home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-02-08 | 57.5 KB | 1,213 lines |
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 1 of 10
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- % %
- % _ _ _______ %
- % | \/ | / _____/ %
- % |_||_|etal/ /hop %
- % _________/ / %
- % /__________/ %
- % %
- % Proudly Presents %
- % %
- % Phrack Inc. Issue Three %
- % %
- % Released Feb 1, 1986 %
- % %
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- The files contained in this issue of Phrack Inc. are as follows:
-
- 1: Index written by Cheap Shades
- 2: Rolm systems written by Monty Python
- 3: Making shell bombs written by Man-Tooth
- 4: Signalling systems around the world by Data Line
- 5: Private audience written by Overlord
- 6: Fortell systems written by Phantom Phreaker
- 7: Eavesdropping written by Circle Lord
- 8: Building a Shock Rod written by Circle Lord
- 9: Introduction to PBX's written by Knight Lightning
- 10: Phreak World News II written by Knight Lightning
-
- If you have an original file that you would like published in a future
- issue of Phrack Inc. Leave E-Mail to Taran King, Knight Lightning, or Myself on
- any system that we are on. If you cannot find us try and contact some member
- of Metal Shop to get into touch with us.
-
- Later,
- ________________
- \Cheap/ \Shades/
- \___/ \____/
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 2 of 10
-
- The purpose of this file is to tell you what you would be dealing with if
- you stumble across this system, or if you know of a company that is using this
- system. It doesn't go into incredible detail, and is lacking in areas. It is
- not a guide to hacking into it, just letting you know what you would be dealing
- with. This is to pique your interest in the system.
-
- So What the Hell is ROLM?
- -------------------------
- ROLM is a "Business Communications System" bought by IBM a few months ago,
- in an effort to compete effectively with AT&T, and get a larger share of the
- market, in a grand master plan to become "Big Daddy Blue" as opposed to "Ma
- Bell". It is a very complex system, with features such as PhoneMail, A
- Super-PBX, Local Area Networks, Public and Private Data Networks, Desktop
- Communications, and Call Management.
- The heart of the system is the Controller, called the CBX <Computerized
- Business Exchange>. This controls the entire network accessible through ROLM.
- Since 1983, the CBX was redesigned and upgraded to the CBX II. It is a PBX with
- much much more <See 'Introduction to PBX's' available on your local bbs> to
- offer, and that is ROLM's claim to fame. It is light years ahead of the regular
- PBX system.
-
-
- The CBX II
- ----------
-
- The CBX II is the core of the ROLM network. It is computer driven and
- expandable from one node, with 165 channels, to 15 nodes providing 11,5200
- 2-way channels. The smaller business could have a model with a 16 user maximum
- limit, but it can go up to 10,000 users, though this would be quite rare <and
- quite God Damn expensive!>. It can be accessed from outside lines <like you> as
- well as HardWired units, with a switching system to prevent busy signals on a
- port. Speed depends on the system in place, either the newer, faster ROLMbus
- 295, or the older standard ROLMbus 74. <see Service manuals for exact details>
- The larger the system, the faster as well. It is adjustable to accept different
- bandwidths for the various components, such as Telex, Voice, Data, Mainframe,
- LAN, Video <ta-da! Picturefones in reality!>, and anything hooked up to the
- system. Similar tasks can be bunched onto one channel as well, at high or low
- speeds. If multiplexing is used <above>, the maximum speed is 192,000 bps, and
- if using a single interface, the top possible rate is a mindboggling 37,000,000
- bps, which if you ask me, if just fluff and not too practical, so they are
- usually multiplexed. <Now, what a difference that is from 300 baud!>. Using
- the CBX II network, you might find just about any kind of mainframe, from HP,
- to DEC, to VAX, to the IBM 327 series.
- Note : There is a smaller version of this called the VSCBX.
-
-
- Phone Mail
- ----------
-
- This is one of the little beauties of the system, something truly fun to
- fuck with. I called ROLM Headquarters in California to ask specific questions
- about ROLM, posing as a researcher, and I got the big runaround, transferred
- from department to department. Maybe you can get further than I. Their is
- 408-986-1000. The to PhoneMail from the outside is 800-345-7355. A nice
- computer-generated voice comes on asking you to enter your Extension number
- <which each employee has>, and then enter the "" sign. Then enter your
- password. If you make around 3 or 4 bad attempts at an Extension of Password,
- it will automatically ring another number, assistance I assume, to find out why
- there has been an unsuccessful entry attempt. I haven't played around with this
- that much, so leave mail to Monty Python with whatever you find. Once entering
- an authorization with correct password, you will be presented with more
- options, leave messages to other people, and whatnot. You can hear your
- messages, forward them to another person, leave the same message to more than
- one person, change your welcome message, etcetera. The service is for those
- business-type pigs who never sit still for one minute, like they are
- permanently on speed.
-
- A Phone Mail Scenario
- ---------------------
-
- Let's say if Mr. Greed goes out to meet his secretary at a motel, but
- definitely has to get that important message from Mr. Rasta, who's bringing in
- $3 mil in Flake, and can't trust it to the person who would handle it <ie: the
- person filling in for his sec with the tremendous tits who is getting balled by
- the dirty old fat man>. Mr. Greed would have given Mr. Rasta his phone and he
- would be forwarded to the Phone Mail network, where he would hear a message
- left my Mr. Greed, to anyone who would call. Mr. Rasta would leave his message
- and hang up. Then Mr. Greed could call up the 800-345-7355 , punch in his
- extension authorization number, and password. Or, if he was back at the office,
- he could get it there through DeskTop communications. Messages can be delivered
- without error, in the person's own voice, without other people knowing about
- it. Therefore, someone with enough knowledge could use an unused account and
- use it as his own service, without the knowledge of others.
