PIM.,PIMPIMPIMPI.      MPIM   IMPIMPIMPI,   .MPIMPIMPIMP MPI,.MPIMPIMPIM.
   MPIMPIMPIMPIMPIM.    PI       IMPIMPIM   PIMPIMPIM      PIMPIMPIMPIMPIMP.
    PIMPI     'MPIMPI             PIMPIMPI  MP IMPIM        IMPIM     `PIMPIM
    PIMPI      MPIMPI PIMPI.      PIM PIMP IMP IMPIM        PIMPI      PIMPIM
    MPIMP    .IMPIMPI  PIMPI      PIM PIMPIMPI MPIMP        PIMPI.   ,MPIMPIM
    MPIMPIMPIMPIMPI'    MPIM      IMP  IMPIMP  IMPIM        PIMPIMPIMPIMPIM'
    MPIMPIMPIMPIM'      PIMP      PIM  PIMPIM  PIMPI        PIMPIMPIMPIMP'
    PIMPI               IMPI      MPI   MPIM   PIMPI        PIMPI
    MPIMP               MPIM      MPI   MPIM   PIMPI        MPIMP
    IMPIM               PIMP      MPI   MPIM   PIMPI        IMPIM
    PIMPI               IMPI      MPI   MPIM   PIMPI        PIMPI
    MPIMP               MPIM      MPI   MPIM   PIMPI        MPIMP
  .IMPIMPI,.           .PIMP.   .MPIMP, IMP'  IMPIMPI.    .IMPIMPI,.
MPIMPIMPIMPIM        IMPIMPIMP MPIMPIMP `IM  PIMPIMPIMPI MPIMPIMPIMPI
------------------------------------------------------------------------------

_ _ _______ _____   ___  ___   ____ _       
      /___/ /___/  /  /  /__)  /_           
 _ __/    _/   \ _/__/ _/__) _/____ _ _  _    _     _      _      _
               /                      I N D U S T R I E S   1 9 9 7

         |
---------+------
  ____   ____   _    _   ____ 
 |  \ | |_  _| | \__/ | | /  |    PROBE INDUSTRIES MAGAZINE PHILES
 | \ _|  _||_  |      | |  /_|    ISSUE NUMBA 13
 |__|   |____| |_|\/|_| |__|      RELEASED: 8/97

                  ----------+---------------------
                            |

========================
Now of avail on the web:

          http://www.dope.org/pimp/
          ==========================


thirteenthirteenthirteenthirteenthirteenthirteenthirteenthirteenthirteen

               p.i.m.p. publicly disclosed members:                   
             ----------------------------------------                           
                                                                    
   fringe -chicago PIMP                    stickman -chicago PIMP    
                                                                    
   subhuman -chicago PIMP                  stash -chicago PIMP 

   insane lineman -chicago PIMP            special-k -germany PIMP
                                                                      
   jello biafra -chicago PIMP              - Q -  -new york PIMP     
                                                                    
   luthor -east coast PIMP                 mastermind -florida PIMP  
   
   smokee -chicago PIMP                    q-ball -chicago PIMP                                           

thirteenthirteenthirteenthirteenthirteenthirteenthirteenthirteenthirteen



This issue has been broken down into three sections.

1.  Hacking
    - Moving through AT&T System 75 and Definity Systems

2.  Decoding Schemes
    - Discussion on how RC-5 decoding works.

3.  H/P scene news that's good to know, but not all good.
    - TRW, now Experian Inc., fucks up!
 


+-------------------------------------+
|   start the lucky 13's pimp issue   |
+-------------------------------------+

Edita's Note: This issue is a concentration of peoples efforts to
              edjumacate peoples on a need to know basis.. either you
              know the things discussed, or you need to.. information
              is meant to be free.. as are we.. information owns all,
              so enjoy a drop of its reign. many submissions are in
              the works for the next issue.. this one is short but i
              kinda wanted to release it on time.. 14 will be due out
              soon.. gotta keep the pimps movin..


