__
                     \ /          |_
                     / \ e n o n  |  o u n d a t i o n

                                 presents:

                                 \     /
                     *------  the  \ /
                                   / \  files  ------*
                                 /     \

                          January/1994  Issue: 8

               ---------------------------------------------
               |                   The                     |
               |         Xenon Foundation Presents:        |
               |                                           |
               |      The Beginner's Frequently Asked      |
               |                                           |
               |                Questions                  |
               |___________________________________________|

                          Written by:  Erik Turbo


 As always,  we have encouraged  others to engage in the hobby of computer
 'hacking', and as of late,  we felt it would be quite beneficial to those
 interested in the field if we were to produce a Frequently Asked Question
 (FAQ) file,  covering all the  'not-so-stupid'  questions some people are
 afraid to ask.  Since  the Xenon Foundation  has been in  existance since
 March  of 1992,  and are  one of the most  active  groups in New  England
 we felt it  would be our  responsibilty to  pass the information we  have
 learned  on  to  others.  Remember,  there are no stupid questions,  just
 stupid answers.  :-)



Q. What is hacking?

A. It has to be understood,  that when  asking a question  as broad and far
  reaching  as this one,  you  will get different answers from  just about
  anyone you speak with. Our closest definition, and in the simplest terms
  is:

  Hackers  are closely  knit groups  of individuals  whos main goal is the
  retrieval  of  information  and  knowledge  from  computer  systems  and
  networks,  while  striving  to learn as much as possible about operating
  systems and their function in the process.

Q. What is the Xenon Foundation?

A. The Xenon Foundation is  a group of individuals,  from various  locations
  in the  Northeast,  who's purpose is  to  learn  as much about computers,
  networking,  operating  systems, telephone systems,  and  the like,  from
  the manipulation of security flaws in existing software.  It  was founded
  by  CopyMaster D. in early 1992,  and  has been  under  his leadership of
  Erik Turbo  since  March of that year.  We  are currently one of the most
  active  group  in  the  Northeastern  section  of the country,  primarily
  concentrated in the 508, 617, and 716 area codes.

Q. What does one need to be a hacker?

A. The mark  of a good hacker is  persistance;  the mark of  a great hacker
  is persistance AND intelligence.  In order to be successful as a hacker,
  one  must  have  a means  of  communication  (ie: a computer, modem  and
  telephone line),  a means  of finding computers to actually hack, and an
  extreemly  persistant  will  to strive for the information and knowledge
  that  is  stored behind the  so-called locked digital  doors of computer
  systems.  As a  hacker progresses,  he must  also attain  the fluency in
  several operating systems, the ability to create and/or exploit holes in
  software,  stronger  endurance  and  patience,  and most important,  the
  stealthy ability to stay hidden from the administration.


Q. How do I find systems to hack?

A. One  of the most  common and  time-honored  methods  of  finding  actual
  computers,  is to  'War Game'  dial  a  large  segment  of the telephone
  network. Made popular by  the cult  hacker  movie,  "War Games" in 1984,
  this method  is still used quite  effectively  today.  There are several
  wargame dialing programs out there on local BBS's, and it is NOT illegal
  to use such methods. (yet!)

  For  the  networks  such  as Sprintnet, and the Internet, there are much
  quicker  ways  to yield results.   For Sprintnet,  there  is a  software
  package called the  "NUA Attacker,"  which  will  scan  a  wide range of
  Sprintnet  addresses  for  computers.   Prehaps  the easiest network  of
  all to  obtain site names, is the Internet.   You can get computer names
  and  associated domain-name  style addresses  from books relating to the
  internet,  e-mail  messages from/to the Internet,  Usenet groups,  or by
  huge databases actually on the internet,  such as 'rs.internic.net', and
  'ddn.mil.net'.

Q. What is social engineering?

A. Social  Engineering  is  the intelligent artform (and trust me, it IS an
  artform...) of getting information from people by posing as an authority
  figure.   This  technique  requires   good  lying   skills,  a  complete
  understanding of the information you are looking for  as well as related
  materials, and an authoratative persona about yourself.  In applications
  such  as hacking,  many  social  engineers have  managed to get computer
  dialup   telephone  numbers,   and  even  passwords,  straight  from the
  administration.  In practicle applications, one may be able to go as far
  as posing AS the administrator, while calling up various computer users,
  and engineering them out of their passwords.