-
- DeskTop communications
- ----------------------
-
- ROLM has developed a Computer/Telephone integrated device for use with the
- Desktop communications. It is linked with the CBX II through fone lines, thus
- accessible by you and me from the outside. It is not hardwired, though it can
- approach hardwired speed. If you could get your hands on one of these
- computer/fones then I think you would have found something very useful at home,
- in your general life. But you could access the network without the special
- features of the fone, like one touch dialing, which is designed for the stupid
- lazy businessman. You can access company databases through the network,
- mainframes, other people, just about anything as if you were right there and
- told your secretary to do it for you. There is special software used by the
- computers or computer/fone but it can be improvised and is just an aid. It uses
- a special protocol <Don't know what, try to get your hands on one by trashing a
- sales office>. What is great is that everything is tied together through
- telefone lines, and not RS-232C! Thus, there is an access port....somewhere.
- Scan the 's around the office using ROLM. How do you know if it is using
- ROLM one way or the other. Compile a list of local businesses, call them up
- saying "This is ROLM Customer Support. We have a report of a complaint in your
- CBX II network, let me speak to your supervisor please." If they say "ROLM? CBX
- II? We don't use that" then just apologize and go elsewhere. Or say that you
- are from ROLM corp and would like to know if the company is interested in using
- it to network its system. Like, if they have it already, they would say that
- they had it. And if they didn't, you would just give them a fake <or if
- you're nice the for the local sales office obtainable in the list below>.
-
- But you know what's REALLY Great? They have made the network link in mind
- for the person with a Computer IQ of about 0. Commands are in plain English.
- Here is a demonstration screen as seen in their brochure:
- CALL, DISPLAY or MODIFY
-
- Display groups
-
- ACCESSIBLE GROUPS:
- [00] PAYROLL [01] MODEM [02] IBMHOST
- [03] DOWJONES [04] DECSYSTM [05] MIS-SYSTM
- [06] DALLAS [07] SALES
-
- CALL, DISPLAY OR MODIFY?
- Call Payroll
-
- CALLING 7717 <which would be the ID code for the PAYROLL file>
- CALL COMPLETE
-
- **PAYROLL SYSTEM** <or whatever they want to call it>
- ENTER ACCOUNT CODE:
-
- See, nothing is confusing, everything pretty self-explanatory. There may be
- more than one person wanting to do the same thing you are, so if there is, you
- would be put on a queue for the task. It seems that those with an IBM would be
- best suited for ROLM hacking, because ROLM is owned by IBM, and the PC's used
- by the network are IBM. A person with a simpler fone/Terminal couldn't access
- something like their DEC mainframe, or something like that. By calling in, you
- could not run an application, unless you had a special interface, but you could
- access the database, which any dumb terminal could do.
- However, there are security levels. Thus one with a privileged account
- could access more things than one without it. Like Joe Schmoe in Sales couldn't
- get to Payroll . It seems that for non-IBM's to access some of the parts of the
- network, you would need an interface to become the same thing as a RolmPhone.
- Excessive 's of bad logon attempts, which would be construed as a linking
- error would notify the network manager, And if they saw that there was no
- hardware error, eventually, they would think of if they were somewhat
- experienced, you guessed it, hackers.
-
- The PBX
- -------
-
- ROLM has something called Integrated Call Management <from here on known as
- ICM>. Now, when designing ICM, they must have taken into account the abuse
- possible in plain ol' PBX's. So they put in something called Call Screening.
- This will enable the company to restrict calls to certain 's and prefixes.
- Calls to non-business 's or certain areas can be screened out <"No personal
- calls on my time, Johnson!">, with the exception of 1 specific that you want.
- There is a choice of having a codeless, screened PBX, or a PBX where
- accounts are assigned to each employee, and the 's they call get recorded to
- that account. There can be privileged accounts where a large volume of calls
- would go relatively un-noticed. But I don't think that large-scale abuse of
- this system would be easy or practical. Calls are routed AUTOMATICALLY through
- the service where the rates are cheaper to the location dialed, which is pretty
- fucking cool. And, the PBX is accessible from the outside, using Direct Inward
- System Access, making it AB-useable.
- But what about if there is Equal Access in that area? It doesn't matter,
- the CBX will automatically access the service without you having to worry about
- it <hell, this is totally unnecessary for a hack/phreak, cause we ain't paying
- for the damn call anyhow!>
- BUT!: There is a use of Call Detail Recording, where information on all
- ingoing and outgoing calls are recorded.
-
- Conclusion
- ----------
-
- Not a lot of research went into this file, but it did take a little while
- to type up, and all of the information is correct, to my knowledge. Anyone is
- free to expand on this file into a Part II. It was written to enlighten people
- about this system, and I hope this has helped a little bit.
- Sysops: You are free to put this file up as long as NONE of the credits
- are changed! <this means the Phrack, Inc. AND Personal credits>. Please give us
- a chance.
-
- Coming soon, to a telephone near you: The Return of The Flying Circus. Look
- for it.
- --Later On
- Monty Python <01/11/86>
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 3 of 10
-
-
- ////////////////////\\\\\\\\\\\\\\\\\\\\
- :::: ::::
- :::: "SHOTGUN SHELL BOMBS" ::::
- :::: from ::::
- :::: The Poor Man's James Bond ::::
- :::: by Kurt Saxon ::::
- :::: ::::
- :::: typed in by --] Man-Tooth [-- ::::
- :::: ::::
- \\\\\\\\\\\\\\\\\\\\////////////////////
-
-
- These little goodies are affectionately known as "nut busters." They are
- simply shotgun shells enclosed in cardboard rolls with cardboard fins put on.
- On the primer end of the shell is glued a small cork with a hole drilled
- through it. A roofing nail fits in the hole snugly enough to stay in, but
- loose enough to plunge into the primer upon impact.
-
- Since the shell is not confined in the chamber of the gun, it will
- naturally not cause the same amount of damage. But if it goes off between a
- fellow's legs he can look forward to becoming a soprano.
