2642 lines
120 KiB
Plaintext
2642 lines
120 KiB
Plaintext
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #1 of 12
|
|
|
|
Intro to Phrack V!
|
|
~~~~~ ~~ ~~~~~~ ~~
|
|
4/18/86
|
|
|
|
Welcome to Phrack Inc. Issue Five! Thanks to you, the readers, we
|
|
have received a good following and will continue to pump out issues! Your
|
|
support has been fantastic and I'm happy to say that more people out there that
|
|
know their stuff are coming out of the woodwork and writing philes to be
|
|
distributed with Phrack Inc. Recently, I received a letter from a law firm in
|
|
New York complaining about the Master Lock Picking phile in Issue One of Phrack
|
|
Inc. This was written by Ninja NYC and Gin Fizz, both of The Punk Mafia. It
|
|
was a top class phile and it worked...but that was the problem. They wished me
|
|
to do something about the material stated. Details of this story can be read
|
|
in this edition of Phrack World News. Let me state here though, all philes
|
|
that are distributed with Phrack Inc. are merely being transmitted, and we are
|
|
not responsible for the philes' content any more than the readers are. The
|
|
philes are the responsibility of the writers, and I'm not trying to lay the
|
|
blame on Ninja NYC and Gin Fizz (see the letter I wrote to the firm stating my
|
|
position here), but we will not be blamed for a crime that has not been
|
|
committed. Look forward to many more issues of Phrack Inc. in the far future!
|
|
|
|
TARAN KING
|
|
Sysop of Metal Shop Private
|
|
|
|
This issue contains the following philes:
|
|
|
|
#1 Phrack V Intro by Taran King
|
|
#2 Phrack Pro-Phile of Broadway Hacker by Taran King
|
|
#3 Hacking Dec's by Carrier Culprit
|
|
#4 Hand to Hand Combat by Bad Boy in Black
|
|
#5 DMS-100 by Knight Lightning
|
|
#6 Bolt Bombs by The Leftist
|
|
#7 Wide Area Networks Part 1 by Jester Sluggo
|
|
#8 Radio Hacking by The Seker
|
|
#9 Mobile Telephone Communications by Phantom Phreaker
|
|
#10-12 Phrack World News IV by Knight Lightning
|
|
|
|
===============================================================================
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #2 of 12
|
|
|
|
==Phrack Pro-Phile II==
|
|
|
|
Written and Created by Taran King
|
|
|
|
4/5/86
|
|
|
|
Welcome to Phrack Pro-Phile II. Phrack Pro-Phile is created to bring
|
|
info to you, the users, about old or highly important/controversial people.
|
|
This month, I bring to you one of the most controversial users of our times and
|
|
of days of old...
|
|
|
|
Broadway Hacker
|
|
~~~~~~~~ ~~~~~~
|
|
|
|
Broadway Hacker is the sysop of The Radio Station, a phreak/hack
|
|
bulletin board in Brooklyn, N.Y. (718).
|
|
-------------------------------------------------------------------------------
|
|
Personal
|
|
~~~~~~~~
|
|
Handle: Broadway Hacker
|
|
Call him: Mike
|
|
Past handles: None (except his sysop handle, "The Program Director")
|
|
Handle origin: Thought it up while on Compu-Serve
|
|
Date of Birth: April 22, 1965
|
|
Age at current date: 20 years old
|
|
Height: 6'2"
|
|
Weight: About 150 lbs.
|
|
Eye color: Green/Hazel
|
|
Hair Color: Brown
|
|
Computer: Commodore 64 with 3 disk drives and 300/1200 baud modem
|
|
Sysop/Co-Sysop of: The Radio Station, The Night Stalker
|
|
-------------------------------------------------------------------------------
|
|
Broadway Hacker started out in the BBS world in late 1983 when he
|
|
first got his modem. On March 23, 1985, The Broadway Show, his first bulletin
|
|
board, was launched into the BBS world. It started on 1 disk drive at 300 baud
|
|
and has upgraded incredibly. It was originally a phreak board as it currently
|
|
is also. He had originally gotten his C-64 computer in early 1985. Various
|
|
members of the elite world including King Blotto, Lex Luthor, and Dr. Who got
|
|
on his board to make it the memorable board that it was before the format
|
|
change. His phreak experience began in 1981 through CB radios when a CB'er
|
|
gave him a code over the line. Some of the memorable phreak boards he was on
|
|
included Blottoland, The AT&T Phone Center of 312, and Dark Side of the Moon of
|
|
818. He gives credit for his phreak knowledge to conferences mostly. The Radio
|
|
|
|
Mike works at a very large radio station. His phreaking is unknown at
|
|
work. He's not particularly interested in programming beyond modifying The
|
|
Radio Station.
|
|
|
|
Broadway Hacker hasn't the time for hacking now. Broadway attends the
|
|
Tap meetings in New York occasionally, but in the past he was a regular. He
|
|
attended the 1986 TelePub meeting in New York which was to decide the fate of
|
|
Tap magazine. Broadway has met various phreaks in person including BIOC Agent
|
|
003, Lex Luthor, Dr. Who, King Blotto, Cheshire Catalyst, The Sprinter, The
|
|
Saint, Micro Ghoul, 2600 Magazine People, Paul Muad'Dib, and TUC. There were
|
|
others, but he couldn't remember at 9:00 AM EST. He has made it a point to not
|
|
become a member of groups, but he has been, in the past, invited to many.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Interests: Traveling, radio, telecommunications (modeming, phreaking),
|
|
trashing, meeting other phreaks, BBS'ing, and running The
|
|
Radio Station.
|
|
|
|
Broadway Hacker's Favorite Things
|
|
---------------------------------
|
|
|
|
Women: No names mentioned but yes...
|
|
Cars: Fieros
|
|
Foods: Ray's Pizza (West 11th and 6th Ave.), Steve's Ice Cream
|
|
Music: Any top 40 groups in general.
|
|
|
|
Most Memorable Experiences
|
|
--------------------------
|
|
|
|
Getting almost kidnapped by a gay bellhop in Denver
|
|
Getting stranded in California
|
|
|
|
Some People to Mention
|
|
----------------------
|
|
|
|
Sigmund Fraud (an up-and-coming phreak who has learned a lot in a short time)
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Broadway Hacker wishes you all to know that he does not conference at
|
|
all any more because conferencing has depreciated from the old days and that
|
|
they have become mostly a place to gather for gossip.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
I hope you enjoyed this phile, look forward to more Phrack Pro-Philes coming in
|
|
the near future. ...And now for the regularly taken poll from all interviewees.
|
|
|
|
Of the general population of phreaks you have met, would you consider most
|
|
phreaks, if any, to be computer geeks? For the most part, Broadway says, "No".
|
|
Thanks for your time Mike.
|
|
|
|
TARAN KING
|
|
SYSOP OF METAL SHOP PRIVATE
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #3 of 12
|
|
|
|
[/][/][/][/][/][/][/][/][/][/][/]
|
|
[/] Hacking the Dec-10 system [/]
|
|
[/] written by, [/]
|
|
[/] Carrier Culprit [/]
|
|
[/][/][/][/][/][/][/][/][/][/][/]
|
|
Revised Edition....
|
|
|
|
Note: This file was distributed by accident, it was not finished. This is the
|
|
new and revised edition. If you see my file distributed on some AE, BBS,
|
|
Catfur, and it's not the revised edition please ask the sysop to delete it.
|
|
Thank-you.
|
|
|
|
------------------------------------
|
|
Part I: Logging In, and simple cmds.
|
|
------------------------------------
|
|
Note:Sysop's may download this file
|
|
but please keep the appropriate
|
|
credits.
|
|
|
|
Welcome to Hacking Dec 10's!
|
|
|
|
There is one way to recognize a Dec-10, you will get the "." prompt. First
|
|
there will be a little login message, sort of like a login on a BBS. For
|
|
example-
|
|
|
|
NIH Timesharing
|
|
|
|
NIH Tri-SMP 7.02-FF 19:57:11 TTY12
|
|
system 1378/1381/1453 Connected to Node Happy(40) Line # 13
|
|
Please LOGIN
|
|
.
|
|
|
|
Now, you've gotten so far that you have found a Dec (Digital Equipment Corp),
|
|
you will need to know the format of the login.
|
|
|
|
[Login format]
|
|
|
|
The users have numbers called PPN's which stands for "Project/Program Number".
|
|
The format of a PPN number is [X,X]. The first number is the the Project number
|
|
and the second is the Program Number.
|
|
|
|
ie-
|
|
|
|
.Log 12,34
|
|
|
|
Job 64 NIH 7.01 KL 64-UC TTY12
|
|
Password:
|
|
|
|
The password can range from 1-8 characters long, it may contain numbers,
|
|
initials, or something of the sort. Try and think, if I were a user what would
|
|
my password be. I doubt that method would work but it's worth a try.
|
|
|
|
Now say this is your very first time on a Dec 10 system. Now if you want to
|
|
see some information about the system and some commands you may want to type-
|
|
|
|
.Help
|
|
|
|
This will tell a little more about the system you are on. It will tell you how
|
|
to get information on a specific topic. It may also give you the number to
|
|
their voice dial-up just in case your having trouble.
|
|
Now the dial-up (voice) may help you if your good in BS'ing. Usually the Help
|
|
command will tell you to consult your 'Dec 10-system guide' for more
|
|
information.
|
|
|
|
Now say you want a list of commands to execute. You can type-
|
|
.Help *
|
|
|
|
You will then get the following commands- Which are too many to type in but
|
|
you will recognize them when you type Help *.
|
|
|
|
Now after it shows all the commands it will then tell you how to login. It
|
|
will not give you a demo account, but will give you an example login.
|
|
|
|
It will say something like, "The Login command is used for accessing the
|
|
Decsystem-10 timesharing system."
|
|
|
|
To login please enter your project,programmer number pair.
|
|
|
|
LOGIN XXX,XXXX
|
|
|
|
The system will prompt you for your password. If your PPN or password is
|
|
wrong you will then be prompted with a message that says-
|
|
|
|
Enter Project,programmer #xxx,xxxx
|
|
Password:
|
|
|
|
End of that.
|
|
|
|
Now, there are some other useful commands you may enter while still *not*
|
|
having a account. You can access Decnet which I will discuss later which is
|
|
very nice to a hacker.
|
|
|
|
Now, there is also a command you can execute called "Help Phone". What this
|
|
does is, it lists the numbers of different Dec related staffs. etc....
|
|
Example-
|
|
|
|
.Help Phone
|
|
|
|
DCRT/CCB/DECsystem-10 Information Phone numbers (4/86)
|
|
|
|
Recorded message Dial xxx-xxxx
|
|
Dec-10 operator Dial xxx-xxxx
|
|
Dec-10 staff Dial xxx-xxxx
|
|
Terminal Repairs Dial xxx-xxxx
|
|
Classes/Courses Dial xxx-xxxx
|
|
Users Area Phone Dial xxx-xxxx
|
|
Project Control Office Dial xxx-xxxx
|
|
|
|
NOTE:This is the same area code as the Decsystem.
|
|
|
|
Now the two numbers which would be the most important to you would be the
|
|
number of the Dec10 operator and the Dec10 staff.
|
|
|
|
Now the most important command which can be executed on the Dec10 which is
|
|
good to use is "Systat"; this will list PPN's, time, running job, time elapsed.
|
|
Once you get that PPN you can start hacking away. Using systat is the simplest
|
|
and easiest way to get PPN's. It will just be easier to type "SY" instead of
|
|
"Systat", they are both the same thing except sy is the abbreviation.
|
|
|
|
Now here's a little example of what you would get by executing the "sy"
|
|
command.
|
|
|
|
.SY
|
|
|
|
Status of Brown University 603A at 11:52:33 on 29-Jan-86
|
|
|
|
Uptime 187:12:22, 80%Null time = 80%idle + 0%Lost
|
|
7 Jobs in use out of 128. 19 logged in 4 detached out of 89 (LOGMAX)
|
|
Job Who What Run Time
|
|
|
|
1 [OPR] OPSER 3:22
|
|
2 [OPR] DIALOG 1:29
|
|
3 [OPR] BATCON 4:01
|
|
4 [OPR] SYSINF 51:13 01
|
|
5 24,2 SYSTAT 4:52
|
|
6 2332,21 DIRECT 2:22
|
|
7 32,22 SYSTAT 8:19
|
|
|
|
There will also be more stuff along with the above. Now you shouldn't concern
|
|
yourself with it, that's why I didn't add in. Now also there will be more
|
|
sub-headings than run time, who, what, and job. You also shouldn't concern
|
|
yourself with that either.
|
|
|
|
Now everything is really self explanatory which is up there. Now for
|
|
beginners who are reading this file I will just tell you what that means Job is
|
|
no concern. Who is telling you what kind of person is on the system. [OPR]
|
|
means Operator, and the numbers such as, 24,2 are referring to regular users
|
|
with PPN's. Now the next column which is "What". This is telling us what they
|
|
are executing or what they are presently doing on the system. Run time is
|
|
telling us what time they logged in. They are using military time. Now under
|
|
systat you can find: System File Structures, Busy devices, Height segments, and
|
|
Disk Structure. Don't worry about that stuff now.
|
|
|
|
Now you've finally got yourself some PPN's, well the next thing to do is to
|
|
login using the procedure I showed you with Log. Enter the PPN xx,xx, and try
|
|
to hack out some passwords.
|
|
|
|
I will now give you a list of passwords which I have currently used to get
|
|
into a Dec10. If these passwords don't work well I am sorry you'll just have to
|
|
try some yourself.
|
|
|
|
Note: You can also make a little program having it testing out different PPN's
|
|
and Passwords.
|
|
|
|
List of Passwords--
|
|
-------------------------------------
|
|
Sex Dec Decnet
|
|
Games Test Dcl
|
|
System Computer Password
|
|
Help Link List
|
|
Secret Default Modem
|
|
Account Terminal Acsnet
|
|
Ppn Operator Connect
|
|
-------------------------------------
|
|
|
|
There are many more passwords people use but I just put some common ones.
|
|
|
|
You can also try random passwords like, AA, AAB, AB, CC, etc..
|
|
|
|
Now that is it on logging in. I spent a little too much time on this but
|
|
since this will be a two part file, I will discuss more commands that I don't
|
|
get around to discuss in here in part II. Now this file is intended for the
|
|
beginner so you experienced Dec hackers are bored now or will get bored later.
|
|
|
|
Note: If connected to Acsnet, just type AcsDec10 to access the Dec. Everything
|
|
else that I mentioned in the login will work.
|
|
|
|
[In the system]
|
|
|
|
Now will assume you've finally gotten into the system after hacking your
|
|
brains out. Now, this is how you will know you are in the system.
|
|
Example-
|
|
|
|
.Login 21,34
|
|
Password:
|
|
|
|
Note: You usually get two tries to enter PPN and Password.
