15609 lines
323 KiB
Plaintext
15609 lines
323 KiB
Plaintext
|
||
|
||
|
||
|
||
|
||
|
||
- T H E -
|
||
|
||
|
||
|
||
- H A C K E R ' S -
|
||
|
||
|
||
|
||
- H A N D B O O K -
|
||
|
||
|
||
|
||
|
||
|
||
Copyright (c) Hugo Cornwall
|
||
|
||
|
||
|
||
All rights reserved
|
||
|
||
|
||
|
||
First published in Great Britain in 1985 by Century Communications Ltd
|
||
|
||
Portland House, 12-13 Greek Street, London W1V 5LE.
|
||
|
||
|
||
|
||
Reprinted 1985 (four times)
|
||
|
||
|
||
|
||
ISBN 0 7126 0650 5
|
||
|
||
|
||
|
||
Printed and bound in Great Britain by Billing & Sons Limited, Worcester.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CONTENTS
|
||
|
||
|
||
|
||
Introduction vii
|
||
|
||
|
||
|
||
First Principles
|
||
|
||
|
||
|
||
2 Computer-to-computer communications 7
|
||
|
||
|
||
|
||
3 Hackers' Equipment 15
|
||
|
||
|
||
|
||
4 Targets: What you can find on mainframes 30
|
||
|
||
|
||
|
||
5 Hackers' Intelligence 42
|
||
|
||
|
||
|
||
6 Hackers' Techniques 57
|
||
|
||
|
||
|
||
7 Networks 69
|
||
|
||
|
||
|
||
8 Viewdata systems 86
|
||
|
||
|
||
|
||
9 Radio computer data 99
|
||
|
||
|
||
|
||
10 Hacking: the future 108
|
||
|
||
|
||
|
||
Appendices
|
||
|
||
|
||
|
||
I troubleshooting 112
|
||
|
||
II Glossary 117
|
||
|
||
III CCITT and related standards 130
|
||
|
||
IV Standard computer alphabets 132
|
||
|
||
V Modems 141
|
||
|
||
VI Radio Spectrum 144
|
||
|
||
VII Port-finder flow chart 148
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
INTRODUCTION
|
||
|
||
|
||
|
||
The word 'hacker' is used in two different but associated
|
||
|
||
ways: for some, a hacker is merely a computer enthusiast of any kind,
|
||
|
||
who loves working with the beasties for their own sake, as opposed to
|
||
|
||
operating them in order to enrich a company or research project --or
|
||
|
||
to play games.
|
||
|
||
|
||
|
||
This book uses the word in a more restricted sense: hacking is a
|
||
|
||
recreational and educational sport. It consists of attempting to make
|
||
|
||
unauthorised entry into computers and to explore what is there. The
|
||
|
||
sport's aims and purposes have been widely misunderstood; most
|
||
|
||
hackers are not interested in perpetrating massive frauds, modifying
|
||
|
||
their personal banking, taxation and employee records, or inducing
|
||
|
||
one world super-power into inadvertently commencing Armageddon in the
|
||
|
||
mistaken belief that another super-power is about to attack it. Every
|
||
|
||
hacker I have ever come across has been quite clear about where the
|
||
|
||
fun lies: it is in developing an understanding of a system and
|
||
|
||
finally producing the skills and tools to defeat it. In the vast
|
||
|
||
majority of cases, the process of 'getting in' is much more
|
||
|
||
satisfying than what is discovered in the protected computer files.
|
||
|
||
|
||
|
||
In this respect, the hacker is the direct descendant of the phone
|
||
|
||
phreaks of fifteen years ago. Phone phreaking became interesting as
|
||
|
||
intra-nation and international subscriber trunk dialling was
|
||
|
||
introduced, but when the London-based phreak finally chained his way
|
||
|
||
through to Hawaii, he usually had no one there to speak to except the
|
||
|
||
local weather service or American Express office, to confirm that the
|
||
|
||
desired target had indeed been hit. One of the earliest of the
|
||
|
||
present generation of hackers, Susan Headley, only 17 when she began
|
||
|
||
her exploits in California in 1977, chose as her target the local
|
||
|
||
phone company and, with the information extracted from her hacks, ran
|
||
|
||
all over the telephone network. She 'retired' four years later, when
|
||
|
||
friends started developing schemes to shut down part of the phone
|
||
|
||
system.
|
||
|
||
|
||
|
||
There is also a strong affinity with program copy-protection
|
||
|
||
crunchers. Most commercial software for micros is sold in a form to
|
||
|
||
prevent obvious casual copying, say by loading a cassette, cartridge
|
||
|
||
or disk into memory and then executing a 'save' on to a
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page VII
|
||
|
||
|
||
|
||
blank cassette or disk. Copy-protection devices vary greatly in
|
||
|
||
their methodology and sophistication and there are those who, without
|
||
|
||
any commercial motive, enjoy nothing so much as defeating them. Every
|
||
|
||
computer buff has met at least one cruncher with a vast store of
|
||
|
||
commercial programs, all of which have somehow had the protection
|
||
|
||
removed--and perhaps the main title subtly altered to show the
|
||
|
||
cruncher's technical skills--but which are then never actually used
|
||
|
||
at all.
|
||
|
||
|
||
|
||
Perhaps I should tell you what you can reasonably expect from this
|
||
|
||
handbook. Hacking is an activity like few others: it is semi-legal,
|
||
|
||
seldom encouraged, and in its full extent so vast that no individual
|
||
|
||
or group, short of an organisation like GCHQ or NSA, could hope to
|
||
|
||
grasp a fraction of the possibilities. So this is not one of those
|
||
|
||
books with titles like Games Programming with the 6502 where, if the
|
||
|
||
book is any good and if you are any good, you will emerge with some
|
||
|
||
mastery of the subject-matter. The aim of this book is merely to give
|
||
|
||
you some grasp of methodology, help you develop the appropriate
|
||
|
||
attitudes and skills, provide essential background and some
|
||
|
||
referencing material--and point you in the right directions for more
|
||
|
||
knowledge. Up to a point, each chapter may be read by itself; I have
|
||
|
||
compiled extensive appendices, containing material which will be of
|
||
|
||
use long after the main body of the text has been absorbed.
|
||
|
||
|
||
|
||
It is one of the characteristics of hacking anecdotes, like those
|
||
|
||
relating to espionage exploits, that almost no one closely involved
|
||
|
||
has much stake in the truth; victims want to describe damage as
|
||
|
||
minimal, and perpetrators like to paint themselves as heroes while
|
||
|
||
carefully disguising sources and methods. In addition, journalists
|
||
|
||
who cover such stories are not always sufficiently competent to write
|
||
|
||
accurately, or even to know when they are being hoodwink- ed. (A note
|
||
|
||
for journalists: any hacker who offers to break into a system on
|
||
|
||
demand is conning you--the most you can expect is a repeat
|
||
|
||
performance for your benefit of what a hacker has previously
|
||
|
||
succeeded in doing. Getting to the 'front page' of a service or
|
||
|
||
network need not imply that everything within that service can be
|
||
|
||
accessed. Being able to retrieve confidential information, perhaps
|
||
|
||
credit ratings, does not mean that the hacker would also be able to
|
||
|
||
alter that data. Remember the first rule of good reporting: be
|
||
|
||
sceptical.) So far as possible, I have tried to verify each story
|
||
|
||
that appears in these pages, but hackers work in isolated groups and
|
||
|
||
my sources on some of the important hacks of recent years are more
|
||
|
||
remote than I would have liked. In these
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page VIII
|
||
|
||
|
||
|
||
cases, my accounts are of events and methods which, in all the
|
||
|
||
circumstances, I believe are true. I welcome notes of correction.
|
||
|
||
|
||
|
||
Experienced hackers may identify one or two curious gaps in the
|
||
|
||
range of coverage, or less than full explanations; you can chose any
|
||
|
||
combination of the following explanations without causing me any
|
||
|
||
worry: first, I may be ignorant and incompetent; second, much of the
|
||
|
||
fun of hacking is making your own discoveries and I wouldn't want to
|
||
|
||
spoil that; third, maybe there are a few areas which are really best
|
||
|
||
left alone.
|
||
|
||
|
||
|
||
Nearly all of the material is applicable to readers in all
|
||
|
||
countries; however, the author is British and so are most of his
|
||
|
||
experiences.
|
||
|
||
|
||
|
||
The pleasures of hacking are possible at almost any level of
|
||
|
||
computer competence beyond rank beginner and with quite minimal
|
||
|
||
equipment. It is quite difficult to describe the joy of using the
|
||
|
||
world's cheapest micro, some clever firmware, a home-brew acoustic
|
||
|
||
coupler and find that, courtesy of a friendly remote PDP11/70, you
|
||
|
||
can be playing with Unix, the fashionable multitasking operating
|
||
|
||
system.
|
||
|
||
|
||
|
||
The assumptions I have made about you as a reader are that you own a
|
||
|
||
modest personal computer, a modem and some communications software
|
||
|
||
which you know, roughly, how to use. (If you are not confident yet,
|
||
|
||
practise logging on to a few hobbyist bulletin boards.) For more
|
||
|
||
advanced hacking, better equipment helps; but, just as very tasty
|
||
|
||
photographs can be taken with snap-shot cameras, the computer
|
||
|
||
equivalent of a Hasselblad with a trolley- load of accessories is not
|
||
|
||
essential.
|
||
|
||
|
||
|
||
Since you may at this point be suspicious that I have vast
|
||
|
||
technical resources at my disposal, let me describe the kit that has
|
||
|
||
been used for most of my network adventures. At the centre is a
|
||
|
||
battered old Apple II+, its lid off most of the time to draw away the
|
||
|
||
heat from the many boards cramming the expansion slots. I use an
|
||
|
||
industry standard dot matrix printer, famous equally for the variety
|
||
|
||
of type founts possible, and for the paper-handling path, which
|
||
|
||
regularly skews off. I have two large boxes crammed full of software,
|
||
|
||
as I collect comms software in particular like a deranged
|
||
|
||
philatelist, but I use one package almost exclusively. As for
|
||
|
||
modems--well, at this point the set-up does become unconventional; by
|
||
|
||
the phone point are jack sockets for BT 95A, BT 96A, BT 600 and a
|
||
|
||
North American modular jack. I have two acoustic couplers, devices
|
||
|
||
for plunging telephone handsets into so that the computer can talk
|
||
|
||
down the line, at operating speeds of 300/300 and 75/1200. I also
|
||
|
||
have three heavy, mushroom coloured 'shoe-boxes', representing modem
|
||
|
||
technology of 4 or 5 years ago and operating at various speeds and
|
||
|
||
combinations of duplex/half- duplex. Whereas the acoustic coupler
|
||
|
||
connects my computer to the line by audio, the modem links up at the
|
||
|
||
electrical level and is more accurate and free from error. I have
|
||
|
||
access to other equipment in my work and through friends, but this is
|
||
|
||
what I use most of the time.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page IX
|
||
|
||
|
||
|
||
Behind me is my other important bit of kit: a filing cabinet.