Q. What are the x.25 networks, and how do I gain access to them?

A. Depending  on your  country,  the x.25  networks  can  be  anything from
  Datapac to Iberpac to BT Tymnet to Luxpac. In the United States, the two
  most  popular  x.25 networks  are Sprintnet  and British Telecom Tymnet.
  Regardless  of  which  x.25 networks  your town carries, they all should
  have a dialup to one of these networks.  The first step that you need to
  take  is to  identify  your local  dialup port.  You may find your local
  dialup  port for  Sprintnet  by dialing  1-800-424-9494  (2400 7E1)  and
  connecting. It will give you a prompt saying 'TERMINAL='.  Type 'D1' for
  now.  It will give you an AT '@' prompt.  From here, type 'C MAIL'. When
  it asks for a  Username,  type 'PHONES'.   When it  asks for a password,
  enter  'PHONES'  again.  Now,  use the  menus to find your local dialup.
  Hangup,  and then call it back locally. When you call your local dialup,
  you  will once  again have  to enter your terminal identification at the
  'TERMINAL='.If you have VT100 emulation, then enter VT100 at the prompt.
  Type <CR>  if you don't want to use a terminal  emulation,  and 'D1' for
  the default terminal emulation. Once again you'll be presented with a @.
  This  prompt  lets you know you are connected to the Sprintnet PAD.  PAD
  stands for Packet Assembler/Disassembler. From here, you may now connect
  to other machines that allow for a free remote connection. The adressing
  scheme for Sprintnet is based upon what they call a Network User Address
  (NUA).  A computer's  NUA is usually the area code (but not always) that
  the computer is located in, followed by a one to four digit number.

  The easiest way to  find systems to connect to is to look in Phrack #42,
  LOD/H Technical Journal #4, or 2600 Magazine.  You could, of course scan
  yourself, which is not too hard with the "NUA Attacker," a program which
  is  designed  for a  quick method  of  sequential  scanning  of  certain
  segments  of  possible addresses on Sprintnet. This program can be found
  on most up-to-date hacking/phreaking (H/P) BBS's.

  Another network, BT Tymnet,  is run  and  managed by British Telecom. We
  recommend  against  beginners  using this network without authorization,
  because the level of  security is much higher than that on Sprintnet. It
  has  been said  that British Telecom (BT) has the ability to conduct  an
  intra-network trace of their entire network, in under 5 minutes. You can
  find your local access Tymnet number by dialing 1-800-462-4213. Type "o"
  as  your terminal identification, as that will allow a 8N1 connection to
  be established.

Q. What is the Internet?

A. The  Internet is a high  speed network of computers linked together from
  all  over  the world on x.500 fiber optic cables.  Communications on the
  Internet  can,  and  often times  do,  exceed  57,600  bits  per second.
  Services allowing  you  to  connect to other computers, send mail to any
  network  using  the  domain-name format,  and to obtain files from other
  computers  are  provided  by the Internet.  The  Internet  is the single
  largest  source  for  information  available,  and  thus,  an attractive
  network for hackers.

Q. How do I gain access to the Internet?

A. Several years ago, when the Internet was small (compared to today), and
  connecting only large universities and government computers, it used to
  be almost impossible for an average hacker to gain unauthorized  access
  to a computer on the Internet.  Now,  however, times are changing,  and
  since  the  Internet  has been dubbed by  the media as the 'Information
  Highway',  thousands of computers  have joined the  'net.  Now,  almost
  every university  is on the Internet,  as well as businesses,  military
  sites, gateways onto the x.25 networks, and even some BBS's. Aside from
  hacking  an actual  Internet site,  you  may actually get a  legitimate
  account  with your  local university or other Internet provider.  Fee's
  are usually under $60 a year,  and  are  sometimes  free from Federally
  funded universities.

  Internet  access may also be obtained through the x.25 networks such as
  Sprintnet or  Tymnet.  There  are many computers which are connected to
  the x.25  networks,  as well as the Internet.  It  is  your job to find
  them,  however. :-)  For an  hourly fee,  BIX, Delphi, HoloNET, as well
  as  a few other  commercial  services,  will allow Internet access from
  Sprintnet/Tymnet.  These systems  usually have no password restrictions
  at all,  so  if you  have  a list  of users  on any of  these  systems,
  hacking them out is only a matter of time and persistance.

