3483 lines
168 KiB
Plaintext
3483 lines
168 KiB
Plaintext
![]() |
Subject: 3500 lines of obsolete phreaking stuff
|
|||
|
Date: Thu May 12 13:13:03 1994
|
|||
|
|
|||
|
|
|||
|
This is something I put together a few years ago. None of it was
|
|||
|
written by me. I spellchecked it, made a table of contents, and
|
|||
|
converted from 20 column all-caps and removed K0oL spellings.
|
|||
|
|
|||
|
I don't want comments, good or bad. I figured somebody might
|
|||
|
want this, so I'm posting it, but that the extend of my involvement.
|
|||
|
|
|||
|
I'm sorry about the control-L's. I don't know how to remove them.
|
|||
|
|
|||
|
|
|||
|
xxxxxxxxxxxxxxxxxxxxxxxxxxx
|
|||
|
Table of Contents
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Introduction to hacking. . . . . . . . . . . . . . . . . . . . 1
|
|||
|
|
|||
|
Phone Hacking. . . . . . . . . . . . . . . . . . . . . . . . . 2
|
|||
|
Basic Boxes Technically Explained . . . . . . . . . . . . 3
|
|||
|
(BLUE,3); (BLACK,4); (CHEESE,5)
|
|||
|
Voice mail box hacking. . . . . . . . . . . . . . . . . . 6
|
|||
|
Blue Box Tones. . . . . . . . . . . . . . . . . . . . . . 9
|
|||
|
Customer name and address . . . . . . . . . . . . . . . . 9
|
|||
|
Lock In Trace . . . . . . . . . . . . . . . . . . . . . . 14
|
|||
|
Pinkish Box . . . . . . . . . . . . . . . . . . . . . . . 16
|
|||
|
Pearl Box . . . . . . . . . . . . . . . . . . . . . . . . 17
|
|||
|
Brown Box . . . . . . . . . . . . . . . . . . . . . . . . 19
|
|||
|
Scarlet box . . . . . . . . . . . . . . . . . . . . . . . 20
|
|||
|
Day-Glow. . . . . . . . . . . . . . . . . . . . . . . . . 20
|
|||
|
Gold Box Plans. . . . . . . . . . . . . . . . . . . . . . 22
|
|||
|
Green Box . . . . . . . . . . . . . . . . . . . . . . . . 23
|
|||
|
Blotto Box. . . . . . . . . . . . . . . . . . . . . . . . 23
|
|||
|
|
|||
|
Computer Hacking . . . . . . . . . . . . . . . . . . . . . . . 26
|
|||
|
Tymnet. . . . . . . . . . . . . . . . . . . . . . . . . . 27
|
|||
|
Telenet . . . . . . . . . . . . . . . . . . . . . . . . . 32
|
|||
|
Hacking Unix. . . . . . . . . . . . . . . . . . . . . . . 34
|
|||
|
Primenet. . . . . . . . . . . . . . . . . . . . . . . . . 36
|
|||
|
Hacking DECs. . . . . . . . . . . . . . . . . . . . . . . 44
|
|||
|
Crashing BBSs . . . . . . . . . . . . . . . . . . . . . . 45
|
|||
|
Credit bureaus. . . . . . . . . . . . . . . . . . . . . . 54
|
|||
|
File grabbing on large systems. . . . . . . . . . . . . . 64
|
|||
|
|
|||
|
Potpourri. . . . . . . . . . . . . . . . . . . . . . . . . . . 65
|
|||
|
Bugs. . . . . . . . . . . . . . . . . . . . . . . . . . . 66
|
|||
|
Wiretapping . . . . . . . . . . . . . . . . . . . . . . . 67
|
|||
|
Lunch Box . . . . . . . . . . . . . . . . . . . . . . . . 72
|
|||
|
Beep Time . . . . . . . . . . . . . . . . . . . . . . . . 76
|
|||
|
|
|||
|
Reference. . . . . . . . . . . . . . . . . . . . . . . . . . . 77
|
|||
|
8OO VMB Systems . . . . . . . . . . . . . . . . . . . . . 78
|
|||
|
Extenders . . . . . . . . . . . . . . . . . . . . . . . . 78
|
|||
|
Loops . . . . . . . . . . . . . . . . . . . . . . . . . . 79
|
|||
|
PBXs. . . . . . . . . . . . . . . . . . . . . . . . . . . 79
|
|||
|
Sweeps. . . . . . . . . . . . . . . . . . . . . . . . . . 79
|
|||
|
1-800 modem numbers . . . . . . . . . . . . . . . . . . . 79
|
|||
|
Area Codes by State . . . . . . . . . . . . . . . . . . . 82
|
|||
|
INTRODUCTION TO HACKING
|
|||
|
|
|||
|
Most people who have never hacked or are beginners think that
|
|||
|
hackers are a small community of very knowledgeable computer
|
|||
|
"geniuses" that randomly break into systems for fun and then
|
|||
|
create havoc or steal information. I will speak of my own views
|
|||
|
on hacking which shouldn't reflect the feelings of the entire
|
|||
|
hacking community but I would guess a large amount. First of all
|
|||
|
hacking is getting more and more risky everyday. Because of this,
|
|||
|
hacking for fun isn't as safe as it used to be (although most of
|
|||
|
my hacking is for fun). The reason people (people I know) hack is
|
|||
|
because we believe in free information exchange. This means that
|
|||
|
I should be able to freely access any information that is
|
|||
|
available over the modem that I want. There are obvious reasons
|
|||
|
why this can't be achieved, but if people have information that
|
|||
|
is that sensitive then it should not be put out over the modem.
|
|||
|
Now the second and biggest misconception about hacking is how the
|
|||
|
hacker actually "hacks". Most people think that hacking is just
|
|||
|
basically getting lucky and guessing a password that lets you
|
|||
|
into a system. This is *very* untrue. Let us take an example that
|
|||
|
you have just broken into the CIA's computer system. So suddenly
|
|||
|
you get a -> prompt. Now what do you do?!? This is the difference
|
|||
|
between the hacker and some kid that is good at guessing. The kid
|
|||
|
may be able to guess a password, but if he doesn't know what to
|
|||
|
do once he's in then he might as well have not even hacked the
|
|||
|
password at all. So, the main objective of the hacker is to
|
|||
|
concentrate on learning how to use a system. After he has done
|
|||
|
that then he can figure out ways to get around certain kinds of
|
|||
|
security and get to the stuff he wants. So what you should do is
|
|||
|
read all the manual's and text files that you can get your hands
|
|||
|
on. Because before you can defeat a system, you must know how it
|
|||
|
works (this works for life in general). Ok, now you understand
|
|||
|
what hacking is and how you should go about learning it.
|
|||
|
|
|||
|
Phone Hacking
|
|||
|
Basic Boxes Technically Explained
|
|||
|
|
|||
|
BLUE
|
|||
|
The "Blue Box" was so named because of the color of the first
|
|||
|
one found. The design and hardware used in the Blue Box is fairly
|
|||
|
sophisticated, and its size varies from a large piece of
|
|||
|
equipment to the size of a pack of cigarettes. The Blue Box
|
|||
|
contains 12 or 13 buttons or switches that emit multi-frequency
|
|||
|
tones characteristic of the tones used in the normal operation of
|
|||
|
the telephone toll (long distance) switching network. The Blue
|
|||
|
Box enables the user to place free long distance calls by
|
|||
|
circumventing toll billing equipment. The Blue Box may be
|
|||
|
directly connected to a phone line, or it may be acoustically
|
|||
|
coupled to a telephone handset by placing the Blue Box's speaker
|
|||
|
next to the transmitter or the telephone handset. To understand
|
|||
|
the nature of a fraudulent Blue Box call, t is necessary to
|
|||
|
understand the basic operation of the Direct Distance Dialing
|
|||
|
(DDD) telephone network. When a DDD call is properly originated,
|
|||
|
the calling number is identified as an integral part of
|
|||
|
establishing the connection. This may be done either
|
|||
|
automatically or, in some cases, by an operator asking the
|
|||
|
calling party for his telephone number. This information is
|
|||
|
entered on a tape in the Automatic Message Accounting (AMA)
|
|||
|
office. This tape also contains the number assigned to the trunk
|
|||
|
line over which the call is to be sent. The information relating
|
|||
|
to the call contained on the tape includes: called number
|
|||
|
identification, time of origination of call, and info that the
|
|||
|
called number answered the call and time of disconnect at the end
|
|||
|
of the call. Although the tape contains info with respect to many
|
|||
|
different calls, the various data entries with respect to a
|
|||
|
single call are eventually correlated to provide billing info for
|
|||
|
use by your Bell's accounting department. The typical Blue Box
|
|||
|
user usually dials a number that will route the call into the
|
|||
|
telephone network without charge. For example, the user will very
|
|||
|
often call a well-known INWATS (toll-free) customer's number. The
|
|||
|
Blue Box user, after gaining this access to the network and, in
|
|||
|
effect, "seizing" control and complete dominion over the line,
|
|||
|
operates a key on the Blue Box which emits a 2600 Hertz (cycles
|
|||
|
per second) tone. This tone causes the switching equipment to
|
|||
|
release the connection to the INWATS customer's line. The 2600Hz
|
|||
|
tone is a signal that the calling party has hung up. The Blue Box
|
|||
|
simulates this condition. However, in fact the local trunk on the
|
|||
|
calling party's end is still connected to the toll network. The
|
|||
|
Blue Box user now operates the "KP" (Key Pulse) key on the Blue
|
|||
|
Box to notify the toll switching equipment that switching signals
|
|||
|
are about to be emitted. The user then pushes the "number"
|
|||
|
buttons on the Blue Box corresponding to the telephone # being
|
|||
|
called. After doing so he/she uses the "ST" (Start) key to tell
|
|||
|
the switching equipment that signalling is complete. If the call
|
|||
|
is completed, only the portion of the original call prior to the
|
|||
|
'blast' of 2600Hz tone is recorded on the AMA tape. The tones
|
|||
|
emitted by the Blue Box are not recorded on the AMA tape.
|
|||
|
Therefore, because the original call to the INWATS # is toll-
|
|||
|
free, no billing is rendered in connection with the call.
|
|||
|
Although the above is a description of a typical Blue Box call
|
|||
|
using a common way of getting into the network, the operation of
|
|||
|
a Blue Box may vary in any one or all of the following respects:
|
|||
|
|
|||
|
The Blue Box may include a rotary dial to apply the 2600Hz tone
|
|||
|
and the switching signals. This type of Blue Box is called a
|
|||
|
"dial pulser" or "rotary SF" Blue box. Getting into the DDD toll
|
|||
|
network may be done by calling any other toll-free # such as
|
|||
|
Universal Directory ASSistance (555-1212) or any number in the
|
|||
|
INWATS network, either inter-state or intra-state, working or
|
|||
|
non-wrking. Entrance into the DDD toll network may also be in
|
|||
|
the form of "short haul" calling. A "short haul" call is a call
|
|||
|
to any # which will result in a lesser amount of toll charges
|
|||
|
than the charges for the call to be completed by the Blue Box.
|
|||
|
For example, a call to Birmingham from Atlanta may cost $.80 for
|
|||
|
the first 3 minutes while a call from Atlanta to Los Angeles is
|
|||
|
$1.85 for 3 minutes. Thus, a short haul, 3-minute call to
|
|||
|
Birmingham from Atlanta, switched by use of a Blue Box to Los
|
|||
|
Angeles, would result in a net fraud of $1.05 for a 3 minute
|
|||
|
call. A Blue Box may be wired into the telephone line or
|
|||
|
acoustically coupled by placing the speaker of the Blue Box near
|
|||
|
the transmitter of the phone handset. The Blue Box may even be
|
|||
|
built inside a regular Touch-Tone phone, using the phone's push-
|
|||
|
buttons for the Blue Box's signalling tones. A magnetic tape
|
|||
|
recording may be used to record the Blue Box tones for certain
|
|||
|
phone numbers. This way, it's less conspicuous to use since you
|
|||
|
just make it look like a walkman or whatever, instead of a box.
|
|||
|
|
|||
|
All Blue Boxes, except "dial pulse" or "Rotary SF" Blue Boxes,
|
|||
|
must have the following 4 common operating capabilities:
|
|||
|
|
|||
|
It must have signalling capability in the form of a 2600Hz tone.
|
|||
|
This tone is used by the toll network to indicate, either by its
|
|||
|
presence or its absence, an "on hook" (idle) or "off hook" (busy)
|
|||
|
condition of the trunk. The Blue Box must have a "KP" tones that
|
|||
|
unlocks or readies the multi-frequency receiver at the called end
|
|||
|
to receive the tones corresponding to the called phone #. The
|
|||
|
typical Blue Box must be able to emit M tones which are used to
|
|||
|
transmit phone #'s over the toll network. Each digit of a phone #
|
|||
|
is represented by a combination of 2 tones. For example, the
|
|||
|
digit 2 is transmitted by a combination of 700Hz and 1100Hz. The
|
|||
|
Blue Box must have an "ST" key which consists of a combination of
|
|||
|
2 tones that tell the equipment at the called end that all digits
|
|||
|
have been sent and that the equipment should start switching the
|
|||
|
call to the called number.
|
|||
|
|
|||
|
BLACK
|
|||
|
This Box was named because of the color of the first one
|
|||
|
found. It varies in size and usually has one or two switches or
|
|||
|
buttons. Attached to the telephone line of a called party, the
|
|||
|
Black Box provides toll-free calling *to* that party's line. A
|
|||
|
Black Box user tells other people beforehand that they will not
|
|||
|
be charged for any call placed to him. The user then operates the
|
|||
|
device causing a "non-charge" condition ("no answer" or
|
|||
|
"disconnect") to be recorded on the telephone company's billing
|
|||
|
equipment. A Black Box is relatively simple to construct and is
|
|||
|
much less sophisticated than a Blue Box. NOTE: This will not work
|
|||
|
on any type of Electronic Switching Systems, (ESS, DMS100 etc.)
|
|||
|
|
|||
|
CHEESE
|
|||
|
This Box was named after the container in which the first one was
|
|||
|
found. Its design may be crude or very sophisticated. Its size
|
|||
|
varies; one was found the size of a half-dollar. A Cheese Box was
|
|||
|
used most often by bookmakers or betters to place wagers without
|
|||
|
detection from a remote location. The device inter-connects 2
|
|||
|
phone lines, each having different #'s but each terminating at
|
|||
|
the same location. In effect, there are 2 phones at the same
|
|||
|
location which are linked together through a Cheese Box. It is
|
|||
|
usually found in an unoccupied apartment connected to a phone
|
|||
|
jack or connecting block. The bookmaker, at some remote location,
|
|||
|
dials one of the numbers and stays on the line. Various bettors
|
|||
|
dial the other number but are automatically connected with the
|
|||
|
book maker by means of the Cheese Box interconnection. If, in
|
|||
|
addition to a cheese box, a Black Box is included in the
|
|||
|
arrangement, the combined equipment would permit toll-free
|
|||
|
calling on either line to the other line. If a police raid were
|
|||
|
conducted at the terminating point of the conversations -the
|
|||
|
location of the Cheese Box- there would be no evidence of
|
|||
|
gambling activity. This device is sometimes difficult to
|
|||
|
identify. Law enforcement officials have been advised that when
|
|||
|
unusul devices are found associated with telephone connections
|
|||
|
the phone company security representatives should be contacted to
|
|||
|
assist in identification.
|
|||
|
|
|||
|
(This probably would be good for a BBS, especially with the Black
|
|||
|
Box set up. and if you ever decided to take the board down, you
|
|||
|
wouldn't have to change your phone #. It also makes it so you
|
|||
|
yourself cannot be traced. I am not sure about calling out from
|
|||
|
one though.) VOICE MAIL BOX HACKING
|
|||
|
|
|||
|
Hello again, and welcome to another <20>egions f <20>ucifer text file!
|
|||
|
This text file has to do with hacking and scanning VMBs. The
|
|||
|
reason I am writing this file is because I am very good at it,
|
|||
|
and have had years of experience. In fact I have been called by
|
|||
|
MCI for screwing them over by attacking and taking over a whole
|
|||
|
damn system with a few friends of mine. Anyway, hacking VMBs is
|
|||
|
very simple and basically safe, and not only that but they are
|
|||
|
cool to have around. You can give them to friends, you can trade
|
|||
|
them for access on bulletin boards, or you can use it for
|
|||
|
yourself. As for this 'Tutorial on Hacking VMBs', we will be
|
|||
|
talking about what systems to hack, how you go about hacking
|
|||
|
them, default passwords, hints on better scanning, and having
|
|||
|
your very own box.
|
|||
|
|
|||
|
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a
|
|||
|
VMB is like an answering machine. You can use it for all sorts of
|
|||
|
things. Most VMB systems are dialed though 800 numbers. People
|
|||
|
call up the VMB system that you have a box on, and dial in your
|
|||
|
box number and then leave you a message. Whenever you want to
|
|||
|
check your box, you just call up, enter your password and read
|
|||
|
your messages. Inside a VMB you can do whatever, you can leave
|
|||
|
messages to others on the system, you can change your 'Out Going'
|
|||
|
message, you can have guest boxes (Explained later), you can have
|
|||
|
the box call your house when you get an Urgent message, you can
|
|||
|
do a lot of things. In fact, on some systems you can even CALL
|
|||
|
OUT through them, so they can be used as a code of sorts! They
|
|||
|
are cool to have.
|
|||
|
|
|||
|
You should scan/hack out Virgin Systems, this is another way of
|
|||
|
calling a system that hasn't been hack out yet. Also, CINDI
|
|||
|
Systems and ASPEN Systems have the best boxes and the most
|
|||
|
options that VMB Systems can offer. I will be talking about ASPEN
|
|||
|
System today since I know most about those.
|
|||
|
|
|||
|
Okay once you've found your Virgin VMB System, you start to scan.
|
|||
|
Just incase you don't know what scanning is, that means you
|
|||
|
search for boxes that are hackable (Explained later on). Now you
|
|||
|
dial up the system and when it picks up and the bitch starts to
|
|||
|
talk, press the "#" key. It will then ask you for your box
|
|||
|
number... now there are two different way the ASPEN System can be
|
|||
|
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital
|
|||
|
Box Number System". Now lets just say this system is a 3 Digit
|
|||
|
System. Okay, when it asks for your Box Number, enter in 999, now
|
|||
|
it will say one of three things: [These are known as 'Greeting
|
|||
|
Names']
|
|||
|
|
|||
|
1. John Doe [Box owners name]
|
|||
|
2. "Box Number 999 Is Not a Valid Box Number"
|
|||
|
3. "Box Number 999"
|
|||
|
Now, if it either says 1 or 2, go to box number
|
|||
|
998...997...996...995..etc, but if it says 3, then you are lucky,
|
|||
|
now it will ask you for your password, now you are probably
|
|||
|
saying 'Oh no this is where it gets difficult'... well you are
|
|||
|
WRONG! This part is easy. Here is a list of ASPEN Default
|
|||
|
Passwords:
|
|||
|
|
|||
|
* We will use box number 666 as an example box #
|
|||
|
[ BN = Box Number ]
|
|||
|
|
|||
|
List of Default Password: Combination Result
|
|||
|
|
|||
|
1-BN 1666
|
|||
|
BN+1 667
|
|||
|
0-BN 0666
|
|||
|
BN-0 6660
|
|||
|
Most Common <20>į BN 666
|
|||
|
|
|||
|
Now enter in a those defaults, try JUST the Box Number first,
|
|||
|
ASPENs usually use that most. Now, if you try all those Defaults
|
|||
|
and still can not get into that Voice Mail Box, then that means
|
|||
|
that the box has been already taken, but the owner hasn't changed
|
|||
|
his 'Generic Message', if you don't get in, you will just have to
|
|||
|
search until you get in.
|
|||
|
|
|||
|
Okay, once you get your first box, *DO NOT* change anything!!
|
|||
|
That will come later. Your first box is, as what is known as a
|
|||
|
'Scanning Box'! What you do with your Scanning Box is this: You
|
|||
|
enter "3" from the main commands menu, and it will ask you for
|
|||
|
the box number. Now that command is the "Check for Receipt"
|
|||
|
command, what it does it check Box #xxx for mail rom you. This
|
|||
|
command is very convenient for us VMB Hackers. To use that
|
|||
|
command to your advantage, you enter in box a box number and it
|
|||
|
will say 1 of the three 'Greeting Names', like before, if it say
|
|||
|
#3, then you write down that Box Number and hack it later. But if
|
|||
|
it says 1 or 2, then just keep scanning! All boxes with the
|
|||
|
number 3 Greeting Name is known as a 'Hackable Box'. Now you keep
|
|||
|
scanning until you have gone all the way down to Box number 000
|
|||
|
or whatever is the lowest box it supports. Now, once you have
|
|||
|
your list this is when all the fun starts! Now you are ready to
|
|||
|
hack!
|
|||
|
|
|||
|
|
|||
|
Hacking Out Your New Found 'Hackable' Boxes:
|
|||
|
|
|||
|
Okay this is the easy part. After you spent most of your time by
|
|||
|
scanning the system you should be used to the system and how it
|
|||
|
works, that should make hacking the ASPEN all the easier. Now, if
|
|||
|
you had a 'Scanning Box', you should know what the default
|
|||
|
password was for your Scanning Box. Well if the password for your
|
|||
|
Scanning Box was just the Box Number, then *EVERY* other hackable
|
|||
|
box should have the SAME default password. VMB Systems have only
|
|||
|
one default password, If one box has the BN for a Default PW, the
|
|||
|
all the others will too.
|
|||
|
|
|||
|
Okay, you call up the VMB System will the list of 'Hackable'
|
|||
|
boxes by your side, and when the bitch is talking, press the "#"
|
|||
|
key. When it asks you for your box number, enter in the first box
|
|||
|
number on your list. When it asks for your password, enter in the
|
|||
|
Default Password Sequence. Now if you don't get into that box,
|
|||
|
it's not a problem, just keep going down your list. You should
|
|||
|
get into a few. But remember, just because a box is marked
|
|||
|
'Hackable', it doesn't mean you will definitely get into it.
|
|||
|
|
|||
|
Okay, now you hav a few dozen boxes. You can now use you
|
|||
|
Scanning Box to do whatever you please.
|
|||
|
|
|||
|
ASPEN Guest Boxes:
|
|||
|
|
|||
|
Once you have a box of your own, you can give out 'Guest Boxes'.
|
|||
|
Guest Boxes are like Sub Boxes in your box. In ASPEN you have 4
|
|||
|
of them. If you give out Guest Box #1 to John Doe, Mr. Doe can
|
|||
|
call in, enter in the password YOU set for him, and leave you
|
|||
|
messages, but not only that, you can leave messages to HIM! Which
|
|||
|
means, if his is in New York, and you are in California, and
|
|||
|
neither of you have codes to call each other, then you can leave
|
|||
|
messages thru your 800 VMB. Here is a list and explanation of all
|
|||
|
4 of the Guest Boxes:
|
|||
|
|
|||
|
0. Main Box - Your Voice Mail Box!
|
|||
|
1. Guest Box #1 - Can Leave & Receive Messages
|
|||
|
2. Guest Box #2 - Can Leave & Receive Messages
|
|||
|
3. Home Box -Can Leave & Receive Messages
|
|||
|
4. Secretary Box - Can Check How Many Messages You Have & Receive
|
|||
|
Messages
|
|||
|
|
|||
|
|
|||
|
Hints On Better Scanning:
|
|||
|
A lot of people say hacking and scanning for VMBs is too damn
|
|||
|
hard... well that's because they are going at it all wrong, they
|
|||
|
probably read some lame piece of text file on Hacking VMBs that
|
|||
|
was about 500 bytes long. Well, here is a small list of hints on
|
|||
|
better scanning and hacking:
|
|||
|
|
|||
|
1. Do not use a Voice Mail Box hacking/scanning program (i.e.:
|
|||
|
VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..) 2. Do not hack in
|
|||
|
random order (i.e.: B#999, 345, 810, etc) Always hack in order:
|
|||
|
999, 998, 997, 996, 995...000. 3. Try to find out if it's virgin.
|
|||
|
The newer the System, the better.
|
|||
|
4. If you have a phone with memory dial, change one entry to the
|
|||
|
number of the VMB System. 5. Don't hack the System Managers box
|
|||
|
unless you really want to.
|
|||
|
|
|||
|
Ideas of Things To Do With Your Extra Boxes:
|
|||
|
|
|||
|
Well since you can have up to 500 extra Voice Mail Boxes, you
|
|||
|
might not know what to do with them, here are a few ideas that
|
|||
|
can help you out:
|
|||
|
|
|||
|
1. Give them to friends
|
|||
|
2. Sell them to friends
|
|||
|
3. Offer them to sysops for better access
|
|||
|
4. Trade them for HSTs or whatever
|
|||
|
5. Use them as a Voice Verifying line (So you don't have to give
|
|||
|
out your real voice number to BBSs when you apply!)
|
|||
|
|
|||
|
|
|||
|
Blue Box Tones
|
|||
|
In this short section I will attempt to list some tones that Ma
|
|||
|
Bell uses and what they are. Well here goes: Blue box
|
|||
|
frequencies: 2600 hz - used to get on/off trunk tone matrix to
|
|||
|
use after 2600 hz.
