do anything
                      termed to be dishonorable to phreaks. [fr'eek]. n.

                   3. A certain code or dialup useful in the action of
                      being a phreak. (Example: "I hacked a new metro
                      phreak last night.")

 Switching System: 1. There are 3 main switching systems currently employed
                      in the US, and a few other systems will be mentioned
                      as background.

                    A) SxS: This system was invented in 1918 and was
                       employed in over half of the country until 1978. It
                       is a very basic system that is a general waste of
                       energy and hard work on the linesman. A good way to
                       identify this is that it requires a coin in the phone
                       booth before it will give you a dial tone, or that no
                       call waiting, call forwarding, or any other such
                       service is available.  Stands for: Step by Step

                    B) XB: This switching system was first employed in 1978
                       in order to take care of most of the faults of SxS
                       switching.  Not only is it more efficient, but it
                       also can support different services in various forms.
                       XB1 is Crossbar Version 1. That is very limited and
                       is hard to distinguish from SxS except by direct view
                       of the wiring involved. Next up was XB4, Crossbar
                       Version 4. With this system, some of the basic things
                       like DTMF that were not available with SxS can be
                       accomplished. For the final stroke of XB, XB5 was
                       created. This is a service that can allow DTMF plus
                       most 800 type services (which were not always
                       available.) Stands for: Crossbar.

                    C) ESS: A nightmare in telecom. In vivid color, ESS is
                       a pretty bad thing to have to stand up to. It is
                       quite simple to identify. Dialing 911 for emergencies,
                       and ANI [see ANI below] are the most common facets of
                       the dread system. ESS has the capability to list in a
                       person's caller log what number was called, how long
                       the call took, and even the status of the conversation
                       (modem or otherwise.) Since ESS has been employed,
                       which has been very recently, it has gone through
                       many kinds of revisions. The latest system to date is
                       ESS 11a, that is employed in Washington D.C. for
                       security reasons. ESS is truly trouble for any
                       phreak, because it is 'smarter' than the other
                       systems. For instance, if on your caller log they saw
                       50 calls to 1-800-421-9438, they would be able to do
                       a CN/A [see Loopholes below] on your number and
                       determine whether you are subscribed to that service
                       or not. This makes most calls a hazard, because
                       although 800 numbers appear to be free, they are
                       recorded on your caller log and then right before you
                       receive your bill it deletes the billings for them.
                       But before that the are open to inspection, which is
                       one reason why extended use of any code is dangerous
                       under ESS. Some of the boxes [see Boxing below] are
                       unable to function in ESS.  It is generally a menace
                       to the true phreak. Stands For: Electronic Switching
                       System. Because they could appear on a filter
                       somewhere or maybe it is just nice to know them
                       anyways.

                       A) SSS: Strowger Switching System. First
                          non-operator system available.

                       B) WES: Western Electronics Switching. Used about 40
                          years ago with some minor places out west.

            Boxing:  1) The use of personally designed boxes that emit or
                        cancel electronical impulses that allow simpler
                        acting while phreaking. Through the use of separate
                        boxes, you can accomplish most feats possible with
                        or without the control of an operator.

                     2) Some boxes and their functions are listed below.
                        Ones marked with '*' indicate that they are not
                        operatable in ESS.

                      *Black Box: Makes it seem to the phone company that
                                  the phone was never picked up.
                      Blue Box  : Emits a 2600hz tone that allows you to do
                                  such things as stack a trunk line, kick
                                  the operator off line, and others.
                        Red Box : Simulates the noise of a quarter, nickel,
                                  or dime being dropped into a payphone.
                     Cheese Box : Turns your home phone into a pay phone to
                                  throw off traces (a red box is usually
                                  needed in order to call out.)
                     *Clear Box : Gives you a dial tone on some of the old
                                  SxS payphones without putting in a coin.
                      Beige Box : A simpler produced linesman's handset that
                                  allows you to tap into phone lines and
                                  extract by eavesdropping, or crossing
                                  wires, etc.
                     Purple Box : Makes all calls made out from your house
                                  seem to be local calls.

          ANI [ANI]: 1) Automatic Number Identification. A service
                        available on ESS that allows a phone service [see
                        Dialups below] to record the number that any certain
                        code was dialed from along with the number that was
                        called and print both of these on the customer bill.
                        950 dialups [see Dialups below] are all designed
                        just to use ANI. Some of the services do not have
                        the proper equipment to read the ANI impulses yet,
                        but it is impossible to see which is which without
                        being busted or not busted first.

 Dialups [dy'l'ups]: 1) Any local or 800 extended outlet that allows instant
                        access to any service such as MCI, Sprint, or AT&T
                        that from there can be used by handpicking or using
                        a program to reveal other peoples codes which can
                        then be used moderately until they find out about
                        it and you must switch to another code (preferrably
                        before they find out about it.)