-
- These bombs are thrown singly or by the handful into the air over milling
- crowds. The weight of the shell and stabilization by the fins causes the nut
- buster to head straight downward.
-
- It has tremendous effect as its presence is usually a suprise. The threat
- of more coming is guaranteed to route any mob.
-
- Not only does it go off on the pavement but it will also explode on
- contact with a person's head or shoulder. At night it is impossible to trace
- its point of origin.
-
- -----
- ! \
- /> ! \ /- Cork
- Fins ! ! v
- --------------------!\
- ! \ ! !-----! ! \ !
- ! \> !------ ! ! !---! <-- Roofing nail
- ! ! !-----! ! / !
- \ --------------------!/
- \ ! ! ^
- \-> ! / ^ \
- ! / ! \
- ----- ! Shell
- !
- !
- Close fitting 3-1/2 inch Aluminum Tubing Glued on Shell.
-
- SHOTGUN SHELL BOMB
-
-
- A clever use for a plain shotgun shell is as a muffler bomb. The shell is
- simply shoved up a car's exhaust pipe with a length of stiff wire until it
- drops into the muffler. After a few minutes on the road the shell explodes,
- totalling out the muffler and treating the driver to a sick kind of panic.
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 4 of 10
-
- Signalling Systems Around the World
-
-
- For those of you who have the desire to make international calls, this info may
- be of interest. Thanks to TAP and Nick Haflinger.
-
- CCITT 1. An old international system, now deceased. Used a 500 Hz tone
- interrupted at 20 Hz (Ring) for 1-way line signals.
-
- CCITT 2. Proposed "International Standard" that never caught on much.
- Used 600 Hz interrupted by 750 Hz. Still used in Australia,
- New Zealand and South Africa.
-
- CCITT 3. An early in-band system that uses 2280 for both line and
- register (!!). Used in France, Austria, Poland and Hungary.
-
- CCITT 4 A variation of 3, but uses 2040 and 2400 for end to end Tx of
- line and register. Used for international Traffic in Europe,
- but cannot be used with TASI (AKA Multiplex or "that dammed
- clipping").
-
- CCITT 5 This is the most popular, and the one used in the US. 2400 and
- the infamous 2600 are used for link to link (not merely end to
- end line signals. Registers are handled via DTMF (Touchtones).
- Anyone know what 2400 does??
-
- CCITT 5 bis. Just like above, but a 1850 Hz tone is used for TASI locking
- and transmission of line signals.
-
- CCITT 6 The newest and worst for phreaks. It uses digital data sent
- out-of-band to control the connection. In other words, the
- connection is made and billing started BEFORE you can get
- control.
-
- CCITT 5R1 A regional system like 5, but doesn't use the mysterious 2400
- and can't use the multiplexer.
-
- CCITT 5R2 Probably the interface to AUTOVON, as it uses 120 Hz spaced
- tones for DTMF instead of 200. Also 3825 Hz is the blow-off
- tone instead of 2600.
-
-
- The "Extra" tones
-
- 1700 + 700 = Inward Operator
- 1700 + 900 = Delay operator, also, in TSPS,STP (a "Zero Plus" call from a coin
- phone)
- 1700 + 1100= KP1 (Start recognition of special tones)
- 1300 + 1700= KP2 (End recognition of special tones)
-
- 12-85 Data Line. CIS 72767,3207: TWX 650-240-6356
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 5 of 10
-
-
- * PRIVATE AUDIENCE *
-
- (A BASIC LESSON IN THE ART OF LISTENING IN)
-
- BROUGHT TO YOU BY
-
- -[ THE OVERLORD ]-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
- PART I: THE LAW
-
-
- Federal law:
- Section 605 of title 47 of the U.S code, forbids interception of
- communication, or divulagance of intercepted communication except by persons
- outlined in section 119 of title 18 (a portion of the Omnibus crime control and
- safe streets act of 1968). This act states that "It shall not be unlawful under
- this act for an operator of a switchboard, or an officer, employee, or agent of
- any communication common carrier who's switching system is used in the
- transmission of a wire communication to intercept or disclose intercepted
- communication."
-
- What all this legal bullshit is saying is that if you don't work for a phone
- company then you can't go around tapping people's lines. If you decide to
- anyway, and get caught, it could cost you up to 5 years of your life and
- $10,000. This, you are all assuming, means that if you tap someone else's line,
- you will be punished....wrong! You can't tap your own line either. The
- punishment for this is probably no more than a slap on the hand, that is if
- they actually catch you, but it's a good thing to know..............now on to
- the fun.....
-
- PART II: TAPPING
-
- Everyone has at some time wanted to hear what a friend, the principal, the prom
- queen, or a neighbor has to say on the phone. There are several easy ways to
- tap into a phone line. None of the methods that I present will involve actually
- entering the house. You can do everything from the backyard. I will discuss
- four methods of tapping a line. They go in order of increasing difficulty.
-
- 1. The "beige box": a beige box (or bud box) is actually better known as a
- "lineman" phone. They are terribly simple to construct, and are basically the
- easiest method to use. They consist of nothing more than a phone with the
- modular plug that goes into the wall cut off, and two alligator clips attached
- to the red and green wires. The way to use this box, is to venture into the
- yard of the person you want to tap, and put it onto his line. This is best done
- at the bell phone box that is usually next to the gas meter. It should only
- have one screw holding it shut, and is very easily opened. Once you are in, you
- should see 4 screws with wires attached to them. If the house has one line,
- then clip the red lead to the first screw, and the green to the second. You are
- then on the "tappee's" phone. You will hear any conversation going on. I
- strongly recommend that you remove the speaker from the phone that you're using
- so the "tappee" can't hear every sound you make. If the house has two lines,
- then the second line is on screws three and four. If you connect everything
- right, but you don't get on the line, then you probably have the wires
- backward. Switch the red to the second screw and the green to the first. If no
- conversation is going on, you may realize that you can't tap the phone very
- well because you don't want to sit there all night, and if you are on the
- phone, then the poor tappee can't dial out, and that could be bad...so.......