|
||
|
||
Hacking is not an activity confined to sitting at keyboards and
|
||
|
||
watching screens. All good hackers retain formidable collections of
|
||
|
||
articles, promotional material and documentation; read on, and you
|
||
|
||
will see why.
|
||
|
||
|
||
|
||
Finally, to those who would argue that a hacker's handbook must be
|
||
|
||
giving guidance to potential criminals, I have two things to say:
|
||
|
||
First, few people object to the sports of clay-pigeon shooting or
|
||
|
||
archery, although rifles, pistols and crossbows have no 'real'
|
||
|
||
purpose other than to kill things--and hackers have their own code of
|
||
|
||
responsibility, too. Second, real hacking is not as it is shown in
|
||
|
||
the movies and on tv, a situation which the publication of this book
|
||
|
||
may do something to correct. The sport of hacking itself may involve
|
||
|
||
breach of aspects of the law, notably theft of electricity, theft of
|
||
|
||
computer time and unlicensed usage of copyright material; every
|
||
|
||
hacker must decide individually each instance as it arises.
|
||
|
||
|
||
|
||
Various people helped me on various aspects of this book; they
|
||
|
||
must all remain unnamed--they know who they are and that they have my
|
||
|
||
thanks.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page X
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 1
|
||
|
||
|
||
|
||
|
||
|
||
First Principles
|
||
|
||
|
||
|
||
The first hack I ever did was executed at an exhibition stand run
|
||
|
||
by BT's then rather new Prestel service. Earlier, in an adjacent
|
||
|
||
conference hall, an enthusiastic speaker had demonstrated view-
|
||
|
||
data's potential world-wide spread by logging on to Viditel, the
|
||
|
||
infant Dutch service. He had had, as so often happens in the these
|
||
|
||
circumstances, difficulty in logging on first time. He was using one
|
||
|
||
of those sets that displays auto-dialled telephone numbers; that was
|
||
|
||
how I found the number to call. By the time he had finished his third
|
||
|
||
unsuccessful log-on attempt I (and presumably several others) had all
|
||
|
||
the pass numbers. While the BT staff were busy with other visitors to
|
||
|
||
their stand, I picked out for myself a relatively neglected viewdata
|
||
|
||
set. I knew that it was possible to by-pass the auto-dialler with its
|
||
|
||
pre-programmed phone numbers in this particular model, simply by
|
||
|
||
picking up the the phone adjacent to it, dialling my preferred
|
||
|
||
number, waiting for the whistle, and then hitting the keyboard button
|
||
|
||
labelled 'viewdata'. I dialled Holland, performed my little by-pass
|
||
|
||
trick and watched Viditel write itself on the screen. The pass
|
||
|
||
numbers were accepted first time and, courtesy of...no, I'll spare
|
||
|
||
them embarrassment...I had only lack of fluency in Dutch to restrain
|
||
|
||
my explorations. Fortunately, the first BT executive to spot what I
|
||
|
||
had done was amused as well.
|
||
|
||
|
||
|
||
Most hackers seem to have started in a similar way. Essentially
|
||
|
||
you rely on the foolishness and inadequate sense of security of
|
||
|
||
computer salesmen, operators, programmers and designers.
|
||
|
||
|
||
|
||
In the introduction to this book I described hacking as a sport;
|
||
|
||
and like most sports, it is both relatively pointless and filled with
|
||
|
||
rules, written or otherwise, which have to be obeyed if there is to
|
||
|
||
be any meaningfulness to it. Just as rugby football is not only about
|
||
|
||
forcing a ball down one end of a field, so hacking is not just about
|
||
|
||
using any means to secure access to a computer.
|
||
|
||
|
||
|
||
On this basis, opening private correspondence to secure a password
|
||
|
||
on a public access service like Prestel and then running around the
|
||
|
||
system building up someone's bill, is not what hackers call hacking.
|
||
|
||
The critical element must be the use of skill in some shape or form.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 1
|
||
|
||
|
||
|
||
Hacking is not a new pursuit. It started in the early 1960s when
|
||
|
||
the first "serious" time-share computers began to appear at
|
||
|
||
university sites. Very early on, 'unofficial' areas of the memory
|
||
|
||
started to appear, first as mere notice boards and scratch pads for
|
||
|
||
private programming experiments, then, as locations for games.
|
||
|
||
(Where, and how do you think the early Space Invaders, Lunar Landers
|
||
|
||
and Adventure Games were created?) Perhaps tech-hacking-- the
|
||
|
||
mischievous manipulation of technology--goes back even further. One
|
||
|
||
of the old favourites of US campus life was to rewire the control
|
||
|
||
panels of elevators (lifts) in high-rise buildings, so that a request
|
||
|
||
for the third floor resulted in the occupants being whizzed to the
|
||
|
||
twenty-third.
|
||
|
||
|
||
|
||
Towards the end of the 60s, when the first experimental networks
|
||
|
||
arrived on the scene (particularly when the legendary
|
||
|
||
ARPAnet--Advanced Research Projects Agency network-- opened up), the
|
||
|
||
computer hackers skipped out of their own local computers, along the
|
||
|
||
packet-switched high grade communications lines, and into the other
|
||
|
||
machines on the net. But all these hackers were privileged
|
||
|
||
individuals. They were at a university or research resource, and they
|
||
|
||
were able to borrow terminals to work with.
|
||
|
||
|
||
|
||
What has changed now, of course, is the wide availability of home
|
||
|
||
computers and the modems to go with them, the growth of public-access
|
||
|
||
networking of computers, and the enormous quantity and variety of
|
||
|
||
computers that can be accessed.
|
||
|
||
|
||
|
||
Hackers vary considerably in their native computer skills; a basic
|
||
|
||
knowledge of how data is held on computers and can be transferred
|
||
|
||
from one to another is essential. Determination, alertness,
|
||
|
||
opportunism, the ability to analyse and synthesise, the collection of
|
||
|
||
relevant helpful data and luck--the pre-requisites of any
|
||
|
||
intelligence officer--are all equally important. If you can write
|
||
|
||
quick effective programs in either a high level language or machine
|
||
|
||
code, well, it helps. A knowledge of on-line query procedures is
|
||
|
||
helpful, and the ability to work in one or more popular mainframe and
|
||
|
||
mini operating systems could put you in the big league.
|
||
|
||
|
||
|
||
The materials and information you need to hack are all around
|
||
|
||
you--only they are seldom marked as such. Remember that a large
|
||
|
||
proportion of what is passed off as 'secret intelligence' is openly
|
||
|
||
available, if only you know where to look and how to appreciate what
|
||
|
||
you find. At one time or another, hacking will test everything you
|
||
|
||
know about computers and communications. You will discover your
|
||
|
||
abilities increase in fits and starts, and you must
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 2
|
||
|
||
|
||
|
||
be prepared for long periods when nothing new appears to happen.
|
||
|
||
|
||
|
||
Popular films and tv series have built up a mythology of what
|
||
|
||
hackers can do and with what degree of ease. My personal delight in
|
||
|
||
such Dream Factory output is in compiling a list of all the mistakes
|
||
|
||
in each episode. Anyone who has ever tried to move a graphics game
|
||
|
||
from one micro to an almost-similar competitor will already know that
|
||
|
||
the chances of getting a home micro to display the North Atlantic
|
||
|
||
Strategic Situation as it would be viewed from the President's
|
||
|
||
Command Post would be slim even if appropriate telephone numbers and
|
||
|
||
passwords were available. Less immediately obvious is the fact that
|
||
|
||
most home micros talk to the outside world through limited but
|
||
|
||
convenient asynchronous protocols, effectively denying direct access
|
||
|
||
to the mainframe products of the world's undisputed leading computer
|
||
|
||
manufacturer, which favours synchronous protocols. And home micro
|
||
|
||
displays are memory-mapped, not vector-traced... Nevertheless, it is
|
||
|
||
astonishingly easy to get remarkable results. And thanks to the
|
||
|
||
protocol transformation facilities of PADs in PSS networks (of which
|
||
|
||
much more later), you can get into large IBM devices....
|
||
|
||
|
||
|
||
|
||
|
||
The cheapest hacking kit I have ever used consisted of a ZX81, 16K
|
||
|
||
RAMpack, a clever firmware accessory and an acoustic coupler. Total
|
||
|
||
cost, just over <20>100. The ZX81's touch-membrane keyboard was one
|
||
|
||
liability; another was the uncertainty of the various connectors.
|
||
|
||
Much of the cleverness of the firmware was devoted to overcoming the
|
||
|
||
native drawbacks of the ZX81's inner configuration--the fact that it
|
||
|
||
didn't readily send and receive characters in the industry-standard
|
||
|
||
ASCII code, and that the output port was designed more for instant
|
||
|
||
access to the Z80's main logic rather than to use industry-standard
|
||
|
||
serial port protocols and to rectify the limited screen display.
|
||
|
||
|
||
|
||
Yet this kit was capable of adjusting to most bulletin boards;
|
||
|
||
could get into most dial-up 300/300 asynchronous ports,
|
||
|
||
re-configuring for word-length and parity if needed; could have
|
||
|
||
accessed a PSS PAD and hence got into a huge range of computers not
|
||
|
||
normally available to micro-owners; and, with another modem, could
|
||
|
||
have got into viewdata services. You could print out pages on the ZX
|
||
|
||
'tin-foil' printer. The disadvantages of this kit were all in
|
||
|
||
convenience, not in facilities. Chapter 3 describes the sort of kit
|
||
|
||
most hackers use.
|
||
|
||
|
||
|
||
It is even possible to hack with no equipment at all. All major
|
||
|
||
banks now have a network of 'hole in the wall' cash machines-- ATMs
|
||
|
||
or Automatic Telling Machines, as they are officially
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 3
|
||
|
||
|
||
|
||
known. Major building societies have their own network. These
|
||
|
||
machines have had faults in software design, and the hackers who
|
||
|
||
played around with them used no more equipment than their fingers and
|
||
|
||
brains. More about this later.
|
||
|
||
|
||
|
||
Though I have no intention of writing at length about hacking
|
||
|
||
etiquette, it is worth one paragraph: lovers of fresh-air walks obey
|
||
|
||
the Country Code; they close gates behind them, and avoid damage to
|
||
|
||
crops and livestock. Something very similar ought to guide your
|
||
|
||
rambles into other people's computers: don't manipulate files unless
|
||
|
||
you are sure a back-up exists; don't crash operating systems; don't
|
||
|
||
lock legitimate users out from access; watch who you give information
|
||
|
||
to; if you really discover something confidential, keep it to
|
||
|
||
yourself. Hackers should not be interested in fraud. Finally, just
|
||
|
||
as any rambler who ventured past barbed wire and notices warning
|
||
|
||
about the Official Secrets Acts would deserve whatever happened
|
||
|
||
thereafter, there are a few hacking projects which should never be
|
||
|
||
attempted.
