The Anarchist's Cookbook IV Part 1 (2024)

A phreak dictionary. If you remember all of the things contained on that fileup there, you may have a
better chance of doing whatever it is you do. This next section is maybe a little more interesting...

These are some blue box plans, but first, be warned, there have been 2600hz tone detectors out on
operator trunk lines since XB4. The idea behind it is to use a 2600hz tone for a few very naughty
functions that can really make your day lighten up. But first, here are the plans, or the heart of the
file:
700 : 1 : 2 : 4 : 7 : 11 :
900 : + : 3 : 5 : 8 : 12 :
1100 : + : + : 6 : 9 : KP :
1300 : + : + : + : 10 : KP2 :
1500 : + : + : + : + : ST :
: 700 : 900 :1100 :1300 :1500 :

Stop! Before you diehard users start piecing those little tone tidbits together, there is a simpler
method. If you have an Apple-Cat with a program like Cat's Meow IV, then you can generate the
necessary tones, the 2600hz tone, the KP tone, the KP2 tone, and the ST tone through the dial section.
So if you have that I will assume you can boot it up and it works, and I'll do you the favor of
telling you and the other users what to do with the blue box now that you have somehow constructed it.
The connection to an operator is one of the most well known and used ways of having fun with your blue
box. You simply dial a TSPS (Traffic Service Positioning Station, or the operator you get when you
dial '0') and blow a 2600hz tone through the line. Watch out! Do not dial this direct! After you have
done that, it is quite simple to have fun with it. Blow a KP tone to start a call, a ST tone to stop
it, and a 2600hz tone to hang up. Once you have connected to it, here are some fun numbers to call
with it:
0-700-456-1000 Teleconference (free, because you are the operator!)
(Area code)-101 Toll Switching
(Area code)-121 Local Operator (hehe)
(Area code)-131 Information
(Area code)-141 Rate & Route
(Area code)-181 Coin Refund Operator
(Area code)-11511 Conference operator (when you dial 800-544-6363)

Well, those were the tone matrix controllers for the blue box and some other helpful stuff to help you
to start out with. But those are only the functions with the operator. There are other k-fun things
you can do with it.

Oops. Small mistake up there. I forgot tone lengths. Um, you blow a tone pair out for up to 1/10 of a
second with another 1/10 second for silence between the digits. KP tones should be sent for 2/10 of a
second. One way to confuse the 2600hz traps is to send pink noise over the channel (for all of you
that have decent BSR equalizers, there is major pink noise in there.)

Using the operator functions is the use of the 'inward' trunk line. Thatis working it from the inside.
From the 'outward' trunk, you can do such things as make emergency breakthrough calls, tap into lines,
busy all of the lines in any trunk (called 'stacking'), enable or disable the TSPS's, and for some 4a
systems you can even re-route calls to anywhere.

All right. The one thing that every complete phreak guide should be without is blue box plans, since
they were once a vital part of phreaking. Another thing that every complete file needs is a complete
listing of all of the 800 numbers around so you can have some more Fun

1-800-345-0008 (6) 1-800-547-6754 (6)
1-800-245-4890 (4) 1-800-327-9136 (4)
1-800-526-5305 (8) 1-800-858-9000 (3)
1-800-437-9895 (7) 1-800-245-7508 (5)
1-800-343-1844 (4) 1-800-322-1415 (6)
1-800-437-3478 (6) 1-800-325-7222 (6)

All right, set Cat Hacker 1.0 on those numbers and have a f*ck of a day. That is enough with 800
codes, by the time this gets around to you I dunno what state those codes will be in, but try them all
out anyways and see what you get. On some 800 services now, they have an operator who will answer and
ask you for your code, and then your name. Some will switch back and forth between voice and tone
verification, you can never be quite sure which you will be upagainst.

Armed with this knowledge you should be having a pretty good time phreaking now. But class isn't over
yet, there are still a couple important rules that you should know. If you hear continual clicking on
the line, then you should assume that an operator is messing with something, maybe even listening in
on you. It is a good idea to call someone back when the phone starts doing that. If you were using a
code, use a different code and/or service to call him back.

A good way to detect if a code has gone bad or not is to listen when the number has been dialed. If
the code is bad you will probably hear the phone ringing more clearly and more quickly than if you
were using a different code. If someone answers voice to it then you can immediately assume that it is
an operative for whatever company you are using. The famed '311311' code for Metro is one of those.
You would have to be quite stupid to actually respond, because whoever you ask for the operator will
always say 'He's not in right now, can I have him call you back?' and then they will ask for your name
and phone number. Some of the more sophisticated companies will actually give you a carrier on a line
that is supposed to give you a carrier and then just have garbage flow across the screen like it would
with a bad connection. That is a feeble effort to make you think that the code is still working and
maybe get you to dial someone's voice, a good test for the carrier trick is to dial anumber that will
give you a carrier that you have never dialed with that code before, that will allow you to determine
whether the code is good or not. For our next section, a lighter look at some of the things that a
phreak should not be without. A vocabulary. A few months ago, it was a quite strange world for the
modem people out there. But now, a phreaker's vocabulary is essential if you wanna make a good
impression on people when you post what you know about certain subjects.

