home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Phoenix Rising BBS
/
phoenixrising.zip
/
phoenixrising
/
phrack
/
phrack03.arj
/
PHRACK3.PHK
Wrap
Text File
|
1990-05-18
|
55KB
|
1,216 lines
==Phrack Inc.==
Volume One, Issue Three, Phile #1 of 10
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% _ _ _______ %
% | \/ | / _____/ %
% |_||_etal/ /hop %
% _________/ / %
% /__________/ %
% %
% Proudly Presents %
% %
% Phrack Inc. Issue Three %
% %
% Released Feb 1, 1986 %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
The files contained in this issue of Phrack Inc. are as follows:
1: Index written by Cheap Shades
2: Rolm systems written by Monty Python
3: Making shell bombs written by Man-Tooth
4: Signalling systems around the world by Data Line
5: Private audience written by Overlord
6: Fortell systems written by Phantom Phreaker
7: Eavesdropping written by Circle Lord
8: Building a Shock Rod written by Circle Lord
9: Introduction to PBX's written by Knight Lightning
10: Phreak World News II written by Knight Lightning
If you have an original file that you would like published in a future issue
of Phrack Inc. Leave E-Mail to Taran King, Knight Lightning, or Myself on any
system that we are on. If you cannot find us try and contact some member of
Metal Shop to get into touch with us.
Later,
________________
\Cheap/ \Shades/
\___/ \____/
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #2 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
The purpose of this file is to tell you what you would be dealing with if you
stumble across this system, or if you know of a company that is using this
system. It doesn't go into incredible detail, and is lacking in areas. It is
not a guide to hacking into it, just letting you know what you would be dealing
with. This is to pique your interest in the system.
So What the Hell is ROLM?
-------------------------
ROLM is a "Business Communications System" bought by IBM a few months ago, in
an effort to compete effectively with AT&T, and get a larger share of the
market, in a grand master plan to become "Big Daddy Blue" as opposed to "Ma
Bell". It is a very complex system, with features such as PhoneMail, A
Super-PBX, Local Area Networks, Public and Private Data Networks, Desktop
Communications, and Call Management.
The heart of the system is the Controller, called the CBX <Computerized
Business Exchange>. This controls the entire network accessible through ROLM.
Since 1983, the CBX was redesigned and upgraded to the CBX II. It is a PBX
with much much more <See 'Introduction to PBX's' available on your local bbs>
to offer, and that is ROLM's claim to fame. It is light years ahead of the
regular PBX system.
The CBX II
----------
The CBX II is the core of the ROLM network. It is computer driven and
expandable from one node, with 165 channels, to 15 nodes providing 11,5200
2-way channels. The smaller business could have a model with a 16 user maximum
limit, but it can go up to 10,000 users, though this would be quite rare <and
quite God Damn expensive!>. It can be accessed from outside lines <like you>
as well as HardWired units, with a switching system to prevent busy signals on
a port. Speed depends on the system in place, either the newer, faster ROLMbus
295, or the older standard ROLMbus 74. <see Service manuals for exact details>
The larger the system, the faster as well. It is adjustable to accept
different bandwidths for the various components, such as Telex, Voice, Data,
Mainframe, LAN, Video <ta-da! Picturefones in reality!>, and anything hooked
up to the system. Similar tasks can be bunched onto one channel as well, at
high or low speeds. If multiplexing is used <above>, the maximum speed is
192,000 bps, and if using a single interface, the top possible rate is a
mindboggling 37,000,000 bps, which if you ask me, if just fluff and not too
practical, so they are usually multiplexed. <Now, what a difference that is
from 300 baud!>. Using the CBX II network, you might find just about any kind
of mainframe, from HP, to DEC, to VAX, to the IBM 327# series.
Note : There is a smaller version of this called the VSCBX.
Phone Mail
----------
This is one of the little beauties of the system, something truly fun to fuck
with. I called ROLM Headquarters in California to ask specific questions about
ROLM, posing as a researcher, and I got the big runaround, transferred from
department to department. Maybe you can get further than I. Their # is
408-986-1000. The # to PhoneMail from the outside is 800-345-7355. A nice
computer-generated voice comes on asking you to enter your Extension number
<which each employee has>, and then enter the "#" sign. Then enter your
password. If you make around 3 or 4 bad attempts at an Extension of Password,
it will automatically ring another number, assistance I assume, to find out why
there has been an unsuccessful entry attempt. I haven't played around with
this that much, so leave mail to Monty Python with whatever you find. Once
entering an authorization # with correct password, you will be presented with
more options, leave messages to other people, and whatnot. You can hear your
messages, forward them to another person, leave the same message to more than
one person, change your welcome message, etcetera. The service is for those
business-type pigs who never sit still for one minute, like they are
permanently on speed.
A Phone Mail Scenario
---------------------
Let's say if Mr. Greed goes out to meet his secretary at a motel, but
definitely has to get that important message from Mr. Rasta, who's bringing in
$3 mil in FLake, and can't trust it to the person who would handle it <ie: the
person filling in for his sec with the tremendous tits who is getting balled by
the dirty old fat man>. Mr. Greed would have given Mr. Rasta his phone # and
he would be forwarded to the Phone Mail network, where he would hear a message
left my Mr. Greed, to anyone who would call. Mr. Rasta would leave his
message and hang up. Then Mr. Greed could call up the 800-345-7355 #, punch
in his extension authorization number, and password. Or, if he was back at the
office, he could get it there through DeskTop communications. Messages can be
delivered without error, in the person's own voice, without other people
knowing about it. Therefore, someone with enough knowledge could use an unused
account and use it as his own service, without the knowledge of others.
