------------------------------------------------------------------------------
        %%%%%%%%%%%%%%%%%%%%%%%%%%%%-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
        %                                                        %
        %            THE NEOPHYTE'S GUIDE TO HACKING             %
        %            ===============================             %
        %                      1993 Edition                      %
        %                 Completed on 08/28/93                  %
        %           Modification 1.1 Done on 10/10/93            %
        %           Modification 1.2 Done on 10/23/93            %
        %                          by                            %
        %%                >>>>>  Deicide  <<<<<                 %%
        %%%                                                    %%%
        %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

    <   The author of this file grants permission to reproduce and   >
    <   redistribute this file in any way the reader sees fit,       >
    <   including the inclusion of this file in newsletters of any   >
    <   media, provided the file is kept whole and complete,         >
    <   without any modifications, deletions or ommissions.          >
    <   (c) 1993, Deicide                                            >

TABLE OF CONTENTS
=================

1. INTRODUCTION

2. ETHICS/SAFETY

3. WHERE TO START

4. PACKET-SWITCHED NETWORKS
   A. Intro to PSNs
   B. How packet-switching works
   C. The Internet
       1. Introduction
       2. Getting access
       3. FTP
   D. X.25 Networks
       1. NUAs
       2. PADs & NUIs
       3. CUGs
       4. SprintNet
       5. BT Tymnet
       6. Datapac
       7. DNIC List

5. SYSTEM PENETRATION
   A. Unix
   B. VMS
   C. MPE (HP3000 mainframes)
   D. VM/CMS
   E. Primos
   F. TOPS 10/20
   G. IRIS
   H. NOS
   I. DECServer
   J. GS/1
   K. XMUX
   L. Starmaster/PACX
   M. Access 2590
   N. PICK
   O. AOS/VS
   P. RSTS
   Q. WindowsNT
   R. Novell Netware
   S. System75/85
   T. AS400
   U. TSO

6. BRUTE FORCE
   A. Passwords
   B. Usernames
   C. Services

7. SOCIAL ENGINEERING

8. TRASHING

9. ACRONYMS

10. CONCLUSION
   A. Last words
   B. Recommended Reading
   C. BBSes
   D. References
   E. And finally..
   F. Disclaimer


INTRODUCTION:
============
------------

   Over four years ago the final version of the LOD/H's Novice's Guide to
Hacking was created and distributed, and during the years since it has served
as a much needed source of knowledge for the many hackers just beginning to
explore the wonders of system penetration and exploration.
   The guide was much needed by the throng of newbies who hadn't the
slightest clue what a VAX was, but were eager to learn the arcane art of
hacking. Many of today's greats and moderates alike relied the guide as a
valuable reference during their tentative(or not) steps into the nets.
   However, time has taken it's toll on the silicon networks and the guide is
now a tad out of date. The basic manufacturer defaults are now usually secured
, and more operating systems have come on the scene to take a large chunk of
the OS percentile. In over four years not one good attempt at a sequel has
been made, for reasons unbeknownst to me.
   So, I decided to take it upon myself to create my own guide to hacking..
the "Neophyte's Guide to Hacking" (hey..no laughing!) in the hopes that it
might help others in furthering their explorations of the nets.
   This guide is modelled after the original, mainly due to the fact that the
original *was* good. New sections have been added, and old sections expanded
upon. However, this is in no means just an update, it is an entirely new guide
as you'll see by the difference in size. This guide turned out to be over 4
times the size of The Mentor's guide.
   Also, this guide is NOT an actual "sequel" to the original; it is not
LOD/H sponsored or authorized or whatever, mainly because the LOD/H is now
extinct.
   One last thing.. this guide is in no way complete. There are many OS's I
did not include, the main reasons being their rarity or my non-expertise with
them. All the major OS's are covered, but in future releases I wish to include
Wang, MVS, CICS, SimVTAM, Qinter, IMS, VOS, and many more. If you
feel you could help, contact me by Internet email or on a board or net(if you
can find me). Same thing applies for further expansion of current topics and
operating systems, please contact me.
   Ok, a rather long intro, but fuck it.. enjoy as you wish..
       Deicide - [email protected]

ETHICS/SAFETY:
=============
-------------

   One of the most integral parts of a hacker's mindset is his set of ethics.
And ethics frequently go hand in hand with safety, which is obviously the most
critical part of the process of hacking and the system exploration, if you
plan to spend your life outside of the gaol.
   A hacker's ethics are generally somewhat different from that of an average
joe. An average joe would be taught that it is bad to break laws, even though
most do anyways. I am encouraging you to break laws, but in the quest for
knowledge. In my mind, if hacking is done with the right intentions it is not
all that criminal. The media likes to make us out to be psychotic sociopaths
bent on causing armageddon with our PCs. Not likely. I could probably turn the
tables on the fearmongering media by showing that the average joe who cheats
on his taxes is harming the system more than a curious interloper, but I
refrain.. let them wallow..
   The one thing a hacker must never do is maliciously hack(also known
as crash, trash, etc..) a system. Deleting and modifying files unnecessary is
BAD. It serves no purpose but to send the sysadmins on a warhunt for your head
, and to take away your account. Lame. Don't do it.
   Anyways, if you don't understand all of these, just do your best to follow
them, and take my word for it. You'll understand the reasoning behind these
guidelines later.

I.    Don't ever maliciously hack a system. Do not delete or modify files
     unnecessarily, or intentionally slow down or crash a system.
     The lone exception to this rule is the modification of system logs and
     audit trails to hide your tracks.

II.   Don't give your name or real phone number to ANYONE, it doesn't matter
     who they are. Some of the most famous phreaks have turned narcs because
     they've been busted, and they will turn you in if you give them a
     chance. It's been said that one out of every three hackers is a fed, and
     while this is an exaggeration, use this as a rule and you should do
     fine. Meet them on a loop, alliance, bbs, chat system, whatever, just
     don't give out your voice number.

III.  Stay away from government computers. You will find out very fast that
     attempting to hack a MilTac installation is next to impossible, and will
     get you arrested before you can say "oh shit". Big Brother has infinite
     resources to draw on, and has all the time it needs to hunt you down.
     They will spend literally years tracking you down. As tempting as it may
     be, don't rush into it, you'll regret it in the end.

IV.   Don't use codes from your own home, ever! Period. This is the most
     incredibly lame thing i've seen throughout my life in the 'underground';
     incredible abuse of codes, which has been the downfall of so many people.
     Most PBX/950/800s have ANI, and using them will eventually get you
     busted, without question. And calling cards are an even worse idea.
     Codes are a form of pseudo-phreaking which have nothing to do with the
     exploration of the telephone networks, which is what phreaking is about.
     If you are too lazy to field phreak or be inventive, then forget about
     phreaking.

V.    Don't incriminate others, no matter how bad you hate them. Turning in
     people over a dispute is a terrible way to solve things; kick their ass,
     shut off their phones/power/water, whatever, just don't bust them.
     It will come back to you in the end..

VI.   Watch what you post. Don't post accounts or codes over open nets as a
     rule. They will die within days, and you will lose your new treasure.
     And the posting of credit card numbers is indeed a criminal offense
     under a law passed in the Reagan years.

VII.  Don't card items. This is actually a worse idea than using codes, the
     chances of getting busted are very high.

VIII. If for some reason you have to use codes, use your own, and nothing
     else. Never use a code you see on a board, because chances are it has
     been abused beyond belief and it is already being monitored.

IX.   Feel free to ask questions, but keep them within reason. People won't
     always be willing to hand out rare accounts, and if this is the case
     don't be surprised. Keep the questions technical as a rule. Try and
     learn as much as you can from pure hands on experience

X.    And finally, be somewhat paranoid. Use PGP to encrypt your files, keep
     your notes/printouts stored secretly, whatever you can do to prolong
     your stay in the h/p world.

XI.   If you get busted, don't tell the authorities ANYTHING. Refuse to speak
     to them without a lawyer present.

XII.  If police arrive at your residence to serve a search warrant, look it
     over carefully, it is your right. Know what they can and can't do, and
     if they can't do something, make sure they don't.

XIII. If at all possible, try not to hack off your own phoneline. Splice your
     neighbour's line, call from a Fortress Fone, phreak off a junction box,
     whatever..  if you hack long enough, chances are one day you'll be
     traced or ANI'd.
     Don't believe you are entirely safe on packet-switched networks either,
     it takes a while but if you scan/hack off your local access point they
     will put a trace on it.

XIV.  Make the tracking of yourself as difficult as possible for others.
     Bounce the call off several outdials, or try to go through at least two
     different telco companies when making a call to a dialup.
     When on a packet-switched network or a local or wide area network,
     try and bounce the call off various pads or through other networks
     before you reach your destination. The more bounces, the more red tape
     for the investigator and the easier it is for you to make a clean
     getaway.
     Try not to stay on any system for *too* long, and alternate your calling
     times and dates.

XV.   Do not keep written notes! Keep all information on computer, encrypted
     with PGP or another military-standard encryption program.
     Written notes will only serve to incriminate you in a court of law.
     If you write something down originally, shred the paper.. itty bitty
     pieces is best, or even better, burn it! Feds DO trash, just like us,
     and throwing out your notes complete will land in their hands, and
     they'll use it against you.

XVI.  Finally, the day/night calling controversy. Some folks think it is a
     better idea to call during the day(or whenever the user would normally
     use his account) as to not arouse the sysadmin's suspicion of abnormal
     calling times, while others think it is better to call when nobody is
     around.
     This is a tough one, as there is no real answer. If the sysadmin keeps
     logs(and reads over them) he will definetly think it strange that a
     secretary calls in at 3 am.. he will probably then look closer and find
     it even stranger that the secretary then grabbed the password file and
     proceeded to set him/herself up with a root shell.
     On the other hand, if you call during the time the user would normally
     call, the real owner of the account may very well log in to see his
     name already there, or even worse be denied access because his account
     is already in use.
     In the end, it is down to your opinion.
     And remember, when you make a decision stick to it; remember the time
     zone changes.

WHERE TO START
==============
--------------

   Probably the hardest period in hacking is that of when you are first
starting. Finding and penetrating your first system is a major step, and can
be approached in many ways. The common ways to find a system to hack are;

   - UNIVERSITIES    : Universities commonly have hundreds of users, many of
                       which aren't too computer literate, which makes
                       hacking a relatively simple chore. And security is
                       often poor, so if you don't abuse the system too much
                       your stay could be a long one.
                       On the other hand, for a nominal fee you can usually
                       pick up a cheap *legitimate* (now there's a concept)
                       account. Or you could enroll in the university for
                       a few credits, and just go until the accounts are
                       handed out. Unfortunely, if you are caught hacking
                       off your own account it won't be hard to trace it
                       back to you. If you get a legimate account at first,
                       you might be best to hack a student's account for your
                       other-system hacking.
                       The other fun part about universities is often they
                       will provide access to a number of nets, usually
                       including the Internet.
                       Occasionally you'll have access to a PSN as well.

   - CARRIER SCANNING: Carrier scanning in your LATA(Local Access Transport
                       Area), commonly known as wardialing, was popularized
                       in the movie War Games.
                       Unfortunely, there are a few problems inherent in
                       finding systems this way; you are limited to the
                       systems in your area, so if you have a small town you
                       may find very little of interest, and secondly,
                       ANI is a problem within your own LATA, and tracing is
                       simple, making security risks high. If you are going
                       to hack a system within your own lata, bounce it at
                       least once.
                       There are many programs, such as ToneLoc and CodeThief
                       (ToneLoc being superior to all in my humble opinion),
                       which will automate this process.

   - PACKET-SWITCHED : This is my favorite by far, as hacking on PSNs is how
     NETWORKS          I learned nearly all I know. I've explored PSNs
                       world-wide, and never ran out of systems to hack.
                       No matter what PSN you try you will find many
                       different, hackable systems. I will go more indepth
                       on PSNs in the next section.


PACKET-SWITCHED NETWORKS
========================
------------------------

Intro to PSNs
=============

   First off, PSNs are also known as PSDNs, PSDCNs, PSSs and VANs to name
a few. Look up the acronyms in the handy acronym reference chart<g>.
   The X.25 PSNs you will hear about the most are; Sprintnet(formerly
Telenet), BT Tymnet(the largest), and Datapac(Canada's largest).
   All these networks have advantages and disadvantages, but i'll say this;
if you are in the United States, start with Sprintnet. If you are in Canada,
Datapac is for you.
   The reason PSNs are so popular for hackers are many. There are literally
thousands of systems on PSNs all around the world, all of which(if you have
the right facilities) are free of charge for you to reach. And because of the
immense size of public PSNs, it is a rare thing to ever get caught for
scanning. Tracing is also a complicated matter, especially with a small
amount of effort on your part to avoid a trace.

How packet-switching works
==========================

   The following explanation applies for the most part to all forms of
packet-switching, but is specifically about PSNs operating on the X series of
protocols, such as Datapac & SprintNet, as opposed to the Internet which
operates on TCP/IP. It is the same principle in essense, however.
   Packet-Switched Networks are kinda complicated, but I'll attempt to
simplify the technology enough to make it easy to understand.
   You, the user, connect to the local public access port for your PSN,
reachable via a phone dialup. You match communications parameters with the
network host and you are ready to go.
   From there, all the data you send across the network is first bundled into
packets, usually of 128 or 256 bytes. These packets are assembled using
Packet Assembly/Disassembly, performed by the public access port, also known
as a public PAD(Packet Assembler/Disassembler), or a DCE(Data Communicating
Equipment or Data Circuit-Terminating Equipment).
   The packets are sent along the network to their destination by means of
the various X protocols, standardly X.25 with help from X.28, X.29 & X.3
within your home network, and internationally using X.75/X.121. The X protocol
series are the accepted CCITT standards.
   The host system(DTE: Data Terminal Equipment, also a PAD) which you are
calling then receives the packet and disassembles the packet using Packet
Assembly/Disassembly once again into data the system understands.
   The DTE then assembles it's data in response to your packet, and sends it
back over the network to your PAD in packet form, which disassembles the
packet into readable data for you, the user.
   And that is the simplified version!

The Internet
============

Introduction
------------

   Contrary to popular belief, the Internet is a packet-switched network;
just not an X.25 packet-switched network. The Internet operates on the TCP/IP
protocols(as a rule), which is why it is sometimes disregarded as a
packet-switched network. In fact, the Internet's predecessor, the ARPAnet,
was the first large-scale experiment in packet-switching technology. What was
then Telenet came later.
   The confusion comes from peoples ignorance of the principles of
packet-switching, which is simply a type of network, explained in technical
detail earlier. It doesn't matter what protocols the network may use, if
packet-switching is in use it is obviously a packet-switched network.
   Ok, now you may have noticed that the Internet has a rather small section,
which is true. The reasons are many. This is a hacking guide, not an Internet
tutorial, so I didn't include the IRC or Archie or whatever. And the main
reason is I spent about 100% more time on X.25 nets than I did the Internet.
   Nonetheless, I decided to include the essential aspects of the Internet.
You should be able to take it from there.
   The following section is derived mostly from personal experience, but
the Gatsby's Internet file helped out somewhat, specifically in the classes
of IP addresses.

Getting Access
--------------

   Getting access is somewhere between easy and very difficult, depending
where you live and how good(or lucky!) a hacker you are.
   First of all, if you are going to hack on the Internet then you must be
on a system that has full Internet access, not just mail. That cuts Compuserve
and Prodigy out of the picture.
   Most universities and some high schools have Internet access, see what
you can do to get yourself an account, legitimatly or not.
   Some BBSes offer full Internet access for a fairly reasonable price, and
that would be a good choice.
   If you are in an area with a FreeNet, then you get full Internet access..
for free! Check around with local hackers or PD boards to inquire where the
nearest FreeNet is.
   Some businesses provide Internet access, for a price. Check with local
netters to see what local options there are.
   And lastly, you can try and hack your way on. When you hack a system,
check and see if they are on the net. Usually this is accomplished by doing
a test call using telnet.. explained later.

FTP
---

   FTP is the acronym for File Transfer Protocol, and it is the primary means
of transporting remote files onto your own system(actually, usually the
system which you are calling the Internet through).
   I will only provide a brief overview, as FTP is fairly easy to use, has
help files online and comprehensive documentation offline at your local h/p
BBS.
   First off, FTP can be initialized by typing 'ftp' at any system which
has it. Most do, even if they don't have the Internet online. That a
frustrating lesson more than a few novices has learned.. if you hack into a
system that has FTP or telnet on line, it does not necessarily(and usually
doesn't) have Internet access. Some SunOS's will have two sets of ftp and
telnet utilities. The standard ftp and telnet commands can be used for local
network connects, but not Internet. Another set of commands, itelnet, iftp
and ifinger (and occasionally iwhois) is used for the Internet.
   When you enter the FTP utility, you'll usually find yourself at a 'ftp>'
prompt, and typing 'help' should bring up a small set of help files. The
commands available, along with the help files, vary from system to system.
   Procedure is then defined by what type of system you are on, as again,
it varies. But what you usually do next is open a connection to the system you
want to get a file off of. Type 'open' followed by the host name or IP
address of the system you wish to connect to.. explained later.
   Next, you will usually find yourself at a sort of login prompt. If you
have a username on that system, then type it in. If not, try 'anonymous'.
Anonymous is a great little guest account that is now being built in to some
OS's. Conscientious sysadmins may disable it, for obvious reasons. If however,
it is not, you will be asked for a password. Type anything, it doesn't matter
really. Type a few d's if you want, it really doesn't matter(as a rule don't
sit on your keyboard though.. it may not like it.. type something boring).
   Next you simply use the 'get' command to get the file you want. Usually
it is a good idea to not put the files in a directory that they will be
noticed.. the sysadmin will suspect something is up if he runs into a few
files that he supposedly copied into his own directory. Which brings us to
the next segment.. give your files benign names, especially if they are
something like /etc/passwd files or issues of Phrack.
   A note about FTPing /etc/passwds. It rarely works. Oh yes, you will get
an /etc/passwd file, but rarely on the Internet will it be the real
/etc/passwd. Check the size of the file first.. if it is 300 bytes or less,
then it will likely be a substitute. Telnet will, however, get the real
/etc/passwd on most occasions.
   Now quit the FTP utility and peruse your new files.. be sure to remove
them when done.