* Do not misspell except certain exceptions:
phone -> fone
freak -> phreak
* Never substitute 'z's for 's's. (i.e. codez -> codes)
* never leave many characters after a post (i.e. Hey Dudes!#!@#@!#!@)
* NEVER use the 'k' prefix (k-kool, k-rad, k-whatever)
* Do not abbreviate. (I got lotsa wares w/ docs)
* Never substitute '0' for 'o' (r0dent, l0zer).
* Forget about ye old upper case, it looks ruggyish.

All right, that was to relieve the tension of what is being drilled into your minds at the moment.
Now, however, back to the teaching course. Here are somethings you should know about phones and
billings for phones, etc.

LATA: Local Access Transference Area.

Some people who live in large cities or areas may be plagued by this problem. For instance, let's say
you live in the 215 area code under the 542 prefix (Ambler, Fort Washington). If you went to dial in a
basic Metro code from that area, for instance, 351-0100, that might not be counted under unlimited
local calling because it is out of your LATA. For some LATA's, you have to dial a '1' without the area
code before you can dial the phone number. That could prove a hassle for us all if you didn't realize
you would be billed for that sort of call. In that way, sometimes, it is better to be safe than sorry
and phreak.

In ESS regions, for every household around, the phone company has something on you called a Caller
Log. This shows every single number that you dialed, and things can be arranged so it showed every
number that was calling to you. That's one main disadvantage of ESS, it is mostly computerized so a
number scan could be done like that quite easily. Using a dialup is an easy way to screw that, and is
something worth remembering. Anyways, with the caller log, they check up and see what you dialed.
Hmm... you dialed 15 different 800 numbers that month. Soon they find that you are subscribed to none
of those companies. But that is not the only thing. Most people would imagine "But wait! 800 numbers
don't show up on my phone bill!". To those people, it is a nice thought, but 800 numbers are picked up
on the caller log until right before they are sent off to you. So they can check right up on you
before they send it away and can note the fact that you f*cked up slightly and called one too many 800
lines.

Right now, after all of that, you should have a pretty good idea of how to grow up as a good phreak.
Follow these guidelines, don't show off, and don't take unnecessary risks when phreaking or hacking.

(*Greets to Pee Wee for this file taken from his 'Hell Disk' #1*) -----------Exodus----------
Index


==Phrack Inc.== Volume Three, Issue 27, File 3 of 12

################################################################
## ##
## Introduction to MIDNET ##
## ~~~~~~~~~~~~~~~~~~~~~~ ##
## Chapter Seven Of The Future Transcendent Saga ##
## ##
## A More Indepth Look Into NSFnet ##
## National Science Foundation Network ##
## ##
## Presented by Knight Lightning ##
## June 16, 1989 ##
## ##
################################################################

Prologue

If you are not already familiar with NSFnet, I would suggest that you read:

"Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13), and definitely;
"NSFnet: National Science Foundation Network" (Phrack Inc., Volume Three, Issue 26, File 4 of 11).

Table Of Contents

* Introduction
* The DOD Protocol Suite
* Names and Addresses In A Network
* Telnet (*NOT* Telenet)
* File Transfer
* Mail

Introduction

MIDNET is a regional computer network that is part of the NSFnet, the National Science Foundation
Network. Currently, eleven mid-United States universities are connected to each other and to the
NSFnet via MIDnet:
* UA - University of Arkansas at Fayetteville
* ISU - Iowa State University at Ames
* UI - University of Iowa at Iowa City
* KSU - Kansas State University at Manhattan
* KU - University of Kansas at Lawrence
* UMC - University of Missouri at Columbia
* WU - Washington University at St. Louis, Missouri
* UNL - University of Nebraska at Lincoln
* OSU - Oklahoma State University at Stillwater
* UT - University of Tulsa (Oklahoma)
* OU - University of Oklahoma at Norman

Researchers at any of these universities that have funded grants can access the six supercomputer
centers funded by the NSF:

John Von Neuman Supercomputer Center
National Center for Atmospheric Research
Cornell National Supercomputer Facility
National Center for Supercomputing Applications
Pittsburgh Supercomputing Center
San Diego Supercomputing Center

In addition, researchers and scientists can communicate with each other over a vast world-wide
computer network that includes the NSFnet, ARPAnet, CSnet, BITnet, and others that you have read about
in The Future Transcendent Saga. Please refer to "Frontiers" (Phrack Inc., Volume Two, Issue 24, File
4 of 13) for more details.

MIDnet is just one of several regional computer networks that comprise the NSFnet system. Although all
of these regional computer networks work the same, MIDnet is the only one that I have direct access to
and so this file is written from a MIDnet point of view. For people who have access to the other
regional networks of NSFnet, the only real differences depicted in this file that would not apply to
the other regional networks are the universities that are served by MIDnet as opposed to:

NYSERnet in New York State
SURAnet in the southeastern United States
SEQSUInet in Texas
BARRnet in the San Francisco area
MERIT in Michigan
(There are others that are currently being constructed.)

These regional networks all hook into the NSFnet backbone, which is a network that connects the six
supercomputer centers. For example, a person at Kansas State University can connect with a
supercomputer via MIDnet and the NSFnet backbone. That researcher can also send mail to colleagues at
the University of Delaware by using MIDnet, NSFnet and SURAnet. Each university has its own local
computer network which connects on-campus computers as well as providing a means to connecting to a
regional network.

