7 Gates University
About Us
Acid Banjo
American Interests
Arizona Regional
Psionic Guards
Romulan Hockey
Site Search
Social Unrest
Universal Wholesale
Webmaster's Lounge
You KNOW you've got balls...Professional Grade EquipmentYou'd be a little red too...

Clip Art

Color Choice


Hack Tech



Publicity Stunt

Spyware Killer

Tech Support


Exploit -- A noun that refers to a program that demonstrates or takes advantage of a software security hole.  Writing an exploit is the best way to technically describe a security hole while simultaneously demonstrating it. That's why "White Hat" hackers (hackers who use their skills to help companies discover security problems) often write exploits.

Root -- As a noun, refers to cyberomnipotence, the highest level of access on a computer. Can also be used as a verb. "To root a box" means to obtain root through unconventional means, at which point the system has been "rooted."

Haxored -- A cool underground term for hacking. "I haxored that box."

Trojan -- Shorthand for "Trojan horse," a method of cracking a system by slipping it a seemingly harmless and beneficial program that secretly contains programming that gives an attacker unauthorized access. Common off-the-shelf Trojans include Back Orifice 2000, and Sub-7, recently spotted masquerading as a free Internet adult film -- beware of Greeks bearing porn.

Eleet -- Means "elite," but generally used with sarcastic or self-deprecating humor and spelled out with numerals, not roman letters: 31337. "I hax0red this box with 31337 skillz," might mean, "This was too easy."

Rootkit -- A generic term for a suite of programs that gives a hacker fun things to do after rooting a box. Might include programs for covering your tracks, or for "sniffing" a company's network for interesting traffic.

Zero day -- A security hole that's been discovered by the underground, but not yet by the computer security community.

Docs -- A person's identifying information, like name, email address, social security number, etc. "I rooted his box and downloaded his docs."

Script kiddie -- Someone who uses exploits to penetrate unsecured boxes, deface websites, and generally make trouble, without having the skills to write such a program themselves. Usually a juvenile.

Packet monkey -- A script kiddie who floods computers and websites with data packets, to maliciously take them offline. The distributed denial of service attacks that sometimes afflict popular e-commerce websites are performed by packet monkeys
The very first thing you need to do is get a copy of PKZIP or some other file unzipping utility. Nearly everything that you download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip". Then you need to get yourself a good prefix scanner.(also known as a War Dialer) This is a program that automatically dials phone numbers beginning with the three numbers (prefix) that you specify. It checks to see if the number dialed has a carrier.(series of beeps that tells you that you have dialed a computer) Try and find a large business area prefix to scan. It is these businesses that have interesting computers. There are many good scanners out there, but I would recommend Autoscan or A-Dial. These are very easy to use and get the job done quickly and efficiently.
Another way is through Telenet or some other large network. Telenet is a very large network that has many other networks and remote computers connected to it. 

 -  Function

 - connect to a hose
 - shows network port
 - network echo
 - terminal echo
 - mail. (need ID and password)
 - Mail. (need ID and password)
 - select PAD parameter
 - continue
 - disconnect
 - hangs up.
 - Telenet account. (ID and password)

"Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans.  Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans." Virus: "A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore." Worm: "Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."

Red Box generates tones for free phone calls
Black Box when called, caller pays nothing
Beige Box lineman's handset
Green Box generates coin return tones
Cheese Box turns your phone into a payphone
Acrylic Box steal 3-way calling and other services
Aqua Box stops F.B.I. lock-in-trace
Blast Box phone microphone amplifier
Blotto Box shorts out all phones in your area
Blue Box generates 2600hz tone
Brown Box creates party line
Bud Box tap neighbors phone
Chatreuse Box use electricity from
Chrome Box manipulates traffic signals
Clear Box free calls
Color Box phone conversation
Copper Box causes crosstalk interference
Crimson Box hold button
Dark Box re-route calls
Dayglo Box connect to neighbors phone line
Divertor Box re-route calls
DLOC Box create party line
Gold Box dialout router
Infinity Box remote activated phone
Jack Box touch-tone key pad
Light Box in-use light
Lunch Box AM transmitter

Magenta Box connect remote phone line to another Mauve Box phone tap without cutting into the line Neon Box external microphone Noise Box creates line noise Olive Box external ringer Party Box creates party line Pearl Box tone generator Pink Box creates party line Purple Box hold button Rainbow Box kill trace Razz Box tap neighbors phone Rock Box add music to phone line Scarlet Box causes interference Silver Box create DTMF tones for A,B,C, and D Static Box raises voltage on phone line Switch Box add services Tan Box phone conversation recorder TV Cable Box see sound waves on TV Urine Box create disturbance on phone headset Violet Box stop payphone from hanging up White Box DTMF key pad Yellow Box add line extension
Ports for Trojans UseFul
9 UDP Chargen
21 TCP Blade Runner, Doly Trojan, Fore, FTP trojan, Invisible FTP, Larva, WebEx, WinCrash
23 TCP Tiny Telnet Server
25 TCP Antigen, Email Password Sender, Haebu Coceda, Kuang2, ProMail trojan, Shtrilitz, Stealth, Tapiras, Terminator, WinPC, WinSpy
31 TCP Agent 31, Hackers Paradise, Masters Paradise