|
|
|
|
The Dec will introduce itself, saying when the last time you were on, etc.
|
|
|
|
Also if you may do something like this to log-on.
|
|
|
|
.Log 12,34
|
|
JOB 51 NIH 7.01 KL 64-UC TT12
|
|
Password:[c/r]
|
|
Other jobs detached with same PPN:
|
|
Job 34 running SYSTAT in ^C state
|
|
Do you want to ATTACH to this job? yes
|
|
|
|
|
|
Attaching to job 34
|
|
|
|
Now, what you are doing is attaching to an idle PPN. See, while someone else
|
|
is on the system, about 10 minutes <max=15 mins> before you, they can input a
|
|
command that will allow them to logoff and he can attach back to that PPN when
|
|
he logs back on. That person will then be put to the place where he logged off
|
|
at. If I were using 'sys', and I logged off. I would use the command 'detach'.
|
|
Now the person would have 15 minutes to call back and attach to his PPN.
|
|
There's one other way to attach to an account. If the person doesn't type
|
|
something for awhile he will automatically be logged off and if you call within
|
|
15 minutes you may be able to attach to his PPN.
|
|
|
|
Note: You may still have to login.
|
|
|
|
Ok, we are now in the system after it has verified itself. What do we do? Well
|
|
first let's take another look at the "systat". We notice there is one other
|
|
person logged in. But we see he is in "exe", this means he is doing nothing or
|
|
he's detached. In other words, don't worry about it.
|
|
Now if we wanted to change our password, we would type-
|
|
|
|
/Password
|
|
|
|
After we do this, the system will ask us for our old password and our new
|
|
password, but we should leave the password the way it is so we won't be
|
|
discovered. But it's a good thing to know.
|
|
|
|
Now we can take a look at other users files. We can do this by typing-
|
|
|
|
Dir [*,*]
|
|
|
|
*=Wildcard
|
|
|
|
This will show you files of users who have their files set for public access.
|
|
Now lets say we want to take a look at someone's file. We would type-
|
|
|
|
Dir [12,11]
|
|
|
|
If 12,11 was the user number we wanted we would type that inside the brackets.
|
|
|
|
Now there are many types of files. Now you may have looked through someone's
|
|
dir, or looked through a wildcard and noticed some files. On most files you may
|
|
have seen the words 'txt' or 'exe'.
|
|
|
|
For exe you will type-
|
|
|
|
[PPN]filename.exe
|
|
|
|
for txt you will type-
|
|
type filename.txt
|
|
|
|
You may also see file types such as: dat, bas, cmd, pcl, bin, hlp, and some
|
|
others.
|
|
|
|
<1>Exe=executable, which means that you can run these files from the "."
|
|
prompt.
|
|
|
|
<2>Txt=Text, these are text files which may contain: information, data or other
|
|
numerous things. These are files you may see on most every user who has a
|
|
public directory, and I find the most popular on Dec-10's.
|
|
|
|
<3>Bas=Basic, these files are written in of course basic, and must be used in
|
|
basic. To enter that on a Dec-10, just simply type Run Bas or if that doesn't
|
|
work type plain old basic.
|
|
|
|
Note: The basic files are to be used like any other basic file, load them up
|
|
and run them.
|
|
|
|
These are the most common files you may encounter. But when you master those
|
|
types of files you can go on and check out the other types of files.
|
|
|
|
Another way of reading files, is by typing-
|
|
|
|
File:[*,*]<command>
|
|
Once again the '*' is the wildcard.
|
|
|
|
[Creating a Directory]
|
|
|
|
To create a directory you can type at the main prompt- 'Credir'
|
|
|
|
There are 2 levels for a directory, the first level is-
|
|
|
|
Class and the second is Tvedit.
|
|
|
|
Now say we have a nice prived account, so we can have a 2 level directory. We
|
|
would type-
|
|
|
|
Create Directory:[,,class,tvedit]
|
|
|
|
The Dec-10 would reply by saying-
|
|
|
|
Created Dska0:[x,x,class]Sfd/protec:775
|
|
Created Dska0:[x,x,class,tvedit]sfd/protec:755
|
|
|
|
|
|
x,x=The PPN you are using, and the Dska0 is the device.
|
|
|
|
Now we can name our directory by typing-
|
|
|
|
/Name:<what you want to call it>
|
|
|
|
Note: You don't need the brackets.
|
|
|
|
We can protect it by typing:
|
|
|
|
/Protect:<name>
|
|
|
|
There are more '/' commands so you can take a look at them by doing '/help'.
|
|
|
|
Enough of directories.
|
|
|
|
[Privs]
|
|
|
|
What almost every hacker wants when he logs onto a system is an account with
|
|
privileges. If we have an account with privileges we can make our own account
|
|
and do some other worth while things. Now on a Dec10 a prived account almost
|
|
always begins with a '1'. Ex- 1,10. Now we can check the system status (sys)
|
|
and see if we see anyone under a 1,x account. If we do then we can begin
|
|
hacking the password. Now if you get in under '1,2' well that's another story.
|
|
Hehe. Now say we do get in under a privileged account. Now first of all to
|
|
activate our prived accounts we would type 'enable' this will either give us a
|
|
'$' prompt or a '#' prompt. Whichever, it doesn't matter. We can still do what
|
|
we have to do. Now let's say we want to make up a nice account, we would type-
|
|
|
|
$Build[x,x] or Create[x,x]
|
|
|
|
After we do that we can edit that PPN or if it's new make up our own.
|
|
Now, I should've mentioned this before but, if you get in on a 1,x account
|
|
make sure there is not another user logged in under the same account. If it is
|
|
they may change the password, but even if they are in 'exe' and may be detached
|
|
we don't want to take any chances now. Now I suggest going on in the late
|
|
evening, early morning or if your home from school one day just call at noon or
|
|
so.
|
|
|
|
There are many different levels of privs, there's the operator, wheel, and
|
|
CIA. CIA being the highest since you can do anything and everything.
|
|
Now if you have operator privs you can do the above which was make up an
|
|
account and create a nice directory. This will also be nice when attempting to
|
|
get into Decnet.
|
|
|
|
Now also if you make up a prived account, you should type-
|
|
|
|
Help Phones <as I mentioned before>
|
|
|
|
At the main prompt. You will get a list of phone numbers including the system
|
|
operator's number and system managements. Now they are open usually from 10am
|
|
to 5pm. Call during those hrs. and ask them if you can have a Decsystem
|
|
timesharing guide. They will ask you questions like what's your name, PPN and
|
|
password so have that ready. If they ask you why didn't you already receive
|
|
one, just say you've just gotten a account and you were never informed about
|
|
the manual.
|
|
|
|
This manual is very helpful. It will tell you commands, explain them in
|
|
detail, new features, games, etc. Don't order the manual the day you get your
|
|
account, wait maybe 4 days or so, then give them a call. They will usually send
|
|
it out the next day, unless they get lazy like most of the system operators do.
|
|
It's usually safe to have it sent to your house, but if you feel nervous well
|
|
get it sent to another place.
|
|
|
|
[Mail Subsystem]
|
|
|
|
Sometimes you may know of a friend who also has an account on the same Dec10
|
|
you are on. Your friend may not be on the system right now, so that eliminates
|
|
sending messages to him. But there is 1 alternative which is to send mail. With
|
|
mail you need the person's name. To access mail type-
|
|
|
|
Run Mail
|
|
|
|
You will then receive the prompt 'MailC', at this prompt you type-
|
|
|
|
MailC:Send
|
|
|
|
Now you will be asked questions on who you want to send the mail to. It will
|
|
look something like this-
|
|
|
|
.Run Mail
|
|
MailC:Send
|
|
|
|
to:Death Hatchet
|
|
Subject:Disk Crash
|
|
Text:
|
|
|
|
Yo! My file disk got ruined with //e Writer. See ya.
|
|
|
|
Now when your finished with your text just type '.done' or '.d' on a blank
|
|
line to indicate that your finish. The Dec10 will reply by saying-
|
|
|
|
Death Hatchet--Sent
|
|
|
|
-and will return you to the 'MailC' prompt. Now if you wanted to send the same
|
|
message to two people you would do everything I did above except when it says
|
|
'to:' you would type-
|
|
|
|
To:Death Hatchet,The Rico
|
|
|
|
The only difference is the comma. You MUST have the comma separate the two
|
|
names in order for the system not to take it as one whole name. Once the mail
|
|
has been sent, the user Death Hatchet will receive it when he logs on. After he
|
|
gets the little welcome messages and his stats from when he last logged on, the
|
|
mail will automatically be read to him like this-
|
|
|
|
From:Carrier Culprit Postmark:20-Mar-86-08:12:27
|
|
to:Death Hatchet
|
|
Subject:Disk Crash
|
|
|
|
Yo! My file disk got ruined with //e Writer. See ya.
|
|
|
|
It will then read other pieces of mail if he has any more. If not, it will
|
|
just go to the main prompt. If you want to read the mail again, go to the mail
|
|
section and type 'read' instead of send. You will then be able to save it for
|
|
your next call or kill it. Sometimes mail won't show up when you first logon so
|
|
go to the mail section anyway and check just in case.
|
|
|
|
On some of the older Dec10 systems mail was not used, you would just send a
|
|
message. Mail was added to the Dec10 system in the mid 70's. No big deal, but
|
|
just something to know. If you run mail and you don't get into the mail section
|
|
try 'run mai'. The 'run mai' is used on some of the earlier systems, but
|
|
usually the system acknowledges both.
|
|
|
|
Never send violent mail to system operators, they will log you off and do away
|
|
with your account. If you do, I suggest having another account (PPN) on hand.
|
|
On some of the newer Dec10 systems, you can forward mail, which you do by
|
|
typing 'Frd Mail' at the 'MailC' prompt. The system will then ask you where you
|
|
want it forwarded to, their password, your password. The system operator views
|
|
this and checks with both parties and he/she will leave you mail saying that it
|
|
is done. This is really being tested but I've seen it in operation on some
|
|
Dec10's in 714.
|
|
|
|
[Information]
|
|
|
|
This is another handy command that can be used to your advantage. It gives you
|
|
information on jobs and PPN's. You don't get passwords but you can get some
|
|
good stats. If you type 'info' or 'help info' you will get a list that would
|
|
look something like this-
|
|
To look at one of the following do-- Info XXXX
|
|
|
|
Switch Meaning
|
|
====== =======
|
|
. Information on your job
|
|
[??,??] Information on that PPN
|
|
ALL Information on all PPN's
|
|
ALL:LOPR Information on all Local Operator Jobs(1,2)
|
|
ALL:OPR Information on all Operator jobs (1,2)
|
|
ALL:ROPR Information on all Remote Operator jobs
|
|
ALL:Users Information on all users
|
|
Batch Information on all batch jobs
|
|
Detached:ALL Information on all Detached PPN'S
|
|
Detached:OPR Information on all Detached Operator jobs
|
|
Detached:Users Information on all Detached users
|
|
Detached:LOPR Information on all Local Operator jobs
|
|
|
|
And the list goes on. If you want the whole list just type 'Help Info'. It
|
|
will also give info on disk devices, directories, and other stuff. Some of the
|
|
Dec10 systems don't support this, but you will find that most of them do.
|
|
|
|
The '1,2' which is next to the Operators are system operator accounts. I
|
|
mentioned that before, so you won't get confused. Most files are kept under
|
|
this account so if you get in under it you'll have a lot to do....hehehe.
|
|
|
|
[Watch]
|
|
|
|
This command will show you your stats. You will be able to toggle it. You can
|
|
toggle it on which will display on the top of your screen or just look at it
|
|
once. The watch will show you-
|
|
|
|
Run---which means your CPU time.
|
|
Wait--which means your elapsed time since started.
|
|
Read--number of disk blocks you have read.
|
|
Write--number of disk blocks you have written.
|
|
|
|
If you have system privs, type-
|
|
|
|
Watch[x,x]
|
|
|
|
You can watch another person if you have these privs. It will also show you
|
|
information. Many operators use this so be careful in what you type.
|
|
|
|
[Other commands]
|
|
|
|
If you want to find out some information about someone type-
|
|
|
|
Who Their name job# TTY
|
|
|
|
Now I could do something like-
|
|
|
|
Who Carrier Culprit 4 #7
|
|
|
|
This is saying that Carrier Culprit is logged in on job 4 and is on TTY #7. The
|
|
monitor will also display the user's PPN, and other information dealing with
|
|
his status on the system.
|
|
-------------------------------------------------------------------------------
|
|
Now if you notice one of your friend's are on TTY10 and you want to send him a
|
|
message you can type-
|
|
|
|
Send TTY10 Congratulations on passing your exam
|
|
|
|
The user on TTY10 will receive the message and may have the capability of
|
|
replying. You can also use this to meet new friends, especially a system
|
|
operator who is pretty cool and can give you some accounts, but don't count on
|
|
it.
|
|
-------------------------------------------------------------------------------
|
|
|
|
If you would like to talk to someone one on one, you can type-
|
|
|
|
Talk TTY10
|
|
|
|
You will now be able to talk to each other, chat, but like I said, watch what
|
|
you say sometimes, but don't get to paranoid that the system operator is
|
|
watching. Usually if the system operator is under 'Watch' or 'Exe' he may be
|
|
watching a certain user. This is just basically a chat system, so have fun with
|
|
it.
|
|
-------------------------------------------------------------------------------
|
|
|
|
If you have a prived account go into 'enable' and type-
|
|
|
|
Whostr
|
|
|
|
This will give information about users logged in and the directories.
|
|
-------------------------------------------------------------------------------
|
|
|
|
If you need the time, just type 'time'. If you have math homework just type
|
|
'aid' for desktop calculator.
|
|
-------------------------------------------------------------------------------
|
|
|
|
Ctrl-characters Case Commands
|
|
=============== =============
|
|
ctrl-s = pause If you support lower case type:
|
|
ctrl-q = resume 'Set Terminal LC'
|
|
ctrl-c = abort
|
|
ctrl-h = backspace
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
[Decnet]
|
|
|
|
Is supported by all Digital computers. To access it, type 'Decnet' and try to
|
|
hack out the password. Decnet supports such nodes as, VMS, TOPS10 (operating
|
|
system for Dec10's), TOPS20, and others. Usually system operator's accounts can
|
|
be helpful if you need a Decnet pw. Try their pw and see if it works. Usually
|
|
the password to Decnet can be plain old "Decnet". Format= Set Host xxxx
|
|
|
|
[Acsnet]
|
|
|
|
This is probably my favorite. This supports Dec10, and many other computers.
|
|
When you log on to it, it will look something like this-
|
|
|
|
ACSNET
|
|
Fri Mar 13 19:30:23 1986
|
|
Port ID: dialup C502 at 300 baud
|
|
|
|
dialup C502 with even parity
|
|
|
|
>
|
|
|
|
Now to get a menu type '?'. It will give you a list of groupnames. To enter
|
|
the Dec10 type 'Acsdec10', usually Decnet is not listed so type Decnet anyway.
