[for better viewing use Word Wrap]


            001101101         101    110      001101010         0101010101
            01      01        010    010      10      10        101    101
            10       10       101    001      01       10       101    001
             01        01      0110110101      01        01      001    110
              10       10       1001001010      11       10       010    111   
              01      01        101    010      10      10        010    101
              10011011          010    001      10011010          1011011001

+-----------------------------------------------------------------------------------------------+            
                                   
                                     DIGITAL HACK DOT ORG
 
                                           PRESENTS
   
                                  *INTRODUCTION TO PHREAKING*


                            "knowledge is power, in ze right hands!"

+-----------------------------------------------------------------------------------------------+                                    
                                         DISCLAIMER
                                         ----------
THE INFORMATION PROVIDED HERE-IN IS FOR EDUCATIONAL PURPOSES ONLY.  THE MAIN OBJECTIVE OF THIS TEXT IS TO PROMOTE NET SECURITY AWARENESS.  THE AUTHORS OF THIS TEXT CANNOT BE HELD RESPONSIBLE FOR ILLEGAL ACTIONS ARISING FROM THE MISUSE OF THE MENTIONED TEXT.  IF SHOULD YOU DISAGREE, COMPLETELY OR PARTIALLY, WITH WHAT YOU HAVE JUST READ LEAVE IMMEDIATELY AND STOP READING THIS NOW.


     CONTENTS
     ~~~~~~~~ 
1. --Phreaking--
1.1 Introduction
1.2 Explanation
1.3 Ethics
1.4 Procedures
1.5 Tools
1.6 Acronyms
1.7 Web links
1.8 Books
1.9 Conclusion
2.0 About Digital Hack Dot Org


   1.1 Introduction
   ****************

In the previous two documents we have introduced the reader to hacking and cracking.  Now we will deal with the subject of our last introduction which is non other than phreaking.  Preaking is just another component which makes up the  digital underground today, after hacking and cracking.  But phreaking is distantly associated with hacking and cracking because this subject deals intensively with the study and application of telecommunications and is little concerned about accessing a remote system and retrieve passwords.

   1.2 Explanation
   ***************

A phreaker is defined as a someone who loves telecommunications, thereby modifying the average telecommunication system to suit his/her needs in the exploration of the said system.  Most phreakers are concerned with the telephone and mobilephone systems and few of them are interested in the short-wave radio systems.  So, this document will be concerned with phone phreaking only.  There are two types of phreakers, as with hackers.  There is the phreak who is concerned with listening to other people's conversations and there is the phreak who is concerned with the modification of the average phone system to deepen his/her knowledge of telecommunications and to apply this knowledge to enahnce the telephone system.  Also, it is commonly known in the digital underground that phreakers are people that modify their telephone system so as to make free long distance calls.  Well, these people are in fact called telephone frauds!  Well, only those who get caught.  The ones who don't get caught are sometimes called true phreakers.
Another useful definition of a phreaker formulated by The Magician : "... real phone phreaks are 'telecommunications hobbyists' who experiment, play with and learn from the phone system..."  

Every phreak in the world has enemies lurking behind the receiver, huh just kidding.
The enemies of the US phreakers are the BELL Company Security, FBI, ESS and the CCIS.  The ESS (Electronic Switching System) records calls and traces them back in seconds.  The CCIS (Common Channel Inter-office Signalling) allows for control signals to be sent via separate data links instead of tones over the voice channel, rendering the blue box useless.  

NOTE: Phreakers are called most of the time phreaks.  Only a minority of people use       'phreakers', as it should be used.  The word 'phreak' is the verb concerned with phreaking.  We will however use 'phreak' in this text as noun  for better understanding.

   1.3 Ethics
   **********

The following commandments below are adapted from the underground newsletter 'tap', issue #86 and which phreaks are encouraged to follow, especially young ones.

  > YOU SHALL NOT SPEAK OF IMPORTANT MATTERS OVER THE THIN PHONE LINES AS TO DO SO WOULD RISK        YOUR RIGHT TO FREEDOM

  > YOU SHALL NOT USE YOUR TRUE NAME WHEN SPEAKING TO OTHER PHREAKS AS IT IS KNOWN THAT EVERY        THIRD PHREAK IS AN FBI AGENT

  > YOU SHALL NOT TELL MANY PEOPLE THAT YOU ARE A PHREAK AS TO DO SO WOULD BE USING YOURSELF AS A     SACRIFICIAL LAMB

  > YOU SHALL EARN A GOOD PLACE IN THE SOCIETY AS IT IS KNOWN THAT GOOD CITIZANS ARE SAVED BY THE     SOCIETY, MOST OF THE TIME

  > YOU SHALL NOT ATTRACT THE ATTENTION OF THE AUTHORITIES IN ANY WAY AS THE LESS NOTICEABLE YOU     ARE THE BETTER IT IS

  > YOU SHALL HAVE AMNESIAC, OR DUMB, FRIENDS WHO WILL FORGET THAT YOU CALL THEM ILLEGALLY FOR       THEIR COORPERATION WITH THE AUTHORITIES WILL LESSEN TIME FOR FREEDOM ON EARTH FOR YOU

   1.4 Procedure
   *************

There are not many different ways to become a phreak but the steps listed below are generally the same for most of the actual phreaks out there.