Telnet
------

   While FTP has no real parallel in X.25 networks, you could equate telnet
to a private PAD. Telnet lets you connect to and operate on Internet systems
over the Internet as if you were connected locally.
   Telnet is initialized by typing 'telnet' at your shell. The operative
command is, again, 'open'. Again, type 'open' followed by the domain name
or the IP address. When connected, you will be at a login prompt of some
kind(usually..). Enter a username if you have one, and if not you can either
attempt to hack one or see if the system accepts the 'anonymous' guest user,
explained in the FTP section.
   If all goes well, you should have a remote connection of some kind, and
what follows depends on the system you are connected to, just like in any
other network.

Domain Names and IP Addresses - Intro
-------------------------------------

   For those of you unfamiliar with those terms I will give a small,
condensed explanation of what the two are.
   One or the other is needed for connecting to a remote system, either by
FTP or Telnet. The IP address could be equated to the X.25 net's Network User
Address. The Domain name is a mnemonic name, used for convience more than
anything, as it is generally easier to remember.
   If you wish to scan for systems on the Internet it is usually much easier
to scan by IP address, as you won't know the mnemonic for most systems.
   IP addresses are 4 digit-combinations separated by dots. Address examples
are 192.88.144.3(EFF) and 18.72.2.1(MIT).
   Addresses fall into three classes;
      Class A  -  0 to 127
      Class B  -  128 to 191
      Class C  -  192 to 223
   The earliest Internet systems are all in Class A, but it is more common
to find class B or C systems. Moreover, a lot of systems are placed
specifically in the 128 or 192 address prefix, as opposed to 184 or 201 or
whatever. Scanning an IP address set can be accomplished in many fashions.
One of which would be to pick a prefix, add two random one to two digit
numbers, and scan the last portion. ie: take 192.15.43 and scan the last
digit from 0 to 255.
   Unfortunely, the last portion (or last two portions in the case of Class
C) are ports, meaning you may come up completely blank or you might hit the
jack pot.
   Experiment to your own liking, after a while you will fall into a
comfortable groove.
   You can also connect to specific systems using the domain name, if you
know or can guess the domain name. To guess a domain name you will need to
know the company or organization's name, and the type of organization it is.
This is possible because host names must follow the Domain Name System, which
makes guessing a lot easier. Once you have both, you can usually take a few
educated guesses at the domain name. Some are easier than others.
   First of all, you will need to understand the principle of top-level
domains. The top level is at the end of a domain name; in the case of eff.org,
the top-level is 'org'. In the case of mit.edu, the top-level is 'edu'.
   Top levels fall into a few categories;
       com - commercial institutions
       org - non-profit organizations
       edu - educational facilities
       net - networks
       gov - government systems (non military)
       mil - non-classified military
   Along with various country codes. The country codes are two letters used
for international calls; the US's is 'US', Brazil's is 'BR'.
   Determine which top-level the system falls under, and then make a few
guesses. Examples are;
       compuserve.com
       xerox.com
       mit.edu
       eff.org
   For further reading, I suggest picking up a few of the printed Internet
guides currently on the market, as well as the Gatsby's file on the Internet,
printed in Phrack 33.

X.25 Networks
=============

   From here on in the PSN section of this file is dedicated to X.25
networks. I use the acronym PSN interchangably with X.25 networks, so don't
get PSN confused with all the other types of PSN networks. From here on in,
it is all X.25.

Network User Addresses
----------------------

   NUAs(Network User Addresses) are the PSNs equivalent of a phone number.
They are what you need to connect to systems on PSNs around the world, and
thanks to the DNIC(Data Network Identifier Code), there are no two the same.
   The format for entering NUAs is different from PSN to PSN. For example,
on Datapac you must include 0's, but on Sprintnet 0's are not necessary.
Tymnet uses 6 digits NUAs rather than the standard 8.
But the standard NUA format is this;

       PDDDDXXXXXXXXSS,MMMMMMMMMM

Where; P is the pre-DNIC digit
      D is the DNIC
      X is the NUA
      S is the LCN(Logical Channel Number, subaddressing)
      M is the Mnemonic

Various segments may be omitted depending on your PSN and where you are
calling.
The P is commonly a 0, but is a 1 on Datapac. It is not usually even counted
as part of the NUA, but must be included(usage varying) when making calls
to another PSN other than your own. Within your own PSN it is not necessary
to include the pre DNIC digit.
The D is the DNIC also known as the DCC(Data Country Code). The DNIC is the
4 digit country code, which insures that each NUA worldwide is unique. The
DNIC is only used in calling international NUAs. If you are in Datapac(DNIC
3020) you do not have to include the DNIC for Datapac when making calls to
NUAs within Datapac, but if you are in another PSN you must include the DNIC
for calls to Datapac.
The X symbolizes the actual NUA, which along with the optional S
(subaddressing) must always be included. You can simplify the NUA even greater
using this format;

      PPPXXXXX

Where P is the prefix of the NUA, and the X's are the suffix. The prefix
corresponds to an Area Code in most cases in that the NUAs within that prefix
are in a certain part of the country the PSN serves. In the case of Sprintnet,
the prefix corresponds directly with the Area Code(ie: all NUAs in the 914
prefix on Sprintnet are in New York, and all phone numbers in the 914 Area
Code are in New York).
Subaddressing, S on the diagram, is a somewhat complicated thing to explain.
Subaddressing is used when desired by the owner of the DTE, and is used to
connect to specified system on the same NUA. You may find more than one system
on the same NUA, and these can be reached using subaddresses.
ie:
          NUA                SYSTEM
       PPPXXXXXSS
       ==========      ===================
 Ex.1  12300456             Unix
 Ex.2  123004561            VMS
 Ex.3  1230045699           HP3000

In this example, the normal NUA is 12300456(assuming DNIC and pre-DNIC digit
are not used). This NUA takes you to a Unix system. But when the LCN(Logical
Channel Number, subaddress) of 1 is used, you are taken to a VMS. And the
subaddress of 99 takes you to a HP3000. The systems on 12300456 are all owned
by the same person/company, who wished to have one NUA only, but by using
subaddresses he can give access to multiple systems on a lone NUA.
Subaddresses are also used occasionally as extra security. If you hit a system
that gives you an error message such as 'REMOTE PROCEDURE ERROR' or 'REMOTE
DIRECTIVE', you will either need a subaddress or a mnemonic. You may choose to
go through the entire possible subaddresses, 1 to 99, or if you are just
scanning i would suggest these: 1,2,50,51,91,98,99
Mnemonics, M, are another tricky one to explain. They are not documented by
the PSNs, I discovered them on my own. Mnemonics are also used to select
systems on a single NUA as a kind of port selector, but they are more commonly
used as a kind of external password, which prevents you from even seeing the
system in question.
The same error messages as in LCNs occur for mnemonics, but again, even if you
can reach a system with a standard NUA, there is a possibly a system only
reachable by mnemonic exists. Here is a list of commonly used mnemonics;
   SYSTEM CONSOLE PAD DIAL MODEM X25 X28 X29 SYS HOST

Bypassing Reverse Charging Systems: Private PADs and NUIs
---------------------------------------------------------

   Occasionally on PSNs you will run into systems which give you the
error message 'COLLECT CALL REFUSED'. This denotes a reverse-charging system.
When you make a call to a system on a PSN, the call is automatically collect.
But a lot of sysadmins do not want to pay for your connect charges, and if all
of their users have NUIs or private PADs, it is a good idea for them to make
their system reverse-charging, which saves them money, but also acts as yet
another security barrier from casual snoopers.
   But again, this can be avoided by using a private PAD or a NUI.
Before we go into the details of these, remember that a private PAD is a
different thing than your public access port PAD. A private PAD is a PAD which
automatically assumes all connect charges. So, the reverse charging systems
will let you past the reverse charging, as you agree to accept the charges.
   NUI's(Network User Identifiers) work the same way. You can think of a NUI
as .. say a Calling Card. The Calling Card is billed for all the charges made
on it, regardless of who made them; the owner gets the bill. The NUI works the
same way. NUIs are used legitimatly by users willing to accept the connect
charges. But, as hackers are known to do, these NUIs get stolen and used to
call all NUAs all around the world, and the legitimate owner gets the bill.
But unlike CCs, you will usually get away with using a NUI.
   However, as you can guess, private PADs and NUIs are fairly hard to come
by. If somebody manages to get ahold of one, they usually won't be willing to
share it. So, it comes down to you; you probably will have to find your own.
   PADs are only found by scanning on PSNs, and by hacking onto systems on
PSNs. There are programs on Unix and Primos systems,for example, that serve as
a private PAD. And there are some private PADs that are set up solely for the
purpose of being a private PAD. But, these are almost always passworded, so it
is up to you to get in.
   NUIs are somewhat the same thing. NUIs are different from PSN to PSN, some
will tell you if a NUI is wrong, letting you guess one, but others will not.
And of course, you still have to guess the password. I've heard stories of
people carding NUIs, but i'm not sure i quite believe it, and the safety of
such a practice is questionable.

Closed User Groups
------------------

   One of the most effective security measures i've ever seen is the CUG
(Closed User Group). The CUG is what generates the 'CALL BLOCKED' message when
scanning on PSNs. A CUG will only accept calls into the DTE from specified
DCE NUAs. Meaning, if your NUA has not been entered into the list of
acceptable NUAs, you won't be allowed to even see the system. However, CUGs
aren't for everybody. If you have a system with many users that all call in
from different points, CUGs are unusable. And a good thing for us. I've never
heard of anyone finding a way past a CUG. I've got a few theories but..

Sprintnet
---------

   Now i'll go a bit more into the major US and Canadian PSNs, starting with
the most popular in the States, Sprintnet
   To find a public indial port for Sprintnet you may possibly be able to
find it in your telefone book(look under Sprintnet) or by Directory Assistance.
If not, try Sprintnet Customer Service at 1-800-336-0437. This also will
probably only function between 8:30 and 5:00 EST, maybe a bit different.
   Also, for a data number for in-dial look ups try 1-800-424-9494 at
communication parameters 7/E/1(or 8/N/1 also i believe). Type <CR> twice
or @D for 2400bps and press enter so Sprintnet can match your communications
parameters. It will display a short herald then a TERMINAL= prompt.
At the TERMINAL= prompt type VT100 for VT100 terminal emulation, if you are
using a personal computer i think D1 works, or just <CR> for dumb terminal.
Then type "c mail", at the username prompt type "phones", and for password
type "phones" again. It is menu driven from there on.
   Now that you have your Sprintnet public dial port number, call it up like
you would a BBS, then when it connnects type the two <CR>s for 300/1200bps
or the @D for 2400bps, then it will display its herald, something like:

       SPRINTNET(or in some cases TELENET)
       123 11A  (where 123 is your area code & Sprintnet's address prefix
                 and 11A is the port you are using)
       TERMINAL=(type what you did previously eg:VT100,D1,<ENTER>)

then when Sprintnet displays the @ prompt you know you are connected to
a Sprintnet public PAD and you are ready to enter NUAs.
   As i mentioned before, Sprintnet NUA prefixes correspond directly with
Area Codes, so to scan Sprintnet simply take an AC and suffix it with the
remaining digits, usually in sequence. Since Sprintnet ignores 0's, NUAs
can be as small as 4 digits. When scanning, go from lowest to highest,
stopping as soon as it seems NUAs have run dry(take it a hundred NUAs further
to be sure..best to take it right to 2000, maybe higher if you have time).

BT Tymnet
---------

   BT Tymnet is owned by British Telecom, and is the biggest PSN by far, but
it does have some extra security.
   For finding Tymnet dial-ins the procedure is much the same, look in the
phone book under Tymnet or BT Tymnet, or phone directory assistance and ask
for BT Tymnet Public Dial Port numbers, or you can call Tymnet customer
Service at 1-800-336-0149. Generally try between 8:30 and 5:00 EST. I don't
have the Tymnet data number for finding in-dials, but once you are on Tymnet
type INFORMATION for a complete list of in-dials as well as other things.
   Once you have your in-dial number set your communication parameters at
either 8/N/1 or 7/E/1 then dial the number just like you would a BBS. At
connect you will see a string of garbage characters or nothing at all.
Press <CR> so Tymnet can match your communication parameters. You will then
see the Tymnet herald which will look something like this:
       -2373-001-
       please type your terminal identifier
   If it wants a terminal identifier press A(if you want, you can press A
instead of <CR> at connect so it can match your communication parameters and
get your terminal identifer all at once).
   After this initial part you will see the prompt:
       please log in:
This shows Tymnet is ready for you to enter NUAs. A great deal of the NUAs on
Tymnet are in plain mnemonic format however. To reach these, just enter the
mnemonic you wish, nothing else(ie: CPU or SYSTEM). To enter digital NUAs you
need a NUI though. Tymnet will let you know when a NUI is wrong. Just keep
guessing NUIs and passwords until you find one. BUT, keep in mind, one of the
biggest security features Tymnet has is this: it will kick you off after three
incorrect attempts at anything. Thus, you'll have to call again and again, and
if you are in a digital switching system such as ESS it is not a good idea to
call anywhere an excessive amount of time. So keep it in moderation if you
choose to try Tymnet.

Datapac
-------

   I am the most fond of Datapac, because I grew up on it. Nearly all the
hacking i've done to this day was on Datapac or the international PSNs i've
been able to reach through private PADs i've found on Datapac.
   To connect to the Datapac network from Canada you will need to dial into
your local Datapac node, which is accessible in most cities via your local
Datapac dial-in number.
   There are quite a few ways to find your local Datapac dial-in. It will
usually be in your telephone book under "DATAPAC PUBLIC DIAL PORT". If
not, you could try directory assistance for the same name. Alternatively,
there are a couple phone #'s for finding your dial port(these are also
customer assistance):

1-800-267-6574  (Within Canada)
1-613-781-6798

   Also, these numbers function only from 8:30 to 5:00 EST(Eastern Standard
Time).Also, the Datapac Information Service(DIS) at NUA 92100086 has a
complete list of all public dial-ins.
   I think you can use both communication parameter settings work, but 8/N/1
(8 data bits, No parity, 1 stop bit) is used most frequently, so set it
initially at that. Some NUA's on Datapac use 7/E/1, change to it if needed
after you are connected to a Datapac dial-in.
   Ok,if you have your Datapac 3000 Public Indial number, you've set your
communication parameters at 8/N/1, then you are now set to go. Dial your
indial just like a BBS(duh..) and once connnected:
You will have a blank screen;
Type 3 periods and press RETURN  (this is to tell Dpac to initialize itself)
The Datapac herald will flash up stating:
DATAPAC : XXXX XXXX (your in-dial's NUA)
You are now ready to enter commands to Datapac.

Example:
(YOU ENTER)          atdt 16046627732
(YOU ENTER)          ...
(DATAPAC RESPONDS)   DATAPAC : 6710 1071

Now you are all set to enter the NUA for your destination.
NUAs on Datapac must be 8 to 10 digits(not including mnemonics).
8 is standard, but 9 or 10 is possible depending on usage of subaddressing.
NUA prefixes on Datapac are handed out in blocks, meaning they do not
correspond to Area Codes, but by looking at the surrounding prefixes, you can
tell where a prefix is located. When scanning on Datapac, keep in mind most of
the valid NUAs are found in the low numbers, so to sample a prefix go from
(example) 12300001 to 12300200. It is a good idea, however, to scan the prefix
right up until 2000, the choice is yours.

DNIC List
---------

   Here is a list of the previous PSN's DNICs, and most of the other DNICs
for PSNs world wide. This was taken from the DIS, with a number of my own
additions that were omitted(the DIS did not include other Canadian or
American PSNs). The extras DNICs came from my own experience and various
BBS lists.