|
|
Other commands for ACSNET are-
|
|
|
|
Connect Daytime
|
|
Hangup Disconnect
|
|
Info Help
|
|
Release Resume
|
|
Set WhoamI
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Hmm. Knew I forgot something. To log off the Dec10, just type-
|
|
Bye or Kjob (kill job)
|
|
|
|
Part II: This will deal with the 1,2 PPN and advanced commands using Enable.
|
|
|
|
Have fun,
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$->Carrier Culprit<-$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
|
|
[END]
|
|
Revised Edition
|
|
(C)opyright April, 1986
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #4 of 12
|
|
|
|
+---------------------+
|
|
| Hand-To-Hand Combat |
|
|
| |
|
|
| by |
|
|
| |
|
|
| [bad boy in black] |
|
|
+---------------------+
|
|
|
|
on
|
|
|
|
^*^ 3/31/86 ^*^
|
|
|
|
_______________________________________________________________________________
|
|
|
|
This file will teach you how you can kill another person with your own two
|
|
hands. The information presented here will be very helpful to the beginner and
|
|
will also serve as a refresher for those of you already familiar with the
|
|
subject.
|
|
|
|
I will start off by talking about basic things such as stance, what you should
|
|
and shouldn't do when fighting and other information that the beginner will
|
|
need to know. Then, I will give you a list of over 20 vulnerable points that
|
|
one should always try attacking in a fight along with the way these points
|
|
should be attacked. Finally, I will give you some more fighting tips and
|
|
information on how you can continue learning about hand-to-hand combat.
|
|
|
|
^*^
|
|
|
|
Now, let me discuss some of the basics you will need to know when you are in
|
|
any combat situation.
|
|
|
|
Stance
|
|
------
|
|
The best stance when confronting an enemy is to put your feet at shoulders
|
|
length apart and your arms should be facing forward, parallel to each other and
|
|
bent at the elbows. Keep your knees slightly bent and stand on the balls of
|
|
your feet.
|
|
|
|
Remember, you always want to maintain this stance when you are not striking at
|
|
the enemy.
|
|
|
|
Balance
|
|
-------
|
|
It is always important that you keep your balance. If you use the stance I have
|
|
described above, you will never have to worry about it. If by chance you do
|
|
lose your balance even for a second you can kiss your ass goodbye as the enemy
|
|
will probably kill you.
|
|
|
|
Aggressiveness
|
|
--------------
|
|
Always be aggressive and always attack. Don't just stand back and defend
|
|
yourself against the enemy's strikes as he will end up killing you eventually.
|
|
If you are not aggressive, the enemy will think you are scared and he will have
|
|
an advantage over you.
|
|
|
|
A great thing to do is yell at the enemy. This will scare the shit out of him
|
|
if you start yelling at him and plus it also allows you to get more oxygen in
|
|
your lungs so you will have more strength.
|
|
|
|
Natural Weapons
|
|
---------------
|
|
Your natural weapons are as follows: knife edge of either hand, the heel of
|
|
your hands, your fingers folded at the second knuckle, your boot, your elbow,
|
|
your knees, your teeth, your fore finger and second finger forming a "V" shape,
|
|
and your fist. These body parts alone are some of the most powerful weapons you
|
|
can use.
|
|
|
|
^*^
|
|
|
|
Since you now know the basics of fighting, let me list for you the best places
|
|
where you should strike your enemy.
|
|
|
|
Temple
|
|
------
|
|
A sharp blow to the temple ensures instant death since there is a large artery
|
|
and nerve located close to the skin surface. If you give a medium blow to the
|
|
temple it will cause severe pain and concussion but a hard blow will kill the
|
|
enemy instantly. The best way to strike the temple is with the knife edge of
|
|
your hand or if he is on the ground you can kick him with the toe of your boot.
|
|
|
|
Eyes
|
|
----
|
|
The eyes are a great place to strike if you can since a good strike in the eyes
|
|
will cause temporary or permanent blindness. To blind the enemy, make a "V"
|
|
shape with your fore finger and second finger and stick them into his eyes
|
|
while keeping your fingers stiff. Also, you can gouge the eyes with your thumb.
|
|
|
|
Nose
|
|
----
|
|
The nose is another excellent place to attack. Hit the bridge with the knife
|
|
edge of your hand and you will cause breakage, severe pain, temporary blindness
|
|
and even death. Or you can use the palm of your hand to strike upwards and push
|
|
the nose up into his brain. If done hard enough the nose bone will puncture his
|
|
brain and he will die.
|
|
|
|
Upper Lip
|
|
---------
|
|
The upper lip contains a lot of nerves close to the skin surface so if you
|
|
strike it with the knife edge of your hand it will cause great pain and if
|
|
delivered hard enough he will become unconscious.
|
|
|
|
Mouth
|
|
-----
|
|
If the enemy is on the ground, use the heel of your boot and strike him on the
|
|
mouth. Since there are a lot of veins and arteries in the teeth there will be a
|
|
lot of blood which will frighten the enemy and he will lose concentration on
|
|
defending other parts of his body.
|
|
|
|
Chin
|
|
----
|
|
The chin should only be struck with the palm of your hand as you can break your
|
|
fingers on the enemy's chin. Use the palm of your hand and strike the enemy
|
|
with a very strong upward blow. This will cause extreme discomfort.
|
|
|
|
Adam's Apple
|
|
------------
|
|
Usually the enemy will defend this part of his body well but if you do get the
|
|
chance give it a sharp hit with the knife edge of your hand. If you hit it hard
|
|
enough you will bust his windpipe and he will die. You can also squeeze the
|
|
Adam's Apple between your fingers.
|
|
|
|
Esophagus
|
|
---------
|
|
If you have a chance to get a hold of his neck, press your thumbs into his
|
|
esophagus (located below the Adam's Apple). Pushing hard will be very painful
|
|
and it will block the oxygen flow to his lungs and he will die quickly.
|
|
|
|
Neck
|
|
----
|
|
If you give a very strong blow to the base of the neck with the knife edge of
|
|
your hand you will usually break it. However, if it is not hard enough, the
|
|
enemy might just be knocked unconscious so be sure to hit him in the temple or
|
|
twist his neck around to be sure he is dead. The neck is the best place to hit
|
|
someone if you want to be quiet as it is quick and the enemy goes down without
|
|
a word.
|
|
|
|
Collar Bone
|
|
-----------
|
|
The collar bone is an extremely sensitive part of the body. A sharp blow to it
|
|
with the knife edge of your hand or your elbow gives the enemy excruciating
|
|
pain. Also, digging your finger into the collar bone can bring your enemy to
|
|
his knees.
|
|
|
|
Shoulder
|
|
--------
|
|
The shoulder is easy dislocated and it takes little strength to do. However, it
|
|
should be done quickly. Grab the enemy's arm and pull it behind his back and
|
|
then jerk it upwards quickly. You should here a popping sound which means you
|
|
have dislocated the enemy's shoulder. There are other methods of doing this but
|
|
this is the easiest.
|
|
|
|
Armpit
|
|
------
|
|
Although it is hard to get at, the armpit has a large network of nerves. If the
|
|
enemy is on the ground, hold up his arm and then kick him in his pit. This will
|
|
cause severe pain. However, it is not a very common place that will be struck
|
|
in a fight but is good to keep in mind anyways.
|
|
|
|
Rib Cage
|
|
--------
|
|
A strike to the rib cage with your fingers folded at the second knuckle is
|
|
rather painful and if done hard enough causes severe pain and breakage. Only
|
|
use your fingers folded at the second knuckle since that hurts the most.
|
|
|
|
Solar Plexus
|
|
------------
|
|
The solar plexus is located on the chest at the little "V" shaped point where
|
|
the rib cage ends. There are a large amount of nerves so a blow with the
|
|
knuckle of your second finger can cause severe pain and even unconsciousness.
|
|
|
|
Floating Ribs
|
|
-------------
|
|
The floating ribs are the lower ribs located at the front and sides of the
|
|
enemy's body. Use the knife edge of your hand or the heel or toe of your boot.
|
|
The blow will cause pain and will stun the enemy.
|
|
|
|
Spine
|
|
-----
|
|
A blow to the spine with the heel of your boot can paralyze or kill your enemy.
|
|
The lower spine between the enemy's kidneys is the best place to hit as that is
|
|
the least protected part of the spine. You will only be able to attack the
|
|
spine when your enemy is on the ground or if his back is turned to you.
|
|
|
|
Kidneys
|
|
-------
|
|
The kidneys have two large nerves that are close to the skin surface. If you
|
|
strike the kidneys hard it will cause death. You can use a fist or the knife
|
|
edge of your hand to hit the kidneys. Or a kick with the heel of your boot will
|
|
work too.
|
|
|
|
Groin
|
|
-----
|
|
The groin is a good place to strike if you get the chance. Generally, the enemy
|
|
will protect this area the most but if you have a chance, strike it with your
|
|
knee in an upward motion or with your fist. I'm sure you can imagine the pain
|
|
the enemy will get from it.
|
|
|
|
Tailbone
|
|
--------
|
|
The tailbone which is located above the anus is a very sensitive part of the
|
|
body as a lot of spinal nerves are located there. Use the toe of your boot to
|
|
strike the tailbone. The pain from that is unbelievably severe.
|
|
|
|
Elbow
|
|
-----
|
|
The elbow is easy to break or dislocate. Pull the enemy's arm behind him and
|
|
with the palm of your hand push his elbow inwards until it either cracks or
|
|
pops. When the enemy has a useless arm, you have a great advantage over him.
|
|
|
|
Fingers
|
|
-------
|
|
The fingers should be broken because the enemy becomes almost helpless with
|
|
broken fingers. Grab the enemy's arm with one hand and with the other hand push
|
|
the fingers upwards until they snap. It is only necessary to break the first
|
|
two fingers. It is also helpful in breaking a grip.
|
|
|
|
Knee
|
|
----
|
|
You can destroy the knee by kicking it with the side of your boot in an upward
|
|
motion. This will rip the ligaments and the cartilage. This will cause
|
|
unbelievable pain and make it impossible for the enemy to move around. Once a
|
|
knee has been ruined, you will have a great advantage over the enemy.
|
|
|
|
Ankle
|
|
-----
|
|
If the enemy is on the ground, get a hold of his ankle and twist it until it
|
|
snaps. This will make it almost impossible for him to walk and he will then be
|
|
easy to kill.
|
|
|
|
^*^
|
|
|
|
Let me talk about some more important things you should remember when you are
|
|
fighting somebody.
|
|
|
|
Tactics
|
|
-------
|
|
Always try to throw your enemy off balance. You can do this by charging the
|
|
enemy and pretending to strike him. This will make him flinch and lose his
|
|
balance.
|
|
|
|
Always look for a weak spot and attack it. Whenever he leaves a vulnerable part
|
|
of his body unprotected attack it with all your strength. By doing this, he
|
|
will then try to protect the part of his body that you just struck thus leaving
|
|
even more unprotected parts open.
|
|
|
|
Use any available object that you can. By this I mean throw sand in his eyes,
|
|
block his strikes by hitting him with a large branch, or any other kind of
|
|
available material that can be used as a weapon against him.
|
|
|
|
Foul Play
|
|
---------
|
|
In a life or death situation there is no such thing as foul play and there are
|
|
no rules either. Although hitting someone in the groin is considered a cheap
|
|
shot in high school, it is a very effective way of destroying your enemy. Just
|
|
hit him where you can and kick him when he's down. That way, he will never get
|
|
back up again.
|
|
|
|
^*^
|
|
|
|
I have now explained to you the basics of fighting and the best places to
|
|
attack your enemy on his body. Just because you have read this file doesn't
|
|
mean you will be able to go out and kick somebody's ass in. These methods take
|
|
a lot of practice in order to do them properly.
|
|
|
|
If you enjoyed this file and would like to practice these methods get a partner
|
|
who is also interested in this and work on each type of strike and kick. When
|
|
you first start out, go slowly and remember that these methods are deadly and
|
|
do not require much force to be effective so take it easy on your partner.
|
|
|
|
Some of you may decide that practicing is not enough and you would like to
|
|
learn more than what I have told you in the above. Well, there are several good
|
|
books with illustrations on this subject which go into much more detail than I
|
|
ever could in this file. The book I used mainly to write this file was "The
|
|
Marine Corps Field Manual on Physical Security". You can get this book through
|
|
a good book store or if you happen to know a marine, he can get you a copy very
|
|
easily.
|
|
|
|
There are also camps where you can go for 1-2 weeks to learn all sorts of
|
|
things like this such as firing weapons, detailed hand-to-hand combat, doing
|
|
raids on enemies and all sorts of other stuff like that. The instructors that
|
|
teach these programs are well trained and have had years of experience with
|
|
this. However, usually you have to be 18 years or older to get into these
|
|
programs and you have to be very serious about it as well. This is not one of
|
|
those programs where you can say "Time-out, I need to rest." They don't stop
|
|
just to suit you. To get more information about these programs, you can usually
|
|
find out about them in magazines like "Soldier of Fortune" and other magazines
|
|
with similar theme.
|
|
|
|
^*^
|
|
|
|
Well, that's it for now. Perhaps in the future I can discuss the fun stuff like
|
|
fighting people with knives and all the other lethal weapons you can use in a
|
|
fight. If you liked this file, let me know and I will continue on with this
|
|
subject.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #5 of 12
|
|
|
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
@ _ _ _______ @
|
|
@ | \/ | / _____/ @
|
|
@ |_||_|etal / /hop @
|
|
@ __________/ / @
|
|
@ /___________/ @
|
|
@ Private/AE/Brewery @
|
|
@ @
|
|
@ Presents: @
|
|
@ @
|
|
@ Digital Multiplex System (DMS) 100 @
|
|
@ by @
|
|
@ Knight Lightning @
|
|
@ @
|
|
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
|
|
|
This file is of course about DMS 100. Expect full length files about the other
|
|
variations of DMS (DMS 200 & 250) coming a later date. Much of the information
|
|
in this file was obtained from manuals acquired from Jester Sluggo. Note: IBN
|
|
stands for Integrated Business Network.
|
|
_______________________________________________________________________________
|
|
|
|
DMS-100
|
|
-------
|
|
The DMS-100/IBN consists of electronic business sets and standard telephones,
|
|
data units, and attendant consoles, all located on the customer's premises; and
|
|
DMS-100 digital switching, and support hardware/software, located at the
|
|
telephone company's premises. Together they create an integrated business
|
|
communications network that provides an unparalleled combination of features
|
|
and benefits.
|
|
|
|
o DMS-100/IBN integrates voice and data in a total business communications
|
|
system.
|
|
|
|
o Effectively serves all sizes of organizations, from small businesses using
|
|
only a few lines, to the most complex network systems with up to 30,000
|
|
lines.
