- Discover essay samples

Beginners Guide To Hack

4.9 of 5.0 (187 reviews)

1691 words

Beginners Guide To Hack Page 1
Beginners Guide To Hack Page 2
Beginners Guide To Hack Page 3
Beginners Guide To Hack Page 4
Beginners Guide To Hack Page 5
Beginners Guide To Hack Page 6
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Beginners Guide To Hack

This document was written in Windows 95 Word Pad. The title

above, and some of the text looks a little screwed up when read in

anything else, so read it in Word Pad.

Anyway, for those of you who are wondering \\"what do the letters

\\"LOA\\" under his handle stand for?\\" Well, LOA stands for Legion Of the

Apocalypse, which is a group of elite hackers and phreakers in my area.

The current members of LOA are:

Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and

Phreak Show

I started LOA when I discovered that there were many good

hackers and phreakers in my area. I thought that an organized group of

hackers and phreakers would accomplish much more than an individual

could by himself. Thus the Legion Of the Apocalypse was formed and has

been around for a while since. Our main goal is to show the public

what hacking and phreaking is all about and to reveal confidential

information to the hacking/phreaking community so that we can learn

more about computers, telephones, electronics, etc. We are hoping to

get our own World Wide Web page soon, so keep an eye out for it. It

will contain all of the hacking, phreaking, computer, telephone,

security, electronics, virus, and carding information that you could

possibly want.

Also, if some of you are wondering why I chose the word

Revelation as my handle, well, Revelation means revealing or

unveiling, which is exactly what I intend to do as a hacker/phreaker.

I intend to reveal all the information that I can gather while

hacking and phreaking.

Anyway, I wrote this document because I have read all the files

that I could get my hands on and noticed that there has never been a

really good file written that guided beginning hackers and phreakers

step by step.

When I began hacking and started reading all of the beginner

files, I still had many un-answered questions. My questions were

eventually answered, but only through LOTS of reading and practice.

In this file, I hope to give basic step by step instructions that will

help beginning hackers and phreakers get started. But, DO NOT think

that this will save you from having to read alot. If you want to be a

hacker/phreaker, reading is the most important thing you can do. You

will have to do ALOT of reading no matter what.

This document was intended for beginners, but it can also be used

as a reference tool for advanced hackers and phreakers.

Please distribute this document freely. Give it to anyone that

you know who is interested in hacking and/or phreaking. Post it on your

World Wide Web page, Ftp sites, and BBS\\'s. Do whatever you want with it

as long as it stays UNCHANGED.

As far as I know, this is the most complete and in depth beginners

guide available, that is why I wrote it. Also, I plan to have new

volumes come out whenever there has been a significant change in the

material provided, so keep an eye out for them. LOA is planning on

starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at \\"\\".

This document is divided into three main sections with many

different sub-sections in them. The Table Of Contents is below:

Table Of Contents:


A. What is hacking?

B. Why hack?

C. Hacking rules

D. Getting started

E. Where and how to start hacking

F. Telenet commands

G. Telenet dialups

H. Telenet DNIC\\'s

I. Telenet NUA\\'s

J. Basic UNIX hacking

K. Basic VAX/VMS hacking

L. Basic PRIME hacking

M. Password list

N. Connecting modems to different phone lines

O. Viruses, Trojans, and Worms


A. What is phreaking?

B. Why phreak?

C. Phreaking rules

D. Where and how to start phreaking

E. Boxes and what they do

F. Red Box plans

G. Free calling from COCOT\\'s

H. ANAC numbers


A. Hacking and phreaking W.W.W. pages

B. Good hacking and phreaking text files

C. Hacking and phreaking Newsgroups

D. Rainbow Books

E. Hacking and phreaking magazines

F. Hacking and phreaking movies

G. Hacking and phreaking Gopher sites

H. Hacking and phreaking Ftp sites

I. Hacking and phreaking BBS\\'s

J. Cool hackers and phreakers

K. Hacker\\'s Manifesto

L. Happy hacking!


\\"Use this information at your own risk. I Revelation, nor any

other member of LOA, nor the persons providing this file, will NOT

assume ANY responsibility for the use, misuse, or abuse, of the

information provided herein. The following information is provided for

educational purposes ONLY. The informaion is NOT to be used for illegal

purposes. By reading this file you ARE AGREEING to the following terms:

I understand that using this information is illegal. I agree to, and

understand, that I am responsible for my own actions. If I get into

trouble using this information for the wrong reasons, I promise not

to place the blame on Revelation, LOA, or anyone that provided this

file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.