- method two.
-
- 2. The recorder: This method is probably the most widespread, and you still
- don't have to be a genius to do it. There are LOTS of ways to tape
- conversations. The two easiest are either to put a "telephone induction pickup"
- (Radio Shack $1.99) on the beige box you were using, then plugging it into the
- microphone jack of a small tape recorder, and leaving it on record. Or plugging
- the recorder right into the line. This can be done by taking a walkman plug,
- and cutting off the earphones, then pick one of the two earphone wires, and
- strip it. There should be another wire inside the one you just stripped. Strip
- that one too, and attach alligators to them. Then follow the beige box
- instructions to tape the conversation. In order to save tape, you may want to
- use a voice activated recorder (Radio Shack $59), or if your recorder has a
- "remote" jack, you can get a "telephone recorder control" at Radio shack shack
- for $19 that turns the recorder on when the phone is on, and off when the phone
- is off. This little box plugs right into the wall (modularly of course), so it
- is best NOT to remove the modular plug for it. Work around it if you can. If
- not, then just do you best to get a good connection. When recording, it is good
- to keep your recorder hidden from sight (in the Bell box if possible), but in a
- place easy enough to change tapes from.
-
- 3. The wireless microphone: this is the BUG. It transmits a signal from the
- phone to the radio (FM band). You may remember Mr. Microphone (from Kaytel
- fame); these wireless microphones are available from Radio Shack for $19. They
- are easy to build and easy to hook up. There are so many different models, that
- is is almost impossible to tell you exactly what to do. The most common thing
- to do is to cut off the microphone element, and attach these two wires to
- screws one and two. The line MIGHT, depending on the brand, be "permanently off
- hook". This is bad, but by phucking around with it for a while, you should get
- it working. There are two drawbacks to using this method. One, is that the poor
- asshole who is getting his phone tapped might hear himself on "FM 88, the
- principal connection". The second problem is the range. The store bought
- transmitters have a VERY short range. I suggest that you build the customized
- version I will present in part four (it's cheaper too). Now on to the best of
- all the methods....
-
- 4. The "easy-talks": This method combines all the best aspects of all the the
- other methods. It only has one drawback... You need a set of "Easy-talk" walkie
- talkies. They are voice activated, and cost about $59. You can find 'em at toy
- stores, and "hi-tech" catalogs. I think that any voice activated walkie talkies
- will work, but I have only tried the easy-talks. First, you have to decide on
- one for the "transmitter" and one for the "receiver". It is best to use the one
- with the strongest transmission to transmit, even though it may receive better
- also. De-solder the speaker of the "transmitter", and the microphone of the
- "receiver". Now, go to the box. put the walkie talkie on "VOX" and hook the
- microphone leads (as in method three) to the first and second screws in the
- box. Now go home, and listen on your walkie talkie. If nothing happens, then
- the phone signal wasn't strong enough to "activate" the transmission. If this
- happens, there are two things you can do. One, add some ground lines to the
- microphone plugs. This is the most inconspicuous, but if it doesn't work then
- you need an amplifier, like a walkman with two earphone plugs. Put the first
- plug on the line, and then into one of the jacks. Then turn the volume all the
- way up (w/out pressing play). Next connect the second earphone plug to the mice
- wires, and into the second earphone outlet on the walkman. Now put the whole
- mess in the box, and lock it up. This should do the trick. It gives you a
- private radio station to listen to them on: you can turn it off when something
- boring comes on, and you can tape off the walkie talkie speaker that you have!
-
- PART IV: WIRELESS TRANSMITTER PLANZ
-
- This is a tiny transmitter that consists on a one colpitts oscillator that
- derives it's power from the phone line. Since the resistance it puts on the
- line is less than 100 ohms, it has no effect on the telephone performance, and
- can not be detected by the phone company, or the tappee. Since it is a
- low-powered device using no antenna for radiation, it is legal to the FCC.
- (That is it complies with part 15 of the FCC rules and regulations). It,
- however is still illegal to do, it's just that what you're using to do it is
- legal. This is explained later in part 15... "no person shall use such a device
- for eavesdropping unless authorized by all parties of the conversation" (then
- it's not eavesdropping is it?). What this thing does, is use four diodes to
- form a "bridge rectifier". It produces a varying dc voltage varying with the
- auto-signals on the line. That voltage is used to supply the the voltage for
- the oscillator transistor. Which is connected to a radio circuit. From there,
- you can tune it to any channel you want. The rest will all be explained in a
- minute....
-
-
-
-
-
- PARTS LIST
- item | description
- -----------------------------------------------------------------
- C1 | 47-Pf ceramic disk capacitor
- C2,C3 | 27-Pf mica capacitor
- CR1,CR2,CR3,CR4 | germanium diode 1n90 or equivalent
- R1 | 100 ohm, 1/4 watt 10% composition resistor
- R2 | 10k, 1/4 watt 10% composition resistor
- R3 | .7k, 1/4 watt 10% composition resistor
- L1 | 2 uH radio frequency choke (see text)
- L2 | 5 turns No.20 wire (see text)
- Q1 | Npn rf transistor 2N5179 or equivalent
- -----------------------------------------------------------------
-
- L1 may be constructed by winding approximately 40 turns of No. 36
- enamel wire on a mega-ohm, 1/2 watt resistor. The value of L1 is
- not critical. L2 can be made by wrapping 5 turns of No. 20 wire
- around a 1/4 inch form. After the wire is wrapped, the form can
- be removed. Just solder it into place on the circuit board. It
- should hold quite nicely. Also be sure to position Q1 so that the
- emitter, base, and collector are in the proper holes. The
- schematic should be pretty easy to follow. Although it has an
- unusual number of grounds, it still works.