COUNTRY               NETWORK          DNIC       DIRECTION
-------               -------          ----       ---------

ANDORRA               ANDORPAC         2945       BI-DIR
ANTIGUA               AGANET           3443       INCOMING
ARGENTINA             ARPAC            7220       BI-DIR
                     ARPAC            7222       BI-DIR
AUSTRIA               DATEX-P          2322       BI-DIR
                     DATEX-P TTX      2323       BI-DIR
                     RA               2329       BI-DIR
AUSTRALIA             AUSTPAC          5052       BI-DIR
                     OTC DATA ACCESS  5053       BI-DIR
AZORES                TELEPAC          2680       BI-DIR
BAHAMAS               BATELCO          3640       BI-DIR
BAHRAIN               BAHNET           4263       BI-DIR
BARBADOS              IDAS             3423       BI-DIR
BELGIUM               DCS              2062       BI-DIR
                     DCS              2068       BI-DIR
                     DCS              2069       BI-DIR
BELIZE                BTLDATAPAC       7020       BI-DIR
BERMUDA               BERMUDANET       3503       BI-DIR
BRAZIL                INTERDATA        7240       BI-DIR
                     RENPAC           7241       BI-DIR
                     RENPAC           7248       INCOMING
                     RENPAC           7249       INCOMING
BULGARIA              BULPAC           2841       BI-DIR
BURKINA FASO          BURKIPAC         6132       BI-DIR
CAMEROON              CAMPAC           6242       BI-DIR
CANADA                DATAPAC          3020       BI-DIR
                     GLOBEDAT         3025       BI-DIR
                     CNCP PACKET NET  3028       BI-DIR
                     CNCP INFO SWITCH 3029       BI-DIR
CAYMAN ISLANDS        IDAS             3463       BI-DIR
CHAD                  CHADPAC          6222       BI-DIR
CHILE                 ENTEL            7302       BI-DIR
                     CHILE-PAC        7303       INCOMING
                     VTRNET           7305       BI-DIR
                     ENTEL            7300       INCOMING
CHINA                 PTELCOM          4600       BI-DIR
COLOMBIA              COLDAPAQ         7322       BI-DIR
COSTA RICA            RACSAPAC         7120       BI-DIR
                     RACSAPAC         7122       BI-DIR
                     RACSAPAC         7128       BI-DIR
                     RACSAPAC         7129       BI-DIR
CUBA                  CUBA             2329       BI-DIR
CURACAO               DATANET-1        3621       BI-DIR
CYPRUS                CYTAPAC          2802       BI-DIR
                     CYTAPAC          2807       BI-DIR
                     CYTAPAC          2808       BI-DIR
                     CYTAPAC          2809       BI-DIR
DENMARK               DATAPAK          2382       BI-DIR
                     DATAPAK          2383       BI-DIR
DJIBOUTI              STIPAC           6382       BI-DIR
DOMINICAN REP.        UDTS-I           3701       INCOMING
EGYPT                 ARENTO           6020       BI-DIR
ESTONIA               ESTPAC           2506       BI-DIR
FIJI                  FIJIPAC          5420       BI-DIR
FINLAND               DATAPAK          2441       BI-DIR
                     DATAPAK          2442       BI-DIR
                     DIGIPAK          2443       BI-DIR
FRANCE                TRANSPAC         2080       BI-DIR
                     NTI              2081       BI-DIR
                     TRANSPAC         2089       BI-DIR
                     TRANSPAC         9330       INCOMING
                     TRANSPAC         9331       INCOMING
                     TRANSPAC         9332       INCOMING
                     TRANSPAC         9333       INCOMING
                     TRANSPAC         9334       INCOMING
                     TRANSPAC         9335       INCOMING
                     TRANSPAC         9336       INCOMING
                     TRANSPAC         9337       INCOMING
                     TRANSPAC         9338       INCOMING
                     TRANSPAC         9339       INCOMING
FR ANTILLIES          TRANSPAC         2080       BI-DIR
FR GUIANA             TRANSPAC         2080       BI-DIR
FR POLYNESIA          TOMPAC           5470       BI-DIR
GABON                 GABONPAC         6282       BI-DIR
GERMANY F.R.          DATEX-P          2624       BI-DIR
                     DATEX-C          2627       BI-DIR
GREECE                HELPAK           2022       BI-DIR
                     HELLASPAC        2023       BI-DIR
GREENLAND             KANUPAX          2901       BI-DIR
GUAM                  LSDS-RCA         5350       BI-DIR
                     PACNET           5351       BI-DIR
GUATEMALA             GUATEL           7040       INCOMING
                     GUATEL           7043       INCOMING
HONDURAS              HONDUTEL         7080       INCOMING
                     HONDUTEL         7082       BI-DIR
                     HONDUTEL         7089       BI-DIR
HONG KONG             INTELPAK         4542       BI-DIR
                     DATAPAK          4545       BI-DIR
                     INET HK          4546       BI-DIR
HUNGARY               DATEX-P          2160       BI-DIR
                     DATEX-P          2161       BI-DIR
ICELAND               ICEPAK           2740       BI-DIR
INDIA                 GPSS             4042       BI-DIR
                     RABMN            4041       BI-DIR
                     I-NET            4043       BI-DIR
INDONESIA             SKDP             5101       BI-DIR
IRELAND               EIRPAC           2721       BI-DIR
                     EIRPAC           2724       BI-DIR
ISRAEL                ISRANET          4251       BI-DIR
ITALY                 DARDO            2222       BI-DIR
                     ITAPAC           2227       BI-DIR
IVORY COAST           SYTRANPAC        6122       BI-DIR
JAMAICA               JAMINTEL         3380       INCOMING
JAPAN                 GLOBALNET        4400       BI-DIR
                     DDX              4401       BI-DIR
                     NIS-NET          4406       BI-DIR
                     VENUS-P          4408       BI-DIR
                     VENUS-P          9955       INCOMIMG
                     VENUS-C          4409       BI-DIR
                     NI+CI            4410       BI-DIR
KENYA                 KENPAC           6390       BI-DIR
KOREA REP             HINET-P          4500       BI-DIR
                     DACOM-NET        4501       BI-DIR
                     DNS              4503       BI-DIR
KUWAIT                BAHNET           4263       BI-DIR
LEBANON               SODETEL          4155       BI-DIR
LIECHTENSTEIN         TELEPAC          2284       BI-DIR
                     TELEPAC          2289       BI-DIR
LUXEMBOURG            LUXPAC           2704       BI-DIR
                     LUXPAC           2709       BI-DIR
MACAU                 MACAUPAC         4550       BI-DIR
MADAGASCAR            INFOPAC          6460       BI-DIR
MADEIRA               TELEPAC          2680       BI-DIR
MALAYSIA              MAYPAC           5021       BI-DIR
MAURITIUS             MAURIDATA        6170       BI-DIR
MEXICO                TELEPAC          3340       BI-DIR
MOROCCO               MOROCCO          6040       BI-DIR
MOZAMBIQUE            COMPAC           6435       BI-DIR
NETHERLANDS           DATANET-1        2040       BI-DIR
                     DATANET-1        2041       BI-DIR
                     DABAS            2044       BI-DIR
                     DATANET-1        2049       BI-DIR
N. MARIANAS           PACNET           5351       BI-DIR
NEW CALEDONIA         TOMPAC           5460       BI-DIR
NEW ZEALAND           PACNET           5301       BI-DIR
NIGER                 NIGERPAC         6142       BI-DIR
NORWAY                DATAPAC TTX      2421       BI-DIR
                     DATAPAK          2422       BI-DIR
                     DATAPAC          2423       BI-DIR
PAKISTAN              PSDS             4100       BI-DIR
PANAMA                INTELPAQ         7141       BI-DIR
                     INTELPAQ         7142       BI-DIR
PAPUA-NEW GUINEA      PANGPAC          5053       BI-DIR
PARAGUAY              ANTELPAC         7447       BI-DIR
PERU                  DICOTEL          7160       BI-DIR
PHILIPPINES           CAPWIRE          5150       INCOMING
                     CAPWIRE          5151       BI-DIR
                     PGC              5152       BI-DIR
                     GLOBENET         5154       BI-DIR
                     ETPI             5156       BI-DIR
POLAND                POLAK            2601       BI-DIR
PORTUGAL              TELEPAC          2680       BI-DIR
                     SABD             2682       BI-DIR
PUERTO RICO           UDTS             3300       BI-DIR
                     UDTS             3301       BI-DIR
QATAR                 DOHPAC           4271       BI-DIR
REUNION (FR)          TRANSPAC         2080       BI-DIR
RWANDA                RWANDA           6352       BI-DIR
SAN MARINO            X-NET            2922       BI-DIR
SAUDI ARABIA          ALWASEED         4201       BI-DIR
SENEGAL               SENPAC           6081       BI-DIR
SEYCHELLES            INFOLINK         6331       BI-DIR
SINGAPORE             TELEPAC          5252       BI-DIR
                     TELEPAC          5258       BI-DIR
SOLOMON ISLANDS       DATANET          5400       BI-DIR
SOUTH AFRICA          SAPONET          6550       BI-DIR
                     SAPONET          6551       BI-DIR
                     SAPONET          6559       BI-DIR
SPAIN                 TIDA             2141       BI-DIR
                     IBERPAC          2145       BI-DIR
SRI-LANKA             DATANET          4132       BI-DIR
SWEDEN                DATAPAK TTX      2401       BI-DIR
                     DATAPAK-2        2403       BI-DIR
                     DATAPAK-2        2407       BI-DIR
SWITZERLAND           TELEPAC          2284       BI-DIR
                     TELEPAC          2285       BI-DIR
                     TELEPAC          2289       BI-DIR
TAIWAN                PACNET           4872       BI-DIR
                     PACNET           4873       BI-DIR
                     UDAS             4877       BI-DIR
TCHECOSLOVAKA         DATEX-P          2301       BI-DIR
THAILAND              THAIPAC          5200       BI-DIR
                     IDAR             5201       BI-DIR
TONGA                 DATAPAK          5390       BI-DIR
TOGOLESE REP.         TOGOPAC          6152       BI-DIR
TORTOLA               IDAS             3483       INCOMING
TRINIDAD              DATANETT         3745       BI-DIR
                     TEXTET           3740       BI-DIR
TUNISIA               RED25            6050       BI-DIR
TURKEY                TURPAC           2862       BI-DIR
                     TURPAC           2863       BI-DIR
TURKS&CAICOS          IDAS             3763       INCOMING
U ARAB EMIRATES       EMDAN            4241       BI-DIR
                     EMDAN            4243       BI-DIR
                     TEDAS            4310       INCOMING
URUGUAY               URUPAC           7482       BI-DIR
                     URUPAC           7489       BI-DIR
USSR                  IASNET           2502       BI-DIR
U.S.A.                WESTERN UNION    3101       BI-DIR
                     MCI              3102       BI-DIR
                     ITT/UDTS         3103       BI-DIR
                     WUI              3104       BI-DIR
                     BT-TYMNET        3106       BI-DIR
                     SPRINTNET        3110       BI-DIR
                     RCA              3113       BI-DIR
                     WESTERN UNION    3114       BI-DIR
                     DATAPAK          3119       BI-DIR
                     PSTS             3124       BI-DIR
                     UNINET           3125       BI-DIR
                     ADP AUTONET      3126       BI-DIR
                     COMPUSERVE       3132       BI-DIR
                     AT&T ACCUNET     3134       BI-DIR
                     FEDEX            3138       BI-DIR
                     NET EXPRESS      3139       BI-DIR
                     SNET             3140       BI-DIR
                     BELL SOUTH       3142       BI-DIR
                     BELL SOUTH       3143       BI-DIR
                     NYNEX            3144       BI-DIR
                     PACIFIC BELL     3145       BI-DIR
                     SWEST BELL       3146       BI-DIR
                     U.S. WEST        3147       BI-DIR
                     CENTEL           3148       BI-DIR
                     FEDEX            3150       BI-DIR
U.S. VIRGIN I         UDTS             3320       BI-DIR
U. KINGDOM            IPSS-BTI         2341       BI-DIR
                     PSS-BT           2342       BI-DIR
                     GNS-BT           2343       BI-DIR
                     MERCURY          2350       BI-DIR
                     MERCURY          2351       BI-DIR
                     HULL             2352       BI-DIR
VANUATU               VIAPAC           5410       BI-DIR
VENEZUELA             VENEXPAQ         7342       BI-DIR
YUGOSLAVIA            YUGOPAC          2201       BI-DIR
ZIMBABWE              ZIMNET           6484       BI-DIR


SYSTEM PENETRATION
==================
------------------

   Ok, now that you've hopefully found some systems, you are going to need to
know how to identify and, with any luck, get in these newfound delights.
   What follows is a list of as many common systems as i could find. The
accounts listed along with it are not, per say, 'defaults'. There are very
few actual defaults. These are 'common accounts', in that it is likely that
many of these will be present. So, try them all, you might get lucky.
   The list of common accounts will never be complete, but mine is fairly
close. I've hacked into an incredible amount of systems, and because of this
I've been able to gather a fairly extensive list of common accounts.
   Where I left the password space blank, just try the username(and anything
else you want), as there are no common passwords other than the username
itself.
   And also, in the password space I never included the username as a
password, as it is a given in every case that you will try it.
   And remember, passwords given are just guidelines, try what you want.

UNIX-            Unix is one of the most widespread Operating Systems in the
                world; if you scan a PSN, chances are you'll find a number of
                Unixes, doesn't matter where in the world the PSN resides.
                The default login prompt for a unix system is 'login', and
                while that cannot be changed, additional characters might
                be added to preface 'login', such as 'rsflogin:'. Hit <CR> a
                few times and it should disappear.
                Because UNIX is a non-proprietary software, there are many
                variants of it, such as Xenix, SCO, SunOS, BSD, etc.., but
                the OS stays pretty much the same.
                As a rule, usernames are in lowercase only, as are passwords,
                but Unix is case sensitive so you might want to experiment if
                you aren't getting any luck.
                You are generally allowed 4 attempts at a login/password, but
                this can be increased or decreased at the sysadmins whim.
                Unfortunely, UNIX does not let you know when the username
                you have entered is incorrect.
                UNIX informs the user of when the last bad login attempt was
                made, but nothing more. However, the sysadmin can keep logs
                and audit trails if he so wishes, so watch out.
                When inside a UNIX, type 'cat /etc/passwd'. This will give
                you the list of usernames, and the encrypted passwords.
                The command 'who' gives a list of users online.
                'Learn' and 'man' bring up help facilities.
                Once inside, you will standardly receive the prompt $ or %
                for regular users, or # for superusers.
                The root account is the superuser, and thus the password
                could be anything, and is probably well protected. I left
                this blank, it is up to you. There won't be any common
                passwords for root.

                COMMON ACCOUNTS:

                Username          Password
                --------          --------
                root
                daemon
                adm               admin, sysadm, sysadmin, operator, manager
                uucp
                bin
                sys
                123               lotus, lotus123
                adduser
                admin             adm,sysadm,sysadmin,operator,manager
                anon              anonymous
                anonuucp          anon, uucp, nuucp
                anonymous         anon
                asg               device devadmin
                audit
                auth
                backappl
                backup            save, tar
                batch
                bbx
                blast
                bupsched
                cbm
                cbmtest
                checkfsys
                control
                cron
                csr               support, custsup
                dbcat             database, catalog
                default           user, guest
                demo              tour, guest
                dev
                devel
                devshp
                diag              sysdiag, sysdiags, diags, test
                diags             diag, sysdiag, sysdiags
                dialup
                dos
                fax
                field             fld, service, support, test
                filepro
                finger
                fms
                friend            guest, visitor
                games
                general
                gp
                gsa
                guest             visitor, demo, friend, tour
                help
                host
                hpdb
                info
                informix          database
                ingres            database
                inquiry
                install
                journal
                journals
                kcml
                learn
                lib               library, syslib
                link
                listen
                lp                print spooler lpadmin
                lpadmin           lp, adm, admin
                lpd
                ls
                mail
                maint             sysmaint, service
                makefsys
                man
                manager           mgr, man, sysmgr, sysman, operator
                mdf
                menu
                mountfsys
                ncrm              ncr
                net               network
                netinst           inst, install, net, network
                netman            net, man, manager, mgr, netmgr, network
                netmgr            net, man, manager, mgr, netmgr, network
                network           net
                newconv
                news
                nobody            anon
                nuucp             anon
                oasys             oa
                odt               opendesktop
                online
                openmail          mail
                oper              operator,manager,adm,admin,sysadmin,mgr
                operator          sysop, oper, manager
                opp
                oracle            database
                oraclev5          oracle, database
                oradev            oracle
                pcs
                pcsloc
                pctest
                postmaster        mail
                powerdown         shutdown
                priv              private
                prod
                pub               public
                public            pub
                reboot
                remote
                report
                rha
                rje
                rsm
                rsmadm            rsm, adm, admin
                rusr
                sales
                sas
                save              backup
                savep
                service           field, support
                setup
                shutdown
                smtp              mail
                softwork
                space
                startup
                su
                sundiag           sysdiag, diag, diags, sysdiags
                suoper            su, oper, operator
                super             supervisor, manager, operator
                support           field, service
                sync
                sysadm            adm, admin, operator, manager
                sysdiag           diag, diags, sysdiags
                sysinfo           info
                sysmaint          maint, service
                sysman            manager,mgr,man,admin,operator,sysadmin
                sysmgr            manager,mgr,man,admin,operator,sysadmin
                system            sys, unix, shell, syslib, lib, operator
                systest           test, tester, testuser, user
                test              tester, testuser, systest, user
                tester            test, user, testuser
                testuser          test, tester, user, systest
                tftp
                tour              demo, guest, user, visitor
                transfer
                tty
                tutor
                tutorial
                umountfsys
                unix
                unixmail          mail, unix
                user              guest, demo
                userp             user
                usr               user
                usrlimit
                utest
                uucpadm           adm, admin, uucp
                uuadm             uucp, adm
                uuadmin           uucp, admin
                uuhost            uucp, host
                uulog             uucp, log
                uunx              uucp
                uupick            uucp, pick
                uustat            uucp, stat
                uuto              uucp, to
                uux               uucp
                va
                vashell
                vax
                visitor           guest, friend, demo, tour
                vlsi
                vmsys             vm, face
                vsifax
                who
                wp
                wp51
                x25               pad
                x25test           test
                x400

VMS-             DEC's Virtual Memory System commonly runs on VAX computers.
                It is another very widespread system, with many users world
                wide.
                VMS will have a 'Username:' prompt, and to be sure just type
                in a ',' for a username. A VMS will throw back an error
                message on special delimeters.
                You will standardly get 3 and only three login attempts, and
                VMS is not kind enough to let you know when you have entered
                an incorrect username.
                Once inside you will find yourself at a $ prompt.