|
|||
|
700: 1 : 2 : 4 : 7 : 11 :
|
|||
|
900: + : 3 : 5 : 8 : 12 :
|
|||
|
1100: + : + : 6 : 9 : KP :
|
|||
|
1300: + : + : + : 10 : KP2 :
|
|||
|
1500: + : + : + : + : ST :
|
|||
|
900 :1100 :1300 :1500 : 1700 :
|
|||
|
Use KP to start a call and ST (1500+1700) to stop. Use 2600 HZ to
|
|||
|
disconnect. Red box freqs: 1700 hz and 2200 hz mixed together. A
|
|||
|
nickel is 66 ms on (1 beep). A dime is 66ms on, 66ms off, 66ms on
|
|||
|
(2 beeps) a quarter is 33ms on, 33ms off repeated 5 times. (Ms =
|
|||
|
millisecond). For those of you who don't know, a red box
|
|||
|
simulates money being put into a pay phone. You must put in some
|
|||
|
money first though (the operator can tell if money was put in but
|
|||
|
as to how much she lets the computer answer that. (Yeah for he
|
|||
|
computer) TASI locking freq: TASI (time assignment speech
|
|||
|
interpolation) is used on satellite trunks, and basically allows
|
|||
|
more than one person to use a trunk by putting them on while the
|
|||
|
other person isn't talking. Of course, you'd never hear the other
|
|||
|
person talking on your trunk. When you start to talk, however,
|
|||
|
the TASI controller has to find an open trunk for you. Because of
|
|||
|
this, some of your speech is lost (because of the delay in
|
|||
|
finding a trunk) this is called clipping. Well, if you were
|
|||
|
transmitting data over a trunk, clipping would really mess up the
|
|||
|
data. So there is something called a TASI locking frequency which
|
|||
|
keeps the TASI from putting anyone else on your trunk or you on
|
|||
|
anyone else's trunk. In any case the freq. is 1850 hz. (Sent
|
|||
|
before the transmission). Have fun!!!
|
|||
|
|
|||
|
|
|||
|
CUSTOMER NAME AND ADDRESS
|
|||
|
The word CN/A stands for Customer's Name and Address ... Your
|
|||
|
telephone company has set up little bureaus that will answer the
|
|||
|
telephone all day and give numbers out to any authorized Bell
|
|||
|
employees of the same city or any other city nationwide. The
|
|||
|
bureau keeps everyone on file with their name and address,
|
|||
|
INCLUDING those that are unlisted. So if you have a phone number
|
|||
|
and you want to find out who owns it and where they live, you can
|
|||
|
use this little handy system. In short, it is basically used to
|
|||
|
get a persons real name and real address through just having a
|
|||
|
phone number!
|
|||
|
|
|||
|
Lets sayyou are constantly being bugged by some little dick and
|
|||
|
you don't know his name or address, BUT you have his phone
|
|||
|
number.. well you can get his Name & Address just by having his
|
|||
|
telephone number! For example, lets say you have this dicks phone
|
|||
|
number, and it's (212) 555-1873, then just do the following:
|
|||
|
|
|||
|
Look up the CN/A Number for that NPA (NPA = AREA CODE) in the
|
|||
|
list below. For this example, the NPA is 212 and the CN/A number
|
|||
|
is 518-471-8111. So then call up the CN/A # (During regular
|
|||
|
hours) and throw a line like, "Hello, This is Operator #321 from
|
|||
|
the residential service center in California. And I need to get a
|
|||
|
CN/A on a customer at 212-555-1873. Thank You."... Make sure not
|
|||
|
too sound like a twelve year old dork or try and sound lame with
|
|||
|
a really deep voice, just try to sound as real as possible. Okay,
|
|||
|
if you got that far, and you sound pretty convincing, then the
|
|||
|
CN/A operator should not in any means, ask questions and you
|
|||
|
should get all the info you need!
|
|||
|
|
|||
|
|
|||
|
Here is a list of just about EVERY CN/A Number in the Continental
|
|||
|
United States, this list was supplied to Legions of Lucifer by
|
|||
|
LawBreaker.
|
|||
|
<0C><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
Area <20> Account <20> Telephone <20> Call <20> Time <20> Requests <20>
|
|||
|
Code <20> Code <20> Number <20> Hours <20> Zone <20> per call <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ
|
|||
|
201 <20> <20> (304)344-7935 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
202 <20> <20> (304)343-7016 <20> 8:30-4:10 <20> E <20> 3 <20>
|
|||
|
203 <20> <20> (203)789-6815 <20> 8:10-4:45 <20> E <20> 7 <20>
|
|||
|
204 <20> <20> (204)949-0900 <20> 8:30-4:45 <20> C <20> N/A <20>
|
|||
|
205 <20> <20> (205)555-1212 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
206 <20> I47128 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
207 <20> 411 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
208 <20> I47127 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
209 <20> 1659 or <20> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
209 <20> 2826 <20> <20> <20> <20> N/A <20>
|
|||
|
212 <20> 111 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
213 <20>1659/2826<32> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
214 <20> SW5167 <20> (817)461-4769 <20> 8:00-4:50 <20> C <20> 3 <20>
|
|||
|
215 <20> <20> (412)633-5600 <20> 8:30-5:00 <20> E <20> 3 <20>
|
|||
|
216 <20> 161 <20> (614)464-0511 <20> 8:00-5:00 <20> E <20> 3 <20>
|
|||
|
217 <20> 700 <20> (217)789-8290 <20> 8:00-5:00 <20> C <20> 2 <20>
|
|||
|
218 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> All <20> 2 <20>
|
|||
|
219 <20> 161 <20> (317)265-4834 <20> 7:30-4:45 <20> E <20> 3 <20>
|
|||
|
301 <20> <20> (304)343-7016 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
302 <20> <20> (412)633-5600 <20> 8:30-5:00 <20> E <20> 3 <20>
|
|||
|
303 <20> I47126 <20> (402)572-5858 <20> 8:00-5:00 <20> M <20> 5 <20>
|
|||
|
304 <20> I47127 <20> (304)343-1401 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
305 <20> 13402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-15 <20>
|
|||
|
306 <20> <20> (306)777-2878 <20> 8:00-12:00<30> M <20> N/A <20>
|
|||
|
307 <20> I47127 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
308 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
309 <20> 700 <20> (217)789-8290 <20> 8:00-5:00 <20> C <20> 2 <20>
|
|||
|
312 <20> 500 <20> (312)796-9600 <20> 24hours <20> C <20> 2 <20>
|
|||
|
313 <20> 53423 or<6F> (313)424-0900 <20> 24 hours <20> E <20> 20 <20>
|
|||
|
313 <20> 61728 <20> <20> <20> <20> N/A <20>
|
|||
|
314 <20> SW1012 <20> (816)275-8460 <20> 8:30-4:30 <20> C <20> 3 <20>
|
|||
|
315 <20> 111 <20> (518)471-8111 <20> 8:00-4:55 <20> E <20> 16 <20>
|
|||
|
316 <20> SW2019 <20> (913)276-6708 <20> 8:00-4:45 <20> C <20> 3 <20>
|
|||
|
317 <20> 161 <20> (317)265-4834 <20> 7:30-4:45 <20> E <20> 3 <20>
|
|||
|
318 <20> <20> (318)555-1212 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
319 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
401 <20> 411 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
402 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
403 <20> <20> (403)493-6383 <20> 8:00-4:30 <20> M <20> N/A <20>
|
|||
|
404 <20> 13402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-15 <20>
|
|||
|
405 <20> SW4070 <20> (405)236-6121 <20> 7:30-4:15 <20> C <20> 3 <20>
|
|||
|
406 <20> I47127 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
407 <20> 13402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-15 <20>
|
|||
|
408 <20>1659/2826<32> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
409 <20> SW5167 <20> (713)961-2397 <20> 8:00-5:00 <20> C <20> 3 <20>
|
|||
|
412 <20> <20> (412)633-5600 <20> 8:30-5:00 <20> E <20> 3 <20>
|
|||
|
413 <20> 411 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
414 <20> 767 <20> (608)252-6932 <20> 8:00-4:30 <20> C <20> 1-5 <20>
|
|||
|
415 <20>1659/2826<32> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
416 <20> <20> (416)443-0542 <20> 8:30-5:00 <20> E <20> N/A <20>
|
|||
|
417 <20> SW1012 <20> (816)275-8460 <20> 8:30-4:30 <20> C <20> 3 <20>
|
|||
|
418 <20> <20> (514)391-7440 <20> 8:30-4:45 <20> <20> N/A <20>
|
|||
|
419 <20> 161 <20> (614)464-0511 <20> 8:00-5:00 <20> E <20> 3 <20>
|
|||
|
501 <20> SW3006 <20> (405)236-6121 <20> 7:30-4:30 <20> C <20> 3 <20>
|
|||
|
502 <20> <20> (502)555-1212 <20> 24 hours <20> E <20> 2 <20>
|
|||
|
503 <20> I47128 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
504 <20> <20> (504)555-1212 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
505 <20> I47127 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
506 <20> <20> (506)694-6541 <20>8:15-4:30 <20> A <20> N/A <20>
|
|||
|
507 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
508 <20> 411 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
509 <20> I47128 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
512 <20> SW5167 <20> (512)828-2501 <20> 9:00-5:00 <20> C <20> 3 <20>
|
|||
|
513 <20> 161 <20> (614)464-0511 <20> 8:00-5:00 <20> E <20> 3 <20>
|
|||
|
514 <20> <20> (514)391-7440 <20> 8:00-4:30 <20> E <20> N/A <20>
|
|||
|
515 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
516 <20> 111 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
517 <20>53423 or <20> (313)424-0900 <20> 24 hours <20> E <20> 20 <20>
|
|||
|
517 <20> 61728 <20> <20> <20> <20> N/A <20>
|
|||
|
518 <20> 111 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
519 <20> <20> (416)443-0542 <20> 8:30-5:00 <20> E <20> N/A <20>
|
|||
|
601 <20> <20> (601)555-1212 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
602 <20> I47127 <20> (402)572-5858 <20> 24 hours <20> M <20> 2 <20>
|
|||
|
603 <20> 411 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
604 <20> <20> Contact Local <20> <20> <20> N/A <20>
|
|||
|
604 <20> <20>Business Office<63> <20> <20> N/A <20>
|
|||
|
605 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
606 <20> <20> (606)555-1212 <20> 24 hours <20> E <20> 2 <20>
|
|||
|
607 <20> 111 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
608 <20> 767 <20> (608)252-6932 <20> 8:30-4:30 <20> C <20> 5 <20>
|
|||
|
609 <20> <20> (304)344-7935 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
612 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
613 <20> <20> (416)443-0542 <20> 8:30-5:00 <20> E <20> N/A <20>
|
|||
|
614 <20> 161 <20> (614)464-0511 <20> 8:00-5:00 <20> E <20> 3 <20>
|
|||
|
615 <20> 13402 <20> (615)373-7663 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
616 <20>53423 or <20> (313)424-0900 <20> 24 hours <20> E <20> 20 <20>
|
|||
|
616 <20> 61728 <20> <20> <20> <20> N/A <20>
|
|||
|
617 <20> 411 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
618 <20> 700 <20> (217)789-8290 <20> 8:00-5:00 <20> C <20> 2 <20>
|
|||
|
619 <20>1659/2826<32> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
701 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
702 <20>1659/2826<32> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
703 <20> <20> (304)343-1401 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
704 <20> 13402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-15 <20>
|
|||
|
705 <20> <20> (416)443-0542 <20> 8:30-5:00 <20> E <20> N/A <20>
|
|||
|
707 <20>1659/2826<32> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
708 <20> 500 <20> (312)796-9600 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
709 <20> <20> *NONE* <20> <20> <20> N/A <20>
|
|||
|
712 <20> I47126 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
713 <20> SW5167 <20> (713)961-2397 <20> 8:00-5:00 <20> C <20> 2 <20>
|
|||
|
714 <20>1659/2826<32> (415)781-5271 <20> 7:00-5:00 <20> P <20> 5 <20>
|
|||
|
715 <20> 767 <20> (608)252-6932 <20> 8:00-4:30 <20> C <20> 5 <20>
|
|||
|
716 <20> 111 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
717# <20> <20> (412)633-5600 <20> 8:30-5:00 <20> E <20> 3 <20>
|
|||
|
717@ <20>6630109ATZ (717)245-6829 <20> <20> <20> N/A <20>
|
|||
|
718 <20> 111 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
719 <20> I47127 <20> (402)572-5858 <20> 8:00-5:00 <20> M <20> 5 <20>
|
|||
|
801 <20> I47127 <20> (402)572-5858 <20> 24 hours <20> C <20> 2 <20>
|
|||
|
802 <20> 411 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
803 <20> 3402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-15 <20>
|
|||
|
804 <20> <20> (304)343-1401 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
805 <20>1659/2826<32> (415)781-5271 <20> 8:30-5:00 <20> P <20> 5 <20>
|
|||
|
806 <20> SW5167 <20> (512)828-2501 <20> 8:00-5:00 <20> C <20> 3 <20>
|
|||
|
807 <20> <20> (416)443-0542 <20> 8:30-5:00 <20> E <20> N/A <20>
|
|||
|
808 <20> <20> (800)852-8840 <20> 8:00-6:00 <20> E <20> N/A <20>
|
|||
|
809 <20> <20> (800)852-8840 <20> 8:30-5:00 <20> E <20> N/A <20>
|
|||
|
812 <20> 161 <20> (317)265-4834 <20> 8:30-4:45 <20> E <20> 3 <20>
|
|||
|
813 <20> 13402 <20> (803)251-0046 <20> 8:30-4:30 <20> E <20> N/A <20>
|
|||
|
813 <20>GTE only <20> (813)442-7229 <20> 8:00-5:00 <20> E <20> N/A <20>
|
|||
|
814 <20> <20> (412)633-5600 <20> 8:30-5:00 <20> E <20> 3 <20>
|
|||
|
815 <20> 700 <20> (217)789-8290 <20> 8:00-5:00 <20> C <20> 2 <20>
|
|||
|
816 <20> SW1012 <20> (816)275-8460 <20> 8:00-4:45 <20> C <20> 3 <20>
|
|||
|
817 <20> SW5167 <20> (817)461-4769 <20> 8:00-5:00 <20> C <20> 3 <20>
|
|||
|
818 <20>1659/2826<32> (415)781-5271 <20> 6:45-5:00 <20> P <20> 5 <20>
|
|||
|
819 <20> <20> (514)391-7440 <20> 8:00-4:30 <20> E <20> N/A <20>
|
|||
|
901 <20> 13402 <20> (615)373-7663 <20> 8:00-4:10 <20> E <20> 3 <20>
|
|||
|
902 <20> <20> (902)421-4110 <20> 8:15-4:45 <20> A <20> N/A <20><>
|
|||
|
904 <20> 13402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-15 <20>
|
|||
|
906 <20> 61728 <20> (313)424-0900 <20> 24 hours <20> E <20> 20 <20>
|
|||
|
907 <20> <20> *NONE* <20> <20> <20> N/A <20>
|
|||
|
912 <20> 13402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-15 <20>
|
|||
|
913 <20> SW2019 <20> (913)276-6708 <20> 8:00-4:45 <20> C <20> 3 <20>
|
|||
|
914 <20> 111 <20> (518)471-8111 <20> 8:00-5:00 <20> E <20> 16 <20>
|
|||
|
915 <20> SW5167 <20> (512)828-2501 <20> 8:00-5:00 <20> P <20> 5 <20>
|
|||
|
916 <20>1659/2826<32> (415)781-5271 <20> 8:30-5:00 <20> P <20> 5 <20>
|
|||
|
918 <20> SW4070 <20> (405)236-6121 <20> 7:30-4:10 <20> C <20> 3 <20>
|
|||
|
919 <20> 13402 <20> (803)251-0046 <20> 8:30-5:00 <20> E <20> 3-5 <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
# - Bell of PA
|
|||
|
@ - United
|
|||
|
|
|||
|
Time Zones: P - Pacific 12:00 pm
|
|||
|
M - Mountain 1:00 pm
|
|||
|
C - Central 2:00 pm
|
|||
|
E - Eastern 3:00 pm
|
|||
|
A - Atlantic 4:00 pm
|
|||
|
|
|||
|
Note: The account code for Centel and CONTEL is CNAT, United
|
|||
|
Tel. is 6630109ATZ
|
|||
|
Well, that's about it. I tried to find any mistakes that
|
|||
|
might have occurred during typing, but there's bound to be one or
|
|||
|
two around... Two things to note here:
|
|||
|
1> California has 2 codes listed (1659 and 2826). The first is
|
|||
|
for people in California, the second is for everyone else outside
|
|||
|
of California obtaining a CNA in those area codes.
|
|||
|
|
|||
|
2> Michigan ALSO has two codes. The first was the one currently
|
|||
|
working when I last tried; the second is what the new code will
|
|||
|
be if it hasn't been changed already... It's a totally automated
|
|||
|
system, so try both codes.
|
|||
|
|
|||
|
|
|||
|
Lock In Trace
|
|||
|
A lock in trace is a device used by the F.B.I. to lock into the
|
|||
|
phone users location so that he can not hang up while a trace is
|
|||
|
in progress. For those of you who are not familiar with the
|
|||
|
concept of 'locking in', then here's a brief description. The
|
|||
|
F.B.I. can tap into a conversation, sort of like a three-way call
|
|||
|
connection. Then, when they get there, they can plug electricity
|
|||
|
into the phone line. All phone connections are held open by a
|
|||
|
certain voltage of electricity. That is why you sometimes get
|
|||
|
static and faint connections when you are calling far away,
|
|||
|
because the electricity has trouble keeping the ine up. What the
|
|||
|
lock in trace does is cut into the line and generate that same
|
|||
|
voltage straight into the lines. That way, when you try and hang
|
|||
|
up, voltage is retained. Your phone will ring just like someone
|
|||
|
was calling you even after you hang up. (If you have call
|
|||
|
waiting, you should understand better about that, for call
|
|||
|
waiting intercepts the electricity and makes a tone that means
|
|||
|
someone is going through your line. Then, it is a matter of which
|
|||
|
voltage is higher. When you push down the receiver, then it see-
|
|||
|
saws the electricity to the other side. When you have a person on
|
|||
|
each line it is impossible to hang up unless one or both of them
|
|||
|
will hang up. If you try to hang up, voltage is retained, and
|
|||
|
your phone will ring. That should give you an understanding of
|
|||
|
how calling works. Also, when electricity passes through a
|
|||
|
certain point on your hone, the electricity causes a bell to
|
|||
|
ring, or on some newer phones an electronic ring to sound.) So,
|
|||
|
in order to eliminate the trace, you somehow must lower the
|
|||
|
voltage level on your phone line. You should know that every time
|
|||
|
someone else picks up the phone line, then the voltage does
|
|||
|
decrease a little. In the first steps of planning this out, Xerox
|
|||
|
suggested getting about a hundred phones all hooked into the same
|
|||
|
line that could all be taken off the hook at the same time. That
|
|||
|
would greatly decrease the voltage level. That is also why most
|
|||
|
three-way connections that are using the bell service three way
|
|||
|
calling (which is only $3 a month) become quite faint after a
|
|||
|
while. By now, you should understand the basic idea. You have to
|
|||
|
drain all of the power out of the line so the voltage can not be
|
|||
|
kept up. Rather sudden draining of power could quickly short out
|
|||
|
the F.B.I. voltage machine, because it was only built to sustain
|
|||
|
the exact voltage necessary to keep the voltage out. For now,
|
|||
|
imagine this. One of the normal Radio Shack generators that you
|
|||
|
can go pick up that one end of the cord that hooks into the
|
|||
|
central box has a phone jack on it and the other has an
|
|||
|
electrical plug. This way, you can "flash" voltage through the
|
|||
|
line, but cannot drain it. So, some modifications have to be
|
|||
|
done.
|
|||
|
|
|||
|
Materials
|
|||
|
----------
|
|||
|
A BEOC (Basic Electrical Output Socket), like a small lamp-type
|
|||
|
connection, where you just have a simple plug and wire that would
|
|||
|
plug into a light bulb. One of cords metioned above, if you
|
|||
|
can't find one then construct your own... Same voltage
|
|||
|
connection, but the restrainer must be built in (I.E. The central
|
|||
|
box)
|
|||
|
Two phone jacks (one for the modem, one for if you are being
|
|||
|
traced to plug the aqua box into)
|
|||
|
|
|||
|
Procedure
|
|||
|
----------
|
|||
|
All right, this is a very simple procedure. If you have the
|
|||
|
BEOC, it could drain into anything: a radio, or whatever. The
|
|||
|
purpose of having that is you are going to suck the voltage out
|
|||
|
from the phone line into the electrical appliance so there would
|
|||
|
be no voltage left to lock you in with.
|
|||
|
|
|||
|
Take the connection cord. Examine the plug at the end. It should
|
|||
|
have only two prongs. If it has three, still, do not fear. Make
|
|||
|
sure the electrical appliance is turned off unless you want to
|
|||
|
become a crispy critter while making this thing. Most plugs will
|
|||
|
have a hard plastic design on the top of them to prevent you from
|
|||
|
getting in at the electrical wires inside. Well, remove it. If
|
|||
|
you want to keep the plug (I don't see why...) then just cut the
|
|||
|
top off. When you look inside, Lo and Behold, you will see that
|
|||
|
at the base of the prongs there are a few wires connecting in.
|
|||
|
Those wires conduct the power into the appliance. So, you
|
|||
|
carefully unwrap those from the sides and pull them out until
|
|||
|
they are about an inch ahead of the prongs. If you don't want to
|
|||
|
keep the jack, then just rip the prongs out. If you are, cover
|
|||
|
the prongs with insulation tape so they will not connect with the
|
|||
|
wires when the power is being drained from the line. Do the same
|
|||
|
thing with the prongs on the other plug, so you have the wires
|
|||
|
evenly connectd. Now, wrap the end of the wires around each
|
|||
|
other. If you happen to have the other end of the voltage cord
|
|||
|
hooked into the phone, stop reading now, you're too stupid to
|
|||
|
continue. After you've wrapped the wires around each other, then
|
|||
|
cover the whole thing with the plugs with insulating tape. Then,
|
|||
|
if you built your own control box or if you bought one, then cram
|
|||
|
all the wires into it and close it. That box is your ticket out
|
|||
|
of this. Re-check everything to make sure it's all in place. This
|
|||
|
is a pretty flimsy connection, but on later models when you get
|
|||
|
more experienced at it then you can solder away at it and form
|
|||
|
the whole device into one big box, with some kind of cheap Mattel
|
|||
|
hand-held game inside to be the power connector. In order to use
|
|||
|
it, just keep this box handy. Plug it into the jack if you want,
|
|||
|
but it will slightly lower the voltage so it isn't connected.
|
|||
|
When you plug it in, if you see sparks, unplug it and restart the
|
|||
|
whole thing. But if it just seems fine then leave it.
|
|||
|
|
|||
|
Now, so you have the whole thing plugged in and all... Do not use
|
|||
|
this unless the situation is desperate! When the trace has gone
|
|||
|
on, don't panic, unplug your phone, and turn on the appliance
|
|||
|
that it was hooked to. It will need energy to turn itself on, and
|
|||
|
here's a great source... The voltage to keep a phone line open is
|
|||
|
pretty small and a simple light bulb should drain it all in and
|
|||
|
probably short the F.B.I. computer at the same time. Happy boxing
|
|||
|
and stay free!
|
|||
|
|
|||
|
Pinkish Box
|
|||
|
The function of a "Pink Box" is a hold button that allows music
|
|||
|
or anything else to be played into the telephone while person is
|
|||
|
on hold. This modification either be done right in the telephone
|
|||
|
as a separate box.
|
|||
|
|
|||
|
Materials Needed
|
|||
|
|
|||
|
1. Some Bell wire or Phone wire
|
|||
|
2. A SPST momentary switch RS # 275-1547
|
|||
|
3. 470 ohm resistor RS # 271-019
|
|||
|
4. 1 LED (Approx 5V) RS # 276-041
|
|||
|
5. An SCR, 2N5061 (Transistor)
|
|||
|
6. Audio Transformer (Ratio 10K:600)
|
|||
|
7. RCA phono Jack RS # 274-346
|
|||
|
8. Screw drivers, soldering irons, solder, Etc.
|
|||
|
|
|||
|
1. Open the wall box and locate the RED and GREEN wires.
|
|||
|
2. Take a piece or RED wire and strip tend and attach it to the
|
|||
|
red lead on the wall box. Do the same for the GREEN.
|
|||
|
3. Connect the GREEN wire to the ANODE of the LED.
|
|||
|
4. Connect the CATHODE side of the LED the UPPER pin of the
|
|||
|
primary side of the transformer.
|
|||
|
5. Connect the pin directly across to one pole of the phono jack.
|
|||
|
6. Connect the RED wire to one side of resistor and to the "C
|
|||
|
pole" of the transistor.
