home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
TAP YIPL
/
TAP_and_YIPL_Collection_CD.iso
/
PHREAK
/
BOXES
/
BLUEBOX2.TXT
< prev
next >
Wrap
Text File
|
1991-04-25
|
4KB
|
92 lines
D
File # to download [?/List]: 21
Press [X] to Abort / [CR] to Continue:
Title: Boxing with Big Brother (1988 boxing)
Date: 4/29/88
Time: 8:58 pm
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ @
@ Blue Boxing with @
@ Big Brother: @
@ @
@ ->I<- @
@ @
@ By @
@ Doctor Cypher @
@ @
@ A Black September @
@ Presentation @
@ @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Boxing in the late '80s:
While most of us have reverred to hacking and L/D accounts, some of us
refuse to give up the purest form of telecommunications experimentation.
While almost every step has been taken to secure the lines from unauthorized
trunk access and use, what remains true even now, is that the learned phreaker
always stays a step or two ahead of whatever forces prevent the phreakers'
manipulation of controlled network facilities. While most of the information
contained here is common, some truly dedicated to the art of Blue-Boxing may
be oblivious to some of these methods of boxing with Big Brother:
2600htz line detection units:
The infamous 2600htz Tone detection/traps can detect a 2600 going
through the system without proper network procedure. These traps are
newer than the Bell equipment installed in some of the earlier switching
systems, so they are more versatile. In order for a TDU to be activated,
the trunking frequency must be fairly pure; It must differentiate between
a possible human voice in that range, or an innocent instrumental source,
so they are much more liberal than the older Bell equipment.. When a
fairly equal ratio of pink/white noise combined with a 2600htz tone is
applied to the line, bell equipment may respond to the signal, while TDU
may not. This method is not failsafe.. It has about a 10-15% failure
rate (if not more) but is better than nothing.
Network Toll-trunk test lines (trunk lines:)
The phone system, in many cases, will have numbers for testing purposes
which drop the line at the CO into a trunk. Many numbers like these exist
in newer ESS installations, or many Xbar/Cbar systems. These numbers seem
to be predominant in the 99XX range. This method is probably the safest,
Screening-code initialization faults:
Some phone systems have absent screening codes. For instance, if one
were to dial 800/141-1212 they would reach an inward. This is HIGHLY
unlikely, for DMS-100 / SR-100 systems (and probably most all others,)
have the screening code set as a default in the software. Just check
it out, or if you know any Telco employees, it may be possible to coax
them into disabling "Subscriber-to-station screening." I know I did.
Another way is to call your local intercept operator, and ask her to
dial 800/141-1212, as intercepts are generally stupid, knowing only how
to dial.
Well, armed with this information, one may continue to explore the network with
minimized paranoia. Enjoy, and look out for updates...
Call these boards....
TWGSC (cDc) 209-526-3194
Hack Shack 214 214-422-4307 Ask me for access on other systems..
Dragonfire (Black September) 609-424-2606
OSUNY (2600) 914-725-4060
LUnAtIc LaBs (Phrack) 415-278-7421
Pirate-80 International 304-744-2253 Invitation or $25.00/yr.
Metal AE 201-879-666-8 Pw: KILL
** EOF (1Ah) **
/ex
Dallas Hack Shack 214/422-4307
GFile Menu [?=help] :