DeskTop communications
----------------------
ROLM has developed a Computer/Telephone integrated device for use with the
Desktop communications. It is linked with the CBX II through fone lines, thus
accessible by you and me from the outside. It is not hardwired, though it can
approach hardwired speed. If you could get your hands on one of these
computer/fones then I think you would have found something very useful at home,
in your general life. But you could access the network without the special
features of the fone, like one touch dialing, which is designed for the stupid
lazy businessman. You can access company databases through the network,
mainframes, other people, just about anything as if you were right there and
told your secretary to do it for you. There is special software used by the
computers or computer/fone but it can be improvised and is just an aid. It
uses a special protocol <Don't know what, try to get your hands on one by
trashing a sales office>. What is great is that everything is tied together
through telefone lines, and not RS-232C! Thus, there is an access
port....somewhere. Scan the #'s around the office # using ROLM. How do you
know if it is using ROLM one way or the other. Compile a list of local
businesses, call them up saying "This is ROLM Customer Support. We have a
report of a complaint in your CBX II network, let me speak to your supervisor
please." If they say "ROLM? CBX II? We don't use that" then just apologize
and go elsewhere. Or say that you are from ROLM corp and would like to know if
the company is interested in using it to network its system. Like, if they
have it already, they would say that they had it. And if they didn't, you
would just give them a fake # <or if you're nice the # for the local sales
office obtainable in the list below>.
But you know what's REALLY Great? They have made the network link in mind
for the person with a Computer IQ of about 0. Commands are in plain English.
Here is a demonstration screen as seen in their brochure:
CALL, DISPLAY or MODIFY
Display groups
ACCESSIBLE GROUPS:
[00] PAYROLL [01] MODEM [02] IBMHOST
[03] DOWJONES [04] DECSYSTM [05] MIS-SYSTM
[06] DALLAS [07] SALES
CALL, DISPLAY OR MODIFY?
Call Payroll
CALLING 7717 <which would be the ID code for the PAYROLL file>
CALL COMPLETE
**PAYROLL SYSTEM** <or whatever they want to call it>
ENTER ACCOUNT CODE:
See, nothing is confusing, everything pretty self-explanatory. There may be
more than one person wanting to do the same thing you are, so if there is, you
would be put on a queue for the task. It seems that those with an IBM would be
best suited for ROLM hacking, because ROLM is owned by IBM, and the PC's used
by the network are IBM. A person with a simpler fone/Terminal couldn't access
something like their DEC mainframe, or something like that. By calling in, you
could not run an application, unless you had a special interface, but you could
access the database, which any dumb terminal could do.
However, there are security levels. Thus one with a privileged account could
access more things than one without it. Like Joe Schmoe in Sales couldn't get
to Payroll . It seems that for non-IBM's to access some of the parts of the
network, you would need an interface to become the same thing as a RolmPhone.
Excessive #'s of bad logon attempts, which would be construed as a linking
error would notify the network manager, And if they saw that there was no
hardware error, eventually, they would think of if they were somewhat
experienced, you guessed it, hackers.
The PBX
-------
ROLM has something called Integrated Call Management <from here on known as
ICM>. Now, when designing ICM, they must have taken into account the abuse
possible in plain ol' PBX's. So they put in something called Call Screening.
This will enable the company to restrict calls to certain #'s and prefixes.
Calls to non-business #'s or certain areas can be screened out <"No personal
calls on my time, Johnson!">, with the exception of 1 specific # that you want.
There is a choice of having a codeless, screened PBX, or a PBX where accounts
are assigned to each employee, and the #'s they call get recorded to that
account. There can be privileged accounts where a large volume of calls would
go relatively un-noticed. But I don't think that large-scale abuse of this
system would be easy or practical. Calls are routed AUTOMATICALLY through the
service where the rates are cheaper to the location dialed, which is pretty
fucking cool. And, the PBX is accessible from the outside, using Direct Inward
System Access, making it AB-useable.
But what about if there is Equal Access in that area? It doesn't matter, the
CBX will automatically access the service without you having to worry about it
<hell, this is totally unnecessary for a hack/phreak, cause we ain't paying for
the damn call anyhow!>
BUT!: There is a use of Call Detail Recording, where information on all
ingoing and outgoing calls are recorded.
Conclusion
----------
Not a lot of research went into this file, but it did take a little while to
type up, and all of the information is correct, to my knowledge. Anyone is
free to expand on this file into a Part II. It was written to enlighten people
about this system, and I hope this has helped a little bit.
Sysops: You are free to put this file up as long as NONE of the credits are
changed! <this means the Phrack, Inc. AND Personal credits>. Please give us
a chance.
Coming soon, to a telephone near you: The Return of The Flying Circus. Look
for it.
--Later On
Monty Python <01/11/86>
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #3 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
////////////////////\\\\\\\\\\\\\\\\\\\\
:::: ::::
:::: "SHOTGUN SHELL BOMBS" ::::
:::: from ::::
:::: The Poor Man's James Bond ::::
:::: by Kurt Saxon ::::
:::: ::::
:::: typed in by --] Man-Tooth [-- ::::
:::: ::::
\\\\\\\\\\\\\\\\\\\\////////////////////
These little goodies are affectionately known as "nut busters." They are
simply shotgun shells enclosed in cardboard rolls with cardboard fins put on.