|
|||
|
7. Connect the open pin of the switch the other side of the
|
|||
|
resistor and to the "G pole" of the transistor.Wiring Diagram
|
|||
|
|
|||
|
RCA Jack X-former LED
|
|||
|
_____ C A
|
|||
|
Pole or Jack --/---! Top !---/--(*)--\------GREEN wire
|
|||
|
-!View !- Primary --I---RED wire
|
|||
|
Pole of Jack --/---!_____!---/-I (O)
|
|||
|
I I
|
|||
|
I [--I-----Pole of Switch
|
|||
|
I
|
|||
|
I--------/--m--Pole of Switch
|
|||
|
|
|||
|
|
|||
|
Key to Symbols
|
|||
|
|
|||
|
-- Wire
|
|||
|
I Connection or wire
|
|||
|
/ Connection or wire
|
|||
|
|
|||
|
|
|||
|
_/ C pole of transistor --(*)--
|
|||
|
[_)-- G pole of transistor I
|
|||
|
I A pole of transistor (O) Resister
|
|||
|
I
|
|||
|
_____
|
|||
|
---! Top !---
|
|||
|
-! View!- Primary Transformer
|
|||
|
---!_____!---
|
|||
|
|
|||
|
Hook the RED and GREEN wires up to the appropriate terminals
|
|||
|
and hook the RCA jack to the output on your stereo. Turn on your
|
|||
|
stereo at a good volume. Now call a friend. To test the Box,
|
|||
|
hold down the switch and hang up the phone. The LED should go
|
|||
|
and your friend should hear music, If not then start over. The
|
|||
|
hold is shut off if you pick up a phone on that line or your end
|
|||
|
hangs up.
|
|||
|
|
|||
|
Pearl Box
|
|||
|
The Pearl Box:Definition - This is a box that may substitute for
|
|||
|
many boxes which produce tones in hertz. The Pearl Box when
|
|||
|
operated correctly can produce tones from 1-999hz. As you can
|
|||
|
see, 2600, 1633, 1336 and other crucial tones are obviously in
|
|||
|
its sound spectrum.
|
|||
|
|
|||
|
Materials you will need in order to
|
|||
|
build The Pearl Box:
|
|||
|
=====================================
|
|||
|
C1, C2:.5mf or .5uf ceramic disk
|
|||
|
capacitors
|
|||
|
Q1.....NPN transistor (2N2222 works
|
|||
|
best)
|
|||
|
S1.....Normally open momentary SPST
|
|||
|
switch
|
|||
|
S2.....SPST toggle switch
|
|||
|
B1.....Standard 9-Volt battery
|
|||
|
R1.....Single turn, 50k potentiometer
|
|||
|
R2..... " " 100k potentiometer
|
|||
|
R3..... " " 500k potentiometer
|
|||
|
R4..... " " 1meg potentiometer
|
|||
|
SPKR...Standard 8-ohm speaker
|
|||
|
T1.....Mini transformer (8-ohm works
|
|||
|
best)
|
|||
|
Misc...Wire, solder, soldering iron, PC
|
|||
|
board or perfboard, box to
|
|||
|
contain the completed unit,
|
|||
|
battery clip
|
|||
|
|
|||
|
Instructions for building Pearl Box:
|
|||
|
======================================
|
|||
|
|
|||
|
Since the instruction are EXTREMELY difficult to explain in
|
|||
|
words, you will be given a schematic instead. It will be quite
|
|||
|
difficult to follow but try it any way. There is also a Hi-Res
|
|||
|
picture you can get that shows the schematic in great detail.
|
|||
|
|
|||
|
Schematic for The Pearl Box
|
|||
|
|
|||
|
+---+------------+---------+
|
|||
|
! ! \
|
|||
|
C1 C2 \
|
|||
|
! ! +
|
|||
|
+ + -----+T1
|
|||
|
!\ +------------+-+
|
|||
|
! b c-------! +
|
|||
|
! Q1 ! +-S1-
|
|||
|
! e-----S2---+ ! SPKR
|
|||
|
! ! ! +----
|
|||
|
! B1 !
|
|||
|
! ! !
|
|||
|
! +-------+
|
|||
|
!R1 R2 R3 R4!
|
|||
|
/\/\ /\/\ /\/\ /\/\
|
|||
|
+--+ +--+ +--+
|
|||
|
|
|||
|
Now that you are probably thoroughly confused, let me explain a
|
|||
|
few minor details. The potentiometer area is rigged so that the
|
|||
|
left pole is connected to the center pole of the potentiometer
|
|||
|
next to it. The middle terminal of T1 is connected to the piece
|
|||
|
of wire that runs down to the end of the battery.
|
|||
|
|
|||
|
Correct operation of The Pearl Box:
|
|||
|
You may want to get some dry-transfer decals at Radio Shack to
|
|||
|
make this job a lot easier. Also, some knobs for the tops of the
|
|||
|
potentiometers may be useful too. Use the decals to calibrate the
|
|||
|
knobs. R1 is the knob for the ones place, R2 is for the tens
|
|||
|
place, R3 if for the hundreds place and R4 is for the thousands
|
|||
|
place. S1 is for producing the all the tones and S2 is for power.
|
|||
|
|
|||
|
Step 1: Turn on the power and adjust the knobs for the desired
|
|||
|
tone. (Example: For 2600 hz-
|
|||
|
R1=0:R2=0:R3=6:R4=2)
|
|||
|
|
|||
|
Step 2: Hit the pushbutton switch and VIOLA! You have the tone.
|
|||
|
If you don't have a tone recheck all connections and schematic.
|
|||
|
If you still don't have a tone call Brainstorm BBS: 612-345-2815,
|
|||
|
The Bay:415-775-2384 or Pirate's Harbor:617-720-3600 and leave me
|
|||
|
e-mail stating what the scene is.
|
|||
|
|
|||
|
|
|||
|
Brown Box
|
|||
|
This is a fairly simple modification that can be made to any
|
|||
|
phone. All it does is allow you to take any 2 lines in your house
|
|||
|
and create a party line. So far I have not heard of any problems
|
|||
|
with it from my friends that have set one up and I have not had
|
|||
|
any either. There is one thing that you will notice when you are
|
|||
|
one of the two people who is called by a person with this box.
|
|||
|
The other person will sound a little bit faint. I could overcome
|
|||
|
this with some amplifiers but then there wouldn't be very many of
|
|||
|
these boxes made. I think that the convenience of having two
|
|||
|
people on line at any one time will make up for the minor volume
|
|||
|
loss.
|
|||
|
Here is the diagram:
|
|||
|
___________________________
|
|||
|
PART SYMBOL
|
|||
|
---------------------------
|
|||
|
BLACK WIRE *
|
|||
|
YELLOW WIRE =
|
|||
|
RED WIRE +
|
|||
|
GREEN WIRE -
|
|||
|
SPDT SWITCH _/_
|
|||
|
VERTICAL WIRE |
|
|||
|
HORIZONTAL WIRE _
|
|||
|
|
|||
|
* = - +
|
|||
|
* = - +
|
|||
|
* = - +
|
|||
|
* = - +
|
|||
|
* = - +
|
|||
|
* ==_/_- +
|
|||
|
*******_/_++++++
|
|||
|
| |
|
|||
|
| |
|
|||
|
| |
|
|||
|
|_____PHONE____|
|
|||
|
|
|||
|
In some houses the black and yellow are already wired in others
|
|||
|
you will have to go out to your box and rewire it. A goo way to
|
|||
|
figure out which line is which is to take the phone you are
|
|||
|
looking for off the hook. Then you only need to take the red and
|
|||
|
green wires entering your phone and hook them to the different
|
|||
|
pairs of red and green going into the house. You can't hurt
|
|||
|
anything in the phone or telephone by probing. When you find the
|
|||
|
pair that you want take the black from your line and attach it to
|
|||
|
the red of the other line then take the yellow and attach it to
|
|||
|
the green line. Now you are all set to go. For people with rotary
|
|||
|
phones you can have one person call you then place the second
|
|||
|
call out to the other person. Though not a phreaker's tool, the
|
|||
|
brown box can be fun.
|
|||
|
|
|||
|
Scarlet box
|
|||
|
The purpose of a Scarlet box is to create a very bad
|
|||
|
connection, it can be used to crash a BBS or just make life
|
|||
|
miserable for those you seek to avenge.
|
|||
|
|
|||
|
Materials: 2 alligator clips, 3 inch wire, or a resister
|
|||
|
(plain wire will create greatest amount of static)
|
|||
|
(Resister will decrease the amount of static in proportion to the
|
|||
|
resister you are using)
|
|||
|
Step (1): Find the phone box at your victims house, and pop the
|
|||
|
cover off. Step (2): Find the two prongs that the phone line you
|
|||
|
wish to box are connected to.
|
|||
|
Step (3): Hook your alligator clips to your (wire/resister). Step
|
|||
|
(4): Find the lower middle prong and take off all wires connected
|
|||
|
to it, I think this disables the ground and call waiting and
|
|||
|
stuff like that. Step (5): Now take one of the alligator clips
|
|||
|
and attach it to the upper most prong, and take the other and
|
|||
|
attach it to the lower middle prong. Step (6): Now put the cover
|
|||
|
back on the box and take off!!
|
|||
|
|
|||
|
Day-Glow
|
|||
|
A day-glow box is very easy to make, and very inexpensive to
|
|||
|
build. It works like this: On the outside of every home that has
|
|||
|
a phone, there is something called "the outside connection box,"
|
|||
|
which is where the house is connected to Ma Bell's network. This
|
|||
|
ingenious device connects to a) your phone, b) the victim's
|
|||
|
outside box. You should be starting to get the idea.
|
|||
|
|
|||
|
Materials necessary:
|
|||
|
1. Radio Shack modular conversion jack
|
|||
|
2. A small experimenter's box (optional)
|
|||
|
3. 1 foot of red wire. (better to overkill)
|
|||
|
4. 1 foot of green wire. (same as above)
|
|||
|
5. 2 medium alligator clips
|
|||
|
|
|||
|
In order to construct this box, you will need all of the above
|
|||
|
materials. Note that your wire does not necessarily have to be
|
|||
|
red or green, but it is necessary that you be able to tell them
|
|||
|
apart. Also, you might want to use thick, easily bent wire (audio
|
|||
|
hookup wire works best) instead of bell wire. Now, on to the
|
|||
|
construction.
|
|||
|
|
|||
|
Remove the actual modular jack from the conversion box. This can
|
|||
|
be done by pushing inward and then up, or you can just cut the
|
|||
|
plastic. Remove the black and yellow wires from the jack. You can
|
|||
|
either clip these or rip them out. To your newly isolated jack,
|
|||
|
add the 1 foot wire extensions to the respective wires. Soldering
|
|||
|
and then wrapping the connections with electrical tape works
|
|||
|
best. Next, solder the alligator clips to the extended wires. If
|
|||
|
you do not wish to solder them, then just wrap the clips with the
|
|||
|
wire. Now, place this newly made contraption into a box
|
|||
|
(optional). You may need to drill a few holes, and possibly
|
|||
|
remove the alligator clips, but you should have read this file
|
|||
|
first, anyway.
|
|||
|
|
|||
|
The day-glow box will work with any phone. First, you need to
|
|||
|
locate a house that has a phone. Next, (it's preferable to do
|
|||
|
this at night) go up to the and locate the outside connection
|
|||
|
box. Pop the cover off. Locate prong 3 and prong 4. You will
|
|||
|
attach the green wire clip to prong 3. The red wire clip will go
|
|||
|
to prong 4. Now, plug your phone (preferably a trimline or
|
|||
|
ranger) into your modular plug. You may now either listen in on
|
|||
|
the call (wire tap) OR you may call out to anywhere in the world.
|
|||
|
If you are really daring, you can bring your computer with you.
|
|||
|
Note: This box may also be used in conjunction with the lunch box
|
|||
|
in order to make a perfect phone bug.
|
|||
|
|
|||
|
Neat things you can do with your new box:
|
|||
|
Call 976 numbers. This should be done very frequently. Also, I
|
|||
|
find that after finding the victim's outside box, several calls
|
|||
|
to the gay hotline will have interesting after-effects. Namely,
|
|||
|
his parents wondering about him. Alliance teleconferencing can be
|
|||
|
accomplished quite easily. Try it! Call 0-700-456-1000. Or, tell
|
|||
|
the operator you'd like to initiate a conference. Of course, you
|
|||
|
should place several calls to other countries. This can be
|
|||
|
accomplished by looking in the front of your white pages for the
|
|||
|
various country and city codes. You should be able to follow the
|
|||
|
directions provided in there.
|
|||
|
|
|||
|
Have you ever wondered what those 6ft tall cabinets with the
|
|||
|
bell logo on them were for? Well, if you've never seen them,
|
|||
|
here's a quick description: They are 6ft tall by 3ft wide, and
|
|||
|
painted the dull phone company green. They can be opened quite
|
|||
|
easily with a 7/16ths inch socket wrench. After turning the bold
|
|||
|
over the handle, turn the handle to the right and pull. It should
|
|||
|
open, displaying over 100 different lines. Occasionally, you can
|
|||
|
find tech. manuals and test kits inside. They are usually located
|
|||
|
near phone lines. Okay, now, once you have opened one of these
|
|||
|
calling cabinets, locate the line of your choice. You will have
|
|||
|
to take out both the orange and the white insulated screws. The
|
|||
|
purple and white wires should come off along with the screws. The
|
|||
|
lines go out to the house, and the screw posts are the actual
|
|||
|
line. Now, you should clip the alligators to the posts, with one
|
|||
|
part of the clip on the insulation, and on.]Now, you should clip
|
|||
|
the alligators to the nep parteli. Oh, if you want the home to
|
|||
|
remain connected, clip the wires inside the hole using the
|
|||
|
alligator clips. By the way, the red terminal on your box goes to
|
|||
|
the orange post, and the green one to the white post... if that
|
|||
|
doesn't work, reverse the connection. Now, to find out the number
|
|||
|
you have taken over, dial 380-55555555. Yes, that's eight fives.
|
|||
|
A computer voice should tell you what number you are on. I hope
|
|||
|
you can take it from here. Oh, in apartments, you can find the
|
|||
|
calling cabinet in the basement... remember, this is not your
|
|||
|
line, so do anything you want. Call the President or something.
|
|||
|
|
|||
|
Gold Box Plans
|
|||
|
Materials:
|
|||
|
|
|||
|
2 10k OHM resistors
|
|||
|
3 1.4k OHM resistors
|
|||
|
2 2N3904 transistors
|
|||
|
2 Photocells
|
|||
|
2 LED's (Make sure they're real bright)
|
|||
|
1 Box to contain it in that will not allow sunlight in it.
|
|||
|
(some) wire. Red and green for easiness sake
|
|||
|
|
|||
|
Light from the LED's must shine directly on the photocells. You
|
|||
|
may have to have the LED touching the photocell for it to work.
|
|||
|
|
|||
|
[The 1.4k resistor is variable and if the second part of the box
|
|||
|
is skipped the box will still work but if someone picks up the
|
|||
|
phone they may report it to the Phone Co. The 1.4k will give you
|
|||
|
good reception with little risk of the Gestapo knocking at your
|
|||
|
door. Take two green wires and strip the ends. Twist one end of
|
|||
|
each together so they make one wire. Connect it to Green #1.
|
|||
|
Label this 'Line #1'. Do the same but with red wire and attach it
|
|||
|
to Red #1. Repeat the process for Red #2 and Green #2 and label
|
|||
|
it 'Line #2'. Find two phone lines that are close together. Label
|
|||
|
one of them 'Line #1'. Cut [the phone lines and take off the
|
|||
|
outer covering. You'l see 4 colored wires inside. Cut the yellow
|
|||
|
and black wire off and strip the red and green wires on both
|
|||
|
lines. Line #1 should be in two pieces. Take the green wire of
|
|||
|
one end and connect to one of the green wires on the box. Take
|
|||
|
the other half of the phone line green wire and connect it to the
|
|||
|
other green wires on the gold box. Do the same for the red wires
|
|||
|
on the other line and the red wires on the box. Now, find out
|
|||
|
what number you hooked up the gold box to. Go home and call it.
|
|||
|
You should get a dial tone and you can dial out. If not, re-check
|
|||
|
everything. If it still doesn't work, pack up and go home. Green Box
|
|||
|
Paying the initial rate in order to use a red box (on certain
|
|||
|
fortresses) left a sour taste in many red boxers mouths, thus the
|
|||
|
green box was invented. The green box generates useful tones such
|
|||
|
as COIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones
|
|||
|
that ACTS or the TSPS operator would send to the CO when
|
|||
|
appropriate. Unfortunately, the green box cannot be used at the
|
|||
|
fortress station but must be used by the CALLED party. Here are
|
|||
|
the tones:
|
|||
|
|
|||
|
COIN COLLECT 700+1100hz
|
|||
|
COIN RETURN 1100+1700hz
|
|||
|
RINGBACK 700+1700hz
|
|||
|
|
|||
|
Before the called party sends any of these tones, an operator
|
|||
|
release signal should be sent to alert the M detectors at the CO.
|
|||
|
This can be done by sending 900hz + 1500hz or a single 2600 wink
|
|||
|
(90 ms.)
|
|||
|
|
|||
|
Also, do not forget that the initial rate is collected shortly
|
|||
|
before the 3 minute period is up.
|
|||
|
|
|||
|
Incidentally, once the above M tones for collecting and returning
|
|||
|
coins reach the CO, they are convertedinto an appropriate DC
|
|||
|
pulse (-130 volts for return and +130 for collect). This pulse is
|
|||
|
then sent down the tip to the fortress. This causes the coin
|
|||
|
relay to either return or collect the coins. The alleged "T-
|
|||
|
network" takes advantage of this information. When a pulse for
|
|||
|
coin collect (+130 VDC) is sent down the line, it must be
|
|||
|
grounded somewhere. This is usually the yellow or black wire.
|
|||
|
Thus, if the wires are exposed, these wires can be cut to prevent
|
|||
|
the pulse from being grounded. When the three minute initial
|
|||
|
period is almost up, make sure that the black and yellow wires
|
|||
|
are severed, then hang up, wait about 15 seconds in case of a
|
|||
|
second pulse, reconnect the wires, pick up the phone, an if all
|
|||
|
goes well, it should be "JACKPOT" time.
|
|||
|
|
|||
|
Blotto Box
|
|||
|
For years now every pirate has dreamed of the Blotto Box. It
|
|||
|
was at first made as a joke to mock more ignorant people into
|
|||
|
thinking that the function of it actually was possible. Well, if
|
|||
|
you are The Voltage Master, it is possible. Originally conceived
|
|||
|
by King Blotto of much fame, the Blotto Box is finally available
|
|||
|
to the public.
|
|||
|
The Blotto Box is every phreak's dream... you could hold AT&T
|
|||
|
down on its knee's with this device. Be
|
|||
|
cause, quite simply, it can turn off the phone lines everywhere.
|
|||
|
Nothing. Blotto. No calls will be allowed out of an area code,
|
|||
|
and no calls will be allowed in. No calls can be made inside it
|
|||
|
for that matter. As long as the switching system stays the same,
|
|||
|
this box will not stop at a mere area code. It will stop at
|
|||
|
nothing. The electrical impulses that emit from this box will
|
|||
|
open every line. Every line will ring and ring and ring... the
|
|||
|
voltage will never be cut off until the box/generator is stopped.
|
|||
|
This is no 200 volt job, here. We are talking GENERATOR. Every
|
|||
|
phone line will continue to ring, and people close to the box may
|
|||
|
be electrocuted if they pick up the phone.
|
|||
|
But, the Blotto Box can be stopped by merely cutting of the
|
|||
|
line or generator. If they are cut off then nothing will emit any
|
|||
|
longer. It will take a while for the box to calm back down again,
|
|||
|
but that is merely a superficial aftereffect. Once again:
|
|||
|
Construction and use of this box is not advised! The Blotto Box
|
|||
|
will continue as long as there is electricity to continue with.
|
|||
|
OK, that is what it does, now, here are some interesting things
|
|||
|
for you to do with it...
|
|||
|
|
|||
|
Once you have installed your Blotto, there is no turning back.
|
|||
|
The following are the instructions for construction and use of
|
|||
|
this box. Please read and heed all warnings in the above section
|
|||
|
before you attempt to construct this box.
|
|||
|
|
|||
|
Materials:
|
|||
|
- A Honda portable generator or a main power outlet like in a
|
|||
|
stadium or some such place.
|
|||
|
- A radm r=L L5I Z] ] for 400 volts that splices a female plug
|
|||
|
into a phone line jack.
|
|||
|
- A meter of voltage to attach to the box itself.
|
|||
|
- A green base (i.e. one of the nice boxes about 3' by 4' that
|
|||
|
you see around in your neighborhood. They are the main switch
|
|||
|
boards and would be a more effective line to start with.
|
|||
|
or: regular phone jack (not your own, and not in your area
|
|||
|
code! - A soldering iron and much solder.
|
|||
|
- A remote control or long wooden pole.
|
|||
|
|
|||
|
Now. You must have guessed the construction from that. If not,
|
|||
|
here goes, I will explain in detail. Take the Honda Portable
|
|||
|
Generator and all of the other listed equipment and go out and
|
|||
|
hunt for a green base. Make sure it is one on the ground or
|
|||
|
hanging at head level from a pole, not the huge ones at the top
|
|||
|
of telephone poles. Open it up with anything convenient, if you
|
|||
|
are two feeble then don't try this. Take a look inside... you are
|
|||
|
hunting for color-coordinating lines of green and red. Now, take
|
|||
|
out your radio shack cord and rip the meter thing off. Replace it
|
|||
|
with the voltage meter about. A good level to set the voltage to
|
|||
|
is about 1000 volts. Now, attach the voltage meter to the cord
|
|||
|
and set the limit for one thousand. Plug the other end of the
|
|||
|
cord into the generator. Take the phone jack and splice the jack
|
|||
|
part off. Open it up and match the red and green wires with the
|
|||
|
other red and green wires. NOTE: If you just had the generator on
|
|||
|
and have done this in the correct order, you will be a crispy
|
|||
|
critter. Keep the generator off until you plan to start it up.
|
|||
|
Now, solder those lines together carefully. Wrap duck tape or
|
|||
|
insulation tape around all of the wires. Now, place the remote
|
|||
|
control right on to the startup of the generator. If you have the
|
|||
|
long pole, make sure it is very long and stand back as far away
|
|||
|
as you can get and reach the pole over. NOTICE: If you are going
|
|||
|
right along with this without reading the file first, you should
|
|||
|
realize now that your area code is about to become null! Then,
|
|||
|
getting back, twitch the pole/remote control and run for your
|
|||
|
damn life. Anywhere, just get away from it. It will be generating
|
|||
|
so much electricity that if you stand to close you will kill
|
|||
|
yourself. The generator will smoke, etc. but will not stop. You
|
|||
|
are now killing your area code, because all of that energy is
|
|||
|
spreading through all of the phone lines around you in every
|
|||
|
direction.
|
|||
|
Computer Hacking
|
|||
|
TYMNET
|
|||
|
|
|||
|
Introduction:
|
|||
|
|
|||
|
Many people may or may not have heard of Tymnet. Tymnet is one of
|
|||
|
the best information gathering networks that is around. It seems
|
|||
|
as though it were set up with the hacker in mind, but we all know
|
|||
|
this isn't true. After becoming experienced with the network, I
|
|||
|
found there to be little information available to the newcomer,
|
|||
|
with the exception of what is already available on the network,
|
|||
|
but as we all know, this leaves the newcomer craving for more. As
|
|||
|
this file was under construction, a great blow hit the hacker
|
|||
|
community on the network; four of the most popular NUIs died
|
|||
|
(NUIs to be discussed later). They were VIDEO, and the T.LLOYxx
|
|||
|
Family. In hopes of having the community reborn, an additional
|
|||
|
new NUI has been included.
|
|||
|
|
|||
|
For more information regarding Tymnet, Telenet, and other PSNs,
|
|||
|
consult the Leigon's of Lucifer Text File #10-11. Although other
|
|||
|
information on PSNs is available from Leigon's of Lucifer, this
|
|||
|
file was written in mind that the reader is unfamiliar with
|
|||
|
Tymnet. Terminology that would appear to be new to the reader is
|
|||
|
explained, in hopes that you will gain a greater knowledge of the
|
|||
|
networks.
|
|||
|
|
|||
|
Tymnet is an international network designed for two basic
|
|||
|
reasons. One, to link computers worldwide in order to exchange
|
|||
|
information. Two, so hackers can take advantage of the network
|
|||
|
and connect to the as many computers available =).
|
|||
|
|
|||
|
Tymnet is linked to computers throughout the world including most
|
|||
|
major continents (North/South America, Asia, Europe, Africa,
|
|||
|
Australia, etc.). Tymnet is referred to as a PSN, which is an
|
|||
|
acronym for Packet Switching Network. A PSN is any network that
|
|||
|
sends information via packets, in Tymnet's case, 128 byte
|
|||
|
packets.
