Phrack is an e-zine written by and for hackers , first published November 17, 1985. It had a wide circulation which included both hackers and computer security professionals.
62-584: Originally covering subjects related to phreaking , anarchy and cracking , its articles also cover a wide range of topics including computer and physical security , hacking , cryptography , counter culture and international news. Phrack has been described as having "had its finger on the pulse of hacker culture ", and being "hugely influential in the early days of hacker culture". Issues of Phrack are divided in volumes, covering 1 or more years of publication. There were 3 hardcover releases. Each hardcover release contained most (but not all) articles of
124-539: A " black box " used to make free long-distance phone calls, and included a very short parts list that could be used to construct one. AT&T forced Ramparts to pull all copies from shelves, but not before numerous copies were sold and many regular subscribers received them. In the 1980s, the revolution of the personal computer and the popularity of computer bulletin board systems (BBSes) (accessed via modem ) created an influx of tech-savvy users. These BBSes became popular for computer hackers and others interested in
186-422: A 6-digit card and once every 1000 tries for a 7-digit card. While this is almost easy enough for people to do manually, computers made the task far easier. "Code hack" programs were developed for computers with modems. The modems would dial the long-distance access number, enter a random calling card number (of the proper number of digits), and attempt to complete a call to a computer bulletin board system (BBS). If
248-409: A call, the companies kept the calling card numbers short – usually 6 or 7 digits. This opened up a huge vulnerability to phone phreaks with a computer. 6-digit calling card numbers only offer 1 million combinations. 7-digit numbers offer just 10 million. If a company had 10,000 customers, a person attempting to "guess" a card number would have a good chance of doing so correctly once every 100 tries for
310-402: A form of in-band signaling , and included some tones which were for internal telephone company use. One internal-use tone is a tone of 2600 Hz which causes a telephone switch to think the call had ended, leaving an open carrier line, which can be exploited to provide free long-distance, and international calls. At that time, long-distance calls were more expensive than local calls. The tone
372-401: A group of phreaks, known as "Group Bell". Bernay initiated a similar group named the "Mark Bernay Society". Both Bernay and Evan received fame amongst today's phone phreakers for internet publications of their collection of telephone exploration recordings. These recordings, conducted in the 1960s, 1970s, and early 1980s are available at Mark's website Phone Trips . In October 1971, phreaking
434-399: A long whistle to reset the line, followed by groups of whistles (a short tone for a "1", two for a "2", etc.) to dial numbers. While single-frequency worked on certain phone routes, the most common signaling on the then long-distance network was multi-frequency (MF) controls. The slang term for these tones and their use was "Marty Freeman". The specific frequencies required were unknown to
496-452: A new release", and on May 27, 2007, issue 64 was released by a new board of editors referring to themselves as " The Circle of Lost Hackers " (TCLH). TCLH released issue #65 of Phrack on April 11, 2008 and issue #66 on June 11, 2009. On March 15, 2010, it was announced that the 67th issue would be released on July 11, but it was later postponed. Phrack issues are released irregularly, and issues are grouped into volumes. Each issue comprises
558-437: A number of Philes: stand-alone text files of technical or counter-cultural content. Philes are submitted by members of the hacker underground community, and are reviewed by the editors. In addition to technical articles, Phrack also provided a focus for news and gossip among the hacker community. In the 1990 National Computer Security Conference , Sheldon Zenner and Dorothy Denning suggested that Phrack articles contained
620-571: A rudimentary understanding of how phone networks worked. Bill discovered that a recorder he owned could also play the tone at 2600 Hz with the same effect. John Draper discovered through his friendship with Engressia that the free whistles given out in Cap'n Crunch cereal boxes also produced a 2600 Hz tone when blown (providing his nickname, "Captain Crunch"). This allows control of phone systems that work on single frequency (SF) controls. One can sound
682-441: A safe phone number for phreaks to give out to one another as home phone numbers and personal cellular numbers would allow the phreak's identity (and home address) to be discovered. This is especially important given that phone phreaks are breaking the law. Phreakers also use "bridges" to communicate live with one another. The term "bridge" originally referred to a group of telephone company test lines that were bridged together giving
SECTION 10
#1732854750333744-444: A staple of the phreaker community. This community included future Apple Inc. co-founders Steve Jobs and Steve Wozniak . The blue box era came to an end with the ever-increasing use of digital telephone networks which allowed telecommunication companies to discontinue the use of in-band signaling for call routing purposes. Instead, telecom companies began employing common-channel signaling (CCS), through which dialing information