|
|
|
|
o The IBN system monitors and controls its own operations automatically;
|
|
diagnoses problems; and in some cases, does its own repairs.
|
|
|
|
o Fully modular, to meet present needs, and accommodate new features as they
|
|
are needed.
|
|
|
|
o Cost effective: Helps control communications costs through more efficient
|
|
use of facilities; centralization of attendant service where needed; Call
|
|
Dial Rerouting (CDR) to control and restrict long-distance calling; and
|
|
network management.
|
|
|
|
o Worry free operation-Northern Telecom's DMS-100 digital switches are backed
|
|
up by highly trained telephone company personal.
|
|
-------------------------------------------------------------------------------
|
|
Some of the other features that DMS 100 has include:
|
|
|
|
o Automatic Route Selection - automatically routes long distance calls over
|
|
the most economical route available.
|
|
|
|
o Station Message Detail Recording - provides a detailed record of long
|
|
distance charges, including the originating number, time, and duration,
|
|
authorization code, etc.
|
|
|
|
o Direct Inward System Access (DISA) - enables company personnel to use
|
|
cost-saving company facilities for long distance calling, even from outside
|
|
the company.
|
|
-------------------------------------------------------------------------------
|
|
System Features and Benefits
|
|
-------------------------------------------------------------------------------
|
|
Note: I will list all the features, but I will only go into detail about the
|
|
important ones.
|
|
|
|
ATTENDANT CONSOLE
|
|
-----------------
|
|
Call Waiting Lamp
|
|
Loop Keys - There are 6 loop keys, each with its associated source and
|
|
destination lamp to indicate the calling and called party states.
|
|
Alphanumeric Display
|
|
Multiple Directory Numbers
|
|
Feature Keys - Up to a total of 42. Some of them could be used for Speed
|
|
Calling and Paging System.
|
|
Incoming Call Identifier
|
|
Exclude Source/Exclude Destination - privacy keys
|
|
Signal Source/Signal Destination: Release Source/Release Destination
|
|
|
|
Console Features
|
|
----------------
|
|
Access to paging Call hold
|
|
Call detail entry Remote console
|
|
Call Selection Console display
|
|
Camp-on Automatic recall
|
|
Conference - 6 port Two-way splitting
|
|
Non-delayed operation Attendant transfer
|
|
Locked loop operation Busy verification of lines
|
|
Manual and automatic hold Multiple console operation
|
|
Busy verification of trunks Switched loop operation
|
|
Trunk group busy indication Uniform call distribution form queue
|
|
Multiple listed directory numbers Control of trunk group access
|
|
Secrecy Night service
|
|
Serial call Speed calling
|
|
Lockout Delayed operation
|
|
Position busy Interposition calling
|
|
Through dialing
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
ELECTRONIC BUSINESS SETS
|
|
------------------------
|
|
LCD Indicators
|
|
Call Forwarding
|
|
Automatic Line
|
|
Call Pick-up
|
|
Ring Again - automatically redials busy numbers until they are free
|
|
Multiple Directory Numbers
|
|
Intercom
|
|
Speed Call
|
|
Call Transfer/Conference
|
|
On-Hook Dialing
|
|
|
|
Additional Programmable Features
|
|
--------------------------------
|
|
Automatic Hold
|
|
Listen-on Hold
|
|
Multiple Appearance Directory Numbers (MADN)
|
|
- Single Call Arrangement
|
|
- Multiple Call Arrangement
|
|
Privacy Release
|
|
Tone Ringing with Volume Control
|
|
End-to-End Signaling
|
|
Call Park
|
|
Make Set Busy
|
|
Malicious Call Trace
|
|
Busy Override
|
|
Attendant Recall
|
|
Call Waiting
|
|
Stored Number Redial
|
|
Private Business Line
|
|
32 Character Alphanumeric Display
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
DATA UNIT
|
|
---------
|
|
The DMS-100/IBN Data Unit makes information accessing as easy to learn and to
|
|
use as the telephone. It can be used as a "Standalone" or attached to the
|
|
Business Set or standard telephone, for integrated voice and data telephone
|
|
telecommunications.
|
|
|
|
Transmits over simple 2-wire loops, at speeds of up to 56 kb/s, using Northern
|
|
Telecom's proprietary Time Compression Multiplexing technology; Compatible with
|
|
existing computer and data terminal equipment, and is available in different
|
|
low-speed and high-speed models, to suit existing terminal capacity.
|
|
|
|
Benefits
|
|
--------
|
|
o Combines with Business Set or standard telephone, to provide integrated
|
|
voice/data communications.
|
|
|
|
o Your data unit and telephone can operate together simultaneously or totally
|
|
independent of each other.
|
|
|
|
o Fully digitalized, eliminating bulky analog modems.
|
|
|
|
o Ring Again (constant redial on busy numbers)
|
|
|
|
o Speed Calling
|
|
-------------------------------------------------------------------------------
|
|
For further information contact:
|
|
|
|
Digital Switching Systems Sales
|
|
Northern Telecom Inc.
|
|
P.O. Box 13010
|
|
4001 East Chapel Hill -- Nelson Highway
|
|
Research Triangle Park
|
|
North Carolina 27709
|
|
Tel: (919) 549-5000
|
|
|
|
Switching Group Sales, Department S-70
|
|
Northern Telecom Canada Limited
|
|
8200 Dixie Road, P.O. Box 3000
|
|
Brampton, Ontario
|
|
L6V 2M6
|
|
Tel: (416) 451-9150
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #6 of 12
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|\_______________________ A new Anarchy toy!____________________________/ |
|
|
|_________________________________________________________________________|
|
|
\________________________________________________________________________/
|
|
|
|
<otherwise known as "Know Your Hardware">
|
|
|
|
Written and typed by the Leftist.
|
|
---------------------------------
|
|
|
|
This new "bomb" isn't really all that destructive, although I would hate to
|
|
be nailed in the head by a flying piece of it. Use it to scare dogs, and to
|
|
just raise hell.
|
|
|
|
|
|
Materials: You will need- 1 nut, fairly large in size, 2 bolts, both the same
|
|
size, which will both be the correct size to fit in the nut. You will also
|
|
need a box of strike-anywhere wooden kitchen matches.
|
|
|
|
|
|
|
|
Design: Ok, you got all your stuff? Let's begin. Take one of the bolts and
|
|
the nut and screw it about 1/4 the way onto the nut. It should look like this
|
|
<sort of>
|
|
___ |---|
|
|
| |______________________| |
|
|
| _|_|___|__|__|__|_|___| |
|
|
|__| |---|
|
|
bolt ^ ^
|
|
| nut |
|
|
|
|
|
|
Ok, take the matches, and there should be a 2 colored tip on the end. Well,
|
|
cut the top layer off (this should be done with a razor blade) carefully, as to
|
|
not set the matches off. Ok. Got that? Good, now, take about, oh, four or
|
|
five heads, or if you're feeling kind of dangerous, and can fit them, try six.
|
|
Put the heads <white part> into the space that is between the other side of the
|
|
bolt and the nut. Now, carefully, take the other bolt and screw it down kind
|
|
of tight onto the other side. You now should have the 2 bolts connected by the
|
|
nut, and the matches in between this whole hardware contraption.
|
|
|
|
Now what??!?
|
|
|
|
Take this thing, and throw it at something solid, and hard, like the street,
|
|
for instance, and be sure you throw it kinda hard, and kinda far. These can be
|
|
a lot of fun, and only take a second to build.
|
|
Received: (from LISTSERV@PSUVM for TK0EEE1@UCLAMAIL via NJE)
|
|
(LISTSE00-7268; 153 LINES); Tue, 19 Dec 89 17:45:31 CST
|
|
Date: Tue, 19 Dec 89 17:45 CST
|
|
To: TK0EEE1
|
|
From: LISTSERV@PSUVM
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #7 of 12
|
|
|
|
Jester Sluggo presents
|
|
an insight on
|
|
Wide-Area Networks
|
|
Part 1
|
|
|
|
Part 1 contains information on ARPANET and CSNET.
|
|
Part 2 contains information on BITNET, MFENET, UUCP and USENET.
|
|
It is best if you read both files to better understand each other.
|
|
|
|
These files will cover general information on wide-area networks, (I.E.
|
|
ARPANET, CSNET, BITNET, MFENET, UUCP and USENET), but may contain information
|
|
in relationship with other networks not emphasized in these files. These files
|
|
are NOT a hacker's tutorial/guide on these systems.
|
|
|
|
ARPANET
|
|
~~~~~~~
|
|
ARPANET. The ARPANET, which is a major component of the NSFnet [National
|
|
Science Foundation Network], began in 1969 as an R&D project managed by DARPA
|
|
[Dept. of Defense Advanced Research Projects Agency]. ARPANET was an experiment
|
|
in resource sharing, and provided survivable (multiply connected), high
|
|
bandwidth (56 Kilobits per second) communications links between major existing
|
|
computational resources and computer users in academic, industrial, and
|
|
government research laboratories. ARPANET is managed and funded by by the DCA
|
|
[Defense Communications Agency] with user services provided by a network
|
|
information center at SRI International.
|
|
ARPANET served as a test for the development of advanced network protocols
|
|
including the TCP-IP protocol suite introduced in 1981. TCP-IP and
|
|
particularly IP, the internet protocol, introduced the idea of inter-
|
|
networking -- allowing networks of different technologies and connection
|
|
protocols to be linked together while providing a unified internetwork
|
|
addressing scheme and a common set of transport of application protocols. This
|
|
development allowed networks of computers and workstations to be connected to
|
|
the ARPANET, rather than just single-host computers. TCP-IP remain the most
|
|
available and advanced, non-vendor-specific, networking protocols and have
|
|
strongly influenced the current international standards of activity. TCP-IP
|
|
provide a variety of application services, including remote logon (Telnet),
|
|
file transfer (FTP), and electronic mail (SMTP and RFC822).
|
|
ARPANET technology was so successful that in 1982, the Dept. of Defense
|
|
(DOD) abandoned their AUTODIN II network project and adopted ARPANET technology
|
|
for the Dept. of Defense Data Network (DDN). The current MILNET, which was
|
|
split form the original ARPANET in 1983, is the operational, unclassified
|
|
network component of the DDN, while ARPANET remains an advanced network R&D
|
|
tested for DARPA. In practice, ARPANET has also been an operational network
|
|
supporting DOD, DOE [Dept. of Energy], and some NSF-sponsored computer science
|
|
researchers. This community has come to depend on the availability of the
|
|
network. Until the advent of NSFnet, access to ARPANET was restricted to this
|
|
community.
|
|
As an operational network in the scientific and engineering research
|
|
community, and with the increasing availability of affordable super-
|
|
minicomputers, ARPANET was used less as a tool for sharing remote computational
|
|
resources than it was for sharing information. The major lesson from the
|
|
ARPANET experience is that information sharing is a key benefit of computer
|
|
networking. Indeed it may be argued that many major advances in computer
|
|
systems and artificial intelligence are the direct result of the enhanced
|
|
collaboration made possible by ARPANET.
|
|
However, ARPANET also had the negative effect of creating a have--have not
|
|
situation in experimental computer research. Scientists and engineers carrying
|
|
out such research at institutions other than the twenty or so ARPANET sites
|
|
were at a clear disadvantage in accessing pertinent technical information and
|
|
in attracting faculty and students.
|
|
In October 1985, NSF and DARPA, with DOD support, signed a memorandum of
|
|
agreement to expand the ARPANET to allow NSF supercomputer users to use ARPANET
|
|
to access the NSF supercomputer centers and to communicate with each other.
|
|
The immediate effect of this agreement was to allow all NSF supercomputer users
|
|
on campuses with an existing ARPANET connection to use ARPANET. In addition,
|
|
the NSF supercomputer resource centers at the University of Illinois and
|
|
Cornell University are connected to ARPANET. In general, the existing ARPANET
|
|
connections are in departments of computer science or electrical engineering
|
|
and are not readily accessible by other researchers. However, DARPA has
|
|
requested that the campus ARPANET coordinators facilitate access by relevant
|
|
NSF researchers.
|
|
As part of the NSFnet initiative, a number of universities have requested
|
|
connection to ARPANET. Each of these campuses has undertaken to establish a
|
|
campus network gateway accessible to all due course, be able to use the ARPANET
|
|
to access the NSF supercomputer centers, from within their own local computing
|
|
environment. Additional requests for connection to the ARPANET are being
|
|
considered by NSF.
|
|
|
|
CSNET
|
|
~~~~~
|
|
CSNET. Establishment of a network for computer science research was first
|
|
suggested in 1974, by the NSF advisory committee for computer science. The
|
|
objective of the network would be to support collaboration among researchers,
|
|
provide research sharing, and, in particular, support isolated researchers in
|
|
the smaller universities.
|
|
In the spring of 1980, CSNET [Computer Science Network], was defined and
|
|
proposed to NSF as a logical network made up of several physical networks of
|
|
various power, performance, and cost. NSF responded with a five year contract
|
|
for development of the network under the condition that CSNET was to be
|
|
financially self-supporting by 1986. Initially CSNET was a network with five
|
|
major components -- ARPANET, Phonenet (a telephone based message relaying
|
|
service), X25Net (suppose for the TCP-IP Protocol suite over X.25-based public
|
|
data networks), a public host (a centralized mail service), and a name server
|
|
(an online database of CSNET users to support transparent mail services). The
|
|
common service provided across all these networks is electronic mail, which is
|
|
integrated at a special service host, which acts as an electronic mail relay
|
|
between the component networks. Thus CSNET users can send electronic mail to
|
|
all ARPANET users and vice-versa. CSNET, with DARPA support, installed
|
|
ARPANET connections at the CSNET development sites at the universities of
|
|
Delaware and Wisconsin and Purdue University.
|
|
In 1981, Bolt, Beranek, and Newman (BBN) contracted to provide technical
|
|
and user services and to operate the CSNET Coordination and Information Center.
|
|
In 1983, general management of CSNET was assumed by UCAR [the Univ. Corporation
|
|
for Atmospheric Research], with a subcontract to BBN. Since then, CSNET has
|
|
grown rapidly and is currently an independent, financially stable, and
|
|
professionally managed service to the computer research community. However,
|
|
the momentum created by CSNET's initial success caused the broad community
|
|
support it now enjoys. More than 165 university, industrial, and government
|
|
computer research groups now belong to CSNET.
|
|
A number of lessons may be learned from the CSNET experience.
|
|
1) The network is now financially self-sufficient, showing that a research is
|
|
willing to pay for the benefits of a networking service. (Users pay usage
|
|
charges plus membership fees ranging from $2000 for small computer science
|
|
departments to $30,000 for the larger industrial members.)
|
|
2) While considerable benefits are available to researchers from simple
|
|
electronic mail and mailing list services -- the Phonenet service -- most
|
|
researchers want the much higher level of performance and service provided by
|
|
the ARPANET.