+-----------------------+
| section one - hacking |
+-----------------------+

        |                                                   |
     ---+---------------------------------------------------+---
        |                                                   |
                    A informational phile on the
                  AT&T Definity and System 75 / XE
                      contributed by fringe
        |                                                   |
     ---+---------------------------------------------------+---
        |                                                   |

READ ME: just a quik note, please read this whole article through
         thoroughly before using anything that's been said in it.
         this article is for informational purposes and gives a 
         slight overview of *some* things about a sys75 and the 
         likes.  i only typed up what one screen would look like..
         after that i gave up, because scrollbacks don't capture the
         screens all too nicely at all, and i have done enuff typing.

This section is broken down into the following sekshunz:

i.    background
ii.   security violations
iii.  barrier codes, remote access
iv.   trunk groups
v.    access codes
vi.   monitoring
vii.  listing scheduled reports
viii. history logs
ix.   notes


---------------
 i. Background
---------------

     A System 75 system, or the likes, is a pbx computer system.
A PBX stands for private branch exchange in this case (for those that
don't know) and routes phone calls.  These systems hold all different
types of reports, extension information, trunk group information, and
most liked to peoples who need to divert fone calls, dialouts.
You rarely will find a System 75 scanning 1-800's, however locally
you can definately turn up a few in a night.  To give you an example
of who would actually use such a PBX system, just look at any normal
office building.  The following information does not tell you how to
make free fone calls for illegitamate use, but moreso just discusses
how to manuever around the system for those just starting to play with
them or whom are interested.  You can severely fuck up a company's 
fone system when in their pbx system; please try NOT to.


First off, there is the basic login sequence.. you'll see the following:

CONNECT 1200
(sometimes 2400, usually 1200 baud though because the top speed for
a data or netcon channel is 1200; there may be a point now where 
you see nothing.. wait 10 seconds and then hit return once)

Login:

followed by the normal

Password:

If you fuck it up, you will get this: INCORRECT LOGIN
If you get in through a valid account, you will get a prompt like this
normally:

Terminal Type (513, 4410, 4425): [513]

513 is set up as the best terminal..i haven't really tested the others
though.  To do any of the commands listed below, depending on the 
account you use, you will have an interesting list available to you.
the browse account basically lets you just display and look at things.
display whatever is the syntax for browse.. when you are using a 
decent account, you can also use the following actions:

add 
busyout
change
clear
disable
display
duplicate
enable
list
monitor
recycle
release
remove 
reset <-this is dangerous, it's only used to reset the system
save
set
status 
test

the correct syntax for a normal command would be :

action object qualifier

for example:

add trunk-group 17

got it? good.. now these will help you get around:

Esc [ U       -changes to the next page
Esc SB        -save
Esc Ow        -cancel whatever you were doin
Esc Om        -help, if of avail

another way to receive help as to what options you have to use with
what action, is to type that action and just put the word help after
it.. it will either give you a list of commands that may be used with
that action, or tell you that you will need an extension number, or
it may say something to the effect of [print] or [schedule], for 
beginners, you won't want to start scheduling things,.. when you use
print (without the brackets) it will be displayed on your terminal.

---------------------------------------------------------

Some default accounts you may want to try are as follows:

---------------------------------------------------------
login:         password:
------------------------

browse         looker or browse
enquiry        enquirypw
bcim           bcimpw
rcust          rcustpw
cust           custpw
maint          maintpw
locate         locatepw
bcnas          bcnspw
init           initpw
inads          inadspw or indspw
craft          craftpw or crftpw




I got those from a text file, but there is no one to give credit to so
none granted.  The first two give you like 1/5 of the commands
allowed.. they suck.. but browse/looker is very commonly left in.
The only other two accounts i've accessed sys75's with were craft and
inads, the last two listed.  Both held full access.  The rest, I dunno
about.  If you have attempted hacking this system before, and now you
have finally gotten in thru a good account, not a lame one, then 
you'll want to do the following look-see:



-------------------------
 ii. Security Violations
-------------------------

from the "enter command:" prompt type the following:

list measurements security-violations schedule

if it shows a lot of "hacker" activity, such as a lot of invalid
login attempts on the dial-in port, then do this:

clear measurements security violations

the only downfall to this command is that it says the date it was last
cleared.  You may still come up noticeable.  The list screen may look
somethin like this:

list measurements security violations


                                     Date:  4:25 pm  FRI JUN 12,  1997


              SECURITY VIOLATIONS MEASUREMENTS	


    Number of Invalid Login Attempts
                           Maintenance EIA Port:  0
                       Maintenance Dial-up Port:  2
                  Network Control Dial-up Ports:  7
   

    Number of Invalid Barrier Codes:  8


         Counted Since:  9:33 am MON MAY 14, 1997


Command successfully completed
enter command:




-----------------------------------
 iii. Barrier Codes, Remote Access
-----------------------------------

the invalid barrier codes listed above relate to incorrect codes
entered into their dialup pbx extender.  if the amount is reasonably 
low, it's normal. people tend to misdial now and then.. if it's a high
number, say 132, then chances are peoples are trying to haxor out 
codes..

if there is a pbx on the system, the dialout number will be shown and
then there will be barrier codes listed.  ONLY the last four digits of
the pbx will be shown, the prefix usually will be the same as the
number you have dialed.  to see what is set up for remote-access,type:

display remote-access

if you are using a decent account, such as craft or one with powers
that let you use the change command, you can type:

change remote-access

and enter in yer own barrier codes to dialout off of their pbx with.
i've read about 6 philes that are old that tell you how to "set-up"
yer own pbx on the system if one isn't set up.. with the manual i 
have and the philes i have, it still has not werked,.. maybe i just
suck with these things.  if the pbx is already set up for extender
use, then adding nonbillable codes is easy.




------------------
 iv. Trunk Groups
------------------


There may be various "trunk-groups" on a System 75.  Each trunk group
serves its own purpose.  trunk group 1 may be for a company on one 
floor, while trunk group 2 may be for another company on a different 
floor.  use:

display trunk-group #

to display the # specified.. you will see various information as to 
what peoples who use that group are allowed to do.  this is all
specified by the COR, Class of Restriction,.. it's a number between
0 and 63 that indicates what restrictions are assigned to voice
terminals, their groups, trunk groups, and data modules. you will
also see the group name of course, and a nite service extension 
among other things of little interest.  if you want to find out what
all the extensions are to that trunk, go to the next page and you 
will see the last 4 digits of the dialin numbers.



-----------------
 v. Access Codes
-----------------

Access Codes can be a 1,2,or 3 digit dial code used to activate or 
cancel a feature or access an outgoing trunk.  The star * and the 
pound # can be used as the first digit of an access code.

There are access codes that can also be set up internally on the pbx..
they are known as Trunk Access Codes (TAC) and Feature Access Codes
(FAC).




----------------
 vi. Monitoring
----------------

Yes, you can do this.  since you are in the system itself, it's not
as though you can monitor actual conversations; however you can 
monitor all  trunk traffic by doing the following command:

monitor traffic trunk-groups

you will see five seperate columns of characters and then 3 more 
headers just like it.  they five columns are #, S, A, Q, and W.

# is the group number. it should be a number between 1-99 that will
  identify the trunk group in use.

S is the group size.  it lists however many trunks are administered 
  for that trunk group in particular.  the range of possible numbers 
  is system dependant, but is usually 1-60.

A is the active group members.  it lists however many trunk members in
  a group are active on a call.  'busied out' trunks are *not* active.

Q is the queue length.. that being the length of whatever queue was
  administered for the group.

W is calls that are waiting; the number of the group queue.

another way of monitoring the system is to use this other format:

monitor system view1

You can also use view2 instead, but view1 gives you the same sight
as view2 but also has the hunt groups measurements listed.  on this
page you will see a different format of the traffik status.  first
off you have the :

Attendant Status : shows the activated attendant consoles and 
                   deactivated attendant consoles. activated means
                   an "agent's" headset or handset is plugged in and
                   the console isn't busied out or set up for night
                   service.