On the primer end of the shell is glued a small cork with a hole drilled
through it. A roofing nail fits in the hole snugly enough to stay in, but
loose enough to plunge into the primer upon impact.
Since the shell is not confined in the chamber of the gun, it will naturally
not cause the same amount of damage. But if it goes off between a fellow's
legs he can look forward to becoming a soprano.
These bombs are thrown singly or by the handful into the air over milling
crowds. The weight of the shell and stabilization by the fins causes the nut
buster to head straight downward.
It has tremendous effect as its presence is usually a suprise. The threat of
more coming is guaranteed to route any mob.
Not only does it go off on the pavement but it will also explode on contact
with a person's head or shoulder. At night it is impossible to trace its point
of origin.
-----
! \
/> ! \ /- Cork
Fins ! ! v
--------------------!\
! \ ! !-----! ! \ !
! \> !------ ! ! !---! <-- Roofing nail
! ! !-----! ! / !
\ --------------------!/
\ ! ! ^
\-> ! / ^ \
! / ! \
----- ! Shell
!
!
Close fitting 3-1/2 inch Aluminum Tubing Glued on Shell.
SHOTGUN SHELL BOMB
A clever use for a plain shotgun shell is as a muffler bomb. The shell is
simply shoved up a car's exhaust pipe with a length of stiff wire until it
drops into the muffler. After a few minutes on the road the shell explodes,
totalling out the muffler and treating the driver to a sick kind of panic.
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #4 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
Signalling Systems Around the World
For those of you who have the desire to make international calls, this info
may be of interest. Thanks to TAP and Nick Haflinger.
CCITT #1. An old international system, now deceased. Used a 500 Hz tone
interrupted at 20 Hz (Ring) for 1-way line signals.
CCITT #2. Proposed "International Standard" that never caught on much.
Used 600 Hz interrupted by 750 Hz. Still used in Australia,
New Zealand and South Africa.
CCITT #3. An early in-band system that uses 2280 for both line and
register (!!). Used in France, Austria, Poland and Hungary.
CCITT #4 A variation of #3, but uses 2040 and 2400 for end to end Tx of
line and register. Used for international Traffic in Europe,
but cannot be used with TASI (AKA Multiplex or "that dammed
clipping").
CCITT #5 This is the most popular, and the one used in the US. 2400 and
the infamous 2600 are used for link to link (not merely end to
end line signals. Registers are handled via DTMF (Touchtones).
Anyone know what 2400 does??
CCITT #5 bis. Just like above, but a 1850 Hz tone is used for TASI locking
and transmission of line signals.
CCITT #6 The newest and worst for phreaks. It uses digital data sent
out-of-band to control the connection. In other words, the
connection is made and billing started BEFORE you can get
control.
CCITT #5R1 A regional system like 5, but doesn't use the mysterious 2400
and can't use the multiplexer.
CCITT #5R2 Probably the interface to AUTOVON, as it uses 120 Hz spaced
tones for DTMF instead of 200. Also 3825 Hz is the blow-off
tone instead of 2600.
The "Extra" tones
1700 + 700 = Inward Operator
1700 + 900 = Delay operator, also, in TSPS,STP (a "Zero Plus" call from a coin
phone)
1700 + 1100= KP1 (Start recognition of special tones)
1300 + 1700= KP2 (End recognition of special tones)
12-85 Data Line. CIS 72767,3207: TWX 650-240-6356
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #5 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
* PRIVATE AUDIENCE *
(A BASIC LESSON IN THE ART OF LISTENING IN)
BROUGHT TO YOU BY
-[ THE OVERLORD ]-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PART I: THE LAW
Federal law:
Section 605 of title 47 of the U.S code, forbids interception of
communication, or divulagance of intercepted communication except by persons
outlined in section 119 of title 18 (a portion of the Omnibus crime control and
safe streets act of 1968). This act states that "It shall not be unlawful
under this act for an operator of a switchboard, or an officer, employee, or
agent of any communication common carrier who's switching system is used in the
transmission of a wire communication to intercept or disclose intercepted
communication."
What all this legal bullshit is saying is that if you don't work for a phone
company then you can't go around tapping people's lines. If you decide to
anyway, and get caught, it could cost you up to 5 years of your life and
$10,000. This, you are all assuming, means that if you tap someone else's
line, you will be punished....wrong! You can't tap your own line either. The
punishment for this is probably no more than a slap on the hand, that is if
they actually catch you, but it's a good thing to know..............now on to
the fun.....
PART II: TAPPING
Everyone has at some time wanted to hear what a friend, the principal, the
prom queen, or a neighbor has to say on the phone. There are several easy ways
to tap into a phone line. None of the methods that I present will involve
actually entering the house. You can do everything from the backyard. I will
discuss four methods of tapping a line. They go in order of increasing
difficulty.
1. The "beige box": a beige box (or bud box) is actually better known as a
"lineman" phone. They are terribly simple to construct, and are basically the
easiest method to use. They consist of nothing more than a phone with the
modular plug that goes into the wall cut off, and two alligator clips attached
to the red and green wires. The way to use this box, is to venture into the
yard of the person you want to tap, and put it onto his line. This is best
done at the bell phone box that is usually next to the gas meter. It should
only have one screw holding it shut, and is very easily opened. Once you are
in, you should see 4 screws with wires attached to them. If the house has one
line, then clip the red lead to the first screw, and the green to the second.