|
|||
|
|
|||
|
The following is an example of a simple PSN, which
|
|||
|
includes three major components:
|
|||
|
|
|||
|
1) The PAD (Your Local Dialup)
|
|||
|
2) The PSN (The network that you are currently on)
|
|||
|
3) The Host (The computer you connect to via the PSN)
|
|||
|
|
|||
|
Use of a PSN is quite simple. First you must connect to your
|
|||
|
local PAD, and sign in with a NUI. If the NUI is valid, a colon
|
|||
|
prompt will follow (;), at which you may enter any NUA (NUAs to
|
|||
|
be discussed later), depending on what level of access the NUI
|
|||
|
has. The PSN then connects you to the Host, posing as a relay
|
|||
|
between you and the host. If this appears confusing, read through
|
|||
|
the rest of this file, and browse back through it, and possibly
|
|||
|
you will understand the concept a bit better.
|
|||
|
|
|||
|
Since Tymnet is not connected to nearly as many businesses as
|
|||
|
Telenet, it turns to be more of a communication and information
|
|||
|
gathering tool then a scanning one. Hackers on Tymnet, which can
|
|||
|
be contacted on the many various chat systems are almost always
|
|||
|
bound to have information to trade, or give away. Almost
|
|||
|
everything is available, from telco, fraud, to hacking.
|
|||
|
|
|||
|
Connecting to Tymnet:
|
|||
|
|
|||
|
The first thing you must do is find your local Tymnet dialup. If
|
|||
|
you already know your dialup, you can skip by this paragraph, and
|
|||
|
move on. There are two ways to acquire your dialup. Voice, or
|
|||
|
data. If you choose to find out your dialup voice, call 1-
|
|||
|
(800)-222-0555. Use your touch-tone keypad and follow the voice
|
|||
|
prompts. Data is quite simple if you are already familiar with
|
|||
|
the logon process on Tymnet. Type 'Information', or 'Info' at the
|
|||
|
NUI (Logon) prompt. It's self explanatory from there. You can
|
|||
|
also dial 1-(800) 336-0149 to find out your local dial, this
|
|||
|
includes HST Modems.
|
|||
|
|
|||
|
You must now prepare your terminal to communicate with Tymnet.
|
|||
|
Switch your parity to either 7E1 or 8N1. 7E1 is preferred, as I
|
|||
|
have encountered problems using 8N1. Toggle your Local Echo until
|
|||
|
it appears satisfactory. Once connected, Hit return a few times
|
|||
|
until the following message appears:
|
|||
|
|
|||
|
please type your terminal identifier
|
|||
|
|
|||
|
When this occurs, hit 'a' if you have 7E1, or 'o' if you have 8N1
|
|||
|
set up. The 'a' / 'o' combination tells the PAD your parity
|
|||
|
setting. Something to this effect will follow:
|
|||
|
|
|||
|
-4353:01-007-
|
|||
|
please log in:
|
|||
|
|
|||
|
You have now successfully connected to Tymnet.
|
|||
|
|
|||
|
Usage of NUIs:
|
|||
|
|
|||
|
NUI is an acronym for Network User Identification. This is much
|
|||
|
like the standard 'user name' on your favorite BBS. NUIs are
|
|||
|
legitimate accounts given to paying members of Tymnet. Hackers
|
|||
|
always seem to have a knack for setting up illegal NUIs though.
|
|||
|
Unlike Telenet, Tymnet NUIs are easy to find. The NUI 'VIDEO',
|
|||
|
which was by far one of the most popular hacker NUIs on Tymnet
|
|||
|
was cancelled during the construction of this file. Along with
|
|||
|
it, the T.LLOYxx Family died (T.LLOY01, T.LLOY02, T.LLOY03).
|
|||
|
These NUIs are probably the most free accounts that have been
|
|||
|
available; meaning they had extremely little restrictions. After
|
|||
|
entering a legitimate NUI, a colon prompt will appear. This
|
|||
|
notifies you that Tymnet is ready to receive a NUA. NUA is an
|
|||
|
acronym for Network User Address. This could be associated with a
|
|||
|
BBS telephone number, as they are much alike in certain aspects.
|
|||
|
|
|||
|
Types of NUAs:
|
|||
|
|
|||
|
Chat Systems-
|
|||
|
|
|||
|
Chat systems are probably the most popular of the NUAs to hackers
|
|||
|
on the networks. You can find many other hackers that are willing
|
|||
|
to trade new information. As well, in-depth conversations on
|
|||
|
hacking do take place on chat systems, so they are an excellent
|
|||
|
place to learn for the newcomer.
|
|||
|
|
|||
|
One of the most popular chat systems is QSD France. You can reach
|
|||
|
QSD via 208057040540 NUA. It is not a 'Live' chat system, as
|
|||
|
messages take some time to exchange. This chat system is also an
|
|||
|
excellent place to find other hackers to exchange information
|
|||
|
with. But be noted, QSD is like a local chat system in France, so
|
|||
|
you will, certain times, run into people who know nothing about
|
|||
|
hacking. It's best to avoid these people, because they are
|
|||
|
usually gay/lesbian, or looking for a fight. Besides, what use do
|
|||
|
you have for the general public? When reaching QSD, remember to
|
|||
|
change your parity to 8N1. If you logged in with 8N1, don't worry
|
|||
|
about it. Another note, QSD treats a destructive backspace as
|
|||
|
return. Do NOT hit backspace. The only way to get around the
|
|||
|
backspace problem, from my knowledge, is to use a Canadian PAD.
|
|||
|
|
|||
|
Most other chat systems are run off either custom software, like
|
|||
|
QSD, or off a Unix Shell. The Unix Shell chat systems are a bit
|
|||
|
harder to understand, but are much more powerful. When logging in
|
|||
|
to a Unix chat system, you will see a Logon: prompt, as most
|
|||
|
Unix's have. Try using default accounts to logon (x25, Guest,
|
|||
|
etc.). When logging onto a Unix Chat System which automatically
|
|||
|
places your NUA (Your PAD Address), use the FROM= command from
|
|||
|
the logon. RMI Chat System is a perfect example of this. Use Gast
|
|||
|
FROM=Hell/Gast as a Username/Password. If you want other hackers
|
|||
|
to know the exact geographical location from which you are
|
|||
|
calling, don't bother with this, otherwise, be safe, and use the
|
|||
|
FROM= command.
|
|||
|
|
|||
|
Unix Chat Systems resemble closely to the conferences found on
|
|||
|
most pay networks (Compuserve, Genie, BIX, etc), as they are
|
|||
|
'Live', and you see messages as soon as the author writes them.
|
|||
|
|
|||
|
|
|||
|
Outdials Explained:
|
|||
|
|
|||
|
Outdials that are available on Tymnet are PC-Pursuit (Telenet)
|
|||
|
Outdials. PC-Pursuit is a pay service from Telenet where you sign
|
|||
|
up and pay a monthly fee, and you are allowed a certain amount of
|
|||
|
long distance data calls. Of course, when using PC-Pursuit
|
|||
|
Outdials through Tymnet, you don't have to pay for anything.
|
|||
|
Outdials are restricted only to dial numbers from within that
|
|||
|
area code. If you logon to the 213 Outdial, you can only reach
|
|||
|
data numbers in 213. These Outdials are referred to as Local
|
|||
|
Outdials. There is another type of Outdials, and there are called
|
|||
|
Global Outdials, or, abbreviated, GODs. GODs can call anywhere
|
|||
|
within the United States with no restrictions, unlike LODs. The
|
|||
|
dial format for GODs usually differs. Ask whomever you received
|
|||
|
the GOD from for dialing procedures. Usage of Outdials is quite
|
|||
|
simple, after logging into Tymnet, and entering the NUA of the
|
|||
|
desired Outdial, you must hit one of three commands. If you are
|
|||
|
new to Outdials, they have a help level available where a program
|
|||
|
controls the modem for you via certain commands you send to it.
|
|||
|
To reach this help level, hit either CTRL-E or '%' when you
|
|||
|
connect to the Outdial. If you wish to use simplified AT
|
|||
|
commands, type 'AT', and you are ready. Use the AT level just as
|
|||
|
you would with your own modem. Entering a 1+AC+Number is not
|
|||
|
necessary, and if done, will not work correctly. Remember, you
|
|||
|
are logged into a certain area code, and you can only call
|
|||
|
numbers within that area code, so just type the local 7 digit
|
|||
|
phone number. File transferring through Tymnet/Telenet OutDial
|
|||
|
through tymnet is tricky when you are on a BBS, you must ALWAYS
|
|||
|
switch to 8n1,1 after you connect to a BBS through a OD, and when
|
|||
|
you are about to transfer, the only protocol you can use is PCP
|
|||
|
Z-Modem, aka MobyTurbo Zmodem, aka Z-Modem '90. This protocol was
|
|||
|
made for tymnet OD's and if you don't use it, you will get a slew
|
|||
|
of errors in your file and it will just corrupt the file and/or
|
|||
|
abort your transfer.
|
|||
|
|
|||
|
DNIC Restrictions:
|
|||
|
|
|||
|
DNIC is an acronym for Data Network Identification Code. A DNIC
|
|||
|
is made up of the first 4 digits of any NUA. There are plenty of
|
|||
|
DNIC lists around, so I will not include one. A DNIC shows which
|
|||
|
network, or country you are connecting to. Most of the NUIs that
|
|||
|
have been around have had very little restrictions when it comes
|
|||
|
to connecting to different DNICs, but as they are slowly dying,
|
|||
|
you might run into trouble with new NUIs that have restrictions.
|
|||
|
If you are trying to connect to a system in Germany, and your NUI
|
|||
|
bars access to German DNICs, try connecting to another PAD, such
|
|||
|
as an England PAD, and attempt connecting to the NUA again. You
|
|||
|
should not run into many problems. It's harder to scan this way..
|
|||
|
but it's a method around NUI restrictions. (Editor's Notes: In
|
|||
|
this text file, the author refers to your local Tymnet dialup as
|
|||
|
a PAD. Technically, it is. Technically, everything on Tymnet is a
|
|||
|
PAD. When I use the acronym PAD, I mean an x28/x29 PAD, and not a
|
|||
|
local dialup, and most of the rest of the hacker community on the
|
|||
|
networks would agree. I find very rare instances where I see it
|
|||
|
used in this way.)
|
|||
|
Here is a list of Telenet PC-Pursuit Local Out Dials:
|
|||
|
|
|||
|
New Jersey:
|
|||
|
3110 201 00 022 2400 Baud
|
|||
|
|
|||
|
District of Columbia:
|
|||
|
3110 202 00 117 2400 Baud
|
|||
|
|
|||
|
Connecticut:
|
|||
|
3110 203 00 105 2400 Baud
|
|||
|
|
|||
|
Washington:
|
|||
|
3110 206000 208 2400 Baud
|
|||
|
|
|||
|
New York:
|
|||
|
3110 212 00 028 2400 Baud
|
|||
|
|
|||
|
California:
|
|||
|
3110 213 00 023 2400 Baud
|
|||
|
3110 213 00 413 2400 Baud
|
|||
|
3110 714 00 004 2400 Baud
|
|||
|
3110 714 00 102 2400 Baud
|
|||
|
3110 916 00 007 2400 Baud
|
|||
|
3110 408 00 021 2400 Baud
|
|||
|
|
|||
|
Texas:
|
|||
|
3110 214 00 022 2400 Baud
|
|||
|
3110 713 00 024 2400 Baud
|
|||
|
|
|||
|
Pennsylvania:
|
|||
|
3110 215 00 022 2400 Baud
|
|||
|
|
|||
|
Ohio:
|
|||
|
3110 216 00 120 2400 Baud
|
|||
|
|
|||
|
Colorado:
|
|||
|
3110 303 00 021 2400 Baud
|
|||
|
3110 303 00 115 2400 Baud
|
|||
|
|
|||
|
Florida:
|
|||
|
3110 305 00 122 2400 Baud
|
|||
|
3110 813 00 124 2400 Baud
|
|||
|
|
|||
|
Illinois:
|
|||
|
3110 312 00 024 2400 Baud
|
|||
|
|
|||
|
Michigan:
|
|||
|
3110 313 00 024 2400 Baud
|
|||
|
|
|||
|
Missouri:
|
|||
|
3110 314 00 005 2400 Baud
|
|||
|
|
|||
|
Alabama:
|
|||
|
3110 404 00 022 2400 Baud
|
|||
|
|
|||
|
Wisconsin:
|
|||
|
3110 414 00 120 2400 Baud
|
|||
|
|
|||
|
Arizona:
|
|||
|
3110 602 00 026 2400 Baud
|
|||
|
|
|||
|
Minnesota:
|
|||
|
3110 612 00 022 2400 Baud
|
|||
|
|
|||
|
Massachusetts:
|
|||
|
3110 617 00 026 2400 Baud
|
|||
|
|
|||
|
Utah:
|
|||
|
3110 801 00 012 2400 Baud
|
|||
|
|
|||
|
North Carolina:
|
|||
|
3110 919 00 124 2400 Baud
|
|||
|
|
|||
|
|
|||
|
TELENET
|
|||
|
I am writing this assuming that the reader has no knowledge of
|
|||
|
the Telenet network. In part 1 I will discuss the basic theory of
|
|||
|
Telenet and how it can be used as a basically safe and fun
|
|||
|
hacking tool. Telenet is a Packet Switching Network (PSN). Since
|
|||
|
I want to make this as short as possible I will try to give you a
|
|||
|
*basic* understanding of what a PSN is and how it works.
|
|||
|
Basically there are 3 levels to the PSN. The 3rd and lowest is
|
|||
|
the PAD that you dial-up. This is where you enter all of the
|
|||
|
information. 2nd is the actual PSN which takes the data you enter
|
|||
|
in 128k chunks (usually) and then transmits them to the host (1st
|
|||
|
and highest level) at baud rates ranging from 9600 to 19,200.
|
|||
|
This means that 2 computers with different baud rates are able to
|
|||
|
communicate (See my really bad ASCII PSN map). Ok, now you have a
|
|||
|
*basic* understanding of how Telenet works. Now to the fun stuff!
|
|||
|
Remember, Telenet has access to computers all over the world.
|
|||
|
When you consider all the networks that these other computers are
|
|||
|
connected to then you can see that you can basically access the
|
|||
|
entire world. It is also pretty safe because there is no way that
|
|||
|
someone can monitor all the PADs at one time.
|
|||
|
Ok, now first you must find a list of Telenet access numbers.
|
|||
|
There are many lists out there (look in Phrack issue 21). If you
|
|||
|
can't find one then to find the Telenet dialup nearest your
|
|||
|
location, call 800-424-9494 at 300/1200 baud. At the '@' prompt,
|
|||
|
type 'MAIL'. Enter user name 'PHONES' with password 'PHONES'. So
|
|||
|
now you have a local access number. Remember it's (7E1), so if
|
|||
|
your screen looks messed-up then you're not set right. After you
|
|||
|
call this is what you do.....
|
|||
|
|
|||
|
*Inside the '<>' (of course <CR> is return) is what you have to
|
|||
|
type....
|
|||
|
|
|||
|
CONNECT 2400 (or whatever baud rate it is)
|
|||
|
<CR> <CR>
|
|||
|
TERMINAL=<D1><CR>
|
|||
|
@
|
|||
|
|
|||
|
Ok, now you're to the @ prompt. This is the telenet PAD
|
|||
|
prompt. This prompt means that telenet is in "command" mode. Now
|
|||
|
we will get to the *real* fun.
|
|||
|
Telenet's computer systems are identified by NUA's. This stands
|
|||
|
for Network User Address. The way you connect to the NUA's are
|
|||
|
by either typing in 'c' <nua> or just typing in the nua by
|
|||
|
itself. We will work w/ the 1st and most basic form on the NUA
|
|||
|
since this is a file for people who don't know what the hell
|
|||
|
they're doing (I'll make another G-phile for the more advanced
|
|||
|
telenet hacker ). The easiest form is AAA XXX, this is where AAA
|
|||
|
stands for an area code and XXX stands for random numbers. So if
|
|||
|
I wanted to scan the Los Angeles area for example I would type
|
|||
|
213 123. Here 213 is the area code and 123 are random numbers.
|
|||
|
You must have a at least 4 numbers. So 213 1 would work as would
|
|||
|
213 12.
|
|||
|
Telenet doesn't recognize zeros or spaces so you could also
|
|||
|
type 213 123 like this 213000000000000123 or like 213123. Ok, now
|
|||
|
that you know how to use simple NUA's you can start messing
|
|||
|
around. So, now you can access all the networks and
|
|||
|
Unix/Vax/Primes/etc... that you want right? So, you enter 213
|
|||
|
123 and suddenly it says.. COLLECT CONNECTION REFUSED
|
|||
|
F4 E6 Well, you just learned life's first lesson. Nothing in
|
|||
|
life is free! Yes, that's right, the "good" systems on telenet
|
|||
|
you have to pay for. This is where a NUI comes in. This stands
|
|||
|
for Network User ID. This is for users with "accounts" on
|
|||
|
telenet. NUI's are very hard to find these days ( I've only had
|
|||
|
1 in my hacking adventures ). They are in the form of a user
|
|||
|
name ( anything ) and then a password (6 numbers). These are very
|
|||
|
hard to hack since there are no "default" names or passwords. You
|
|||
|
type in ID <name> and then the password to user one. if you can
|
|||
|
hack out a NUI then you should be writing G-Philes instead of
|
|||
|
reading them.
|
|||
|
But don't worry though! There are *MANY* systems on telenet
|
|||
|
that are free. The only ones that cost money are the big ones
|
|||
|
like some BIG corporation. By just typing in an area code and
|
|||
|
then a random number ( up to 3 digits ) you can find some really
|
|||
|
cool systems (hey, yo can hack into McDonalds for free!!).
|
|||
|
Anyway I have the most fun by turning on my Led Zeppelin CD and
|
|||
|
just randomly typing in numbers. You will find at least 1 NUA
|
|||
|
that connects for every 5 you type in . Its not like phreaking
|
|||
|
where you find a code per 10 hours.... Of course there are the
|
|||
|
lazy hackers who just want the NUA's with no work, there are many
|
|||
|
good NUA lists ( check you local p/h/a board ). You can find a
|
|||
|
NUA lists in a few Phrack issues or on DII (Data Infinty,
|
|||
|
Incorporated (yes once again, I must plug my organization you
|
|||
|
know). If you want to feel like you did something then get the
|
|||
|
NUA Attacker. This is an IBM program that calls telenet and then
|
|||
|
types in different NUA's ( you set the range ). It is basically a
|
|||
|
code hacker for Telenet. This can be found on DII (Data Infinity,
|
|||
|
Inc.) <once again> or most good p/h/a boards. HACKING UNIX
|
|||
|
|
|||
|
Welcome to the basics of hacking Vax's and Unix. In this article,
|
|||
|
we discuss the unix system that runs on the various vax systems.
|
|||
|
If you are on another unix-type system, some commands may differ,
|
|||
|
but since it is licensed to bell, they can't make many changes.
|
|||
|
Hacking onto a unix system is very difficult, and in this case,
|
|||
|
we advise having an inside source, if possible. The reason it is
|
|||
|
difficult to hack a vax is this: Many vax, after you get a
|
|||
|
carrier from them, respond=> Login: They give you no chance to
|
|||
|
see what the login name format is. Most commonly used are single
|
|||
|
words, under 8digits, usually the person's name. There is a way
|
|||
|
around this: Most vax have an acct. called 'suggest' for people
|
|||
|
to use to make a suggestion to the system root terminal. This is
|
|||
|
usually watched by the system operator, but at late he is
|
|||
|
probably at home sleeping. So we can write a program to send at
|
|||
|
the vax this type of a message: A screen freeze (Ctrl-s), screen
|
|||
|
clear (system dependant), about 255 garbage characters, and then
|
|||
|
a command to create a login acct., after which you clear the
|
|||
|
screen again, then un- freeze the terminal. What this does: When
|
|||
|
the terminal is frozen, it keeps a buffer of what is sent. well,
|
|||
|
the buffer is about 127 characters long. so you overflow it with
|
|||
|
trash, and then you send a command line to create an acct.
|
|||
|
(System dependant). after this you clear the buffer and screen
|
|||
|
again, then unfreeze the terminal. This is a bad way to do it,
|
|||
|
and it is much nicer if you just send a command to the terminal
|
|||
|
to shut the system down, or whatever you are after... There is
|
|||
|
always, *Always* an acct. called root, the most powerful acct. to
|
|||
|
be on, since it has all of the system files on it. If you hack
|
|||
|
your way onto this one, then everything is easy from here on...
|
|||
|
On the unix system, the abort key is the Ctrl-d key. watch how
|
|||
|
many times you hit this, since it is also a way to log off the
|
|||
|
system! A little about unix architecture: The root directory,
|
|||
|
called root, is where the system resides. After this come a few
|
|||
|
'sub' root directories, usually to group things (stats here, priv
|
|||
|
stuff here, the user log here...). Under this comes the superuser
|
|||
|
(the operator of the system), and then finally the normal users.
|
|||
|
In the unix 'Shell' everything is treated the same. By this we
|
|||
|
mean: You can access a program the same way you access a user
|
|||
|
directory, and so on. The way the unix system was written,
|
|||
|
everything, users included, are just programs belonging to the
|
|||
|
root directory. Those of you who hacked onto the root, smile,
|
|||
|
since you can screw everything... the main level (exec level)
|
|||
|
prompt on the unix system is the $, and if you are on the root,
|
|||
|
you have a # (super- user prompt). Ok, a few basics for the
|
|||
|
system... To see where you are, and what paths are active in
|
|||
|
regards to your user account, then type > pwd This shows your
|
|||
|
acct. separated by a slash with another pathname (acct.),
|
|||
|
possibly many times. To connect through to another path, or many
|
|||
|
paths, you would type: You=> path1/path2/path3 and then you are
|
|||
|
connected all the way from path1 to path3. You can run the
|
|||
|
programs on all the paths you are connected to. If it does not
|
|||
|
allow you to connect to a path, then you have insufficient privs,
|
|||
|
or the path is closed and archived onto tape. You can run
|
|||
|
programs this way also:
|
|||
|
you=> path1/path2/path3/program-name
|
|||
|
unix treats everything as a program, and thus there a few
|
|||
|
commands to learn... To see what you have access to in the end
|
|||
|
path, type=> ls -- for list. this show the programs you can run.
|
|||
|
You can connect to the root directory and run it's programs
|
|||
|
with=> /root By the way, most unix systems have their log file on
|
|||
|
the root, so you can set up a watch on the file, waiting for
|
|||
|
people to log in and snatch their password as it passes thru the
|
|||
|
file. To connect to a directory, use the command: => cd pathname
|
|||
|
this allows you to do what you want with that directory. You may
|
|||
|
be asked for a password, but this is a good way of finding other
|
|||
|
user names to hack onto. The wildcard character in unix, if you
|
|||
|
want to search down a path for a game or such, is the *. => ls /*
|
|||
|
Should show you what you can access. The file types are the same
|
|||
|
as they are on a dec, so refer to that section when examining
|
|||
|
file. To see what is in a file, use the => pr filename command,
|
|||
|
for print file. We advise playing with pathnames to get the hang
|
|||
|
of the concept. There is on-line help available on most systems
|
|||
|
with a 'help' or a '?'. We advise you look thru the help files
|
|||
|
and pay attention to anything they give you on pathnames, or the
|
|||
|
commands for the system. You can, as a user, create or destroy
|
|||
|
directories on the tree beneath you. This means that root can
|
|||
|
kill every- thing but root, and you can kill any that are below
|
|||
|
you. These are the => mkdir pathname => rmdir pathname commands.
|
|||
|
Once again, you are not alone on the system... type=> who to see
|
|||
|
what other users are logged in to the system at the time. If you
|
|||
|
want to talk to them=> write username Will allow you to chat at
|
|||
|
the same time, without having to worry about the parser. To send
|
|||
|
mail to a user, say => mail And enter the mail sub-system. To
|
|||
|
send a message to all the users on the system, say => wall which
|
|||
|
stands for 'write all' By the way, on a few systems, all you have
|
|||
|
to do is hit the <return> key to end the message, but on others
|
|||
|
you must hit the ctrl-d key. To send a single message to a user,
|
|||
|
say => write username this is very handy again! If you send the
|
|||
|
sequence of characters discussed at the very beginning of this
|
|||
|
article, you can have the super-user terminal do tricks for you
|
|||
|
again. Privs: If you want super-user privs, you can either log in
|
|||
|
as root, or edit your acct. so it can say => su this now gives
|
|||
|
you the # prompt, and allows you to completely by-pass the
|
|||
|
protection. The wonderful security conscious developers at bell
|
|||
|
made it very difficult to do much without privs, but once you
|
|||
|
have them, there is absolutely nothing stopping you from doing
|
|||
|
anything you want to. To bring down a unix system: => chdir /bin
|
|||
|
=> rm * this wipes out the pathname bin, where all the system
|
|||
|
maintenance files are.
|
|||
|
Or try: => r -r This recursively removes everything from the
|
|||
|
system except the remove command itself. Or try: => kill -1,1 =>
|
|||
|
sync This wipes out the system devices from operation. When you
|
|||
|
are finally sick and tired from hacking on the vax systems, just
|
|||
|
hit your ctrl-d and repeat key, and you will eventually be logged
|
|||
|
out. The reason this file seems to be very sketchy is the fact
|
|||
|
that bell has 7 licensed versions of unix out in the public
|
|||
|
domain, and these commands are those common to all of them. We
|
|||
|
recommend you hack onto the root or bin directory, since they
|
|||
|
have the highest levels of privs, and there is really not much
|
|||
|
you can do (except develop software) without them.