                COMMON ACCOUNTS:

                Username            Password
                --------            --------
                backup
                batch
                dcl
                dec
                decmail             mail
                decnet
                default             default, user
                dialup
                demo                guest
                dsmmanager          dsm, manager
                dsmuser             dsm, user
                field               field, service, support, test, digital
                games
                guest               visitor, demo
                help
                helpdesk
                help_desk           helpdesk
                host
                info
                ingres              database
                interactive
                link
                local
                mail
                mailer              mail
                mbmanager           mb, manager, mgr, man
                mbwatch             watch, mb
                mpdbadmin           mpdb, admin
                netcon              net, network
                netmgr              net, manager, mgr, operator
                netpriv             network, private, priv, net
                netserver
                network             net
                newingres           ingres
                news
                operations          operations
                operator            oper, manager, mgr, admin,
                opervax             operator, vax
                ops
                oracle
                pcsdba
                pfmuser             pfm, user
                postmaster          mail
                priv                private
                remote
                report
                rje                 remote, job, entry
                student
                suggest             suggest
                sys
                sysmaint            sysmaint, maint, service, digital
                system              manager,operator,sys,syslib
                systest             uetp,test
                systest_clig        systest, test
                tapelib
                teledemo            demo
                test                testuser, tester
                uetp
                user                test, guest, demo
                userp               user
                vax
                vms
                visitor             guest, demo
                wpusers

HP3000-          HP3000 mainframes run the MPE series of operating systems,
                such as MPE, V, ix, X, and XL.
                The default login prompt is ':', but this can be prefaced
                with characters(ie: 'mentor:') and in some cases the ':' may
                be taken completely away (ie: 'mentor'). To check for a
                HP3000, hit a <CR>, you will get an error message such as this;
                EXPECTED HELLO, :JOB, :DATA, OR (CMD) AS LOGON.  (CIERR 1402)
                To login type 'hello', followed by the login information,
                which is in this format:   USER.ACCOUNT,GROUP.
                The group is optional, but may be needed in some cases, and
                can give you different file sets and the sort.
                A great thing about HP3000's is they tell you exactly what
                is incorrect about the login name you've supplied them,
                be it the account is valid but the username is wrong, or the
                other way around.
                But unfortunely, if the system operators choose, they may
                password ALL of the login name segments; username, account
                and group.
                The internal prompt for MPE's is, again, :.
                'Help' will give you help when inside a HP3000.
                When entering accounts, i'd suggest not to use a group at
                first. If you receive the error message 'not in home group',
                then try the group PUB, then if even that fails, move on to
                the common group list.
                I didn't list passwords along with the accounts, as it would
                be a bit of an awkward format, because of MPE's awkward
                format. The only manufacturer default passwords I am aware
                of are 'hponly', for mgr.telesup, 'lotus', for mgr.sys, and
                'hpword' for field.support.
                Just remember to try the various parts of the account as a
                password, and anything else along those lines.
                If you need a password for the following user.accounts &
                groups, try the various parts of the name plus any
                combinations of it or names with obvious links to it(ie:
                field=service).

                COMMON ACCOUNTS:

                Username.Account
                ----------------
                mgr.3000devs
                mgr.acct
                mgr.backup
                manager.blast
                manager.blast1
                mgr.ccc
                spool.ccc
                mgr.cnas
                manager.cognos
                mgr.cognos
                operator.cognos
                mgr.common
                mgr.company
                mgr.conv
                mgr.corp
                mgr.cslxl
                mgr.demo
                operator.disc
                mgr.easy
                mgr.easydev
                mgr.extend
                mgr.hpdesk
                mgr.hplanmgr
                field.hpncs
                mgr.hpncs
                advmail.hpoffice
                deskmon.hpoffice
                mail.hpoffice
                mailman.hpoffice
                mailroom.hpoffice
                mailtrck.hpoffice
                manager.hpoffice
                mgr.hpoffice
                openmail.hpoffice
                pcuser.hpoffice
                spoolman.hpoffice
                x400fer.hpoffice
                x400xfer.hpoffice
                wp.hpoffice
                mgr.hponly
                mgr.hpoptmgt
                field.hpp187
                mgr.hpp187
                mgr.hpp189
                mgr.hpp196
                mgr.hppl85
                mgr.hppl87
                mgr.hppl89
                mgr.hppl96
                mgr.hpskts
                mgr.hpspool
                mgr.hpword
                mgr.hpx11
                dpcont.hq
                mgr.hq
                mgr.indhpe
                mgr.infosys
                mgr.intx3
                manager.itf3000
                mail.mail
                mgr.netbase
                mgr.netware
                operator.netware
                mgr.orbit
                mgr.prod
                mgr.rego
                mgr.remacct
                mgr.rje
                manager.security
                mgr.security
                mgr.sldemo
                mgr.snads
                mgr.softrep
                mgr.speedwre
                mgr.spool
                manager.starbase
                field.support
                mgr.support
                operator.support
                exploit.sys
                manager.sys
                mgr.sys
                operator.sys
                pcuser.sys
                rsbcmon.sys
                operator.syslib
                sysrpt.syslib
                mgr.sysmgr
                operator.system
                mgr.tech
                mgr.techxl
                mgr.telamon
                field.hpword
                mgr.opt
                manager.tch
                field.telesup
                mgr.telesup
                sys.telesup
                mgr.tellx
                monitor.tellx
                mgr.utility
                mgr.vecsl
                manager.vesoft
                mgr.vesoft
                mgr.word
                field.xlserver
                mgr.xlserver
                mgr.xpress

                COMMON GROUPS:

                admin
                advmail
                ask
                brwexec
                brwonlne
                brwspec
                bspadmin
                bspdata
                bspinstx
                bsptools
                catbin1
                catbin2
                catlib
                classes
                config
                console
                convert
                creator
                curator
                currarc
                current
                dat
                data
                database
                delivery
                deskmon
                devices
                diadb
                diag
                diafile
                diaipc
                doc
                docxl
                document
                dsg
                easy
                ems
                emskit
                etdaemon
                example
                examples
                ezchart
                galpics
                graphics
                hold
                hpaccss
                hpadvlk
                hpadvml
                hpdesk
                hpdraw
                hpecm
                hpemm
                hpenv
                hpgal
                hphpbkp
                hplibry
                hplist
                hplt123
                hpmail
                hpmap
                hpmenu
                hpprofs
                hpsw
                hptelex
                ibmpam
                idl
                idlc
                idpxl
                include
                infoxl
                instx
                internal
                itpxl
                job
                lib
                libipc
                library
                mailconf
                maildb
                mailhelp
                mailjob
                maillib
                mailserv
                mailstat
                mailtell
                mailxeq
                mediamgr
                memo
                memory
                mgr
                mmgrdata
                mmgrxfer
                mmordata
                mmorxfer
                monitor
                mpexl
                ndfiles
                ndports
                net
                network
                nwoconf
                office
                oldmail
                oper
                operator
                out
                pascalc
                patchxl
                pcbkp
                ppcdict
                ppcsave
                ppcutil
                prntmate
                prog
                prvxl
                pub
                pubxl
                qedit
                ref
                request
                restore
                sample
                sbase
                sfiles
                signal
                sleeper
                snax25
                sql
                sruntime
                subfile
                suprvisr
                sx
                sys
                sysmgr
                sysvol
                tdpdata
                telex
                telexjob
                text
                tfm
                ti
                tools
                transmit
                user
                users
                validate
                viewlib
                visicalc
                wp
                wp3
                x400data
                x400db
                x400fer
                x400file
                xspool

VM/CMS-          The VM/CMS Operating System is found on IBM mainframes, and
                while there are quite a few out there, they are commonly left
                alone by hackers who prefer Unix or VMS.
                VM/CMS systems are commonly found gated off Sim3278 VTAMs and
                ISM systems as well.
                The login prompt for CMS is '.', but additional information
                might be given before the prompt, such as;
                     Virtual Machine/System Product
                     !
                     .
                or;
                     VM/370
                     !
                     .
                and frequently over to the side;
                     LOGON userid
                     DIAL userid
                     MSG userid message
                     LOGOFF
                but they all represent a VM/CMS system.
                To logon, type 'logon' followed by the username, which is
                usually 1 to 8 characters in length.
                To be sure it is a CMS, type 'logon' followed by some random
                garbage. If it is a VM/CMS, it will reply;
                      Userid not in CP directory
                This is one of the great things about CMS, it tells you if
                the login ID you entered is incorrect, thus making the
                finding of valid ones fairly easy.
                One thing to watch out for.. if you attempt brute forcing
                some systems will simply shut the account or even the login
                facility for some time. If that is the case, find out the
                limit and stay just underneath it.. drop carrier or clear the
                circuit if necessary, but if you continually shut down the
                login facilities you will raise a few eyebrows before you
                even make it inside.
                Once inside, typing 'help' will get you a moderate online
                manual.

                COMMON ACCOUNTS

                Username         Password
                --------         --------
                $aloc$
                admin            operator, manager, adm, sysadmin, sysadm
                alertvm          alert
                ap2svp
                apl2pp
                autolog1         autolog
                autolog2         autolog
                batch
                batch1           batch
                batch2           batch
                botinstl
                ccc
                cms
                cmsbatch         cms, batch, batch1
                cmsuser          cms, user
                cpms
                cpnuc
                cprm
                cspuser          user, csp
                cview
                datamove
                demo1            demo
                demo2            demo
                direct
                dirmaint         dirmaint1
                diskcnt
                entty
                erep
                formplus
                fsfadmin         fsf, adm, sysadmin, sysadm, admin, fsfadm
                fsftask1
                fsftask2
                gcs
                gcsrecon
                idms
                idmsse
                iips
                infm-mgr         infm, man, manager, mgr
                inoutmgr         mgr, manager
                ipfappl
                ipfserv
                ispvm
                ivpm1
                ivpm2
                maildel
                mailman
                maint            service
                moeserv
                netview          network, view, net, monitor
                oltsep
                op1
                opbackup         backup
                operatns         op, operator, manager, admin
                operator         op, operatns, manager, admin
                opserver
                pdm470
                pdmremi
                peng
                presdbm          dbm
                procal
                prodbm           prod
                promail
                psfmaint         maint
                pssnews          news
                pvm
                router
                rscs
                rscsv2
                savsys
                sfcm1            sfcm
                sfcntrl
                sim3278
                smart
                sna
                sqldba           database
                sqluser          user, sql
                syncrony
                sysadmin         admin, adm, sysadm, manager, operator
                sysckp
                sysdump1         sysdump
                syserr
                syswrm
                tdisk            disk, temp
                temp
                tsafvm
                vastest          test
                vm3812
                vmarch
                vmasmon
                vmassys
                vmbackup         backup
                vmbsysad
                vmmap            map
                vmtape           tape
                vmtest           test, testuser
                vmtlibr
                vmutil           util, utils
                vseipo
                vsemaint         maint
                vseman
                vsm
                vtam
                vtamuser         user, vtam
                x400x25

PRIMOS-          Run on the Prime company's mainframes, the Primos Operating
                System is in fairly wide use, and is commonly found on
                Packet-Switched Networks worldwide.
                Upon connect you will get a header somewhat like
                     PRIMENET 23.3.0 INTENG
                This informs you that it is indeed a Primos computer, the
                version number, and the system identifier the owner picked,
                which is usually the company name or the city the Primos is
                located in. If you find a Primos on a network, you will
                receive the Primenet header, but if it is outside of a
                network, the header may be different(ie:Primecon).
                Hit a number of <CR>'s, and Primos will throw you the login
                prompt 'ER!'.
                At this point, type 'login' followed by your
                username.
                If hitting <CR>'s did not provoke an 'ER!', then type 'login'
                followed by your username.
                If you are blessed and you find some stone age company
                running 18.0.0 or below, you are guaranteed access.
                Just find a username and there will be no password prompt.
                If for some reason passwording exists, a a few control-C's
                should drop you in.
                Unfortunely, Primos almost always allows one and one attempt
                only at a username/password combination before it kicks you
                off, and Primos will not tell you if the ID you've entered is
                invalid.
                Once you are inside, you will find yourself at the prompt
                'OK'.
                'help' brings up a so-so online help guide.

                COMMON ACCOUNTS

                Username           Password
                --------           --------
                backup
                backup_terminal
                batch_service
                batch
                bootrun
                cmdnc0
                demo
                diag
                dos
                dsmsr              dsm
                dsm_logger         dsm
                fam
                games
                guest
                guest1             guest
                lib
                libraries
                login_server
                mail
                mailer
                netlink            net, primenet
                netman             manager, man, mgr, netmgr
                network_mgt        netmgt
                network_server     server
                prime              primos, system
                primenet           net, netlink
                primos             prime, system
                primos_cs          primos, prime, system
                regist
                rje
                spool
                spoolbin           spool
                syscol
                sysovl
                system             prime, primos, sys1, operator
                system_debug
                system_manager
                tcpip_manager
                tele
                test
                timer_progress
                tools

TOPS-10/20-      An older and somewhat rare operating system, TOPS-10 ran on
                the DEC-10/20 machines. You can usually recognize a TOPS-10 by
                its' prompt, a lone period '.', while a TOPS-20 will have a
                '@' in its place. Most systems allow you to enter the commands
                'SYSTAT' or 'FINGER' from the login prompt, before logging in.
                This command will let you see the users online, a valuable aide
                in hacking.
                To login, type 'login xxx,yyy', where the x and y's are
                digits.
                TOPS-10 does let you know when your username is incorrect.

                COMMON ACCOUNTS

                User ID Code       Password
                ------------       --------
                1,2                OPERATOR, MANAGER, ADMIN, SYSLIB, LIB
                2,7                MAINT, MAINTAIN, SYSMAINT
                5,30               GAMES

IRIS-            Unfortunely, i have no experience with IRIS whatsoever. To
                this day i haven't even seen one. So with regret i must
                present old material, the following info comes entirely from
                the LOD/H Technical Journal #3. Hopefully it will still be
                applicable.
                The IRIS Operating System used to run soley on PDP systems,
                but now runs on many various machines.
                IRIS will commonly present itself with a herald such as;
                   "Welcome to IRIS R9.1.4 timesharing"
                And then an "ACCOUNT ID?" prompt.
                IRIS is kind enough to tell you when you enter an incorrect
                ID, it won't kick you off after too many attempts, and no
                logs are kept. And strangely enough, passwords are not used!
                So if you can find yourself an IRIS OS, try the following
                defaults and you should drop in..

                COMMON ACCOUNTS

                Username
                --------
                accounting
                boss
                demo
                manager
                noname
                pdp8
                pdp11
                software
                tcl

NOS-             The NOS(Network Operating System) is found on Cyber
                mainframes made by CDC(the Control Data Corporation).
                Cyber machines are commonly run by institutions such as
                universities and atomic research facilities.
                Cybers will usually give a herald of some sort, such as
                   Sheridan Park Cyber 180-830 Computer System
                               or
                   Sacremento Cyber 180-830 CSUS NOS Software System
                The first login prompt will be 'FAMILY:', just hit <CR>.
                The next prompt is 'USER NAME:'. This is more difficult,
                usually 7 characters. The password is even worse,
                commonly 7 random letters. Sound bad? It is. Brute forcing
                an account is next to impossible.
                I've never seen these defaults work, but they are better than
                nothing. I got them out of the LOD/H Novice's Guide to
                Hacking, written by the Mentor. There are no known passwords
                for these usernames.

