310 lines
15 KiB
Plaintext
310 lines
15 KiB
Plaintext
![]() |
On the Essentials of Voice Mail Hacking
|
|||
|
by the Kryptic Night
|
|||
|
-S M C-
|
|||
|
|
|||
|
This file will describe several simple ways for hacking out
|
|||
|
your own voice mail box. It is by no means a comprehensive
|
|||
|
document on the subject, but rather, is meant to help those
|
|||
|
beginning in the field. I myself have several voice mail boxes,
|
|||
|
and have hacked on various systems. I will describe several of
|
|||
|
the methods I have used, and try to explain the format for them.
|
|||
|
|
|||
|
An overview of several common commands:
|
|||
|
# (Pound) - Used either to access the password prompt or a
|
|||
|
dialing list.
|
|||
|
* (Star) - This is either used to abort the current menu, or
|
|||
|
to amplify the volume.
|
|||
|
0 (Duh) - Used either to access the password prompt, or to chat
|
|||
|
with our friend, the operator.
|
|||
|
9 - This is occasionally used to hang up.
|
|||
|
|
|||
|
|
|||
|
The First Step
|
|||
|
Type of systems to look for
|
|||
|
|
|||
|
First of all you need a system to hack at. Unless you are a
|
|||
|
pre-teenage new kid fan, answering machines usually aren't that
|
|||
|
exciting.
|
|||
|
Try to look for an 800 voice mail system. I know I don't like
|
|||
|
having to pull out codes every time I want to call a VMB, only to
|
|||
|
find that their is nothing there worth my while, and I'm sure
|
|||
|
other people feel the same. This will not only provide yourself
|
|||
|
with a free method for calling your box, but will also allow you
|
|||
|
to call it from a payphone, and you can call it anytime, rather
|
|||
|
than when you just have a code handy.
|
|||
|
Another great advantage is using a system that is up for all
|
|||
|
24 hours. This isn't a necessity, but is a great convenience. For
|
|||
|
instance, imagine that you just gave out your number to someone
|
|||
|
who be beneficial to your VMB as a good source of codes or
|
|||
|
general info, but he has better things to do at night than call
|
|||
|
VMB systems, with an afterhours VMB, you cut him off, is that what
|
|||
|
you want? I'd hope not.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Second Step
|
|||
|
Finding out how many digits the boxes are
|
|||
|
|
|||
|
Ok, so you now have a system to play with. Let's see if the
|
|||
|
system is worth your time, and find out the basics of it.
|
|||
|
Now you have to try to ascertain how many digits the box numbers
|
|||
|
are, this may take a while if it requires you to press a '#'
|
|||
|
(pound) sign after the box number, as these systems usually do not
|
|||
|
tell you whether you entered the correct amount of digits or not.
|
|||
|
For now, I'd recommend you just ignore these, as they would
|
|||
|
require extra work. Try entering any 3 digits, you will in most
|
|||
|
cases get an 'incorrect box number' message if the system is only
|
|||
|
a 3 digit system. However, if it just hangs, does nothing, then
|
|||
|
the odds are it's a four digit system. Try typing 4 digits now,
|
|||
|
and if you still get no message, then it's either one of two
|
|||
|
things. One, you may need to press a '#' (pound) sign after the
|
|||
|
number, or in some cases, before it. Or two, the system is longer
|
|||
|
than 4 digits, in which case you should ignore it for now. Some
|
|||
|
systems contain a built-in time delay that will tell you a message
|
|||
|
if you haven't entered the correct box in a given time, these
|
|||
|
should also be avoided for now, as they will say something even if
|
|||
|
you only type one digit, or if you type 100 digits.
|
|||
|
|
|||
|
|
|||
|
The Third Step
|
|||
|
Finding where the boxes are located
|
|||
|
|
|||
|
Now comes a rather tedious chore, finding out where on the
|
|||
|
system the boxes are located. Unless it is a professional voice
|
|||
|
mail company, they will probably have under 100-200 mail boxes in
|
|||
|
use at any one time. These boxes may be found on the system in any
|
|||
|
of two forms, clumped or scattered. Clumped boxes are when their
|
|||
|
are several boxes all in one area of the system. Usually this is
|
|||
|
the only area on the system that boxes are located, but
|
|||
|
occasionally some systems have scattered clumps all around the
|
|||
|
system. Scattered boxes occur when the boxes seem to have no
|
|||
|
apparent order for their location, these are more difficult to
|
|||
|
find empty boxes on, but not impossible.