Some universities are already connected to older networks such as CSnet, the ARPAnet and BITnet. In
principal, any campus connected to any of these networks can access anyone else in any other network
since there are gateways between the networks.

Gateways are specialized computers that forward network traffic, thereby connecting networks. In
practice, these wide-area networks use different networking technology which make it impossible to
provide full functionality across the gateways. However, mail is almost universally supported across
all gateways, so that a person at a BITnet site can send mail messages to a colleague at an ARPAnet
site (or anywhere else for that matter). You should already be somewhat familiar with this, but if not
refer to;

"Limbo To Infinity" (Phrack Inc., Volume Two, Issue 24, File 3 of 13) and
"Internet Domains" (Phrack Inc., Volume Three, Issue 26, File 8 of 11)

Computer networks rely on hardware and software that allow computers to communicate. The language that
enables network communication is called a protocol. There are many different protocols in use today.
MIDnet uses the TCP/IP protocols, also known as the DOD (Department of Defense) Protocol Suite.

Other networks that use TCP/IP include ARPAnet, CSnet and the NSFnet. In fact, all the regional
networks that are linked to the NSFnet backbone are required to use TCP/IP. At the local campus level,
TCP/IP is often used, although other protocols such as IBM's SNA and DEC's DECnet are common. In order
to communicate with a computer via MIDnet and the NSFnet, a computer at a campus must use TCP/IP
directly or use a gateway that will translate its protocols into TCP/IP.

The Internet is a world-wide computer network that is the conglomeration of most of the large wide
area networks, including ARPAnet, CSnet, NSFnet, and the regionals, such as MIDnet. To a lesser
degree, other networks such as BITnet that can send mail to hosts on these networks are included as
part of the Internet. This huge network of networks, the Internet, as you have by now read all about
in the pages of Phrack Inc., is a rapidly growing and very complex entity that allows sophisticated
communication between scientists, students, government officials and others. Being a part of this
community is both exciting and challenging.

This chapter of the Future Transcendent Saga gives a general description of the protocols and software
used in MIDnet and the NSFNet. A discussion of several of the more commonly used networking tools is
also included to enable you to make practical use of the network as soon as possible.

The DOD Protocol Suite

The DOD Protocol Suite includes many different protocols. Each protocol is a specification of how
communication is to occur between computers. Computer hardware and software vendors use the protocol
to create programs and sometimes specialized hardware in order to implement the network function
intended by the protocol. Different implementations of the same protocol exist for the varied hardware
and operating systems found in a network.

The three most commonly used network functions are:

Mail -- Sending and receiving messages
File Transfer -- Sending and receiving files
Remote Login -- Logging into a distant computer

Of these, mail is probably the most commonly used.

In the TCP/IP world, there are three different protocols that realize these functions:

SMTP -- (Simple Mail Transfer Protocol) Mail
FTP -- (File Transfer Protocol) sending and receiving files
Telnet -- Remote login

How to use these protocols is discussed in the next section. At first glance, it is not obvious why
these three functions are the most common. After all, mail and file transfer seem to be the same
thing. However, mail messages are not identical to files, since they are usually comprised of only
ASCII characters and are sequential in structure. Files may contain binary data and have complicated,
non-sequential structures. Also, mail messages can usually tolerate some errors in transmission
whereas files should not contain any errors. Finally, file transfers usually occur in a secure setting
(i.e. The users who are transferring files know each other's names and passwords and are permitted to
transfer the file, whereas mail can be sent to anybody as long as their name is known).

While mail and transfer accomplish the transfer of raw information from one computer to another,
Telnet allows a distant user to process that information, either by logging in to a remote computer or
by linking to another terminal. Telnet is most often used to remotely log in to a distant computer,
but it is actually a general-purpose communications protocol. I have found it incredibly useful over
the last year. In some ways, it could be used for a great deal of access because you can directly
connect to another computer anywhere that has TCP/IP capabilities, however please note that Telnet is
*NOT* Telenet.

There are other functions that some networks provide, including the following:
* Name to address translation for networks, computers and people
* The current time
* Quote of the day or fortune
* Printing on a remote printer, or use of any other remote peripheral
* Submission of batch jobs for non-interactive execution
* Dialogues and conferencing between multiple users
* Remote procedure call (i.e. Distributing program execution over several remote computers)
* Transmission of voice or video information

Some of these functions are still in the experimental stages and require faster computer networks than
currently exist. In the future, new functions will undoubtedly be invented and existing ones improved.

The DOD Protocol Suite is a layered network architecture, which means that network functions are
performed by different programs that work independently and in harmony with each other. Not only are
there different programs but there are different protocols. The protocols SMTP, FTP and Telnet are
described above. Protocols have been defined for getting the current time, the quote of the day, and
for translating names. These protocols are called applications protocols because users directly
interact with the programs that implement these protocols.

The Transmission Control Protocol, TCP, is used by many of the application protocols. Users almost
never interact with TCP directly. TCP establishes a reliable end-to-end connection between two
processes on remote computers. Data is sent through a network in small chunks called packets to
improve reliability and performance. TCP ensures that packets arrive in order and without errors. If a
packet does have errors, TCP requests that the packet be retransmitted.