                COMMON ACCOUNTS

                Username
                --------
                $SYSTEM
                SYSTEMV

DECSERVER-       The Decserver, is as the name implies, a server made by the
                Digital Equipment Corporation, the same company that makes
                the VAX machines.
                It is possible the owner of the server put a password on it,
                if this is the case you will hit a # prompt. If the server
                has PADs or outdials on it, you can bet this is the case.
                You don't need a username, just the password. You will
                commonly get 3 tries, but it can be modified.
                The default password is 'access', but other good things to
                try are ; server, dec, network, net, system (and whatever
                else goes along with that).
                If you get past the #, or there isn't one, you will hit the
                prompt 'Enter Username>'. What you put really doesn't matter,
                it is just an identifier. Put something normal sounding, and
                not your hacker alias. It is actually interesting to look at
                the users online at a Decserver, as commonly there will be a few users
                with the username C or CCC or the like, usually meaning
                they are probably a fellow hacker.
                Also, at the Enter Username> prompt you are able to ask for
                help with the 'help' command, which spews out fairly lengthly
                logon help file.
                If all went well you should end up at a 'Local>' prompt.
                Decservers have a fairly nice set of help files, simply type
                'help' and read all you want.
                It is a good idea to do a 'show users' when you first logon,
                and next do a 'show services' and 'show nodes'. The services
                are computers hooked up to the Decserver, which you can
                access. For obvious reasons you will often find many VAX/VMS
                systems on Decservers, but pretty much anything can be found
                Look for services titled Dial, Modem, PAD, X25,
                Network, or anthing like that. Try pretty much everything
                you see. Remember to try the usernames you see when you do
                a 'show users' as users for the systems online.
                Also, you will sometimes find your Decserver has Internet
                (Telnet, SLIP or FTP) access, make sure you make full use of
                this.
                To connect to the services you see, use 'c XXXX', where the
                X's represent the service name.
                Once inside, the manufacturer's default for privs is 'system'
                and it is rarely changed.
                The maintenance password changes from version to version.
                With the Decserver 200 & 500 it is 0000000000000000 (16 0's),
                but with 300 it is simply 0.

GS/1-            GS/1's are another server type system, but they are less
                common than the Decservers. The default prompt is 'GS/1>',
                but this can be changed to the sysadmins liking.
                To check for a GS/1, do a 'sh d', which will print out some
                statistics.
                To find what systems are available from the server, type
                'sh n' or a 'sh c', and a 'sh m' for the system macros.

XMUX-            The XMUX is a multiplexing system that provides remote
                access, made by Gandalf Technologies, Inc., Gandalf of Canada
                Ltd. in Canada. As far as I can tell, the XMUX is used only on
                Packet-Switched Networks, Datapac in particular but with usage
                on PSNs world wide.
                The XMUX is not usually thought of as a stand alone system,
                but as a supportive system for multi-user networked systems,
                having a bit to do with system monitoring, channel control,
                and some of the features of multiplexing.
                Thus, you'll commonly find a XMUX on a mnemonic or a
                subaddress of another system, although you will find them
                alone on their own NUA frequently as well.
                To find the systems on a subaddress or a mnemonic, your best
                bet is to go with mnemonics, as the LOGGER mnemonic cannot be
                removed, while subaddressing is optional.
                You won't always want to check every single system, so i'll
                give a guideline of where to check;
                (REMINDER: this is only for systems on PSNs, and may not
                 apply to your PSN)

                   - PACX/         : The PACX/Starmaster is also made by
                     Starmaster      Gandalf, and the two are tightly
                     Systems         interwoven. If mnemonics don't work, be
                                     sure to try LCNs, as the CONSOLE on a
                                     PACX/Starmaster is an entirely different
                                     thing, and frequently using the mnemonic
                                     CONSOLE will bring you to the PACX
                                     console, not the XMUX console.
                   - BBS Systems   : BBS Systems on PSNs frequently need some
                                     help, and XMUXs are fairly commonly
                                     found with them.
                   - Other misc.   : Many of the other operating systems,
                     systems         such as Unix, AOS/VS, Pick and HP3000
                                     have the occasional XMUX along with it.
                   - Networked     : A good portion of networked systems have
                     systems         XMUXs.

                If a system does have a XMUX also, you can reach it almost
                always by the mnemonic CONSOLE, and if not, the node name of
                the XMUX. If that doesn't work, try LCNs up to and including
                15.
                Occasionally the console of the XMUX will be unpassworded, in
                which case you will drop straight into the console. The XMUX
                console is self-explanatory and menued, so i will leave you
                to explore it.
                However, in all likeliness you will find yourself at the
                password prompt, 'Password >'. This can not be modified, but
                a one-line herald may be put above it.
                To check for a XMUX, simply hit <CR>. It will tell you that
                the password was invalid, and it must be 1 to 8 alphanumeric
                characters.
                As you can see, you do not need a username for the remote
                console of a XMUX. UIDs are used, but internally within the
                workstation.
                As it says, the password format is 1 to 8 alphanumeric
                characters. There is no default password, the console is left
                unprotected unless the owner decides to password it.
                However, there are common passwords. They are;
                   console, gandalf, xmux, system, password, sys, mux xmux1
                I'll repeat them in the common passwords again later.
                But these will not always work, as it is up to the owner to
                pick the password(although they do like those).
                Your next best bet is to find out the node name of the XMUX
                (XMUXs are polling systems as well, usually hooked up somehow
                to one of the regional hubs).
                To do this, you must understand the parts of the XMUX.
                The XMUX has 4 default parts; the CONSOLE, the FOX, the
                LOGGER, and the MACHINE.
                I'll try and define the usage of them a bit more;
                CONSOLE- the main remote part of the XMUX, which performs all
                         the maintenance functions and system maintenance.
                         the actual system.
                         reachable usually on the LCN(subaddress) of 0 or
                         4/5, and the default mnemonic CONSOLE, which can be
                         changed.
                FOX    - a test system, which runs through never ending lines
                         of the alphabet and digits 0-9.
                         reachable on the LCN of 1, mnemonic FOX.
                LOGGER - a device which displays log information, usually
                         one or two lines, including the node name.
                         reachable on the LCN of 2, mnemonic LOGGER.
                MACHINE- a system which i do not yet understand fully.
                         performs some interesting functions.
                         the prompt is '#'.
                         type 'S' and you will(always) receive a short/long
                         (depending on how much the system is used) system
                         status report, containing among other things the
                         system node name.
                         if active, typing 'L' will bring up a more complete
                         system log. This is VERY useful. It contains the
                         NUAs of the systems which called the XMUX, and it
                         contains the UIDs if used.
                As you can see, the XMUX is rather complicated upon
                first look, but it is actually fairly simple. The easiest
                way to grab the node name is to call the LOGGER.
                The logger MUST be present, always. It is a non-removable
                default. The LCN may be removed, but the mnemonic must stay.
                I explained mnemonics earlier, but i'll refresh your memory.
                To use the mnemonic, simply type the NUA, followed by a comma
                and then the mnemonic, ie;
                               12300456,LOGGER
                The very first thing in the data string you see is the node
                name. If it is a blank space, you have run across a rarity,
                a XMUX without a node name.
                The node name is THE most popular thing other than the other
                common passwords.
                Try combinations of it, and combinations of it along with
                the words XMUX and MUX.
                And of course, if a herald is used, use whatever you can find
                in the herald.
                But again, if it is a company, they love to use the company
                name or acronym as a password, and that acronym or name will
                often be the node name.
                Ok, have fun..

                COMMON ACCOUNTS

                Console Passwords
                -----------------
                CONSOLE
                XMUX
                GANDALF
                SYSTEM
                PASSWORD
                MUX
                XMUX1
                SYS
                (node name)

                One other thing. I did not include the profile or remote
                profile names, or the UIDs, as they are as far as i know
                inapplicable from remote.
                And a final comment. XMUXs are powerful and potentially
                extremely harmful to a network. DO NOT DELETE ANYTHING. The
                only submenus you will have reason to access are 'DEFINE' and
                'DISPLAY'. Don't boot people off channels or add console
                passwording or remove profiles..you will end up with your ass
                in jail. Taking down a network is less than funny to the
                people that run it. Explore, don't harm.

STARMASTER-      The Starmaster/PACX 2000 is still a somewhat mysterious
/PACX            system, but i have now explored all the security barriers as
                well as the network and the internal functions, so i feel
                this is fairly complete.
                The Starmaster/PACX system is a networking/server system made
                by, again, Gandalf Technologies Inc., Gandalf of Canada Ltd.,
                in Canada, and is also known informally (and some what
                incorrectly) as the 'Gandalf Access Server.' The Access is
                similar, but different, as described later.
                It is a fairly popular system on Datapac, and has some usage
                in other regions of the world. Again, it is used mainly
                on Packet-Switched Networks, although, thanks to the dialing
                directory of a Sam24V outdial on a Starmaster, I have
                discovered that Starmasters do indeed have dialin access.
                The first possible security barrier is the dialin password,
                which is rarely used, but you should know about.
                The prompt is usually ;
                   DIALIN PASSWORD?
                But can be changed, although it should remain similar.
                Dialin passwords are 1 to 8 characters, and are usually
                one of the following defaults;
                   GANDALF SERVER PACX NET NETWORK STARMAST DIALIN PASSWORD
                   ACCESS
                If the Starmaster has a XMUX resident(explained in previous
                system definition; XMUXs), find out the node name and try it.
                The next possible security barrier is that the sysadmin
                desires the users to enter a username/password before
                entering the server.
                You will find yourself at a prompt such as;
                   USERNAME?
                This is the most common prompt.
                Usernames are 1 to 8 characters, and the Starmaster will let
                you know if it is wrong or not with an error message such as;
                   INCORRECT USERNAME
                        or
                   INVALID RESPONSE
                This, like the username prompt, can be changed, but it will
                usually be in all-caps.
                You are allowed between 1 and 10 attempts at either a valid
                username or a valid password, depending on the owners
                preference.
                This means(if it is set to ten tries) you can enter 9 invalid
                usernames, and on the tenth enter a valid username, then have
                10 attempts at a valid password.
                The defaults for this(which i will list later also) prompt
                are;    TEST, TESTUSER, TESTER, GANDALF, SYSTEM, GUEST
                        USER, HP, CONSOLE, and finally OPERATOR.
                Also, first names will work usually.
                The next prompt you will face, or the first one if usernames
                are not implemented, is the server prompt. This is the main
                user prompt for a Starmaster, all major user commands are
                used from here.
                But as you can guess, commands aren't used really, it is
                service names you desire.
                Sometimes you will get a list upon entering the server, but
                other times you will just hit the server prompt, which
                usually looks something like;
                     SERVICE?
                        or
                      CLASS?
                        or even
                      service?
                        or
                      class?
                        or
                      service
                Or whatever the sysadmin feels like. 'SERVICE?' is the
                default, and the most common.
                Keep in mind that the services CAN be passworded, but
                rarely are. In the case of passwording, use your imagination.
                Another thing; from the PACX console, where the services are
                defined, there is an option which decides whether the service
                is allowed for remote users. If this is set to NO, then you
                are out of luck, you have to be in the workstation to use the
                command. This is common for the CONSOLE and the MAIL, and
                occasionally modems and PADs. You will get an error message
                something like 'SERVICE NOT ALLOWED'.
                I will give a more complete list of common services, but
                I will list the defaults and the major ones now.

                PAD, X25, X28-   Will commonly take you to a Gandalf PAD,
                (or name of      for which the default prompt is '*'.
                your PSN)        'HELP' will bring up a list of commands.
                MAIL         -   A non-removable default, but i've never
                                 seen it with the remote access flag in the
                                 ON position.
                CONNECT      -   Another non-removable default which i have
                                 never seen with the remote access flag in
                                 the on position.
                MODEM, DIAL  -   And variations therof. The common outdial
                                 is the Gandalf made Sam24V, which comes with
                                 a great set of help files.
                CONSOLE      -   The motherlode. The system controller,
                                 maintenance computer, test machine, and
                                 all of that. DON'T confuse the PACX console
                                 with the XMUX console, they are two very
                                 different things.
                                 The console should be protected by the
                                 sysadmin with his/her life, as every faction
                                 of the Starmaster is controlled from within
                                 the Console.
                                 The CONSOLE is a non-removable service from
                                 the server, BUT remote access can be removed
                                 thus cutting off our means of getting to it.
                                 Try it first, if it works the screen will
                                 scroll down a number of lines and give this
                                 herald/prompt;
                           GANDALF TECHNOLOGIES INCORPORATED, COPYRIGHT 1990
                           OPERATOR NAME?
                                 This is not changable, it will remain the
                                 same except for possibly the copyright date.
                                 There can be 8 operators at the most, and
                                 they will have 1 to 8 characters in their
                                 name and password. And again, the PACX will
                                 tell you if your operator name is incorrect.
                                 You will be allowed 1 to 10 attempts at the
                                 login name and then it resets to 0 for the
                                 password attempt when you've found an
                                 operator name, but same limit.
                                 The same defaults for the usernames work
                                 here, if you are lucky, with the exception
                                 of HP. I'll list them again at the end.
                                 Once you get in, it is all menued and
                                 explanatory. DON'T FUCK THINGS UP. By that
                                 I mean deleting or modifying. Look. There
                                 is MUCH to see. The PACX console is
                                 incredibly powerful, and you will have much
                                 more fun exploring it.
                                 Besides, once you are in the console, the
                                 game is over. You have control over all the
                                 services, users, and all security barriers.
                                 If you get a high level console account,
                                 you are the God of the PACX, no joke.

                COMMON ACCOUNTS

                Usernames        Passwords
                ---------        ---------
                CONSOLE          CONSOLE, PACX, GANDALF, OPERATOR, SYSTEM
                GAND             GAND
                GANDALF          GANDALF, SYSTEM, PACX, STARMAST, SYS
                GUEST            GUEST, VISITOR, USER
                HP               HP
                OPERATOR         OPERATOR, SYSTEM, SYSLIB, LIB, GANDALF
                SYSTEM           SYSTEM, SYS, OPERATOR, PACX, SYS, GANDALF
                TEST             TEST, TESTUSER, USER, TESTER
                TESTUSER         TEST, TESTUSER, USER, TESTER
                TESTER           TEST, TESTUSER, USER, TESTER
                USER             USER, GUEST, TEST, VISITOR, GANDALF
                (i've never seen an account such as MAINT, but i would guess
                 one exists, along with standard system defaults. Try
                 anything outside these lines)

                Services
                --------
                1 (if it works; higher)
                A (through Z)
                10 (if it works; higher in sequence of tens)
                BBS
                CLUSTER
                CONNECT
                CONSOLE
                DATABASE
                DATAPAC
                DEC
                DIAL
                DIALOUT
                FILES
                FTP
                GATEWAY
                GEAC
                HELP
                HP
                INTERNET
                LIB
                LIBRARY
                LOOP
                MAIL
                MENU
                MODEM
                MUX
                NET
                NETWORK
                OUT
                OUTDIAL
                PACX12
                PACX24
                PACX96
                PAD
                PRIME
                PRIMOS
                PROD
                SALES
                SERVER
                SUN
                SUNOS
                SYS
                SYSTEM
                TELNET
                TYMNET
                UNIX
                VAX
                VMS
                X25
                X28
                XCON
                XGATE
                XMUX

                And anything else you can think of.
                First names are also fairly common.

                Operator Name     Password
                -------------     --------
                TEST             TEST, TESTUSER, USER, TESTER
                TESTUSER         TEST, TESTUSER, USER, TESTER
                TESTER           TEST, TESTUSER, USER, TESTER
                GANDALF          GANDALF, SYSTEM, PACX, CONSOLE, SYS
                GUEST            GUEST, VISITOR, USER
                SYSTEM           SYSTEM, SYS, OPERATOR, PACX, SYS, GANDALF
                                 CONSOLE
                USER             USER, GUEST, TEST, VISITOR, GANDALF
                OPERATOR         OPERATOR, SYSTEM, CONSOLE, GANDALF
                CONSOLE          CONSOLE, PACX, GANDALF, OPERATOR, SYSTEM
                SYS              SYS, SYSTEM, GANDALF, PACX, CONSOLE


                And again, try first names and ANYTHING you can think of.
                Getting into the console should be your main objective.

ACCESS2590-      The Access2590 is another Gandalf creation. While it is a
                server system, it is different in some respects to a PACX.
                The Starmaster generally only connects computers on a local
                or wide area network(they do connect to X.25 & IP addresses,
                but they *usually* don't), while the Access 2590 connects
                to local & wide area network services, X.25 address, and IP
                addresses with suprising versatility. The PACX is, however,
                in much wider distribution.
                It will usually have an initial herald screen, often letting
                you know that it is indeed an Access server made by Gandalf.
                If the operator wishes he can include a menu of services
                with their respective descriptions in this provided space.
                Then you will find yourself at a prompt, the default being
                "Access 2590 >". I haven't seen any sort of initial
                protection before you hit that prompt, but i'm betting it
                does exist, and it probably goes along the lines of the PACX.
                Follow the trend I set with the PACX and you should do fine.
                Anyways, the one thing I like so much more about the Access
                2590 compared to the Starmaster is the command "show symbols"
                . That was one of the big problems from a hacking point of
                view with the PACX; it doesn't have a command available to
                show you the services. If you get console access on the PACX
                you can get a listing of services that way, but you simply
                cannot hack a console account everytime, and besides that
                often the owner will have turned the remote console access
                flag off.
                If the operator wanted to give you help with services he had
                to take the initiative himself and design a herald screen or
                implement a help service, and few do. But the "show symbols"
                on an Access will give you a listing of all the available
                "symbols", which is Gandalf's term for services. Connect to
                them with "c xxx" where "xxx" is of course the service.
                And yes, to you eager folks who have tasted the PACX
                console's power, the Access does have a console. Type "c
                console" to get to it.
                Follow the PACX's guidelines, and you'll do fine.

