Archive for the ‘infection cookbook’ Tag

Phreaking Dictionary: What is Phreaking

Wednesday, June 28th, 2017

/-/ Phreak Dictionary /-/

From The InFECTion Cook Book

Here you will find some of the basic but necessary terms that should be known by any phreak who wants to be respected at all.

Phreak : 1. The action of using mischevious and mostly illegal ways in order to not pay for some sort of tele- communications bill, order, transfer, or other service. It often involves usage of highly illegal boxes and machines in order to defeat the security that is set up to avoid this sort of happening. [fr’eaking]. v.

2. A person who uses the above methods of destruction and chaos in order to make a better life for all. A true phreaker will not not go against his fellows or narc on people who have ragged on him or do anything termed to be dishonorable to phreaks. [fr’eek]. n.

3. A certain code or dialup useful in the action of being a phreak. (Example: “I hacked a new metro phreak last night.”)

Switching System: 1. There are 3 main switching systems currently employed in the US, and a few other systems will be mentioned as background. Read the rest of this entry »

Guide: The Art of Carding From the inFECTion Cookbook

Sunday, June 18th, 2017

Guide: The Art of Carding From the inFECTion Cookbook

Obtaining a credit card number: There are many ways to obtain the information needed to card something. The most important things needed are the card number and the expiration date. Having the card-holders name doesn’t hurt, but it is not essential. The absolute best way to obtain all the information needed is by trashing. The way this is done is simple. You walk around your area or any other area and find a store, mall, supermarket, etc., that throws their garbage outside on the sidewalk or dumpster. Rip the bag open and see if you can find any carbons at all. If you find little shreds of credit card carbons, then it is most likely not worth your time to tape together.

Find a store that does not rip their carbons at all or only in half. Another way is to bullshit the number out of someone.

That is call them up and say “Hello, this is Visa security and we have a report that your card was stolen.”

They will deny it and you will try to get it out of them from that point on.

You could say, “It wasn’t stolen? Well what is the expiration date and maybe we can fix the problem…. Ok and what is the number on your card?……Thank you very much and have a nice day.” Or think of something to that degree.

Another way to get card numbers is through systems such as TRW and CBI, this is the hard way, and probably not worth the trouble, unless you are an expert on the system. Using credit card numbers posted on BBS’s is risky. The only advantage is that there is a good chance that other people will use it, thus decreasing the chances of being the sole-offender. The last method of getting numbers is very good also. In most video rental stores, they take down your credit card number when you join to back-up your rentals. So if you could manage to steal the list or make a copy of it, then you are set for a LONG time. Read the rest of this entry »

Guide to Counterfeit Money From the inFECTion Cookbook

Monday, June 12th, 2017
Before reading this article, it would be a very good idea to get a book on photo offset printing, for this is the method used in counterfeiting US currency. If you are familiar with this method of printing, counterfeiting should be a simple task for you. Genuine currency is made by a process called “gravure”, which involves etching a metal block. Since etching a metal block is impossible to do by hand, photo offset printing comes into the process.

Photo offset printing starts by making negatives of the currency with a camera, and putting the negatives on a piece of masking material (usually orange in color). The stripped negatives, commonly called “flats”, are then exposed to a lithographic plate with an arc light plate maker. The burned plates are then developed with the proper developing chemical.

One at a time, these plates are wrapped around the plate cylinder of the press. The press to use should be an 11 by 14 offset, such as the AB Dick 360. Make 2 negatives of the portrait side of the bill, and 1 of the back side. After developing them and letting them dry, take them to a light table. Using opaque on one of the portrait sides, touch out all the green, which is the seal and the serial numbers. The back side does not require any retouching, because it is all one color. Read the rest of this entry »

Basic Hacking Tutorial 1 & 2 From The inFECTion Cookbook

Sunday, June 11th, 2017

From The Infection Cookbook

What is hacking?

According to popular belief the term hacker and hacking was founded at mit it comes from the root of a hack writer,someone who keeps “hacking” at the typewriter until he finishes the story.a computer hacker would be hacking at the keyboard or password works.

What you need:

To hack you need a computer equipped with a modem (a device that lets you transmit data over phone lines) which should cost you from $100 to $1200.

How do you hack?

Hacking requires two things:
1. The phone number
2. Answer to identity elements

How do you find the phone #?

Read the rest of this entry »