Q. What are some addresses I may want to try once I have Internet access?

A. Once you have Internet access, you may want to take some time to ensure
  that  you will never  lose the account.  Methods of protecting yourself
  and gaining access  to other accounts  on the system you've hacked, are
  all explained below.  Once  you are  confident that you are fairly well
  hidden and protected,  you  may  want to  gather  information  on other
  computers linked to the Internet. Some of the best sources of addresses
  come from the databases 'rs.internic.net', and 'ddn.mil.net'.  Also, if
  your system has access to GOPHER, you may want to use this in  addition
  to the afore mentioned methods. The one command you need if you wish to
  traverse the network, is TELNET. There are others, such as RLOGIN, FTP,
  and  TFTP,  but  TELNET  is the  most  important  for  your  connection
  purposes. If you  are only familar with this command,  however,  please
  take some time  and read up on  the subject.  There are many BBS's that
  have   full  text  conversions  of  many   printed  books  and  manuals
  concerning the Internet.

                       Miscellaneous Internet sites:
                       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  TELNET irc.demon.co.uk      ----> IRC (Internet Relay Chat) Service. At
                                    the 'login:' prompt, type 'irc'.

  TELNET annex-mines.utah.edu ----> Anonymous TELNET site.  Type 'cli'.

  FTP ftp.eff.org             ----> Large Computer Underground archive.

  FTP cert.org                ----> (C)omputer (E)mergency (R)esponse
                                    (T)eam.  This  FTP  service  provides
                                    warnings to administrators concerning
                                    the latest  holes that  hacker's have
                                    uncovered.

  FTP netsys.com              ----> Has the back issues as well as
                                    current issues of Phrack Magazine.

  FTP zero.cypher.com         ----> Contains many hacking utilties. It is
                                    operated by the Cult of the Dead Cow,
                                    a large hacking group. (cDc)

  You'll notice,  once you get the hang of it, that there are hundreds of
  beneficial  sites out there,  where you  can get anything from the best
  shareware, to pornography, to lyrics to almost any song in existance.

Q. How can I obtain access to a computer system?

A. Basically,  persistance and the actual desire you have to get into  the
  computer  are what counts the most.   When hacking a particular system,
  you  should  take  some time  to be familiar  with whom you are dealing
  with.   Find out who they are,  what they do,  and why they do it.  Try
  and visit  the physical  location of your  target.  Search  though  any
  trash  that you may  find  on-site.  You  should now have a pretty good
  idea  of what  you  are looking for,  and how  to approach getting into
  their computer system.

                 Five Steps to Hacking a Computer System
                 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

   1.)  Identify Your Target

   2.)  Find out as much as you can about their operating system. If you
        know of  any  possible  default passwords, try them. Knowing the
        operating system inside  and out will  not only help you get in,
        but it will give you the upper-hand once you're in;  helping you
        find the information you are looking for,  quickly, efficiently,
        and without being seen.

   3.)  If you have a list of users for that system, run through the
        list using simple, guessable passwords.

   4.)  If they are on a network of some kind,  exploit the insecurities
        of that particular network.  (ie: FINGER, TFTP, and Sendmail  on
        TCP/IP  networks).  If they are not on a TCP/IP network,  or you
        have come  up empty with all of your attempts, then you may wish
        to do some social engineering.  Remember,  if you fail at social
        engineering  on  your  first  attempt,  you may  have ruined all
        possibilities of ever getting into that computer.

   5.)  If all else fails, you may have to resort to brute force hacking
        the  known accounts.   If you have a list of normal users,  than
        this should be time-consuming, BUT likely to work. If you do not
        know of  any users, than you will have to resort to  hacking the
        actual administration accounts. (ie: 'root' on Unix, 'SYSTEM' on
        VMS).  This is not likely to work, and you will most likely have
        to literally try about  one-hundred thousand dictionary words if
        you hope to gain access.  Remember, if the system administration
        decides  to dis-allow  dictionary words  as passwords,  than you
        will not get in with this method!