-
-
-
-
- |------------------L1----------------|
- -- |
- CR1 / \ CR2 |----------------|
- A--------------/ \ --| ----| | |
- | \ / | | | C2 L2
- | CR3 \ /CR4 | C1 R2 |----| |
- R1 -- | | | gnd C3 |
- | | | ----| |-----|
- | gnd | | |
- | | |-----|----Base collector
- | | R3 \ /
- B-----------------------| | \/\ <- Q1
- gnd \/
- |
- |
- emitter(gnd)
-
-
-
- The odd thing about this bug that we haven't encountered yet, is that it is put
- on only one wire (either red or green) so go to the box, remove the red wire
- that was ALREADY on screw
- 1 and attach it to wire 'A' of the bug. Then attach
- wire 'B' to the screw itself. You can adjust the frequency which it comes out
- on the FM channel by either smooshing, or widening the coils of L2. It takes a
- few minutes to get to work right, but it is also very versatile. You can change
- the frequency at will, and you can easily record off your radio.
-
- PART FIVE: HELPFUL HINTS
-
-
- First of all, With method one, the beige box, you may notice that you can also
- dial out on the phone you use. I don't recommend that you do this. If you
- decide to anyway, and do something conspicuous like set up a 30 person
- conference for three hours, then I suggest that you make sure the people are
- either out of town or dead. In general, when you tap a line, you must be
- careful. I test everything I make on my line first, then install it late at
- night. I would not recommend that you leave a recorder on all day. Put it on
- when you want it going, and take it off when you're done. As far as recording
- goes, I think that if there is a recorder on the line it sends a sporadic beep
- back to the phone co. I know that if you don't record directly off the line
- (i.e off your radio) then even the most sophisticated equipment can't tell that
- you're recording. Also, make sure that when you install something, the people
- are NOT on the line. Installation tends to make lots of scratchy sounds, clicks
- and static. It is generally a good thing to avoid. It doesn't take too much
- intelligence to just make a call to the house before you go to install the
- thing. If it's busy then wait a while. (This of course does not apply if you
- are making a "midnight run").
-
- All in all, if you use common sense, and are *VERY* careful, chances are you
- won't get caught. Never think that you're unstoppable, and don't broadcast what
- you're doing. Keep it to yourself, and you can have a great time.
-
- -[ OVERLORD ]-
-
- THANKS TO:
-
- The CircleLord
- TARAN KING
- Knight Lightning
- The Forest Ranger
- P-80 systems
-
- Watch for more advanced tapping, how they catch you, and verification in the
- near future.
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 6 of 10
-
- Fortell Systems
- Written by Phantom Phreaker
-
- Call The Alliance at 618-667-3825
-
- Fortell systems seem to be a system to monitor lines. They can only be used to
- monitor lines within their own NPA.
- A Fortell system is at 716-955-7750. Whene you call, you will hear:
-
- 'Hello. This is the Taradyne Fortell system. Please enter ID code'
-
- The ID for this system is 722877*. After you type that in (DTMF) it will ask
- 'please enter line number' where you then type the PRE+SUFF of the number you
- wish to check within the NPA of the Fortell.
- After you enter a number, it will repeat the number you entered. Now it will
- ask you to 'please enter mode'.
-
- The modes are:
-
- 1-Calling on other line
- 2-Calling on test line
- 3-Line test results
-
- If you enter mode 1, you will have these commands available:
-
- 1-Fault location
- 2-Other testing
- 7-Test ok, Monitor
- 8-Hang up
- 9-Enter next line number
-
- If you enter 7 here, it will repeat what you selected, and ask for an ID code
- which can be any 6 digit number followed by a *.
-
- Now it will dial and tell you:
- 'Subscriber busy-busy-monitor test in progress conversation on line-short on
- line'
-
- 2-Monitor test
- 3-Overide and test
- 4-Wait for idle
-
- If you enter 2, (Monitor Test) it will tell you the busy status again.
-
- If you enter 3, it will override, or tell you 'Not available in this CO'.
-
- If you enter 4, (Wait for idle) it will wait until the line is idle.
-
-
- If you enter 1 (Fault Location) at the main list you will get these options:
-
- 1-Open location
- 3-Short location
- 4-Cross location
- 5-Ground location
- 8-Hang up
-
- If you enter 2 (Other testing) here, you will have these commands:
-
- 2-Loop Ground OHMS
- 3-Dial tone test
- 5-Pair ID
- 8-Hang up
-
- If you enter Mode 2, you will have these options:(Other testing)
-
- 2-Other testing
- 7-Test ok, Monitor
- 8-Hang up
- 9-Enter next line number
-
- It will repeat what you selected. If you select 2 here, you will now have
- these commands:
-
- 2-Loop Ground Omhs
- 8-Hang up
-
- If you select 7 at the main list after mode 2, it will ask for an ID which is
- any 6 digit number followed by a *. Now it will dial and check the number. If
- the number is busy, it will say 'Subcriber busy-monitor-test in progress-
- conversation on line-short on line-please hang up-waiting for idle' Now you can
- just type * to go back to the main list of commands.
-
- If you enter MODE 3, if you have done a test before, it will give you the
- results of the test. If you haven't done a test, it will tell you so with 'No
- test results available'
-
- You can abort back to the main commands list by typing a *.
-
- By typing a 9 at several places you will be taken back to the beginning where
- it asks you to 'enter line number'
-
-
- PP-01/06/86
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 7 of 10
-
- ***************************************************************
- * *
- * Electronic Eavesdropper *
- * *
- * by *
- * *
- * Circle Lord *
- * *
- ***************************************************************
-
-
- Have you ever considered buying one of those hi powered microphones often
- seen in eletronics magazines, but thought it was to much to buy and to small to
- card? The circuit shown in this file will provide you with the information to
- build one for a lot less money.
- These audio eavesdropping devices are probably one of the hottest items in
- the underground due to their ability to pick up voices through thick walls.