41 TCP DeepThroat
58 TCP DMSetup
79 TCP Firehotcker
80 TCP Executor
110 TCP ProMail trojan
121 TCP JammerKillah
129 TCP Password Generator Protocol
137 TCP Netbios name (DoS attacks)
138 TCP Netbios datagram (DoS attacks)
139 TCP Netbios session (DoS attacks)
421 TCP TCP Wrappers
456 TCP Hackers Paradise
531 TCP Rasmin
555 TCP Ini-Killer, Phase Zero, Stealth Spy
666 TCP Attack FTP, Satanz Backdoor
911 TCP Dark Shadow
999 TCP DeepThroat
1001 TCP Silencer, WebEx
1011 TCP Doly Trojan
1012 TCP Doly Trojan
1024 TCP NetSpy
1027 TCP ICQ
1029 TCP ICQ
1032 TCP ICQ
1045 TCP Rasmin
1080 TCP Used to detect Wingate sniffers.
1090 TCP Xtreme
1170 TCP Psyber Stream Server, Voice
1234 TCP Ultors Trojan
1243 TCP BackDoor-G, SubSeven
1245 TCP VooDoo Doll
1600 TCP Shivka-Burka
1807 TCP SpySender
1981 TCP Shockrave
1999 TCP BackDoor
2001 TCP Trojan Cow
2023 TCP Ripper
2115 TCP Bugs
2140 TCP Deep Throat, The Invasor
2565 TCP Striker
2583 TCP WinCrash
2801 TCP Phineas Phucker
2989 UDP Rat
3024 TCP WinCrash
3129 TCP Masters Paradise
3150 TCP Deep Throat, The Invasor
3700 TCP al of Doom
4092 TCP WinCrash
4567 TCP File Nail
4590 TCP ICQTrojan
5000 TCP Bubbel, Back Door Setup, Sockets de Troie
5001 TCP Back Door Setup, Sockets de Troie
5321 TCP Firehotcker
5400 TCP Blade Runner
5401 TCP Blade Runner
5402 TCP Blade Runner
5555 TCP ServeMe
5556 TCP BO Facil
5557 TCP BO Facil
5569 TCP Robo-Hack
5742 TCP WinCrash
6400 TCP The Thing
6670 TCP DeepThroat

6771 TCP DeepThroat
6776 TCP BackDoor-G, SubSeven
6939 TCP Indoctrination
6969 TCP GateCrasher, Priority
7000 TCP Remote Grab
7300 TCP NetMonitor
7301 TCP NetMonitor
7306 TCP NetMonitor
7307 TCP NetMonitor
7308 TCP NetMonitor
7789 TCP Back Door Setup, ICKiller
9872 TCP al of Doom
9873 TCP al of Doom
9874 TCP al of Doom
9875 TCP al of Doom
9989 TCP iNi-Killer
10067 TCP al of Doom
10167 TCP al of Doom
10520 TCP Acid Shivers 
10607 TCP Coma
11000 TCP Senna Spy
11223 TCP Progenic trojan
12076 TCP GJamer
12223 TCP Hack´99 KeyLogger
12345 TCP GabanBus, NetBus, Pie Bill Gates, X-bill
12346 TCP GabanBus, NetBus, X-bill
12361 TCP Whack-a-mole
12362 TCP Whack-a-mole
12631 TCP WhackJob
13000 TCP Senna Spy
16969 TCP Priority
20000 TCP Millennium
20001 TCP Millennium
20034 TCP NetBus 2 Pro
21544 TCP GirlFriend
22222 TCP Prosiak
23456 TCP Evil FTP, Ugly FTP
26274 UDP Delta Source
29891 UDP The Unexplained
30029 TCP AOL Trojan
30100 TCP NetSphere
30101 TCP NetSphere
30102 TCP NetSphere
30303 TCP Sockets de Troie
31337 TCP Baron Night, BO client, BO2, Bo Facil
31337 UDP BackFire, Back Orifice, DeepBO
31338 TCP NetSpy DK
31338 UDP Back Orifice, DeepBO
31339 TCP NetSpy DK
31666 TCP BOWhack
31789 TCP Hack'A'Tack
33333 TCP Prosiak
34324 TCP BigGluck, TN
40412 TCP The Spy
40421 TCP Agent 40421, Masters Paradise
40422 TCP Masters Paradise
40423 TCP Masters Paradise
40425 TCP Masters Paradise
40426 TCP Masters Paradise
47262 UDP Delta Source
50505 TCP Sockets de Troie
50766 TCP Fore
53001 TCP Remote Windows Shutdown
54321 TCP School Bus
60000 TCP Deep Throat 