|
||
|
||
|
||
|
||
On the converse side, I and many hackers I know are convinced of one
|
||
|
||
thing: we receive more than a little help from the system managers of
|
||
|
||
the computers we attack. In the case of computers owned by
|
||
|
||
universities and polys, there is little doubt that a number of them
|
||
|
||
are viewed like academic libraries--strictly speaking they are for
|
||
|
||
the student population, but if an outsider seriously thirsty for
|
||
|
||
knowledge shows up, they aren't turned away. As for other computers,
|
||
|
||
a number of us are almost sure we have been used as a cheap means to
|
||
|
||
test a system's defences...someone releases a phone number and
|
||
|
||
low-level password to hackers (there are plenty of ways) and watches
|
||
|
||
what happens over the next few weeks while the computer files
|
||
|
||
themselves are empty of sensitive data. Then, when the results have
|
||
|
||
been noted, the phone numbers and passwords are changed, the security
|
||
|
||
improved etc etc....much easier on dp budgets than employing
|
||
|
||
programmers at <20>150/man/ day or more. Certainly the Pentagon has been
|
||
|
||
known to form 'Tiger Units' of US Army computer specialists to
|
||
|
||
pin-point weaknesses in systems security.
|
||
|
||
|
||
|
||
Two spectacular hacks of recent years have captured the public
|
||
|
||
imagination: the first, the Great Prince Philip Prestel Hack, is
|
||
|
||
described in detail in chapter 8, which deals with viewdata. The
|
||
|
||
second was spectacular because it was carried out on live national
|
||
|
||
television. It occurred on October 2nd 1983 during a follow-up to the
|
||
|
||
BBC's successful Computer Literacy series. It's worth reporting here,
|
||
|
||
because it neatly illustrates the essence of hacking as a sport...
|
||
|
||
skill with systems, careful research, maximum impact
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 4
|
||
|
||
|
||
|
||
with minimum real harm, and humour.
|
||
|
||
|
||
|
||
The tv presenter, John Coll, was trying to show off the Telecom
|
||
|
||
Gold electronic mail service. Coll had hitherto never liked long
|
||
|
||
passwords and, in the context of the tight timing and pressures of
|
||
|
||
live tv, a two letter password seemed a good idea at the time. On
|
||
|
||
Telecom Gold, it is only the password that is truly confidential;
|
||
|
||
system and account numbers, as well as phone numbers to log on to the
|
||
|
||
system, are easily obtainable. The BBC's account number, extensively
|
||
|
||
publicised, was OWL001, the owl being the 'logo' for the tv series as
|
||
|
||
well as the BBC computer.
|
||
|
||
|
||
|
||
The hacker, who appeared on a subsequent programme as a 'former
|
||
|
||
hacker' and who talked about his activities in general, but did not
|
||
|
||
openly acknowledge his responsibility for the BBC act, managed to
|
||
|
||
seize control of Coll's mailbox and superimpose a message of his own:
|
||
|
||
|
||
|
||
Computer Security Error. Illegal access. I hope your television
|
||
|
||
PROGRAMME runs as smoothly as my PROGRAM worked out your passwords!
|
||
|
||
Nothing is secure!
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Hackers' Song
|
||
|
||
|
||
|
||
"Put another password in,
|
||
|
||
Bomb it out and try again
|
||
|
||
Try to get past logging in,
|
||
|
||
We're hacking, hacking, hacking
|
||
|
||
|
||
|
||
Try his first wife's maiden name,
|
||
|
||
This is more than just a game,
|
||
|
||
It's real fun, but just the same,
|
||
|
||
It's hacking, hacking, hacking"
|
||
|
||
|
||
|
||
The Nutcracker (Hackers UK)
|
||
|
||
|
||
|
||
HI THERE, OWLETS, FROM OZ AND YUG
|
||
|
||
(OLIVER AND GUY)
|
||
|
||
|
||
|
||
After the hack a number of stories about how it had been carried
|
||
|
||
out, and by whom, circulated; it was suggested that the hackers had
|
||
|
||
crashed through to the operating system of the Prime computers upon
|
||
|
||
which the Dialcom electronic mail software
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 5
|
||
|
||
|
||
|
||
resided--it was also suggested that the BBC had arranged the whole
|
||
|
||
thing as a stunt, or alternatively, that some BBC employees had fixed
|
||
|
||
it up without telling their colleagues. Getting to the truth of a
|
||
|
||
legend in such cases is almost always impossible. No one involved has
|
||
|
||
a stake in the truth. British Telecom, with a strong commitment to
|
||
|
||
get Gold accepted in the business community, was anxious to suggest
|
||
|
||
that only the dirtiest of dirty tricks could remove the inherent
|
||
|
||
confidentiality of their electronic mail service. Naturally, the
|
||
|
||
British Broadcasting Corporation rejected any possibility that it
|
||
|
||
would connive in an irresponsible cheap stunt. But the hacker had no
|
||
|
||
great stake in the truth either--he had sources and contacts to
|
||
|
||
protect, and his image in the hacker community to bolster. Never
|
||
|
||
expect any hacking anecdote to be completely truthful.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 6
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 2
|
||
|
||
|
||
|
||
|
||
|
||
Computer-to-Computer
|
||
|
||
Communications
|
||
|
||
|
||
|
||
Services intended for access by microcomputers are nowadays
|
||
|
||
usually presented in a very user-friendly fashion: pop in your
|
||
|
||
software disc or firmware, check the connections, dial the telephone
|
||
|
||
number, listen for the tone...and there you are. Hackers, interested
|
||
|
||
in venturing where they are not invited, enjoy no such luxury. They
|
||
|
||
may want to access older services which preceded the modern 'human
|
||
|
||
interface'; they are very likely to travel along paths intended, not
|
||
|
||
for ordinary customers, but for engineers or salesmen; they could be
|
||
|
||
utilising facilities that were part of a computer's commissioning
|
||
|
||
process and have been hardly used since.
|
||
|
||
|
||
|
||
So the hacker needs a greater knowledge of datacomms technology than
|
||
|
||
does a more passive computer user, and some feeling for the history
|
||
|
||
of the technology is pretty essential, because of its growth pattern
|
||
|
||
and because of the fact that many interesting installations still use
|
||
|
||
yesterday's solutions.
|
||
|
||
|
||
|
||
Getting one computer to talk to another some distance away means
|
||
|
||
accepting a number of limiting factors:
|
||
|
||
|
||
|
||
* Although computers can send out several bits of information at
|
||
|
||
once, the ribbon cable necessary to do this is not economical at any
|
||
|
||
great length, particularly if the information is to be sent out over
|
||
|
||
a network--each wire in the ribbon would need switching separately,
|
||
|
||
thus making ex- changes prohibitively expensive. So bits must be
|
||
|
||
transmitted one at a time, or serially.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 7
|
||
|
||
|
||
|
||
* Since you will be using, in the first instance, wires and networks
|
||
|
||
already installed--in the form of the telephone and telex
|
||
|
||
networks--you must accept that the limited bandwidth of these
|
||
|
||
facilities will restrict the rate at which data can be sent. The data
|
||
|
||
will pass through long lengths of wire, frequently being
|
||
|
||
re-amplified, and undergoing de- gradation as it passes through dirty
|
||
|
||
switches and relays in a multiplicity of exchanges.
|
||
|
||
|
||
|
||
* Data must be easily capable of accurate recovery at the far end.
|
||
|
||
|
||
|
||
* Sending and receiving computers must be synchronised in their
|
||
|
||
working.
|
||
|
||
|
||
|
||
* The mode in which data is transmitted must be one understood by
|
||
|
||
all computers; accepting a standard protocol may mean adopting the
|
||
|
||
speed and efficiency of the slowest.
|
||
|
||
|
||
|
||
* The present 'universal' standard for data transmission used by
|
||
|
||
microcomputers and many other services uses agreed tones to signify
|
||
|
||
binary 0 and binary 1, the ASCII character set (also known as
|
||
|
||
International Alphabet No 5), and an asynchronous protocol, whereby
|
||
|
||
the transmitting and receiving computers are locked in step every
|
||
|
||
time a character is sent, not just at the beginning of a transmission
|
||
|
||
stream. Like nearly all standards, it is highly arbitrary in its
|
||
|
||
decisions and derives its importance simply from the fact of being
|
||
|
||
generally accepted. Like many standards, too, there are a number of
|
||
|
||
subtle and important variations.
|
||
|
||
|
||
|
||
To see how the standard works, how it came about and the reasons
|
||
|
||
for the variations, we need to look back a little into history.
|
||
|
||
|
||
|
||
|
||
|
||
The Growth of Telegraphy
|
||
|
||
|
||
|
||
The essential techniques of sending data along wires has a history
|
||
|
||
of 150 years, and some of the common terminology of modern data
|
||
|
||
transmission goes right back to the first experiments.
|
||
|
||
|
||
|
||
The earliest form of telegraphy, itself the earliest form of
|
||
|
||
electrical message sending, used the remote actuation of electrical
|
||
|
||
relays to leave marks on a strip of paper. The letters of the
|
||
|
||
alphabet were defined by the patterns of 'mark' and 'space'.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 8
|
||
|
||
|
||
|
||
The terms have come through to the present, to signify binary
|
||
|
||
conditions of '1' and '0' respectively. The first reliable machine
|
||
|
||
for sending letters and figures by this method dates from 1840; the
|
||
|
||
direct successor of that machine, using remarkably unchanged
|
||
|
||
electromechanical technology and a 5-bit alphabetic code, is still
|
||
|
||
widely used today, as the telex/teleprinter/teletype. The mark and
|
||
|
||
space have been replaced by holes punched in paper-tape: larger holes
|
||
|
||
for mark, smaller ones for space. Synchronisation between sending and
|
||
|
||
receiving stations is carried out by beginning each letter with a
|
||
|
||
'start' bit (a space) and concluding it with a 'stop' bit (mark). The
|
||
|
||
'idle' state of a circuit is thus 'mark'. In effect, therefore, each
|
||
|
||
letter requires the transmission of 7 bits:
|
||
|
||
|
||
|
||
. * * . . . * (letter A: . = space; * = mark)
|
||
|
||
|
||
|
||
of which the first . is the start bit, the last * is the stop bit and
|
||
|
||
* * . .. is the code for A.
|
||
|
||
|
||
|
||
This is the principle means for sending text messages around the
|
||
|
||
world, and the way in which news reports are distributed globally.
|
||
|
||
And, until third-world countries are rich enough to afford more
|
||
|
||
advanced devices, the technology will survive.
|
||
|
||
|
||
|
||
|
||
|
||
Early computer communications
|
||
|
||
|
||
|
||
When, 110 years after the first such machines came on line, the
|
||
|
||
need arose to address computers remotely, telegraphy was the obvious
|
||
|
||
way to do so. No one expected computers in the early 1950s to give
|
||
|
||
instant results; jobs were assembled in batches, often fed in by
|
||
|
||
means of paper-tape (another borrowing from telex, still in use) and
|
||
|
||
then run. The instant calculation and collation of data was then
|
||
|
||
considered quite miraculous. So the first use of data communications
|
||
|
||
was almost exclusively to ensure that the machine was fed with
|
||
|
||
up-to-date information, not for the machine to send the results out
|
||
|
||
to those who might want it; they could wait for the 'print-out' in
|
||
|
||
due course, borne to them with considerable solemnity by the computer
|
||
|
||
experts. Typical communications speeds were 50 or 75 baud. (The baud
|
||
|
||
is the measure of speed of data transmission: specifically, it refers
|
||
|
||
to the number of signal level changes per second and is thus not the
|
||
|
||
same as bits-per-second.)