806-482: A subculture saw a brief dispersion in fear of criminal prosecution in the 1990s, before the popularity of the internet initiated a reemergence of phreaking as a subculture in the US and spread phreaking to international levels. The 1984 AT&T breakup gave rise to many small companies intent on competing in the long-distance market. These included the then-fledgling Sprint and MCI , both of whom had only recently entered
868-573: Is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term phreak is a sensational spelling of the word freak with the ph- from phone , and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak , phreaker , or phone phreak are names used for and by individuals who participate in phreaking. The term first referred to groups who had reverse engineered
930-553: Is a very short single click, possible but hard to simulate. Back in the day of rotary dial, technically identical phone sets were marketed in multiple areas of the world, only with plugs matched by country and the dials being bezeled with the local standard numbers. Such key-locked telephones, if wired to a modern DTMF capable exchange, can also be exploited by a tone dialer that generates the DTMF tones used by modern keypad units. These signals are now very uniformly standardized worldwide. It
992-518: Is an attack on a website that changes the visual appearance of a website or a web page . These are typically the work of hackers , who break into a web server and replace the hosted website with malware or a website of their own. Defacement is generally meant as a kind of electronic graffiti and, like other forms of vandalism , is used to spread messages by politically motivated "cyber protesters" or hacktivists . Website defacement can involve adding questionable content or removing or changing
1054-417: Is notable that the two methods can be combined: Even if the exchange does not support DTMF, the key lock can be circumvented by switch-hooking, and the tone dialer can be then used to operate automated DTMF controlled services that can not be used with rotary dial. The origins of phone phreaking trace back at least to AT&T 's implementation of fully automatic switches . These switches used tone dialing ,
1116-459: Is still available, for example in Italy. Possibly one of the first phreaking methods was switch-hooking, which allows placing calls from a phone where the rotary dial or keypad has been disabled by a key lock or other means to prevent unauthorized calls from that phone. It is done by rapidly pressing and releasing the switch hook to open and close the subscriber circuit, simulating the pulses generated by
1178-598: The World Wide Web and they often seek to take measures to protect themselves from defacement or hacking in general. Websites represent the image of a company or organisation for whom defacement may cause significant loss. Visitors may lose faith in sites that cannot promise security and will become wary of performing online transactions . After defacement, sites have to be shut down for repairs and security review, sometimes for an extended period of time, causing expenses and loss of profit and value. In 2024, activists hacked
1240-566: The "keys to the kingdom", and the intricacies of the phone system were at the disposal of people with a knowledge of electronics. The second generation of phreaks arose at this time, including New Yorkers "Evan Doorbell", "Ben Decibel" and Neil R. Bell and Californians Mark Bernay, Chris Bernay, and "Alan from Canada". Each conducted their own independent exploration and experimentation of the telephone network, initially on an individual basis, and later within groups as they discovered each other in their travels. "Evan Doorbell", "Ben" and "Neil" formed
1302-639: The 1960s when it was discovered that certain whistles could replicate the 2600 Hz pitch used in phone signalling systems in the United States. Phone phreaks experimented with dialing around the telephone network to understand how the phone system worked, engaging in activities such as listening to the pattern of tones to figure out how calls were routed, reading obscure telephone company technical journals (often obtained through dumpster diving ), social engineering , building electronic devices called blue boxes , black boxes , and red boxes to help them explore
SECTION 20
#17328547503331364-700: The E911 system. It had been copied from a BellSouth computer and played a major part in a series of Secret Service raids called Operation Sundevil and featured in Bruce Sterling 's book The Hacker Crackdown . Phrack' s editor, Knight Lightning , was arrested and charged with access device fraud and transportation of stolen property. The proceedings which ensued are known formally as United States v. Riggs , named for Knight Lightning 's co-defendant Robert Riggs. The Electronic Frontier Foundation filed an amicus brief supporting Knight Lightning, and helped to get
1426-453: The US, as the monopoly of AT&T Corporation was forced into divestiture. During this time, exploration of telephone networks diminished, and phreaking focused more on toll fraud. Computer hackers began to use phreaking methods to find the telephone numbers for modems belonging to businesses, which they could exploit later. Groups then formed around the BBS hacker/phreaking (H/P) community such as
1488-508: The United States as of 2020. It is rare to find a diverter solely used for Answering Service forwarding anymore, but the many other types such as phone-company test numbers and remote PBX DISAs are still used as diverters. Before the BBS era of the 1980s phone phreaking was more of a solitary venture as it was difficult for phreaks to connect with one another. In addition to communicating over BBSs phone phreaks discover voice mail boxes and party lines as ways to network and keep in touch over