Q. What is trashing, and how is it beneficial to hacking?

A. Trashing,  also known as  'bin-diving', is one of the most common ways
  for  hackers  to  gain  information  on  a  particular  target.   Most
  businesses  tend to have at  least one bin at their physical location,
  often times containing valuable computer printouts, employee names and
  telephone numbers,  dialup numbers for their computers,  and sometimes
  even passwords.  Most smart businesses  and agencies are now shredding
  most of their valuable trash,  to prevent such information leaking out
  to the public.



Q. What exactly is brute force hacking?

A. Brute force hacking,  or what I like to call 'Front Door Hacking',  is
  hacking  an  account  over  and  over,  attempting to  gain  access by
  sequentially  entering  in dictionary  words as possible passwords. It
  has  it's benefits,  and always, it's drawbacks. If the system you are
  hacking  does  allow dictionary  words  to be used as passwords,  than
  about  80% of the  users  WILL use  dictionary  words for their access
  passwords.  With  a resonable list of users to go by,  you will almost
  always  be able  to get  into a  system  with  security  such as this.
  However,  there  are some  operating systems in existance (such as VMS
  and some versions of Ultrix),   which will  keep track of failed login
  attemps, and report them to the authorized user upon login.  Also, VMS
  will "freeze" an account, if it the operating system detects a certain
  number  of failures on that one account.  Another drawback is the time
  factor.  Even  with an automated  brute force  hacking program it will
  take  many days  for you to reach your goal.  Brute force hacking also
  creates  a lot of "noise".  If the administrators pay any attention to
  their  systems,  they  will  notice  your  attempts,   and  will  take
  appropriate  action  to  deter  them.  For  best results,  brute force
  hacking a system is only wise when all other options have failed.

Q. What are some defaults to common operating systems?

A. Accounts and  passwords  that  are shipped  with  the actual operating
  system  are what  is known as  'defaults'.  These  accounts are set by
  the  company  who writes the software,  and usually have to be changed
  by the administration once they have it completely set up. Often times
  the administrators forget to change these passwords, or in some cases,
  don't  even know they exist.   Below  is a  listing  of  all the known
  default  accounts and passwords that are shipped with some of the more
  popular operating systems.

  Note: Where a frequency is listed, the criteria is taken from what we
        as a group have come across.  The  frequency  is  based  on how
        often  the account is  actually present, NOT based on how often
        the account is left at the default password.

        The frequencies are as follows:

                          100%      ->  Always
                          70% - 90% ->  High
                          40% - 60% ->  Average
                          20% - 30% ->  Unlikely
                          0%  - 10% ->  Rare

         Digital Equipment Corporation - Virtual Memory System (VMS)
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  Recognize it by:
   _______________________________________________________________________
  |                                                                       |
  | Username: ACCOUNT1                                                    |
  | Password: <not echoed>                                                |
  | User authorization failure.                                           |
  |                                                                       |
  |                                                                       |
  |                                                                       |
  | Username: ACCOUNT2                                                    |
  | Password: <not echoed>                                                |
  |                                                                       |
  |     Welcome to VAX/VMS V5.5                                           |
  |                                                                       |
  |  Last interactive login on Saturday, 18-DEC-1993 05:00                |
  |  Last non-interactive login on Thursday, 19-JUL-1990 11:27            |
  |                                                                       |
  | $                                                                     |
  |_______________________________________________________________________|


                 Default and Common Usernames and Passwords

   Account          Password                       Access       Frequency
 --------------------------------------------------------------------------
   SYSTEM        SYSTEM, MANAGER or OPERATOR      Complete       Always
   FIELD         FIELD, SERVICE or TEST           Complete       Always
   SUPPORT       SUPPORT or DEC                   Complete       High
   SYSMAINT      SYSLIB or SYSMAINT               Complete       High
   SYSTEST       UETP or SYSTEST                  Complete       High
   SYSTEST_CLIG  CLIG, SYSTEST, or TEST           Complete       Unlikely
   DEFAULT       USER or DEFAULT                  Normal         High
   DECNET        DECNET, NETWORK, or DIGITAL      Normal         High
   OPERATIONS    OPERATIONS                       Normal         High
   USER          USER                             Normal         High
   LIBRARY       LIBRARY or None                  Normal         Rare - High
   GUEST         GUEST or None                    Normal         Unlikely
   DEMO          None                             Normal         Unlikely