|
||
|
||
|
||
|
||
These early computers were, of course, in today's jargon,
|
||
|
||
single-user/single-task; programs were fed by direct machine coding.
|
||
|
||
Gradually, over the next 15 years, computers spawned multi-user
|
||
|
||
capabilities by means of time-sharing techniques, and their human
|
||
|
||
interface became more 'user-friendly'.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 9
|
||
|
||
|
||
|
||
With these facilities grew the demand for remote access to
|
||
|
||
computers, and modern data communications began.
|
||
|
||
|
||
|
||
Even at the very end of the 1960s when I had my own very first
|
||
|
||
encounter with a computer, the links with telegraphy were still
|
||
|
||
obvious. As a result of happenstance, I was in a Government-run
|
||
|
||
research facility to the south-west of London, and the program I was
|
||
|
||
to use was located on a computer just to the north of Central London;
|
||
|
||
I was sat down in front of a battered teletype--capitals and figures
|
||
|
||
only, and requiring not inconsiderable physical force from my
|
||
|
||
smallish fingers to actuate the keys of my choice. As it was a
|
||
|
||
teletype outputting on to a paper roll, mistakes could not as readily
|
||
|
||
be erased as on a VDU, and since the sole form of error reporting
|
||
|
||
consisted of a solitary ?, the episode was more frustrating than
|
||
|
||
thrilling. VDUs and good keyboards were then far too expensive for
|
||
|
||
'ordinary' use.
|
||
|
||
|
||
|
||
|
||
|
||
The telephone network
|
||
|
||
|
||
|
||
But by that time all sorts of changes in datacomms were taking
|
||
|
||
place. The telex and telegraphy network, originally so important, had
|
||
|
||
long been overtaken by voice-grade telephone circuits (Bell's
|
||
|
||
invention dates from 1876). For computer communication, mark and
|
||
|
||
space could be indicated by different audio tones, rather than by
|
||
|
||
different voltage conditions. Data traffic on a telex line can
|
||
|
||
operate in only one direction at a time, but, by selecting different
|
||
|
||
pairs of tones, both 'transmitter' and 'receiver' could speak
|
||
|
||
simultaneously--so that in fact, one has to talk about 'originate'
|
||
|
||
and 'answer' instead.
|
||
|
||
|
||
|
||
Improved electrical circuit design meant that higher speeds than
|
||
|
||
50 or 75 baud became possible; there was a move to 110 baud, then 300
|
||
|
||
and, so far as ordinary telephone circuits are concerned, 1200 baud
|
||
|
||
is now regarded as the top limit.
|
||
|
||
|
||
|
||
The 'start' and 'stop' method of synchronising the near and far
|
||
|
||
end of a communications circuit at the beginning of each individual
|
||
|
||
letter has been retained, but the common use of the 5-bit Baudot code
|
||
|
||
has been replaced by a 7-bit extended code which allows for many more
|
||
|
||
characters, 128 in fact.
|
||
|
||
|
||
|
||
Lastly, to reduce errors in transmission due to noise in the
|
||
|
||
telephone line and circuitry, each letter can be checked by the use
|
||
|
||
of a further bit (the parity bit), which adds up all the bits in the
|
||
|
||
main character and then, depending on whether the result is odd or
|
||
|
||
even, adds a binary 0 or binary 1.
|
||
|
||
|
||
|
||
The full modern transmission of a letter in this system, in this
|
||
|
||
case, K, therefore, looks like this:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 10
|
||
|
||
|
||
|
||
START-STOP TRANSMISSION OF A DATA CHARACTER
|
||
|
||
|
||
|
||
TIME
|
||
|
||
INTERVAL_____________9___0___1___2___3___4___5___6___7___8___9___
|
||
|
||
NUMBER
|
||
|
||
1 1 1 1 1 1
|
||
|
||
Mark +---+ +---+ +---+ +---+---+ +---+
|
||
|
||
LINE | | 0 | | 0 0 | | 0 | | 0 | |
|
||
|
||
CONDITION Space-+ +---+ +---+---+ +---+ +---+ +-
|
||
|
||
|
||
|
||
^ ^
|
||
|
||
| |
|
||
|
||
BINARY STOP-+ START 1 0 0 1 0 1 1 0
|
||
|
||
DIGIT
|
||
|
||
|
||
|
||
The first 0 is the start bit; then follows 7 bits of the actual
|
||
|
||
letter code (1001011); then the parity bit; then the final 1 is the
|
||
|
||
stop code.
|
||
|
||
|
||
|
||
This system, asynchronous start-stop ASCII (the common name for
|
||
|
||
the alphabetic code), is the basis for nearly all micro-based
|
||
|
||
communications. The key variations relate to:
|
||
|
||
|
||
|
||
bit-length; you can have 7 or 8 databits (*)
|
||
|
||
|
||
|
||
parity; (it can be even or odd, or entirely absent),
|
||
|
||
|
||
|
||
Tones - The tones used to signify binary 0 and binary 1, and which
|
||
|
||
computer is in 'originate' and which in 'answer', can vary according
|
||
|
||
to the speed of the transmission and also to whether the service is
|
||
|
||
used in North America or the rest of the world. (Briefly, most of
|
||
|
||
the world uses tones and standards laid down by the Geneva-based
|
||
|
||
organisation, CCITT, a specialised agency of the International
|
||
|
||
Telecommunications Union; whereas in the United States and most parts
|
||
|
||
of Canada, tones determined by the telephone utility, colloquially
|
||
|
||
known as Ma Bell, are adopted.) The following table gives the
|
||
|
||
standards and tones in common use.
|
||
|
||
|
||
|
||
(*) There are no 'obvious explanations' for the variations commonly
|
||
|
||
found: most electronic mail services and viewdata transmit 7 data
|
||
|
||
bits, even parity and I stop Bit; Telecom Gold and most hobbyist
|
||
|
||
bulletin boards transmit 8 data bits, odd parity and 1 stop bit.
|
||
|
||
Terminal emulator software--see chapter 3--allows users to adjust for
|
||
|
||
these differing requirements.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 11
|
||
|
||
|
||
|
||
Service Speed Duplex Transmit Receive Answer
|
||
|
||
Designator 0 1 0 1
|
||
|
||
|
||
|
||
V21 orig 300(*) full 1180 980 1850 1650 -
|
||
|
||
V21 ans 300(*) full 1850 1650 1180 980 2100
|
||
|
||
V23 (1) 600 half 1700 1300 1700 1300 2100
|
||
|
||
V23 (2) 1200 f/h(**) 2100 1300 2100 1300 2100
|
||
|
||
V23 back 75 f/h(**) 450 390 450 390 -
|
||
|
||
Bell 103 orig 300(*) full 1070 1270 2025 2225 -
|
||
|
||
Bell 103 ans 300(*) full 2025 2225 1070 1270 2225
|
||
|
||
Bell 202 1200 half 2200 1200 2200 1200 2025
|
||
|
||
|
||
|
||
(*)any speed up to 300 baud, can also include 75 and 110 baud
|
||
|
||
services
|
||
|
||
|
||
|
||
(**)service can either be half-duplex at 1200 baud or asymmetrical
|
||
|
||
full duplex, with 75 baud originate and 1200 baud receive (commonly
|
||
|
||
used as viewdata user) or 1200 transmit and 75 receive (viewdata
|
||
|
||
host)
|
||
|
||
|
||
|
||
|
||
|
||
Higher Speeds
|
||
|
||
|
||
|
||
1200 baud is usually regarded as the fastest speed possible on an
|
||
|
||
ordinary voice-grade telephone line. Beyond this, noise on the line
|
||
|
||
due to the switching circuits at the various telephone exchanges,
|
||
|
||
poor cabling, etc. make accurate transmission difficult. Indeed, at
|
||
|
||
higher speeds it becomes increasingly important to use transmission
|
||
|
||
protocols that include error correction.
|
||
|
||
|
||
|
||
Error correction techniques usually consist of dividing the
|
||
|
||
transmission stream into a series of blocks which can be checked, one
|
||
|
||
at a time, by the receiving computer. The 'parity' system mentioned
|
||
|
||
above is one example, but obviously a crude one. The difficulty is
|
||
|
||
that the more secure an error-correction protocol becomes, the
|
||
|
||
greater becomes the overhead in terms of numbers of bits transmitted
|
||
|
||
to send just one character from one computer to another. Thus, in the
|
||
|
||
typical 300 bit situation, the actual letter is defined by 7 bits,
|
||
|
||
'start' and 'stop' account for another two, and the check takes a
|
||
|
||
further one--ten in all. After a while, what you gain in the speed
|
||
|
||
with which each actual bit is transmitted, you lose, because so many
|
||
|
||
bits have to be sent to ensure that a single character is accurately
|
||
|
||
received!
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 12
|
||
|
||
|
||
|
||
Although some people risk using 2400 baud on ordinary telephone
|
||
|
||
lines--the jargon is the PTSN (Public Telephone Switched
|
||
|
||
Network)--this means using expensive modems. Where higher speeds are
|
||
|
||
essential, leased circuits, not available via dial-up. become
|
||
|
||
essential. The leased circuit is paid for on a fixed charge, not a
|
||
|
||
charge based on time-connected. Such circuits can be conditioned',
|
||
|
||
for example by using special amplifiers, to support the higher data
|
||
|
||
rate.
|
||
|
||
|
||
|
||
For really high speed transmissions, however, pairs of copper
|
||
|
||
cable are inadequate. Medium speed is obtainable by the use of
|
||
|
||
coaxial cable (a little like that used for tv antenna hook-ups) which
|
||
|
||
have a very broad bandwidth. Imposing several different channels on
|
||
|
||
one cable-length is called multiplexing and, depending on the
|
||
|
||
application, the various channels can either carry several different
|
||
|
||
computer conversations simultaneously or can send several bits of one
|
||
|
||
computer conversation in parallel, just as though there were a ribbon
|
||
|
||
cable between the two participating computers. Either way, what
|
||
|
||
happens is that each binary 0 or binary 1 is given, not an audio
|
||
|
||
tone, but a radio frequency tone.
|
||
|
||
|
||
|
||
|
||
|
||
Synchronous Protocols
|
||
|
||
|
||
|
||
In the asynchronous protocols so far described, transmitting and
|
||
|
||
receiving computers are kept in step with each other every time a
|
||
|
||
character is sent, via the 'start' and 'stop' bits. In synchronous
|
||
|
||
comms, the locking together is done merely at the start of each block
|
||
|
||
of transmission by the sending of a special code (often SYN). The SYN
|
||
|
||
code starts a clock (a timed train of pulses) in the receiver and it
|
||
|
||
is this that ensures that binary 0s and 1s originating at the
|
||
|
||
transmitter are correctly interpreted by the receiver; clearly, the
|
||
|
||
displacement of even one binary digit can cause havoc.