|
|||
|
|
|||
|
|
|||
|
Primenet
|
|||
|
Well, we've all heard of Unix and Vax systems. We hear a little
|
|||
|
bit now and then about Cyber or Tops systems, but what is Prime?
|
|||
|
Well, prime is a system made by Primos which has a set-up
|
|||
|
something like DOS. Prime is arguably not as powerful as a Vax or
|
|||
|
Unix system, but it is more user friendly (I feel) than either of
|
|||
|
them.
|
|||
|
|
|||
|
Now, you may say to yourself "Great, why should I even learn
|
|||
|
about prime if nobody uses it". Well there are many people who
|
|||
|
use it (just not as many as Unix of Vax), but the real reason I
|
|||
|
wrote this is because a good percentage of the systems found on
|
|||
|
Telenet are prime. Since I have already wrote a telenet G-Phile
|
|||
|
(which is very good <grin>), I thought I'd follow it up with a
|
|||
|
primos text phile since there are so many. Also, there are no
|
|||
|
really good primenet hacking philes (except for a good one in a
|
|||
|
LOD/H journal and in a Phrack issue which I forget) that cover
|
|||
|
everything.
|
|||
|
|
|||
|
First of all find a prime system. This can be done by going on
|
|||
|
Telenet and just scanning or picking-up the LOD/H journal #4
|
|||
|
which has a great NUA list (or any NUA list for that matter). You
|
|||
|
can also check at your local university for one. Ok, first I tell
|
|||
|
you the way to identify a prime system. It should be easy because
|
|||
|
almost all prime systems have a system header that looks
|
|||
|
something like...
|
|||
|
|
|||
|
PRIMENET 22.1.1.R27 SWWCR
|
|||
|
|
|||
|
This means that this is a primenet version 22.1.1. If for some
|
|||
|
reason you get VERY lucky and find a version 18.xx or lower then
|
|||
|
you're in. See, most version 18's and lower have either no
|
|||
|
password (So you enter System for the ID which is the sysop), or
|
|||
|
if they do have a password then all you have to do is hit a few
|
|||
|
^C (Control C for the beginner) for the password. Some prime
|
|||
|
systems just sit still when you connect. On these try typing like
|
|||
|
'hi'. If its a prime you will get a message like...
|
|||
|
Now, in order to logon to a prime system you must type "Login
|
|||
|
<UserName>" or just "Login". If you type in "Login" then it will
|
|||
|
just ask you for your username anyway. Now, here is the hardest
|
|||
|
part of hacking. You must get a working password. Primes are hard
|
|||
|
to hack since they don't have any default passwords. Here is a
|
|||
|
list that I have compiled ..... (passwords same as Username!)<0C><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> Username <20> Password <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
<EFBFBD> Prime <20> Prime <20>
|
|||
|
<EFBFBD> System <20> System <20>
|
|||
|
<EFBFBD> Primos <20> Primos <20>
|
|||
|
<EFBFBD> Admin <20> Admin <20>
|
|||
|
<EFBFBD> rje <20> rje <20>
|
|||
|
<EFBFBD> Demo <20> Demo <20>
|
|||
|
<EFBFBD> Guest <20> Guest <20>
|
|||
|
<EFBFBD> Games <20> Games <20>
|
|||
|
<EFBFBD> Netman <20> Netman <20>
|
|||
|
<EFBFBD> Telenet <20> Telenet <20>
|
|||
|
<EFBFBD> Tools <20> Tools <20>
|
|||
|
<EFBFBD> Dos <20> Dos <20>
|
|||
|
<EFBFBD> Prirun <20> Prirun <20>
|
|||
|
<EFBFBD> Help <20> Help <20>
|
|||
|
<EFBFBD> Test <20> Test <20>
|
|||
|
<EFBFBD> Netlink <20> Netlink <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
Not all these passwords and names are guaranteed to work. If none
|
|||
|
of them work then try to mix-up the usernames and the passwords.
|
|||
|
Hopefully you have now gotten into the system and get the "OK,"
|
|||
|
prompt.
|
|||
|
|
|||
|
OK, so now you're in. If you have gotten in then that is a big
|
|||
|
step in itself and I congratulate you. So, now you have the
|
|||
|
prompt "OK," or something like that. This is the command prompt,
|
|||
|
if you enter a bad command it may look different such as "ERR,"
|
|||
|
or soething like that. This is nothing to worry about just an
|
|||
|
error message. Ok, first I'm going to run down some basic
|
|||
|
commands. First of all we must understand how primos is set-up.
|
|||
|
The primos set-up is very much like MS-DOS There are separate
|
|||
|
directories each with files and more directories in them . It is
|
|||
|
pretty easy to navigate, so i will just give you the commands and
|
|||
|
then explain what to do with them....
|
|||
|
LD shows the contents of the current directory
|
|||
|
you're in.
|
|||
|
Attach attaches (move) to another directory.
|
|||
|
Delete deletes a file or directory.
|
|||
|
ED text editor to edit/create text.
|
|||
|
Logout logs-off
|
|||
|
Netlink enters the netlink section.
|
|||
|
Slist lists the contents (text) of a file
|
|||
|
CPL <filename> runs a .CPL program
|
|||
|
Users lists the amount of users on the system.
|
|||
|
Status Users gets the names, numbers and locations of the
|
|||
|
users on line.
|
|||
|
Help gets a list of the commands.
|
|||
|
Help <command> gets help with a command
|
|||
|
|
|||
|
|
|||
|
Ok, those should be enough for the time being. Now, lets start by
|
|||
|
doing a 'LD' (anything in single quotes means to type it). The
|
|||
|
name of the directory you're in right now should be the same as
|
|||
|
your user name. There may be a few files in here so to see the
|
|||
|
contents of the files type 'SLIST <filename>'. Now, lets do an
|
|||
|
'Attach MFD'. This is the "Main File Directory" where most of the
|
|||
|
major files and directories are found. So now we will do another
|
|||
|
"LD" and look at all the directories and files. Ok, now to start
|
|||
|
the hacking. This method works with most primes, but not all so
|
|||
|
don't be to discouraged if it doesn't work. Ok, first of all you
|
|||
|
probably noticed that when you first started-out the directory
|
|||
|
you were in had the same name as your username (id). This is a
|
|||
|
very important lesson. The reason this is important is because
|
|||
|
now you can probably figure-out that *The name of every directory
|
|||
|
is also the name of a
|
|||
|
user* (NOTE: This is true for all directories, EXCEPT ones with
|
|||
|
an asterix '*' by their name). This means 2 things, first of all
|
|||
|
it means that you can basically find a fair amount of usernames
|
|||
|
from the mfd directory and the odds are that a few of them will
|
|||
|
have the same password as the name (This is an important lesson
|
|||
|
in hacking, whenever you're on any kind of system et a user list
|
|||
|
and then just go through the list, using the username as the
|
|||
|
password and you should get a few accounts at least) Secondly it
|
|||
|
means that you can access a certain users "private" directory.
|
|||
|
What this means is that a lot of the usernames of actually people
|
|||
|
may not be in the MFD directory. This means that once you find
|
|||
|
out a username you can then simply say "attach <username>" and
|
|||
|
your in their directory. So, now knowing that we will do a
|
|||
|
'Status Users'. This will give you a list somewhat like this:
|
|||
|
|
|||
|
User Number Device
|
|||
|
Guest 14 <MDF0>
|
|||
|
System 1 <MDF0> <MFD1>
|
|||
|
Hacker 81 <MDF0>
|
|||
|
Sysmaint 19 <MDD0> (phantom)
|
|||
|
|
|||
|
From this list we can get all the usernames/directories of the
|
|||
|
users on-line and start snooping. It is usually not ood to be on
|
|||
|
when there are a lot of people on since a Sysop might notice that
|
|||
|
you shouldn't be on at that time or something. You may notice
|
|||
|
that the last one (Sysmaint) has the word Phantom by it. This
|
|||
|
means that it is just a program that is doing house keeping
|
|||
|
stuff. Its nothing to worry about. The devices are merely like a
|
|||
|
tree in other software (UNIX/VAX), if there are 2 devices then it
|
|||
|
means that the user is either interacting with another system or
|
|||
|
has logged-off incorrectly. So, now we have some usernames /
|
|||
|
directories to look at (and to try as passwords for the same
|
|||
|
username). Now first of all we want to go back to the MFD
|
|||
|
directory and look for a directory that is something like UTIL,
|
|||
|
Utilities, CCUTIL or whatever. This part is very site dependant
|
|||
|
so just try any thing that looks like a util. Now attach to that
|
|||
|
directory which is 'Attach Util' (assuming the name is Util). Now
|
|||
|
we get to another important part of Primenet. The different file
|
|||
|
formats.....
|
|||
|
|
|||
|
FileSuffix How to execute/Description
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> .CPL <20> CPL<Pathaname>/Language <20>
|
|||
|
<EFBFBD> .SAVE <20> SAVE<Pathname> <20>
|
|||
|
<EFBFBD> .SEG <20> SEG<pathname> <20>
|
|||
|
<EFBFBD> .TXT <20> SLIST<pathname> <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
This list shows you the different file suffixes you'll see. Every
|
|||
|
file will be followed by a suffix. If it is not then you can
|
|||
|
assume its text. The only suffix we want to worry about now is
|
|||
|
the CPL suffix. CPL (Command Procedure Language) is the primos
|
|||
|
"programming language". So you can assume that anything with a
|
|||
|
.CPL suffix is some type of program. Most often you will find
|
|||
|
simple programs which tell the date, some "menus" that people
|
|||
|
programmed in CPL to navigate the system easier, and then their
|
|||
|
own misc CPL files. To run a CPL file you type 'CPL <pathname>'
|
|||
|
(the pathname is simply the file name). Now, since CPL is a
|
|||
|
language it's programs must some how be written. This means that
|
|||
|
by doing a SLIST on a .CPL file will display the contents &
|
|||
|
source code of the .CPL file.
|
|||
|
|
|||
|
Ok, so back to the hacking. So we're in the Util's library (or
|
|||
|
whatever the name of the directory is). Ok, now do an 'LD' to see
|
|||
|
the contents and look for any .CPL files. Lets say there's a CPL
|
|||
|
file named "CleanUp.CPL". Now you'd type 'SLIST CleanUp.CPL',
|
|||
|
this will display the source code of the CleanUp program. Now,
|
|||
|
you will get a lot of trash but in it somewhere look for a line
|
|||
|
that is something like...
|
|||
|
|
|||
|
|
|||
|
A UTIL KEWL
|
|||
|
<20> ^Password
|
|||
|
<20>Ĵ Directory name
|
|||
|
|
|||
|
So, what does this mean you ask?? Well first off we will remember
|
|||
|
that every Directory (except for ones with stars by them) is a
|
|||
|
username which you can log-on with. So this means that the
|
|||
|
password for the username Util is KEWL !!! If you have found a
|
|||
|
line like this then congratulate yourself..you have SYS1 access.
|
|||
|
Just in case you don't really understand, lets say that there was
|
|||
|
a directory's name was COUNT, and the password was ZER0. Now, if
|
|||
|
you got lucky and were on a system where this works then you'd
|
|||
|
see a line like...
|
|||
|
|
|||
|
A COUNT ZER0
|
|||
|
|
|||
|
Another way to find out directory/usernames is by using the
|
|||
|
'List_Access' command. This shows the different directories that
|
|||
|
the current directory has access to. This will look something
|
|||
|
like...
|
|||
|
|
|||
|
ACL "<current directory":
|
|||
|
|
|||
|
JOHN : ALL
|
|||
|
SALLY : LUR
|
|||
|
ADMIN : NONE
|
|||
|
GAMES : LUR
|
|||
|
|
|||
|
From this you can see the names of directories that you would
|
|||
|
normally could not access, because if you don't know the name of
|
|||
|
a directory then you can't access it. You can do this at
|
|||
|
different directories and sometimes you will find a different set
|
|||
|
of directory/username names. Ok, so you should pretty much
|
|||
|
understand what we are looking for. If this doesn't work in one
|
|||
|
directory then keep checking in other log-on able directories.
|
|||
|
Remember this technique only works like 70% of the time so if it
|
|||
|
doesn't work then don't worry. Since the above technique of
|
|||
|
primos hacking is well known, by both hackers and Sysops I expect
|
|||
|
to have a large percentage of readers still stuck in their
|
|||
|
"Guest" account. I will now tell you how you can both defet
|
|||
|
security and how you can secure yourself. First of all, lets
|
|||
|
boost your account as much as you can (with your current access
|
|||
|
of course). To do this we will use the CHAP command. This will
|
|||
|
edit or priority levels. To do this we will use the 'CHAP UP'
|
|||
|
command (remember anything in single quotes you type). You can
|
|||
|
also use 'CHAP DOWN' or 'CHAP X' where X equals the amount of
|
|||
|
levels you want to jump up to. Each system will have different
|
|||
|
levels, so do it about 10 times and then stop (unless you get a
|
|||
|
message that you have reached the limit already). The main reason
|
|||
|
we want high security is so we can get into other directories and
|
|||
|
run high-access programs (and access high-access commands). So
|
|||
|
first I will discuss Directory security. Here is a diagram of the
|
|||
|
different levels of security that can be put on directories....
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20>Directories<65>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
Letter Description of Access
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
|||
|
<EFBFBD> P <20> To protect the directory <20>
|
|||
|
<EFBFBD> D <20> Delete entries to directory <20>
|
|||
|
<EFBFBD> A <20> To add entries to a directory <20>
|
|||
|
<EFBFBD> L <20> Read contents within a directory<72>
|
|||
|
<EFBFBD> U <20> Lets you attach to the directory<72>
|
|||
|
<EFBFBD> R <20> Read contents of file <20>
|
|||
|
<EFBFBD> All <20> All of the above <20>
|
|||
|
<EFBFBD> None <20> No access to others <20>
|
|||
|
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
|||
|
|
|||
|
So, from this you can see the different options that one can put
|
|||
|
to protect a library. These letters can also be combined to form
|
|||
|
a "word" (so to speak), so that you can incorporate different
|
|||
|
types of access. The most commonly found example of this would be
|
|||
|
"LUR" access. So, using the chart this means that someone can
|
|||
|
Read the contents of the directory, Attach to it, and Read the
|
|||
|
contents of the files in the directory. Basically this means that
|
|||
|
you can read all you want but you can't edit, which in some cases
|
|||
|
can be good. Since this file is also geared towards the well
|
|||
|
educated user I will discuss how to change the access on
|
|||
|
directories, and how to create/delete directories. I would
|
|||
|
strongly suggest that anyone who has hacked an account not try to
|
|||
|
create delete files (unless you want to get back at someone on
|
|||
|
the system, which will be discussed later), since it will lead to
|
|||
|
detection and erasure of the account (This is a general rule of
|
|||
|
hacking, read all the info you want, but keep a low profile). By
|
|||
|
default most directories will be set to ALL access when created.
|
|||
|
Prime is one of those big network, open systems, and many people
|
|||
|
never bother or don't know how to make their account's more
|
|||
|
secure. (this will be painfully obvious (to the users) when you
|
|||
|
get one <grin>). Because of this you will find *MANY* directories
|
|||
|
with ALL access. I have found many directories of people who have
|
|||
|
SYS1 access, with ALL access. Most of the other people will have
|
|||
|
LUR access. This is still very sufficient for your needs, since U
|
|||
|
can still read files. Since I want to be slightly kind I will
|
|||
|
discuss how to change access on directories, for the people who
|
|||
|
have legit prime accounts. If you have a hacked account then
|
|||
|
there should be no reason for you to change access on a
|
|||
|
directory, first of all you will be detected in a second, and
|
|||
|
second of all its not permanent at all and can't be used to crash
|
|||
|
the board. First of all the command to create a directory is
|
|||
|
'Create <directory name> [-password] [-access]'. So in other
|
|||
|
words if I wanted to create a mail directory with the password of
|
|||
|
HACK and LUR access hen I'd type.
|
|||
|
|
|||
|
Create Mail [-HACK] [-LUR]
|
|||
|
|
|||
|
The command for changing access on a directory is...
|
|||
|
|
|||
|
Set_Access ALL [-LUR]
|
|||
|
|
|||
|
In this example we are changing a directories access to LUR (you
|
|||
|
can read but you can't edit) from ALL (everything). Since there
|
|||
|
is no real reason you would want anyone else changing your files
|
|||
|
I would suggest at least LUR access. If you are really worried
|
|||
|
then I would not even think twice about going to NONE access, its
|
|||
|
up to you. Although changing access is the most effective way to
|
|||
|
secure your directory, there are some people who would like
|
|||
|
others to read, or maybe even edit files in their directory. This
|
|||
|
is why I usually tell people to just make a password, this
|
|||
|
command has already been discussed.. That about wraps it up for
|
|||
|
their directory part of this file. This is the major an most
|
|||
|
important part. Now we get to the fun little features.
|
|||
|
|
|||
|
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
|||
|
<20>Creating Files and Writing Programs<6D>
|
|||
|
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
|
|||
|
Creating files are a very important part of hacking prime net.
|
|||
|
The main reason we want to create files is so we can take
|
|||
|
advantage of the CPL language. I have not learned the CPL
|
|||
|
language well enough so I really can't explain much about it. I'm
|
|||
|
still looking for technical manuals. The easiest way to learn it
|
|||
|
is by just looking at all the .CPL files. Once we learn the CPL
|
|||
|
language we can simply add commands to create us new accounts to
|
|||
|
house keeping programs. The reason we would want to do this is
|
|||
|
because when it is run by the admin, or any user with high enough
|
|||
|
access it will run these embedded commands and we will have a new
|
|||
|
account with unlimited access!! The way to create a file is by
|
|||
|
typing 'ED'. This will get you into the text editor. It should
|
|||
|
look something like..
|
|||
|
|
|||
|
INPUT
|
|||
|
|
|||
|
This means you can type in what ever you want. So lets say you
|
|||
|
are making a file that, when run will type out 'Count_ZER0 is the
|
|||
|
ruler of heaven and earth', you would type...
|
|||
|
|
|||
|
Type Count_ZER0 is the ruler of heaven and earth
|
|||
|
|
|||
|
Now, you'd type just a <CR> alone and you'll get a line like...
|
|||
|
|
|||
|
COMMAND
|
|||
|
|
|||
|
This line varies a lot from system to system, but you'll get
|
|||
|
something to that affect. Here you would now type 'Save
|
|||
|
Count.CPL'. This would then save a program call Count.CPL in the
|
|||
|
directory and when you ran it (Discussed earlier) it would type
|
|||
|
'Count_ZER0 is the ruler of heaven and earth' on the screen.
|
|||
|
|
|||
|
The editor can also be used to write Basic, Fortran, C, and
|
|||
|
pascal files (use the 'Languages' command to see what languages
|
|||
|
it supports). All you do is write the program in the editor and
|
|||
|
then save it with the correct suffix. Then you run/compile the
|
|||
|
program. Since this file is much longer then I thought it would
|
|||
|
be I won't discuss it, but it can easily be found out about by
|
|||
|
using the 'HELP' command.
|
|||
|
|
|||
|
Communicating With Other Users And Systems
|
|||
|
|
|||
|
To send a message to another user On-Line you use the Message
|
|||
|
command. Lets say using the status command (discussed earlier)
|
|||
|
you found there was a user named JOE that you wanted to talk to.
|
|||
|
So you'd type ..
|
|||
|
|
|||
|
Message JOE <CR>
|
|||
|
Hello, how are you !
|
|||
|
|
|||
|
This will send a message to him unless you get some message that
|
|||
|
says something like..
|
|||
|
|
|||
|
User Joe not accepting messages at this time.
|
|||
|
|
|||
|
This means that he is not accepting messages (duhhhhhh), so you
|
|||
|
can try again later. You can also use the TALK command, which is
|
|||
|
self-explanatory. Just type 'TALK', and then follow the
|
|||
|
directions.
|
|||
|
|
|||
|
Accessing Remote Systems
|
|||
|
|
|||
|
The most exciting feature of primos (and this G-Phile), is
|
|||
|
primenet's ability to access remote systems. See, they call it
|
|||
|
primenet, because all primes are hooked-up to one big network.
|
|||
|
This network is much like a "mini-telenet". This can be used with
|
|||
|
the 'NETLINK' command. At a prompt, you must type 'NETLINK'. Then
|
|||
|
you will be thrown into the netlink system. There is a good On-
|
|||
|
Line help file which can be accessed with the 'HELP NETLINK'
|
|||
|
command. Basically you type NC xxxxxxx <x's being the NUA>. Now,
|
|||
|
you can scan this like telenet and see what you come up with. The
|
|||
|
most exciting part of all this is that some primos systems on
|
|||
|
telenet let you enter telenet NUA's in the netlink system. This
|
|||
|
means that all those "Collect Connection" NUA's you can't call,
|
|||
|
can be accessed through primos *FOR FREE*. This means that you
|
|||
|
don't need to mess with NUI's anymore (see my hacking telenet
|
|||
|
part 1 file). Now comes the part that will bring me fame in the
|
|||
|
hacking community, fame to <20>egions f <20>ucifer, and anyone who
|
|||
|
knows me.............
|
|||
|
|
|||
|
The 'ANET' command
|
|||
|
|
|||
|
Yes, this is the first time this command has every been
|
|||
|
"published" is a G-phile. The way I came about this command was
|
|||
|
one day I was hacking around and I saw this lady's directory with
|
|||
|
LUR access. So I looked at the files, and surprisingly there was
|
|||
|
a file that was a *BUFFER* of her logging on to remote systems
|
|||
|
(yes the password was there!!). I was very surprised to see that
|
|||
|
she used a command like 'anet -8887613' to access the remote
|
|||
|
system, instead of netlink. This is a beautiful example of how
|
|||
|
you can do a lot even if the directory isn't ALL access, anyway
|
|||
|
heres the good part...... What the anet command does is dial a
|
|||
|
phone number out from the primos and connects to it!! Yes, this
|
|||
|
is like a code (but used for data communications of course). I'm
|
|||
|
still hacking the command, but basically you just type 'anet -
|
|||
|
<phone number>' and you have it. I have only tried it on this one
|
|||
|
system which is Primos version 22.1. This is a very exciting
|
|||
|
command, so if you find any more things about it please contact
|
|||
|
me.
|
|||
|
|
|||
|
|
|||
|
HACKING DECs
|
|||
|
Welcome to basics of hacking: DECs. In this article you will
|
|||
|
learn how to log in to dec's, logging out, and all the fun stuff
|
|||
|
to do in-between. All of this information is based on a standard
|
|||
|
dec system. Since there are dec system s 10 and 20, and we favor,
|
|||
|
the dec 20, there will be more info on them in this article. It
|
|||
|
just so happens that the dec 20 is also the more common of the
|
|||
|
two, and is used by much more interesting people (if you know
|
|||
|
what we mean...) Ok , the first thing you want to do when you are
|
|||
|
receiving carrier from a dec system is to find out the format of
|
|||
|
login names. You can do this by looking at who is on the system.
|
|||
|
Dec=> @ (the 'exec' level prompt) you=> sy sy is short for
|
|||
|
sy(stat) and shows you the system status. You should see the
|
|||
|
format of login names... A systat usually comes up in this form:
|
|||
|
job line program user job: the job number (not important unless
|
|||
|
you want to log them off later) line: what line they are on (used
|
|||
|
to talk to them...) These are both two or three digit numbers.
|
|||
|
Program: what program are they running under? If it says 'exec'
|
|||
|
they aren't doing anything at all... User: ahhhahhhh! This is the
|
|||
|
user name they are logged in under... Copy the format, and hack
|
|||
|
yourself out a working code... Login format is as such: dec=> @
|
|||
|
you=> login username pass word username is the username in the
|
|||
|
format you saw above in the systat. After you hit the space after
|
|||
|
your username, it will stop echoing characters back to your
|
|||
|
screen. This is the password you are typing in... Remember ,
|
|||
|
people usually use their name, their dog's name, the name of a
|
|||
|
favorite character in a book, or something like this. A few
|
|||
|
clever people have it setto a key cluster (qwerty or asdfg).
|
|||
|
Pw's can be from 1 to 8 characters long, anything after that is
|
|||
|
ignored. You are finally in... It would be nice to have a little
|
|||
|
help, wouldn't it?
|
|||
|
|
|||
|
|
|||
|
CRASHING BBSs
|
|||
|
Fundamentals:
|
|||
|
1) Never use YOUR account.. always go under JOHN DOE or some
|
|||
|
lamer's password you figured out.
|
|||
|
2) Never brag. It gets you in trouble. Tell some dudes in your
|
|||
|
group or whatever but don't go posting on BBSs that you did it
|
|||
|
unless the sysop doesn't really care (usually elite sysops
|
|||
|
don't)
|
|||
|
3) Always format. If you get in to dos, don't take the risk,
|
|||
|
format the thing with out a boot sector. If you are going to JUST
|
|||
|
use the format command be sure to corrupt and rename ALL the
|
|||
|
files that might have records in them of you in his dos (in case
|
|||
|
of a unformat command). Try low level formatting. De command:
|
|||
|
g=c800:5 that calls up the low level format program. 4) Never
|
|||
|
mess with a narc/fed. There ARE police boards and the like and it
|
|||
|
just isn't worth it to mess with them. Don't be stupid.