|
|
3) Providing a customer support and information service is crucial to the
|
|
success of a network, even (or perhaps especially) when the users are
|
|
themselves sophisticated computer science professionals. Lessons from the
|
|
CSNET experience will provide valuable input to the design, implementation,
|
|
provision of user services, and operation and management of NSFnet, and, in
|
|
particular, to the development of the appropriate funding model for NSFnet.
|
|
CSNET, with support from the NSFnet program, is now developing the CYPRESS
|
|
project which is examining ways in which the level of CSNET service may be
|
|
improved, at low cost, to research departments. CYPRESS will use the DARPA
|
|
protocol suite and provide ARPANET-like service on low-speed 9600-bit-per-
|
|
second leased line telephone links. The network will use a nearest neighbor
|
|
topology, modeled on BITNET, while providing a higher level of service to users
|
|
and a higher level of interoperability with the ARPANET. The CYPRESS project is
|
|
designed to replace or supplement CSNET use of the X.25 public networks, which
|
|
has proved excessively expensive. This approach may also be used to provide a
|
|
low-cost connection to NSFnet for smaller campuses.
|
|
|
|
/
|
|
\
|
|
/ luggo !!
|
|
|
|
Please give full credit for references to the following:
|
|
Dennis M. Jennings, Lawrence H. Landweber, Ira H. Fuchs, David J. Faber, and W.
|
|
Richards Adrion.
|
|
|
|
Any questions, comments or Sluggestions can be emailed to me at Metal Shop,
|
|
or sent via snailmail to the following address until 12-31-1986:
|
|
|
|
J. Sluggo
|
|
P.O. Box 93
|
|
East Grand Forks, MN 56721
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #8 of 12
|
|
|
|
----------------------------
|
|
- Short-Wave Radio Hacking -
|
|
----------------------------
|
|
by
|
|
|
|
The Seker
|
|
|
|
Every day, tons of information is exchanged over the air waves. I have
|
|
found news agencies, military computers, businesses, and even hacks.
|
|
The standard method of exchange is called RTTY (Radio Teletype). It
|
|
usually is used at 66/7 words per min. Instead of using ASCII, Baudot, a 5 bit
|
|
character set is more widely used. There are many variations of it in use also.
|
|
|
|
There are many other types of transmission standards besides RTTY that are
|
|
commonly used. A few of the known:
|
|
|
|
FAX (Facsimile)
|
|
|
|
Helshcrieber- it's used to transmit pictogram-type alphabets (i.e.
|
|
Chinese, Jap, etc.) instead of the American letters.
|
|
|
|
SSTV- is similiar to Viewdata. Used for transmitting high-resolution
|
|
pictures mixed with text.
|
|
|
|
To start, you'll need to buy (card) a receiver (with a coverage of no less
|
|
than 500 kHz-30 MHz and a resolution greater than 100 Hz) and a high quality
|
|
antenna. These can usually be found at electronics stores. You will also need
|
|
to get an interface and some RTTY software for your particuliar computer. Look
|
|
in magazines like 'Amatuer Radio' or 'Ham Radio Today' for more information on
|
|
that shit. Another good place to check is a CB store.
|
|
|
|
|
|
|
|
NEWS AGENCIES-
|
|
|
|
From these you can find all sorts of crap. You may even intercept a story
|
|
being sent to the presses. They tend to operate at 66/7 words a minute (50
|
|
baud). A few of the more common 'fixed' bands they transmit over are:
|
|
|
|
at kHz:
|
|
|
|
3155-3400 3950-4063
|
|
9040-9500 12050-12330
|
|
13800-14000 15600-16360
|
|
19800-19990 25210-25550
|
|
|
|
|
|
An easy way to tell if you have located a news agency is by some lame
|
|
transmission being continuosly repeated.
|
|
|
|
i.e. 'RYRYRYRYRYRYRYRYRYRYRY' etc.
|
|
|
|
This is done so they can keep their channels opened for reception.
|
|
|
|
|
|
|
|
CONFERENCES-
|
|
|
|
Another thing I found interesting was the channels that the amatuers
|
|
congregated around. I frequently ran into people from foreign countries that
|
|
couldn't even speak English. I even ran into other hackers from all over!
|
|
A few of the more popular spots that amatuers hang out are:
|
|
|
|
at kHz:
|
|
|
|
3590 14090 21090 28090
|
|
|
|
at MHz:
|
|
|
|
432.600 433.300
|
|
|
|
at VHF/UHF:
|
|
|
|
144.600 145.300
|
|
|
|
|
|
|
|
PACKET RADIO-
|
|
|
|
A new development in radio transmission is the packet radio. From what
|
|
I've seen, it's just like digital packet switching networks, i.e. Compuserve,
|
|
Telenet, Tymnet, etc.; except slower.
|
|
In fact, Compuserve has been researching a way to transmit its services
|
|
cheaply.
|
|
|
|
|
|
|
|
--tS
|
|
|
|
This has been written exclusively for
|
|
|
|
---Metal Shop Private---
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #9 of 12
|
|
|
|
Mobile Telephone Communications
|
|
|
|
By Phantom Phreaker
|
|
|
|
Presented by The Alliance
|
|
(618)667-3825
|
|
|
|
|
|
Mobile telephone communications is not the same thing as Cellular. Mobile
|
|
telephone service is not as advanced as Cellular, and not as efficient. Mobile
|
|
telephone service limits the number of customers sharply, while Cellular is
|
|
designed to solve the problems of Mobile telephone service.
|
|
|
|
The signals for Mobile communications are sent by high-power transmitters and
|
|
antennas that provide an area of approx. 20-30 miles with service.
|
|
|
|
A base unit of a Mobile communications system transmits and receives on
|
|
different frequencies at the same time. Typical power for the radio base
|
|
station transmitter is 200-250 watts.
|
|
|
|
Mobile telephone facilities tie in with the normal fixed-position telephone
|
|
system, however base units can be owned by a Radio Common Carrier (RCC). RCCs
|
|
running mobile telephone systems are charged by the telephone company for use
|
|
of the normal phone system.
|
|
|
|
DIAGRAM:
|
|
--------
|
|
^-Base antenna Mobile unit
|
|
| |
|
|
|- - - - - - - - - /-- --\
|
|
| ^Signal^ | (Car) |
|
|
---------------------------------------
|
|
^-------<-20-30 Miles->---|
|
|
^ |-From
|
|
/===========\ | mobile
|
|
|Receiver/ | | antenna
|
|
|Transmitter| =============
|
|
/===========\ |Receiver/ | |-|
|
|
|Control | |Transmitter|-|*|
|
|
|Terminal | ============= |-|
|
|
\===========/ ^
|
|
| Handset
|
|
| <-Telephone
|
|
| <-Land line
|
|
|
|
|
======= =======
|
|
| C.O.| | C.O.|---[-*-]
|
|
======= ======= |*|
|
|
| | -----
|
|
| | Fixed
|
|
========= ========= Phone
|
|
|Switch |--------------|Switch |
|
|
|Network| Transmission |Network|
|
|
========= Link =========
|
|
|
|
---------------------------------------
|
|
(Above diagram from 'Understanding Telephone Electronics' chapter 10.)
|
|
|
|
As you can see from the above diagram, calls placed from the Fixed position
|
|
telephone are routed through a Central Office as normal, through a Switch
|
|
Network, to another Switch network, and to another CO. From the second CO
|
|
(nearest to the Mobile unit), the signals are sent on a telephone line to the
|
|
control terminal, to the receiver, then to the base unit (antenna). From the
|
|
base unit, the radio signals are sent to the site of the mobile telephone.
|
|
Calls from the mobile telephone operate in the same manner. An idle radio
|
|
channel is selected (like seizure of a trunk for a LD call) and the signals are
|
|
sent over the mobile network.
|
|
If no channel is available for use, then a busy indication is triggered
|
|
(similar to a re-order). If a channel is available, the customer will be
|
|
prompted with a dial tone, similar to normal fixed-position telephone service.
|
|
The area that this would work in is called the subscriber's home area. When a
|
|
mobile telephone service subscriber leaves the service area, he is then
|
|
referred to as a Roamer. Since the mobile unit is out of the service area,
|
|
special preparations have to be made to continue communications to/from that
|
|
mobile unit.
|
|
|
|
SIGNALLING
|
|
----------
|
|
Mobile signalling tones are selected (like touch tones) to avoid possible
|
|
reproduction of the signalling tone on the voice link, to cause a signalling
|
|
mistake. The IMTS (Improved Mobile Telephone Service) uses in band signalling
|
|
of tones from 1300Hz-2200Hz. Another method of signalling is the MTS (Mobile
|
|
Telephone System). MTS is older than IMTS, and MTS uses in band signalling of
|
|
tones from 600Hz-1500Hz, and some use 2805 Hz in manual operation.
|
|
|
|
CALL COMPLETION
|
|
---------------
|
|
In this instance, let's say a call is being placed from a normal telephone to
|
|
a Mobile unit. First off, the base station selects one idle channel and places
|
|
a 2000Hz idle tone on it. All on hook Mobile units active in that service area
|
|
find and lock onto the channel that carries the 2000Hz idle tone. Now each
|
|
Mobile unit listens for it's specific number on that channel. When an idle
|
|
channel becomes busy, a new channel is selected for use, and the process is
|
|
repeated.
|
|
Now the caller's call is sent through the telephone network the same way as a
|
|
normal telephone call. When this call reaches the control terminal, the
|
|
terminal seizes the already marked idle channel (with every on-hook mobile unit
|
|
listening to it) and applies a 1800Hz seize tone. This tone keeps other mobile
|
|
units from using it to complete other calls. The called number is outpulsed
|
|
over the base station transmitter at ten pulses per second, with idle tone
|
|
represented as a mark, and a seize-tone represented as a space.
|
|
Since every idle mobile unit is waiting on that channel, they compare the
|
|
number being outpulsed with their own number. If the first digit of the called
|
|
mobile unit is three, and a specific mobile unit 'listening' on the channel has
|
|
a first digit of four, it stops listening to that channel, and moves to the
|
|
next channel with 2000Hz applied.
|
|
When the mobile unit receives the correct destination number, all other
|
|
mobile units are no longer listening on that particular channel. When the 7
|
|
digit number is received, the mobile supervisory unit turns on the mobile
|
|
transmitter and sends an acknowledgement signal (2150Hz guard tone) back to the
|
|
control terminal. If this signal isn't received in three seconds after
|
|
outpulsing, the seize tone is removed from that channel, and the call is
|
|
dropped. If the signal is received at the control terminal, then the mobile
|
|
phone will ring (standard two seconds on, four seconds off). If the mobile unit
|
|
being called doesn't answer in forty five seconds, the call is also dropped.
|
|
When the person answers the mobile phone and takes it off hook, the mobile
|
|
supervisory unit sends a connect tone of 1633Hz, for an answer signal. When
|
|
this is received by the control terminal, the ringing stops, and a voice path
|
|
between the two phones is established. When the mobile subscriber hangs up, a
|
|
disconnect signal is sent which consists of alternating disconnect/guard tone
|
|
(1336Hz and 2150Hz respectively) signals. Then the mobile unit begins searching
|
|
for another idle channel, and readies itself for more calls.
|
|
For an outgoing call placed by the Mobile subscriber, the mobile unit must
|
|
already be locked on the idle channel. If the unit is not, a warning light will
|
|
flash advising the user of the problem. This is similar to a re-order signal.
|
|
If the unit is already on an idle channel, the calling number will be sent to
|
|
the control terminal for billing purposes.
|
|
|
|
CELLULAR TELEPHONES
|
|
-------------------
|
|
To improve over the problems of mobile telephone service such as low amount of
|
|
users, high price, etc. AT&T invented the Cellular Concept, or the AMPS
|
|
(Advanced Mobile Phone System). This is the cellular phone concept that is used
|
|
in major cities. Los Angeles, Ca. currently has the largest cellular
|
|
communication system in the world.
|
|
|
|
Calls sent to cellular telephones are sent through the MTSO (Mobile
|
|
Telecommunications Switching Office). The MTSO handles all calls to and from
|
|
cellular telephones, and handles billing.
|
|
All incoming calls from the MTSO are sent to a Cell site in each cell, to the
|
|
actual cellular telephone. The major difference between mobile and cellular is
|
|
that cellular can use the same channel many more times than a mobile telephone
|
|
system can, providing more customers and making the service less expensive.
|
|
Once a vehicle goes out of range of one cell site, the signal is transferred
|
|
immediately, with no signal loss, to another cell site, where the call is
|
|
continued without interruption. This is called a Cellular hand-off.
|
|
Cellular communications areas are divided up into several cells, like a
|
|
honeycomb.
|
|
|
|
DIAGRAM
|
|
-------
|
|
/---\ /---\ /---\
|
|
/ * \/ * \/ * \
|
|
==== |Cell ||Cell ||Cell |
|
|
|CO| | Site|| Site|| Site |
|
|
==== /---\\ /\ /\ /
|
|
| / * \\---/ \---/ \---/
|
|
| |Cell | /---\ /---\
|
|
| | Site|/ * \/ * \
|
|
| \ /|Cell ||Cell |
|
|
====== \---/ | Site|| Site |
|
|
|MTSO| \ /\ /
|
|
====== \---/ \---/
|
|
|
|
---------------------------------------
|
|
More cell sites are used for the area they are needed for. The signals are
|
|
sent from the MTSO to the each cell site. So if you were travelling in the cell
|
|
site to the far left, the signal from the MTSO would be sent to that cell. As
|
|
you move, the signal is moved.
|
|
|
|
Here is a quote from AT&T's Cellular Telephones pamphlet.
|
|
|
|
'AT&T cellular phone transmission sounds as good as your home and office
|
|
phone. Basically it's a simple concept. Each metropolitan area is divided into
|
|
sectors which form a honeycomb of cells. Each cell incorporates its own
|
|
transmitter and receiver which connects to the local phone network.
|
|
As you drive from cell to cell, sophisticated electronic equipment transfers
|
|
or 'hands off' the call to another cell site. This automatic sequence maintains
|
|
service quality throughout the conversation without interruption.'
|
|
|
|
|
|
I hope this file has been of some assistance to anyone who is curious about
|
|
the more technical aspects of the telephone system.
|
|
|
|
References
|
|
----------
|
|
Understanding Telephone Electronics-by Texas Instruments 1983
|
|
TELE Magazine issues three and four
|
|
AT&T Mobile communications pamphlet
|
|
AT&T Cellular concept pamphlet
|
|
|
|
-End of file-
|
|
4/14/86
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #10 of 12
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
///\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\\\
|
|
Metal Shop PRIVATE\\\ Phrack World News Issue 4 Part 1 ///_ _ _______
|
|
Metal Shop AE \\\ ///| \/ | / _____/
|
|
Metal Shop Brewery \\\ Compiled by /// |_||_|etal/ /hop
|
|
\\\ /// _________/ /
|
|
Present PWN IV \\\///\\ Knight Lightning //\\\/// /__________/
|
|
-------------- \-^^^^^^-^^^^^^^^^-/ Triad
|
|
_______________________________________________________________________________
|
|
|
|
Phrack Inc. Vs. Master Lock Company April 1, 1986
|
|
-----------------------------------
|
|
Ok, yeah the date says April 1st, but this NOT a joke. The following is a
|
|
letter from Chadbourne & Parke. I am substituting "Taran King" for Taran's
|
|
real name.