                     2) Dialups are extremely common on both senses. Some
                        dialups reveal the company that operates them as
                        soon as you hear the tone. Others are much harder
                        and some you may never be able to identify.  A small
                        list of dialups:

                             1-800-421-9438 (5 digit codes)
                             1-800-547-6754 (6 digit codes)
                             1-800-345-0008 (6 digit codes)
                             1-800-734-3478 (6 digit codes)
                             1-800-222-2255 (5 digit codes)

                     3) Codes: Codes are very easily accessed procedures
                        when you call a dialup. They will give you some sort
                        of tone.  If the tone does not end in 3 seconds,
                        then punch in the code and immediately following the
                        code, the number you are dialing but strike the
                        '1' in the beginning out first. If the tone does
                        end, then punch in the code when the tone ends.
                        Then, it will give you another tone.  Punch in the
                        number you are dialing, or a '9'. If you punch in
                        a '9' and the tone stops, then you messed up a
                        little. If you punch in a tone and the tone
                        continues, then simply dial then number you are
                        calling without the  '1'.

                     4) All codes are not universal. The only type that I
                        know of that is truly universal is Metrophone.
                        Almost every major city has a local Metro dialup
                        (for Philadelphia, (215)351-0100/0126) and since the
                        codes are universal, almost every phreak has used
                        them once or twice. They do not employ ANI in any
                        outlets that I know of, so feel free to check
                        through your books and call 555-1212 or, as a more
                        devious manor, subscribe yourself. Then, never use
                        your own code. That way, if they check up on you due
                        to your caller log, they can usually find out that
                        you are subscribed.  Not only that but you could set
                        a phreak hacker around that area and just let it
                        hack away, since they usually group them, and, as a
                        bonus, you will have their local dialup.

                     5) 950's. They seem like a perfectly cool phreakers
                        dream. They are free from your house, from payphones,
                        from everywhere, and they host all of the major long
                        distance companies (950)1044 <MCI>, 950)1077
                        <Sprint>, 950-1088 <S+ylines>, 950-1033 <Us
                        Telecom>.) Well, they aren't. They were designed for
                        ANI. That is the point, end of discussion.

     A phreak dictionary. If you remember all of the things contained on
that fileup there, you may have a better chance of doing whatever it is you
do. This next section is maybe a little more interesting...

Blue Box Plans:
---------------

     These are some blue box plans, but first, be warned, there have been
2600hz tone detectors out on operator trunk lines since XB4. The idea behind
it is to use a 2600hz tone for a few very naughty functions that can really
make your day lighten up. But first, here are the plans, or the heart of the
file:

700  :   1   :   2   :   4   :   7   :  11   :
900  :   +   :   3   :   5   :   8   :  12   :
1100 :   +   :   +   :   6   :   9   :  KP   :
1300 :   +   :   +   :   +   :  10   :  KP2  :
1500 :   +   :   +   :   +   :   +   :  ST   :
     : 700   : 900   :1100   :1300   :1500   :

     Stop! Before you diehard users start piecing those little tone tidbits
together, there is a simpler method. If you have an Apple-Cat with a
program like Cat's Meow IV, then you can generate the necessary tones, the
2600hz tone, the KP tone, the KP2 tone, and the ST tone through the dial
section. So if you have that I will assume you can boot it up and it works,
and I'll do you the favor of telling you and the other users what to do with
the blue box now that you have somehow constructed it. The connection to an
operator is one of the most well known and used ways of having fun with your
blue box. You simply dial a TSPS (Traffic Service Positioning Station, or
the operator you get when you dial '0') and blow a 2600hz tone through the
line. Watch out! Do not dial this direct! After you have done that, it is
quite simple to have fun with it. Blow a KP tone to start a call, a ST tone
to stop it, and a 2600hz tone to hang up. Once you have connected to it,
here are some fun numbers to call with it:

      0-700-456-1000  Teleconference (free, because you are the operator!)
      (Area code)-101 Toll Switching
      (Area code)-121 Local Operator (hehe)
      (Area code)-131 Information
      (Area code)-141 Rate & Route
      (Area code)-181 Coin Refund Operator
      (Area code)-11511 Conference operator (when you dial 800-544-6363)

     Well, those were the tone matrix controllers for the blue box and some
other helpful stuff to help you to start out with. But those are only the
functions with the operator. There are other k-fun things you can do with it.

 More advanced Blue Box Stuff:

     Oops. Small mistake up there. I forgot tone lengths. Um, you blow a
tone pair out for up to 1/10 of a second with another 1/10 second for silence
between the digits. KP tones should be sent for 2/10 of a second. One way to
confuse the 2600hz traps is to send pink noise over the channel (for all of
you that have decent BSR equalizers, there is major pink noise in there.)

     Using the operator functions is the use of the 'inward' trunk line.
Thatis working it from the inside. From the 'outward' trunk, you can do such
things as make emergency breakthrough calls, tap into lines, busy all of the
lines in any trunk (called 'stacking'), enable or disable the TSPS's, and
for some 4a systems you can even re-route calls to anywhere.