In turn, TCP calls upon IP, Internet Protocol, to move the data from one network to another. IP is
still not the lowest layer of the architecture, since there is usually a "data link layer protocol"
below it. This can be any of a number of different protocols, two very common ones being X.25 and
Ethernet.

FTP, Telnet and SMTP are called "application protocols", since they are directly used by applications
programs that enable users to make use of the network. Network applications are the actual programs
that implement these protocols and provide an interface between the user and the computer. An
implementation of a network protocol is a program or package of programs that provides the desired
network function such as file transfer. Since computers differ from vendor to vendor (e.g. IBM, DEC,
CDC), each computer must have its own implementation of these protocols. However, the protocols are
standardized so that computers can interoperate over the network (i.e. Can understand and process each
other's data). For example, a TCP packet generated by an IBM computer can be read and processed by a
DEC computer.

In many instances, network applications programs use the name of the protocol. For example, the
program that transfers files may be called "FTP" and the program that allows remote logins may be
called "Telnet." Sometimes these protocols are incorporated into larger packages, as is common with
SMTP. Many computers have mail programs that allow users on the same computer to send mail to each
other. SMTP functions are often added to these mail programs so that users can also send and receive
mail through a network. In such cases, there is no separate program called SMTP that the user can
access, since the mail program provides the user interface to this network function.

Specific implementation of network protocols, such as FTP, are tailored to the computer hardware and
operating system on which they are used. Therefore, the exact user interface varies from one
implementation to another. For example, the FTP protocol specifies a set of FTP commands which each
FTP implementation must understand and process. However, these are usually placed at a low level,
often invisible to the user, who is given a higher set of commands to use.

These higher-level commands are not standardized so they may vary from one implementation of FTP to
another. For some operating systems, not all of these commands make equal sense, such as "Change
Directory," or may have different meanings. Therefore the specific user interface that the user sees
will probably differ.

This file describes a generic implementation of the standard TCP/IP application protocols. Users must
consult local documentation for specifics at their sites.

Names and Addresses In A Network

In DOD Protocol Suite, each network is given a unique identifying number. This number is assigned by a
central authority, namely the Network Information Center run by SRI, abbreviated as SRI-NIC, in order
to prevent more than one network from having the same network number. For example, the ARPAnet has
network number 10 while MIDnet has a longer number, namely 128.242.

Each host in a network has a unique identification so other hosts can specify them unambiguously. Host
numbers are usually assigned by the organization that manages the network, rather than one central
authority. Host numbers do not need to be unique throughout the whole Internet but two hosts on the
same network need to have unique host numbers.

The combination of the network number and the host number is called the IP address of the host and is
specified as a 32-bit binary number. All IP addresses in the Internet are expressible as 32-bit
numbers, although they are often written in dotted decimal notation. Dotted decimal notation breaks
the 32-bit number into four eight-bit parts or octets and each octet is specified as a decimal number.
For example, 00000001 is the binary octet that specifies the decimal number 1, while 11000000
specifies 192. Dotted decimal notation makes IP addresses much easier to read and remember.

Computers in the Internet are also identified by hostnames, which are strings of characters, such as
"phrackvax." However, IP packets must specify the 32-bit IP address instead of the hostname so some
way to translating hostnames to IP addresses must exist.

One way is to have a table of hostnames and their corresponding IP addresses, called a hosttable.
Nearly every TCP/IP implementation has such a hosttable, although the weaknesses of this method are
forcing a shift to a new scheme called the domain name system. In UNIX systems, the hosttable is often
called "/etc/hosts." You can usually read this file and find out what the IP addresses of various
hosts are. Other systems may call this file by a different name and make it unavailable for public
viewing.

Users of computers are generally given accounts to which all charges for computer use are billed. Even
if computer time is free at an installation, accounts are used to distinguish between the users and
enforce file protections. The generic term "username" will be used in this file to refer to the name
by which the computer account is accessed.

In the early days of the ARPAnet which was the first network to use the TCP/IP protocols, computer
users were identified by their username, followed by a commercial "at" sign (@), followed by the
hostname on which the account existed. Networks were not given names, per se, although the IP address
specified a network number.

For example, "knight@phrackvax" referred to user "knight" on host "phrackvax." This did not specify
which network "phrackvax" was on, although that information could be obtained by examining the
hosttable and the IP address for "phrackvax." (However, "phrackvax" is a ficticious hostname used for
this presentation.)

As time went on, every computer on the network had to have an entry in its hosttable for every other
computer on the network. When several networks linked together to form the Internet, the problem of
maintaining this central hosttable got out of hand. Therefore, the domain name scheme was introduced
to split up the hosttable and make it smaller and easier to maintain.

In the new domain name scheme, users are still identified by their usernames, but hosts are now
identified by their hostname and any and all domains of which they are a part. For example, the
following address, "KNIGHT@UMCVMB.MISSOURI.EDU" specifies username "KNIGHT" on host "UMCVMB". However,
host "UMCVMB" is a part of the domain "MISSOURI" " which is in turn part of the domain "EDU". There
are other domains in "EDU", although only one is named "MISSOURI". In the domain "MISSOURI", there is
only one host named "UMCVMB".