|
||
|
||
|
||
|
||
A variety of synchronous protocols exist, such as the length of
|
||
|
||
block sent each time, the form of checking that takes place, the form
|
||
|
||
of acknowledgement, and so on. A synchronous protocol is not only a
|
||
|
||
function of the modem, which has to have a suitable clock, but also
|
||
|
||
of the software and firmware in the computers. Because asynchronous
|
||
|
||
protocols transmit so many 'extra' bits in order to avoid error,
|
||
|
||
savings in transmission time under synchronous systems often exceed
|
||
|
||
20-30%. The disadvantage of synchronous protocols lie in increased
|
||
|
||
hardware costs.
|
||
|
||
|
||
|
||
One other complication exists: most asynchronous protocols use the
|
||
|
||
ASCII code to define characters. IBM ('Big Blue'), the biggest
|
||
|
||
enthusiast of synchronous comms, has its own binary code to define
|
||
|
||
characters. In Appendix IV, you will find an explanation and a
|
||
|
||
comparison with ASCII.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 13
|
||
|
||
|
||
|
||
The hacker, wishing to come to terms with synchronous comms, has
|
||
|
||
two choices: the more expensive is to purchase a protocol convertor
|
||
|
||
board. These are principally available for the IBM PC, which has been
|
||
|
||
increasingly marketed for the 'executive workstation' audience, where
|
||
|
||
the ability to interface to a company's existing (IBM) mainframe is a
|
||
|
||
key feature. The alternative is to see whether the target mainframe
|
||
|
||
has a port on to a packet- switched service; in that event, the
|
||
|
||
hacker can use ordinary asynchronous equipment and protocols--the
|
||
|
||
local PAD (Packet Assembler/Disassembler) will carry out the
|
||
|
||
necessary transformations.
|
||
|
||
|
||
|
||
|
||
|
||
Networks
|
||
|
||
|
||
|
||
Which brings us neatly to the world of high-speed digital networks
|
||
|
||
using packet-switching. All the computer communications so far
|
||
|
||
described have taken place either on the phone (voice-grade) network
|
||
|
||
or on the telex network.
|
||
|
||
|
||
|
||
In Chapter 7 we will look at packet-switching and the
|
||
|
||
opportunities offered by international data networks. We must now
|
||
|
||
specify hackers' equipment in more detail.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 14
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 3
|
||
|
||
|
||
|
||
|
||
|
||
Hackers' Equipment
|
||
|
||
|
||
|
||
You can hack with almost any microcomputer capable of talking to
|
||
|
||
the outside world via a serial port and a modem. In fact, you don't
|
||
|
||
even need a micro; my first hack was with a perfectly ordinary
|
||
|
||
viewdata terminal.
|
||
|
||
|
||
|
||
What follows in this chapter, therefore, is a description of the
|
||
|
||
elements of a system I like to think of as optimum for
|
||
|
||
straight-forward asynchronous ASCII and Baudot communications. What
|
||
|
||
is at issue is convenience as much as anything. With kit like this,
|
||
|
||
you will be able to get through most dial-up ports and into
|
||
|
||
packet-switching through a PAD -- a packet assembler/ disassembler
|
||
|
||
port. (It will not get you into IBM networks, because these use
|
||
|
||
different and incompatible protocols; we will return to the matter of
|
||
|
||
the IBM world in chapter 10.) In other words, given a bit of money, a
|
||
|
||
bit of knowledge, a bit of help from friends and a bit of luck, what
|
||
|
||
is described here is the sort of equipment most hackers have at their
|
||
|
||
command.
|
||
|
||
|
||
|
||
You will find few products on the market labelled 'for hackers';
|
||
|
||
you must select those items that appear to have 'legitimate' but
|
||
|
||
interesting functions and see if they can be bent to the hacker's
|
||
|
||
purposes. The various sections within this chapter highlight the sort
|
||
|
||
of facilities you need; before lashing out on some new software or
|
||
|
||
hardware, try to get hold of as much publicity and documentation
|
||
|
||
material as possible to see how adaptable the products are. In a few
|
||
|
||
cases, it is worth looking at the second-hand market, particularly
|
||
|
||
for modems, cables and test equipment.
|
||
|
||
|
||
|
||
Although it is by no means essential, an ability to solder a few
|
||
|
||
connections and scrabble among the circuit diagrams of 'official'
|
||
|
||
products often yield unexpectedly rewarding results.
|
||
|
||
|
||
|
||
|
||
|
||
The computer
|
||
|
||
|
||
|
||
Almost any popular microcomputer will do; hacking does not call
|
||
|
||
upon enormous reserves of computer power. Nearly everything you hack
|
||
|
||
will come to you in alphanumeric form, not graphics. The computer
|
||
|
||
you already have will almost certainly have the essential qualities.
|
||
|
||
However the very cheapest micros, like the ZX81, whilst usable,
|
||
|
||
require much more work on the part of the operator/hacker, and give
|
||
|
||
him far less in the way of instant facilities.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 15
|
||
|
||
|
||
|
||
(In fact, as the ZX81 doesn't use ASCII internally, but a
|
||
|
||
Sinclair-developed variant; you will need a software or firmware fix
|
||
|
||
for that, before you even think of hooking it up to a modem.)
|
||
|
||
|
||
|
||
Most professional data services assume the user is viewing on an
|
||
|
||
80-column screen; ideally the hacker's computer should be capable of
|
||
|
||
doing that as well, otherwise the display will be full of awkward
|
||
|
||
line breaks. Terminal emulator software (see below) can some- times
|
||
|
||
provide a 'fix'.
|
||
|
||
|
||
|
||
One or two disc drives are pretty helpful, because you will want
|
||
|
||
to be able to save the results of your network adventures as quickly
|
||
|
||
and efficiently as possible. Most terminal emulators use the
|
||
|
||
computer's free memory (i.e. all that is not required to support the
|
||
|
||
operating system and the emulator software itself) as store for the
|
||
|
||
received data, but once the buffer is full, you will begin to lose
|
||
|
||
the earliest items. You can, of course, try to save to cassette, but
|
||
|
||
normally that is a slow and tedious process.
|
||
|
||
|
||
|
||
An alternative storage method is to save to a printer, printing
|
||
|
||
the received data stream not only to the computer screen, but also on
|
||
|
||
a dot matrix printer. However, most of the more popular (and cheaper)
|
||
|
||
printers do not work sufficiently fast. You may find you lose
|
||
|
||
characters at the beginning of each line. Moreover, if you print
|
||
|
||
everything in real-time, you'll include all your mistakes, false
|
||
|
||
starts etc., and in the process use masses of paper. So, if you can
|
||
|
||
save to disc regularly, you can review each hack afterwards at your
|
||
|
||
leisure and, using a screen editor or word processor, save or print
|
||
|
||
out only those items of real interest.
|
||
|
||
|
||
|
||
|
||
|
||
Serial ports
|
||
|
||
|
||
|
||
The computer must have a serial port, either called that or marked
|
||
|
||
RS232C (or its slight variant RS423), or V24, which is the official
|
||
|
||
designator of RS232C used outside the USA, though not often seen on
|
||
|
||
micros.
|
||
|
||
|
||
|
||
The very cheapest micros, like the ZX81, Spectrum, VIC20, do not
|
||
|
||
have RS232C ports, though add-on boards are available. Some of the
|
||
|
||
older personal computers, like the Apple or the original Pet, were
|
||
|
||
also originally sold without serial ports, though standard boards are
|
||
|
||
available for all of these.
|
||
|
||
|
||
|
||
You are probably aware that the RS232C standard has a large number
|
||
|
||
of variants, and that not all computers (or add-on boards) that claim
|
||
|
||
to have a RS232C port can actually talk into a modem.
|
||
|
||
|
||
|
||
Historically, RS232C/V24 is supposed to cover all aspects of
|
||
|
||
serial communication, including printers and dumb terminals as well
|
||
|
||
as computers. The RS232C standard specifies electrical and physical
|
||
|
||
requirements.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 16
|
||
|
||
|
||
|
||
Everything is pumped through a 25-pin D-shaped connector, each pin
|
||
|
||
of which has some function in some implementation. But in most cases,
|
||
|
||
nearly all the pins are not used. In practice, only three connections
|
||
|
||
are essential for computer to modem communication:
|
||
|
||
|
||
|
||
Pin 7 signal ground
|
||
|
||
|
||
|
||
Pin 2 characters leaving the computer
|
||
|
||
|
||
|
||
Pin 3 characters arriving at the computer
|
||
|
||
|
||
|
||
The remaining connections are for such purposes as feeding power
|
||
|
||
to an external device, switching the external advice on or off,
|
||
|
||
exchanging status and timing signals, monitoring the state of the
|
||
|
||
line, and so forth. Some computers and their associated firmware
|
||
|
||
require one or other of these status signals to go 'high' or 'low' in
|
||
|
||
particular circumstances, or the program hangs. Check your
|
||
|
||
documentation if you have trouble.
|
||
|
||
|
||
|
||
Some RS232C implementations on microcomputers or add-on boards are
|
||
|
||
there simply to support printers with serial interfaces, but they can
|
||
|
||
often be modified to talk into modems. The critical two lines are
|
||
|
||
those serving Pins 2 and 3.
|
||
|
||
|
||
|
||
A computer serving a modem needs a cable in which Pin 2 on the
|
||
|
||
computer is linked to Pin 2 on the modem.
|
||
|
||
|
||
|
||
A computer serving a printer, etc, needs a cable in which Pin 3 on
|
||
|
||
the: computer is linked to Pin 2 on the printer and Pin 3 on the
|
||
|
||
printer is linked to Pin 2 on the computer.
|
||
|
||
|
||
|
||
If two computers are linked together directly, without a modem,
|
||
|
||
then Pin 2 on computer A must be linked to Pin 3 on computer B and
|
||
|
||
Pin 3 on computer B linked to Pin 2 on computer A: this arrangement
|
||
|
||
is sometimes called a 'null modem' or a 'null modem cable'.
|
||
|
||
|
||
|
||
There are historic explanations for these arrangements, depending
|
||
|
||
on who you think is sending and who is receiving--forget about them,
|
||
|
||
they are confusing. The above three cases are all you need to know
|
||
|
||
about in practice.