PICK-            The PICK system was created by Dick Pick(no joke), and is
                a fairly widespread system, there are a few of them out there
                on the major PSNs. I really dislike PICK, but for those of
                you wishing to try it yourself, it is a fairly easy hack.
                A normal PICK login prompt looks somewhat like;
                     07 JUN 1993 04:00:21 Logon please:
                Additional data can be entered in that line, and a header
                may be used above that. However, PICKs are usually
                recognizable by that logon prompt which will normally
                contain the date and time, as well as the 'Logon please:'.
                If you aren't sure, enter the username 'SYSPROG', in ALL CAPS
                , as PICK is case sensitive and SYSPROG will be in capitals.
                SYSPROG is the superuser(or as PICK calls it the 'Ultimate
                User') and is similar to root on a Unix; it must be present.
                PICK lets you know when you've entered an invalid Username,
                which is helpful when finding valid accounts.
                Experiment with the upper and lower case if you wish, but
                upper case is the norm.
                The people who make PICK like to think of PICK as more a
                DBMS than an OS, and it is often sold just as that. Because
                of that, you may find it on Unix, MPE, and Primos based
                systems among others.
                One last note, internal passwording is possible on the PICK,
                so don't be too suprised if you think you've found an
                unpassworded system only to be hit by a password before the
                internal prompt.

                COMMON ACCOUNTS

                Usernames          Passwords
                ---------          ---------
                1
                ACC
                ACCT
                ACCTNAME
                ACCUMATH
                ACCUPLOT
                ACCUPLOT-DEMO      ACCUPLOT, DEMO
                ARCHIVE
                AUDITOR
                AUDITORS
                BACKUP
                BATCH
                BLOCK-CONVERT
                BLOCK-PRINT
                COLDSTART
                COMBINATION
                COMM
                COMTEST
                CPA
                CPA.DOC            CPA, DOC
                CPA.PROD           CPA, PROD
                CTRL.GROUP         CTRL, CONTROL
                DEMO
                DA
                DCG
                DEV
                DM                 DATA, MANAGER, MAN, MGR, DATAMGR, DATAMAN
                DOS
                ERRMSG
                EXCEPTIONAL
                EXECUTE-CONTROL
                EXPRESS.BATCH      EXPRESS, BATCH
                FILE-SAVE          FILESAVE, SAVE
                FILE-TRANSFER
                FINANCE
                FLUSHER
                FMS
                FMS.PROD           FMS, PROD
                GAMES
                GAMES.DOS          GAMES
                GENERAL
                INSTANT
                INSTANT.DOS        INSTANT
                JOB
                KILL
                LEARN
                LEARN.DLR          LEARN, DLR, LEARNDLR
                LOGON
                LOTUS
                LOTUS.DOS          LOTUS
                MAIL.BOX           MAIL
                MINDER
                MODEM-SECURITY
                MOTD.DATA          MOTD
                NETCOM
                NET.OFF
                NETOFF
                NETUSER
                NETWORK
                NEWAC
                NOLOG
                OLD.USER
                ON-LINE-DIAGS      DIAGS
                PERFECT-BKGRND
                POINTER-FILE
                PRICE.DOS          PRICE
                PRICES.DOS         PRICES
                PROCLIB            PROC, LIBRARY, LIB
                PROD
                PROMCOR
                PROMIS-ARCHIVE     PROMIS, ARCHIVE
                PROMIS-BKGRND      PROMIS, BKGRND
                PROMO
                PWP
                QA                 QUALITY, CONTROL
                SCC.SYSPROG        SCC, SYSPROG
                SCREENLIB
                SECURITY
                SET.PLF            SET, PLF, PLFSET
                SL
                SPSYM
                STUDENT
                SUPPORT
                SYM.DOS            SYM
                SYS
                SYS.DOC            SYS
                SYSLIB             SYSTEM, LIBRARY, SYS, LIB
                SYSPROG            SYSTEM, PROGRAM, SYS, PROG, OPERATOR, DM
                SYSPROG-PL         SYSPROG, PL
                SYSTEM-ERRORS
                TCL
                TEMP
                TEMP-SYSPROG       TEMP, SYSPROG
                TEST
                TEST-BKGRND        TEST
                TRAINING
                TRY.DOS            TRY
                ULTICALC
                ULTILINK
                ULTIMATION
                UNIMAX
                WORDS
                WP
                WP.DOS             WP
                WP42.DOS           WP, WP42
                WP50.DOS           WP, WP50
                WP51               WP, WP51
                WP51.DOS           WP, WP51
                XES

AOS/VS-          AOS/VS is made by Data General Corporation(DGC), and is in
                my opinion the worst operating system i've seen yet.
                But, in the quest of knowledge, and to broaden your computer
                horizons, i suggest that you try to hack even this system,
                for what it's worth.
                The AOS/VS will usually readily identify itself with a
                banner such as;
                (yes, i'm overstepping my margin, i apologize)

      **** AOS/VS Rev 7.62.00.00 / Press NEW-LINE to begin logging on ****

      AOS/VS 7.62.00.00 / EXEC-32 7.62.00.00  11-Jun-93  0:27:31      @VCON1

               Username:

               The username prompt looks deceivingly like a VMS, but it is
               not, and you can be sure by entering garbage for the username
               and password. The AOS/VS will reply;
                     Invalid username - password pair
               AOS/VS will not let you know when you've entered an incorrect
               username.
               And a standard system will let you have 5 tries at a username/
               password combination, but after that it gives this annoying
               message;
                   Too many attempts, console locking for 10 seconds
               Having the system lock for 10 seconds does really nothing to
               the hacker, except slow brute forcing down a small bit(10
               seconds).
               Anyways, once inside 'HELP' will give you a set of help files
               which i didn't enjoy too much, and 'WHO' will list the users
               online.

               COMMON ACCOUNTS

               Username        Password
               --------        --------
               guest
               op              operator, op
               sysmgt          sys, mgt, system, man, mgr, manager
               test
               user

RSTS-           Probably the oldest OS that is still out there is RSTS. RSTS
               was a very common OS a decade or so ago, but is now nearing
               extinction. However, there are still a few out there on PSNs,
               and thus you might want to attempt to hack in.
               The RSTS will usually identify itself like;
                   RSTS V9.7-08    93.06.10    02:36
                   User:
               Before attempting to hack, try the SYSTAT command. It is
               likely it will be disabled, but it is worth a try.
               RSTS will tell you if the ID you've entered is incorrect with
               the error message;
                   ?Invalid entry - try again
               The UIDs are in the format xxx,yyy , where x and y are digits.
               Just guess at UIDs until you hit one with a password.
               Also, the IDs will generally not go above 255 in both the x
               and y spots(ie: 255,255 is generally the highest ID).

               COMMON ACCOUNTS

               User ID    Password
               -------    --------
               1,2        SYSLIB

WNT-            I really don't know much about Windows NT, mostly having to
               do with the fact that it was just released a little while ago
               and I have not seen it in action to this date. I don't know
               at what time in the future it will become widespread, but for
               you future hackers I did a little research and came up with
               the two manufacturer defaults; administrator and guest. Both
               come unpassworded.. administrator is the equivalent to root
               on a Unix, and guest is just as you'd expect .. a low level
               guest account. Interestingly enough, in the manuals I saw WNT
               sysadmins were encouraged to keep the guest account...
               unpassworded at that! Highly amusing.. let's see how long that
               lasts! Anyways..
               Oh yeah.. case sensitive, too.. I'm pretty sure it is
               lowercase, but it is possible that the first letter is
               capitalized. Remember that when attempting to brute force new
               accounts. Oh, and keep in mind possible accounts such as
               "test" and "field" and the such.

               COMMON ACCOUNTS

               Username
               --------

               administrator
               guest

NETWARE-        Novell Netware is the most common PC LAN software and is a
               popular among high-schools. The internal (and external for
               that matter) security is poor.

               COMMON ACCOUNTS

               Username        Password
               --------        --------
               admin           operator, supervisor, sysadm
               backup
               guest           visitor, user
               netware
               novell          netware
               public
               remote
               server
               staff
               supervisor      admin, operator, sysadm, supervis, manager
               system1
               tape            backup
               test            testuser
               user
               visitor         guest

Sys75/85-       AT&T's System75/85 have made a big splash in recent months
               despite their being around for years previous.. mostly due
               to codez kids discovering the PBX functions.
               Anyways, the hype has pretty much died down so it is probably
               safe to post the defaults. If you don't like my doing this,
               suck yourself. Anyone with access to this file probably has
               them by now anyways. And if not, all the better. Free
               information has always been one of our primary goals, and I
               don't intend to change that for some insecure pseudo-hackers.

               COMMON ACCOUNTS

               Username    Password
               --------    --------
               browse      looker
               craft       crftpw, craftpw
               cust        custpw
               field       support
               inads       indspw, inadspw
               init        initpw
               rcust       rcustpw

AS400-          Another OS that was only really in use before my time, AS-400
               is IBM made. I pulled this from the old UPT messages, thanks
               to anybody who contributed.
               It should in fact identify itself as an AS-400 at login time.
               I'm unsure of the case-sensativity of the characters.. i'll
               enter them as lowercase, but if unsuccessful use caps.

               COMMON ACCOUNTS

               Username
               --------
               qsecofr
               qsysopr
               quser
               sedacm
               sysopr
               user

TSO-            An IBM product, TSO can be found stand alone, but is commonly
               found off an ISM.
               Upon connect you should see a login prompt that looks like:
                   IKJ56700A   ENTER USERID-
               Or something close.
               It will tell you if the username entered is incorrect:
                   IKJ5642OI   USERID xxx NOT AUTHORIZED TO USE TSO
                   IKJ56429A   REENTER-
               Occasionally some of the accounts will have the STC attribute
               and can not be used for remote login.

               COMMON ACCOUNTS

               Username    Password
               --------    --------
               admin       adm, sysadm, op
               guest
               init
               maint
               systest     test
               test1       test
               tso


BRUTE FORCE
===========
-----------

Passwords
=========

   Occasionally you will find yourself in a position where you wish to
penetrate a system, but defaults are taken off and social engineering is not
possible.
   The dedicated hacker then begins the tedious process of trying password
after password, hoping to crowbar his way into the system. Thus the term
'Brute Force' was born, aptly describing this process.
   Brute force is the absolute ugliest way of obtaining an account, but is
is often effective. It is ugly for a number of reasons, having to do with the
fact that you will have to call the system hundreds of times if the account is
not easily brute forced.
   However, first i will explain a modified form of brute force; intelligent
brute force. In this process, the hacker tries the users first name, as that
is the most common password of all, and a database of 20-100 common passwords.
   The difference between this and the normal brute forcing is you cut your
time down considerably, but your chances of getting in go down as well.
   Normal brute forcing is rarely done nowadays; the greats of yesterday
would spend 6 hours at a sitting trying passwords, but people nowadays seem to
think 5 minutes is sufficient. Ugh.
   If standard brute forcing is done, it is accomplished with automation,
usually. Meaning the hacker will set up a program or a script file to spew out
dictionary passwords for him, then go to the movies or whatever. Obviously,
any way you do it, standard brute forcing is fairly dangerous. A sysadmin is
more likely to notice you trying a username/password 2000 times than 50. If
you choose to do automated brute forcing, it might be a good idea to set up
a hacked system to do it for you, such as a procured Unix. I would not,
however, suggest wasting the powers of a Cray on such a menial task as brute
force. You can only go as fast as the host system will let you. The danger
in this is obvious, you will have to be connected to the remote system for
a long time, leaving you wide open for a trace. It is up to you.
   And, of course, brute forcing requires a username. If you don't have a
username, you are probably out of luck.
   One thing you should definetly do is make a list of first names, and make
it fairly complete. Buy/steal a baby names book or look inside your phone
book and copy down the more commmon names on to a piece of paper or into a
file. Other than first names, husband/wife, boyfriend/girlfriend and
childs names are the most common passwords.
   Ok, here are the basics to intelligent brute force hacking;
       1. try the users first name
       2. try your list of first names, male and female
       2. try the users first name, with a lone digit(1 to 9) after the
          username
       3. try the users first name, with a lone digit(1 to 9) after the
          username
       4. try the users first name, with a letter appended to the end(A to Z)
       5. try anything related to the system you are on. If you are on a
          VAX running VMS on the Datapac PSN, try VAX, VMS, Datapac, X25, etc
       6. try anything related to the company/service the system is owned by.
          if the user is on a system owned by the Pepsi Cola company, try
          Pepsi, Cola, Pepsico, etc.
       7. finally, try passwords from your list of common passwords. your
          list of common passwords should not be above 200 words.
          The most popular passwords are;
               password secret money sex smoke beer x25 system
               hello cpu aaa abc fuck shit
          Add on popular passwords to that as you see fit.
          Remember; most passwords are picked spontaneously, on whatever
          enters the users mind at that time(you know the feeling, i bet).
          Attempt to get into the users mind and environment, to think what
          he would think. If you can't do that, just try whatever comes to
          your mind, you'll get the hang of it.

Brute Forcing User Names
========================

   A different form of brute force is that when you need a username to
hack passwords from. In order to guess a valid username, you must be on a
system that informs you when your username is invalid; thus VMS and Unix are
out of the question.
   There are two types of usernames(by my definition); user and system.
   The user usernames are the standard user's usernames. Examples would be
John, Smith, JMS, JSmith, and JohnS.
   The system usernames are special usernames used by the system operators
to perform various functions, such as maintenance and testing. Since these
usernames are not owned by actual people(usually), they are given a name which
corresponds to their function.
   Guessing either type is usually fairly easy.
   User usernames are standardly in one of 2 formats; first name or last name
the more common format being first name. Less common formats are initials,
first initial/last name, and first name/last initial. Occasionally the
username formats will have nothing to do with names at all, and will instead
be 6 or 8 digit numbers. Have fun.
   The users of a system will almost always have the same format as
each other. When you guess one, guessing more shouldn't be too hard.
   For first names, again consult the list you made from the baby names book.
   For last names, construct a list of the most common last names, ideally
out of the phone book, but if you are too lazy your mind will do fine. SMITH
and JONES are the most common non-foreign names.
   For initials, use common sense. Guess at 3 letter combinations, and use
sensible formats. Meaning don't use XYZ as a rule, go for JMS, PSJ, etc, to
follow along with common first names and last names.
   If you are getting no luck whatsoever, try switching your case(ie: from
all lower case to all upper case), the system might be case sensitive.
   Usually guessing system names shouldn't be necessary; I gave a default
list for all the major systems. But if you run across a system not listed, you
will want to discover defaults of your own. Use common sense, follow along
with the name of the new OS and utilities that would fit with that name.
Attempt to find out the username restrictions for that system, if usernames
have to be 6 characters long, try only 6 character user names.
And finally, here is a list of common defaults(they are capitalized for
convienience, but as a rule use lower case);
       OPERATOR SYSOP OP OPER MANAGER SYSMAN SYSMGR MGR MAN ADMIN
       SYSADMIN ADM SYSADM BOSS MAIL SYSTEM SYS SYS1 MAINT SYSMAINT
       TEST TESTER TESTUSER USER USR REMOTE PUB PUBLIC GUEST VISITOR
       STUDENT DEMO TOUR NEWS HELP MGT SYSMGT SYSPROG PROD SALES
       MARKET LIB LIBRARY FILES FILEMAN NET NETWORK NETMAN NETMGR
       RJE DOS GAMES INFO SETUP STARTUP CONTROL CONFIG DIAG SYSDIAG
       STAT SYSDIAGS DIAGS BATCH SUPRVISR SYSLIB MONITOR UTILITY
       UTILS OFFICE CORP SUPPORT SERVICE FIELD CUST SECURITY WORD
       DATABASE BACKUP FRIEND DEFAULT FINANCE ACCOUNT HOST ANON
       SYSTEST FAX INIT INADS SETUP

Brute Forcing Services
======================

   There is also the time when you are on a server system, and you need
places to go. You will surely be told if the service you've entered is
incorrect, so just try things that come to mind, and the following list;
(the server may be case sensitive..use upper or lower case as you wish)
(NOTE: Try digits(1 +) and letters(A-Z) also)
       SERVER NETWORK NET LINK LAN WAN MAN CONNECT LOG LOGIN HELP DIAL
       OUT OUTDIAL DIALOUT MODEM MODEMOUT INTERNET TELNET PAD X25 X28 FTP
       SYSTEM SYS SYS1 SYSTEM1 UNIX VAX VMS HP CONSOLE INFO CMDS LIST
       SERVICES SERVICE SERVICE1 COMP COMPUTER CPU CHANNEL CHANNEL1 CH1
       CH01 GO DO ? LOG ID USERS SHOW WHO PORT1 PORT NODE1 NODE LINK1
       DISPLAY CONFIG CONTROL DIAGS SYSDIAGS DIAG SYSDIAG HELLO EMAIL
       MAIL SET DEFINE PARAMS PRINT PHONE PHONES SESSION SESSION1 BEGIN
       INIT CUST SERVICE SUPPORT BUSINESS ACCT ACCOUNT FINANCE SALES
       BUFFER QUEUE STAT STATS SYSINFO SYSTAT FTP ACCESS DISK LIB SYSLIB
       LIBRARY FILES BBS LOOP TEST SEARCH MACRO CALL COMMANDS TYPE FIND
       ASK QUERY JOIN ATTACH JOB REMOTE COM1 COM CALLER LOGGER MACHINE
       BULLITEN CLUSTER RUN HELLO PAYROLL DEC

SOCIAL ENGINEERING
==================
------------------

   While I am in no way going to go indepth on SE(social engineering) at this
point, i will explain the premise of SE to those new to it.
   Social engineering can be defined any number of ways, but my definition
goes along the lines of; "Misrepresentation of oneself in a verbal manner to
another person in order to obtain knowledge that is otherwise unattainable."
Which in itself is a nice way of putting "manipulation, lying and general
bullshitting".
   Social engineering is almost always done over the phone.
   I'll give an example. The hacker needs information, such as an account,
which he cannot get by simple hacking. He calls up the company that owns the
system he wishes to penetrate, and tells them he is Joe Blow of the Computer
Fixing Company, and he is supposed to fix their computers, or test them
remotely. But gosh, somebody screwed up and he doesn't have an account. Could
the nice lady give him one so he can do his job and make everybody happy?
   See the idea? Misrepresentation of the truth; pretending to be someone you
aren't.
   If you are skeptical, you shouldn't be. SE is tried and true, due to the
fact that any company's biggest security leak is their employees. A company
can design a system with 20 passwords, but if an uncaring employee unwittingly
supplies a hacker with all of these passwords, the game is over.
   You *must* have the voice for it. If you sound like a 12 year old, you
aren't going to get shit. If you can't help it, there are telephone-voice
changers(which any SE practicer should have anyways) that will do it for you.
   If the person wishes to contact higher authority(who will probably suspect
somethings up), get mad. Don't go into a rage, but do get angry. Explain that
you have a job to do, and be persuasive.
   I won't go more into SE, there are tons of text files out there on it
already. Just remember to keep calm, have a back up plan, and it is a good
idea to have the script on paper, and practice it a bit before hand. If you
sound natural and authorative, you will get whatever you want.
   And practice makes perfect.