Maintenance Status: shows the number of alarms (including major and
                    minor alarms) that may indicate problems on 
                    trunks, stations, and other resources.  The
                    alarm(s) may have already been found out and 
                    acknowledged,.  use display alarms to check on 
                    this.. Y means they've been found out and noticed,
                    N means they haven't. 

Traffic Status: the "view" displays call handling for trunk, hunt, 
                and attendant groups.  it indicates the number of
                queued and abandoned calls.  in the trunk group
                measurements, only the four trunk group numbers with
                the highest percentage blocking are listed. they
                have their calls displayed as INC (incoming), OUT
                (outgoing), and TWO (two-way).


monitoring traffic analysis is a good thing,.. because of it, you can
see if anything weird may be going on while you are inside the system.
usually, it's best to enter these systems late night, in case you 
alter something incorrectly disturbing fone service temporarily..
it's better to go unnoticed eh? but nonetheless.. ya gotta watch the
watchers.. that's where this command comes in.




--------------------------------
 vii. Listing Scheduled Reports
--------------------------------

on the Manager I system, you can use the :

list report-scheduler

to see what reports have been scheduled for printing..
if you put schedule on the end of a command, this is where the "job"
goes.  you will see the following things on the screen:

- Job Id: this shows the report identification number, it's 1-50, and
          is provided by the system.

- Command: this will show what command is scheduled to be executed

- Print interval: this field has 3 options: immediate, scheduled, and
                  deferred.  if it isn't immediate, then you will see:

- Print Time: this will be in military time, ie 21:15, and below that
              you will see a list of every day of the week with a y or
              n after it, in regards to which day it will be done; 
              whether it be scheduled or deferred.


you can use the change action to edit out any scheduled reports that
shouldn't be there, y'know what i mean.. say you have been 
contributing to a lot of heavy activity on the system one day, and 
you notice that they are going to print out the "list history" command
every night.. all you're transactions are stored in a log and will be
printed.. i have actually found a few systems that do not use this log
but nonetheless.. it's good to check on this things. read on for more
about listing your history on the system..




--------------------
 viii. History Logs
--------------------

these can be brutally dangerous to being caught.. once you are found 
out having been inside the system, unless you diverted really decently
you can easily be nailed.  Ma Bell doesn't like when you play with her
PBXes... and remember the ess switches of today log everything. you
can list your history by doing the following:

list history

simple eh? you will get a list of dates and times and the port used
and the login used and the action used and the object used and any
qualifier that was used with it; in respect to changing/listing things
on the system. for example,

list station 4382


If you look in the history log, you will see what every person that
logged in did on the system that, what time they did it, and even what
port they came in offa.. actually, only if it's data affecting, such 
as changing or bridging extensions and the sort, will it be in there..
all the displaying of trunks and the like should not be in there.  the
only sys75's i've been in that actually have used this, i've only had
access with the browse account.. ones that i've used craft and the
likes in, they didn't have a history to be listed.. methinx it was 
disabled.  but if you have a good account that can do things, see if
you can clear or change your history.. since you may need to if you
make changes a little too obviously.

if you cannot remove the history log, nor change it..
then make EVERY attempt to change or remove the translations.. such as

remove translations

translations are what is saved to the tape backup every week.. when 

save translations

is performed, the history gets kopied to the tape backup... so when 
the system cold starts or reboots, the log is loaded from the tape.




-----------
 ix. NOTES 
-----------

a few things to remember when working on system 75's:

whenever you are changing an option that has a qualifier on the end 
for time, if you decide to put in the time it MUST be in military 
time..

if you use schedule as a qualifier for a command, it won't do anything
but schedule it to be printed.. which isn't a good thing.

you may want to peruse a system's activity before working on it..
such as see how often maintenance is done thru the dial in.. this way
you will have a better handle as to how easily your work may be 
noticed.. i know it's common sense.. but it's not always too common.