- You can also attach the speaker wires to a tape recorder and save all the
- conversation. As one can see these are great for blackmailing a teacher,
- classmate, principal, neighbor, or whoever you seek services from...
-
-
-
- Parts list:
-
- -=EM--------------------------
- M1 Amplifier Module. (Lafayette 99C9037 or equiv.)
- M2 9-VDC battery.
- M3 Microphone
- R1 20K poteniometer with spst switch.
- S1 Spst switch on R1
- SP1 8-ohm speaker
- T1 Audio transformer (Radio Crap part 273-1380)
-
-
-
- Schematics
- +------+--------M1
- 1 1 1
- 1 1red 1blu
- 1 1 1
- 1 transformer
- 1 1 1
- 1 1yel 1grn
- +------+ 1
- 1 +-----+ +-----+
- 1 1 1 1
- b1 b1 r+M2+b o+S1+o 1
- l1 l1 e1 1l r1 1r 1
- k1 u1 d1 1k g1 1g 1
- ********************** 1
- * yel>*-+ ++
- * * R 1
- * M1 * 1-+ 1
- * red>*-+ 1 1
- * * 1<<
- ********************** 1
- b1 1g y1 1
- l1 1r e1 1
- k1 1y l1 1
- 1 1 +----------+
- +SP1+
-
-
- S1 here is on the potentiometer
- M3 can be an earphone earpiece
-
-
-
-
- ---- /
- / /
- / /
- / ircle / ord
- ---- ----
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 8 of 10
-
- ***************************************************************
- * *
- * Making a Shock Rod *
- * *
- * By *
- * *
- * Circle Lord *
- * *
- ***************************************************************
-
-
- This handy little circuit is the key to generating THOUSANDS of volts of
- electricity for warding off attackers (notice the plural). It generates it
- all from a hefty 6-volt source and is easily fit into a tubular casing.
- Originally used as a fence charger, this circuit can be put to other uses such
- as: charging a whole row of lockers at school, a row of theater seats, or a
- metal bleacher set in the gym. More on this later.
-
- To build this, all you need is a GE-3 transistor, a 6.3-volt transformer, and a
- handful of spare parts from old radios. The ammount of shock you wish to
- generate is determined by the setting of potentiometer R1, a 15,000 ohm
- variable resistor. Hint: for maximum shock, set R1 at maximum!
-
-
- ***************************************************************
- Item * Description
- ***************************************************************
- C1 * 500uF, 10-WVDC electrolytic capacitor
- C2 * 2000uF, 15-WVDC electrolytic capacitor
- M1 * 6-VDC battery
- M2,M3 * Leads
- Q1 * GE-3 transistor (2n555 will also do)
- R1 * 15K potentiometer
- R2 * 160-ohm resistor
- S1 * Spst switch
- T1 * 6.3-VAC filament transformer (Triad F-14x or equiv.)
- X1 * 1N540 diode
-
- ***************************************************************
-
-
- Schematics:
-
- +---C1--------------+
- 1 1 HOT
- 1 +-----+ 1 LEAD
- +---1<Q1 1 )(-->
- R1* + 1 +--->)(
- +-->* 1 1 1 )(
- 1 * +--+ 1 1 )(-->
- 1 1 1 1 1 1 1 TO
- 1 1 1 1 1 1 1 GND
- 1 * C2 1 +---1----+
- 1 R2 1 1 1 1
- 1 * 1 1 1 X1 1
- +---+--+--1---------1-->-+
- 1 +/- 1 1
- +*M1*-*S1*+ GND -
-
-
- ---- /
- / /
- / /
- / ircle / ord
- ---- ----
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 9 of 10
-
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
- @ _ _ _______ @
- @ | \/ | / _____/ @
- @ |_||_|etal / /hop @
- @ __________/ / @
- @ /___________/ @
- @ PRIVATE @
- @ @
- @ Presents... @
- @ @
- @ \\\\\=-{ Knight Lightning's }-=///// @
- @ @
- @ "Introduction to PBXs" @
- @ @
- @ @
- @ Written on January 3, 1986 @
- @ @
- @ @
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
-
- This file is a personal continuation of the PBX entry in the MCI
- Telecommunications Glossary.
- _______________________________________________________________________________
-
- A telephone exchange serving an individual organization and having connections
- to a public telephone exchange is called a Private Branch Exchange (PBX). The
- PBX performs a switching function by connecting any extension in the private
- organization to an outside line. A PBX is actually a private switch that
- connects a group of telephones within an individual organization. Calls placed
- outside this individual group are connected to a telephone company's central
- office switch through trunks. A PBX may be operated by an attendant from the
- private organization or the switching system may be done automatically. Other
- terms that are commonly used interchangeably with PBX are: Private Automatic
- Branch Exchange (PABX), Private Automatic Exchange (PAX), and Computerized
- Branch Exchange (CBX). Although these terms were originally used to identify
- specific switch structures, today they are often used as synonyms.
-
- PBXs can use any of three basic switching methods: step-by-step (SxS),
- Cross-bar (X-bar), and computer controlled, to perform the basic function of
- switching. However, in addition to detecting calls and establishing a
- transmission link between two telephones, PBXs can do much more.
-
- The common control, often called a central processing unit (CPU), controls the
- switching matrix that connects the stations and trunks. The switching matrix
- of a PBX performs the same job as does an operator at a manual switchboard or a
- common control central office switch. The CPU, however, gets its instructions
- from the "stored program", which contains directions for activities, such as
- detecting calls, sending them over the best available route, and recording
- billing information. These computerized electronic switches are used to
- perform routine, as well as unique, functions that simply weren't practical or
- even possible with electromechanical switches.
-
- Just as in the public switched network, PBX switches make connection between
- instruments, or "key telephone sets". We're all familiar with key telephone
- sets, whether we know them by name or not. They're the business telephones
- that have six push-button keys lined up below the dial--a red button marked
- "hold" and five buttons or lines with flashing lights.