|
|||
|
Now you need to start looking for the clumps (We will start
|
|||
|
with these, as they are generally easier to locate). Start
|
|||
|
searching from 100, for a three digit system, or 1000, for a 4
|
|||
|
digit system. Increment your searching by 25-50 for a three digit
|
|||
|
system, and 100-500 on a four digit system. This will undoubtedly
|
|||
|
be inaccurate, but it will allow you a better chance of finding
|
|||
|
the clumps than random guessing. You may get several messages
|
|||
|
while looking for these, anything from 'Boxes cannot start with
|
|||
|
an x' to 'Incorrect box number' Generally these should be self-
|
|||
|
explanatory, and you should be able to figure out how to respond
|
|||
|
on your own. You are looking for any box with a message in it, any
|
|||
|
message. When you find a used box, mark down the number, and scan
|
|||
|
around that box in increments of 5 or so. If you find any more,
|
|||
|
mark down that location as a clump. Remember however, that if you
|
|||
|
get an incorrect box number message, that doesn't mean that that
|
|||
|
area isn't a clump, just that that box is empty. This will provide
|
|||
|
added inaccuracy to the job, but it's a fact that can't be
|
|||
|
overcome by anything other than monotonous scanning by 1.
|
|||
|
Try to make this fun, invite your friends over, have a phone
|
|||
|
party....they can be fun and profitable if you know what you are
|
|||
|
looking for.
|
|||
|
As for scattered boxes, I don't have much to say, they aren't
|
|||
|
the easiest systems to play with, as you can't tell with any
|
|||
|
certainty where on the system a box will be, and if it's a four
|
|||
|
digit system, that's 10,000 possible boxes...Not an encouraging
|
|||
|
number. If you are on a system with scattered boxes, just ignore
|
|||
|
this section and read how to find empty boxes next.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Fourth Step
|
|||
|
The Miraculous Void
|
|||
|
|
|||
|
Once you've found the system, your real job has just begun.
|
|||
|
You now need to find an empty box. Although it is possible to hack
|
|||
|
out used boxes, this is usually undesirable, since used boxes tend
|
|||
|
to have people who use them (makes sense doesn't it...I thought so
|
|||
|
too) When some complaining customer calls and gets a message such
|
|||
|
as "To call cosmos and fuck up the entire region, dial...blah blah
|
|||
|
blah...remember to slaughter a cat for Halloween...", they will
|
|||
|
most likely be a bit suspicious and will call the business
|
|||
|
bitching about how they are so unprofessional, and that their
|
|||
|
employees really should clean up their mouths...blah blah, you
|
|||
|
know, the usual line of bullshit. If that doesn't happen, then the
|
|||
|
person who owns the box will check it out, and if that happens,
|
|||
|
you can be assured that the box won't last.
|
|||
|
Now is the time to pull out that list of clumps you made.
|
|||
|
Start searching around these boxes in increments of 1, yes one,
|
|||
|
this may take a while...but if you've come this far...you
|
|||
|
obviously have too much free time.
|
|||
|
What you are looking for is any box that asks you to leave a
|
|||
|
message at the tone, and doesn't play a prerecorded message to you
|
|||
|
before that. These are relatively easy to recognize, and you
|
|||
|
shouldn't have any problems with it. Just look for the anomaly.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Fifth Step
|
|||
|
On the Art of Hacking
|
|||
|
|
|||
|
This is where the excitement begins, or the agony ends. By
|
|||
|
now you should have found an empty box or two. If you haven't,
|
|||
|
start over again with a different system. There are several ways
|
|||
|
to access the password prompt. Usually most systems tell you right
|
|||
|
up front at the main menu how to do it, but since some do not,
|
|||
|
I'll explain the most common ways that I know of.