  • Steganography and Watermarking
  • D.I.R.T.
  • How to Build a HERF Device
  • How to Build a LASER Listener
  • H ow to Benchtop TEMPEST Interceptor
  • Anti-Online
  • Attrition.org
  • Hacker News Network
  • Daily Hack News
  • Active Matrix's Hideaway
  • Cracking.... The Code of Ethics
  • Remote Explorer
  • E-Ma il Bombs and Countermeasures
  • How to find security holes
  • Flaws in Computer Systems
  • Autonomous Mobile Cyber Weapons
  • Cracking DES
  • PalmPilot Phreaking
  • Exploit World
  • Microsoft Security Exploits
  • Techn iques Adopted By "System Crackers"
  • How to finger a user via telnet
  • How to forge email -- and how to spot forgeries
  • How finger can be used as to crack into non-public parts of an Internet host
  • How to get Usenet spammers kicked off their ISPs
  • More on dealing with Usenet spammers
  • How to nuke offensive Web sites
  • Internet for Dummies
  • Linux for beginners
  • Intro to TCP/IP - Oversized ping packet and denial-of-service exploits explained
  • More on TCP/IP - Port surfing! Daemons!
  • The L0pht
  • Black Crawling Systems Archives
  • Cult of the Dead Cow
  • 2600 Magazine
  • The Original & World Famous "CrookBook"
  • European Satellite Hacking Page
  • Phrack Magazine
  • Bri ans Hacking Page
  • Ice9
  • Sniffit
  • Ways that Malicious Hackers can get your Passwords
  • Technotronic
  • Re verse Code Engineering
  • German Computer Freaks
  • Chaos Computer Club
  • HTML Hacking Scripts
  • Th e How To Hacker's Defense Site in Zero to 60 Seconds
  • The Nexus
  • The Black Hole
  • The Replay Remailer - Anonymous E-mail
  • E-Mail Bomber
  • The Goose
  • The Internet Underground
  • Welcome to the Underground - No More Secrets
  • Wiretap at Spies.Com
  • DefCon
  • Guide to Lockpicking
  • Tel ecom Digest Archives for Phreakers
  • Under ground Filez
  • Hacks & Cracks Home Page
  • Klud ge
  • Crypt Newsletter
  • White Lightning
  • People Hacking
  • "Social Engineering" just a new twist on an old con game
  • Cracking a Social Engineer
  • Social Engineering Intro and stuff
  • Live Social Engineering: The Camera Trick
  • Social Engineering Exploits
  • Social Engineering Tips
  • Internet Mind Games
  • How to find people ONLINE... A "how to" manual....
  • Narc on your enemies! Make their lives hell!
  • Hacking & Phreaking Filez - A - H
  • Hacking & Phreaking Filez - I - Q
  • Hacking & Phreaking Filez - R - Z
  • Hacking in Progress
  • Bok ler's Guide to "Cracker" Software
  • Biohazard
  • Captain Crunch
  • Fravia's Reverse Engineering Page
  • The Hacker Crackdown
  • Unauthorized Access
  • Mind Vox
  • Minor Threat
  • The Havoc Technical Journal
  • EHAP - Ethical Hackers Against Pedophilia
  • Klon
  • Legion of Doom
  • Logic Bomb's Information Tenement
  • Phone Losers of America
  • Satan
  • Steppin's Underground Links
  • Takedown
  • Lost in the Matrix
  • The Strange World of Tapu
  • RootShell - Tons of Filez & Appz for Hacking
  • Chaostic.com
  • Hackers Domain
  • The Final Frontier's Virus & Source Code Links
  • Compute r Virus Research Lab
  • Phreak's Virii
  • Welcome to Godland - Virii
  • Learn ing about Cryptography
  • Crypt o Glossary and Dictionary of Technical Cryptography
  • Windows Buffer Overflow
  • 1631 Providers of Internet Access
  • System One
  • N ightmare Jokers Virii World
  • The 80's Hacking Text Archives
  • MailBomb er Archives
  • Man Eats Dog
  • The Hacking & Anarchy Archives
  • Arc hive of Hacked Web Sites
  • People Hacking: The Psychology of Social Engineering
  • Social Engineering - just a new twist on anold con game
  • Cracking a Social Engineer
  • The Complete Social Engineering FAQ
  • CIAC
  • Comput er Security Technology Center
  • COAS T
  • Computer Crime
  • High Tech Crime Investigation Association
  • National Computer Security Association
  • National White Collar Crime Center
