home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
miscpub1
/
phun109.txt
< prev
next >
Wrap
Text File
|
1992-09-26
|
5KB
|
105 lines
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
=
Phile 1.9 of 1.14
A notice to All Phreakers
-------------------------
Written By - The Jedi
In this time and age, phreaking is becoming more and more difficult. I
can remember a time when there was such an abundance of codes, all you had to
do was set up your favorite code hacking program and wait a couple of
minutes.
There was never a worry about getting busted and people often posted dozens of
codes at a time. Now that Sprint and MCI are starting to catch on to things by
extending the length of codes and such, its harder to get them and more
dangerous if you get caught. Everyone decent phreaker knows this already, its
no big secret. But, while the art of phreaking hasn't really changed much in
the past few years, the techniques that these companies are using to catch
phreakers has! I'm writing this article to warn those who hack out codes
extensively.
Working for a Fortress Phone Company does have it's advantages. I've
managed to read a couple of magazines about fortress phones and the companies
that use them. I recently stumbled across an article concerning long-distance
communication fraud entitled "Fraud Prevention- Taking The Offensive". Since
what I've read in the article was news to me, I figured that a few people out
there might also be interested.
It seems that one company has devised a way of disguising good codes
while
someone is hacking them in real-time! The following is taken from that
article:
"We have written software in our DCO-CS [Digital Central Office-Carrier
Switch] that can detect when one of these hackers is at work by recognizing
the patterns they frequently use..... Usually a hacker will hit one code,
two codes, three codes, etc. - they usually follow some sort of pattern".
"By using their computers to perform a set of mathematical procedures,
or algorithms, hackers have been able to determine authorized calling
codes.
We use the algorithms to figure out what he's dailed so far and then
determine where he's going next"
"If he's going to what we know is a good code, then we will make it look
like a bad code for his call only. If he does hit that good code, he won't
be able to get through."
"If he's using a random pattern with his off code, he's probably using
either the same number he's calling to, which we can monitor by watching
the successive call to that same number, or we can monitor the fact that
he's hitting 'x' number of bad off codes in a row."
As of now, the only company that using this method is Sprint but from what
I see, it's getting popular. 19 People have been arrested recently by
employing this system.
BEWARE:
-------
1 - First of all, it'll make good codes look bad - Making every phreaker run
in circles, never finding a decent code.
2 - It works in real-time. That is, you're constantly being monitored.
3 - It gives a printout of all the information which CAN BE USED AS EVIDENCE
IN COURT.
4 - While it's not always possible for them to get the originating phone
number, they sometimes get help from the connecting carrier. Which means
my friends, the bbs that you're calling to hack to.
My Suggestions:
---------------
1 - First of all, make the calls as random as possible. Using a code hacker
that hacks codes in sequencial order is out of the question!!
2 - Don't make too many attempts at one time. The less you hack at a given
time, the less you are suspected of phreaking.
3 - Use multiple extenders and target carriers.
4 - Don't use the same good code to often. If you do, at least don't call the
same place 100 times! The person that owns that code will report the
activity and they'll catch up with the person you're calling to.
5 - Stay away from Sprint. They're really good at this shit, don't mess around
with them unless you know what you're doing. Try to stick with hacking
codes from the newer, less sophisticated companies that don't employ this
system.
If you stick to those general rules, you shouldn't have too much trouble.
Even the company that makes this system [Stromberg-Carlson Co.] admits that
it's impossible to stop phreaking altogether. Those of you that are new to
phreaking and stuff like it, educate yourselves BEFORE you dive into it.
Remember, we're all in this together, if you get busted calling a
pirate/hack/phreak/anarchy bbs. They'll get a hold of the user list and posts
and bust everyone on the system. Don't ever rat on anyone!!!
Well, thats about it for me. Look for my new text files out soon on
fortress phones.And call...
<== The Jedi ===>
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
DOWNLOADED FROM P-80 SYSTEMS 304-744-2253
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+