                  Miscellanous Accounts and Passwords:
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
             Account          Password           Frequency
     ---------------------------------------------------------------
    |         VAX               VAX                 Rare            |
    |         VMS               VMS                 Rare            |
    |         DCL               DCL                 Rare            |
    |         DEC               DEC                 Rare            |
    |         TEST              TEST                Unlikely        |
    |         NETNONPRIV        NETNONPRIV          Rare            |
    |         NETPRIV           NETPRIV             Rare            |
    |         ORACLE            ORACLE              Average         |
    |         ALLIN1            ALLIN1              High            |
    |         INGRES            INGRES              High            |
    |         GAMES             GAMES               Average         |
    |         BACKUP            BACKUP              High            |
    |         HOST              HOST                Rare            |
    |         DIGITAL           DIGITAL             Average         |
    |         AUDITLOG          AUDITLOG            Rare            |
    |         REMOTE            REMOTE              Rare            |
    |         SAS               SAS                 Rare            |
    |         FAULT             FAULT               Rare            |
    |         USERP             USERP               Rare            |
    |         VISITOR           VISITOR             Rare            |
    |         GEAC              GEAC                Rare            |
    |         VLSI              VLSI                Rare            |
    |         INFO              INFO                Unlikely        |
    |         POSTMASTER        POSTMASTER/MAIL     Average         |
    |         NET               NET                 Rare            |
    |         NETWORK           NETWORK             Average         |
    |         OPERATOR          OPERATOR            High            |
    |         OPER              OPER                High            |
    |         HYTELNET          HYTELNET            Average         |
    |         PLUTO             PLUTO               Unlikely        |
    |         MMPONY            MMPONY              Unlikely        |
    |_______________________________________________________________|


    Note: On the LIBRARY account, the frequency depends on the actual
          site.   Universities and other educational institutions are
          more than likely to have a LIBRARY account on their system.


                Various "Flavors" the UNIX Operating System
               ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  Recognize it by:
   ____________________________________________________________________
  |                                                                    |
  |                                                                    |
  | ULTRIX V4.2A (Rev. 47) (xenon.xf.com)                              |
  |                                                                    |
  | login: account1                                                    |
  | Password: <not echoed>                                             |
  | Login incorrect.                                                   |
  | login: account2                                                    |
  | Password: <not echoed>                                             |
  | Last login: Wed Dec 15 03:01:39 from SI860B                        |
  |                                                                    |
  |    ULTRIX V4.2A (Rev. 47) System #4: Mon Jun 29 16:10:47 EDT 1992  |
  | Thu Dec 16 14:05:05 EST 1993                                       |
  | %                                                                  |
  |____________________________________________________________________|


  Note: Unlike VMS,  Unix does not have DEFAULT passwords.  The accounts
        listed below are sometimes left unpassworded, and will  not even
        prompt for a 'Password:' prior to logging you into a Unix shell.
        If  there  is  a  password  required  on  one  of the  following
        accounts, than you may have to brute force hack them yourself.


                Default and Common Usernames and Passwords

             Account            Access Level       Frequency
           ---------------------------------------------------
              root               superuser           Always
              makefsys           superuser           High
              mountfsys          superuser           High
              umountfsys         superuser           High
              checkfsys          superuser           High
              sysadm             normal              High
              adm                normal              Average
              bin                normal              Rare
              rje                normal              Rare
              lp                 normal              Unlikely
              daemon             normal              Unlikely
              trouble            normal              Unlikely
              nuucp              normal              Unlikely
              uucp               normal              Average
              sync               normal              High
              batch              normal              Unlikely
              admin              normal              Unlikely
              user               normal              Rare
              demo               normal              Unlikely
              test               normal              Rare
              field              normal              Average
              unix               normal              Unlikely
              guest              normal              Average
              pub                normal              Unlikely
              public             normal              Unlikely
              standard           normal              Unlikely
              games              normal              Unlikely
              general            normal              Unlikely
              student            normal              Rare
              help               normal              Rare
              gsa                normal              Unlikely
              tty                normal              Unlikely
              lpadmin            normal              Unlikely
              anonymous          normal              Unlikely