|
||
|
||
|
||
|
||
One difficulty that frequently arises with newer or portable
|
||
|
||
computers is that some manufacturers have abandoned the traditional
|
||
|
||
25-way D-connector, largely on the grounds of bulk, cost and
|
||
|
||
redundancy. Some European computer and peripheral companies favour
|
||
|
||
connectors based on the DIN series (invented in Germany), while
|
||
|
||
others use D-connectors with fewer pin-outs.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 17
|
||
|
||
|
||
|
||
There is no standardisation. Even if you see two physically
|
||
|
||
similar connectors on two devices, regard them with suspicion. In
|
||
|
||
each case, you must determine the equivalents of:
|
||
|
||
|
||
|
||
Characters leaving computer (Pin 2)
|
||
|
||
Characters arriving at computer (Pin 3)
|
||
|
||
Signal ground (Pin 7)
|
||
|
||
|
||
|
||
You can usually set the speed of the port from the computer's
|
||
|
||
operating system and/or from Basic. There is no standard way of doing
|
||
|
||
this; you must check your handbook and manuals. Most RS232C ports can
|
||
|
||
handle the following speeds:
|
||
|
||
|
||
|
||
75, 110, 300, 600, 1200, 2400, 4800, 9600
|
||
|
||
|
||
|
||
and sometimes 50 and 19200 baud as well. These speeds are selectable
|
||
|
||
in hardware by appropriate wiring of a chip called a baud-rate
|
||
|
||
generator. Many modern computers let you select speed in hardware by
|
||
|
||
means of a DIL switch. The higher speeds are used either for driving
|
||
|
||
printers or for direct computer-to-computer or computer-to-peripheral
|
||
|
||
connections. The normal maximum speed for transmitting along phone
|
||
|
||
lines is 1200 baud.
|
||
|
||
|
||
|
||
|
||
|
||
Depending on how your computer has been set up, you may be able to
|
||
|
||
control the speed from the keyboard--a bit of firmware in the
|
||
|
||
computer will accept micro-instructions to flip transistor switches
|
||
|
||
controlling the wiring of the baud-rate generator. Alternatively,
|
||
|
||
the speeds may be set in pure software, the micro deciding at what
|
||
|
||
speed to feed information into the serial port.
|
||
|
||
|
||
|
||
In most popular micro implementations the RS232C cannot support
|
||
|
||
split-speed working (different speeds for receive and transmit). If
|
||
|
||
you set the port up for 1200 baud, it has to be 1200 receive and
|
||
|
||
transmit. This is a nuisance in Europe, where 75/1200 is in common
|
||
|
||
use both for viewdata systems and for some on-line services. The
|
||
|
||
usual way round is to have special terminal emulator software, which
|
||
|
||
requires the RS232C hardware to operate at 1200 /1200 and then slows
|
||
|
||
down (usually the micro's transmit path) to 75 baud in software by
|
||
|
||
means of a timing loop. An alternative method relies on a special
|
||
|
||
modem, which accepts data from the computer at 1200/1200 and then
|
||
|
||
performs the slowing-down to 75 baud in its own internal firmware.
|
||
|
||
|
||
|
||
|
||
|
||
Terminal emulators
|
||
|
||
|
||
|
||
We all need a quest in life. Sometimes I think mine is to search
|
||
|
||
for the perfect software package to make micros talk to the outside
|
||
|
||
world.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 18
|
||
|
||
|
||
|
||
As in all such quests, the goal is occasionally approached but
|
||
|
||
never reached, if only because the process of the quest causes one to
|
||
|
||
redefine what one is looking for.
|
||
|
||
|
||
|
||
These items of software are sometimes called communications
|
||
|
||
packages, or asynchronous comms packages, and sometimes terminal
|
||
|
||
emulators, on the grounds that the software can make the micro appear
|
||
|
||
to be a variety of different computer terminals. Until recently, most
|
||
|
||
on-line computer services assumed that they were being examined
|
||
|
||
through 'dumb' terminals--simply a keyboard and a screen, with no
|
||
|
||
attendant processing or storage power (except perhaps a printer).
|
||
|
||
With the arrival of PCs all this is slowly changing, so that the
|
||
|
||
remote computer has to do no more than provide relatively raw data
|
||
|
||
and all the formatting and on-screen presentation is done by the
|
||
|
||
user's own computer. Terminal emulator software is a sort of
|
||
|
||
half-way house between 'dumb' terminals and PCs with considerable
|
||
|
||
local processing power.
|
||
|
||
|
||
|
||
Given the habit of manufacturers of mainframe and mini- computers
|
||
|
||
to make their products as incompatible with those of their
|
||
|
||
competitors as possible (to maximise their profits), many slight
|
||
|
||
variants on the 'dumb' computer terminal exist--hence the
|
||
|
||
availability of terminal emulators to provide, in one software
|
||
|
||
package, a way of mimicking all the popular types.
|
||
|
||
|
||
|
||
Basic software to get a computer to talk through its RS232C port,
|
||
|
||
and to take in data sent to it, is trivial. What the hacker needs is
|
||
|
||
software that will make his computer assume a number of different
|
||
|
||
personalities upon command, store data as it is collected, and print
|
||
|
||
it out.
|
||
|
||
|
||
|
||
Two philosophies of presenting such software to the user exist:
|
||
|
||
first, one which gives the naive user a simple menu which says, in
|
||
|
||
effect, 'press a key to connect to database' and then performs
|
||
|
||
everything smoothly, without distracting menus. Such programs need an
|
||
|
||
'install' procedure, which requires some knowledge, but most
|
||
|
||
'ordinary' users never see this. Normally, this is a philosophy of
|
||
|
||
software writing I very much admire: however, as a hacker you will
|
||
|
||
want the precise opposite. The second approach to terminal emulator
|
||
|
||
software allows you to re configure your computer as you go on--there
|
||
|
||
is plenty of on-screen help in the form of menus allowing you to turn
|
||
|
||
on and off local echo, set parity bits, show non-visible control
|
||
|
||
codes and so on. In a typical hack, you may have only vague
|
||
|
||
information about the target computer, and much of the fun is seeing
|
||
|
||
how quickly you can work out what the remote computer wants to 'see'
|
||
|
||
- and how to make your machine respond.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 19
|
||
|
||
|
||
|
||
Given the numbers of popular computers on the market, and the
|
||
|
||
numbers of terminal emulators for each one, it is difficult to make a
|
||
|
||
series of specific recommendations. What follows there- fore, is a
|
||
|
||
list of the sort of facilities you should look for:
|
||
|
||
|
||
|
||
On-line help You must be able to change the software
|
||
|
||
characteristics while on-line--no separate 'install' routine. You
|
||
|
||
should be able to call up 'help' menus instantly, with simple
|
||
|
||
commands --while holding on to the line.
|
||
|
||
|
||
|
||
Text buffer - The received data should be capable of going into the
|
||
|
||
computer's free memory automatically so that you can view it later
|
||
|
||
off-line. The size of the buffer will depend on the amount of memory
|
||
|
||
left after the computer has used up the space required for its
|
||
|
||
operating system and the terminal software. If the terminal software
|
||
|
||
includes special graphics, as in Apple Visiterm or some of the ROM
|
||
|
||
packs used with the BBC, the buffer space may be relatively small.
|
||
|
||
The software should tell you how much buffer space you have used and
|
||
|
||
how much is left, at any time. A useful adjunct is an auto-save
|
||
|
||
facility which, when the buffer becomes full, stops the stream of
|
||
|
||
text from the host computer and automatically saves the buffer text
|
||
|
||
to disc. A number of associated software commands should let you turn
|
||
|
||
on and off the buffer store, clear it or, when off-line, view the
|
||
|
||
buffer. You should also be able to print the buffer to a 'line'
|
||
|
||
printer (dot-matrix or daisy wheel or thermal image). Some terminal
|
||
|
||
emulators even include a simple line editor, so that you can delete
|
||
|
||
or adjust the buffer before printing. (I use a terminal emulator
|
||
|
||
which saves text files in a form which can be accessed by my
|
||
|
||
word-processor and use that before printing out.)
|
||
|
||
|
||
|
||
Half/full Duplex (Echo On/Off) - Most remote services use an echoing
|
||
|
||
protocol: this means that when the user sends a character to the host
|
||
|
||
computer, the host immediately sends back the same character to the
|
||
|
||
user's computer, by way of confirmation. What the user sees on his
|
||
|
||
computer screen, therefore, has been generated, not locally by his
|
||
|
||
direct action on the keyboard, but remotely by the host computer.
|
||
|
||
(One effect of this is that there may sometimes be a perceptible
|
||
|
||
delay between keystroke and display of a letter, particularly if you
|
||
|
||
are using a packet-switched connection--if the telephone line is
|
||
|
||
noisy, the display may appear corrupt). This echoing protocol is
|
||
|
||
known as full duplex, because both the user's computer and the host
|
||
|
||
are in communication simultaneously.
|
||
|
||
|
||
|
||
However, use of full duplex/echo is not universal, and all
|
||
|
||
terminal emulators allow you to switch on and off the facility. If,
|
||
|
||
for example, you are talking into a half-duplex system (i.e. no
|
||
|
||
echo), your screen would appear totally blank. In these
|
||
|
||
circumstances, it is best if your software reproduces on the screen
|
||
|
||
your keystrokes.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 20
|
||
|
||
|
||
|
||
However, if you have your computer set for half-duplex and the host
|
||
|
||
computer is actually operating in full duplex. each letter will
|
||
|
||
appear twice--once from the keyboard and once, echoing from the host,
|
||
|
||
ggiiwiinngg tthhiiss ssoorrtt ooff eeffffeecctt. Your terminal
|
||
|
||
emulator needs to able to toggle between the two states.
|
||
|
||
|
||
|
||
Data Format/Parity Setting - In a typical asynchronous protocol, each
|
||
|
||
character is surrounded by bits to show when it starts, when it ends,
|
||
|
||
and to signify whether a checksum performed on its binary equivalent
|
||
|
||
comes out even or odd. The character itself is described, typically,
|
||
|
||
in 7 bits and the other bits, start, stop and parity, bringing the
|
||
|
||
number up to 10. (See chapter 2.) However, this is merely one very
|
||
|
||
common form, and many systems use subtle variants -- the ideal
|
||
|
||
terminal emulator software will let you try out these variants while
|
||
|
||
you are still on line. Typical variants should include:
|
||
|
||
|
||
|
||
Word length Parity No stop bits
|
||
|
||
|
||
|
||
7 Even 2
|
||
|
||
7 Odd 2
|
||
|
||
7 Even 1
|
||
|
||
7 Odd 1
|
||
|
||
8 None 2
|
||
|
||
8 None 1
|
||
|
||
8 Even 1
|
||
|
||
8 Odd 1
|
||
|
||
|
||
|
||
|
||
|
||
(NB although the ASCII character set is 7 bit, 8 bits are sometimes
|
||
|
||
transmitted with a ~padding~ bit; machine code instructions for 8-bit
|
||
|
||
and 16-bit machines obviously need 8-bit transmissions.)
|
||
|
||
|
||
|
||
Show Control Characters - This is a software switch to display
|
||
|
||
characters not normally part of the text that is meant to be read but
|
||
|
||
which nevertheless are sent by the host computer to carry out display
|
||
|
||
functions, operate protocols, etc. With the switch on, you will see
|
||
|
||
line feeds displayed as ^J, a back-space as ^H and so on; see
|
||
|
||
Appendix IV for the usual equivalents.
|
||
|
||
|
||
|
||
Using this device properly you will be able, if you are unable to
|
||
|
||
get the text stream to display properly on your screen, to work out
|
||
|
||
what exactly is being sent from the host, and modify your local
|
||
|
||
software accordingly.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 21
|
||
|
||
|
||
|
||
Control-Show is also useful for spotting 'funnies' in passwords and
|
||
|
||
log-on procedures--a common trick is to include ^H (backspace) in the
|
||
|
||
middle of a log-on so that part of the full password is overwritten.