You are then on the "tappee's" phone. You will hear any conversation going on.
I strongly recommend that you remove the speaker from the phone that you're
using so the "tappee" can't hear every sound you make. If the house has two
lines, then the second line is on screws three and four. If you connect
everything right, but you don't get on the line, then you probably have the
wires backward. Switch the red to the second screw and the green to the first.
If no conversation is going on, you may realize that you can't tap the phone
very well because you don't want to sit there all night, and if you are on the
phone, then the poor tappee can't dial out, and that could be bad...so.......
method two.
2. The recorder: This method is probably the most widespread, and you still
don't have to be a genius to do it. There are LOTS of ways to tape
conversations. The two easiest are either to put a "telephone induction
pickup" (Radio Shack $1.99) on the beige box you were using, then plugging it
into the microphone jack of a small tape recorder, and leaving it on record.
Or plugging the recorder right into the line. This can be done by taking a
walkman plug, and cutting off the earphones, then pick one of the two earphone
wires, and strip it. There should be another wire inside the one you just
stripped. Strip that one too, and attach alligators to them. Then follow the
beige box instructions to tape the conversation. In order to save tape, you
may want to use a voice activated recorder (Radio Shack $59), or if your
recorder has a "remote" jack, you can get a "telephone recorder control" at
Radio shack shack for $19 that turns the recorder on when the phone is on, and
off when the phone is off. This little box plugs right into the wall
(modularly of course), so it is best NOT to remove the modular plug for it.
Work around it if you can. If not, then just do you best to get a good
connection. When recording, it is good to keep your recorder hidden from sight
(in the Bell box if possible), but in a place easy enough to change tapes from.
3. The wireless microphone: this is the BUG. It transmits a signal from
the phone to the radio (FM band). You may remember Mr. Microphone (from
Kaytel fame); these wireless microphones are available from Radio Shack for
$19. They are easy to build and easy to hook up. There are so many different
models, that is is almost impossible to tell you exactly what to do. The most
common thing to do is to cut off the microphone element, and attach these two
wires to screws one and two. The line MIGHT, depending on the brand, be
"permanently off hook". This is bad, but by phucking around with it for a
while, you should get it working. There are two drawbacks to using this
method. One, is that the poor asshole who is getting his phone tapped might
hear himself on "FM 88, the principal connection". The second problem is the
range. The store bought transmitters have a VERY short range. I suggest that
you build the customized version I will present in part four (it's cheaper
too). Now on to the best of all the methods....
4. The "easy-talks": This method combines all the best aspects of all the
the other methods. It only has one drawback... You need a set of "Easy-talk"
walkie talkies. They are voice activated, and cost about $59. You can find
'em at toy stores, and "hi-tech" catalogs. I think t(at any voice activated
walkie talkies will work, but I have only tried the easy-talks. First, you
have to decide on one for the "transmitter" and one for the "receiver". It is
best to use the one with the strongest transmission to transmit, even though it
may receive better also. De-solder the speaker of the "transmitter", and the
microphone of the "receiver". Now, go to the box. put the walkie talkie on
"VOX" and hook the microphone leads (as in method three) to the first and
second screws in the box. Now go home, and listen on your walkie talkie. If
nothing happens, then the phone signal wasn't strong enough to "activate" the
transmission. If this happens, there are two things you can do. One, add some
ground lines to the microphone plugs. This is the most inconspicuous, but if
it doesn't work then you need an amplifier, like a walkman with two earphone
plugs. Put the first plug on the line, and then into one of the jacks. Then
turn the volume all the way up (w/out pressing play). Next connect the second
earphone plug to the mice wires, and into the second earphone outlet on the
walkman. Now put the whole mess in the box, and lock it up. This should do
the trick. It gives you a private radio station to listen to them on: you can
turn it off when something boring comes on, and you can tape off the walkie
talkie speaker that you have!
PART IV: WIRELESS TRANSMITTER PLANZ
This is a tiny transmitter that consists on a one colpitts oscillator that
derives it's power from the phone line. Since the resistance it puts on the
line is less than 100 ohms, it has no effect on the telephone performance, and
can not be detected by the phone company, or the tappee. Since it is a
low-powered device using no antenna for radiation, it is legal to the FCC.
(That is it complies with part 15 of the FCC rules and regulations). It,
however is still illegal to do, it's just that what you're using to do it is
legal. This is explained later in part 15... "no person shall use such a
device for eavesdropping unless authorized by all parties of the conversation"
(then it's not eavesdropping is it?). What this thing does, is use four diodes
to form a "bridge rectifier". It produces a varying dc voltage varying with
the auto-signals on the line. That voltage is used to supply the the voltage
for the oscillator transistor. Which is connected to a radio circuit. From
there, you can tune it to any channel you want. The rest will all be explained
in a minute....
PARTS LIST
item description
-----------------------------------------------------------------
C1 47-Pf ceramic disk capacitor
C2,C3 27-Pf mica capacitor
CR1,CR2,CR3,CR4 germanium diode 1n90 or equivalent
R1 100 ohm, 1/4 watt 10% composition resistor
R2 10k, 1/4 watt 10% composition resistor
R3 .7k, 1/4 watt 10% composition resistor
L1 2 uH radio frequency choke (see text)
L2 5 turns No.20 wire (see text)
Q1 Npn rf transistor 2N5179 or equivalent
-----------------------------------------------------------------
L1 may be constructed by winding approximately 40 turns of No. 36 enamel
wire on a mega-ohm, 1/2 watt resistor. The value of L1 is not critical. L2
can be made by wrapping 5 turns of No. 20 wire around a 1/4 inch form. After
the wire is wrapped, the form can be removed. Just solder it into place on the
circuit board. It should hold quite nicely. Also be sure to position Q1 so
that the emitter, base, and collector are in the proper holes. The schematic
should be pretty easy to follow. Although it has an unusual number of grounds,
it still works.