                        Prime Computer, Inc. PRIMOS
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  Recognize it by:
   ___________________________________________________________________
  |                                                                   |
  | PRIMENET 20.0.0 VOID                                              |
  | login                                                             |
  | User id? account1                                                 |
  | Password? <not echoed>                                            |
  | Invalid user id or password; please try again.                    |
  | login                                                             |
  | User id? account1                                                 |
  | Password? <not echoed>                                            |
  |                                                                   |
  | ACCOUNT1 (user 87) logged in Sunday, 22 Jan 89 16:15:40.          |
  | Welcome to PRIMOS version 21.0.3                                  |
  | Copyright (c) 1988, Prime Computer, Inc.                          |
  | Serial #serial_number (company_name)                              |
  | Last login Wednesday, 18 Jan 89 23:37:48.                         |
  |___________________________________________________________________|

  ID Name           Password     Comment
  -------------------------------------------------------------
  PRIME             PRIME
  SYSTEM            SYSTEM       SYS1 Priorities
  PRIMOS            PRIMOS
  ADMIN             ADMIN        SYS1 Priorities
  RJE               RJE
  DEMO              DEMO
  GAMES             GAMES
  GUEST             GUEST
  REGIST            REGIST
  TEST              TEST
  NETMAN            NETMAN
  PRIRUN            PRIRUN
  TOOLS             TOOLS
  CMDNC0            CMDMNC0
  TELENET           TELENET      Sprintnet Account

                              AT&T System 75's
  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  Recognize it by:
   ___________________________________________________________________
  |                                                                   |
  | Login: account1                                                   |
  | Password: <not echoed>                                            |
  | LOGIN INCORRECT                                                   |
  | Login: account1                                                   |
  | Password: <not echoed>                                            |
  | Terminal Type (513, 4410, 4425): [513]                            |
  |                                                                   |
  |                      Copyright (c) 1986 - AT&T                    |
  |                                                                   |
  |                 Unpublished & Not for Publication                 |
  |                                                                   |
  |                        All Rights Reserved                        |
  |  enter command:                                                   |
  |___________________________________________________________________|

            Account          Password            Description
           -----------------------------------------------------
            enquiry           enquirypw      Read/Write Enabled
            init              initpw         Read/Write Enabled
            browse            looker         Read-Only.
            maint             rwmaint        Read/Write Enabled
            locate            locatepw       Read/Write Enabled
            rcust             rcustpw        Read/Write Enabled
            tech              field          Read/Write Enabled
            cust              custpw         Read/Write Enabled
            inads             inads          Read/Write Enabled
            support           supportpw      Read/Write Enabled
            bcim              bcimpw         Read/Write Enabled

  Note: Depending on the System 75 you have hacked into, the account
        priveleges may be different,  as they are asigned priveleges
        by the administration, NOT by the operating system.

Q. What are some common passwords people use?

A. The following is a listing of the passwords used by Robert Morris, Jr.,
  when  he  hacked  hundreds of I nternet computers with the now infamous
  'Robert Morris Worm'  that brought  the Internet  to an almost complete
  stand-still  in  1988.  They  are  considered  to  be  the  most common
  passwords  for  the  most  common users.  In other words,  don't expect
  priveleged or security-smart people to be using these as passwords.

