Index
Contents
Introduction: Hackers: Heroes or Villians?, by Gareth Branwyn..................................i
PART ONE
Before Hack
Chapter One: The Basics........................................................................3
Reading vs. Doing ♦ Opening Remarks ♦ Equipment ♦ Modems And Speed ♦ Communications
Software ♦ Handy Features ♦ Data Capture ♦ Past and Future ♦ Days of Yore Live On ♦ Computer
Crime ♦ Stealing Money ♦ Sabotage ♦ Various Thieveries ♦ The Seventh Crime ♦ Hacker
Motivations
Chapter Two: The History Of Hacking...........................................................13
First Carne Hardware ♦ YIPL and TAP ♦ Computer Crime ♦ 2600 ♦ WarGames and Phrack ♦ Shadow
Hawk ♦ The Electronic Frontier Foundation
Chapter Three: Researching The Hack...........................................................19
Targeting ♦ Collecting Information ♦ Some Unusual Research Methods ♦ On-line Computer Simu-
lators and Tutorials ♦ Sorting Through Trash ♦ GIRK ♦ Found Disk Analysis ♦ Check Up ♦ Dam-
age to One Side ♦ Rips and Tears ♦ Imperfections ♦ Examining Screenshots ♦ Snooping
Chapter Four: Passwords And Access Control....................................................35
Passwords ♦ Passwords Supplied by the User ♦ Possible Password Investigation ♦ Password Stud-
ies ♦ Password Restraints ♦ Computer Generated Passwords: Fakery and Analysis of Machine-
Generated Passwords ♦ Non-Random Machine-Generated Passwords ♦ Programs are People Too ♦
Brute Force Methods ♦ Foiling the Brute Force Assault ♦ Conclusion
Chapter Five: Social Engineering..............................................................49
The Noble Form ♦ Hacker as Neophyte ♦ Hacker in Power ♦ Hacker as Helper ♦ Peak Hours ♦
Other Hints ♦ Sample Social Engineering Situations ♦ Miscellaneous Social Engineering Tips ♦
Other Roles ♦ In-Person Engineering ♦ Written Engineering ♦ Request for Information ♦ Message
From God ♦ Trouble in Paradise?
Chapter Six: Reverse Social Engineering.......................................................63
Overcoming Social Engineering Drawbacks ♦ Reverse Social Engineering Sabotage Methods ♦ RSE
Case Study: The Translation Table ♦ Solving thè Sabotage ♦ RSE Advertising Methods ♦ Trouble for
Nothing?
PART TWO
During Hack
Chapter Seven: Public Access Computers And Terminals..........................................71
Introduction to the Three Kinds ♦ CD-ROM Databases and Information Computers ♦ Public Access
Terminals (PATs) ♦ The Bar Code Hack ♦ Hidden Commands ♦ College PATs ♦ Doing it thè B-Z
Way ♦ Shoulder Surfing ♦ Doing it BASICally ♦ Hardware Methods ♦ General Purpose
Microcomputers ♦ Breaking Free ♦ Freedom Means Free Roaming ♦ PACK ♦ Menu Simulation and
Other Sneakiness ♦ Hiding Your Goody Basket ♦ Things to Watch Out For
Chapter Eight: On-Site Hacking: The Trespasser-Hacker.........................................89
Closed-Circuit Television ♦ Biometrie Systems ♦ Always a Way ♦ Acting for thè On-Site Hack ♦
Piggybacking ♦ Other Successful Tricks & Antics ♦ Electronic Passive Computing ♦ Radiation
Comprehension ♦ Van Eck and Britton ♦ Ups and Downs
Chapter Nine: Hacking At Home: Dialing Up Computers With Your Modem...........................99
Reality ♦ Who to Connect to ♦ Paying for thè Pleasure ♦ Packet Switched Networks ♦ Other Net-
works ♦ Finding Dial-Up Numbers ♦ Dial-Up Security Measures ♦ Scrutinize the Login Environ-
ment
Chapter Ten: Electronic Bulletin Board Systems...............................................105
Finding BBS Numbers ♦ Finding Hacker Boards ♦ Making Connections ♦ BBS Features ♦ BBS Ex-
ploitation ♦ Getting to Know You ♦ Bypassing BBS Security ♦ Running a BBS ♦ Midnight Masquer-
ade ♦ Hackmail ♦ Crashing BBSs ♦ Trojan Horses ♦ Covering Up Trojan Horse Activity ♦ While it
is Running ♦ Before & After ♦ A Few Tips for thè Do-It-Yourselfer
Chapter Eleven: Borderline Hacking...........................................................119
Hacking for Ca$h ♦ Filthy Tricks ♦ Bribery ♦ Booze and Broads ♦ Bad Feelings
Chapter Twelve: What To Do When Inside.......................................................123
Hacker Motivations Revisited ♦ Operating Systems ♦ Looking Around ♦ Commands to Look For
and to Use ♦ File Transfer Protocol (FTP) ♦ Fun 'N Games ♦ The User Network ♦ Becoming a
Superuser ♦ Spoofing ♦ Cryptography and DES ♦ Bit by Bit ♦ Program Employment ♦ Viruses ♦
Covert Channels ♦ Get Out of JaU Free ♦ Retuming to thè Scene ♦ Mission Accomplished... Almost!
PART THREE
After Hack
Chapter Thirteen: This Lawful Land...........................................................139
State Computer Crime Laws ♦ Traditional State Crime Laws ♦ Criminal Mischief ♦ Burglary ♦
Fraud ♦ Larceny ♦ Theft of Trade Secrets ♦ Receipt of Stolen Property ♦ Theft of Services or Labor
Under False Pretenses ♦ Interference With Use Statutes ♦ Traditional Federai Crime Laws ♦
Conspiracy ♦ 661, 2113, 641, 912, 1343, 1361, Etc. ♦ Federai Computer Crime Laws, Or: It’s 10:30, Do
They Know Where thè Hackers Are? ♦ Conclusion
Chapter Fourteen: Hacker Security: How To Keep From Getting Caught...........................145
In Researching ♦ In Social Engineering ♦ Dialing In ♦ Laptop Hints ♦ Your On-the-Road Kit ♦
System Tiptoeing ♦ Lessons From the Hospital ♦ BBS Protection ♦ Other On-line Security Steps ♦
Security Logs ♦ In Public and On-Site ♦ While Off-Line: Minimizing Losses ♦ Maintaining Your
Computer ♦ Keeping Your Other Stuff ♦ Conclusion: How to Get Caught
Chapter Fifteen: Conclusion..................................................................161
The Hacker's Ethic ♦ My Code of Ethics ♦ Combining Principles ♦ My One-Person Tiger Team ♦
Principles Combined ♦ Concluding Thoughts ♦ Some Thoughts to the Concerned Administrator ♦
Some Thoughts to the Concerned Hacker
Further Reading..............................................................................169
The Books ♦ Other Sources
Glossary.....................................................................................173
APPENDICES
Appendix A: Explanation of Some ASCII Codes..................................................185
Appendix B: Common Defaults..................................................................189
Appendix C: Common Commands..................................................................191
Appendix D: Novice Word List.................................................................193
Appendix E: Job-Related Word List............................................................197
Appendix F: Technical Word List..............................................................199
Appendix G: Social Security Number Listing and ICAO Alphabet.................................201
Appendix H: Additional R/SE Role Playing Situations..........................................205