|
||
|
||
(For normal reading of text, you have Control-Show switched off, as
|
||
|
||
it makes normal reading difficult.)
|
||
|
||
|
||
|
||
Macros - This is the US term, now rapidly being adopted in the UK,
|
||
|
||
for the preformatting of a log-on procedure, passwords etc. Typical
|
||
|
||
connecting procedures to US services like The Source, CompuServe, Dow
|
||
|
||
Jones etc are relatively complicated, compared with using a local
|
||
|
||
hobbyist bulletin board or calling up Prestel. Typically, the user
|
||
|
||
must first connect to a packet- switched service like Telenet or
|
||
|
||
Tymnet (the US commercial equivalents of BT's PSS), specify an
|
||
|
||
'address' for the host required (a long string of letters and
|
||
|
||
numbers) and then, when the desired service or 'host' is on line,
|
||
|
||
enter password(s) to be fully admitted. The password itself may be in
|
||
|
||
several parts.
|
||
|
||
|
||
|
||
The value of the 'macro' is that you can type all this junk in
|
||
|
||
once and then send off the entire stream any time you wish by means
|
||
|
||
of a simple command. Most terminal emulators that have this feature
|
||
|
||
allow you to preformat several such macros.
|
||
|
||
|
||
|
||
From the hacker's point of view, the best type of macro facility
|
||
|
||
is one that can be itself addressed and altered in software:
|
||
|
||
supposing you have only part of a password: write a little routine
|
||
|
||
which successively tries all the unknowns; you can then let the
|
||
|
||
computer attempt penetration automatically. (You'll have to read the
|
||
|
||
emulator's manual carefully to see if it has software-addressable
|
||
|
||
macros: the only people who need them are hackers, and, as we have
|
||
|
||
often observed, very few out-and-out hacker products exist!)
|
||
|
||
|
||
|
||
Auto-dial - Some modems contain programmable auto-diallers so that
|
||
|
||
frequently-called services can be dialled from a single keyboard
|
||
|
||
command.
|
||
|
||
|
||
|
||
Again the advantage to the hacker is obvious--a partly- known
|
||
|
||
telephone number can be located by writing some simple software
|
||
|
||
routine to test the variables.
|
||
|
||
|
||
|
||
However, not all auto-dial facilities are equally useful. Some
|
||
|
||
included in US-originated communications software and terminal
|
||
|
||
emulators are for specific 'smart' modems not available
|
||
|
||
elsewhere--and there is no way of altering the software to work with
|
||
|
||
other equipment. In general, each modem that contains an auto-dialler
|
||
|
||
has its own way of requiring instructions to be sent to it. If an
|
||
|
||
auto-dialling facility is important to you, check that your software
|
||
|
||
is configurable to your choice of auto-dial modem.
|
||
|
||
|
||
|
||
Another hazard is that certain auto-diallers only operate on the
|
||
|
||
multi-frequency tones method ('touch-tone') of dialling used in large
|
||
|
||
parts of the United States and only very slowly being introduced in
|
||
|
||
other countries. The system widely used in the UK is called 'pulse'
|
||
|
||
dialling. Touch-tone dialling is much more rapid than pulse dialling,
|
||
|
||
of course.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 22
|
||
|
||
|
||
|
||
Finally, on the subject of US-originated software, some packages
|
||
|
||
will only accept phone numbers in the standard North American format
|
||
|
||
of: 3-digit area code, 3-digit local code, 4-digit subscriber code.
|
||
|
||
In the UK and Europe the phone number formats vary quite
|
||
|
||
considerably. Make sure that any auto-dial facility you use actually
|
||
|
||
operates on your phone system.
|
||
|
||
|
||
|
||
Format Screen - Most professional on-line and time-share services
|
||
|
||
assume an 80-column screen. The 'format screen' option in terminal
|
||
|
||
emulators may allow you to change the regular text display on your
|
||
|
||
micro to show 80 characters across by means of a graphics 'fiddle';
|
||
|
||
alternatively, it may give you a more readable display of the stream
|
||
|
||
from the host by forcing line feeds at convenient intervals, just
|
||
|
||
before the stream reaches the right- hand margin of the micro's
|
||
|
||
'natural' screen width.
|
||
|
||
|
||
|
||
Related to this are settings to handle the presentation of the
|
||
|
||
cursor and to determine cursor movement about the screen-- normally
|
||
|
||
you won't need to use these facilities, but they may help you when
|
||
|
||
on-line to some odd-ball, non-standard service. Certain specific
|
||
|
||
'dumb' terminals like the VT52 (which has become something of a
|
||
|
||
mainframe industry standard) use special sequences to move the cursor
|
||
|
||
about the screen--useful when the operator is filling in standard
|
||
|
||
forms of information.
|
||
|
||
|
||
|
||
Other settings within this category may allow you to view
|
||
|
||
characters on your screen which are not part of the normal character
|
||
|
||
set. The early Apples, for example, lacked lower case, presenting
|
||
|
||
everything in capitals (as does the ZX81), so various ingenious
|
||
|
||
'fixes' were needed to cope. Even quite advanced home computers may
|
||
|
||
lack some of the full ASCII character set, such oddities as the tilde
|
||
|
||
~ or backslash \ or curly bracket { }, for example.
|
||
|
||
|
||
|
||
Re-assign - keyboard A related problem is that home micro keyboards
|
||
|
||
may not be able to generate all the required characters the remote
|
||
|
||
service wishes to see. The normal way to generate an ASCII character
|
||
|
||
not available from the keyboard is from Basic, by using a Print
|
||
|
||
CHR$(n) type command. This may not be possible when on-line to a
|
||
|
||
remote computer, where everything is needed in immediate mode. Hence
|
||
|
||
the requirement for a software facility to re-assign any little-used
|
||
|
||
key to send the desired 'missing' feature. Typical requirements are
|
||
|
||
BREAK~ ESC, RETURN (when part of a string as opposed to being the end
|
||
|
||
of a command) etc. When re-assigning a series of keys, you must make
|
||
|
||
sure you don't interfere with the essential functioning of the
|
||
|
||
terminal emulator.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
** Page 23
|
||
|
||
|
||
|
||
For example, if you designate the sequence ctrl-S to mean 'send a DC1
|
||
|
||
character to the host', the chances are you will stop the host from
|
||
|
||
sending anything to you, because ctrl-S is a common command (some-
|
||
|
||
times called XOF) to call for a pause--incidentally, you can end the
|
||
|
||
pause by hitting ctrl-Q. Appendix IV gives a list of the full ASCII
|
||
|
||
implementation and the usual 'special' codes as they apply to
|
||
|
||
computer-to-computer communications.
|
||
|
||
|
||
|
||
File Protocols - When computers are sending large files to each
|
||
|
||
other, a further layer of protocol, beyond that defining individual
|
||
|
||
letters, is necessary. For example, if your computer is automatically
|
||
|
||
saving to disk at regular intervals as the buffer fills up, it is
|
||
|
||
necessary to be able to tell the host to stop sending for a period,
|
||
|
||
until the save is complete. On older time-share services, where the
|
||
|
||
typical terminal is a teletypewriter, the terminal is in constant
|
||
|
||
danger of being unable mechanically to keep up with the host
|
||
|
||
computer's output. For this reason, many host computers use one of
|
||
|
||
two well-known protocols which require the regular exchange of
|
||
|
||
special control characters for host and user to tell each other all
|
||
|
||
is well. The two protocols are:
|
||
|
||
|
||
|
||
Stop/Start - The receiving computer can at any time send to the host
|
||
|
||
a Stop (ctrl-S) signal, followed by, when it is ready a Start,
|
||
|
||
(ctrl-Q).
|
||
|
||
|
||
|
||
EOB/ACK - The sending computer divides its file into a blocks (of any
|
||
|
||
convenient length); after each block is sent, an EOB (End of Block)
|
||
|
||
character is sent (see ASCII table, Appendix IV). The user's computer
|
||
|
||
must then respond with a ACK (Acknowledge) character.
|
||
|
||
|
||
|
||
These protocols can be used individually, together or not at all.
|
||
|
||
You may be able to use the 'Show Control Codes' option to check
|
||
|
||
whether either of the protocols are in use. Alternatively, if you
|
||
|
||
have hooked on to a service which for no apparent reason, seems to
|
||
|
||
stop in its tracks, you could try ending an ACK or Start (ctrl-F or
|
||
|
||
ctrl-S) and see if you can get things moving.
|
||
|
||
|
||
|
||
File transmission - All terminal emulators assume you will want to
|
||
|
||
send, as well as receive, text files. Thus, in addition to the
|
||
|
||
protocol settings already mentioned, there may be additional ones for
|
||
|
||
that purpose, e.g. the XMODEM protocol very popular on bulletin
|
||
|
||
boards. Hackers, of course, usually don't want to place files on
|
||
|
||
remote computers.....
|
||
|
||
|
||
|
||
Specific terminal emulation - Some software has pre-formatted sets of
|
||
|
||
characteristics to mimic popular commercial 'dumb' terminals. For
|
||
|
||
example, with a ROM costing under <20>60 fitted to a BBC micro, you can
|
||
|
||
obtain almost all of the features of DEC's VT100 terminal, which
|
||
|
||
until recently was regarded as something of an industry-standard and
|
||
|
||
costing just under <20>1000.
|
||
|
||
|
||
|
||
** Page 24
|
||
|
||
|
||
|
||
Other popular terminals are the VT52 and some Tektronix models, the
|
||
|
||
latter for graphics display. ANSI have produced a 'standard'
|
||
|
||
specification.
|
||
|
||
|
||
|
||
Baudot characters - The Baudot code, or International Telegraphic
|
||
|
||
Code No 2, is the 5-bit code used in telex and telegraphy -- and in
|
||
|
||
many wire-based news services. A few terminal emulators include it as
|
||
|
||
an option, and it is useful if you are attempting to hack such
|
||
|
||
services. Most software intended for use on radio link-ups (see
|
||
|
||
Chapter 10) operates primarily in Baudot, with ASCII as an option.
|
||
|
||
|
||
|
||
Viewdata emulation - This gives you the full, or almost full,
|
||
|
||
graphics and text characters of UK-standard viewdata. Viewdata tv
|
||
|
||
sets and adapters use a special character-generator chip and a few,
|
||
|
||
mostly British-manufactured, micros use that chip also-- the Acorn
|
||
|
||
Atom was one example. The BBC has a teletext mode which adopts the
|
||
|
||
same display. But for most micros, viewdata emulation is a matter of
|
||
|
||
using hi-res graphics to mimic the qualities of the real thing, or to
|
||
|
||
strip out most of the graphics. Viewdata works on a screen 40
|
||
|
||
characters by 24 rows, and as some popular home micros have 'native'
|
||
|
||
displays smaller than that, some considerable fiddling is necessary
|
||
|
||
to get them to handle viewdata at all.