+------------------
      a side note
       --------------+

i know this did not get all too technical as to setting up a hidden
pbx or elsewise.. it is an overview of what to check as you learn 
while using the system.. using the word help after an action usually
gives you a good feel as to what to do.. and if you know/have studied
telecommunications, you will find most of the terms familiar.  if you
have a question on anything in particular, please email me

fringe@dope.org

i want to give special thanx to pluto in jersey, it's been years man..
and i still appreciate the hell outta this manual you hooked me up
with.. also if anyone wants to order sys75 manuals, the info is below.

however, they AREN'T CHEAP! (methinx they're like $80 a pop)

To order manuals, call AT&T Customer Information Center at
1-800-432-6600; unless you're in Canada, then call 1-800-255-1242

or you can write to:

AT&T Customer Information Center
2855 North Franklin Road
P.O. Box 19901
Indianapolis, IN  46219-1385

there are way too many manuals to list.. the best thing to do is to
order this:

Definity Communications System Generic 1 and System 75 
- Documentation Guide

Order No: 555-200-010

this will give ya the dox on all their manuals.. there has to be 30-40
around.. if you are looking for the order number to a specific one,
drop me a line.

   |
---+--------
   | 
         Sys75 phile number 1, done

                                         |
                              -----------+---
                                         |
---END SYS75---




+------------------------------+
| section two - Coding Schemes |
+------------------------------+

*--------------------------------------------------------------*

Instructions in decoding RC5 - by special-k (special-k@dope.org)

*--------------------------------------------------------------*


This rather mathematic description shows in what way RC5 (32,1*) can be 
decoded when its original text is attacked.

In spite of good static qualities of this method it will possibly be 
sufficient if you know merely 2 word pairs of the original text and the   
corresponding text in order to decode the text.

Attacks of this kind should always be expected. RC5 is described as follows: 
(further information later)

A0 = A+S0;
B0 = B+S1;
A1 = ((A0^B0)<<>>k2) ^ A1) - B	(3)

Now we choose two word pairs with different k2 among those which are 
available. The difference of these k2 should be as small as possible.  
This is theorethically not always possible, but in this case we ignore it.
Having 4 different k2, the difference can be less or equal to 8.
We substract (3) from the smaller k2 of (3) and the greater k2 and get 
the following equation:

(X>>>K)^P - ((X+D)>>>L)^Q = R

with L-K=S > 0 and with L, D, P, Q and R known. 

This equation can perhaps not clearly be solved, but all the possible X 
may be found in this way.

We now choose the s Bits:

X[K],...,x[L-1] of any X (from 0 .......31) 
                and determine among them the s Bits:
y[L],...,y[L+S-1] of X+D and 
y[32] = (y[0],
y[33] = (y[1], etc.

Depending on the fact whether a carry in Bit L emerged by the addition 
of X and D, the s Bits x[L],...,x[L+S-1] of x will possibly be ambigous 
due to the carry.

We are going to determine now the following s Bits of x in a similar way.
A possible carry has been found now.

After the (32/S+1) steps we arrive at the already given bits and can 
check for which values of x[K],...,x[L-1] it worked out.

Perhaps only a few solutions of X will remain, if you are lucky, only one.
The less s is the smaller is also the imaginable variety of solutions.

We are going to determine S3 for each X which we found and for each S3 i
we determine B0 and in its turn S1.

We can use equation 1 for each word pair and thus determine the greater 
B0 and K1.

Consequently, the determiantion of S0 and S2 will be analogy with the 
ones of S1 and S3, and perhaps with two other word pairs as well.

Thus, we are already holding the key in our hands. w00p!@$#

Should there be several solutions, we can check them with further word
pairs.  If need be, we can generate the original text on trial and
check it with regard to readability and sense.
In theory, there are of course several keys possible. However, this is 
not what we care about because we want to get the original text.

I worked out this method after several considerations and it can be adapted 
for any computer programmes without any problems.

Our results have been impressive, in all the cases we tested, three word  
pairs (this means 24 bytes) of the original text were sufficient to 
calculate the complete key definately (and consequently the original text) 
within 2ms using a Pentium-133, ESIX V.4.2, PoC <- only onkeld knows 
what this means).

In addiction, our method which methods today abalysty use, trying to cope 
with problems in cryptography.