     aaa                daniel             jester             rascal
     academia           danny              johnny             really
     ada                dave               joseph             rebecca
     adrian             deb                joshua             remote
     aerobics           debbie             judith             rick
     airplane           deborah            juggle             reagan
     albany             december           julia              robot
     albatross          desperate          kathleen           robotics
     albert             develop            kermit             rolex
     alex               diet               kernel             ronald
     alexander          digital            knight             rosebud
     algebra            discovery          lambda             rosemary
     alias              disney             larry              roses
     alpha              dog                lazarus            ruben
     alphabet           drought            lee                rules
     ama                duncan             leroy              ruth
     amy                easy               lewis              sal
     analog             eatme              light              saxon
     anchor             edges              lisa               scheme
     andy               edwin              louis              scott
     andrea             egghead            lynne              scotty
     animal             eileen             mac                secret
     answer             einstein           macintosh          sensor
     anything           elephant           mack               serenity
     arrow              elizabeth          maggot             sex
     arthur             ellen              magic              shark
     asshole            emerald            malcolm            sharon
     athena             engine             mark               shit
     atmosphere         engineer           markus             shiva
     bacchus            enterprise         marty              shuttle
     badass             enzyme             marvin             simon
     bailey             euclid             master             simple
     banana             evelyn             maurice            singer
     bandit             extension          merlin             single
     banks              fairway            mets               smile
     bass               felicia            michael            smiles
     batman             fender             michelle           smooch
     beauty             fermat             mike               smother
     beaver             finite             minimum            snatch
     beethoven          flower             minsky             snoopy
     beloved            foolproof          mogul              soap
     benz               football           moose              socrates
     beowulf            format             mozart             spit
     berkeley           forsythe           nancy              spring
     berlin             fourier            napoleon           subway
     beta               fred               network            success
     beverly            friend             newton             summer
     bob                frighten           next               super
     brenda             fun                olivia             support
     brian              gabriel            oracle             surfer
     bridget            garfield           orca               suzanne
     broadway           gauss              orwell             tangerine
     bumbling           george             osiris             tape
     cardinal           gertrude           outlaw             target
     carmen             gibson             oxford             taylor
     carolina           ginger             pacific            telephone
     caroline           gnu                painless           temptation
     castle             golf               pam                tiger
     cat                golfer             paper              toggle
     celtics            gorgeous           password           tomato
     change             graham             pat                toyota
     charles            gryphon            patricia           trivial
     charming           guest              penguin            unhappy
     charon             guitar             pete               unicorn
     chester            hacker             peter              unknown
     cigar              harmony            philip             urchin
     classic            harold             phoenix            utility
     coffee             harvey             pierre             vicky
     coke               heinlein           pizza              virginia
     collins            hello              plover             warren
     comrade            help               polynomial         water
     computer           herbert            praise             weenie
     condo              honey              prelude            whatnot
     condom             horse              prince             whitney
     cookie             imperial           protect            will
     cooper             include            pumpkin            william
     create             ingres             puppet             willie
     creation           innocuous          rabbit             winston
     creator            irishman           rachmaninoff       wizard
     cretin             isis               rainbow            wombat
     daemon             japan              raindrop           yosemite
     dancer             jessica            random             zap

  In addition to these, some of the more popular passwords are first name,
  last name,  middle name,  licence plate number, middle initial,  popular
  music groups and members, and sometimes even the same as their username.
  The  key is to use common sense  when guessing passwords.  Know who your
  hacking,  and in your best judgement  use only the  passwords  you think
  you'll  have a  chance with.  For instance, on newer versions of the VMS
  software,  passwords  can  be no  shorter  than 6 characters. And,  more
  ominous,  many Unix  and VMS systems now employ a  'non dictionary word'
  password protection.

Q. What are the easiest systems for a beginning hacker to hack?

A. The  easiest  systems for  hackers to  hack,  of course, are those with
  weak security. Default passwords, priveleged accounts left unpassworded
  or easy to guess  passwords,  are all marks  of an insecure system, and
  are  best  for  beginners.  Computers  found  by  wargame  dialing will
  usually produce a rather large quantity of insecure systems.

Q. How can I meet other hackers?

A. Information exchange has always  been one of the more important aspects
  of the  Computer Underground,  therefor information is constantly being
  exchanged on underground BBS's, through the IRC Service on the Internet
  in  digital  and  print  magazines  such  as  Phrack and 2600, and even
  through the public USENET conferences.


Q. How can one safely hack?

A. Although there is no sure-fire method of maintaining your freedom while
  hacking,  there  are  several preventive measures that should be  taken
  prior  to your actual hack.  First,  it  is  always wise to have all of
  the data  pertaining  to  any  hacking  activity encrypted on some form
  of  off-line storage device.  If it is necessary that the data be  kept
  on  your computer  for reference purposes, than keep it encrypted  when
  not  in use.  In  addition  to  encryption,  do  not  keep  any papers,
  printouts  or  ANY hard coded evidence what-so-ever in the vicinity  of
  your computer's location. If the Secret Service were to raid your house
  they will grab  just about  anything that  so much as looks suspicious.
  Next,  do not post any  information  about  your current  hack  on  ANY
  type of BBS.  There are a number  of informants, traders,  and  Federal
  Agents  that are currently on many hacker BBS's, posed as hackers.  And
  last,  if  you  are  caught,  do  not  volunteer any information to the
  authorities,  unless  you have  consulted  with your lawyer first,  and
  he/she  is present at the time.