|
|||
|
The magical pound sign is the most common way of accessing
|
|||
|
the password prompt. From the main menu you should press the #
|
|||
|
sign, and then the box number. It will then ask for your security
|
|||
|
password, or some other such inane jargon. The other common way of
|
|||
|
accessing the prompt is to dial the box number, and press 0 while
|
|||
|
the message is playing, or sometime after you dial the box number.
|
|||
|
You will then be asked to enter your security password, or
|
|||
|
whatever they choose to call it.
|
|||
|
A security password is usually, but not always, the same
|
|||
|
length as the box number. The most common default password for
|
|||
|
voice mail systems is a string of zero's, 000 for three digit
|
|||
|
systems and 0000 for four digit systems. Other common passwords
|
|||
|
are: The box number, IE - box 2045 would have a password of 2045,
|
|||
|
box of 0981 (four digit system) would have a password of 0981, and
|
|||
|
a three digit system might have something like 521 for a box
|
|||
|
number of 521, a string of some common digits, such as 1111,
|
|||
|
2222, 3333, ainsi du suite, the year, or 1234. By no means are
|
|||
|
these the only default passwords, but these are the ones I've
|
|||
|
seen, and have heard about. You should be able to catch a
|
|||
|
significant number of empty boxes with these.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Sixth Step
|
|||
|
You're in, now what
|
|||
|
|
|||
|
So you think you're cool, right? You've found a box or two
|
|||
|
that you can get into. Well, congrats, from here on out everything
|
|||
|
is cake. This section and following sections won't tell you too
|
|||
|
much that you shouldn't be able to figure out with
|
|||
|
experimentation, but I'm trying to be thorough...
|
|||
|
You've gotten past the password, and are at a prompt that
|
|||
|
asks you to 'send a message to another box' 'read new mail', or
|
|||
|
what not. If their are messages in the box, you should read them
|
|||
|
and pay attention to the date stamp if it's there. If the message
|
|||
|
is only a day or so old, then you might want to make sure you have
|
|||
|
other boxes to fall back on. Besides that, just enjoy the thrill
|
|||
|
of listening to other people's private mail...I once got a message
|
|||
|
from some guy's mistress...Funnier than hell. All the commands for
|
|||
|
these options should be readily apparent, and told to you when you
|
|||
|
get in.
|
|||
|
To configure your system with your message, name, and
|
|||
|
password you will need to enter the 'Setup menu' or whatever it is
|
|||
|
called. Sometimes this function won't be told to you, but that's
|
|||
|
not really a problem, their are only 12 digits to try. Most
|
|||
|
systems default to an 8 or a 3. I'll assume you can find it on
|
|||
|
your own...
|
|||
|
You've gotten into the config menu by now, and you are
|
|||
|
confronted with a multitude of options. First you should ALWAYS
|
|||
|
change your password to something that you feel is unhackable,
|
|||
|
your phone number is not a good choice. Next you should enter your
|
|||
|
own personal message. Try to figure out if the message is time
|
|||
|
limited to 30 seconds or a minute, a lot of systems do that. These
|
|||
|
systems are usually only good for personal message boxes, and not
|
|||
|
code lines. Next, change your name if the system allows you to do
|
|||
|
that...I don't think you want to be called Edwina Lipshitz when
|
|||
|
someone tries to leave you a message.
|
|||
|
Their may be other functions, such as message forwarding,
|
|||
|
call placements, group messages, message waiting status, etc.
|
|||
|
Generally these should be ignored, unless you're adventurous and
|
|||
|
willing to risk your box with something like having the system
|
|||
|
call you when you get a message.
|
|||
|
So, you've done everything, and set up a cool box, eh? Great,
|
|||
|
now just for fun, go back to the main system menu, and try to
|
|||
|
enter your box as a user would. Type to box number and listen to
|
|||
|
your message, if it's satasfactory...You've done it, you now have
|
|||
|
a brand new box you can tell your friends.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Seventh Step
|
|||
|
What to do with a VMB
|
|||
|
|
|||
|
|
|||
|
Just for kicks, you might want to figure out what to do with
|
|||
|
a VMB once you have it. I'll describe two of these options, their
|
|||
|
are infinity more to the imaginative.
