home *** CD-ROM | disk | FTP | other *** search
- ==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
- ==Phrack Inc.==
- Volume One, Issue Three, Phile #2 of 10
- ==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==-==
-
- The purpose of this file is to tell you what you would be dealing with if you
- stumble across this system, or if you know of a company that is using this
- system. It doesn't go into incredible detail, and is lacking in areas. It is
- not a guide to hacking into it, just letting you know what you would be dealing
- with. This is to pique your interest in the system.
-
- So What the Hell is ROLM?
- -------------------------
-
- ROLM is a "Business Communications System" bought by IBM a few months ago, in
- an effort to compete effectively with AT&T, and get a larger share of the
- market, in a grand master plan to become "Big Daddy Blue" as opposed to "Ma
- Bell". It is a very complex system, with features such as PhoneMail, A
- Super-PBX, Local Area Networks, Public and Private Data Networks, Desktop
- Communications, and Call Management.
-
- The heart of the system is the Controller, called the CBX <Computerized
- Business Exchange>. This controls the entire network accessible through ROLM.
- Since 1983, the CBX was redesigned and upgraded to the CBX II. It is a PBX
- with much much more <See 'Introduction to PBX's' available on your local bbs>
- to offer, and that is ROLM's claim to fame. It is light years ahead of the
- regular PBX system.
-
-
- The CBX II
- ----------
-
- The CBX II is the core of the ROLM network. It is computer driven and
- expandable from one node, with 165 channels, to 15 nodes providing 11,5200
- 2-way channels. The smaller business could have a model with a 16 user maximum
- limit, but it can go up to 10,000 users, though this would be quite rare <and
- quite God Damn expensive!>. It can be accessed from outside lines <like you>
- as well as HardWired units, with a switching system to prevent busy signals on
- a port. Speed depends on the system in place, either the newer, faster ROLMbus
- 295, or the older standard ROLMbus 74. <see Service manuals for exact details>
- The larger the system, the faster as well. It is adjustable to accept
- different bandwidths for the various components, such as Telex, Voice, Data,
- Mainframe, LAN, Video <ta-da! Picturefones in reality!>, and anything hooked
- up to the system. Similar tasks can be bunched onto one channel as well, at
- high or low speeds. If multiplexing is used <above>, the maximum speed is
- 192,000 bps, and if using a single interface, the top possible rate is a
- mindboggling 37,000,000 bps, which if you ask me, if just fluff and not too
- practical, so they are usually multiplexed. <Now, what a difference that is
- from 300 baud!>. Using the CBX II network, you might find just about any kind
- of mainframe, from HP, to DEC, to VAX, to the IBM 327# series.
-
- Note : There is a smaller version of this called the VSCBX.
-
-
- Phone Mail
- ----------
-
- This is one of the little beauties of the system, something truly fun to fuck
- with. I called ROLM Headquarters in California to ask specific questions about
- ROLM, posing as a researcher, and I got the big runaround, transferred from
- department to department. Maybe you can get further than I. Their # is
- 408-986-1000. The # to PhoneMail from the outside is 800-345-7355. A nice
- computer-generated voice comes on asking you to enter your Extension number
- <which each employee has>, and then enter the "#" sign. Then enter your
- password. If you make around 3 or 4 bad attempts at an Extension of Password,
- it will automatically ring another number, assistance I assume, to find out why
- there has been an unsuccessful entry attempt. I haven't played around with
- this that much, so leave mail to Monty Python with whatever you find. Once
- entering an authorization # with correct password, you will be presented with
- more options, leave messages to other people, and whatnot. You can hear your
- messages, forward them to another person, leave the same message to more than
- one person, change your welcome message, etcetera. The service is for those
- business-type pigs who never sit still for one minute, like they are
- permanently on speed.
-
- A Phone Mail Scenario
- ---------------------
-
- Let's say if Mr. Greed goes out to meet his secretary at a motel, but
- definitely has to get that important message from Mr. Rasta, who's bringing in
- $3 mil in FLake, and can't trust it to the person who would handle it <ie: the
- person filling in for his sec with the tremendous tits who is getting balled by
- the dirty old fat man>. Mr. Greed would have given Mr. Rasta his phone # and
- he would be forwarded to the Phone Mail network, where he would hear a message
- left my Mr. Greed, to anyone who would call. Mr. Rasta would leave his
- message and hang up. Then Mr. Greed could call up the 800-345-7355 #, punch
- in his extension authorization number, and password. Or, if he was back at the
- office, he could get it there through DeskTop communications. Messages can be
- delivered without error, in the person's own voice, without other people
- knowing about it. Therefore, someone with enough knowledge could use an unused
- account and use it as his own service, without the knowledge of others.