1550-431: The United States, with strict regulations. In some locations, calling across the street counted as long distance. To report that a phone call was long-distance meant an elevated importance because the calling party is paying by the minute to speak to the called party. Some phreaking consists of techniques to evade long-distance charges, which is criminalized as " toll fraud". In 1990, the pager cloning technique arose and
1612-512: The advent of VoIP, the use of telephone company-owned bridges has decreased slightly in favor of phreaker-owned conferences. The end of multi-frequency (MF) phreaking in the lower 48 United States occurred on June 15, 2006, when the last exchange in the contiguous United States to use a "phreakable" MF-signalled trunk replaced the aging (yet still well kept) N2 carrier with a T1 carrier . This exchange, located in Wawina Township, Minnesota ,
1674-538: The alias Phrackstaff. In 2005, it was announced that Phrack was to come to an end, with the 63rd issue as its last. To commemorate Phrack' s final appearance, the issue was to be a hardback edition, released simultaneously at the DEF CON and What the Hack conventions on July 29. An e-zine version of the release followed on August 1. The European printer for the hardcopies of Phrack to be distributed at Defcon refused to fulfil
1736-424: The beginnings of YIPL ( Youth International Party Line ), a publication started by Abbie Hoffman and Al Bell to provide information to Yippies on how to "beat the man ", mostly involving telephones. In the first issue of YIPL , writers included a "shout-out" to all of the phreakers who provided technological information for the newsletter: "We at YIPL would like to offer thanks to all you phreaks out there." In
1798-437: The bill for the long-distance calls, as it was their own private equipment (not phone company security flaws) that allowed such fraud to occur. By 1993, call forwarding was offered to nearly every business line subscriber, making these diverters obsolete. As a result, hackers stopped searching for the few remaining ones, and this method of toll fraud died. Many (different type) of diverters still exist and are actively "phreaked" in
1860-483: The case dropped by introducing a witness who showed that Bellcore was selling more detailed documentation to the E911 system for as little as $ 13 to anyone who asked. The E911 document had initially been valued by the prosecution at almost $ 80,000. The case was then dropped. After the arrest of Knight Lightning, and the shutdown of Phrack by the US Secret Service in late December 1989 a few weeks after issue #30
1922-469: The computer connected successfully to the BBS, it proved that it had found a working card number, and it saved that number to disk. If it did not connect to the BBS in a specified amount of time (usually 30 or 60 seconds), it would hang up and try a different code. Using this method, code hacking programs would turn up hundreds (or in some cases thousands) of working calling card numbers per day. These would subsequently be shared amongst fellow phreakers. There
Phrack - Misplaced Pages Continue
1984-465: The content to make it questionable, or including nonsensical or whimsical references to websites or publicly editable repositories to harm its reputation. Methods such as a web shell may be used to aid in website defacement. Religious and government websites are regularly targeted by hackers in order to display political or religious beliefs, whilst defacing the views and beliefs of others. Disturbing images and offensive phrases might be displayed in
2046-470: The e-zine release. Both the hardcover and e-zine were released simultaneously. Phrack , first released on November 17, 1985, takes its name from the words " phreak " and " hack ". The founding editors of the magazine, known by the pseudonyms "Taran King" and "Knight Lightning", edited most of the first 30 editions. Editions were originally released onto the Metal Shop bulletin board system , where Taran King
2108-431: The editorship of daemon9/route in 1996, Phrack' s orientation shifted toward computer security and its focus drew closer to the current definition of hacking . The 24th issue of Phrack , released February 1989, included a document relating to the workings of Enhanced 911 emergency response systems. This document was an administrative document describing which parts of the organization are responsible for what parts of
2170-471: The effect of a party-line. Eventually, all party-lines, whether bridges or not, came to be known as bridges if primarily populated by hackers and/or phreakers. The popularity of the Internet in the mid-1990s, along with the better awareness of voice mail by business and cell phone owners, made the practice of stealing voice mailboxes less popular. To this day bridges are still very popular with phreakers yet, with
2232-453: The famous Masters of Deception ( Phiber Optik ) and Legion of Doom ( Erik Bloodaxe ) groups. In 1985, an underground e-zine called Phrack (a combination of the words phreak and hack) began circulation among BBSes, and focused on hacking, phreaking, and other related technological subjects. In the early 1990s, groups like Masters of Deception and Legion of Doom were shut down by the US Secret Service 's Operation Sundevil . Phreaking as
2294-466: The files from the previous issues. With the growing use of the internet and interest in computer security, from 1996 Phrack became increasingly oriented toward computer security . The editorship was handed to route along with voyager until 2000 (release #56). During this period, the Phrack website was defaced several times and the magazine was often unavailable. Since 2001 Phrack has been edited under