  • InfoSecurity News
  • Site Security HandBook
  • Association for Computing Machinery
  • Computer Crime Laws
  • Computer Security Research Centre
  • Information Security Institute
  • NIST
  • InfoWar
  • S ecurity Digest
  • Information Systems Security Association
  • Secure Computing Magazine
  • The Computer Underground
  • SPAWAR InfoSec Web Site
  • Computer Security FAQ's
  • U CL Crypto Group
  • RSA Data
  • Cypherpunks Home Page
  • Alt.2600 Hack FAQ
  • Comp uters & Society Archives
  • Cipher
  • Risks-List Forum Archives
  • The Computer Security Act
  • Crypt Newsletter Home PAge
  • The Computer Law Observer
  • L0pht Security Advisories
  • Security Mailing Lists
  • The Manhattan Cyber Project
  • Center for Secure Information Systems
  • Sneakers - Tiger Team Mailing List
  • GrayAreas
  • Journal of Computer Security
  • Disaster Recovery Journal
  • Virus Bulletin
  • The WWW Security FAQ
  • alt.comp.v irus.FAQ
  • The Sniffer FAQ
  • The Hacker Crackdown
  • TakeDown
  • Break In
  • The Social Organization of the Computer Underground
  • Rise of the Underground Engineer
  • Cryptography FAQ
  • Computer Viruses - Prevention, Detection & Treatment
  • The Green Book
  • G uide for Protecting LAN's & WAN's
  • Cyphernomicon
  • Information Warfare
  • How to Hacker-Proof your Computer System
  • Impr ove the Security of your Site by Breaking into It
  • St eganography Info & Archive
  • United Nations Manual on Computer Related Crime
  • Department of Justice Guidelines for Searching & Seizing Computers
  • Computer Fraud & Abuse Act
  • SCAB - Seized Computer Analysis Software
  • Foreign Industrial Espionage Threat
  • Clipper Chip Reverse Engineering
  • Digital Crime Investigative Network
  • Investigators & the Internet
  • Summary of FBI Computer Systems
  • The National Security Agency Handbook
  • Data Recovery Software
  • Computer Crime Research Resources
  • TEMPEST Monitoring in the Real World
  • TEMPEST Monitoring - How it's Done
  • Rise of the TEMPEST
  • Electronic Eavesdropping Machines for Christmas?
  • The Moller Paper on TEMPEST
  • Seline Paper on TEMPEST
  • EMP & TEMPEST Protection for Facilities
  • The ORIGINAL Wim Van Eck Paper on TEMPEST
  • Reception of Electromagnetic Radiation from RS232 Cables
  • Com plete TEMPEST Solutions
  • TEMPEST in a Teapot
  • The FAA and HERF
  • HERF - High Energy Radio Frequency
  • Hardening your Computing Assets against HERF
  • Killing your Enemies Computer for Fun & Profit
  • Rumors about HERF Guns
  • HERF & EMP
  • Electroma gnetic Effects
  • Police Prepare Stunning End for High-Speed Car Chases
  • Electromagnetic Methods
  • Destructive Energy Devices
  • Magnetic Manipulation of the Mains
  • MIT Distribution Site for PGP - Pretty Good Privacy
  • PGP Phone
  • Nautilus Secure Phone Software
  • Shredder 95
  • Garbage Can
  • ICQ Internet Pager
  • Misc Security Programs
  • KeyLogger95 V. 2.0
  • BCWipe for Windows 95/Windows NT 4.0 .
  • Password Cracking Programs
  • Computer Security Tools
  • More Security Tools
  • MS-DOS System Security Tools
  • UNIX General Security Tools
  • M acIntosh General Security Tools
  • Security Tools Collection
  • Security Tools for Internet Administrators
  • Wall's List of Computer Security Tools
  • Computer Security Tools & Resources
  • Security Administration Tools
  • Encryption & Security Tools
  • Dave Central - Encryption Tools Archive
  • Fr eeWare Encryption Tools
  • Anti-Virus Tools Shareware & Freeware
  • An ti-Virus Tools for 1997
  • Anti-Vir us Tools
  • Ant i-Virus Tools and Techniques
  • Virus and Anti-virus Information
  • Anti-Virus Scanners for Windows
  • Anti-Virus Scanners for Windows 95
  • TCP Sequence Predator 1
  • TCP Sequence Predator 2
  • U DP Denial ov Service
  • ICMP Unreachable Attack
  • Telnet Gateway
  • NUKE
  • Oct opus PortStrangler
  • Cloak