However, other domains in "EDU" could theoretically have hosts named "UMCVMB" (although I would say
that this is rather unlikely in this example). Thus the combination of hostname and all its domains
makes it unique. The method of translating such names into IP addresses is no longer as
straightforward as looking up the hostname in a table. Several protocols and specialized network
software called nameservers and resolvers implement the domain name scheme.

Not all TCP/IP implementations support domain names because it is rather new. In those cases, the
local hosttable provides the only way to translate hostnames to IP addresses. The system manager of
that computer will have to put an entry into the hosttable for every host that users may want to
connect to. In some cases, users may consult the nameserver themselves to find out the IP address for
a given hostname and then use that IP address directly instead of a hostname.

I have selected a few network hosts to demonstrate how a host system can be specified by both the
hostname and host numerical address. Some of the nodes I have selected are also nodes on BITnet,
perhaps even some of the others that I do not make a note of due a lack of omniscent awareness about
each and every single host system in the world :-)
Numerical Hostname Location BITnet
--------- -------- -------- ------
18.72.0.39 ATHENA.MIT.EDU (Mass. Institute of Technology) ?
26.0.0.73 SRI-NIC.ARPA (DDN Network Information Center) -
36.21.0.13 MACBETH.STANFORD.EDU (Stanford University) ?
36.21.0.60 PORTIA.STANFORD.EDU (Stanford University) ?
128.2.11.131 ANDREW.CMU.EDU (Carnegie Mellon University) ANDREW
128.3.254.13 LBL.GOV (Lawrence Berkeley Labrotories) LBL
128.6.4.7 RUTGERS.RUTGERS.EDU (Rutgers University) ?
128.59.99.1 CUCARD.MED.COLUMBIA.EDU (Columbia University) ?
128.102.18.3 AMES.ARC.NASA.GOV (Ames Research Center [NASA]) -
128.103.1.1 HARVARD.EDU (Harvard University) HARVARD
128.111.24.40 HUB.UCSB.EDU (Univ. Of Calif-Santa Barbara) ?
128.115.14.1 LLL-WINKEN.LLNL.GOV (Lawrence Livermore Labratories) -
128.143.2.7 UVAARPA.VIRGINIA.EDU (University of Virginia) ?
128.148.128.40 BROWNVM.BROWN.EDU (Brown University) BROWN
128.163.1.5 UKCC.UKY.EDU (University of Kentucky) UKCC
128.183.10.4 NSSDCA.GSFC.NASA.GOV (Goddard Space Flight Center [NASA])-
128.186.4.18 RAI.CC.FSU.EDU (Florida State University) FSU
128.206.1.1 UMCVMB.MISSOURI.EDU (Univ. of Missouri-Columbia) UMCVMB
128.208.1.15 MAX.ACS.WASHINGTON.EDU (University of Washington) MAX
128.228.1.2 CUNYVM.CUNY.EDU (City University of New York) CUNYVM
129.10.1.6 NUHUB.ACS.NORTHEASTERN.EDU (Northeastern University) NUHUB
131.151.1.4 UMRVMA.UMR.EDU (University of Missouri-Rolla) UMRVMA
192.9.9.1 SUN.COM (Sun Microsystems, Inc.) -
192.33.18.30 VM1.NODAK.EDU (North Dakota State Univ.) NDSUVM1
192.33.18.50 PLAINS.NODAK.EDU (North Dakota State Univ.) NDSUVAX

Please Note:

Not every system on BITnet has an IP address. Likewise, not every system that has an IP address is on
BITnet. Also, while some locations like Stanford University may have nodes on BITnet and have hosts on
the IP as well, this does not neccessarily imply that the systems on BITnet and on IP (the EDU domain
in this case) are the same systems.

Attempts to gain unauthorized access to systems on the Internet are not tolerated and is legally a
federal offense. At some hosts, they take this very seriously, especially the government hosts such as
NASA's Goddard Space Flight Center, where they do not mind telling you so at the main prompt when you
connect to their system.

However, some nodes are public access to an extent. The DDN Network Information Center can be used by
anyone. The server and database there have proven to be an invaluable source of information when
locating people, systems, and other information that is related to the Internet.

Telnet

Remote login refers to logging in to a remote computer from a terminal connected to a local computer.
Telnet is the standard protocol in the DOD Protocol Suite for accomplishing this. The "rlogin"
program, provided with Berkeley UNIX systems and some other systems, also enables remote login.

For purposes of discussion, the "local computer" is the computer to which your terminal is directly
connected while the "remote computer" is the computer on the network to which you are communicating
and to which your terminal is *NOT* directly connected.

Since some computers use a different method of attaching terminals to computers, a better definition
would be the following: The "local computer" is the computer that you are currently using and the
"remote computer" is the computer on the network with which you are or will be communicating. Note
that the terms "host" and "computer" are synonymous in the following discussion.

To use Telnet, simply enter the command: TELNET

The prompt that Telnet gives is: Telnet>

(However, you can specify where you want to Telnet to immediately and bypass the the prompts and other
delays by issuing the command: TELNET [location].)