-
- Systems with PBXs and key sets have a great deal of flexability in planning for
- their needs because they can set up their codes to accomplish the functions
- needed in their particular situations. In fact, the PBX can be programmed so
- that each individual extension within a system can take advantage of features
- applicable to its own business needs.
-
- Some of the features that are availiable with PBXs and key systems are: call
- transfer, which allows internal or external calls to be transferred from one
- telephone to any other phone in the system; automatic push-button signaling,
- which indicates the status of all phones in the system with display lights and
- buttons; one-way voice paging, which can be answered by dialing the operator
- from the nearest telephone in the system; camp-on, in which a call made to a
- busy phone automatically waits until the line is idle; and internal and
- external conference capabilities, which enables outside callers to conference
- with several inside users.
-
- Some features automatically handle incoming telephone calls. Automatic call
- waiting not only holds calls made to a busy extension until the extension is
- free, but also signals the person being called that a call is waiting and
- informs the caller that he is on hold. Automatic call forwarding will send
- calls to employees who are temporarily in locations other than their offices,
- provided they "inform" the PBX where they can be found. Automatic call
- distribution automatically send an incoming call to the first extension that's
- not busy--a useful feature for situations in which any one of a group of
- persons in the organization can adequately respond to incoming calls. Another
- example is automatic call back, which allows a caller who reaches a busy line
- to ask the PBX to return his or her call when the line is free.
-
- Still other features provide services such as night telelphone answering,
- telephone traffic monitoring, and network or hot-line connection. These
- examples are but a sample from the features possible with computerized PBXs.
-
- ===============================================================================
- This is a very brief description of how to use and what to expect on a PBX.
- -------------------------------------------------------------------------------
- Basically, you call the PBX and you will have to enter a code that can be
- anywhere from 4 to 6 digits (Note: some PBXs do not require codes). Then you
- will hear a dial tone. From here you would under normal circumstances dial:
- 9 + 1 (or 0) + NPA-PRE-SUFF, for long distance dialing or dial 8 for local
- dialing.
-
- The most common use of the PBX is to call Alliance Teleconferencing,
- a teleconference service offered by AT&T. To do this dial:
- 0700-456-1000,1002,1003,2000,2001,2002.
-
- Note: PBX codes are usually very simple and usually 4 digits.
- EX: 0000, 1111, 1234, etc
- ===============================================================================
- Look for a file on Alliance Teleconferencing coming soon...
- _______________________________________________________________________________
-
- This has been a Knight Lightning presentation...
-
- @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
-
-
-
- ==Phrack Inc.==
- Volume One, Issue Three, Phile 10 of 10
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- Phreak World News II
- Compiled by
- \\\\\=-{ Knight Lightning }-=/////
- _______________________________________________________________________________
-
- Retraction
- ----------
- We at Phrack Inc, respectfully retract all statements made in last issue
- concerning Stronghold East Elite and the LOD. We are sorry for any
- inconvenience this may have caused you.
- _______________________________________________________________________________
-
- Phreaks Against Geeks
- ---------------------
- This group was formed as a joke by The W(hack)o Cracko Brothers Inc. on a
- conference in December of 1985. The charter members were TWCB, taRfruS, Blue
- Adept, The Clashmaster, and a few others. Since then, Catcher in the Rye and
- the Slovak have tried to join.
-
- Later that month, Boston Strangler and Micro Man formed PAP, which stands for
- Phreaks Against Phreaks Against Geeks. Other opposers of PAG include:
- Hack Attack, The Detective, Kleptic Wizard and The Overlord 313. It is not
- known if these others are now in PAP or not.
-
- All of this nonsense was really started on the Dartmouth System and is mainly
- a local feud of phreaks in the Boston (617 NPA) area.
- _______________________________________________________________________________
-
- Brainstorm Gets 10 Megs
- -----------------------
- Finally, after several months of promises, Brainstorm (ELITE) now has a 10 Meg
- Hard-drive. As of January 1, 1986 Modern Mutant cleared the userlog of
- Brainstorm and a membership drive was started. Note: To become a member of
- Brainstorm, you will have to take a small (and more or less easy) filter.
- Some other new features on Brainstorm are online games; Karate, Football, and a
- hacking simulation.
- _______________________________________________________________________________
-
- Anarchy Inc. Disbanded
- ----------------------
- Anarchy Inc., a once very famous g-phile writing organization, has been
- disbanded. Basically because most of its membership are now attending college.
- _______________________________________________________________________________
-
- Dartmouth Conferences To Be Abolished?
- --------------------------------------
- This message was given on January 9, 1986 when a user would try to join a
- conference.
-
- XCaliber, Fantasie, Spectre, etc are not available until tomorrow. Due to
- pressure from Kiewit and some users, conferences have been disabled for one
- day. Hopefully this will remind some people that the conferences are a public
- service on the part of a few people and are not a "right". Recent abuse of the
- conferences has made caring for these conferences almost more trouble than they
- are worth. These abuses have also caused some users to complain to Kiewit. Too
- many complaints and they might vanish altogether. If everyone will work at
- keeping the conferences reasonably clean and free of abuse life will be much
- easier. Thank you for your time and appologies for the lack of conferences.
-
- You are no longer connected to conference "XYZ".
-
- Later, Corwin got pissed off by the password abuse that was going on and killed
- almost all non-Dartmouth student passwords. It is also rumored that he took
- down the DUNE bbs, however Apollo Phoebus says that it is a temporary thing and
- that DUNE will be going back up soon.
- _______________________________________________________________________________
-
- MCI Employee Bust
- -----------------
- Employees at MCI were creating fake accounts and then running up massive bills.
- Then later they would either credit the accounts or say that the subscriber
- reported code abuse. Any employee found doing this was fired.
-
- Another way these employees were cheating the company was by reporting code
- abuse on their own accounts, however MCI Security using CNA quickly caught
- these employees.