------------------L1----------------
--
CR1 / \ CR2 ----------------
A--------------/ \ -- ----
\ / C2 L2
CR3 \ /CR4 C1 R2 ----
R1 -- gnd C3
---- -----
gnd
---------Base collector
R3 \ /
B----------------------- \/\ <- Q1
gnd \/
emitter(gnd)
The odd thing about this bug that we haven't encountered yet, is that it is
put on only one wire (either red or green) so go to the box, remove the red
wire that was ALREADY on screw #1 and attach it to wire 'A' of the bug. Then
attach wire 'B' to the screw itself. You can adjust the frequency which it
comes out on the FM channel by either smooshing, or widening the coils of L2.
It takes a few minutes to get to work right, but it is also very versatile.
You can change the frequency at will, and you can easily record off your radio.
PART FIVE: HELPFUL HINTS
First of all, With method one, the beige box, you may notice that you can
also dial out on the phone you use. I don't recommend that you do this. If
you decide to anyway, and do something conspicuous like set up a 30 person
conference for three hours, then I suggest that you make sure the people are
either out of town or dead. In general, when you tap a line, you must be
careful. I test everything I make on my line first, then install it late at
night. I would not recommend that you leave a recorder on all day. Put it on
when you want it going, and take it off when you're done. As far as recording
goes, I think that if there is a recorder on the line it sends a sporadic beep
back to the phone co. I know that if you don't record directly off the line
(i.e off your radio) then even the most sophisticated equipment can't tell that
you're recording. Also, make sure that when you install something, the people
are NOT on the line. Installation tends to make lots of scratchy sounds,
clicks and static. It is generally a good thing to avoid. It doesn't take too
much intelligence to just make a call to the house before you go to install the
thing. If it's busy then wait a while. (This of course does not apply if you
are making a "midnight run").
All in all, if you use common sense, and are *VERY* careful, chances are you
won't get caught. Never think that you're unstoppable, and don't broadcast
what you're doing. Keep it to yourself, and you can have a great time.
-[ OVERLORD ]-
THANKS TO:
The CircleLord
TARAN KING
Knight Lightning
The Forest Ranger
P-80 systems
Watch for more advanced tapping, how they catch you, and verification in the
near future.
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #6 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
Fortell Systems
Written by Phantom Phreaker
Call The Alliance at 618-667-3825
Fortell systems seem to be a system to monitor lines. They can only be used to
monitor lines within their own NPA.
A Fortell system is at 716-955-7750. Whene you call, you will hear:
'Hello. This is the Taradyne Fortell system. Please enter ID code'
The ID for this system is 722877*. After you type that in (DTMF) it will ask
'please enter line number' where you then type the PRE+SUFF of the number you
wish to check within the NPA of the Fortell.
After you enter a number, it will repeat the number you entered. Now it will
ask you to 'please enter mode'.
The modes are:
1-Calling on other line
2-Calling on test line
3-Line test results
If you enter mode 1, you will have these commands available:
1-Fault location
2-Other testing
7-Test ok, Monitor
8-Hang up
9-Enter next line number
If you enter 7 here, it will repeat what you selected, and ask for an ID code
which can be any 6 digit number followed by a *.
Now it will dial and tell you:
'Subscriber busy-busy-monitor test in progress conversation on line-short on
line'
2-Monitor test
3-Overide and test
4-Wait for idle
If you enter 2, (Monitor Test) it will tell you the busy status again.
If you enter 3, it will override, or tell you 'Not available in this CO'.
If you enter 4, (Wait for idle) it will wait until the line is idle.
If you enter 1 (Fault Location) at the main list you will get these options:
1-Open location
3-Short location
4-Cross location
5-Ground location
8-Hang up
If you enter 2 (Other testing) here, you will have these commands:
2-Loop Ground OHMS
3-Dial tone test
5-Pair ID
8-Hang up
If you enter Mode 2, you will have these options:(Other testing)
2-Other testing
7-Test ok, Monitor
8-Hang up
9-Enter next line number
It will repeat what you selected. If you select 2 here, you will now have
these commands:
2-Loop Ground Omhs
8-Hang up
If you select 7 at the main list after mode 2, it will ask for an ID which is
any 6 digit number followed by a *. Now it will dial and check the number. If
the number is busy, it will say 'Subcriber busy-monitor-test in progress-
conversation on line-short on line-please hang up-waiting for idle' Now you can
just type * to go back to the main list of commands.
If you enter MODE 3, if you have done a test before, it will give you the
results of the test. If you haven't done a test, it will tell you so with 'No
test results available'
You can abort back to the main commands list by typing a *.
By typing a 9 at several places you will be taken back to the beginning where
it asks you to 'enter line number'
PP-01/06/86
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #7 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
***************************************************************
* *
* Electronic Eavesdropper *
* *
* by *
* *
* Circle Lord *
* *
***************************************************************
Have you ever considered buying one of those hi powered microphones often
seen in eletronics magazines, but thought it was to much to buy and to small to
card? The circuit shown in this file will provide you with the information to
build one for a lot less money.