-
- DeskTop communications
- ----------------------
-
- ROLM has developed a Computer/Telephone integrated device for use with the
- Desktop communications. It is linked with the CBX II through fone lines, thus
- accessible by you and me from the outside. It is not hardwired, though it can
- approach hardwired speed. If you could get your hands on one of these
- computer/fones then I think you would have found something very useful at home,
- in your general life. But you could access the network without the special
- features of the fone, like one touch dialing, which is designed for the stupid
- lazy businessman. You can access company databases through the network,
- mainframes, other people, just about anything as if you were right there and
- told your secretary to do it for you. There is special software used by the
- computers or computer/fone but it can be improvised and is just an aid. It
- uses a special protocol <Don't know what, try to get your hands on one by
- trashing a sales office>. What is great is that everything is tied together
- through telefone lines, and not RS-232C! Thus, there is an access
- port....somewhere. Scan the #'s around the office # using ROLM. How do you
- know if it is using ROLM one way or the other. Compile a list of local
- businesses, call them up saying "This is ROLM Customer Support. We have a
- report of a complaint in your CBX II network, let me speak to your supervisor
- please." If they say "ROLM? CBX II? We don't use that" then just apologize
- and go elsewhere. Or say that you are from ROLM corp and would like to know if
- the company is interested in using it to network its system. Like, if they
- have it already, they would say that they had it. And if they didn't, you
- would just give them a fake # <or if you're nice the # for the local sales
- office obtainable in the list below>.
-
- But you know what's REALLY Great? They have made the network link in mind
- for the person with a Computer IQ of about 0. Commands are in plain English.
-
- Here is a demonstration screen as seen in their brochure:
-
- CALL, DISPLAY or MODIFY
-
- Display groups
-
- ACCESSIBLE GROUPS:
- [00] PAYROLL [01] MODEM [02] IBMHOST
- [03] DOWJONES [04] DECSYSTM [05] MIS-SYSTM
- [06] DALLAS [07] SALES
-
- CALL, DISPLAY OR MODIFY?
- Call Payroll
-
- CALLING 7717 <which would be the ID code for the PAYROLL file>
- CALL COMPLETE
-
- **PAYROLL SYSTEM** <or whatever they want to call it>
- ENTER ACCOUNT CODE:
-
- See, nothing is confusing, everything pretty self-explanatory. There may be
- more than one person wanting to do the same thing you are, so if there is, you
- would be put on a queue for the task. It seems that those with an IBM would be
- best suited for ROLM hacking, because ROLM is owned by IBM, and the PC's used
- by the network are IBM. A person with a simpler fone/Terminal couldn't access
- something like their DEC mainframe, or something like that. By calling in, you
- could not run an application, unless you had a special interface, but you could
- access the database, which any dumb terminal could do.
-
- However, there are security levels. Thus one with a privileged account could
- access more things than one without it. Like Joe Schmoe in Sales couldn't get
- to Payroll . It seems that for non-IBM's to access some of the parts of the
- network, you would need an interface to become the same thing as a RolmPhone.
-
- Excessive #'s of bad logon attempts, which would be construed as a linking
- error would notify the network manager, And if they saw that there was no
- hardware error, eventually, they would think of if they were somewhat
- experienced, you guessed it, hackers.
-
- The PBX
- -------
-
- ROLM has something called Integrated Call Management <from here on known as
- ICM>. Now, when designing ICM, they must have taken into account the abuse
- possible in plain ol' PBX's. So they put in something called Call Screening.
- This will enable the company to restrict calls to certain #'s and prefixes.
- Calls to non-business #'s or certain areas can be screened out <"No personal
- calls on my time, Johnson!">, with the exception of 1 specific # that you want.
-
- There is a choice of having a codeless, screened PBX, or a PBX where accounts
- are assigned to each employee, and the #'s they call get recorded to that
- account. There can be privileged accounts where a large volume of calls would
- go relatively un-noticed. But I don't think that large-scale abuse of this
- system would be easy or practical. Calls are routed AUTOMATICALLY through the
- service where the rates are cheaper to the location dialed, which is pretty
- fucking cool. And, the PBX is accessible from the outside, using Direct Inward
- System Access, making it AB-useable.
-
- But what about if there is Equal Access in that area? It doesn't matter, the
- CBX will automatically access the service without you having to worry about it
- <hell, this is totally unnecessary for a hack/phreak, cause we ain't paying for
- the damn call anyhow!>
-
- BUT!: There is a use of Call Detail Recording, where information on all
- ingoing and outgoing calls are recorded.
-
- Conclusion
- ----------
-
- Not a lot of research went into this file, but it did take a little while to
- type up, and all of the information is correct, to my knowledge. Anyone is
- free to expand on this file into a Part II. It was written to enlighten people
- about this system, and I hope this has helped a little bit.
-
- Sysops: You are free to put this file up as long as NONE of the credits are
- changed! <this means the Phrack, Inc. AND Personal credits>. Please give us
- a chance.
-
- Coming soon, to a telephone near you: The Return of The Flying Circus. Look
- for it.
- --Later On
- Monty Python <01/11/86>
-
-