There is help available by typing in ?. This prints a list of all the valid subcommands that Telnet
provides with a one-line explanation.

Telnet> ?

To connect to to another computer, use the open subcommand to open a connection to that computer. For
example, to connect to the host "UMCVMB.MISSOURI.EDU", do "open umcvmb.missouri.edu"

Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu" into an IP address and will
send a packet to that host requesting login. If the remote host decides to let you attempt a login, it
prompts you for your username and password. If the host does not respond, Telnet will "time out" (i.e.
Wait for a reasonable amount of time such as 20 seconds) and then terminate with a message such as
"Host not responding."

If your computer does not have an entry for a remote host in its hosttable and it cannot resolve the
name, you can use the IP address explicitly in the telnet command. For example,

TELNET 26.0.0.73 (Note: This is the IP address for the DDN Network Information Center [SRI-NIC.ARPA])

If you are successful in logging in, your terminal is connected to the remote host. For all intents
and purposes, your terminal is directly hard-wired to that host and you should be able to do anything
on your remote terminal that you can do at any local terminal. There are a few exceptions to this
rule, however.

Telnet provides a network escape character, such as CONTROL-T. You can find out what the escape
character is by entering the "status" subcommand:

Telnet> status

You can change the escape character by entering the "escape" subcommand:

Telnet> escape

When you type in the escape character, the Telnet prompt returns to your screen and you can enter
subcommands. For example, to break the connection, which usually logs you off the remote host, enter
the subcommand "quit":

Telnet> quit

Your Telnet connection usually breaks when you log off the remote host, so the "quit" subcommand is
not usually used to log off.

When you are logged in to a remote computer via Telnet, remember that there is a time delay between
your local computer and the remote one. This often becomes apparent to users when scrolling a long
file across the terminal screen nd they wish to cancel the scrolling by typing CONTROL-C or something
similar. After typing the special control character, the scrolling continues. The special control
character takes a certain amount of time to reach the remote computer which is still scrolling
information. Thus response from the remote computer will not likely be as quick as response from a
local computer.

Once you are remotely logged on, the computer you are logged on to effectively becomes your "local
computer," even though your original "local computer" still considers you logged on. You can log on to
a third computer which would then become your "local computer" and so on. As you log out of each
session, your previous session becomes active again.

File Transfer

FTP is the program that allows files to be sent from one computer to another. "FTP" stands for "File
Transfer Protocol".

When you start using FTP, a communications channel with another computer on the network is opened. For
example, to start using FTP and initiate a file transfer session with a computer on the network called
"UMCVMB", you would issue the following subcommand:

FTP UMCVMB.MISSOURI.EDU

Host "UMCVMB" will prompt you for an account name and password. If your login is correct, FTP will
tell you so, otherwise it will say "login incorrect." Try again or abort the FTP program. (This is
usually done by typing a special control character such as CONTROL-C. The "program abort" character
varies from system to system.)

Next you will see the FTP prompt, which is:

Ftp>

There are a number of subcommands of FTP. The subcommand "?" will list these commands and a brief
description of each one.

You can initiate a file transfer in either direction with FTP, either from the remote host or to the
remote host. The "get" subcommand initiates a file transfer from the remote host (i.e. Tells the
remote computer to send the file to the local computer [the one on which you issued the "ftp"
command]). Simply enter "get" and FTP will prompt you for the remote host's file name and the (new)
local host's file name. Example:

Ftp> get
Remote file name?
theirfile
local file name?
myfile

ou can abbreviate this by typing both file names on the same line as the "get" subcommand. If you do
not specify a local file name, the new local file will be called the same thing as the remote file.
Valid FTP subcommands to get a file include the following:

get theirfile myfile
get doc.x25

The "put" subcommand works in a similar fashion and is used to send a file from the local computer to
the remote computer. Enter the command "put" and FTP will prompt you for the local file name and then
the remote file name. If the transfer cannot be done because the file doesn't exist or for some other
reason, FTP will print an error message.

There are a number of other subcommands in FTP that allow you to do many more things. Not all of these
are standard so consult your local documentation or type a question mark at the FTP prompt. Some
functions often built into FTP include the ability to look at files before getting or putting them,
the ability to change directories, the ability to delete files on the remote computer, and the ability
to list the directory on the remote host.

An intriguing capability of many FTP implementations is "third party transfers." For example, if you
are logged on computer A and you want to cause computer B to send a file to computer C, you can use
FTP to connect to computer B and use the "rmtsend" command. Of course, you have to know usernames and
passwords on all three computers, since FTP never allows you to peek into someone's directory and
files unless you know their username and password.

The "cd" subcommand changes your working directory on the remote host. The "lcd" subcommand changes
the directory on the local host. For UNIX systems, the meaning of these subcommands is obvious. Other
systems, especially those that do not have directory-structured file system, may not implement these
commands or may implement them in a different manner.

The "dir" and "ls" subcommands do the same thing, namely list the files in the working directory of of
the remote host.

The "list" subcommand shows the contents of a file without actually putting it into a file on the
local computer. This would be helpful if you just wanted to inspect a file. You could interrupt it
before it reached the end of the file by typing CONTROL-C or some other special character. This is
dependent on your FTP implementation.