TRASHING
========
--------

   Trashing is another thing i will not go too indepth on, but i will provide
a very quick overview.
   Trashing is the name given to the process of stealing a companies trash,
then rooting through it and saving the valuable information.
   Trashing is practiced most often on the various RBOCs, but if you are
attempting to hack a system local to you, it might be a good idea to go
trashing for a few weeks, you might find a printout or a scrap of paper with
a dialup or username and password written on it.

ACRONYMS
========
--------

   This is a basic list of H/P acronyms I've compiled from various sources..
it should be big enough to serve as an easy reference without being incredibly
cumbersome

ABSBH:    Average Busy Season Busy Hour
AC:       Area code
ACC:      Automatic Communications Control
ACC:      Asynchronous Communications Center
ACD:      Automatic Call Distributor
ACE:      Automatic Calling Equipment
ACF:      Advanced Communications Functions
ACN:      Area Code + Number
ADPCM:    Adaptive Differential Pulse Code Modulation
AIS:      Automatic Intercept System
ALFE:     Analog Line Front End
ALRU:     Automatic Line Record Update
AM:       Account Manager
AM:       Access Module
AM:       Amplitude Modulation
AMA:      Automatic Message Accounting
AMSAT:    American Satellite
AN:       Associated Number
ANI:      Automatic Number Identification
ANXUR:    Analyzer for Networks with Extended Routing
AOSS:     Auxiliary Operator Services System
AP:       Attached Processor
ARC:      Automatic Response Control
ARP:      Address Resolution Protocol
ARPA:     Advanced Reasearch Projects Agency
ARS:      Automatic Response System
ARSB:     Automated Repair Service Bureau
AT:       Access Tandem
ATB:      All Trunks Busy
ATH:      Abbreviated Trouble History
ATM:      Automated Teller Machine
ATM:      Asynchronous Transfer Mode
AT&T:     American Telegraph and Telephone Company
AVD:      Alternate Voice Data
BCD:      Binary Coded Decimal
BCUG:     Bilateral CUG
BELLCORE: Bell Communications Research
BGP:      Border Gateway Protocol
BHC:      Busy Hour Calls
BLV:      Busy Line Verification
BOC:      Bell Operating Company
BOR:      Basic Output Report
BOS:      Business Office Supervisor
BSC:      Binary Synchronous Module
BSCM:     Bisynchronous Communications Module
BSOC:     Bell Systems Operating Company
CA:       Cable
CADV:     Combined Alternate Data/Voice
CAMA:     Centralized Automatic Message Accounting
CATLAS    Centralized Automatic Trouble Locating & Analysis System
CAU:      Controlled Access Unit
CAVD:     Combined Alternated Voice/Data
CBC       Cipher Block Chaining
CBS:      Cross Bar Switching
CBX:      Computerized Branch Exchange
CBX:      Computerized Business Exchange
CC:       Calling Card
CC:       Common Control
CC:       Central Control
CC:       Country Code
CCC:      Central Control Complex
CCC:      Clear Channel Capability
CCC:      Central Control Computer
CCIS:     Common Channel Interoffice Signalling
CCITT:    International Telephone and Telegraph Consultative Committee
CCM:      Customer Control Management
CCNC:     Common Channel Network Controller
CCNC:     Computer Communications Network Center
CCS:      Common Channel Signalling
CCSA:     Common Control Switching Arrangement
CCSA:     Common Central Switching Arrangement
CCSS:     Common Channel Signalling System
CCT:      Central Control Terminal
CCTAC:    Computer Communications Trouble Analysis Center
CDA:      Call Data Accumulator
CDA:      Crash Dump Analyzer
CDA:      Coin Detection and Announcement
CDAR:     Customer Dialed Account Recording
CDC:      Control Data Corporation
CDI:      Circle Digit Identification
CDO:      Community Dial Office
CDPR:     Customer Dial Pulse Receiver
CDR:      Call Dial Recording
CDS:      Cicuit Design System
CEF:      Cable Entrance Facility
CERT:     Computer Emergency Response Team
CF:       Coin First
CGN:      Concentrator Group Number
CI:       Cluster Interconnect
CIC:      Carrier Identification Codes
CICS:     Customer Information Control System
CID:      Caller ID
CII:      Call Identity Index
CIS:      Customer Intercept Service
CISC:     Complex Instruction Set Computing
CLASS:    Custom Local Area Signalling Service
CLASS:    Centralized Local Area Selective Signalling
CLDN:     Calling Line Directory Number
CLEI:     Common Language Equipment Identification
CLI:      Calling Line Identification
CLID:     Calling Line Identification
CLLI:     Common Language Location Indentifier
CLNP:     Connectionless Network Protocol
CMAC:     Centralized Maintenance and Administration Center
CMC:      Construction Maintenance Center
CMDF:     Combined Main Distributing Frame
CMDS:     Centralized Message Data System
CMIP:     Common Management Information Protocol
CMS:      Call Management System
CMS:      Conversational Monitoring System
CMS:      Circuit Maintenance System
CMS:      Communications Management Subsystem
CN/A:     Customer Name/Address
CNA:      Communications Network Application
CNAB:     Customer Name Address Bureau
CNCC:     Customer Network Control Center
CNI:      Common Network Interface
CNS:      Complimentary Network Service
CO:       Central Office
COC:      Central Office Code
COCOT:    Customer Owned Coin Operated Telephone
CODCF:    Central Office Data Connecting Facility
COE:      Central Office Equipment
COEES:    Central Office Equipmet Engineering System
COER:     Centarl Office Equipment Reports
COLT:     Central Office Line Tester
COMSAT:   Communications Satellite
COMSEC:   Communications Security
COMSTAR:  Common System for Technical Analysis & Reporting
CONS:     Connection-Oriented Network Service
CONTAC:   Central Office Network Access
COS:      Class of Service
COSMIC:   Common Systems Main Inter-Connection
COR:      Class Of Restriction
COSMOS:   Computerized System For Mainframe Operations
COT       Central Office Terminal
CP:       Control Program
CPBXI:    Computer Private Branch Exchange Interface
CPC:      Circuit Provisioning Center
CPD:      Central Pulse Distributor
CPMP:     Carrier Performance Measurement Plan
CRAS:     Cable Repair Administrative System
CRC:      Customer Record Center
CRC:      Customer Return Center
CREG:     Concentrated Range Extension & Gain
CRG:      Central Resource Group
CRIS:     Customer Record Information System
CRS:      Centralized Results System
CRSAB:    Centralized Repair Service Answering Bureau
CRT:      Cathode Ray Tube
CRTC:     Canadian Radio-Television and Telecommunications Commission
CSA:      Carrier Servicing Area
CSAR:     Centralized System for Analysis and Reporting
CSC:      Cell Site Controller
CSC:      Customer Support Center
CSDC:     Circuit Switch Digital Capability
CSP:      Coin Sent Paid
CSMA/CD:  Carrier Sense Multiple Access/Collission Detection
CSR:      Customer Service Records
CSS:      Computer Special Systems
CSS:      Computer Sub-System
CSU:      Channel Service Unit
CT:       Current Transformer
CTC:      Channel Termination Charge
CTC:      Central Test Center
CTM:      Contac Trunk Module
CTMS:     Carrier Transmission Measuring System
CTO:      Call Transfer Outside
CTSS:     Compatible Time Sharing System
CTSS:     Cray Time Sharing System
CTTN:     Cable Trunk Ticket Number
CTTY:     Console TeleType
CU:       Control Unit
CU:       Customer Unit
CUG:      Closed User Group
CWC:      City-Wide Centrex
DA:       Directory Assistance
DACC:     Directort Assistance Call Completion
DAA:      Digital Access Arrangements
DACS:     Digital Access and Cross-connect System
DACS:     Directory Assistance Charging System
DAIS:     Distributed Automatic Intercept System
DAL:      Dedicated Access Line
DAO:      Directory Assistance Operator
DAP:      Data Access Protocol
DARC:     Division Alarm Recording Center
DARPA:    Department of Defense Advanced Research Projects Agency
DARU:     Distributed Automatic Response Unit
DAS:      Device Access Software
DAS:      Directory Assistance System
DAS:      Distributor And Scanner
DAS:      Dual Attachment Station
DASD:     Direct Access Storage Device
DBA:      Data Base Administrator
DBA:      Digital Business Architecture
DBAC:     Data Base Administration Center
DBAS:     Data Base Administration System
DBC:      Digital Business Center
DBM:      Database Manager
DBMS:     Data Base Management System
DBS:      Duplex Bus Selector
DCA:      Defense Communications Agency
DCC:      Data Country Code
DCC:      Data Collection Computer
DCE:      Data Circuit-Terminating Equipment
DCE:      Data Communicating Equipment
DCL:      Digital Computer Language
DCLU:     Digital Carrier Line Unit
DCM:      Digital Carrier Module
DCMS:     Distributed Call Measurement System
DCMU:     Digital Concentrator Measurement Unit
DCO-CS:   Digital Central Office-Carrier Switch
DCP:      Duplex Central Processor
DCS:      Digital Cross-Connect System
DCSS:     Discontiguous Shared Segments
DCSS:     Digital Customized Support Services
DCT:      Digital Carrier Trunk
DDCMP:    Digital Data Communications Message Protocol
DDD:      Direct Distance Dialing
DDN:      Defense Data Network
DDR:      Datapac Design Request
DDS:      Digital Data Service
DDS:      Digital Data System
DDS:      Dataphone Digital Service
DEC:      Digital Equipment Corporation
DES:      Data Encryption Standard
DF:       Distributing Frame
DGC:      Data General Corporation
DH:       Distant Host
DID:      Direct Inward Dialing
DIMA:     Data Information Management Architecture
DINS:     Digital Information Network Service
DIS:      Datapac Information Service
DISA:     Direct Inward System Access
DLC:      Digital Loop Carrier
DLS:      Dial Line Service
DM:       Demultiplexer
DMA:      Direct Memory Access
DN:       Directory Numbers
DNA:      Datapac Network Address
DNA:      Digital Named Accounts
DNA:      Digital Network Architecture
DNIC:     Data Network Identifier Code
DNR:      Dialed Number Recorder
DNS:      Domain Name Service
DNS:      Domain Name System
DOCS:     Display Operator Console System
DOD:      Department Of Defense
DOM:      District Operations Manager
DPSA:     Datapac Serving Areas
DPTX:     Distributed Processing Terminal Executive
DSC:      Data Stream Compatibility
DSI:      Data Subscriber Interface
DSL:      Digital Subscriber Line
DSN:      Digital Services Network
DSU:      Data Service Unit
DSU:      Digital Service Unit
DSX:      Digital Signal Cross-Connect
DTC:      Digital Trunk Controller
DTE:      Data Terminal Equipment
DTF:      Dial Tone First
DTG:      Direct Trunk Group
DTI:      Digital Trunk Interface
DTIF:     Digital Tabular Interchange Format
DTMF:     Dual Tone Multi-Frequency
DTN:      Digital Telephone Network
DTST:     Dial Tone Speed Test
DVM:      Data Voice Multiplexor
EAEO:     Equal Access End Office
EA-MF:    Equal Access-Multi Frequency
EBDI:     Electronic Business Data Interchange
EC:       Exchange Carrier
ECC:      Enter Cable Change
EDC:      Engineering Data Center
EDI:      Electronic Data Interchange
EE:        End to End Signaling
EEDP:     Expanded Electronic Tandem Switching Dialing Plan
EGP:      Exterior Gateway Protocol
EIES:     Electronic Information Exchange System
EIU:      Extended Interface Unit
EKTS:     Electonic Key Telephone Service
ELDS:     Exchange Line Data Service
EMA:      Enterprise Management Architecture
EO:       End Office
EOTT:     End Office Toll Trunking
EREP:     Environmental Recording Editing and Printing
ESA:      Emergency Stand Alone
ESB:      Emergency Service Bureau
ESN:      Electronic Serial Number
ESP:      Enhanced Service Providers
ESS:      Electronic Switching System
ESVN:     Executive Secure Voice Network
ETS:      Electronic Tandem Switching
EWS:      Early Warning System
FAC:      Feature Access Code
FAM:      File Access Manager
FCC:      Federal Communications Commission
FCO:      Field Change Order
FDDI:     Fiber Distributed Data Interface
FDM:      Frequency Division Multiplexing
FDP:      Field Development Program
FEP:      Front-End Processor
FEV:      Far End Voice
FIFO:     First In First Out
FIPS:     Federal Information Procedure Standard
FM:       Frequency Modulation
FMAP:     Field Manufacturing Automated Process
FMIC:     Field Manufacturing Information Center
FOA:      First Office Application
FOIMS:    Field Office Information Management System
FPB:      Fast Packet Bus
FRL:      Facilities Restriction Level
FRS:      Flexible Route Selection
FRU:      Field Replaceable Unit
FS:       Field Service
FSK:      Frequency Shift Keying
FT:       Field Test
FTG:      Final Trunk Group
FTP:      File Transfer Protocol
FTPD:     File Transfer Protocol Daemon
FX:       Foreign Exchange
GAB:      Group Access Bridging
GCS:      Group Control System
GECOS:    General Electric Comprehensive Operating System
GGP:      Gateway-to-Gateway Protocol
GOD:      Global Out Dial
GPS:      Global Positioning System
GRINDER:  Graphical Interactive Network Designer
GSA:      General Services Administration
GSB:      General Systems Business
GTE:      General Telephone
HCDS:     High Capacity Digital Service
HDLC:     High Level Data Link Control
HLI:      High-speed LAN Interconnect
HDSC:     High-density Signal Carrier
HPO:      High Performance Option
HUTG:     High Usage Trunk Group
HZ:       Hertz
IBM:      International Business Machines
IBN:      Integrated Business Network
IC:       Intercity Carrier
IC:       InterLATA Carrier
IC:       Interexchange Carrier
ICAN:     Individual Circuit Analysis Plan
ICH:      International Call Handling
ICM:      Integrated Call Management
ICMP:     Internet Control Message Protocol
ICN:      Interconnecting Network
ICPOT:    Interexchange Carrier-Point of Termination
ICUG:     International Closed User Group
ICVT:     Incoming Verification Trunk
IDA:      Integrated Digital Access
IDCI:     Interim Defined Central Office Interface
IDDD:     International Direct Distance Dialing
IDLC:     Integrated Digital Loop Carrier
IDN:      Integrated Digital Networks
IEC:      Interexchange Carrier
IMP:      Internet Message Processor
IMS:      Information Management Systems
IMS:      Integrated Management Systems
IMTS:     Improved Mobile Telephone Service
INAP:     Intelligent Network Access Point
INS:      Information Network System
INTT:     Incoming No Test Trunks
INWATS:   Inward Wide Area Telecommunications Service
IOC:      Interoffice Channel
IOC:      Input/Output Controller
IOCC:     International Overseas Completion Center
IP:       Intermediate Point
IP:       Internet Protocol
IPCF:     Inter-Program Communication Facility
IPCH:     Initial Paging Channel
IPCS:     Interactive Problem Control System
IPL:      Initial Program Load
IPLI:     Internet Private Line Interface
IPLS:     InterLATA Private Line Services
IPSS:     International Packet-Switched Service
IRC:      Internet Relay Chat
IRC:      International Record Carrier
ISC:      Inter-Nation Switching Center
ISDN:     Integrated Services Digital Network
ISIS:     Investigative Support Information System
ISO:      International Standards Organization
ISSN:     Integrated Special Services Network
ISU:      Integrated Service Unit
ISWS:     Internal Software Services
ITDM:     Intelligent Time Division Multiplexer
ITI:      Interactive Terminal Interface
ITS:      Interactive Terminal Support
ITS:      Incompatible Time-Sharing System
ITT:      International Telephone and Telegraph
IVP:      Installation Verification Program
IX:       Interactive Executive
IXC:      Interexchange Carrier
JCL:      Job Control Language
JES:      Job Entry System
KP:       Key Pulse
LAC:      Loop Assignment Office
LADS:     Local Area Data Service
LADT:     Local Area Data Transport
LAM:      Lobe Access Module
LAN:      Local Area Network
LAP:      Link Access Protocol
LAPB:     Link Access Protocol Balanced
LAPS:     Link Access Procedure
LASS:     Local Area Signalling Service
LASS:     Local Area Switching Service