|
|||
|
5) Have class. The biggest thing to bear in mind is to do a good
|
|||
|
job, or no job. If you really don't hate him, once you get into
|
|||
|
his dos just add a line to his autoexec.bat file to show you got
|
|||
|
in. Otherwise format it. 6) Don't call back. You never know if he
|
|||
|
was keeping double logs in a hidden directory or some thing like
|
|||
|
that. Just be damn sure never to call back and NEVER leave a
|
|||
|
number.
|
|||
|
7) Never delete. Never delete log files, always corrupt them by
|
|||
|
ripping a few lines out with edlin and then rename them and
|
|||
|
delete them. This, hopefully, will solve the undelete problem.
|
|||
|
Another good thing to do is to start madly undoing zip files
|
|||
|
after you delete something. This will also help the undelete
|
|||
|
dilemma.
|
|||
|
|
|||
|
SLBBS:
|
|||
|
|
|||
|
The first thing you should do when in dos is to run config and
|
|||
|
find out what his activity log file name is and where his data
|
|||
|
files REALLY are. Use edlin or something and totally screw them
|
|||
|
over so they are screwed and them rename them and delete them.
|
|||
|
The most important ones are ACTIVITY.LOG, SYSTEM.BBS, INDEX.BBS,
|
|||
|
LOG.BBS
|
|||
|
|
|||
|
Most of these files can be used to figure out who you are.
|
|||
|
Another wise thing to do is to look in his EVENT.DEF file and see
|
|||
|
if he copies the files to a backup directory. Check all batch
|
|||
|
files that the sysop may run out of EVENT.DEF. They also might
|
|||
|
have backup in them. I, being the clever thing I am, back up my
|
|||
|
logs to a tape backup after every call. Many sysops use Return
|
|||
|
to dos after logoff and a program called GODOS to run a batch
|
|||
|
after every call. Check his config to see if go to dos after
|
|||
|
logoff is set to yes. If so look for batch files or com files
|
|||
|
that look like they may be run to start the bbs. If he has a tape
|
|||
|
backup you have to find his tape software and run it (the
|
|||
|
directory name will be in his EVENT.DEF file if he backs up
|
|||
|
regularly). Once you are in the tape software you have to format
|
|||
|
the tape, however this will take a LOOOOOONG time (1 to 2 hours)
|
|||
|
so you may want to do that last. You want to do pretty much the
|
|||
|
same thing but the *.BBS files will be *.SL2. Pretty easy.
|
|||
|
|
|||
|
After Shock 1.23:
|
|||
|
|
|||
|
After Shock is kind of annoying. The best thing to do is to run
|
|||
|
his config program t find out what his directories REALLY are
|
|||
|
and then delete everything in his board and after shock main
|
|||
|
directory. Remember to look at his RUN.BAT or what ever he uses
|
|||
|
to run the bbs with, he may be keeping backups. There is also a
|
|||
|
config option of what batch file to run every night. That also
|
|||
|
may have back up info in it.
|
|||
|
|
|||
|
Telegard:
|
|||
|
|
|||
|
All the data files will probably be in the main bbs directory
|
|||
|
or the GOFILES directory (check config for sure). Get rid of
|
|||
|
these and that will be about it.
|
|||
|
|
|||
|
Forum Hacks:
|
|||
|
|
|||
|
A lot of BBS programs have been written by altering the source
|
|||
|
code of TG or another BBS program. The best thing to do with
|
|||
|
these is to run the config programs and find the REAL directory
|
|||
|
names then mess them up and delete everything in them.CRASHING BBS's PART TWO
|
|||
|
|
|||
|
Table of Contents:
|
|||
|
|
|||
|
Section I : Crashing Emulex/2 & Forum Hacks
|
|||
|
a: Emulex/2
|
|||
|
b: Forum Hacks
|
|||
|
Section II: Crashing WWIV & Telegard
|
|||
|
a: WWIV
|
|||
|
b: Telegard
|
|||
|
|
|||
|
Section Ia: Emulex/2
|
|||
|
|
|||
|
We'll start with one of the most known BBS softwares. Emulex/2.
|
|||
|
As you all know, I, Tripin Face, stole the source code of
|
|||
|
Emulex/2 last year from one of the programmers. Broke into his
|
|||
|
house and grabbed a few diskettes and it just so happens that one
|
|||
|
of the disks contained the source code to Emulex/2!!
|
|||
|
|
|||
|
Here are a few ways to access into Emulex/2 (or any Forum Clone
|
|||
|
for that matter.. a list of Forum Clones will be shown later.)
|
|||
|
|
|||
|
When you get connected at the Matrix Menu, hack User ID #1. Of
|
|||
|
course, its the Sysop Account. Always try the Password "Sysop",
|
|||
|
some Sysops are SOO lame, you wouldn't believe it. If that
|
|||
|
doesn't work, try anything that goes with the Sysop's handle...
|
|||
|
But for the really stupid Sysops, the best way, is to get one of
|
|||
|
his Passwords from another board and try that. Some lusers might
|
|||
|
use the same Password. Also, if you don't hack the correct
|
|||
|
password, don't hang up, wait for it to hang you up. Sometimes
|
|||
|
the board hangup strings gets screwed and it doesn't get rid of
|
|||
|
you, but lets you on the board with the account of the user you
|
|||
|
attempted to hack! Ok, lets say you have a Sysop account. now,
|
|||
|
the best thing to do is get a file on the board called "USERS."
|
|||
|
Now, with Emulex/2, thanks to me, you can't add users, so what
|
|||
|
you have to do is user edit each user by hand, and the view their
|
|||
|
passwords and make sure you capture all of it. Now, lets get to
|
|||
|
the crashing part. Hehehehe. Open a door,("P" from the Main Menu
|
|||
|
and then "%" for Sysop Commands) and put any file for it, the
|
|||
|
board will create any file you ask it to make. Now in the door
|
|||
|
batch file, you must have the following commands:
|
|||
|
|
|||
|
Ctty comX
|
|||
|
command
|
|||
|
|
|||
|
Now, comX, is the com port the bbs is set at. Now, if you know
|
|||
|
the sysop is using com2, then put com2. DUH!!!. (Replace the "X"
|
|||
|
with the Com Port #) Now this door should let you go to their
|
|||
|
DOS, and the rest is easy. FORMAT ME PLEASE!. Or, run a virus or
|
|||
|
a trojan.. Even a baby can do that.. If you can get an account,
|
|||
|
but has no Sysop access. you can do many things. An easy way is
|
|||
|
upload a file called "USERS. " with the following DSZ commands:
|
|||
|
DSZ sz -fs \<dir>\<filename>
|
|||
|
make sure you are in the DIR you want to upload to. What this
|
|||
|
does is upload a file anywhere on the HD you want. Now, before
|
|||
|
you do this you must edit the users file and change the sysops
|
|||
|
password to anything you want and then you can enter it and get
|
|||
|
on as him! This way, you can crash the board but you don't need
|
|||
|
to get all the users passwords. Also, a way to do this and get
|
|||
|
all the users passwords is get the BBS software's config, and the
|
|||
|
change the co-sysop level to like Level 1 or something and then
|
|||
|
you can call with your account and have sysop access. I found
|
|||
|
that the best way to crash a board... Now, with old Emulex/2
|
|||
|
there was a command for Net-Mail which was .. Shift 1 thru shift
|
|||
|
0 ..like this -> !@#$%^&*() ..and with this command, the board
|
|||
|
will receive any file. So you can use the DSZ on it. Works good,
|
|||
|
but with the new Emulex/2 you set the Net-Mail command from the
|
|||
|
config. Right now, in the new Emulex/2 there are only a few
|
|||
|
backdoors. Sam Brown didn't want to add any more. Why, I don't
|
|||
|
know. I think Emulex/2 has a upload a message command, you can
|
|||
|
also use the DSZ command with that too. I am not sure though.. A
|
|||
|
good way to hang a Emulex/2 board is go to the Database Area, if
|
|||
|
there isn't one, keep on hitting "D", after a few times the board
|
|||
|
will get screwed, you wont be able to tell unless you go the file
|
|||
|
area, and it will say something like I/O errors, etc... then
|
|||
|
upload and upload, and in the middle of the third or fourth
|
|||
|
upload hang up, turn off the modem or pull the phone line out of
|
|||
|
the wall, so it will hang on in the middle of the transfer.
|
|||
|
Another way to hang Emulex/2 is by doing this: post a message,
|
|||
|
and then edit a line, and insert a new line, but keep on hitting
|
|||
|
anything until it gets to the last line. Then hang up, or try to
|
|||
|
save. It should of hung, to make sure the hanging was cool, call
|
|||
|
the board back and see. Section Ib: Forum Clones
|
|||
|
|
|||
|
Now lets get to other software...
|
|||
|
|
|||
|
Well, all FORUM CLONES are the same.. so all commands for Em/2
|
|||
|
should and will work for all the of the following BBS Softwares:
|
|||
|
|
|||
|
Emulex/2
|
|||
|
LSD
|
|||
|
Celerity
|
|||
|
FCP all version
|
|||
|
AfterShock
|
|||
|
Monarch
|
|||
|
Monarch/2
|
|||
|
TCS 1 and 2
|
|||
|
Havok
|
|||
|
Forum Plus
|
|||
|
ACS
|
|||
|
UCI/Forum
|
|||
|
Ghost Ship/2
|
|||
|
USSR
|
|||
|
Magnum
|
|||
|
TCS/Cobra
|
|||
|
Silicosis
|
|||
|
|
|||
|
Section IIa: WWIV BBS's
|
|||
|
|
|||
|
1) Hacking into WWIV - The Utilities Needed.
|
|||
|
PkZip/PkUnZip
|
|||
|
Zmodem (Or Any Other Protocol)
|
|||
|
An Account at the WWIV BBS you wish to Crash.
|
|||
|
A Terminal Program
|
|||
|
2) Hacking into WWIV - First Steps
|
|||
|
First of all, you might want to make a separate directory
|
|||
|
for all of these files you're about to make. Although there
|
|||
|
won't be that many total, it might still be a good idea. But if
|
|||
|
you're like normal people (Messy), like me, just put it wherever.
|
|||
|
|
|||
|
Ok, Here's what you do. Make a text file called
|
|||
|
PKUNZIP.BAT from your DOS, and put the line: command in it. This
|
|||
|
is done like this: C:\HACKBBS> copy con pkunzip.bat
|
|||
|
command
|
|||
|
^Z (Press Ctrl-Z, Then Enter, and the file will save)
|
|||
|
|
|||
|
Second, go ahead and zip the file. Make it any filename
|
|||
|
you want as long as it's not something too obvious (like
|
|||
|
TEMP.ZIP). You can zip up the file with PKZIP.EXE. This is done
|
|||
|
like this:
|
|||
|
PKZIP [zipfile] [athname\filename.ext]
|
|||
|
- or in other words:
|
|||
|
PKZIP temp.zip pkunzip.bat
|
|||
|
|
|||
|
This will make a file called TEMP.ZIP with the file
|
|||
|
pkunzip.bat in it. Go ahead and delete pkunzip.bat now, you
|
|||
|
won't need it anymore. Now you've got the file temp.zip (or
|
|||
|
whatever you called it). Go ahead and logon to your favorite WWIV
|
|||
|
BBS.
|
|||
|
|
|||
|
Hacking into WWIV - The Way To Do It.
|
|||
|
|
|||
|
Go ahead and logon with your name and password, etc.
|
|||
|
Go to the File section, and upload your file to any directory.
|
|||
|
Now there is a temp file there. hit 'E' from the Transfer Menu
|
|||
|
in the current directory that temp.zip is it, and when it asks
|
|||
|
what file to extract, enter temp.zip as the filename. You'll
|
|||
|
get something to the effect of:
|
|||
|
Extract which file? (?=list, *=All files):
|
|||
|
Hit '*'. What this just did is make a pkunzip in the current
|
|||
|
working DOS directory. You'll be at the:
|
|||
|
Extract which file? (?=list, *=All Files):
|
|||
|
Hot the asterix (*) again.
|
|||
|
|
|||
|
Congratulations! You made it into the Sysops DOS! (If
|
|||
|
not, the sysop is smarter than you think, and he's protected
|
|||
|
himself against some little hackers like yourself!) Not much you
|
|||
|
can do if you didn't make it here. Hacking into WWIV - What to do while in DOS.
|
|||
|
|
|||
|
You'll be in the path of \WWIV\TEMP>, Immediately type this
|
|||
|
in: C:\WWIV\TEMP> cd ..\files
|
|||
|
C:\WWIV\FILES> del *.log - This deletes the log of what
|
|||
|
you did. C:\WWIV\FILES> del laston.txt - this deletes the
|
|||
|
list of users who were on today.
|
|||
|
Now, you're into his/her DOS. Since dos interrupts are
|
|||
|
currently ON, You can type anything anywhere. You can type del
|
|||
|
*.* and get the Are you sure? (Y/N) sign, and from there, you
|
|||
|
CAN hit 'Y'. Or you can do it the other way, and just type echo
|
|||
|
y|del *.*. From here you got his userlist and some other fun
|
|||
|
stuff, which is located in C:\WWIV\DATA. You can go there by
|
|||
|
typing cd..\data. once there, do this:
|
|||
|
C:\WWIV\DATA> type user.lst
|
|||
|
and you'll find the Sysops Phone Number and password right next
|
|||
|
to each other. Write those down. Next, type cd.. and you'll be
|
|||
|
in C:\WWIV>. From there, type the file status.dat, and the first
|
|||
|
legible text you can find will be the System Password, so if you
|
|||
|
just want to scare the living hell out of him, just type exit
|
|||
|
from there and you'll come back to the BBS, with the Sysops Name,
|
|||
|
Pass, Phone Number and System Password. You can now logon under
|
|||
|
the Sysop and do all the cool stuff like go into UEDIT and give
|
|||
|
yourself like 254sl and DSL, etc.
|
|||
|
|
|||
|
Hacking into WWIV - Alternatives
|
|||
|
|
|||
|
Instead of the PKUNZIP.BAT file in the TEMP.ZIP file, go ahead
|
|||
|
and put your favorite Virus/Trojan in there, and follow the same
|
|||
|
exact steps, except this time skip the DOS part. The Virus should
|
|||
|
spread from there, and a trojan will work immediately.
|
|||
|
|
|||
|
Hanging WWIV - The easiest thing to do in the world.
|
|||
|
|
|||
|
Just make a plain and simple text file, and in it include an
|
|||
|
ANSI code. Not just any ANSI Code, it's gotta be an ANSI Code
|
|||
|
that is not a real part of ANSI. For example, (ESCAPE
|
|||
|
CODE)[349857m or something like that, anyway. Then just //UPLOAD
|
|||
|
it to a message base, and read it. When WWIV Doesn't intercept
|
|||
|
the correct ANSI Codes, it doesn't know what to do, so it'll just
|
|||
|
hang itself there 'till the System Operator comes and resets the
|
|||
|
flippin' computer. Hang up from there, and well, it'll be down. Section IIb: Telegard BBSs
|
|||
|
|
|||
|
All right, Swabbies. Here's a way to hack into Telegard (One
|
|||
|
of the easiest to hack into - Next to WWIV). There's a catch to
|
|||
|
this system, tho. There's got to be an Archive Menu from the File
|
|||
|
Area. Most new Telegard systems will have one, it comes stock
|
|||
|
into it. But the Sysop (Probably not if the Sysop is a new Sysop)
|
|||
|
may take it out. So, if he's got it, you're in luck. It's
|
|||
|
basically the same idea, Just follow these rules and other
|
|||
|
guidelines, etc., and you'll soon become a better crasher than
|
|||
|
you know ...
|
|||
|
|
|||
|
Hacking into Telegard's DOS - Things Needed
|
|||
|
Latest PkZip Utilities (c) PKWare
|
|||
|
Terminal, Modem, Computer, etc.
|
|||
|
A little knowledge of the use of DOS,
|
|||
|
And a text file like this.
|
|||
|
|
|||
|
Hacking into Telegard's DOS - Steps
|
|||
|
|
|||
|
1) Logging on.
|
|||
|
2) Finding your way.
|
|||
|
3) Uploading/Extracting the File
|
|||
|
4) What to do while in DOS.
|
|||
|
|
|||
|
First of all, You've got to establish an account with the so-
|
|||
|
called 'friendly BBS' that you want to crash. It's probably a
|
|||
|
good idea to logon with a fake account, fake information, etc.,
|
|||
|
to protect yourself. Once you've logged on, try and talk to th
|
|||
|
Sysop there. Try to social engineer your way into him validating
|
|||
|
you with the highest possible access you can get. Be nice, offer
|
|||
|
him stuff, basically, KISS HIS ASS. If he insists on Voice
|
|||
|
Validating you, ask him just to pick up a phone at his end, and
|
|||
|
you do the same (Pick up your phone), and you'll already be
|
|||
|
connected so there should be no numbers dialing, and this will
|
|||
|
obviously protect you.
|
|||
|
|
|||
|
Make the PKUNZIP.BAT file from DOS, by typing in this:
|
|||
|
copy con pkunzip.bat
|
|||
|
command
|
|||
|
^Z
|
|||
|
|
|||
|
Go and zip the file up, call it something that sounds catchy, so
|
|||
|
it doesn't look too inconspicuous, use the line:
|
|||
|
pkzip myfile.zip pkunzip.bat
|
|||
|
|
|||
|
Now you have a myfile.zip with pkunzip.bat inside of it.
|
|||
|
There's a way to get into the Telegard's File System, although
|
|||
|
you may not haveaccess to it, you'll eventually get it if you
|
|||
|
kiss the Sysop's ass for awhile. It's usually 'F' or 'T' from the
|
|||
|
main menu. Once you're in there, upload a file to wherever it
|
|||
|
tells you to, and if there's no certain directory, don't worry
|
|||
|
about it. Just upload it. After you finish uploading the file, it
|
|||
|
will kick you out to the transfer menu again. The Archive menu
|
|||
|
from there is usually either '/A' or just 'A'. From there, you
|
|||
|
will most likely get a prompt that is similar to the Transfer
|
|||
|
prompt, (most likely containing the Area and Area Number that you
|
|||
|
are currently in). Hit 'X' from there (Remember: Telegard has the
|
|||
|
ability to change Command Letters, so if 'X' doesn't work, punch
|
|||
|
in a '?' and look for Extract File). Extract the myfile.zip,
|
|||
|
obviously extract *.*. If it kicks you back out, or whatever,
|
|||
|
just go back into the menu and do the same thing over again.
|
|||
|
Extract *.*, And this time it will run Pkunzip.bat, which
|
|||
|
contains COMMAND.COM inside of it, and you'll have full access to
|
|||
|
this guys DOS.
|
|||
|
|
|||
|
Now that you're in DOS, you'll be in the area C:\BBS\TEMP>. From
|
|||
|
there, type in 'cd ..\files'. Then 'del *.log', 'del *.txt', then
|
|||
|
do the same thing in the Afiles Directory. Here's a type of basic
|
|||
|
structure that Telegard uses. (Assuming the main dir is BBS):
|
|||
|
|
|||
|
BBS
|
|||
|
FILES
|
|||
|
AFILES
|
|||
|
TFILES
|
|||
|
TEMP
|
|||
|
1
|
|||
|
2
|
|||
|
3
|
|||
|
DLS
|
|||
|
TRAP
|
|||
|
This is the basic format, del ALL *.log files from all of these
|
|||
|
areas (The Sysop logs are kept in C:\BBS\TRAP>) You've now gotten
|
|||
|
rid of all proof that you were ever on. Once in there, just do
|
|||
|
whatever you'd like to do. Delete everything, run a few Virii,
|
|||
|
execute a few trojans, give his computer herpes, or whatever. You
|
|||
|
can simply exit by typing 'exit'. Another way is to upload a Game
|
|||
|
or some file (Sysops never check the zip file to see what is in
|
|||
|
it..) Make one of the files 'PKZIP.COM' or 'PKZIP.EXE' *.COM is
|
|||
|
better because DOS runs COM files before EXE files. Anyway,
|
|||
|
upload a PKZIP.COM that is a trojan or a virus, or even
|
|||
|
COMMAND.COM (That will get you into DOS) and after you upload it
|
|||
|
check and see if the file is 'Auto-Validated' if it isn't then
|
|||
|
you have to wait until the Sysop Validates it.. otherwise if it
|
|||
|
is Validated then type "/A" from the File Menu and then type "X"
|
|||
|
or "E" for Extract ZIP File.. then it prompts you for the Zip
|
|||
|
File, enter in the Fle you uploaded. Then it will ask you what
|
|||
|
files to extract, just say all or just the PKZIP file.. When it
|
|||
|
extracts it, type "Q" then type "W" for Work on Archive.. Then
|
|||
|
you are at the 'Work on Archive Menu'. Type "A" for Add to
|
|||
|
Archive, it will then proceed to ask you for a Archive Name,...
|
|||
|
type in something like 'HACK.ZIP' or anything for that matter. It
|
|||
|
will ask you for the files you want in the ZIP file, just do
|
|||
|
'*.*'. Then it will ask you if you want to do it or add more
|
|||
|
files, type "D" for 'Do It'. It will then run your "PKZIP.EXE" or
|
|||
|
"PKZIP.COM"!!! Easy enough?? There are a bunch of great files you
|
|||
|
can find in someone else's HD, try going to the Sysop Dir.
|
|||
|
(C:\BBS\DLS\SYSOP) or just go to all the Directories right off
|
|||
|
the root directory. After you are done having fun, take his/her
|
|||
|
USER.LST & STATUS.DAT and you will have FOREVER Access.. or just
|
|||
|
wipe out his drive! There are many more ways to access Telegard
|
|||
|
DOS and have the System run what you upload, but I will not get
|
|||
|
into that, I will leave some ways open for me, Captain
|
|||
|
Swashbuckler, to crash those Telegard Boards!
|
|||
|
|
|||
|
|
|||
|
CREDIT BUREAUS
|
|||
|
Part One: What Is Credit Bureau, Incorporated?
|
|||
|
|
|||
|
As many of you know, CBI is a credit reporting agency, or
|
|||
|
credit bureau. It keeps the credit history of millions of
|
|||
|
Americans on file. Our friends at CBI have been kind enough to
|
|||
|
make this information available to the public for a moderate
|
|||
|
annual fee. If you are cheap, or if you just want to learn how to
|
|||
|
hack CBI, "you have come to the right place."
|
|||
|
|
|||
|
|
|||
|
Part Two: The CBI Account.
|
|||
|
|
|||
|
A CBI account follows this general format:
|
|||
|
3 Numbers, 2 Letters, 2-5 Numbers, a dash{-}, followed by a
|
|||
|
letter and a number.
|
|||
|
|
|||
|
A sample might look like this: 123ab4567-a1.
|
|||
|
or: 123ab4567-a1,bc,d.
|
|||
|
|
|||
|
Either way is acceptable. The `bc,d' is not necessary.
|
|||
|
|
|||
|
Part Three: Connecting To CBI.
|
|||
|
|
|||
|
When calling CBI, I suggest you use at least one outdial if
|
|||
|
you know for sure the account you have is valid. If you are going
|
|||
|
to be hacking accounts, use at least three outdials. I don't
|
|||
|
suggest calling direct, even if the dialup is local to you. If
|
|||
|
you don't know why, you don't deserve to be reading this text.
|
|||
|
CBI runs at either 300 baud, or that oh-so-technologically
|
|||
|
advanced 1200 baud. This means you will need a 300 or 1200 baud
|
|||
|
outdial for the NPA containing the CBI dialup. Make sure your
|
|||
|
terminal program is set at E-7-1. I also find it easier to work
|
|||
|
at half-duplex, because CBI does not echo a thing you type. So,
|
|||
|
if you connect with full-duplex, and don't see your account
|
|||
|
appearing on the screen, don't call your local P/H BBS and post
|
|||
|
twenty messages saying, "N0thInG i tYpE aPPeArS 0n tHe sCrEEn aT
|
|||
|
CbI!!!!!!!!!!!1!!1!1!!!!!!!!!!!!111!!!!!!!!!!!" (Note: the
|
|||
|
exorbitant amount of exclamation points is a sign of the loser's
|
|||
|
complete and utter idiocy.) Another thing I find useful is just
|
|||
|
to have my capture log running as I work. This saves you the
|
|||
|
trouble of having to write everything down, and it also serves as
|
|||
|
a good reference.
|
|||
|
|
|||
|
|
|||
|
Currently functioning CBI dialups are:
|
|||
|
|
|||
|
*[201/984-6297] Newark, New Jersey
|
|||
|
*[503/226-1070] Portland, Oregon
|
|||
|
[612/341-0023] Minneapolis/St. Paul, Minnesota
|
|||
|
[713/591-8100] Houston, Texas
|
|||
|
*[804/466-1619] Norfolk, Virginia
|
|||
|
[916/635-3935] Sacramento, California
|
|||
|
|
|||
|
The starred numbers I have not verified.
|
|||
|
|
|||
|
Keep in mind some CBI accounts are only valid on certain
|
|||
|
dialups. They still serve any part of the country, you just can't
|
|||
|
use them on every dialup. I have found CBI accounts that work on
|
|||
|
more than one dialup, so it can't hurt for you to try. The worst
|
|||
|
thing you will get is a message saying it's NOT VALID ON THIS
|
|||
|
PHONE NUMBER or something. If you are hacking accounts and get
|
|||
|
this message, try the account that yields the message on
|
|||
|
different dialups. Maybe you'll "get lucky".
|
|||
|
|
|||
|
CBI also has voice dialups. These numers are provided for
|
|||
|
those "Social Engineers" out there. I have not verified these.
|
|||
|
|
|||
|
[201/842-7500] Newark, New Jersey (Equifax Credit
|
|||
|
Information Services) [617/932-8163] Boston,
|
|||
|
Massachusetts (CBI)
|
|||
|
|
|||
|
|
|||
|
Part Four: Applied Password Use: Pulling Info.
|
|||
|
|
|||
|
Use is fairly straightforward. When you connect to CBI, hit
|
|||
|
Control-S (^S) twice, then <RETURN> (<CR>) twice. You should get
|
|||
|
a message that reads: (ND)PLEASE SIGN-ON
|
|||
|
|
|||
|
At this point you should enter the password. Make sure when
|
|||
|
you enter the password that you include a period at the end.
|
|||
|
This is very important; if you neglect to type the period, you
|
|||
|
won't get in. Type the password: "123ab456-a1." then hit
|
|||
|
CONTROL-S, and a <CARRIAGE RETURN>. The ^S is the CBI "wakeup"
|
|||
|
command. CBI doesn't respond to regular <CR>s. If you ever
|
|||
|
think CBI should be doing something, and it has just frozen, hit
|
|||
|
^S. Chances are this will solve the problem. Anyway, you will
|
|||
|
then get a message telling you to
|
|||
|
|
|||
|
WC5E - PROCEED
|
|||
|
|
|||
|
This is when the fun begins. You decide you want to know
|
|||
|
your next door neighbor's credit history. Here is what you do:
|
|||
|
|
|||
|
NM-SMITH,ALAN,S. <CR>
|
|||
|
CA-157,MAPLE,ST,YUTZVILLE,NY,10011. <CR>
|
|||
|
ID-SSS-012-34-5678. ^S <CR>
|
|||
|
|
|||
|
This is, of course, based on the assumption that your
|
|||
|
subject's name is "Alan S. Smith" and that he lives at 157 Maple
|
|||
|
Street in Yutzville, New York, 10011, and that his Social
|
|||
|
Security Number is 012-34-5678. Keep in mind, the ID-SSS line is
|
|||
|
not ecessary, but it is necessary if you are to distinguish
|
|||
|
between Alan S. Smith, Jr. and Alan S. Smith, Sr. Wait a moment.
|
|||
|
The report will pop up. You may want to hunt someone down from
|
|||
|
a Post Office Box. If this is the case, replace the above CA-
|
|||
|
line with this:
|
|||
|
|
|||
|
CA-418#,POB,,YUTZVILLE,NY,10011.
|
|||
|
|
|||
|
If you only have the subject's Social Security Number, type
|
|||
|
|
|||
|
DTEC-012-34-5678. ^S <CR>
|
|||
|
|
|||
|
This will give you a name and address to enter in the above
|
|||
|
format.
|
|||
|
|
|||
|
|
|||
|
Part Five: A Sample CBI Report.
|
|||
|
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
S A M P L E C B I R E P O R T
|
|||
|
Note: All information in this report is fictional, including
|
|||
|
the ACCOUNT NOs and the BUS/ID CODEs.