2356-580: The general public until 1954, when the Bell System published the information in the Bell System Technical Journal in an article describing the methods and frequencies used for inter-office signalling. The journal was intended for the company's engineers; however, it found its way to various college campuses across the United States. With this one article, the Bell System accidentally gave away
2418-505: The last issue, YIPL stated: YIPL believes that education alone cannot affect the System, but education can be an invaluable tool for those willing to use it. Specifically, YIPL will show you why something must be done immediately in regard, of course, to the improper control of the communication in this country by none other than bell telephone company. In 1973, Al Bell would move YIPL over and start TAP (Technological American Party). Al Bell
2480-518: The late 1970s. TAP ended publication in 1984 due mostly to a break-in and arson at Tom Edison's residence in 1983. Cheshire Catalyst then took over running the magazine for its final (1984) year. A controversially suppressed article "Regulating the Phone Company In Your Home" in Ramparts magazine (June 1972) increased interest in phreaking. This article published simple schematic plans of
2542-400: The marketplace. At the time, there was no way to switch a phone line to have calls automatically carried by non-AT&T companies. Customers of these small long-distance operations would be required to dial a local access number, enter their calling card number, and finally enter the area code and phone number they wish to call. Because of the relatively lengthy process for customers to complete
Phrack - Misplaced Pages Continue
2604-399: The network and make free phone calls, hanging out on early conference call circuits and "loop arounds" to communicate with one another and writing their own newsletters to spread information. Phreaking was especially prevalent in universities, where it began spreading much like computer hacking would in the following decades. Before 1984, long-distance telephone calls were a premium item in
2666-519: The opportunity this provided, and they would spend hours manually dialing businesses after hours, attempting to identify faulty diverters. Once a phreaker had access to one of these lines, they could use it for one of many purposes. In addition to completing phone calls anywhere in the world at the businesses' expense, they could also dial 1-900 phone sex/entertainment numbers, as well as use the line to harass their enemies without fear of being traced. Victimized small businesses were usually required to foot
2728-620: The order once they realized that they were printing a hacking book. Two University of Arizona students filled the gap and printed between 100 and 200 copies of Phrack 63 in time for release at Defcon 13. The copies of Phrack 63 distributed at Defcon 13 are each stamped with a "serial" number on the inside of the last page. It is believed that there are 100 numbered copies of Phrack 63 distributed at Defcon. All copies were hand cut and bound; unnumbered copies may be unreleased "extras", or may have cutting errors that meant they were deemed them unfit for distribution. Issue 63 told readers to "expect
2790-406: The process, as well as a signature of sorts, to show who was responsible for the defacement. Websites are not only defaced for political reasons; many defacers do it just for the thrill. For example, there are online contests in which hackers are awarded points for defacing the largest number of web sites in a specified amount of time. Corporations are also targeted more often than other websites on
2852-461: The pulses or clicks and interprets them in two possible ways. Depending on continent and country, one click with a following interval can be either "one" or "zero" and subsequent clicks before the interval are additively counted. This renders ten consecutive clicks being either "zero" or "nine", respectively. Some exchanges allow using additional clicks for special controls, but numbers 0-9 now fall in one of these two standards. One special code, "flash",
2914-401: The rotary dial. Even most current telephone exchanges support this method, as they need to be backward compatible with old subscriber hardware. By rapidly clicking the hook for a variable number of times at roughly 5 to 10 clicks per second, separated by intervals of roughly one second, the caller can dial numbers as if they were using the rotary dial. The pulse counter in the exchange counts
2976-443: The same factual content in computer and security magazines, but differed in tone. Phrack is especially popular due to the general high standard of the releases compared to other underground zines, but has made its reputation from a number of high-quality articles. Several regular columns are present in most issues of Phrack , such as: [REDACTED] Media related to Phrack at Wikimedia Commons Phreaking Phreaking
3038-404: The system of tones used to route long-distance calls . By re-creating the signaling tones, phreaks could switch calls from the phone handset while avoiding long-distance calling charges which were common then. These fees could be significant, depending on the time, duration and destination of the call. To ease the creation of the routing tones, electronic tone generators known as blue boxes became