These audio eavesdropping devices are probably one of the hottest items in
the underground due to their ability to pick up voices through thick walls.
You can also attach the speaker wires to a tape recorder and save all the
conversation. As one can see these are great for blackmailing a teacher,
classmate, principal, neighbor, or whoever you seek services from...
Parts list:
-=EM--------------------------
M1 Amplifier Module. (Lafayette 99C9037 or equiv.)
M2 9-VDC battery.
M3 Microphone
R1 20K poteniometer with spst switch.
S1 Spst switch on R1
SP1 8-ohm speaker
T1 Audio transformer (Radio Crap part # 273-1380)
Schematics
+------+--------M1
1 1 1
1 1red 1blu
1 1 1
1 transformer
1 1 1
1 1yel 1grn
+------+ 1
1 +-----+ +-----+
1 1 1 1
b1 b1 r+M2+b o+S1+o 1
l1 l1 e1 1l r1 1r 1
k1 u1 d1 1k g1 1g 1
********************** 1
* yel>*-+ ++
* * R 1
* M1 * 1-+ 1
* red>*-+ 1 1
* * 1<<
********************** 1
b1 1g y1 1
l1 1r e1 1
k1 1y l1 1
1 1 +----------+
+SP1+
S1 here is on the potentiometer
M3 can be an earphone earpiece
---- /
/ /
/ /
/ ircle / ord
---- ----
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #8 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
***************************************************************
* *
* Making a Shock Rod *
* *
* By *
* *
* Circle Lord *
* *
***************************************************************
This handy little circuit is the key to generating THOUSANDS of volts of
electricity for warding off attackers (notice the plural). It generates it all
from a hefty 6-volt source and is easily fit into a tubular casing. Originally
used as a fence charger, this circuit can be put to other uses such as:
charging a whole row of lockers at school, a row of theater seats, or a metal
bleacher set in the gym. More on this later.
To build this, all you need is a GE-3 transistor, a 6.3-volt transformer, and
a handful of spare parts from old radios. The ammount of shock you wish to
generate is determined by the setting of potentiometer R1, a 15,000 ohm
variable resistor. Hint: for maximum shock, set R1 at maximum!
***************************************************************
Item # * Description
***************************************************************
C1 * 500uF, 10-WVDC electrolytic capacitor
C2 * 2000uF, 15-WVDC electrolytic capacitor
M1 * 6-VDC battery
M2,M3 * Leads
Q1 * GE-3 transistor (2n555 will also do)
R1 * 15K potentiometer
R2 * 160-ohm resistor
S1 * Spst switch
T1 * 6.3-VAC filament transformer (Triad F-14x or equiv.)
X1 * 1N540 diode
***************************************************************
Schematics:
+---C1--------------+
1 1 HOT
1 +-----+ 1 LEAD
+---1<Q1 1 )(-->
R1* + 1 +--->)(
+-->* 1 1 1 )(
1 * +--+ 1 1 )(-->
1 1 1 1 1 1 1 TO
1 1 1 1 1 1 1 GND
1 * C2 1 +---1----+
1 R2 1 1 1 1
1 * 1 1 1 X1 1
+---+--+--1---------1-->-+
1 +/- 1 1
+*M1*-*S1*+ GND -
---- /
/ /
/ /
/ ircle / ord
---- ----
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #9 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ _ _ _______ @
@ | \/ | / _____/ @
@ |_||_|etal / /hop @
@ __________/ / @
@ /___________/ @
@ PRIVATE @
@ @
@ Presents... @
@ @
@ \\\\\=-: Knight Lightning's ,-=///// @
@ @
@ "Introduction to PBXs" @
@ @
@ @
@ Written on January 3, 1986 @
@ @
@ @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
This file is a personal continuation of the PBX entry in the MCI
Telecommunications Glossary.
_______________________________________________________________________________
A telephone exchange serving an individual organization and having
connections to a public telephone exchange is called a Private Branch Exchange
(PBX). The PBX performs a switching function by connecting any extension in
the private organization to an outside line. A PBX is actually a private
switch that connects a group of telephones within an individual organization.
Calls placed outside this individual group are connected to a telephone
company's central office switch through trunks. A PBX may be operated by an
attendant from the private organization or the switching system may be done
automatically. Other terms that are commonly used interchangeably with PBX
are: Private Automatic Branch Exchange (PABX), Private Automatic Exchange
(PAX), and Computerized Branch Exchange (CBX). Although these terms were
originally used to identify specific switch structures, today they are often
used as synonyms.
PBXs can use any of three basic switching methods: step-by-step (SxS),
Cross-bar (X-bar), and computer controlled, to perform the basic function of
switching. However, in addition to detecting calls and establishing a
transmission link between two telephones, PBXs can do much more.
The common control, often called a central processing unit (CPU), controls
the switching matrix that connects the stat ons and trunks. The switching
matrix of a PBX performs the same job as does an operator at a manual
switchboard or a common control central office switch. The CPU, however, gets
its instructions from the "stored program", which contains directions for
activities, such as detecting calls, sending them over the best available
route, and recording billing information. These computerized electronic
switches are used to perform routine, as well as unique, functions that simply
weren't practical or even possible with electromechanical switches.