  To prevent yourself from being caught, always  try and protect  yourself
  with  at least one  outdial.  These outdials  are located in many places
  on Sprintnet/Tymnet  and on the Internet.  They  are modems connected to
  the telephone network,  that  you can use to hide  your actual location.
  Although it is not impossible  for them to still  find you, it will take
  a  lot  more  time  and  energy.  To give  you a  clue on how beneficial
  an outdial is, take into consideration that a trace has to be authorized
  by a  court order from the state.  This takes several weeks itself,  and
  a convincing case.  If  you have three outdial modems, each in different
  states, they MUST get court  orders from each state in order to continue
  the  backwards  trace  to your origin.  This may take several months  or
  longer,  depending on such factors as,  financial funds of your target's
  computer,  desire  of the administration to actually apprehend you,  and
  the type of telephone system you are on.  (older  telephone systems take
  much  more  effort  to conduct  a positive trace ID).  If you are lucky,
  the  remote system will feel the costs and time  do not justify what you
  are gaining  from their  computers, and will just revamp the security of
  their computers.

Q. Where can one find outdials?

A. Outdials  reside on a  number of different networks.  Many corporations
  have  actual  outdial  modems as  one of their services.  Some of these
  are  passworded;  most are not.  Some allow for local calls only;  some
  have  no restrictions  what-so-ever.  There are known outdial modems on
  Sprintnet, Tymnet, and the Internet.

  Private Branch Exchange  (PBX) systems also may be hacked  and modified
  to allow for an outbound extension.  For more information on  PBX's and
  the software that controls them,  read about  them on  popular  hacking
  and phreaking BBS's.

Q. What are the penalties of hacking?

A. In 1993, there were several laws passed in the state of Massachusetts
  that make hacking a Federal Crime.  The penalty is 11 to 13 months of
  imprisonment,  with  an additional $250,000 fine,  as well as 3 years
  probation.  It  is the maliscious hackers that destroy and alter data
  for fun/profit that have caused insane penalties such as these.

Q. And finally, is hacking unethical?

A. A question so seldom asked, yet the answer is almost always assumed.
  There  are ways to be ethical in hacking, and there are ways  to be
  unethical.  The  Xenon Foundation has always employed a great sense
  of respect and admiration for those who have the ability to operate
  large computer systems,  therefor we never intentionally destroy or
  harm  any aspect of a computer's operating functions.   Let this be
  known however,  that there are hackers out there who's main purpose
  behind  what they do is profit,  and/or destruction of data.  It is
  not  fair to class these individuals with other hackers,  since the
  goal is  completely and utterly different.   They are criminals, we
  are explorers.

Note: Those who meddle with viruses,  destructive trojan horse programs,
     and  those who's  day is made  when  they type  'FORMAT C:' at the
     local Radio Shack are NOT hackers... they are  just plain ignorant
     and stupid.



Final Comments --
~~~~~~~~~~~~~~~~~

This FAQ file is in no way expected to answer all of the questions and
beginning  hacker may  have about the digital networks around him, nor
does  it  imply  that  the  Xenon Foundation  has mastered  all of the
digital technology represented in this file.  With every answer, there
is another question... and so it goes.  This is provided as a basis of
understanding  some of the  more basic aspects  of what to expect when
dealing with hacking.  This file does NOT  condone system destruction,
or hacking for profits and/or personal gain!

Thanks to:     The true hacking community and it's supporters

Wake up:       People who think they are "Elite"

Providers:     Women of all ages
              Karl Kunz of Pony Express, for UUCP Internet Mail
              Jolt Cola Inc., for Jolt Cola, the hacker's elixier
              SmithKline Beecham Corp., for Vivarin caffeine pills
              Philip Morris Inc., for Marlboro Cigarettes

Board plug:    Black ICE Consortium (bic.ponyx.com) [508]/998-2400

Internet Mail: [email protected]
              [email protected]