|
|||
|
|
|||
|
Code lines: These are quite possibly the best thing you can
|
|||
|
ever have if you are interested in the underground scene. If it is
|
|||
|
well advertised, and you post all the info you get, you will have
|
|||
|
a popular box. With a popular box, you'll get a vast amount of
|
|||
|
information that you wouldn't find on most boards, such as cosmos
|
|||
|
dialups, telenet accounts, codes, and other such info. These type
|
|||
|
of boxes can get you into trouble quite quickly if the gestapo
|
|||
|
finds out about it, as they are a bit more annoyed with someone
|
|||
|
who posts all their private information, over someone who just
|
|||
|
asks to leave a message at the prompt. But when you live the life
|
|||
|
you need to, the risks are not a factor.
|
|||
|
Personal boxes are also great for several reasons. You can
|
|||
|
post your VMB to people who need to get in touch with you, even
|
|||
|
when they don't have a code. You can also use them in the fine
|
|||
|
art of carding. When the salesperson asks for your phone number,
|
|||
|
tell 'em something like "It's being fixed, but you can call my
|
|||
|
voice mail system at XXX-XXX-XXXX." This will make them a lot less
|
|||
|
suspicious then if you give them a bad phone number. Of course you
|
|||
|
would want to change the box message to that of the person whose
|
|||
|
card you used, but that's obvious.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Eighth Step
|
|||
|
How to keep your VMB safe and sound
|
|||
|
|
|||
|
Once you've gone through all the trouble of hacking out a
|
|||
|
VMB, the last thing you want is for it to go bad the next week,
|
|||
|
their is little in this more infuriating then spending a lot of
|
|||
|
time getting a box, to find it go dead the next day.
|
|||
|
|
|||
|
Several ways to keep your box safe include...
|
|||
|
NEVER hack out more than 1 or 2 boxes at ANY time. If you
|
|||
|
need another VMB be kind to yourself, do it on another system.
|
|||
|
Their have been too many busts of people who get greedy.
|
|||
|
DON'T allow other people to hack on your system. Threats or
|
|||
|
warnings will sometimes be effective, threaten them with things
|
|||
|
such as ruining their credit ratings with TRW, sending a few
|
|||
|
thousand dildo's to their mother, care of them, or whatever...be
|
|||
|
imaginative. Or you can offer to hack out a box for them somewhere
|
|||
|
else. This may seem like a bitch to do, but it's worth your time
|
|||
|
if the person is an asshole.
|
|||
|
DON'T post your VMB on lame systems, or on systems where
|
|||
|
their are a large amount of people who dislike you. These idiots
|
|||
|
usually have less of a life than you, and are not against spending
|
|||
|
days trying to hack out your password. Since you probably can't
|
|||
|
kill them upfront, just make sure they don't get your number.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Conclusion
|
|||
|
The Usual Bullshit
|
|||
|
|
|||
|
This file was researched are written by the Kryptic Night. It
|
|||
|
was produced as the first in a series of quality SMC text files
|
|||
|
released for the private public. In no way do I care whether you
|
|||
|
get busted or not, and accept no responsibility for corrupting
|
|||
|
your young minds. Thanx go out to the members of SMC, Scooter, and
|
|||
|
everyone else who is interested in freedom of speech.
|
|||
|
|
|||
|
Information is the most powerful weapon one can possess
|
|||
|
against the masses.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|
|||
|
| \
|
|||
|
| /\/\ / <20>\ <20><><EFBFBD>
|
|||
|
| / \ / <20> \ A <20> A
|
|||
|
| / |/| / / \ <20> / <20> /
|
|||
|
|/ | < \ <20>/ <20>/ U L T
|
|||
|
|\ RYPTIC / | \ \ / <20>\
|
|||
|
| \ / | \ <20> \
|
|||
|
|\ | | \
|
|||
|
| \ |
|
|||
|
| \|IGHT
|
|||
|
/ `
|
|||
|
|
|||
|
- Servants of the Mushroom Cloud -
|
|||
|
|
|||
|
Data Kult, Kryptic Night, Lord Logics, Nacht Habicht,
|
|||
|
Shadow Walker, the Scorpion
|