LAST:     Local Area System Transport
LAT:      Local Area Transport
LATA:     Local Access Transport Area
LAVC:     Local Area VAX Cluster
LBS:      Load Balance System
LCDN:     Last Call Directory Number
LCM:      Line Concentrating Module
LCN:      Logical Channel
LD:       Long Distance
LDEV:     Logical Device
LDM:      Limited Distance Modem
LDS:      Local Digital Switch
LEBC:     Low End Business Center
LEC:      Local Exchange Carrier
LEN:      Low End Networks
LENCL:    Line Equipment Number Class
LGC:      Line Group Controller
LH:       Local Host
LIFO:     Last In First Out
LIP:      Large Internet Protocol
LLC:      Logical Link Control
LM:       Line Module
LMOS:     Loop Maintenance and Operations System
LSI:      Large Scale Integration
LTC:      Line Trunk Controller
LU:       Local Use
LVM:      Line Verification Module
MAC:      Media Access Control
MAC:      Message Authentication
MAN:      Metropolitan Area Network
MAP:      Maintenance and Administration Position
MAP:      Manufacturing Automation Protocol
MAT:      Multi-Access Trunk
MAU:      Multistation Access Unit
MBU:      Manufacturing Business Unit
MCA:      Micro Channel Architecture
MCI:      Microwave Communications, Inc.
MCP:      Master Control Program
MCT:      Manufacturing Cycle Time
MCU:      Multi Chip Unit
MDR:      Message Detail Record
MDS:      Message Design Systems
MDU:      Marker Decoder Unit
MF:       Multi-Frequency
MFD:      Main Distributing Frame
MFR:      Mult-Frequency Receivers
MFT:      Metallic Facility Terminal
MHZ:      Mega-Hertz
MIB:      Management Information Base
MIC:      Management Information Center
MIF:      Master Item File
MIS:      Management Information Systems
MJU:      MultiPoint Junction Unit
MLHG:     Multiline Hunt Group
MLT:      Mechanized Loop Testing
MNS:      Message Network Basis
MOP:      Maintenance Operation Protocol
MP:       Multi-Processor
MPL:      Multischedule Private Line
MPPD:     Multi-Purpose Peripheral Device
MRAA:     Meter Reading Access Arrangement
MSCP:     Mass Storage Control Protocol
MSI:      Medium Scale Integration
MTBF:     Mean Time Between Failure
MTS:      Message Telecommunication Service
MTS:      Message Telephone Service
MTS:      Message Transport Service
MTS:      Mobile Telephone Service
MTSO:     Mobile Telecommunications Switching Office
MTU:      Maintenence Termination Unit
MUX:      Multiplexer
MVS:      Multiple Virutal Storage
MWI:      Message Waiting Indicator
NAM:      Number Assignment Module
NAS:      Network Application Support
NC:       Network Channel
NCCF:     Network Communications Control Facility
NCI:      Network Channel Interface
NCIC:     National Crime Information Computer
NCP:      Network Control Program
NCS:      Network Computing System
NCTE:     Network Channel Terminating Equipment
NDA:      Network Delivery Access
NDC:      Network Data Collection
NDIS:     Network Device Interface Specification
NDNC:     National Data Network Centre
NDS:      Network Data System
NDU:      Network Device Utility
NEBS:     Network Equipment Building System
NECA:     National Exchange Carriers Association
NFS:      Network File Sharing
NFS:      Network File System
NFT:      Network File Transfer
NI:       Network Interconnect
NI:       Network Interface
NIC:      Network Information Center
NIC:      Network Interface Card
NJE:      Network Job Entry
NLM:      Netware Loadable Modules
NLM:      Network Loadable Modules
NM:       Network Module
NMR:      Normal Mode Rejection
NOS:      Network Operating System
NPA:      Numbering Plan Area
NPA:      Network Performance Analyzer
NSF:      National Science Foundation
NSP:      Network Services Protocol
NTE:      Network Terminal Equipment
NUA:      Network User Address
NUI:      Network User Identifier
OC:       Operator Centralization
OCC:      Other Common Carrier
OD:       Out Dial
ODA:      Office Document Architecture
ODDB:     Office Dependent Data Base
ODI:      Open Data Interface
OGT:      Out-Going Trunk
OGVT:     Out-Going Verification Trunk
OIS:      Office Information Systems
OLTP:     On-Line Transaction Processing
ONI:      Operator Number Identification
OPCR:     Operator Actions Program
OPM:      Outside Plant Module
OPM:      Outage Performance Monitoring
OR:       Originating Register
OS:       Operating System
OSI:      Open Systems Interconnection
OSL:      Open System Location
OSS:      Operator Services System
OST:      Originating Station Treatment
OTC:      Operating Telephone Company
OTR:      Operational Trouble Report
OUTWATS:  Outward Wide Area Telecommunications Service
PABX:     Private Automated Branch Exchange
PACT:     Prefix Access Code Translator
PAD:      Packet Assembler/Disassembler
PADSX:    Partially Automated Digital Signal Cross-Connect
PAM:      Pulse Amplitude Modulation
PAX:      Private Automatic Exchange
PBU:      Product Business Unit
PBX:      Private Branch Exchange
PC:       Primary Center
PCM:      Pulse Code Modulation
PCP:      PC Pursuit
PFM:      Pulse Frequency Modulation
PGA:      Pin Grid Array
PIN:      Personal Identification Number
PLA:      Programmable Logic Array
PLD:      Programmable Logic Device
PLS:      Programmable Logic Sequencer
PM:       Phase Modulation
PM:       Peripheral Module
PMAC:     Peripheral Module Access Controller
PMR:      Poor Mans Routing
PNC:      Primenet Node Controller
POC:      Point of Contact
POF:      Programmable Operator Facility
POP:      Point of Presence
POS:      Point Of Sale
POT:      Point of Termination
POTS:     Plain Old Telephone Service
PPN:      Project Program Number
PPP:      Point to Point Protocol
PPS:      Public Packet Switching
PPSN:     Public Packet Switched Network
PSAP:     Public Safety Answering Point
PSDC:     Public Switched Digital Capability
PSDCN:    Packet-Switched Data Communication Network
PSDN:     Packet-Switched Data Network
PSDS:     Public Switched Digital Service
PSN:      Packet-Switched Network
PSS:      Packet-Switched Service
PSW:      Program Status Word
PTE:      Packet Transport Equipment
PTS:      Position and Trunk Scanner
PTT:      Postal Telephone & Telegraph
PVC:      Permanent Virtual Call
PVN:      Private Virtual Network
PWC:      Primary Wiring Center
QPSK:     Quadrature Phase-Shift Keying
RACF:     Resource Access Control Facility
RAO:      Revenue Accounting Office
RARP:     Reverse Address Resolution Protocol
RBG:      Realtime Business Group
RBOC:     Regional Bell Operating Company
RC:       Rate Center
RC:       Regional Center
RDB:      Relational Database
RDSN:     Region Digital Switched Network
RDT:      Restricted Data Transmissions
RDT:      Remote Digital Terminal
REP:      Reperatory Dialing
REXX:     Restructured Extended Executer Language
RFC:      Request For Comments
RIP:      Routing Information Protocol
RIS:      Remote Installation Service
RISC:     Reduced Instruction Set Computer
RISD:     Reference Information Systems Development
RJE:      Remote Job Entry
RLCM:     Remote Line Concentrating Module
RNOC:     Regional Network Operations Center
ROTL:     Remote Office Test Line
RPC:      Remote Procedure Call
RPE:      Remote Peripheral Equipment
RSA:      Reference System Architecture
RSB:      Repair Service Bureau
RSC:      Remote Switching Center
RSCS:     Remote Spooling Communications Subsystem
RSS:      Remote Switching System
RSU:      Remote Switching Unit
RTA:      Remote Trunk Arrangement
RTG:      Routing Generator
R/W:      Read/Write
RX:       Remote Exchange
SA:       Storage Array
SABB:     Storage Array Building Block
SAM:      Secure Access Multiport
SARTS:    Switched Access Remote Test System
SAS:      Switched Access Services
SAS:      Single Attachment System
SBB:      System Building Block
SABM:     Set Asynchronous Balanced Mode
SAC:      Special Area Code
SBS:      Satellite Business Systems
SC:       Sectional Center
SCC:      Specialized Common Carrier
SCC:      Switching Control Center
SCCP:     Signaling Connection Control Part
SCCS:     Switching Control Center System
SCF:      Selective Call Forwarding
SCF:      Supervision Control Frequency
SCM:      Station Class Mark
SCM:      Subscriber Carrier Module
SCP:      Signal Conversion Point
SCP:      System Control Program
SCP:      Service Control Point
SCR:      Selective Call Rejection
SDLC:     Synchronous Data Link Control
SF:       Single-Frequency
SFE:      Secure Front End
SIDH:     System Identification Home
SIT:      Special Information Tones
SLIC:     Subscriber Line Interface Card
SLIM:     Subscriber Line Interface Module
SLIP:     Serial Line Internet Protocol
SLS:      Storage Library System
SLU:      Serial Line Unit
SM:       System Manager
SMDI:     Storage Module Disk Interconnect
SMDR:     Station Manager Detail Recording
SMI:      System Management Interrupt
SMP:      Symmetrical Multi-Processing
SMS:      Self-Maintenance Services
SMS:      Station Management System
SMTP:     Simple Mail Transfer Protocol
SNA:      Systems Network Architecture
SNMP:     Simple Network Management Protocol
SONDS:    Small Office Network Data System
SOST:     Special Operator Service Treatment
SP:       Service Processor
SPC:      Stored Program Control
SPCS:     Stored Program Control System
SPCSS:    Stored Program Control Switching System
SPM:      Software Performance Montior
SQL/DS:   Structured Query Language/Data System
SRC:      System Resource Center
SS:       Signaling System
SSAS:     Station Signaling and Announcement System
SSCP:     Systems Service Control Point
SSCP:     Subsystem Services Control Point
SSP:      Switching Service Points
SSS:      Strowger Switching System
ST:       Start
STC:      Service Termination Charge
STD:      Subscriber Trunk Dialing
STP:      Signal Transfer Point
STS:      Synchronous Transport Signal
SVC:      Switched Virtual Call
SWG:      Sub Working Group
SxS:      Step-by-Step Switching
T-1:      Terrestrial Digital Service
TAC:      Trunk Access Code
TAC:      Terminal Access Circuit
TAC:      Terminal Access Center
TAS:      Telephone Answering Service
TASI:     Time Assignment Speech Interpolation
TBU:      Terminals Business Unit
TC:       Toll Center
TCAP:     Transaction Capabilities ApplicationPart
TCC:      Technical Consulting Center
TCC:      Telecommunications Control Computer
TCF:      Transparent Connect Facility
TCM:      Time Compression Multiplexing
TCP:      Transmission Control Protocol
TDAS:     Traffic Data Administration System
TDCC:     Transport Data Coordinating Committee
TDM:      Time Division Multiplexer
TDMS:     Terminal Data Management System
TDS:      Terrestrial Digital Service
TH:       Trouble History
TIDE:     Traffic Information Distributor & Editor
TIS:      Technical Information Systems
TLB:      TransLAN Bridge
TM:       Trunk Module
TMSCP:    Tape Mass Storage Control Protocol
TNDS:     Total Network Data System
TNPS:     Traffic Network Planning Center
TO:       Toll Office
TOP:      Technical Office Protocol
TOPS:     Traffic Operator Position System
TP:       Transport Protocol
TP:       Toll Point
TP:       Transaction Processing
TPC:      Transaction Processiong Performance Council
TREAT:    Trouble Report Evaluation and Analysis Tool
TRIB:     Throughput Rate in Information Bits
TRT:      Tropical Radio and Telephone
TSB:      Time Shared Basic Environment
TSG:      Timing Signal Generator
TSN:      Terminal Switching Network
TSO:      Time Sharing Option
TSPS:     Traffice Service Position System
TTL:      Transistor-to-Transistor Logic
TTS:      Trunk Time Switch
TWX:      Type Writer Exchange
UA:       Unnumbered Acknowledgement
UAE:      Unrecoverable Application Error
UART:     Universal Asynchronous Receiver Transmitter
UCS:      Uniform Communication Standard
UDC:      Universal Digital Channel
UDP:      User Datagram Protocol
UDVM:     Universal Data Voice Multiplexer
UID:      User Identifier
UPC:      Utility Port Conditioner
USC:      Usage Surcharge
USDN:     United States Digital Network
USTS:     United States Transmission Systems
UUCP:     Unix to Unix Copy Program
VAN:      Value Added Networks
VAX:      Virtual Address Extention
VCPI:     Virtual Control Program Interface
VDU:      Visual Display Unit
VF:       Voice Frequency
VFU:      Vertical Forms Unit
VFY:      Verify
VIA:      Vax Information Architecture
VLM:      Virtual Loadable Module
VLSI:     Very Large Scale Integration
VMB:      Voice Mail Box
VMCF:     Virtual Machine Communications Facility
VMS:      Virtual Memory System
VMS:      Voice Mail System
VM/SP:    Virtual Machine/System Product
VPA:      VAX Performance Advisor
VPS:      Voice Processing System
VSAM:     Virtual Storage Access Method
VSE:      Virtual Storage Extended
VTAM:     Virtual Telecommunications Access Method
VTOC:     Volume Table Of Contents
VUIT:     Visual User Interface Tool
VUP:      Vax Unit of Processsing
WAN:      Wide Area Network
WATS:     Wide Area Telecommunications System
WATS:     Wide Area Telephone Service
WC:       Wiring Center
WCPC:     Wire Center Planning Center
WDCS:     Wideband Digital Cross-Connect System
WDM:      Wavelength Division MultiPlexing
WES:      Western Electronics Switching
WUI:      Western Union International
XB:       Crossbar Switching
XBAR:     Crossbar Switching
XBT:      Crossbar Tandem
XNS       Xerox Network Systems
XSV       Transfer Cost System Value
XTC       Extended Test Controller


CONCLUSION
==========
----------

Last words
==========

   Well, i sincerely hope that this file was of some use to you, and i would
encourage you to distribute it as far as you can. If you enjoyed it, hated it,
have suggestions, or whatever, feel free to email me at my Internet address(my
only permanent one for now) or at a BBS, if you can find me.
   Have phun...

       - Deicide -

Recommended Reading
===================
Neuromancer, Mona Lisa Overdrive, Count Zero and all the rest, by William
Gibson
The Hacker Crackdown, by Bruce Sterling
Cyberpunk, by Katie Hafner and John Markoff
The Cuckoo's Egg, by Cliff Stoll
2600: The best h/p printed zine. $21 in American funds, U.S. & Canada.
     2600 Subscription Dept., P.O. Box 752, Middle Island NY 11953-0752
     Office: 516-751-2600   Fax: 516-751-2608
The issues of CUD, cDc, & Phrack electronic newsletters, and the LOD/H TJs,
all of which can be found on the Internet and any good h/p oriented BBS.

BBSes
=====

   Although most boards have a lifespan equivalent to that of a fruitfly,
I finally have a list which is somewhat stable.. getting on them is your
problem.. just be yourself and be willing to learn.
       - Unphamiliar Territories
       - Demon Roach Underground
       - Temple of the Screaming Electron
       - Burn This Flag
       - Dark Side of the Moon
       and Phrozen Realm if it returns..

References
==========

   All the material used in this publication is original unless specifically
stated otherwise.
   However, i'd like to thank Phrack and the LOD/H for their textfiles
which gave me a valuable push in the right direction..
   And of course all the great h/p folks who have helped me along the way..

And finally
===========
Thanks to the EFF, for their continued support of all of the world's rights
in this technological era.
Thanks to all the folks running the FreeNets who continue to support the
right to free access to information in this world of cynicism.
Thanks to cDc, for not selling out after all these years...
Musical inspirations: Primus, Rage Against the Machine, Jimi Hendrix, Led
Zeppelin, Dead Kennedys, White Zombie, the Beastie Boys, etc, etc.

"Yes I know my enemies. They're the teachers who taught me to fight me.
Compromise, conformity, assimilation, submission, ignorance, hypocrisy,
brutality, the elite"
- /Know Your Enemy/ (c) Rage Against the Machine

         - Deicide -
   [email protected]

DISCLAIMER
==========
This file was provided for informational purposes only.
The author assumes no responsibilities for any individual's actions after
reading this file.