Just as in the public switched network, PBX switches make connection between
instruments, or "key telephone sets". We're all familiar with key telephone
sets, whether we know them by name or not. They're the business telephones
that have six push-button keys lined up below the dial--a red button marked
"hold" and five buttons or lines with flashing lights.
Systems with PBXs and key sets have a great deal of flexability in planning
for their needs because they can set up their codes to accomplish the functions
needed in their particular situations. In fact, the PBX can be programmed so
that each individual extension within a system can take advantage of features
applicable to its own business needs.
Some of the features that are availiable with PBXs and key systems are: call
transfer, which allows internal or external calls to be transferred from one
telephone to any other phone in the system; automatic push-button signaling,
which indicates the status of all phones in the system with display lights and
buttons; one-way voice paging, which can be answered by dialing the operator
from the nearest telephone in the system; camp-on, in which a call made to a
busy phone automatically waits until the line is idle; and internal and
external conference capabilities, which enables outside callers to conference
with several inside users.
Some features automatically handle incoming telephone calls. Automatic call
waiting not only holds calls made to a busy extension until the extension is
free, but also signals the person being called that a call is waiting and
informs the caller that he is on hold. Automatic call forwarding will send
calls to employees who are temporarily in locations other than their offices,
provided they "inform" the PBX where they can be found. Automatic call
distribution automatically send an incoming call to the first extension that's
not busy--a useful feature for situations in which any one of a group of
persons in the organization can adequately respond to incoming calls. Another
example is automatic call back, which allows a caller who reaches a busy line
to ask the PBX to return his or her call when the line is free.
Still other features provide services such as night telelphone answering,
telephone traffic monitoring, and network or hot-line connection. These
examples are but a sample from the features possible with computerized PBXs.
===============================================================================
This is a very brief description of how to use and what to expect on a PBX.
-------------------------------------------------------------------------------
Basically, you call the PBX and you will have to enter a code that can be
anywhere from 4 to 6 digits (Note: some PBXs do not require codes). Then you
will hear a dial tone. From here you would under normal circumstances dial:
9 + 1 (or 0) + NPA-PRE-SUFF, for long distance dialing or dial 8 for local
dialing.
The most common use of the PBX is to call Alliance Teleconferencing,
a teleconference service offered by AT&T. To do this dial:
0700-456-1000,1002,1003,2000,2001,2002.
Note: PBX codes are usually very simple and usually 4 digits.
EX: 0000, 1111, 1234, etc
===============================================================================
Look for a file on Alliance Teleconferencing coming soon...
_______________________________________________________________________________
This has been a Knight Lightning presentation...
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
==Phrack Inc.==
Volume One, Issue Three, Phile #10 of 10
==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
Phreak World News II
Compiled by
\\\\\=-: Knight Lightning ,-=/////
_______________________________________________________________________________
Retraction
----------
We at Phrack Inc, respectfully retract all statements made in last issue
concerning Stronghold East Elite and the LOD. We are sorry for any
inconvenience this may have caused you.
_______________________________________________________________________________
Phreaks Against Geeks
---------------------
This group was formed as a joke by The W(hack)o Cracko Brothers Inc. on a
conference in December of 1985. The charter members were TWCB, taRfruS, Blue
Adept, The Clashmaster, and a few others. Since then, Catcher in the Rye and
the Slovak have tried to join.
Later that month, Boston Strangler and Micro Man formed PAP, which stands for
Phreaks Against Phreaks Against Geeks. Other opposers of PAG include:
Hack Attack, The Detective, Kleptic Wizard and The Overlord 313. It is not
known if these others are now in PAP or not.
All of this nonsense was really started on the Dartmouth System and is mainly
a local feud of phreaks in the Boston (617 NPA) area.
_______________________________________________________________________________
Brainstorm Gets 10 Megs
-----------------------
Finally, after several months of promises, Brainstorm (ELITE) now has a 10 Meg
Hard-drive. As of January 1, 1986 Modern Mutant cleared the userlog of
Brainstorm and a membership drive was started. Note: To become a member of
Brainstorm, you will have to take a small (and more or less easy) filter.
Some other new features on Brainstorm are online games; Karate, Football, and a
hacking simulation.
_______________________________________________________________________________
Anarchy Inc. Disbanded
----------------------
Anarchy Inc., a once very famous g-phile writing organization, has been
disbanded. Basically because most of its membership are now attending college.
_______________________________________________________________________________
Dartmouth Conferences To Be Abolished?
--------------------------------------
This message was given on January 9, 1986 when a user would try to join a
conference.
XCaliber, Fantasie, Spectre, etc are not available until tomorrow. Due to
pressure from Kiewit and some users, conferences have been disabled for one
day. Hopefully this will remind some people that the conferences are a public
service on the part of a few people and are not a "right". Recent abuse of the
conferences has made caring for these conferences almost more trouble than they
are worth. These abuses have also caused some users to complain to Kiewit.
Too many complaints and they might vanish altogether. If everyone will work at
keeping the conferences reasonably clean and free of abuse life will be much
easier. Thank you for your time and appologies for the lack of conferences.
You are no longer connected to conference "XYZ".
Later, Corwin got pissed off by the password abuse that was going on and
killed almost all non-Dartmouth student passwords. It is also rumored that he
took down the DUNE bbs, however Apollo Phoebus says that it is a temporary
thing and that DUNE will be going back up soon.
_______________________________________________________________________________
MCI Employee Bust
-----------------
Employees at MCI were creating fake accounts and then running up massive
bills. Then later they would either credit the accounts or say that the
subscriber reported code abuse. Any employee found doing this was fired.