This file is basically a compilation of known hacking and

phreaking information and some information gathered from my own

experience as a hacker/phreaker. I have tried to make sure that

everything excerpted from other documents was put in quotes and labeled

with the documents name, and if known, who wrote it. I am sorry if any

mistakes were made with quoted information.\\"




A. What is hacking?

Hacking is the act of penetrating computer systems to gain

knowledge about the system and how it works.

Hacking is illegal because we demand free access to ALL data, and

we get it. This pisses people off and we are outcasted from society, and

in order to stay out of prison, we must keep our status of being a

hacker/phreaker a secret. We can\\'t discuss our findings with anyone but

other members of the hacking/phreaking community for fear of being

punished. We are punished for wanting to learn. Why is the government

spending huge amounts of time and money to arrest hackers when there are

other much more dangerous people out there. It is the murderers,

rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers. We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don\\'t care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.

There are only two ways to get rid of hackers and phreakers.

One is to get rid of computers and telephones, in which case we would

find other means of getting what we want.(Like that is really going to

happen.) The other way is to give us what we want, which is free access

to ALL information. Until one of those two things happen, we are not

going anywhere.

B. Why hack?

As said above, we hack to gain knowledge about systems and the

way they work. We do NOT want to damage systems in any way. If you do

damage a system, you WILL get caught. But, if you don\\'t damage

anything, it is very unlikely that you will be noticed, let alone be

tracked down and arrested, which costs a considerable amount of time <...

You are currently seeing 50% of this paper.

You're seeing 1691 words of 3381.

Keywords: beginners guide to hacking, beginners guide to hacking computer systems, beginners guide to hackathon, beginners guide to hacking wifi, beginners guide to ethical hacking, beginners guide to ethical hacking and cyber security, beginners guide to crack watch

Similar essays


Choices, freedom, consequence. All three words are to the naked eye, words that have no meaning other then the definition that comes out of a dictionary. To them they see what is put in front of them. After reading Frankl, Crews, and articles which had something to do with one another, in one way or the other, we see a true meaning behind these...

30 reviews
Major League Baseball Needs a

' Salary Cap' A salary cap in pro sports is the amount of money every team in a league can spend on all of the players on its roster in one year. Major League Baseball does not have a salary cap. The reason for a salary cap is to keep teams competitive and not have just two or three outstanding teams that dominate everyone. Another reason le...

94 reviews
Stages Of Change Model

I came upon this article in Nutrition Toady Volume 31 #4 from August 1996. Nutrition Today isn^'t quite the magazine you would find me reading, but to tell you the truth this article interested me greatly. The author is a lady who has a nutritional doctorate. This article includes many claims about what it takes physically and mentally to eat rig...

169 reviews
Mining In Space

On December 10, 1986 the Greater New York Section of the American Institute of Aeronautics and Astronautics (AIAA) and the engineering section of the New York Academy of Sciences jointly presented a program on mining the planets. Speakers were Greg Maryniak of the Space Studies Institute (SSI) and Dr. Carl Peterson of the Mining and Excavation Rese...

121 reviews

.s. lewis: the abolition of m .S. The Abolition of Man While reading The Abolition of Man by .S. Lewis, I encountered a few questions concerning his view on Ethical Innovation and the dilemma conditioners face. It was a difficult book with many ideas that didn?t come completely clear to me at times. I agree with Lewis theory that eth...

167 reviews
Atsisiųsti šį darbą