The "delete" command can delete files on the remote host. You can also make and remove directories on
the remote host with "mkdir" and "rmdir". The "status" subcommand will tell you if you are connected
and with whom and what the state of all your options are.

If you are transferring binary files or files with any non-printable characters, turn binary mode on
by entering the "binary" subcommand:

binary

To resume non-binary transfers, enter the "ascii" subcommand.

Transferring a number of files can be done easily by using "mput" (multiple put) and "mget" (multiple
get). For example, to get every file in a particular directory, first issue a "cd" command to change
to that directory and then an "mget" command with an asterisk to indicate every file:

cd somedirectory
mget *

When you are done, use the "close" subcommand to break the communications link. You will still be in
FTP, so you must use the "bye" subcommand to exit FTP and return to the command level. The "quit"
subcommand will close the connection and exit from FTP at the same time.

Mail

Mail is the simplest network facility to use in many ways. All you have to do is to create your
message, which can be done with a file editor or on the spur of the moment, and then send it. Unlike
FTP and Telnet, you do not need to know the password of the username on the remote computer. This is
so because you cannot change or access the files of the remote user nor can you use their account to
run programs. All you can do is to send a message.

There is probably a program on your local computer which does mail between users on that computer.
Such a program is called a mailer. This may or may not be the way to send or receive mail from other
computers on the network, although integrated mailers are more and more common. UNIX mailers will be
used as an example in this discussion.

Note that the protocol which is used to send and receive mail over a TCP/IP network is called SMTP,
the "Simple Mail Transfer Protocol." Typically, you will not use any program called SMTP, but rather
your local mail program.

UNIX mailers are usually used by invoking a program named "mail". To receive new mail, simply type
"mail".

There are several varieties of UNIX mailers in existence. Consult your local documentation for
details. For example, the command "man mail" prints out the manual pages for the mail program on your
computer.

To send mail, you usually specify the address of the recipient on the mail command. For example: "mail
knight@umcvmb.missouri.edu" will send the following message to username "knight" on host "umcvmb".

You can usually type in your message one line at a time, pressing RETURN after each line and typing
CONTROL-D to end the message. Other facilities to include already-existing files sometimes exist. For
example, Berkeley UNIXes allow you to enter commands similar to the following to include a file in
your current mail message:

r myfile

In this example, the contents of "myfile" are inserted into the message at this point.

Most UNIX systems allow you to send a file through the mail by using input redirection. For example:

mail knight@umcvmb.missouri.edu < myfile

In this example, the contents of "myfile" are sent as a message to "knight" on "umcvmb."

Note that in many UNIX systems the only distinction between mail bound for another user on the same
computer and another user on a remote computer is simply the address specified. That is, there is no
hostname for local recipients. Otherwise, mail functions in exactly the same way. This is common for
integrated mail packages. The system knows whether to send the mail locally or through the network
based on the address and the user is shielded from any other details.

"The Quest For Knowledge Is Without End..."


==Phrack Inc.== Volume Three, Issue 27, File 7 of 12

################################################
### ###
### The Making Of A Hacker ###
### ###
### by Framstag of West Germany ###
### ###
### June 2, 1989 ###
### ###
################################################