|
|
-------------------------------------------------------------------------------
|
|
March 26, 1986
|
|
|
|
Dear Mr. King,
|
|
This law firm is counsel to Master Lock Company. Our client has recently
|
|
been alerted to the dissemination through a Bulletin Board Computer Service
|
|
located at your address of information potentially damaging to its commercial
|
|
interests and business relationships. More particularly, we refer to the
|
|
publication by such computer service of instructions for picking combination
|
|
locks manufactured by Master Lock Company.
|
|
|
|
We write to notify you of Master Lock Company's concern about the computer
|
|
service's actions and the seriousness with which it regards those actions.
|
|
Master Lock Company has every intention of preserving and protecting the
|
|
reputation and goodwill associated with its products and, if necessary, will
|
|
take every legal recourse available to it to do so.
|
|
|
|
Under the present circumstances, however, our client would first like to
|
|
give you the opportunity to take measures to prevent activities that it can
|
|
only view as malicious both toward itself and toward its customers. We
|
|
therefore request that you see to the immediate and permanent cessation of the
|
|
actions described above. Your compliance with this request is all that is
|
|
required for an amicable resolution of this matter.
|
|
|
|
Your cooperation will be much appreciated.
|
|
|
|
|
|
Very truly yours,
|
|
|
|
Terrence J. Farrell
|
|
-------------------------------------------------------------------------------
|
|
This letter is of course talking about phile #6 of Phrack Issue I, entitled,
|
|
"How To Pick Master Locks". It was kinda funny but they even had a misspelled
|
|
word in their letter, that I corrected above. They sent it to Taran King in
|
|
certified mail, in which he had to sign for it. Taran has since responded with
|
|
the following letter:
|
|
-------------------------------------------------------------------------------
|
|
Dear Sirs, 4/1/86
|
|
|
|
My name is Taran King, as you so easily researched, and I used to run Metal
|
|
Shop, an electronic bulletin board system. I currently run a private line for
|
|
personal friends of mine, and if asked, I distribute "general files" for them.
|
|
The fact that I distributed the file is hardly the point. I merely obtained it
|
|
from the authors of the file and distributed it to other sources, who
|
|
apparently distributed it other places. If I am responsible for this file, I
|
|
believe you should find a number of other authors also.
|
|
|
|
It is not only this file that you have written me about that the
|
|
information about the "secret" to picking Master locks is included in, but also
|
|
a number of other files that have been circulating for years. It is old
|
|
information, someone just re-published it. Although on this topic, I am not
|
|
well informed, I believe it is legal to print information on such a topic. We
|
|
do not condone the actions promoted by the files, but merely inform the public
|
|
on the topic of this. I hate to run on, but I wish to make my point as clearly
|
|
as possible.
|
|
If I, being one of the people it was passed through, am responsible for the
|
|
crime rate today of people picking Master, American, or any other company's
|
|
locks, then I believe anyone who has the file, or has read books should be
|
|
arrested on this. I believe Paladin Press publishes a number of books on this
|
|
topic. I have seen one of the "Picking Master Locks in 3-Easy Steps!" type
|
|
books and as far as I know, it's still in publication and distribution.
|
|
I hope I'm not sounding disrespectful or condescending, but it annoys me to
|
|
a great degree when I must be questioned by my father about a letter that has
|
|
come in the mail from a law firm in New York. Please expect a letter from him
|
|
inquiring upon the topic that you have written me on. If you wish to have
|
|
further discussion, feel free to call me at my voice line whenever you want to
|
|
at (314) XXX-XXXX. Don't play funny like you did with the letter and reverse
|
|
the charges or something entertaining like that please.
|
|
|
|
Sincerely,
|
|
|
|
Taran King
|
|
-------------------------------------------------------------------------------
|
|
If any of you are wondering as to how they found Taran, well CN/A is not
|
|
exclusively for phone phreaks and the number to Metal Shop was published in
|
|
Phrack I in most of the files. My theory about how they found this file is:
|
|
|
|
A. Some agent type is looking around (hell we all know they are out there), he
|
|
sees the file and passes it on to Master Lock Company;
|
|
B. Some rodent dork type whose dad works for Master Lock Company sees it and
|
|
says, "Hey Dad, look, this is really neat!"
|
|
|
|
I guess it really doesn't matter... Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
Lex Luthor Speaks About TWCB Sunday March 22, 1986
|
|
----------------------------
|
|
The following is a message from Lex Luthor regarding TWCB Inc.
|
|
-------------------------------------------------------------------------------
|
|
It has been brought to my attention that TWCB Inc. is "throwing around large
|
|
amounts of BS involving me". I have NEVER spoken to them, not on a conference,
|
|
bbs, or anything.
|
|
|
|
They have no affiliation with The Legion of Doom phreak group, nor The Legion
|
|
Of Hackers hack group. Any references they make regarding me or any member of
|
|
LOD or LOH should be disregarded since it's probably bullshit.
|
|
|
|
TUC is working on Project Educate but there are no dates as of yet when an
|
|
issue will be released. He scrapped the old first issue and is working on a
|
|
better quality newsletter. I don't really have anything to do with Project
|
|
Educate except that I may contribute some material.
|
|
|
|
I just thought I would clear this up and if anyone hears anything different,
|
|
please send me email with the information.
|
|
|
|
One other thing that is on my mind is how some phreaks/hacks put down 2600
|
|
Magazine as not being that great, not providing enough technical info, or
|
|
providing too technical, etc. Well compared to the other rags out there, 2600
|
|
does a pretty damn good job and are very consistent, you never have to worry
|
|
about getting ripped off by them, and they are trustworthy. I don't agree with
|
|
some of the ways they do things, but overall they are pretty good.
|
|
|
|
I just wanted to get a few things off my chest.
|
|
|
|
Lex
|
|
_______________________________________________________________________________
|
|
|
|
TRASk, Animator, Ogre Ogre busted 408 Under Siege
|
|
---------------------------------- ---------------
|
|
This all happened towards the end of the week after the Phoenix Phortress Sting
|
|
Operation.
|
|
|
|
TRASk the sysop of Shattered World Elite, carded an IBM PC. The person whose
|
|
house it was to be delivered, happened to be at home when it arrived. The
|
|
owners promptly called the police who then set up a stake out and waited for an
|
|
unsuspecting TRASk to waltz over and pick it up. TRASk did and of course was
|
|
caught red handed.
|
|
|
|
Walking up to the house but staying on the street was the Animator. He didn't
|
|
like the looks of the situation and didn't stop walking. He went to the home
|
|
of BelGarion and Ogre Ogre (brothers). Unknown to him he had been followed
|
|
over. Since he had cut school that day he stayed over there until 4PM.
|
|
BelGarion and Ogre Ogre went to Animator's house and took all his computer
|
|
equipment and illegally carded shit. They hid it all in their house. Minutes
|
|
after Animator left BelGarion's home, he was picked up by the police. He was
|
|
then taken to Juvenile Detention where he found TRASk.
|
|
|
|
Meanwhile the police went to TRASk's house first and took all his shit
|
|
including the bbs, then over to Animator's. When they got to Animator's house
|
|
and couldn't find anything, his little brother told them that BelGarion and
|
|
Ogre Ogre took everything. They then went to BelGarion's house where they found
|
|
not only Animator's carded material but BelGarion's and Ogre Ogre's as well.
|
|
|
|
The four of them spent the weekend together in Juvenile Detention.
|
|
|
|
The charges included:
|
|
|
|
o Fraudulent use of a credit card
|
|
o Grand theft
|
|
o Possession of stolen property
|
|
|
|
The merchandise found at BelGarion's was in excess of $3,000.
|
|
|
|
Being that BelGarion is 18 years old, Ogre Ogre, his younger brother, took full
|
|
responsibility for the crimes. As a result the charges against BelGarion were
|
|
dropped.
|
|
|
|
The court case is expected to take place in mid-April 1986.
|
|
|
|
The interesting part about this story is that TRASk and the others were members
|
|
of the Nihilist Order. This group had most of its members busted or under
|
|
surveillance already due to the Phoenix Phortress Sting Operation in Fremont,
|
|
California. Is there a connection?
|
|
|
|
BelGarion says no, and that the Nihilist Order was really a loosely connected
|
|
bunch. It was however started by TRASk and The Highwayman.
|
|
|
|
TRASk was released with a $100 fine and probation and 100 hours of community
|
|
(civil) service work. His bbs, The Shattered World Elite, will be going back
|
|
up sometime in the future.
|
|
|
|
For information about the Phoenix Phortress Sting Operation see Phrack World
|
|
News Issue III.
|
|
|
|
Information provided by BelGarion 408 in an interview with Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
Robin Hood and The Sultan Busted 408 Under Siege
|
|
-------------------------------- ---------------
|
|
This event took place around the last week of March in California, the 408
|
|
area.
|
|
|
|
Robin Hood had sprained his ankle at a wrestling meet and as a result was laid
|
|
up at home for several days. On one such day, he awoke at 1:30 PM in the
|
|
afternoon to hear people outside his house, trying to force his doors opened.
|
|
Hobbling around on his crutches, he made it to the kitchen where he ran into
|
|
three police officers, two special investigators, and one guy from PacBell
|
|
Security.
|
|
|
|
His first cry was, "You had better have a warrant!" Sure enough they did. He
|
|
noticed MCI codes and dialups written on it as well as passwords to TRW.
|
|
(Editor's Note: Obviously what they were looking for.) They went to his room
|
|
and went through his computer disks (one of which was labeled phreaking and
|
|
hacking, they jumped for that one), printouts, notebooks, and anything else
|
|
they could find. They took everything including his modem, printer, phone, and
|
|
computer.
|
|
|
|
Among what was confiscated were printouts of Phrack Issues I-III, Hack
|
|
Newsletter (all issues to date), tons of other G-philes, and Lex Luthor's
|
|
Hacking Cosmos series. Also taken were all of his board numbers he was on and
|
|
all his passwords. Luckily for Metal Shop PRIVATE, he had not yet received the
|
|
new general password. Boards that should be wary include the Alliance and
|
|
P-80.
|
|
|
|
His charges include:
|
|
|
|
o Annoying Calls (Scanning Prefixes)
|
|
o Defrauding the phone company
|
|
o Illegal entry (Hacking)
|
|
o Scanning MCI dialups (I don't know what the legal name for that would be)
|
|
|
|
His and Sultan's court case comes up on April 18th 1986 1:00 PM.
|
|
|
|
As for the Sultan, upon being busted, Robin Hood tried to get in touch with him
|
|
at school, not knowing that the group that had paid him a visit had come from
|
|
the Sultan's earlier around 11:30 AM. When he finally did reach him around
|
|
4:00 PM after school at swim practice, it was much too late. Sultan's dad
|
|
supposedly held a government related job. (I have no idea if it was a political
|
|
one or not).
|
|
|
|
The police had grabbed everything Sultan had as well, including his phone.
|
|
Since his bust he has had his phone line disconnected.
|
|
|
|
Robin Hood said that he was told that he had been under surveillance for 2-3
|
|
months previous to his arrest.
|
|
|
|
He also recalled that the police had a third warrant for someone in a different
|
|
town. He did not recognize the name, nor did he hear anything about it later.
|
|
|
|
(Editor's Note: Their accounts on Metal Shop PRIVATE were removed long ago, so
|
|
MSP users don't be worried.)
|
|
|
|
Information provided by Robin Hood during an interview with Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
TWCB: Peter Arrested Again TAP Trouble
|
|
-------------------------- -----------
|
|
In the last week of March, while on spring break, Peter of TWCB Inc. was
|
|
arrested (or maybe just picked up) for leaving his home while under a court
|
|
order to stay confined there under his mother's reconnaissance.
|
|
|
|
He was picked up by the same detective that busted TWCB Inc. in the first
|
|
place. Evidently he had been staking out their condominium for some time.
|
|
|
|
Not only does this add to their LARGE record and current charges, but it will
|
|
be used to show the court that TWCB's mom has no control over them. This will
|
|
hurt their defense.
|
|
|
|
Many questions have arisen about the upcoming court case against TWCB. Most
|
|
notably, how will they be able to publish TAP Magazine with such a record and
|
|
constant surveillance? Since their bust was basically non-phreak/hack related
|
|
maybe there is no real reason to fear any problems arising of information
|
|
trading for a lighter sentence if (when) found guilty.
|
|
|
|
However, their bust also concerned fraudulent use of a credit card. What if
|
|
that were to be tied in to phreak/hack bulletin boards?
|
|
-------------------------------------------------------------------------------
|
|
Since the topic of TWCB has already been brought up, I'd like to mention some
|
|
of the other things that have been going on concerning them.
|
|
|
|
Fights breaking out between them and Sigmund Fraud have cleared up. This does
|
|
not necessarily mean that they will not resume. Fights with Slave Driver that
|
|
led to their being kicked off of Stronghold East Elite, have also cleared up.
|
|
Not wanting to have a reputation for kicking people off SEE for personal
|
|
reasons, Slave Driver has allowed TWCB to return. It is not yet known if they
|
|
have done so as of yet.
|
|
|
|
On the other hand, with their co-sysop access, TWCB kicked Broadway Hacker off
|
|
of Spectre III (Which is sysoped by The Overlord of 815). He in turn kicked
|
|
them off of the Radio Station BBS. Hostilities raged between the two, but
|
|
Broadway Hacker publicly apologized on Metal Shop (and I suppose on several
|
|
other bbses as well) to TWCB, and asked them to remove their vulgar posts about
|
|
him. TWCB made no comment.
|
|
|
|
Broadway Hacker did kick TWCB off The Radio Station. Later he welcomed them
|
|
back on, but now with their refusal to call, his invitation no longer exists.
|
|
_______________________________________________________________________________
|
|
|
|
SBS Acquisition Completed March 1986
|
|
-------------------------
|
|
On February 28, MCI completed its acquisition of Satellite Business Systems
|
|
from IBM in exchange for approximately 47 million shares of MCI Common stock,
|
|
of 16.7 percent of the 282 million shares now outstanding. The Federal
|
|
Communications Commission (FCC) approved the transfer to MCI of authorizations
|
|
held by SBS on February 14. The transaction was announced as an agreement in
|
|
principle on June 25, 1985.
|
|
|
|
The majority of SBS employees have joined MCI, bringing MCI's employment to
|
|
14,800.