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
|
|||
|
*SMITH,ALAN,S SINCE 04/00/75 FAD 10/21/89 FN-700
|
|||
|
157,MAPLE,ST,YUTZVILLE,NY,10011,TAPE RPTD 10/89
|
|||
|
68,PENN,ST,NOWHERE,IA,50055
|
|||
|
SEX-M,MAR-M,DEPS- 2,AGE-38,SSS-012-34-5678
|
|||
|
01 ES-WALMART CORP
|
|||
|
02 EF-MCDONALDS RESTAURANTS
|
|||
|
|
|||
|
*SUM-01/85-01/91,PR/OI-NO,FB-NO, ACCTS:11,HC$6-1600, 3-ONES.
|
|||
|
|
|||
|
*INQS-450DC81 02/24/89,178BB20089 02/06/89.
|
|||
|
|
|||
|
* BUS/ID CODE RPTD OPND H/C TRMS BAL P/D RT 30/60/90+MR
|
|||
|
DLA/ACCOUNT NO
|
|||
|
03 S*178BB34860 11/90 05/85 500 171 521 139 R5 01 01 01 66
|
|||
|
1234567890123456
|
|||
|
PREV HI RATES: R4 10/90, R3 09/90, R2 08/90
|
|||
|
CLOSED ACCOUNT
|
|||
|
AMOUNT IN H/C COLUMN IS CREDIT LIMIT
|
|||
|
04 I*178CD8712 10/90 03/89 123 123 123 O1
|
|||
|
003/88 048286423 05 I*342IH34 10/90 12/85 1600 500 1600
|
|||
|
R9 00 00 03 462642892 PREV HI RATES: R5
|
|||
|
11/88, R5 10/88, R5 09/88
|
|||
|
CHARGED OFF ACCOUNT
|
|||
|
AMOUNT IN H/C COLUMN IS CREDIT LIMIT
|
|||
|
06 I*905PZ82 11/90 12/86 700 0 390 R9 00 00 00 16
|
|||
|
3482684629331 PREV HI RATES: R9 03/89, R9 02/89, R9
|
|||
|
01/89 CHARGED OFF ACCOUNT
|
|||
|
AMOUNT IN H/C
|
|||
|
COLUMN IS CREDIT LIMIT 07
|
|||
|
U*178BQ282 10/90 01/85 231 231 R9 00 00 03
|
|||
|
4560337134046711 PREV HI RATES: R5 04/90, R5 03/90,
|
|||
|
R4 02/90 CHARGED OFF ACCOUNT
|
|||
|
08 I*956BB115 10/90 05/86 1100 0 R9 00 00 03
|
|||
|
714827012 PREV HI RATES: R5 05/90, R5 04/90, R5
|
|||
|
07/89 CLOED ACCOUNT
|
|||
|
09 I*178AC10870 07/90 05/87 123 123 123 123 R9
|
|||
|
38812604654 CHARGED OFF ACCOUNT
|
|||
|
10 A*906OC69 01/90 10/87 0 O5 00 00 01 09
|
|||
|
01/90 4906124373 PREV HI RATES: O5 04/89.
|
|||
|
COLLECTION ACCOUNT
|
|||
|
PAID-CREDIT LINE
|
|||
|
CLOSED 11
|
|||
|
I*906OF259 12/89 11/87 6 6 6 O9 00 00 02
|
|||
|
3724962236703 PREV HI RATES: O5 11/89, O5 10/89, O9
|
|||
|
02/89
|
|||
|
12 I*416DC1577 11/88 11/87 300 R1 00 00 00 12
|
|||
|
32134882735921 SETTLEMENT ACCEPTED ON THIS ACCOUNT
|
|||
|
CHARGE
|
|||
|
13 I*421DC4566 07/89
|
|||
|
10/87 401 390 372 R9 00 00 01 18736847728634
|
|||
|
PREV HI RATES: R9 02/89, R9 01/89, R5 12/88
|
|||
|
CHARGED OFF ACCOUNT
|
|||
|
CHARGE
|
|||
|
|
|||
|
|
|||
|
&
|
|||
|
END OF REPORT CBI AND AFFILIATES - 01/30/91
|
|||
|
SAFESCANNED
|
|||
|
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
E N D S A M P L E C B I R E P O R T
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
S A M P L E D T E C R E P O R T
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
M1 OF 1 NM-SMITH,ALAN,S
|
|||
|
CA-157,MAPLE,ST,YUTZVILLE,NY,10011,10/89
|
|||
|
FA-68,PENN,ST,NOWHERE,IA,50055 ES-WALMART CORP
|
|||
|
SS-012-34-5678 AGE 38&
|
|||
|
|
|||
|
END OF REPORT CBI AND AFFILIATES - 01/30/91
|
|||
|
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
E N D S A M P L E D T E C R E P O R T
|
|||
|
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
|
|||
|
|
|||
|
|
|||
|
Part Six: Making Sense Out of All That.
|
|||
|
SMITH,ALAN,S - is the subject's last name, first name, and
|
|||
|
middle initial. SINCE 04/00/75 - I imagine this is how long
|
|||
|
they've had a file on the subject. (Since April, 1975). On the
|
|||
|
next line is his address- his current address is listed first,
|
|||
|
and his past addresses are listed underneath.
|
|||
|
SEX-M is pretty self explanatory. (It indicates he is a
|
|||
|
MALE.) MAR-M is the subject's marital status (single, married,
|
|||
|
widowed, divorced).
|
|||
|
DEPS- 2 is the number of dependents the subject has. A
|
|||
|
dependant is most often a son or daughter of the subject who is
|
|||
|
still under 21. SS-012-34-5678 is the subject's Social Security
|
|||
|
Number. ES- is the subject's current employer.
|
|||
|
EF- are his past employers, listed in order, from most recent
|
|||
|
to least recent.
|
|||
|
SUM-01/85-01/91 indicates that the report is a summary from
|
|||
|
January 1985 to January 1991. This really just tells you how far
|
|||
|
back in time the report covers.
|
|||
|
PR/OI-NO - Public Record/Other Information. This indicates
|
|||
|
whether or not the subject has been involved in any court cases
|
|||
|
(Public Record), and how those cases turned out (usually that is
|
|||
|
what Other Information is.) Obviously, the NO indicates the
|
|||
|
subject has not had any legal involvement during the period which
|
|||
|
the report covers.
|
|||
|
FB-NO - Firm/Business. I assume this signifies the subject is
|
|||
|
not a business.
|
|||
|
ACCTS:11,HC$6-1600 tells you that there are 11 entries listed
|
|||
|
below, and that the credit limit (or amount loaned, in the case
|
|||
|
of a loan) ranges from $6 to $1600.
|
|||
|
3-ONES - This tells you the credit rating. The "3" indicates
|
|||
|
that there are 3 of the following type ("ONES" in this case). The
|
|||
|
more "ONES" a subject has, the better his rating. This particular
|
|||
|
person has a lousy credit rating. Out of 11 accounts, only 3 are
|
|||
|
ONES. There can also be TWOS, THREES, FOURS, et cetera, up
|
|||
|
through NINES. NINES are incredibly bad; the more of these the
|
|||
|
subject has, the worse his credit rating is. ZEROS indicate that
|
|||
|
the account was too new to be rated at the time the creditor last
|
|||
|
reported. INQS - This line tells what creditors have checked
|
|||
|
on the subject's credit. While interesting, it is more of a
|
|||
|
hassle than anything. You see, when YOU pull the subject's info,
|
|||
|
a little line will be added saying that your hacked account
|
|||
|
pulled the file. Now, this won't look funny until the subject
|
|||
|
reports fraudulent charging on his card. Then, CBI may check on
|
|||
|
who has pulled the guy's info. When they see that The First
|
|||
|
National Bank of Ethiopia has pulled his info, they will know
|
|||
|
something is up. They will probably call the First National Bank
|
|||
|
of Ethiopia and say, "Did you pull this guy's info?" And of
|
|||
|
course they'll say "No." Actually, I've made more out of this
|
|||
|
than it's worth. Anyway, the most recent credit check is listed
|
|||
|
first, and then it works backwards. It lists the ID CODE and the
|
|||
|
date the file was pulled.
|
|||
|
The next line contains the headings for the columns that fall
|
|||
|
under them. BUS/ID CODE is the CBI account (minus the
|
|||
|
password) of the creditor that holds the subject's credit card,
|
|||
|
loan, or whatever. In front of the actual ID CODE, there is a
|
|||
|
letter and an asterisk (*). The letter signifies what type of
|
|||
|
account it is. A - Authorized, C - Co-maker, I - Individual, J -
|
|||
|
Joint, S -Shared, T- Terminated, U - Undesignated. Consult your
|
|||
|
Local Library to find out what each type of account is. This
|
|||
|
isn't really relevant to what you are after.
|
|||
|
RPTD - The last time the creditor reported on the subject.
|
|||
|
OPND - tells when that account was opened.
|
|||
|
H/C - you will notice throughout the report that the "AMOUNT
|
|||
|
IN H/C COLUMN IS CREDIT LIMIT". On a loan, this column reports
|
|||
|
the amount loaned. TRMS - clarifies the terms of a loan.
|
|||
|
Usually in the case of a credit card, this column is blank. A
|
|||
|
"48M" in this column iiicates that the amount in the H/C column
|
|||
|
will be paid back over a period of 48 months, or four years. In
|
|||
|
such a case, the number in the MR column subtracted from the 48
|
|||
|
will tell you how many more months the subject has to go before
|
|||
|
paying off that loan.
|
|||
|
BAL is an abbreviation for BALANCE OWING. This is how much
|
|||
|
of the credit limit (on a credit card) has been used, or how much
|
|||
|
of the loan has been paid back. On a credit card entry, the BAL
|
|||
|
subtracted from the H/C is how much the subject is authorized to
|
|||
|
spend.
|
|||
|
P/D- Past Due. Every month, a minimum amount of money is due
|
|||
|
on your credit card payment. This may be as little as 10% of the
|
|||
|
total amount due. Now, the credit card company would be damned
|
|||
|
happy to see you only pay the minimum amount, because then they
|
|||
|
can charge interest on every thing you owe. But, if you do not
|
|||
|
pay this minimum amount (say you pay $75 out of a $100 minimum),
|
|||
|
then $25 will be PAST DUE. It isn't good to owe money. RT -
|
|||
|
Rating. This column gives the credit rating for that particular
|
|||
|
account. An 'R' means the account is a revolving or option
|
|||
|
payment plan, an 'I' means it is an installment payment plan, and
|
|||
|
an 'O' means it is an open account. Consult your library for
|
|||
|
definitions. The number following it is the credit rating for
|
|||
|
that account. Remember, a '1' is good, and a '9' is really bad.
|
|||
|
The number of '1's here should match the number "X" in "X-ONES"
|
|||
|
on the first line.
|
|||
|
30/60/90 - the number in the 30 column means that the subject
|
|||
|
has been between 30 and 59 days delinquent on his payment that
|
|||
|
many times. If a "2" is in the 60 column, this indicates that the
|
|||
|
subject has been between 60 and 89 days late with the minimum
|
|||
|
payment twice during the number of months in the MR column. A
|
|||
|
number in the 90 column would indicate that the minimum payment
|
|||
|
has been over 90 days past due "X" number of times. +MR -
|
|||
|
Months Reviewed. Indicates how many months have been reviewed.
|
|||
|
(Obviously.) Say you have a "1" in the 30 column, and a 49 in the
|
|||
|
MR column. This indicates that the subject has been 30-59 days
|
|||
|
late with the minimum payment in the past 49 months. It's not
|
|||
|
really too hard to understand.
|
|||
|
|
|||
|
DLA/ACCOUNT NO - This column contains the credit card
|
|||
|
numbers. Visa and Mastercard both have 16 digits. American
|
|||
|
Express (Amex) hs 13 digits. DLA is the Date Last Activity. If
|
|||
|
there is a date in this column, it is NOT a credit card
|
|||
|
expiration date, it is telling you the last time that account was
|
|||
|
active.
|
|||
|
PREV HI RATES - This indicates the past ratings of the
|
|||
|
account on the date listed.
|
|||
|
|
|||
|
Explanation of the DTEC report:
|
|||
|
|
|||
|
"1 of 1" means that the first report of one is being listed.
|
|||
|
Remember, no two people have the same Social Security Numbers. NM
|
|||
|
is the subject's name. CA is the subject's current address. The
|
|||
|
date at the end of this line should match the most recent date on
|
|||
|
the address line in the subject's full report. The FA line lists
|
|||
|
former addresses. The ES line lists the subject's current
|
|||
|
employer. Following this is the subject's Social Security Number,
|
|||
|
which you must have already had to get the DTEC report. And
|
|||
|
lastly, the subject's age.
|
|||
|
|
|||
|
|
|||
|
Part Seven: Practical Use of CBI.
|
|||
|
|
|||
|
You may have a question now, "Whose file do I pull?" You want
|
|||
|
to pull the file of someone who is rich. Usually Lawyers and
|
|||
|
Doctors will fit the bill. Look in the Yellow Pages under
|
|||
|
"Lawyers" and "Doctors" and find the names of some upper class
|
|||
|
bastards. You can use your local White Pages to cross-reference
|
|||
|
and get their home addresses. From here, you call CBI, and pull
|
|||
|
their file.
|
|||
|
Once you get the file, look in the DLA/ACCOUNT NO column.
|
|||
|
Find all the 13 and 16 digit numbers. 16 digit numbers starting
|
|||
|
with "4" are Visas. 16 digit numbers starting with "5" are
|
|||
|
Mastercards. 13 digit numbers starting with "37" are American
|
|||
|
Express. The first four digits of the card number signify the
|
|||
|
bank that issued the card. A list is supplied below, taken from
|
|||
|
the Narc Infofile #7, Update A. I have not done any work toward
|
|||
|
verifying these myself, either.
|
|||
|
|
|||
|
VISA
|
|||
|
----
|
|||
|
4428 Bank of Hoven
|
|||
|
4128 Citibank CV
|
|||
|
4271 Citibank PV
|
|||
|
4929 Barclay Card CV (from England)
|
|||
|
4040 Wells Fargo CV
|
|||
|
4019 Bank of America CV
|
|||
|
4024 Bank of America PV or CV
|
|||
|
4019 Bank of America Gold (This card looks like a CV but
|
|||
|
without a CV after the expiration
|
|||
|
date)
|
|||
|
4678 Home Federal
|
|||
|
4726 Wells Fargo CV
|
|||
|
4036
|
|||
|
4561
|
|||
|
4443
|
|||
|
4833
|
|||
|
4424 Security Pacific National Bank
|
|||
|
4428 Choice Visa [Citibank(Maryland)]???
|
|||
|
4070
|
|||
|
4735
|
|||
|
4673
|
|||
|
4044
|
|||
|
4050
|
|||
|
4226 Chase Manhattan Bank
|
|||
|
4605
|
|||
|
4923
|
|||
|
4820
|
|||
|
4048 CV
|
|||
|
4121 Signet Bank CV
|
|||
|
4368
|
|||
|
|
|||
|
|
|||
|
Mastercard
|
|||
|
----------
|
|||
|
5419 Bank of Hoven
|
|||
|
5410 Wells Fargo
|
|||
|
5412 Wells Fargo
|
|||
|
5273 Bank of America Gold
|
|||
|
5273 Bank of America
|
|||
|
5254 Bank of America
|
|||
|
5286 Home Federal
|
|||
|
5031 Maryland Bank of North America
|
|||
|
5326
|
|||
|
5424 Citibank
|
|||
|
5250
|
|||
|
5417
|
|||
|
5215
|
|||
|
5204
|
|||
|
5465 Chase Manhattan Bank
|
|||
|
5411
|
|||
|
5421
|
|||
|
5329 Maryland Bank of North 5308
|
|||
|
5217
|
|||
|
5415
|
|||
|
5291 Signet Bank
|
|||
|
|
|||
|
American Express
|
|||
|
----------------
|
|||
|
3728 GOLD
|
|||
|
3713 Regular
|
|||
|
3732 Regular
|
|||
|
3737
|
|||
|
3782 Small Corporate Card
|
|||
|
3731
|
|||
|
3724
|
|||
|
3742
|
|||
|
3727
|
|||
|
3787 Small Corporate Card
|
|||
|
3726
|
|||
|
3766
|
|||
|
3734
|
|||
|
3749
|
|||
|
3763
|
|||
|
3710
|
|||
|
3718
|
|||
|
3720
|
|||
|
3739
|
|||
|
|
|||
|
At this point, your rendezvous with CBI is complete. Write
|
|||
|
the credit card number you obtained, and the subject's basic info
|
|||
|
in your notebook. Destroy the CBI report you have- there's no
|
|||
|
need to have evidence sitting around.
|
|||
|
|
|||
|
|
|||
|
Part Eight: Getting the CBI account.
|
|||
|
|
|||
|
Okay kids, here's the hard part. Actually, it's not very hard
|
|||
|
at all. Just time consuming. First, you have to find an ID CODE.
|
|||
|
You know, the part of the account BEFORE the dash. Remember, the
|
|||
|
part following the dash is the password. To get the ID CODE, go
|
|||
|
trashing at a car dealership. You should find some printed out
|
|||
|
reports. On these reports (they should look like what I supplied
|
|||
|
above), you will find the "usernames" in the BUS/ID CODE column,
|
|||
|
and in the INQS line. All you have to add to this ID CODE is the
|
|||
|
password (obviously). Remember, the password is a letter and a
|
|||
|
number. So, say your ID CODE is 123ab4567. When CBI asks you to
|
|||
|
PLEASE SIGN ON, you begin hacking. Two common passwords are -c2
|
|||
|
and -c3. So, the first two things you try to enter should be
|
|||
|
"123ab4567-c2. ^S <CR>" and "123ab4567-c3. ^S <CR>". If neither
|
|||
|
of these work, start at "123ab4567-a1." and work to "123ab4567-
|
|||
|
z9." If I don't find something by the time I get hrough -d9, I
|
|||
|
will usually pick another ID CODE and start over. You can do it
|
|||
|
however you like. The lazy way to do this is hang around on
|
|||
|
QSD with the sex freaks and see if you can find someone who will
|
|||
|
trade with you. Chances are you'll get screwed, because almost
|
|||
|
everyone there is a leech. They'll either give you something
|
|||
|
fake, or nothing at all. If you want to trade, there are more
|
|||
|
trustworthy and knowledgeable people on Lucifer.
|
|||
|
|
|||
|
|
|||
|
Part Nine: ID CODEs.
|
|||
|
|
|||
|
This section is a list of ID CODEs for you to hack on. This
|
|||
|
list is taken from The Ghost's file on CBI, because I am too lazy
|
|||
|
to make up my own list.
|
|||
|
|
|||
|
426DC33 465IG14 444BB7072 906ON259 906ON267
|
|||
|
906BB5130 458ON2792 906BB206 444FP289 882AN137
|
|||
|
444FS1399 843BB342 404BB539 404DC21 496ON747
|
|||
|
496BB82 404CG94 426DC1577 401BB4880 872BB213
|
|||
|
444FS1381 728B10420 905BB587 496ON598 426BB756
|
|||
|
426BB3859 444BB3469 444BB3626 444BB5605 444FP2137
|
|||
|
906FA26 906BB115 906BB40 906FM6418 447FS844
|
|||
|
|
|||
|
906BB289 496ON291 901BB5101 906FM6335 496ON218
|
|||
|
458ON3022 402RE30375 426CG544 872BB31 872BB205
|
|||
|
444BB143 444BB6173 444FM11838 458ON3014 155ON44
|
|||
|
905ON1497 444ZB361 496ON648 444BB5654 496BB587
|
|||
|
906CG2913 444BB5704 416FM2092 444BB465 444BB5282
|
|||
|
444BB5308 444BB5290 404FF262 906FF278 906FF260
|
|||
|
404FF1039 404FF825 906FF252 426DC561 181FS320
|
|||
|
|
|||
|
444FA483 906FA34 163DC2280 444BB2719 163BB17526
|
|||
|
404HZ141 444AN1082 444ZB00577 906DC185 444DC10639
|
|||
|
906DC193 444JA591 906DC151 444DC49 405BB280
|
|||
|
801ON119 801BB2942 496BB74 496FM271 426BB238
|
|||
|
426BB541 426BB1895 426BB2406 444BB804 444BB3253
|
|||
|
444BB9466 906OC99 404BB3483 444BB1315 444FM12285
|
|||
|
805BB2492 906DC656 444FA848 444BB6173 444BB1869
|
|||
|
|
|||
|
444YC1311 444BB6363 444BB6496 444BB564 444BB3436
|
|||
|
444BB952 891BB186 496ON44 444AN2452 444CS315
|
|||
|
906DC29 444DC510 905DC3081 180BB19097 444CG377
|
|||
|
496FZ45 404TZ19 444AN4177 906DM10 403DC1426
|
|||
|
496DC319 496DC20 444KI54 606OC10587 414BB917
|
|||
|
906FA67 444FA814 444BB5035 444BB9466 444BB978
|
|||
|
444BB2248 444BB1182 444BB4491 444ON366 444ON200
|
|||
|
|
|||
|
444ON358 444ON341 404HF375 444AN4491 496FS380
|
|||
|
404BB182 155ON85 163BB19418 444ZB668 801ON1182
|
|||
|
444BB2958 444BB1331 465ZB134
|
|||
|
|
|||
|
I haven't collected these myself, so I don't know if they all are
|
|||
|
valid. File grabbing on large systems
|
|||
|
|
|||
|
Definitions:
|
|||
|
|
|||
|
Salami......Program that takes a selected amount of money from a
|
|||
|
group of specified accounts and deposits it into another account.
|
|||
|
|
|||
|
|
|||
|
Trojan......Program that does one honest function but meanwhile
|
|||
|
caries out a series of secret commands.