Another way these employees were cheating the company was by reporting code
abuse on their own accounts, however MCI Security using CNA quickly caught
these employees.
Note: MCI Security has stated that the only real way that they can catch
abusers of the phone company is by calling the numbers that the abusers
call and asking them who they know making these calls.
Information has been provided through MCI Security
_______________________________________________________________________________
MCI/IBM Merge
-------------
MCI Telecommunications company has merged with IBM and their phone industry
SBS. This was an effort to join the two as strong allies against AT&T.
IBM computers Vs. AT&T computers
MCI Telecommunications Vs. AT&T Telecommunications
Changes arising from this merger (if any) are not known, but none are
expected for some years.
_______________________________________________________________________________
The Life And Crimes of the W(hack)o Cracko Brothers
---------------------------------------------------
The date is somewhere in December of 1984. Peter writes a code hacker for
the Hayes and tells Tim NOT to use it on Sprint because they trace. Sometime
later that night Tim received a call from Scan Man, sysop of P-80.
Scan Man said he needed TWCB to hack him some Sprint codes cause he didn't
have the time or a Hayes. Tim did it for him on the 314-342-8900 Sprint
extender.
He left it on all night and the next day while he was in school. Sprint
traced him. At 9:00 AM the next morning agents from the FBI, AT&T, Western
Union, GTE, and Southwestern Bell, arrived at TWCB's house.
They were let in, bringing with them cameras and tape recorders among other
equipment. Upon seeing this Peter blew into an upstairs extension and
cancelled the dialing program, but not before the agents made sure it was the
right place.
All of TWCB's computer equipment was confiscated and Tim was taken downtown
shortly after being picked up at school. Peter was sick and left home. Tim
was later released in his mother's custody.
They each received probation and 100 hours of county service.
That was then...
Recently TWCB has come under investigation for the following: Drug use and
dealing, burglary, forgery, and fraudulent use of a credit card.
Peter: 8 Class A Felony charges
1 Class A Misdemeanor charge
1 Class B Misdemeanor charge
Tim: 6 Class A Felony charges
2 Class B Misdemeanor charges
Note: Some of these misdemeanors are for not returning library books.
Also it has been said that Tim has been in jail 11 times. Both members of
TWCB are now enrolled in a reform school.
The information in this article has been provided by TWCB, directly and/or
indirectly.
_______________________________________________________________________________
Blue Adept: Gone For Good
-------------------------
Blue Adept, known for being an all around loser and Dartmouth impersonator,
decided to try blue boxing. For some reason he decided to call an out-of-state
trunk direct.
Later that month Blue Adept and his parents received a phone bill with a
charge around $386.00. This led to his being restricted from using the phone.
Sometime after this incident Blue Adept received an invitation to join on a
conference. He wasn't home but his parents decided to stay on and listen in.
Blue Adept is not allowed on conferences anymore and all calls to him are now
screened.
_______________________________________________________________________________
Overlord 313 Busted: Step dad turns him in
------------------------------------------
Overlord's step-dad always would be checking his computer to see what was on
it and what was nearby. Last week he noticed the credits in Overlord's file on
Wiretapping, which can be seen in this issue of Phrack.
He reported his findings to Overlord's mom. She had a talk with him and he
promised to stop his evil ways. His step-dad didn't believe him for a second.
1/11/86
Step-dad goes on business trip, where he meets Ma Bell executive Don
Mitchell. Step-dad asks all sorts of different questions regarding use of MCI
dialups and Alliance Teleconferencing, and talks about how his step-son does
all these things and more. Don strongly suggests that he reports this to the
phone company...
1-13-86
HE DOES
-------
No legal action against Overlord has taken place as of now.
Information Provided by The Overlord of 313
_______________________________________________________________________________
Maelstrom 305 Busted
--------------------
While I am not at liberty to revel all the information concerning this bust I
will mention the bare facts.
Maelstrom hacked into the Southern Bell Data Network (SBDN). This system
happened to be local to him so he did not bother to use an extender.
Unfortunately this system also had ANI (Automatic Number Identification). His
computer and other equipment as well as all his files were confiscated as
evidence.
Information provided by the Maelstrom of 305
_______________________________________________________________________________
Whackoland BBS
--------------
This bbs is now up and running strong. Its sysops are of course...TWCB Inc.
300/1200 Baud, and 40 Megs. It has unique features and great mods as well as
Elite Sections. Call today... 314-256-8220. Note: Only 100 users will be
kept so if you are just a beginner please don't bother to call.
_______________________________________________________________________________
R.I.P. Broadway Show
--------------------
The Broadway Show BBS in New York is now down, and Broadway Hacker will soon
be in Washington DC. This C-64 run bbs, was one of the best in its time, but
later it became a hangout for rodents.
From its ashes rises a new bbs, however its name has not been released as of
this writing. Broadway Hacker will sysop this bbs for about a week and then
turn it over to the new sysop. His name is not yet know, probably since he
hasn't a handle yet.
Although this new bbs will appear legal and have some legal sections it is
indeed a phreak bbs, and should be checked out.
718-615-0580
_______________________________________________________________________________
Speed Demon Elite Down?
-----------------------
This bbs sysoped by Radical Rocker has suddenly disappeared leaving the
caller with a message of the line being disconnected. No other information is
available.
_______________________________________________________________________________
Call The Works BBS - 1600+ Textfiles! - 300/1200 - Always Open