|
|
|
|
Initially, for SBS's 200,000 customers, the acquisition brings no change in
|
|
service or rates. Eventually, the SBS system will be combined with MCI's more
|
|
extensive domestic and international network.
|
|
|
|
Taken from MCI World, March 1986
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #11 of 12
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
///\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\\\
|
|
Metal Shop PRIVATE\\\ Phrack World News Issue 4 Part 2 ///_ _ _______
|
|
Metal Shop AE \\\ ///| \/ | / _____/
|
|
Metal Shop Brewery \\\ Compiled by /// |_||_|etal/ /hop
|
|
\\\ /// _________/ /
|
|
Present PWN IV \\\///\\ Knight Lightning //\\\/// /__________/
|
|
-------------- \-^^^^^^-^^^^^^^^^-/ Triad
|
|
_______________________________________________________________________________
|
|
|
|
More Computel Sunday March 29, 1986
|
|
------------- ---------------------
|
|
The following post was seen on Stronghold East Elite on the above date,
|
|
concerning Computel. I am reprinting it in Phrack for the sole purpose to
|
|
spread this important news and to help 2600 Magazine get to the bottom of this
|
|
mess, and to help everyone get their money back.
|
|
-------------------------------------------------------------------------------
|
|
People,
|
|
PLEASE tell us whatever you know about Computel, even if it doesn't seem
|
|
important. We are charging full speed ahead with our investigation and we've
|
|
already uncovered some wild things but we can't reveal what we have until we're
|
|
finished. We also need info on that old magazine called Tel from the 70's.
|
|
|
|
Yes, we did determine that there was a connection between the two but that's
|
|
all we can say right now. Any info or even back copies would help. We need
|
|
people to actually complain about losing money. So far that's been the hardest
|
|
thing to do. Phone phreaks as a rule don't seem to want to put their name on
|
|
anything, but if you've lost money, this is the only way we can get it back for
|
|
you and at the same time, stop this operation.
|
|
|
|
We need people who live near or in Van Nuys, California. We need those of you
|
|
with special access to credit information or phone information to get in touch
|
|
with us. PLEASE DON'T DELAY! Send us E-mail or call (516) 751-2600.
|
|
|
|
Information posted by 2600 Magazine
|
|
-------------------------------------------------------------------------------
|
|
Editor's Note: Thomas Covenant added that he had heard that Computel is
|
|
unregistered and plans on staying that way. Thus the Better
|
|
Business Bureau can do nothing.
|
|
_______________________________________________________________________________
|
|
|
|
Dr. Who in Trouble Tuesday March 31, 1986
|
|
------------------
|
|
The following is Lex Luthor's interpretation and information on the Dr. Who
|
|
story. He also discusses Twilight Zone and Catch 22. It was posted in several
|
|
places (most notably Stronghold East Elite) and was confirmed in interview with
|
|
Lex Luthor by Knight Lightning on April 4, 1986.
|
|
-------------------------------------------------------------------------------
|
|
The Twilight Zone will be back up in 1-2 weeks. Those who Marauder wants on
|
|
will be contacted with all the new logon info, along with a number to reach it
|
|
at. He has been doing some mods to the software so the board has been down.
|
|
Silver Spy, Sysop of Catch-22 has had some phone problems and as soon as the
|
|
phone company fixes it he will have it back up. Both boards did go down for a
|
|
few days after the Doctor Who bust, but after we found out why he was busted,
|
|
the boards went back up.
|
|
|
|
The Secret Service came to Who's house and took everything, he was not home at
|
|
the time, but after 1-2 days, they finally got around to questioning him. As
|
|
you know, the Secret Service has been doing a lot of credit card
|
|
investigations. Initially Pit Fiend of CA was busted for carding (Editor's
|
|
Note: See last issue's quick notes as to Pit Fiend) and at the time he was
|
|
speaking w/Who from time to time, thus some believe Who's bust was a result of
|
|
P.F. leaking info to the S.S.
|
|
|
|
LOD/H was not shaken up too much from Who's bust mainly because it was not
|
|
Phreak/Hack related, merely credit related which LOD/H is not involved in. Who
|
|
did not card anything, but we believe the S.S.'s motive for busting him was use
|
|
of TRW. Incidentally, Who had a DNR on his line for 7 months some say it was
|
|
for over a year, but either way, its a hell of a long time! That's about it,
|
|
anyone need specific details, or heard anything otherwise let me know.
|
|
|
|
Lex
|
|
|
|
Information provided by Lex Luthor
|
|
|
|
(Editor's Note: Lex Luthor also mentioned that Dr. Who is being sued by AllNet)
|
|
_______________________________________________________________________________
|
|
|
|
2300 Club Members Busted Cleveland
|
|
------------------------ ---------
|
|
Two have been caught for fraudulent use of a credit card and one has been
|
|
arrested for car theft.
|
|
|
|
The 2300 Club is now being compared and treated as a miniature mafia by local
|
|
authorities. This is mainly for other crimes including the blowing up of cars.
|
|
King Blotto was, at one time at least, a member of this group. There is
|
|
absolutely NO information regarding King Blotto as being busted or as still
|
|
being a member of the 2300 Club.
|
|
_______________________________________________________________________________
|
|
|
|
New Phreak/Hack Group April, 6 1986
|
|
---------------------
|
|
The Dark Creaper (916), Brew Associates (215), Major Havoc (301), and one other
|
|
whose handle is unknown to me at the current time are forming a new phreak/hack
|
|
group. Its name is "The IBM Syndicate". They are currently looking for
|
|
members to join. Their bulletin boards, which are currently more or less
|
|
public, will very soon be going private, thus making it harder to become a
|
|
member. Eventually the group will have 2 bbses and 2 AEs. Mainly for the
|
|
exchange of files and IBM kracked wares. All of these bbses will be run on of
|
|
course IBM, and I assume that having an IBM is a requirement to become a
|
|
member.
|
|
|
|
Information provided by Dark Creaper through interview by Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
Oryan Quest Busted/415 Gets Hit Again April 6, 1986
|
|
-------------------------------------
|
|
On Wednesday, April 2nd 1986, Oryan Quest was arrested on charges of computer
|
|
invasion. Technically they only had him on one charge but later evidence
|
|
accounted for the other two.
|
|
|
|
Oryan Quest was "busted" for hacking AT&T Mail, which is roughly similar to MCI
|
|
Mail. He had three different accounts, but the San Mateo Police and FBI only
|
|
had suspicion of one. When they searched his home they found two more written
|
|
down.
|
|
|
|
The charges against Oryan Quest were dropped for several reasons:
|
|
|
|
1. Illegal Search (they didn't have a warrant)
|
|
2. Police Brutality and Harassment (pushed him around and slammed his head into
|
|
a car)
|
|
|
|
The authorities searched his house while Oryan Quest was at school, which is
|
|
where they later arrested him.
|
|
|
|
What was taken includes the following:
|
|
|
|
Loads of computer disks
|
|
All printouts (his entire g-phile library)
|
|
10 Meg drive
|
|
Assorted Boxes (Blue, Red, Green, Silver)
|
|
|
|
His passwords, bbs numbers, codes, etc were undiscovered. (He believes)
|
|
|
|
No court date had been set as of yet, and it is believed that the prosecuting
|
|
attorney will drop the case due to the earlier illegal proceedings by the SMPD.
|
|
|
|
Prior to his arrest the SMPD had been monitoring his line and had found that he
|
|
was scanning prefixes. This is however is inadmissible in a court of law
|
|
because at the time that they were monitoring his line there was not sufficient
|
|
evidence for such action.
|
|
|
|
AT&T Mail was accessible through an 800 number, which Oryan Quest did call
|
|
direct.
|
|
|
|
Some words from Oryan
|
|
---------------------
|
|
"I have no intention of quitting hacking."
|
|
|
|
"My mistake was calling an 800 number direct and for fucking around with AT&T
|
|
in the first place."
|
|
|
|
"I am more of a hacker than a phreak."
|
|
|
|
(Editor's note: When asked how he felt about what was happening he replied,
|
|
"I'm not worried about it.")
|
|
-------------------------------------------------------------------------------
|
|
Some other interesting facts about Oryan was that he held a part time job as a
|
|
PacTel Operator. He, being 15 years old, had lied about his age (saying he was
|
|
16), but now has been fired.
|
|
|
|
Also SRI has given him a job offer for computer security. He is thinking about
|
|
it but doesn't plan on accepting it.
|
|
|
|
Information provided by Oryan Quest through interview by Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
Overlord 815 Arrested For Check Fraud
|
|
-------------------------------------
|
|
"The only reason I got caught was greed."
|
|
|
|
That was the Overlord (815)'s first statement to me during an interview on
|
|
April 6, 1986. He says that originally, a long time ago, he concentrated on
|
|
Western Union, but then later turned to credit card fraud. As he progressed,
|
|
he learned that credit card fraud only worked about 5% of the time. He wanted
|
|
something that worked 100% of the time. He found it...check fraud.
|
|
|
|
In his home town he acquired around $4,000 worth of equipment from 3 stores.
|
|
Some of the merchandise consisted of an Apple //e (with every card possible,
|
|
the best drives, monitors, etc...), a complete Commodore 128 system, and ten
|
|
packs of disks for good measure. His downfall was going back to one of the same
|
|
stores the next day to try it again.
|
|
|
|
He was instantly caught and tricked by the police to reveal more than he would
|
|
have if he had really known his rights.
|
|
|
|
Check fraud is a felony crime. Although I myself am uninformed as to how to
|
|
perform the art of check fraud, it must require a phone because Overlord (815)
|
|
informs me that the police have labeled his crime as Telefelony. The actual
|
|
charge however is for "theft by deception".
|
|
|
|
His home was not searched and he has given all the merchandise back.
|
|
|
|
He had told me that he plans to stop running his bulletin board Spectre III and
|
|
sell his computer. This is mainly so he cannot be referred to as a computer
|
|
hacker. IE: The prosecuting lawyer would ask, "Do you have a computer?!" He
|
|
can truthfully say NO.
|
|
|
|
He plans to have the bbs run from the home of The Master (815) and the number
|
|
would stay the same.
|
|
|
|
Another account of this story by TWCB Inc, says that Overlord has changed his
|
|
mind and is not selling his computer or taking down Spectre III.
|
|
|
|
The court date is set at April 9, 1986, Overlord (815) says that the worst that
|
|
can happen is probation, a fine, civil service work, or any combination of the
|
|
three.
|
|
|
|
Information provided by Overlord (815) during interview with Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
TAP: Latest News From TWCB April 8, 1986
|
|
--------------------------
|
|
Well, as many of you may have noticed, TWCB Inc. did not fulfill their promise
|
|
of having TAP Magazine out by April 7, 1986. When asked about this on that
|
|
date, they replied that they had all the stuff, but it had to be typeset,
|
|
formatted, printed, and distributed. They estimated that they could have it
|
|
done in another four days. This secondary deadline was also not achieved.
|
|
|
|
The writers (according to TWCB) include:
|
|
|
|
Abbie Hoffman/Ace/Final Impulse/Gary Seven/Knight Lightning/Mark Tabas/
|
|
Taran King/Susan Thunder/The Bootleg/The Cracker/The Firelord/The Metallian/TUC
|
|
|
|
The magazines supporting TAP include:
|
|
|
|
Mad Mad Magazine/High Times/Bootlegger Magazine/Hacker Magazine
|
|
|
|
Scan Man dropped himself from the TAP Staff.
|
|
|
|
By issue #6, TWCB plans to have a 112 page magazine. This is due to the fact
|
|
that by then they plan to be receiving many more articles and will have several
|
|
more companies advertising.
|
|
|
|
The first issue of TAP Magazine will have articles on the following topics:
|
|
|
|
ISDN: Parts by Taran King and The Bootleg
|
|
Fiber Optics
|
|
Cellular Phones
|
|
Satellite Jamming
|
|
Moving Satellites
|
|
The Teltec Bust: Surfer Bill/The Firelord/TWCB Inc/Knight Lightning
|
|
Dr. Who Bust
|
|
History of TAP
|
|
RSTS 8.0
|
|
Signalling Systems: Taken from Phrack Inc. Newsletter
|
|
Introduction to PBXs: by Knight Lightning, taken from Phrack Inc. Newsletter
|
|
ROLM: By Monty Python, taken from Phrack Inc. Newsletter
|
|
MCI Overview: by Knight Lightning, taken from Phrack Inc. Newsletter
|
|
New BBS Laws: by Sally Ride, taken from Bootlegger Magazine
|
|
Cosmos: by Lex Luthor and the Legion of Hackers, taken from Bootlegger Magazine
|
|
Private Audience: by Final Impulse, taken from Phrack Inc. Newsletter
|
|
UNIX: by The Cracker
|
|
MAX Profile: by Phantom Phreaker, taken from Phrack Inc. Newsletter
|
|
Crashing Dec 10s: by The Mentor, taken from Phrack Inc. Newsletter
|
|
Pak Time: by Kerrang Khan
|
|
Techniques of Tracing
|
|
ESS: by Mark Tabas
|
|
|
|
Information provided by TWCB Inc. during interview with Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
Quick Notes
|
|
-----------
|
|
On March 23, 1986, The Radio Station BBS in New York celebrated its one year
|
|
anniversary. It now has one meg of storage online.
|
|
-------------------------------------------------------------------------------
|
|
The rumor that Taran King was on a talk/news program in New York discussing
|
|
hacking is completely wrong. Dead Lord started it, but as yet no one knows
|
|
why.
|
|
-------------------------------------------------------------------------------
|
|
The Tempest in 805 was burglarized in March. His computer and all other
|
|
equipment among other things were stolen. This of course explains his absence
|
|
from the bbs world for a while.
|
|
-------------------------------------------------------------------------------
|
|
A reasonably new IBM kracking group, which was formally the Imperial Warlords,
|
|
now known as Five-O, are re-kracking software and claiming it to be original by
|
|
themselves. Futhermore they are placing insulting messages inside the software
|
|
towards certain individuals.
|
|
-------------------------------------------------------------------------------
|
|
The Kidd of 408 got busted for busted for selling codes at his school for five
|
|
dollars a piece. There was no particular company mentioned.
|
|
-------------------------------------------------------------------------------
|
|
Video Stalker (408) carded some stuff to the home of Sinbad! Sinbad! told him
|
|
that he would sign for the stuff, and when he did, he was arrested. No more
|
|
details available.
|
|
-------------------------------------------------------------------------------
|
|
The Tunnel, one of Austin, Texas's oldest phreak/hack boards, has come out of
|
|
the closet. The Tunnel was revealed on the local news to be run by the
|
|
computer crime division of the Austin Police Department. The two main goals of
|
|
the board were to A) catch carders and B) catch Mentor and Cisban Evil Priest
|
|
trying to sell those stolen computers. They were very successful at A.
|
|
-------------------------------------------------------------------------------
|
|
Stronghold East elite has announced its new advisors. Hack Advisor: Lex Luthor
|
|
Phreak Advisor: Blue Buccaneer. The soon plan to have a name change due to the
|
|
fact that Apple Commander of Stronghold North insists they the two boards are
|
|
affiliated while Slave Driver and Equalizer of Stronghold East feel
|
|
differently. With instruction from Lex Luthor, SEE has enacted new security
|
|
measures.
|
|
-------------------------------------------------------------------------------
|
|
Thanx to 2600 Magazine, Stronghold East Elite now has the complete court
|
|
transcripts of the bust that took place early last summer, most notably
|
|
concerning Private Sector and 6 others, online for viewing.
|
|
-------------------------------------------------------------------------------
|
|
Sigmund Fraud has been discharged as co-sysop of the Radio Station bbs.
|
|
-------------------------------------------------------------------------------
|
|
Captain Crunch of 512 has stated that an auto-dial program that he wrote and
|
|
uploaded was copied by TWCB Inc., who then claimed it as their own and signed
|
|
their name in it.