3100-433: The technology, and served as a medium for previously scattered independent phone phreaks to share their discoveries and experiments. This not only led to unprecedented collaboration between phone phreaks, but also spread the notion of phreaking to others who took it upon themselves to study, experiment with, or exploit the telephone system. This was also at a time when the telephone company was a popular subject of discussion in
3162-429: The telephone. They usually appropriate unused boxes that are part of business or cellular phone systems. Once a vulnerable mailbox system is discovered, word would spread around the phreak community, and scores of them would take residence on the system. They use these systems as a "home base" for communication with one another until the rightful owners discover the intrusion and wipe them off. Voice mailboxes also provide
SECTION 50
#17328547503333224-413: The two lines together. This gave the appearance to the caller that they were directly forwarded to the company's answering service. The switching equipment would typically reset the line after the call had hung up and timed out back to dial tone, so the caller could simply wait after the answering service had disconnected, and would eventually get a usable dial tone from the second line. Phreakers recognized
3286-480: The use of an access number. Another method of obtaining free phone calls involves the use of "diverters". Call forwarding was not an available feature for many business phone lines in the late 1980s and early 1990s, so they were forced to buy equipment that could do the job manually between two phone lines. When the business would close, they would program the call diverting equipment to answer all calls, pick up another phone line, call their answering service, and bridge
3348-465: Was a sysop , and widely mirrored by other boards. Its headquarters was in Austin, Texas. During its first 10 years of publication, Phrack was largely associated with telecommunications fraud, providing material for phreakers and information about arrests in the community through its Phrack World News feature articles. Along with the release of articles such as "Smashing The Stack For Fun And Profit" and
3410-411: Was denied opening a bank account under the name of Technological American Party , since he was not a political party , so he changed the name to Technological Assistance Program to get a bank account. TAP developed into a major source for subversive technical information among phreaks and hackers all over the world. TAP ran from 1973 to 1984, with Al Bell handing over the magazine to "Tom Edison" in
3472-516: Was discovered in approximately 1957, by Joe Engressia , a blind seven-year-old boy. Engressia had perfect pitch , and discovered that whistling the fourth E above middle C (a frequency of 2637.02 Hz) would stop a dialed phone recording. Unaware of what he had done, Engressia called the phone company and asked why the recordings had stopped. Joe Engressia is considered to be the father of phreaking. Other early phreaks, such as "Bill from New York" (William "Bill" Acker 1953-2015), began to develop
3534-464: Was introduced to the masses when Esquire magazine published a story called "Secrets of the Little Blue Box" by Ron Rosenbaum . This article featured Engressia and John Draper prominently, synonymising their names with phreaking. The article also attracted the interest of other soon-to-be phreaks, such as Steve Wozniak and Steve Jobs , who went on to found Apple Computer . 1971 also saw
3596-486: Was no way for these small phone companies to identify the culprits of these hacks. They had no access to local phone company records of calls into their access numbers, and even if they had access, obtaining such records would be prohibitively expensive and time-consuming. While there was some advancement in tracking down these code hackers in the early 1990s, the problem did not completely disappear until most long-distance companies were able to offer standard 1+ dialing without
3658-458: Was released, some attempts were made to resurrect Phrack under the editorship of Doc Holiday and Crimson Death. However, the lack of consent from the original editor to accept this Phrack Classic led to a new editorship for issue #33 by Dispater under the name Diet Phrack until issue #41. Issue #42 was released under the editorship of Erik Bloodaxe in 1992. In September 1994, the first Phrack website appeared with release #46, containing all
3720-599: Was run by the Northern Telephone Company of Minnesota. Recent notable instances of phreaking involve hacking of VOIP systems. In 2011, the government of the Philippines and the FBI arrested four hackers for phone phreaking through PBX hacking. In 2015, Pakistani officials arrested a prominent phreaker who had amassed more than $ 50 million from PBX hacking activities. Website defacement Website defacement
3782-470: Was sent on a separate channel that was inaccessible to the telecom customer. By the 1980s, most of the public switched telephone network (PSTN) in the US and Western Europe had adopted the SS7 system which uses out-of-band signaling for call control (and which is still in use to this day), therefore rendering blue boxes obsolete. Phreaking has since become closely linked with computer hacking . Phreaking began in
SECTION 60
#17328547503333844-501: Was used by law enforcement . In the UK the situation was rather different due to the difference in technology between the American and British systems, the main difference being the absence of tone dialing and signaling , particularly in the 1950s and 1960s. The tone system in the United States has been almost entirely replaced, but in some countries, in addition to new systems, the tone system
#332667