-
- Note: MCI Security has stated that the only real way that they can catch
- abusers of the phone company is by calling the numbers that the abusers
- call and asking them who they know making these calls.
-
- Information has been provided through MCI Security
- _______________________________________________________________________________
-
- MCI/IBM Merge
- -------------
- MCI Telecommunications company has merged with IBM and their phone industry
- SBS. This was an effort to join the two as strong allies against AT&T.
-
- IBM computers Vs. AT&T computers
-
- MCI Telecommunications Vs. AT&T Telecommunications
-
- Changes arising from this merger (if any) are not known, but none are expected
- for some years.
- _______________________________________________________________________________
-
- The Life And Crimes of the W(hack)o Cracko Brothers
- ---------------------------------------------------
- The date is somewhere in December of 1984. Peter writes a code hacker for the
- Hayes and tells Tim NOT to use it on Sprint because they trace. Sometime later
- that night Tim received a call from Scan Man, sysop of P-80.
-
- Scan Man said he needed TWCB to hack him some Sprint codes cause he didn't have
- the time or a Hayes. Tim did it for him on the 314-342-8900 Sprint extender.
-
- He left it on all night and the next day while he was in school. Sprint traced
- him. At 9:00 AM the next morning agents from the FBI, AT&T, Western Union,
- GTE, and Southwestern Bell, arrived at TWCB's house.
-
- They were let in, bringing with them cameras and tape recorders among other
- equipment. Upon seeing this Peter blew into an upstairs extension and
- cancelled the dialing program, but not before the agents made sure it was the
- right place.
-
- All of TWCB's computer equipment was confiscated and Tim was taken downtown
- shortly after being picked up at school. Peter was sick and left home. Tim
- was later released in his mother's custody.
-
- They each received probation and 100 hours of county service.
-
- That was then...
-
- Recently TWCB has come under investigation for the following: Drug use and
- dealing, burglary, forgery, and fraudulent use of a credit card.
-
- Peter: 8 Class A Felony charges
- 1 Class A Misdemeanor charge
- 1 Class B Misdemeanor charge
-
- Tim: 6 Class A Felony charges
- 2 Class B Misdemeanor charges
-
- Note: Some of these misdemeanors are for not returning library books.
-
- Also it has been said that Tim has been in jail 11 times. Both members of TWCB
- are now enrolled in a reform school.
-
- The information in this article has been provided by TWCB, directly and/or
- indirectly.
- _______________________________________________________________________________
-
- Blue Adept: Gone For Good
- -------------------------
- Blue Adept, known for being an all around loser and Dartmouth impersonator,
- decided to try blue boxing. For some reason he decided to call an out-of-state
- trunk direct.
-
- Later that month Blue Adept and his parents received a phone bill with a
- charge around $386.00. This led to his being restricted from using the phone.
-
- Sometime after this incident Blue Adept received an invitation to join on a
- conference. He wasn't home but his parents decided to stay on and listen in.
-
- Blue Adept is not allowed on conferences anymore and all calls to him are now
- screened.
- _______________________________________________________________________________
-
- Overlord 313 Busted: Step dad turns him in
- ------------------------------------------
- Overlord's step-dad always would be checking his computer to see what was on it
- and what was nearby. Last week he noticed the credits in Overlord's file on
- Wiretapping, which can be seen in this issue of Phrack.
-
- He reported his findings to Overlord's mom. She had a talk with him and he
- promised to stop his evil ways. His step-dad didn't believe him for a second.
-
- 1/11/86
-
- Step-dad goes on business trip, where he meets Ma Bell executive Don Mitchell.
- Step-dad asks all sorts of different questions regarding use of MCI dialups and
- Alliance Teleconferencing, and talks about how his step-son does all these
- things and more. Don strongly suggests that he reports this to the phone
- company...
-
- 1-13-86
-
- HE DOES
- -------
- No legal action against Overlord has taken place as of now.
-
- Information Provided by The Overlord of 313
- _______________________________________________________________________________
-
- Maelstrom 305 Busted
- --------------------
- While I am not at liberty to revel all the information concerning this bust I
- will mention the bare facts.
-
- Maelstrom hacked into the Southern Bell Data Network (SBDN). This system
- happened to be local to him so he did not bother to use an extender.
- Unfortunately this system also had ANI (Automatic Number Identification). His
- computer and other equipment as well as all his files were confiscated as
- evidence.
-
- Information provided by the Maelstrom of 305
- _______________________________________________________________________________
-
- Whackoland BBS
- --------------
- This bbs is now up and running strong. Its sysops are of course...TWCB Inc.
- 300/1200 Baud, and 40 Megs. It has unique features and great mods as well as
- Elite Sections. Call today... 314-256-8220. Note: Only 100 users will be
- kept so if you are just a beginner please don't bother to call.
- _______________________________________________________________________________
-
- R.I.P. Broadway Show
- --------------------
- The Broadway Show BBS in New York is now down, and Broadway Hacker will soon be
- in Washington DC. This C-64 run bbs, was one of the best in its time, but
- later it became a hangout for rodents.
-
- >From its ashes rises a new bbs, however its name has not been released as of
- this writing. Broadway Hacker will sysop this bbs for about a week and then
- turn it over to the new sysop. His name is not yet know, probably since he
- hasn't a handle yet.
-
- Although this new bbs will appear legal and have some legal sections it is
- indeed a phreak bbs, and should be checked out.
-
- 718-615-0580
- _______________________________________________________________________________
-
- Speed Demon Elite Down?
- -----------------------
- This bbs sysoped by Radical Rocker has suddenly disappeared leaving the caller
- with a message of the line being disconnected. No other information is
- available.
- _______________________________________________________________________________
-
- Well that's all for this issue's Phreak World News. If you have anything of news
-
- Knight Lightning/Taran King/Cheap Shades
- _______________________________________________________________________________
-
-
-