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Inc.==
|
|
|
|
Volume One, Issue Five, Phile #12 of 12
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
///\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\\\
|
|
Metal Shop PRIVATE\\\ Phrack World News Issue 4 Part 3 ///_ _ _______
|
|
Metal Shop AE \\\ ///| \/ | / _____/
|
|
Metal Shop Brewery \\\ Compiled by /// |_||_|etal/ /hop
|
|
\\\ /// _________/ /
|
|
Present PWN IV \\\///\\ Knight Lightning //\\\/// /__________/
|
|
-------------- \-^^^^^^-^^^^^^^^^-/ Triad
|
|
_______________________________________________________________________________
|
|
|
|
Demise of Phreakdom in Florida: The Story of Teltec
|
|
|
|
Interview with Surfer Bill by The Firelord
|
|
|
|
Written by Knight Lightning
|
|
===============================================================================
|
|
Firelord (FL): Bill, I wanted to ask you some stuff on that bust you were
|
|
telling me about.
|
|
|
|
Surfer Bill (SB): Yeah, whatta ya want to know?
|
|
|
|
FL: Who the hell got busted?
|
|
|
|
SB: Well, you wanna know who knows a hell of a lot more than me is Jack Flack.
|
|
He has the subpoena, it's about 40 pages, it lists every single one of
|
|
their names, and all the charges word for word, it's incredible.
|
|
|
|
FL: Jack Flack isn't accepting phone calls, it's probably not a very good idea.
|
|
|
|
SB: Teltec is based in Miami, they got really pissed off that everyone was
|
|
abusing their services. I mean using their codes and things like that.
|
|
These people aren't stupid. I mean they know if you've got a sequential
|
|
hacker on. They know because what happens is that their computer registers
|
|
every single bad code. So If they see 20000, 20001, 20002, and keeps on
|
|
going registering as bad codes and all of the sudden 20011 doesn't
|
|
register, but 20012 does then they know that 20011 is a good code. What
|
|
they will do is monitor this code and watch it for abnormal usage. They
|
|
will be sitting there saying, 'Hey this code has been getting a lot of use
|
|
in the past few days.' Then they will put a tracer on, trace the person,
|
|
tap the line, and start amassing information about the line owner. It is
|
|
like putting a noose around your own neck!
|
|
|
|
Basically what I heard is happening down here is that, I believe, there are
|
|
five bulletin board systems in the Miami/Fort Lauderdale/Boca Raton area
|
|
that they are after.
|
|
|
|
Caeser's Palace (Sysoped by Caeser D, Whose real name is John Kessler)
|
|
Parasec (Sysoped by Mark Barochich {sic})
|
|
COPS
|
|
Apple Tree, not Apple Tree I or Apple-Tree II, it was the Apple Tree Phreak
|
|
BBS, that one everyone now knows as the Catfur.
|
|
And Plovernet (305).
|
|
|
|
FL: Didn't you say that Teltec planted agents on all these boards?
|
|
|
|
SB: Yeah, that's what I was getting to. I don't know for a fact or anything
|
|
but, what I hear is that Teltec employees posed as undercover hackers or
|
|
phreakers and got on to the above listed boards. They had handles and
|
|
infiltrated the system, having everyone believe that they were phreakers.
|
|
Cause what they did was, well obviously they knew what they were talking
|
|
about after all they worked for the company. They posted really educated
|
|
information. From there I believe they actually posted some Teltec codes.
|
|
There again, some of this is rumor, some of this is fact, I really couldn't
|
|
tell you which was which.
|
|
|
|
FL: Well who all was busted?
|
|
|
|
SB: Jack Flack, Caeser D (John Kessler), Demetrius Cross, Dave Peters, several
|
|
others of course. One whole family got busted, the father, the son, and
|
|
the daughter. There is a list of thirty-eight people, their actual names
|
|
were published in the Miami Review, which is a lawyer newspaper that goes
|
|
to all the lawyers and judges in the Miami area. Another interesting thing
|
|
is that the list mentioned a John Doe and a Jane Doe. There was a clause
|
|
that said these two people are to be named at a later date, so who knows
|
|
who that could be or even it was more than one person.
|
|
|
|
FL: You say Lex Luthor escaped?
|
|
|
|
SB: Yes he did.
|
|
|
|
FL: They were gonna snag him, but he escaped to California.
|
|
|
|
SB: I don't know exactly if they had him or whether they were gonna bust him or
|
|
not but I know he was not mentioned.
|
|
|
|
FL: Maybe he was one of the John or Jane Doe people.
|
|
|
|
SB: Most of the stuff that I know is basically public information so I don't
|
|
know anything about that John and Jane Doe stuff.
|
|
|
|
SB: An important point is that the Teltec agents posted some codes and then
|
|
monitored those codes. I believe they cannot bust you for using those
|
|
numbers because that's a form of entrapment. Instead what they'll do is
|
|
monitor the calls, trace the calls, and then they will know who they are
|
|
dealing with.
|
|
|
|
FL: They'll hook up a dialed number recorder (DNR) on the line.
|
|
|
|
SB: Well what this whole deal is doing is sorta pointing a finger of blame.
|
|
Both people are wrong, Teltec is wrong in using entrapment to try and catch
|
|
you, and you are wrong for using their codes to phreak. So what they do is
|
|
keep an eye on you. So then they say "ah ha" this guy, John Doe over here
|
|
is using this code. We know he has been abusing our system and now we are
|
|
gonna keep an eye on him. So when this code goes dead, we're gonna watch
|
|
and see if he uses any different ones and if he does, we'll bust him.
|
|
|
|
The main thing that's gonna come out of this court case is that they are
|
|
gonna go after the the 5 people that were the system operators of the
|
|
bbses. They're not really after the average user, what I think is happening
|
|
is that the average users are going to be used as witnesses against the
|
|
system operators.
|
|
|
|
The scary part about this case is that it is really pretty big because, it
|
|
may set a precedent. If the judge rules in favor of Teltec and then Teltec
|
|
presses charges, the subpoena says that there is a minimal of $5000 damage,
|
|
and that's what they're seeking. So its gotta be well over $5000 damages.
|
|
I tell you one thing, from the amount of money and information Teltec has
|
|
put into this they are really determined to press charges. They invested a
|
|
lot of money as far as lawyers and investigators. Another scary part of
|
|
this story is that Teltec has not made the evidence that they have against
|
|
the thirty-eight people public, as far as I know, and that's what everyone
|
|
is afraid of. The average user doesn't know what he is up against.
|
|
|
|
FL: I bet the majority of the people on those boards are scared shitless now.
|
|
|
|
SB: Oh yeah, everybody is, its like the whole city of Miami is. Also I hear
|
|
that Sprint and MCI will be cracking down in the future. They are most
|
|
likely waiting to see how this case goes.
|
|
|
|
FL: Is Teltec the major service down there that everybody uses?
|
|
|
|
SB: Not really, it's one of many. The popular one these days is MCI cause it
|
|
only has those 5 digit codes.
|
|
|
|
FL: I heard Teltec gave shitty connections.
|
|
|
|
SB: Yeah, that's funny because, I was talking to Jack Flack, and I said if you
|
|
wanna crack up the people in the courtroom and you know that they are
|
|
definitely gonna bust you, and that you're guilty beyond a shadow of a
|
|
doubt, make a joke if they ask you what you know about Teltec say, "Alls I
|
|
know about Teltec is that their connections to California are really
|
|
shitty!" I don't know if they'd be too happy about hearing that one!
|
|
|
|
FL: So they are really gonna take care of this aren't they?
|
|
|
|
SB: Yeah but Teltec's main goal is to really get the system operators. You
|
|
should read this subpoena here, it talks about the system operators.
|
|
It says that the sysops "organized, financed, directed, and oversaw the
|
|
illicit posting and trading of Teltec codes" "They failed to delete the
|
|
messages containing illegal information." You see so the sysops are guilty
|
|
cause they didn't delete the messages.
|
|
|
|
FL: The thing that could've solved all this is if people used random hackers
|
|
and random destination numbers, like MegaPhreak.
|
|
|
|
SB: Another point is that even though you may be using a random hacker, most
|
|
people aren't gonna be using the system at 3 a.m. to 4 a.m. The best time
|
|
to scan is during normal business hours.
|
|
|
|
FL: That's true, after all you don't need 10,000 codes.
|
|
|
|
SB: Well anyway, I think that they are really after the system operators. And
|
|
if Teltec wins this case it will set a precedent. If all that happens then
|
|
I expect that we are gonna see a lot more of these cases popping up all
|
|
around the country.
|
|
-------------------------------------------------------------------------------
|
|
Editor's notes: There is some talk about there actually being 6 boards being
|
|
busted and not just 5. Also the reference that Lex Luthor had
|
|
any involvement or close calls with Teltec is only rumor.
|
|
Other reports from 305ers who wish to remain un-named state
|
|
that MCI has indeed stepped up its war on phreakers and
|
|
hackers. Sysops, I really hope you watch who you let on.
|
|
|
|
Remember, a filter or fee for a bbs can easily be handled by
|
|
agents or investigators. The best way to check on people is
|
|
through references.
|
|
|
|
TWCB was also online during this interview, but as they gave
|
|
little or no input to the actual content of this file all
|
|
remarks from TWCB have been screened as they were worthless.
|
|
|
|
The original interview was done on a conference and recorded on
|
|
cassette tape which was delivered to me. After which I wrote
|
|
this file. This file was given permission to be printed in
|
|
Phrack World News by The Firelord of 307 NPA.
|
|
|
|
- Knight Lightning
|
|
_______________________________________________________________________________
|
|
|
|
Telephone Testimony March 1986
|
|
-------------------
|
|
Chairman Bill McGowan made a point to the House Subcommittee on
|
|
Telecommunications. In testimony before the recently reconvened hearings on
|
|
telephone industry competition, McGowan spoke against the "diversification
|
|
frenzy" of the Bell Operating Companies (BOCs). He told the congressional
|
|
subcommittee that the industry is still in the transition to full competition
|
|
and cautioned against replacing a regulated monopoly with seven unregulated
|
|
ones.
|
|
Information taken out of MCI World, March 1986 Issue
|
|
_______________________________________________________________________________
|
|
|
|
Kaptain Krash Busted
|
|
--------------------
|
|
Kaptain Krash was caught stealing American Telephone & Telegraph's (AT&T)
|
|
Teleconferencing time through an 800 PBX posted on P-80. He has been isolated
|
|
from other members of the underground by his parents.
|
|
-------------------------------------------------------------------------------
|
|
Note from Forest Ranger:
|
|
|
|
- LET THIS BE A LESSON TO THOSE WHO USE 800 PBX'S. 800 PBX'S ARE LIKE MAKING
|
|
COLLECT CALLS AS TO WHERE YOUR NUMBER IS AUTOMATICALLY KNOWN. SO IT IS VERY
|
|
EASY TO TRACE BACK TO YOU WHILE ON THE CONFERENCE OR A LATER CHECK WILL
|
|
INDICATE THE SAME FINDINGS.
|
|
Information Provided By
|
|
F.R. Communications Newsline Service (c) 1986
|
|
_______________________________________________________________________________
|
|
|
|
Metal Shop Private Cleans House
|
|
-------------------------------
|
|
On April 13, 1986, Taran King and Knight Lightning repurged the userlog
|
|
deleting over 100 users from Metal Shop Private. This was mainly because of
|
|
non-callers clogging up the log and to make sure there would be no extra
|
|
accounts to lessen the security of the bbs.
|
|
|
|
People wishing to become members of Metal Shop Private, should contact Taran
|
|
King or Knight Lightning via email. They then would be discussed with the
|
|
Metal Shop Staff etc.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Dan Pasquale Seeks New Entertainment
|
|
------------------------------------
|
|
This message is mainly for bbs sysops. Have you been receiving more calls from
|
|
people in the 415 NPA? In conversation with Dan Pasquale (See Phoenix
|
|
Phortress Article in PWN III) High Evolutionary was told that Dan plans to try
|
|
his hand at out of state bbses..."for fun." Let it be remembered that Dan
|
|
Pasquale ran Phoenix Phortress BBS and as such saw posts for other phreak and
|
|
hack bbses. Furthermore, as a bad habit, several bbsers seem to use the same
|
|
passwords in more than one place. Therefore it is a possibility that Dan could
|
|
log on to bbses as someone else.
|
|
|
|
"The Radio Station Incident"
|
|
|
|
Oryan Quest had asked Broadway Hacker to remove him from the userlog for RS's
|
|
own security. However BH decided not to do it at that time. Roughly a week
|
|
later, someone using Oryan Quest's password logged onto the Radio Station BBS.
|
|
This person was completely computer illiterate. Example: He typed "HELP"
|
|
instead of "?" for a menu. When Broadway Hacker broke onto chat mode this
|
|
Oryan Quest dropped carrier.
|
|
|
|
Please note: Although the police had to drop charges on Oryan Quest because of
|
|
an illegal search this does not mean that the police couldn't have found his
|
|
passwords.
|
|
|
|
Broadway also mentioned a rash of new users applying from 415 NPA.
|
|
|
|
Sysops beware.
|
|
|
|
Some Information Provided By
|
|
Broadway Hacker/High Evolutionary/Oryan Quest
|
|
_______________________________________________________________________________
|
|
|
|
Maxfield Speaks
|
|
---------------
|
|
In a Detroit newspaper, John Maxfield was interviewed by a reporter. Although
|
|
I do not have the article or all the facts pertaining to it, it is known that
|
|
the names mentioned include: Phantom Phreaker, High Evolutionary, Scan Man,
|
|
Music Major, The Bootleg, and Slave Driver.
|
|
|
|
It is believed that Maxfield had acquired these names from P-80. However this
|
|
is pure speculation.
|
|
|
|
Information Provided By Various Sources
|
|
_______________________________________________________________________________
|
|
|