Prologue For None VMS Users

~~~~~~~~~~~~~~~~~~~~~~~~~~~ DECnet is the network for DEC machines, in most cases you can say VAXes.
DECnet allows you to do:
* - e-mail
* - file transfer
* - remote login
* - remote command
* - remote job entry
* - PHONE

PHONE is an interactive communication between users and is equal to TALK on UNIX or a "deluxe"-CHAT on
VM/CMS.

BELWUE, the university network of the state Baden-Wuerttemberg in West Germany contains (besides other
networks) a DECnet with about 400 VAXes. On every VAX there is standard-account called DECNET with
pw:= DECNET, which is not reachable via remote login. This account is provided for several
DECnet-Utilities and as a pseudo-guest-account. The DECNET-account has very restricted privileges: You
cannot edit a file or make another remote login.

The HELP-menu is equipped by the system and is similar to the MAN command on UNIX.

More information on DECnet can be found in "Looking Around In DECnet" by Deep Thought in this very
issue of Phrack Inc.

Here, at the University of Ulm, we have an *incredibly* ignorant computer center staff, with an even
bigger lack of system-literature (besides the 80 kg of VAX/VMS-manuals). The active may search for
information by himself, which is over the level of "run," "FORTRAN," or "logout." My good luck that I
have other accounts in the BELWUE-DECnet, where more information is offered for the users. I am a
regular student in Ulm and all my accounts are completely legal and corresponding to the German laws.
I don't call myself a "hacker," I feel more like a "user" (...it's more a defining-problem).

In the HELP-menu in a host in Tuebingen I found the file netdcl.com and the corresponding explanation,
which sends commands to the DECNET-Account of other VAXes and executes them there (remote command).
The explanation in the HELP-menu was idiot-proof -- therefore for me, too :-)

With the command "$ mcr ncp show known nodes" you can obtain a list of all netwide active VAXes, as is
generally known, and so I pinged all these VAXes to look for more information for a knowledge-thirsty
user. With "help", "dir" and other similar commands I look around on those DECnet accounts, always
watching for topics related to the BELWUE-network. It's a pity, that 2/3 of all VAXes have locked the
DECNET-Account for NETDCL.COM. Their system managers are probably afraid of unauthorized access, but I
cannot imagine how there could be such an unauthorized access, because you cannot log on this account
-- no chance for trojan horses, etc.

Some system managers called me back after I visited their VAX to chat with me about the network and
asked me if they could help me in any way. One sysop from Stuttgart even sent me a version of
NETDCL.COM for the ULTRIX operation system.

Then, after a month, the H O R R O R came over me in shape of a the following mail:
From: TUEBINGEN::SYSTEM 31-MAY-1989 15:31:11.38
To: FRAMSTAG
CC:
Subj: don't make any crap, or you'll be kicked out!

From: ITTGPX::SYSTEM 29-MAY-1989 16:46
To: TUEBINGEN::SYSTEM
Subj: System-breaking-in 01-May-1989

To the system manager of the Computer TUEBINGEN, On May 1st 1989 we had a System-breaking-in in our
DECNET-account, which started from your machine. By help of our accounting we ascertained your user
FRAMSTAG to have emulated an interactive log-on on our backbone-node and on every machine of our
VAX-cluster with the "trojan horse" NETDCL.COM. Give us this user's name and address and dear up the
occurrence completely. We point out that the user is punishable. In case of repetition we would be
forced to take corresponding measures. We will check whether our system got injured. If not, this time
we will disregard any measure. Inform us via DECnet about your investigation results -- we are
attainable by the nodenumber 1084::system

Dipl.-Ing. Michael Hager

My system manager threatened me with the deleting of my account, if I would not immediately enlighten
the affair. *Gulp*!

I was conscious about my innocence, but how to tell it to the others? I explained, step by step,
everything to my system manager. He then understood after a while, but the criminal procedure still
hovered over me... so, I took quickly to my keyboard, to compose file of explanations and to send it
to that angry system manager in Stuttgart (node 1084 is an institute there). But no way out: He had
run out of disk quota and my explanation-mail sailed into the nirwana:
$ mail explanation
To: 1084::system
%MAIL-E, error sending to user SYSTEM at 1084
%MAIL-E-OPENOUT, error opening SYS$SYSROOT:[SYSMGR]MAIL$00040092594FD194.MAI;
as output
-RMS-E-CRE, ACP file create failed
-SYSTEM-F-EXDISKQUOTA, disk quota exceeded

Also the attempt of a connection with the PHONE-facilty failed: In his borderless hacker-paranoia, he
cut off his PHONE... and nowhere is a list with the REAL-addresses of the virtual DECnet-addresses
available (to prevent hacking). Now I stood there with the brand "DANGEROUS HACKER!" and I had no
chance to vindicate myself. I poured out my troubles to an acquaintance of mine, who is a sysop in the
computer-center in Freiburg. He asked other sysops and managers thru the whole BELWUE-network until
someone gave him a telephone number after a few days -- and that was the right one!

I phoned to this Hager and told him what I had done with his DECnet-account and also what NOT. I
wanted to know which crime I had committed. He promptly cancelled all of his reproaches, but he did
not excuse his defamous incriminations. I entreated him to inform my system manager in Tuebingen that
I have done nothing illegal and to stop him from erasing my account. This happens already to a fellow
student of mine (in this case, Hager was also guilty). He promised me that he would officially cancel
his reproaches.

After over a week this doesn't happen (I'm allowed to use my account further on). In return for it, I
received a new mail from Hager on another account of mine:
From: 1084::HAGER 1-JUN-1989 12:51
To: 50180::STUD_11
Subj: System-breaking-in

On June 1st 1989 you have committed a system-breaking-in on at least one of our VAXes. We were able to
register this occurrence. We would be forced to take further measure if you did not dear up the
occurrence completely until June 6th.

Of course the expenses involved would be imposed on you. Hence enlightenment must be in your own
interest.

We are attainable via DECnet-mail with the address 1084::HAGER or via following address:
Institut fuer Technische Thermodynamik und Thermische Verfahrenstechnik
Dipl.-Ing. M. Hager Tel.: 0711/685-6109
Dipl.-Ing. M. Mrzyglod Tel.: 0711/685-3398
Pfaffenwaldring 9/10-1
7000 Stuttgart-80

M. Hager M. Mrzyglod

This was the reaction of my attempt: "$ PHONE 1084::SYSTEM". I have not answered to this mail. I AM
SICK OF IT!

Framstag (FRAMSTAG@DTUPEV5A.BITNET)

With Special Thanks For Translation Assistance To Schrulli B.

The Anarchist's Cookbook IV Part 1 (2024)

References

Top Articles
Latest Posts
Article information

Author: Cheryll Lueilwitz

Last Updated:

Views: 5391

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Cheryll Lueilwitz

Birthday: 1997-12-23

Address: 4653 O'Kon Hill, Lake Juanstad, AR 65469

Phone: +494124489301

Job: Marketing Representative

Hobby: Reading, Ice skating, Foraging, BASE jumping, Hiking, Skateboarding, Kayaking

Introduction: My name is Cheryll Lueilwitz, I am a sparkling, clean, super, lucky, joyous, outstanding, lucky person who loves writing and wants to share my knowledge and understanding with you.