 [*] KNOW YOUR COMPUTER AND OPERATING SYSTEM BY HEART, HOW TO USE THEM EFFICIENTLY

 [*] KNOW ABOUT THE INTERNET, HOW TO USE IT VERY EFFICIENTLY, HOW IT WORKS, IN FACT ALL THAT          THERE IS TO KNOW THE INTERNET
 
 [*] KNOW SOME PARTS OF PHYSICS, ESPECIALLY ALL THE PARTS CONCERNING ELECTRICITY

 [*] KNOW SOME TELECOMMUNICATION TERMINOLOGY (BASIC AND ADVANCED)

 [*] DOWNLOAD ALL PHREAKING INFORMATION YOU CAN GATHER ON THE INTERNET AND READ THEM

 [*] KNOW ALL ABOUT YOUR PHONE SYSTEM, HOW IT WORKS, ETC...

 [*] BUY BOOKS ON THE PHONE SYSTEM, AND CONCERNING TELECOMMUNICAIONS, AND READ THEM

 [*] FIND OUT HOW MANY BOXES EXIST, THEIR FUNCTIONS AND TRY TO BUILD ONE YOURSELF

 [*] FINALLY DON'T PHREAK OUT IF YOU'VE LOST PATIENCE AS IT TAKES A LONG TIME TO BE A REAL           PHREAK!

   1.5 Tools
   *********

Phreaks, like hackers and crackers, all have to use computers one way or the other for phreaking activities.  The average phreak however spends little time on the computer compared to his other two 'collegues'.  Therefore, the tools the average phreak will need are mostly:

 * an internet browser {like Opera}   

 * a good modem {128kps} or any other good connection {DSL}

 * a telephone system

 * a ping utility {as in MS DOS}

 * an ip and port scanner {for e.g. Porter}

 * a war dialer {like The Hacker's Choice}

 * some electrician tools {like screwdrivers, alligator clips, wires, etc...}

 * a 'box' {like a Blue Box}

//////////////////////////////////////////////////////////////////////////////////////|
Before we pass on the next section of this document a few words about the 'boxes'./// |
////////////////////////////////////////////////////////////////////////////////////  |
                                                                                  ||  | 
A 'box', in phreak language, is a device built by a phreak with the sole utility  ||  | 
of enhancing the current phreak's phone system.  There are many kinds of boxes,   ||  |
each with different uses.  For e.g. the Red box is used by phreaks to trick       ||  |
payphones into believing that money has been inserted in the coin slot, thereby   ||  |
enabling the phreaks to make free phone calls from public payphones.  Boxes are   ||  |
identified by their colours, each colour for a specific use.  Furthermore, boxes  ||  |
are cheap and easy to make but it takes time to use them efficiently.  A 'box' is ||  |
most of the time made up of electrical wires, resistors, alligator clips and so on||  |        etc...  Note: some 'boxes' may not concern phreaking but are however useful to the||  |
phreakers.  'Boxes' are also called as Electronic Toll Fraud devices.             || /
/////////////////////////////////////////////////////////////////////////////////////