The RC5 encoding within the pseude code:

A = A + S[0];
B = B + S[1];
 for i=1 to r do
A = ((A^B)(less than)(less than)(less than)B) + S[2*1];
B = ((B^A)(less than)(less than)(less than)A) + S[2*i+1];

The explanations of the instructions:

X (less than)(less than)(less than) Y		
                The word X rotetes by Y bits to the left
^		Cannot translate :(  
		(in german: Das Bit-Weise ausschliessende oder (XOR).
S[]		The key
r		The number of rounds




Copyright (c) and all other stuff by special-k 
special-k@dope.org
For suggestions and pizza contact me!

---END RC5 Decoding---




+----------------------------------+
| section three - h/p related news |
+----------------------------------+
--------------------
 news for the scene 
-------------------+

TRW Finds A New Way to Violate Our Privacy!
8/97

     Earlier this month, Experian Inc., one of the nation's largest
repositories of credit inphormation for everyone had to shutdown a 
new service they provided on the internet.  They claim a huge mistake
incurred due to a software glitch.  This glitch violated some federal
laws and your privacy.

     Experian Inc. is TRW's new name, and with that name came a whole 
new level of stupidity.  Their new service let people get a copy of
their credit history via the net for only $8.00.  One problem, when
someone submitted their information to get their form, instead of 
getting their form, they received someone else's confidential 
information.. that's right, your credit card information, all known
address that you have lived at, everything may have just been handed 
to someone else.  This made the Washington Post and Chicago Tribune.
Both reports who did the story tried the new service and verified that
they got someone else's information.  Thousands of people hit their
web site, and were not only disappointed, but probably sincerely 
screwing themselves over with their report request sending their 
report into someone else's e-mail.  Ed Mierzwinski of the U.S. Public
Interest Research Group said "We are gravely concerned that Experian
went into this too soon and their system is vulnerable to hackers and
it is grossly inadequate to protect consumer privacy."  It's 3AM, do 
you know where your codes are? outtie -fringe


---END NEWS---
+---------------------+
|  end pimp thirteen  |
+---------------------+



¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,
  _  _______ ______   ___   ___   ____ _      
       /___/  /___/  /  /  /__)  /_           
  _ __/     _/   \ _/__/ _/__) _/____ _ _ _
                 /                           I N D U S T R I E S
¼,¼,¼,¼,¼,¼,¼,¼,/¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,¼,  M A G A Z I N E
                                             P H I L E S    1 9 9 7


╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫
╫                                                                    ╫
╫  the following boards listed hold true to the scene and if you     ╫
╫  are deep into h/p and the likes, i suggest you give them a call.  ╫
╫  some are gone and i haven't kept up with all of them.. most       ╫
╫  should be all good.                                               ╫
╫                                                                    ╫
╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫╫


Apocalypse 2000 - H/P/Punk/Ska/Rave/home of the PIMPS!
+1-847-831-0484 - *NO* ratio. 1 gig online. 
(^^^^^^^^^^^^^^ New Number)

The Centre' - H/P, more than a gig online plus cd's.
+1-207-490-2158

Poison Pen - H/P, *NO* ratio
+1-847-966-2095 
(^^^^^^^^^^^^^^ Yet, ANOTHER New Number)

Moo 'n' Oink - H/P 
+1-847-256-5928

Microcosm - H/P
+1-904-484-5548

Underworld 96
**(514) toast**

Aneurysm - H/P - NUP: Discipline
+1-514-458-9851

Last Territory - H/P
+1-514-565-9754

Linoleum - H/P
**(704) toast**

Hacker's Haven - H/P
+1-303-343-4053

Digital Disturbance - H/P
**(516) toast**

Hacker's Hideaway - H/P
+1-416-534-0417

TOTSE - H/P and crazy other amounts of info
+1-510-935-5845

The Switchboard - H/P
+011-31-703-584-868

Arrested Development - H/P
+31 ***TOAST** and will be missed.


----- If you'd like to write for PIMP, you can send any and all worx
      to pimp@dope.org

      all worx will be looked at and considered.  all credit is always
      going to be given to whomever the giver is, unless you would 
      rather not be known.  PIMP Issue numba thirteen, outtie.
GO BACK...