     All right. The one thing that every complete phreak guide should be
without is blue box plans, since they were once a vital part of phreaking.
Another thing that every complete file needs is a complete listing of all of
the 800 numbers around so you can have some more Fu7nC
 /-/   800 Dialup Listings  /-/

1-800-345-0008 (6)   1-800-547-6754 (6)
1-800-245-4890 (4)   1-800-327-9136 (4)
1-800-526-5305 (8)   1-800-858-9000 (3)
1-800-437-9895 (7)   1-800-245-7508 (5)
1-800-343-1844 (4)   1-800-322-1415 (6)
1-800-437-3478 (6)   1-800-325-7222 (6)

     All right, set Cat Hacker 1.0 on those numbers and have a fuck of a
day. That is enough with 800 codes, by the time this gets around to you I
dunno what state those codes will be in, but try them all out anyways and
see what you get. On some 800 services now, they have an operator who will
answer and ask you for your code, and then your name. Some will switch back
and forth between voice and tone verification, you can never be quite sure
which you will be upagainst.

     Armed with this knowledge you should be having a pretty good time
phreaking now. But class isn't over yet, there are still a couple important
rules that you should know. If you hear continual clicking on the line, then
you should assume that an operator is messing with something, maybe even
listening in on you. It is a good idea to call someone back when the phone
starts doing that. If you were using a code, use a different code and/or
service to call him back.

     A good way to detect if a code has gone bad or not is to listen when
the number has been dialed. If the code is bad you will probably hear the
phone ringing more clearly and more quickly than if you were using a
different code.  If someone answers voice to it then you can immediately
assume that it is an operative for whatever company you are using. The famed
'311311' code for Metro is one of those. You would have to be quite stupid
to actually respond, because whoever you ask for the operator will always
say 'He's not in right now, can I have him call you back?' and then they
will ask for your name and phone number. Some of the more sophisticated
companies will actually give you a carrier on a line that is supposed to
give you a carrier and then just have garbage flow across the screen like it
would with a bad connection. That is a feeble effort to make you think that
the code is still working and maybe get you to dial someone's voice, a good
test for the carrier trick is to dial anumber that will give you a carrier
that you have never dialed with that code before, that will allow you to
determine whether the code is good or not. For our next section, a lighter
look at some of the things that a phreak should not be without. A vocabulary.
A few months ago, it was a quite strange world for the modem people out
there. But now, a phreaker's vocabulary is essential if you wanna make a
good impression on people when you post what you know about certain subjects.

 /-/    Vocabulary    /-/

 - Do not misspell except certain exceptions:

             phone -> fone
             freak -> phreak

 - Never substitute 'z's for 's's. (i.e. codez -> codes)

 - Never leave many characters after a post (i.e. Hey Dudes!#!@#@!#!@)

 - NEVER use the 'k' prefix (k-kool, k-rad, k-whatever)

 - Do not abbreviate. (I got lotsa wares w/ docs)

 - Never substitute '0' for 'o' (r0dent, l0zer).

 - Forget about ye old upper case, it looks ruggyish.

     All right, that was to relieve the tension of what is being drilled
into your minds at the moment.  Now, however, back to the teaching course.
Here are somethings you should know about phones and billings for phones,
etc.

     LATA: Local Access Transference Area. Some people who live in large
cities or areas may be plagued by this problem. For instance, let's say you
live in the 215 area code under the 542 prefix (Ambler, Fort Washington). If
you went to dial in a basic Metro code from that area, for instance,
351-0100, that might not be counted under unlimited local calling because it
is out of your LATA.  For some LATA's, you have to dial a '1' without the
area code before you can dial the phone number. That could prove a hassle
for us all if you didn't realize you would be billed for that sort of call.
In that way, sometimes, it is better to be safe than sorry and phreak.

     The Caller Log: In ESS regions, for every household around, the phone
company has something on you called a Caller Log. This shows every single
number that you dialed, and things can be arranged so it showed every number
that was calling to you. That's one main disadvantage of ESS, it is mostly
computerized so a number scan could be done like that quite easily. Using a
dialup is an easy way to screw that, and is something worth remembering.
Anyways, with the caller log, they check up and see what you dialed. Hmm...
you dialed 15 different 800 numbers that month. Soon they find that you are
subscribed to none of those companies. But that is not the only thing. Most
people would imagine "But wait! 800 numbers don't show up on my phone
bill!". To those people, it is a nice thought, but 800 numbers are picked up
on the caller log until right before they are sent off to you. So they can
check right up on you before they send it away and can note the fact that
you fucked up slightly and called one too many 800 lines.

     Right now, after all of that, you should have a pretty good idea of how
to grow up as a good phreak. Follow these guidelines, don't show off, and
don't take unnecessary risks when phreaking or hacking.

(*Greets to Pee Wee for this file taken from his 'Hell Disk' #1*)
                    -----------Exodus----------