A list of all the known 'boxes' existing are listed below, please observe that due to the time factor some new 'boxes' may not appear on the list.
-------------------------------------------------------------------------------------------------
Box          Function
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Acrylic      Steal Three-Way-Calling, Call Waiting and programmable Call Forwarding on old 4-wire              phone systems
Aqua         Drain the voltage of the FBI lock-in-trace/trap-trace
Beige        Lineman's hand set
Black        Allows the calling party to not be billed for the call placed
Blast        Phone microphone amplifier
Blotto       Supposedly shorts every fone out in the immediate area
Blue         Emulate a true operator by seizing a trunk with a 2600hz tone
Brown        Create a party line from 2 phone lines
Bud          Tap into your neighbors phone line
Chartreuse   Use the electricity from your phone line
Cheese       Connect two phones to create a diverter
Chrome       Manipulate Traffic Signals by Remote Control
Clear        A telephone pickup coil and a small amp used to make free calls on Fortress Phones
Color        Line activated telephone recorder
Copper       Cause crosstalk interference on an extender
Crimson      Hold button
Dark         Re-route outgoing or incoming calls to another phone
Dayglo       Connect to your neighbors phone line
Delier       Listening to the radio on phone lines
Divertor     Re-route outgoing or incoming calls to another phone
DLOC         Create a party line from 2 phone lines
DNA          Create a "phone book" of cellular IDs
Gold         Dialout router
Green        Emulate the Coin Collect, Coin Return, and Ringback tones
Infinity     Remotely activated phone tap
Jack         Touch-Tone key pad
Light        In-use light
Lunch        AM transmitter
Magenta      Connect a remote phone line to another remote phone line
Mauve        Phone tap without cutting into a line
Neon         External microphone
Noise        Create line noise
Olive        External ringer
Party        Create a party line from 2 phone lines
Pearl        Tone generator
Pink         Create a party line from 2 phone lines
Purple       Telephone hold button
Rainbow      Kill a trace by putting 120v into the phone line (joke)
Razz         Tap into your neighbors phone
Red          Make free phone calls from pay phones by generating quarter tones
Rock         Add music to your phone line
Scarlet      Cause a neighbors phone line to have poor reception
Silver       Create the DTMF tones for A, B, C and D
Static       Keep the voltage on a phone line high
Switch       Add hold, indicator lights, conferencing, etc..
Tan          Line activated telephone recorder
Tron         Reverse the phase of power to your house, causing your electric meter to run slower
TV Cable     "See" sound waves on your TV
Urine        Create a capacitative disturbance between the ring and tip wires in another's                    telephone headset
Violet       Keep a payphone from hanging up
White        Portable DTMF keypad
X            How to connect to a phone cable inside a building
Yellow       Add an extension phone
      
NOTE: THIS LIST WAS ADAPTED FROM AN ANONYMOUS AUTHOR ON THE NET, THE ABOVE LIST WAS UPDATED BY         DHDo
-------------------------------------------------------------------------------------------------

   1.6 Acronyms
   ***************

The acronyms that a new-born phreak should know are listed.  Not all acronyms are listed but only the basics for getting started.

AANI     stands for Ani-Automatic Number Identification
ACCOLC   ACCess OverLoad Class
ACD      Automated Call Distributor
ADS      Asynchronous Dial Service
ANAC     Automatic Number Announcement Circuit
AUTOVON  stands for AUTOmatic VOice Network
AT&T     American Telegraph and Telecommunications
CCIS     Common Channel Inter-office Signaling
CDMA     Code-Division Multiple Access
CMT      Cellular Mobile Telephone
CN/A     Customer Number and Address
COSUARD  Coalition Of Sysops and Users Against Rate Discrimination
CSSC     Customer Sales and Service Center
DA       Direct Assistance
DMS      Digital Multiplex System
DNR      Dialed Number Recorder
DTMA     Dual Tone Multi-Frequency
EBB      Electronic Bulletin Board
ECPA     Electronic Communications Privacy Act
ESN      Electronic Serial Number
ESS      Electronic Switching System
ETF      Electronic Toll Fraud
FDMA     Frequency-Division Multiple Access
Hz       Hertz (unit of frequency)
IPCH     Initial Paging Channel
IMTS     Improved Mobile Telephone Service
ISDN     Integrated Systems Digital Network
LAC      Loop Assignment Center
LASS     Local Area Signalling Services
LND      Last Number Dialed
LU       Local Use
MA BELL  The Bell Telephone Company(USA)owned by AT & T
MF       Multi-Frequency
MIN      Mobile Identification Number
MLVP     Multi-Line Variety Package
MODEM    MOdulator DEModulator
MTSO     Mobile Telephone Switching Office
NAM      Numeric Assignment Module
NTSC     National Television Standard Committee
OCC      Other Common Carriers
ODS      Overhead Data Stream
PBX      Private Branch Exchange
PPS      Pulses Per Second
PRV      Positive Roamer Verification
REMOB    REMote service OBservation system
REN      Ringer Equivalence Number
SCC      Specialized Common Carriers
SID      System Identification
SSS      Strowger Switching System
SxS      Step by Step (a switching system)
UHF      Ultra High Frequency
TACACS   TAC Access Control System
TDMA     Time-Division Multiple Access
TELCO    TELephone COmpany
VMB      Voice Mail Box
VLSIIC   Very Large Scale Integration Integrated Circuit
WES      Western Electronics Switching
XB       Crossbar (a switching system)


   1.7 Web links
   *************
 
Don't forget to check out these links below as they are important for the current phreak, well some of them are.