|
|||
|
|
|||
|
Say you are working for a company that uses a large central
|
|||
|
computer network that is slightly old. You want to get at the
|
|||
|
accounts file to make your self a salami. Most old systems have
|
|||
|
two pointers at the head of the file, a write access and a read
|
|||
|
access. The write means you can edit and delete the file while
|
|||
|
the copy mean you can only run and copy the file. Your goal is to
|
|||
|
gain write access to the accounts file. The best form of action
|
|||
|
would be to take a program everybody has read access to (data
|
|||
|
base, spreadsheet, whatever) and make a trojan out of it.
|
|||
|
Probably the spreadsheet would be the best idea since the
|
|||
|
accountant must use it a lot. The first problem you are going to
|
|||
|
have is that you are only going to have read access to the
|
|||
|
spreadsheet program because all you need to do is run it.
|
|||
|
(Business policy is to give no more access than is needed.) So
|
|||
|
you make a file and give your self read and write access to it.
|
|||
|
Then simply copy the spreadsheet file into your file. You can now
|
|||
|
edit the spreadsheet and add a feature to it (diagonal adding or
|
|||
|
something make it VERY attractive). Then you add a little trojan
|
|||
|
to the program that copies the accounts file to a file in your
|
|||
|
directory, then copies another file from your directory in place
|
|||
|
of the true accounts fie. You then give the spreadsheet program
|
|||
|
to the accountant showing him the new feature and hope to God he
|
|||
|
likes it. When he uses your spreadsheet program you will get the
|
|||
|
accounts file in your directory. You should write a program and
|
|||
|
leave it in memory so that as soon as it sees this file it copies
|
|||
|
it into the other file name so your trojan can copy the other
|
|||
|
file back the first time with out error. Once this has happened
|
|||
|
delete the TSR program and edit the accounts file as you please.
|
|||
|
You can then rename it to the file in your directory the trojan
|
|||
|
copies back and your payroll will be changed!
|
|||
|
Potpourri BUGS
|
|||
|
As far as bugs go, don't worry about not being able to obtain
them. Sure, there are some suppliers around that only sell to
|
|||
|
'Law Enforcement Agencies' only, but most will sell to you, so
|
|||
|
there is no reason to bother with social engineering yourself
|
|||
|
one. Anyway, most suppliers that will only sell to law
|
|||
|
enforcement agencies usually have their products so marked up,
|
|||
|
its unrealistic. Good bargains, and very high quality equipment
|
|||
|
can be found offered by a Japanese company called CONY. Usually
|
|||
|
their products are so reasonable that it makes the competitors
|
|||
|
cry in shame. I suggest you write to them.
|
|||
|
|
|||
|
CONY MFG CORP
|
|||
|
Rm 301 Hirooka Bldg
|
|||
|
No 59, 2 Chome
|
|||
|
Kangetsu cho
|
|||
|
Chikusa ku Nagoya
|
|||
|
464 JAPAN
|
|||
|
|
|||
|
|
|||
|
WHERE AND HOW TO STICK THEM
|
|||
|
|
|||
|
Assuming you obtain a bug, or any combination of different
|
|||
|
types of bugs, you will want to use them, for any number of
|
|||
|
particular purposes. The safest and easiest way to plant a is to
|
|||
|
send the person that you want to know better a nice gift with you
|
|||
|
know what hidden inside it. Something that they could, say, place
|
|||
|
on their desk, or display prominently in their place or work or
|
|||
|
residence. Wrap it nice, and include a small card, and do
|
|||
|
whatever you feel is appropriate. A more dangerous method is to
|
|||
|
actually obtain entry into the office or residence of the person
|
|||
|
that you want to know better. If you have success in getting in,
|
|||
|
planting it, and getting out unnoticed, then you will be safe.
|
|||
|
Once a is planted, you will leave it there even after it becomes
|
|||
|
inoperative, because, if you have placed considerable risk on
|
|||
|
yourself to plant it, you do not want to go through that risk
|
|||
|
again just to retrieve it. Just forget about it. It won't miss
|
|||
|
you. There are a number of places to hide your electronic friend:
|
|||
|
o Carefully [!] unscrew a wall socket. There, you will notice
|
|||
|
some extra, unused space inside. Figure out the rest.
|
|||
|
|
|||
|
o Do like the shows on TV. Hide them under a table, or chair. Let
|
|||
|
your imagination run wild [use good judgement]. You are
|
|||
|
relatively free, due to today's technology, and the short
|
|||
|
antennas. Pick an area that is not subject to 'search or routine
|
|||
|
cleaning'.
|
|||
|
o Dress up like a workman and show up at their house. Make up a
|
|||
|
good excuse. Gain access. Plant it.
|
|||
|
|
|||
|
UTILIZATION
|
|||
|
|
|||
|
You will want to record all that you can get with this for
|
|||
|
later review. Also, take into consideration, that you can't be at
|
|||
|
the receiver 24 hours a day. The setup to use for maximum
|
|||
|
efficiency is a recorder with a VOX. Therefore, tape waste will
|
|||
|
be at a bare minimum. That's also good, because you don't want to
|
|||
|
be at the receiver just to flip tapes every half hour to 45
|
|||
|
minutes. Also, it would be difficult to review these tapes,
|
|||
|
becasse you would have to listen to a half hour recording for an
|
|||
|
actual half hour, and so on. Well, those half hours will add up
|
|||
|
into hours, into hours, into hours. Not smart. As said, invest in
|
|||
|
a VOX. This will make it able to have the recorder skip over
|
|||
|
those quiet times in your target's house. To save tape you could
|
|||
|
slow down the recorder with electronics, if you have the
|
|||
|
electronics. You might not be successful, because it becomes
|
|||
|
difficult to tell the speech of people from background noise.
|
|||
|
Please note that not every technique is discussed here. This is a
|
|||
|
scratch of the surface. If you can, use metal tapes [if the
|
|||
|
recorder has that capability]. If not, use low noise/extended
|
|||
|
range tapes. As with most surveillance equipment, be sure that
|
|||
|
you know what you are doing. This is a game in which you can be
|
|||
|
charged hundreds of dollars for something that you could do
|
|||
|
yourself with 35 bucks. Some companies sell recorders which claim
|
|||
|
to be able to record 14 hours on a standard cassette. They have
|
|||
|
simply removed the pulley from the drive shaft of a Panasonic or
|
|||
|
Sony recorder that costs less than 50 dollars and jacked up the
|
|||
|
price 300%. Try it yourself, save money.
|
|||
|
|
|||
|
ADVANCED TECHNOLOGY
|
|||
|
|
|||
|
There is a nice device called a shotgun mic that allows you to
|
|||
|
point it at a window and listen in on a conversation in the
|
|||
|
immediate room, because of the room's sound waves causing the
|
|||
|
window glass to vibrate. The window must be closed. Since all you
|
|||
|
have to do is point it and go, well, they become obviously
|
|||
|
convenient. And fun. Find one. They might cost a litle more, but
|
|||
|
worth it. And the target is not likely to know he is being
|
|||
|
watched, so he will not be smart enough to enact countermeasures.
|
|||
|
|
|||
|
|
|||
|
WIRETAPPING
|
|||
|
Everyone has at sometime wanted to hear what a friend, the
|
|||
|
principal, the prom queen, or a neighbor has to say on the phone.
|
|||
|
There are several easy ways to tap into a phone line. None of the
|
|||
|
methods that I present will involve actually entering the house.
|
|||
|
You can do everything from the backyard. I will discuss four
|
|||
|
methods of tapping a line. They go in order of increasing
|
|||
|
difficulty. 1. The " beige box ": a beige box (or bud box) is
|
|||
|
actually better known as a "lineman" phone. They are terribly
|
|||
|
simple to construct, and are basically the easiest method to use.
|
|||
|
They consist of nothing more than a phone with the modular plug
|
|||
|
that goes into the wall cut off, and two alligator clips attached
|
|||
|
to the red and green wires. The way to use this box, is to
|
|||
|
venture into the yard of the person you want to tap, and put it
|
|||
|
onto his line. This is best done at the bell phone box that is
|
|||
|
usually next to the gas meter. It should only have one screw
|
|||
|
holding it shut, and is very easily opened. Once you are in, you
|
|||
|
should see 4 screws with wires attached to them. If the house has
|
|||
|
one line, then clip the red lead to the first screw, and the
|
|||
|
green to the second. you are then on the "tappee's" phone. You
|
|||
|
will hear any conversation going on. I strongly recommend that
|
|||
|
you remove the speaker from the phone that your using so the
|
|||
|
"tappee" can't hear every sound you make. If the house has two
|
|||
|
lines, then the second line is on screws three and four. If you
|
|||
|
connect everything right, but you don't get on the line, then you
|
|||
|
probably have the wire's backward. Switch the red to the second
|
|||
|
screw and the green to the first. If no conversation is going on,
|
|||
|
you may realize that you can't tap the phone very well because
|
|||
|
you don't want to sit there all night, and if you are on the
|
|||
|
phone, then the poor tappee can't dial out, and that could be
|
|||
|
bad...so....... method two. 2. The recorder: This method is
|
|||
|
probably the most widespread, and you still don't have to be a
|
|||
|
genius to do it. There are LOTS of ways to tape conversations.
|
|||
|
The two easiest are either to put a "telephone induction pickup"
|
|||
|
(radio shack $1.99) on the beige box you were using, then
|
|||
|
plugging it into the microphone jack of a small tape recorder,
|
|||
|
and leaving it on record. Or plugging the recorder right into the
|
|||
|
line. This can be done by taking a walkman plug, and cutting off
|
|||
|
the earphones, then pick one of the two earphone wires, and strip
|
|||
|
it. There should be another wire inside the one you just
|
|||
|
stripped. Strip that one too, and attach alligators to them. Then
|
|||
|
follow the beige box instructions to tape the conversation. In
|
|||
|
order to save tape, you may want to use a voice activated
|
|||
|
recorder (Radio shack $59), or if your recorder has a "remote"
|
|||
|
jack, you can get a "telephone recorder control" at Radio shack
|
|||
|
for $19 that turns the recorder on when the phone is on, and off
|
|||
|
when the phone is off. This little box plugs right into the wall
|
|||
|
(modularly of course), so it is best NOT to remove the modular
|
|||
|
plug for it. Work around it if you can. If not, then just do you
|
|||
|
best to get a good connection. When ecording, it is good to keep
|
|||
|
your recorder hidden from sight (in the bell box if possible),
|
|||
|
but in a place easy enough to change tapes from. The wireless
|
|||
|
microphone: this is the tap. It transmits a signal from the phone
|
|||
|
to the radio (Fm band). You may remember Mr microphone (from
|
|||
|
kaytel fame), these wireless microphones are available from radio
|
|||
|
shack for $19. They are easy to build and easy to hook up. There
|
|||
|
are so many different models, that it is almost impossible to
|
|||
|
tell you exactly what to do. The most common thing to do, is to
|
|||
|
cut off the microphone element, and attach these two wires to
|
|||
|
screws one and two. the line MIGHT, depending on the brand, be
|
|||
|
"permanently off hook" this is bad, but by mucking around with it
|
|||
|
for a while, you should get it working. There are two drawbacks
|
|||
|
to using this method. One, is that the poor asshole who is
|
|||
|
getting his phone tapped might hear himself on "FM 88, the
|
|||
|
principal connection". The second problem is the range. The store
|
|||
|
bought transmitters have a VERY short range. I suggest that you
|
|||
|
build the customized version I will present in part four (it's
|
|||
|
cheaper too). Now on to the best of all the methods.... 4. The
|
|||
|
"easy-talks": This method combines all the best aspects of all
|
|||
|
the other methods. It only has one drawback... You need a set of
|
|||
|
"Easy-talk" walkie talkies. They are voice activated, and cost
|
|||
|
about $59. You can find them at toy stores, and "hi-tech"
|
|||
|
catalogs. I think that any voice activated walkie talkies will
|
|||
|
work, but I have only tried the easy-talks. First, you have to
|
|||
|
decide on one for the "transmitter" and one for the "receiver".
|
|||
|
It is best to use the one with the strongest transmission to
|
|||
|
transmit, even though it may receive better also. Desolder the
|
|||
|
speaker of the "transmitter", and the microphone of the
|
|||
|
"receiver". now, go to the box. put the walkie talkie on "VOX"
|
|||
|
and hook the microphone leads (as in method three) to the first
|
|||
|
and second screws in the box. Now go home, and listen on your
|
|||
|
walkie talkie. if nothing happens, then the phone signal wasn't
|
|||
|
strong enough to "activate" the transmission. If this happens
|
|||
|
there are two things you can do. One, add some ground lines to
|
|||
|
the microphone plugs. This is the most inconspicuous, but if it
|
|||
|
doesn't work then you need an amplifier, like a walkman with two
|
|||
|
earphone plugs. Put the first plug on the line, and then into one
|
|||
|
of the jacks. Then turn the volume all the way up (w/out pressing
|
|||
|
play). Next connect the second earphone plug to the mice wires,
|
|||
|
and into the second earphone outlet on the walkman. now put the
|
|||
|
whole mess in the box, and lock it up. This should do the trick.
|
|||
|
It gives you a private radio station to listen to them on, you
|
|||
|
can turn it off when something boring comes on, and you can tape
|
|||
|
off the walkie talkie speaker that you have!
|
|||
|
|
|||
|
WIRELESS TRANSMITTER PLANS
|
|||
|
|
|||
|
Here the plans for a tiny transmitter that consists on a one
|
|||
|
colpitts oscillator that derives it's power from the phone line.
|
|||
|
Since the it puts on the line is less than 100 ohms, it has no
|
|||
|
effect on the telephone performance, and can not be detected by
|
|||
|
the phone company, or the tappee. Since it is a low-powered
|
|||
|
device using no antenna for radiation, it is legal to the FCC.
|
|||
|
(That is it complies with part 15 of the FCC rules and
|
|||
|
regulations). It, however is still illegal to do, it's just that
|
|||
|
what your using to do it is legal. This is explained later in
|
|||
|
part 15... "no person shall use such a device for eavesdropping
|
|||
|
unless authorized by all parties of the conversation" (then it's
|
|||
|
not eavesdropping is it?). What this thing does,is use four
|
|||
|
diodes to form a "bridge rectifier". It produces a varying dc
|
|||
|
voltage varying with the auto-signals on the line. That voltage
|
|||
|
is used to supply the voltage for the oscillator transistor.
|
|||
|
Which is connected to a radio circuit. From there, you can tune
|
|||
|
it to any channel you want. The rest will all be explained in a
|
|||
|
minute....
|
|||
|
PARTS LIST DESCRIPTION
|
|||
|
|
|||
|
C1 | 47-Pf ceramic disk capacitor
|
|||
|
C2,C3 | 27-Pf mica capacitor
|
|||
|
CR1,CR2,CR3,CR4 | germanium diode 1n90 or equivalent
|
|||
|
R1 | 100 ohm, 1/4 watt 10% composition resistor
|
|||
|
R2 | 10k, 1/4 watt 10% composition resistor
|
|||
|
R3 | .7k, 1/4 watt 10% composition resistor
|
|||
|
L1 | 2 uH radio frequency choke (see text)
|
|||
|
L2 | 5 turns No.20 wire (see text)
|
|||
|
Q1 | Npn rf transistor 2N5179 or equivalent
|
|||
|
|
|||
|
One may be constructed by winding approximately 40 turns of No.
|
|||
|
36 enamel wire on a megohm, 1/2 watt resistor. The value of L1 is
|
|||
|
not critical. L2 can be made by wrapping 5 turns of No. 20 wire
|
|||
|
around a 1/4 inch form. After the wire is wrapped, the form can
|
|||
|
be removed. Just solder it into place on the circuit board. It
|
|||
|
should hold quite nicely. Also be sure to position Q1 so that the
|
|||
|
Emitter, Base, and collector are in the proper holes. The
|
|||
|
schematic should be pretty easy to follow. Although it has an
|
|||
|
unusual number of grounds, it still works.
|
|||
|
|
|||
|
|------------------L1----------------|
|
|||
|
-- |
|
|||
|
CR1 / \ CR2 |----------------|
|
|||
|
A--------------/ \ --| ----| | |
|
|||
|
| \ / | | | C2 L2
|
|||
|
| CR3 \ /CR4 | C1 R2 |----| |
|
|||
|
R1 -- | | | gnd C3 |
|
|||
|
| | | ----| |-----|
|
|||
|
| gnd | | |
|
|||
|
| | |-----|----Base collector
|
|||
|
| | R3 \ /
|
|||
|
B-----------------------| | \/\ <- Q1
|
|||
|
gnd \/
|
|||
|
|
|
|||
|
|
|
|||
|
emitter(gnd)
|
|||
|
|
|||
|
|
|||
|
One odd thing about this that we haven't encountered yet, is
|
|||
|
that it is put on only one wire (either red or green) so go to
|
|||
|
the box, remove the red wire that was ALREADY on screw #1 and
|
|||
|
attack it to wire 'A' of the then attach wire 'B' to the screw
|
|||
|
itself. you can adjust the frequency which it comes out on (the
|
|||
|
FM channel by either tightening, or widening the coils of L2. It
|
|||
|
takes a few minutes to get to work right, but it is also very
|
|||
|
versatile. You can change the frequency at will, and you can
|
|||
|
easily record off your radio.HELPFUL HINTS
|
|||
|
First of all, With method one, the beige box, you may notice that
|
|||
|
you can also dial out on the phone you use. I don't recommend
|
|||
|
that you do this. If you decide to anyway, and do something
|
|||
|
conspicuous like set up a 30 person conference for three hours,
|
|||
|
then I suggest that you make sure the people are either out of
|
|||
|
town or dead. In general when you tap a line, you must be
|
|||
|
careful. I test everything I make on my line first, then install
|
|||
|
it late at night. I would not recommend that you leave a recorder
|
|||
|
on all day. Put it on when you want it going, and take it off
|
|||
|
when your done. As far as recording goes, I think that if there
|
|||
|
is a recorder on the line it sends a sporadic beep back to the
|
|||
|
phone co. I know that if you don't record directly off the line
|
|||
|
(i.e off your radio) then even the most sophisticated equipment
|
|||
|
can't tell that your recording. Also, make sure that when you
|
|||
|
install something the people are NOT on the line. Installation
|
|||
|
tends to make lots of scratchy sounds, clicks and static. It is
|
|||
|
generally a good thing to avoid. It doesn't take too much
|
|||
|
intelligence to just make a call to the house before you go to
|
|||
|
install the thing. If it's busy then wait a while. (This of
|
|||
|
course does not apply if you are making a "midnight run"). All
|
|||
|
in all, if you use common sense, and are *VERY* Careful, chances
|
|||
|
are you won't get caught. Never think that you're unstoppable,
|
|||
|
and don't broadcast what your doing. Keep it to yourself, and you
|
|||
|
can have a great time. Lunch Box
|
|||
|
The Lunch Box is a VERY simple transmitter which can be handy for
|
|||
|
all sorts of things. It is quite small and can easily be put in a
|
|||
|
number of places. I have successfully used it for tapping phones,
|
|||
|
getting inside info, blackmail and other such things. The
|
|||
|
possibilities are endless. I will also include the plans for an
|
|||
|
equally small receiver for your newly made toy. Use it for just
|
|||
|
about anything. You can also make the transmitter and receiver
|
|||
|
together in one box and use it as a walkie talkie.
|
|||
|
|
|||
|
Materials you will need
|
|||
|
=======================
|
|||
|
|
|||
|
1 9 volt battery with battery clip
|
|||
|
1 25-mfd, 15 volt electrolytic capacitor
|
|||
|
2 0.0047 mfd capacitors
|
|||
|
1 0.022 mfd capacitor
|
|||
|
1 51 pf capacitor
|
|||
|
1 365 pf variable capacito
|
|||
|
1 Transistor antenna coil
|
|||
|
1 2N366 transistor
|
|||
|
1 2N464 transistor
|
|||
|
1 100k resistor
|
|||
|
1 5.6k resistor
|
|||
|
1 10k resistor
|
|||
|
1 2meg potentiometer with SPST switch
|
|||
|
Some good wire, solder, soldering iron,
|
|||
|
board to put it on, box (optional)Schematic for The Lunch Box
|
|||
|
|
|||
|
This may get a tad confusing but just
|
|||
|
print it out and pay attention.]
|
|||
|
|
|||
|
[!]
|
|||
|
!
|
|||
|
51 pf
|
|||
|
! BASE
|
|||
|
---+---- ------------COLLECTOR
|
|||
|
! )( 2N366
|
|||
|
+----+------/\/\/----GND
|
|||
|
365 pf () emitter !
|
|||
|
! )( ! !
|
|||
|
+-------- ---+---- ! !
|
|||
|
! ! ! ! !
|
|||
|
GND / .022mfd ! !
|
|||
|
10k\ ! ! !
|
|||
|
/ GND
|
|||
|
+------------------------emitter
|
|||
|
! ! !
|
|||
|
2N464
|
|||
|
/ .0047 !
|
|||
|
base collector
|
|||
|
2meg \----+ ! !
|
|||
|
+--------+ !
|
|||
|
/ ! GND ! !
|
|||
|
!
|
|||
|
GND ! !
|
|||
|
!
|
|||
|
+-------------+.0047+--------------------+ !
|
|||
|
!
|
|||
|
!
|
|||
|
+--25mfd-----+
|
|||
|
-----------------------------------------+ !
|
|||
|
!
|
|||
|
microphone
|
|||
|
+--/\/\/-----+
|
|||
|
---------------------------------------------+
|
|||
|
100k !
|
|||
|
|
|||
|
!
|
|||
|
|
|||
|
GND---->/<---------------------!+!+!+---------------+
|
|||
|
switch Battery
|
|||
|
from 2meg pot.
|
|||
|
|
|||
|
|
|||
|
Notes about the schematic
|
|||
|
|
|||
|
1. GND means ground
|
|||
|
2. The GND near the switch and the GND by the 2meg potentiometer
|
|||
|
should be connected
|
|||
|
3. Where you see: )(
|
|||
|
()
|
|||
|
)( it is the transistor antenna coil with 15
|
|||
|
turns of regular hook-up wire around it.
|
|||
|
4. The middle of the loop on the left side (the left of "()")
|
|||
|
you should run a wire down to the "+" which has nothing attached
|
|||
|
to it. There is a .0047 capacitor on the correct piece of wire.
|
|||
|
5. For the microphone use a magnetic earphone (1k to 2k).
|
|||
|
6. Where you see "[!]" is the antenna. Use about 8 feet of wire
|
|||
|
to broadcast approx 300ft. Part 15 of the FCC rules and
|
|||
|
regulation says you can't broadcast over 300 feet without a
|
|||
|
license. (Hahaha). Use more wire for an antenna for longer
|
|||
|
distances. (Attach it to the black wire on the phone line for
|
|||
|
about a 250 foot antenna!)
|
|||
|
|
|||
|
Operation of the Lunch Box
|
|||
|
|
|||
|
This transmitter will send the signals over the AM radio band.
|
|||
|
You use the variable capacitor to adjust what freq. you want to
|
|||
|
use. Find a good unused freq. down at the lower end of the scale
|
|||
|
and you're set. Use the 2 meg pot. to adjust gain. Just screw
|
|||
|
with it until you get what sounds good. The switch on the 2meg
|
|||
|
is for turning the Lunch Box on and off. When everything is
|
|||
|
adjusted, turn on an AM radio adjust it to where you think the
|
|||
|
signal is. Have a friend say something thru the Box and tune in
|
|||
|
to it. That's all there is to it. The plans for a simple
|
|||
|
receiver are shown below:
|
|||
|
9 volt battery with battery clip
|
|||
|
365 pf variable capacitor
|
|||
|
51 pf capacitor
|
|||
|
1N38B diode
|
|||
|
Transistor antenna coil
|
|||
|
2N366 transistor
|
|||
|
SPST toggle switch
|
|||
|
1k to 2k magnetic earphone
|
|||
|
|
|||
|
Schematic for receiver
|
|||
|
|
|||
|
[!]
|
|||
|
!
|
|||
|
51 pf
|
|||
|
!
|
|||
|
+----+----+
|
|||
|
! !
|
|||
|
) 365 pf
|
|||
|
(----+ !
|
|||
|
) ! !
|
|||
|
+---------+---GND
|
|||
|
!
|
|||
|
+---*>!----base collector-----
|
|||
|
[ diode 2N366 earphone
|
|||
|
emitter +-----
|
|||
|
! !
|
|||
|
GND !
|
|||
|
-
|
|||
|
+
|
|||
|
- battery
|
|||
|
+
|
|||
|
GND------>/<------------+
|
|||
|
switch
|
|||
|
|
|||
|
|
|||
|
Closing statement
|
|||
|
This two devices can be built for under total of $10.00. Not too
|
|||
|
bad. Using these devices in illegal ways is your option. If you
|
|||
|
get caught, I accept NO responsibility for your actions. This can
|
|||
|
be a lot of fun if used correctly. Hook it up to the green wire
|
|||
|
(I think) on the phone line and it will send the conversation
|
|||
|
over the air waves.
|
|||
|
--
|
|||
|
Daniel N2SXX
|
|||
|
dmd@panix.com
|