www.hackersclub.com     - tutorials on hacking, tools and various other useful                                             information[recommended strongly]
www.cyberarmy.com       - offers various links to useful web sites
www.astalavista.com     - up to date tutorials but limited tools (mostly shareware)
www.hackers.com         - nice graphics on site but limited tutorials

help.unc.edu            - know how to use windows efficiently
www.users.globalnet.uk/~jchap.contents - teaches you how to build your own computer

www.borland.com         - very useful tools, such as C++ compiler, free for downloading
www.thefreecountry.com  - free programming tools plus up to date important pc information
www.numega.com          - the site for the company that builds the finest debugger, SoftIce

www.melissavirus.com    - learn all about the melissa virus
www.pcworld.com/cgi-bin/pcwtoday?ID=10302 - learn about the virii affecting our computers today
www.repsec.com          - Repent Security Incorp. gives you useful data on security issues

www.welcome.to/HWA.hax0r.news - site for the Hackers Without Attitude group 
RHINO9.ML.ORG           - visit RHINO9's site
home.cyberarmy.com/tcu  - The Cyber Underground offers tutorials, texts and tools

www.microsoft.com       - visit Bill and learn all about the future programs that we will hack
www.linux.org           - teaches you all about Linux, how to use it and where to get it

www.altavista.com       - seach engine for hackers in need!
www.google.com          - the best search engine on the net, quick and efficient

www.opera.com           - download Opera, the fastest web browser on the net


   1.8 Books
   *********

Listed below are the names of the books that are of particular interest to phreaks.  There is also a list of some phreak magazines that we also recommend to check out, these magazines bring the only regular phreaking news around.

+ MS DOS for dummies 3rd edition or above

+ Computer Security Basics by Deborah Russell and G.T. Gengemi Sr.

+ The Stephen Cobb Complete Book of PC and LAN Security by Stephen Cobb

+ Firewalls and Internet Security by William Cheswick and Steven Bellovin

+ Engineering and Operations in the Bell System by R.F. Rey

+ Telephony: Today and Tomorrow by Dimitris N. Chorafas

+ The Telecommunications Fact Book and Illustrated Dictionary by Ahmed S. Khan

+ Tandy/Radio Shack Cellular Hardware by Judas Gerard and Damien Thorn

+ Principles of Caller I.D. [author not known] Publisher: International MicroPower Corp.

MAGAZINES
~~~~~~~~~
/TAP magazine [the 'official' phone phreak newsletter] 
 ROOM 603
 147 WEST 42ND STREET
 NEW YORK, NY 10036

/

NOTE: Only one magazine is known. If you do however know other phreak magazines please contact us at our e-mail address found at the end of this text and we will gladly publish it in the next version of this text.

   1.9 Conclusion
   **************

This introduction to phreaking has been written in view of helping the average newbie where to begin his long journey into the telecommunication world.  It must have been noted that some information have been taken from various sources ( from 2 sources actually)and this is because we take the best and simplest but do not modify the information, the rest we wrote it.  A brief note to the born newbie: phreaking is a life-long process and can only be acheived by huge amount of practice.  Even a phreak is continually learning new tricks.  This tutorial is presented in its very first version.  However, if you feel that we have missed something then should you contact us through our email listed at the end of this tutorial.  Hence, let the journey into the phreak's world begin!

   2.0 About Digital Hack Dot Org
   ******************************

Digital Hack Dot Org is the newly-borned group of computer loving individuals who are trying to earn a modest place in the vast place of the hacker's underground world.  DHDO compromises of only 4 members namely: sid vici0us (commander in chief), zana tas (secretary), deEp coma (caporal) and digital flu (soldier).  Actually, we were here a long time ago but we have decided to make our presence felt just recently.  The obvious reason for this was that we were all newbies and that we were learning (we still are).  Contributors for writing articles for our next document are welcomed and can reach us at out email listed below.
Keep watching as more tutorials are on their way.
Also, do not forget that real hackers drink milk!!!
  
*************************************************************************************************

             D   I   G   I   T   A   L     H   A   C   K     D   O   T     O   R   G

               k n o w l e d g e  i s  p o w e r, i n  z e  r i g h t  h a n d s !
      
            ==========================HACKERS WITH GRAMMAR===========================
          
                             contact us at amateur@fuckMicrosoft.com
                                    
                                   dhdo.topcities.com/main1.htm

                             introduction into phreaking version 1.0
                                          11/11/2001

       PERMISSION TO DISTRIBUTE & COPY FREELY GIVEN, BUT IT MUST BE SHOWN THAT THE ORIGINAL             
                                AUTHORS ARE DIGITAL HACK DOT ORG