|
||
|
||
|
||
|
||
In some emulators, the option is referred to as Prestel or
|
||
|
||
Micronet--they are all the same thing. Micronet-type software usually
|
||
|
||
has additional facilities for fetching down telesoftware programs
|
||
|
||
(see Chapter 10).
|
||
|
||
|
||
|
||
Viewdata emulators must attend not only to the graphics
|
||
|
||
presentation, but also to split-speed operation: the usual speeds are
|
||
|
||
1200 receive from host, 75 transmit to host. USA users of such
|
||
|
||
services may get them via a packet-switched network, in which case
|
||
|
||
they will receive it either at 1200/1200 full duplex or at 300/300.
|
||
|
||
|
||
|
||
Integrated terminal emulators offering both 'ordinary'
|
||
|
||
asynchronous emulation and viewdata emulation are rare: I have to use
|
||
|
||
completely different and non-compatible bits of software on my own
|
||
|
||
home set-up.
|
||
|
||
|
||
|
||
|
||
|
||
Modems
|
||
|
||
|
||
|
||
Every account of what a modem is and does begins with the classic
|
||
|
||
explanation of the derivation of the term: let this be no exception.
|
||
|
||
Modem is a contraction of modulator-demodulator.
|
||
|
||
|
||
|
||
A modem taking instructions from a computer (pin 2 on RS232C)
|
||
|
||
converts the binary 0's and 1's into specific single tones, according
|
||
|
||
to which 'standard' is being used. In RS232C/V24, binary 0 (ON)
|
||
|
||
appears as positive volts and binary 1 (OFF) appears as negative
|
||
|
||
volts.
|
||
|
||
|
||
|
||
** Page 25
|
||
|
||
|
||
|
||
The tones are then fed, either acoustically via the telephone
|
||
|
||
mouth-piece into the telephone line, or electrically, by generating
|
||
|
||
the electrical equivalent direct onto the line. This is the
|
||
|
||
modulating process.
|
||
|
||
|
||
|
||
In the demodulating stage, the equipment sits on the phone line
|
||
|
||
listening for occurrences of pre-selected tones (again according to
|
||
|
||
whichever 'standard' is in operation) and, when it hears one,
|
||
|
||
delivers a binary 0 or binary 1 in the form of positive or negative
|
||
|
||
voltage pulses into pin 3 of the computer's serial port.
|
||
|
||
|
||
|
||
This explanation holds true for modems operating at up to 1200
|
||
|
||
baud; above this speed, the modem must be able to originate tones,
|
||
|
||
and detect them according to phase as well, but since higher-speed
|
||
|
||
working is unusual in dial-up ports--the hacker's special interest,
|
||
|
||
we can leave this matter to one side.
|
||
|
||
|
||
|
||
The modem is a relatively simple bit of kit: on the transmit side
|
||
|
||
it consists of a series of oscillators acting as tone generators, and
|
||
|
||
on receive has a series of narrow band-pass filters. Designers of
|
||
|
||
modems must ensure that unwanted tones do not leak into the telephone
|
||
|
||
line (exchanges and amplifiers used by telephone companies are
|
||
|
||
sometimes remotely controlled by the injection of specific tones) and
|
||
|
||
also that, on the receive side, only the distinct tones used for
|
||
|
||
communications are 'interpreted' into binary 0s or 1s. The other
|
||
|
||
engineering requirements are that unwanted electrical currents do not
|
||
|
||
wander down the telephone cable (to the possible risk of phone
|
||
|
||
company employees) or back into the user's computer.
|
||
|
||
|
||
|
||
Until relatively recently, the only UK source of low-speed modems
|
||
|
||
was British Telecom. The situation is much easier now, but
|
||
|
||
de-regulation of 'telephone line attachments', which include modems,
|
||
|
||
is still so recent that the ordinary customer can easily become
|
||
|
||
confused. Moreover, modems offering exactly the same service can vary
|
||
|
||
in price by over 300%. Strictly speaking, all modems connected to
|
||
|
||
the phone line should be officially approved by BT or other
|
||
|
||
appropriate regulatory authority.
|
||
|
||
|
||
|
||
At 300 baud, you have the option of using direct-connect modems
|
||
|
||
which are hard-wired into the telephone line, an easy enough
|
||
|
||
exercise, or using an acoustic coupler in which you place the
|
||
|
||
telephone hand-set. Acoustic couplers are inherently prone to
|
||
|
||
interference from room-noise, but are useful for quick lash-ups and
|
||
|
||
portable operation. Many acoustic couplers operate only in
|
||
|
||
'originate' mode, not in' answer'. Newer commercial direct- connect
|
||
|
||
modems are cheaper than acoustic couplers.
|
||
|
||
|
||
|
||
** Page 26
|
||
|
||
|
||
|
||
At higher speeds acoustic coupling is not recommended, though a
|
||
|
||
75/1200 acoustic coupler produced in association with the Prestel
|
||
|
||
Micronet service is not too bad, and is now exchanged on the
|
||
|
||
second-hand market very cheaply indeed.
|
||
|
||
|
||
|
||
I prefer modems that have proper status lights--power on, line
|
||
|
||
seized, transmit and receive indicators. Hackers need to know what is
|
||
|
||
going on more than most users.
|
||
|
||
|
||
|
||
The table below shows all but two of the types of service you are
|
||
|
||
likely to come across; V-designators are the world-wide 'official'
|
||
|
||
names given by the CCITT; Bell-designators are the US names:
|
||
|
||
|
||
|
||
Service Speed Duplex Transmit Receive Answer
|
||
|
||
Designator 0 1 0 1
|
||
|
||
|
||
|
||
V21 orig 300(*) full 1180 980 1850 1650 -
|
||
|
||
V21 ans 300(*) full 1850 1650 1180 980 2100
|
||
|
||
V23 (1) 600 half 1700 1300 1700 1300 2100
|
||
|
||
V23 (2) 1200 f/h(**) 2100 1300 2100 1300 2100
|
||
|
||
V23 back 75 f/h(**) 450 390 450 390 -
|
||
|
||
Bell 103 orig 300(*) full 1070 1270 2025 2225 -
|
||
|
||
Bell 103 ans 300(*) full 2025 2225 1070 1270 2225
|
||
|
||
Bell 202 1200 half 2200 1200 2200 1200 2025
|
||
|
||
|
||
|
||
(*)any speed up to 300 baud, can also include 75 and 110 baud
|
||
|
||
services
|
||
|
||
|
||
|
||
(**)service can either be half-duplex at 1200 baud or asymmetrical
|
||
|
||
full duplex, with 75 baud originate and 1200 baud receive (commonly
|
||
|
||
used as viewdata user) or 1200 transmit and 75 receive (viewdata
|
||
|
||
host)
|
||
|
||
|
||
|
||
The two exceptions are:
|
||
|
||
V22 1200 baud full duplex, two wire
|
||
|
||
Bell 212A The US equivalent
|
||
|
||
These services use phase modulation as well as tone.
|
||
|
||
|
||
|
||
British Telecom markets the UK services under the name of
|
||
|
||
Datel--details are given in Appendix V.
|
||
|
||
|
||
|
||
BT's methods of connecting modems to the line are either to
|
||
|
||
hard-wire the junction box (the two outer-wires are the ones you
|
||
|
||
usually need)--a 4-ring plug and associated socket (type 95A) for
|
||
|
||
most modems, a 5-ring plug and associated socket (type 96A) for
|
||
|
||
Prestel applications (note that the fifth ring isn't used)--and, for
|
||
|
||
all new equipment, a modular jack called type 600. The US also has a
|
||
|
||
modular jack, but of course it is not compatible.
|
||
|
||
|
||
|
||
** Page 27
|
||
|
||
|
||
|
||
Modern modem design is greatly aided by a wonder chip called the
|
||
|
||
AMD 7910. This contains nearly all the facilities to modulate and
|
||
|
||
demodulate the tones associated with the popular speed services, both
|
||
|
||
in the CCITT and Bell standards. The only omission--not always made
|
||
|
||
clear in the advertisements--are services using 1200/1200
|
||
|
||
full-duplex, ie V22 and Bell 212A.
|
||
|
||
|
||
|
||
Building a modem is now largely a question of adding a few
|
||
|
||
peripheral components, some switches and indicator lights, and a box.
|
||
|
||
In deciding which 'world standard' modem to purchase, hackers should
|
||
|
||
consider the following features:
|
||
|
||
|
||
|
||
Status lights you need to be able to see what is happening on the
|
||
|
||
line.
|
||
|
||
|
||
|
||
Hardware/software switching - cheaper versions merely give you a
|
||
|
||
switch on the front enabling you to change speeds, originate or
|
||
|
||
answer mode and CClTT or Bell tones. More expensive ones feature
|
||
|
||
firmware which allows your computer to send specially formatted
|
||
|
||
instructions to change speed under program control. However, to make
|
||
|
||
full use of this facility, you may need to write (or modify) your
|
||
|
||
terminal emulator.
|
||
|
||
|
||
|
||
Auto-dial - a pulse dialler and associated firmware are included in
|
||
|
||
some more expensive models. You should ascertain whether the
|
||
|
||
auto-dialer operates on the telephone system you intend to hook the
|
||
|
||
modem up to--some of the US 'smart' modems present difficulties
|
||
|
||
outside the States. You will of course need software in your micro to
|
||
|
||
address the firmware in the modem --and the software has to be part
|
||
|
||
of your terminal emulator, otherwise you gain nothing in convenience.
|
||
|
||
However, with appropriate software, you can get your computer to try
|
||
|
||
a whole bank of numbers one after the other.
|
||
|
||
|
||
|
||
D25 connector - this is the official 'approved' RS232CN24 physical
|
||
|
||
connection--useful from the point-of-view of easy hook-up. A number
|
||
|
||
of lower-cost models substitute alternative DIN connectors. You must
|
||
|
||
be prepared to solder up your own cables to be sure of connecting up
|
||
|
||
properly.
|
||
|
||
|
||
|
||
Documentation I always prefer items to be accompanied by proper
|
||
|
||
instructions. Since hackers tend to want to use equipment in
|
||
|
||
unorthodox ways, they should look for good documentation too.
|
||
|
||
|
||
|
||
** Page 28
|
||
|
||
|
||
|
||
Finally, a word on build-your-own modems. A number of popular
|
||
|
||
electronics magazines and mail-order houses have offered modem
|
||
|
||
designs. Such modems are not likely to be approved for direct
|
||
|
||
connection to the public telephone network. However, most of them
|
||
|
||
work. If you are uncertain of your kit-constructing skills, though.
|
||
|
||
remember badly-built modems can be dangerous both to your computer
|
||
|
||
and to the telephone network.
|
||
|
||
|
||
|
||
|
||
|
||
Test Equipment
|
||
|
||
|
||
|
||
Various items of useful test equipment occasionally appear on the
|
||
|
||
second-hand market--via mail-order, in computer junk shops, in the
|
||
|
||
flea-market section of exhibitions and via computer clubs.
|
||
|
||
|
||
|
||
It's worth searching out a cable 'break-out' box. This lets you
|
||
|
||
restrap a RS232C cable without using a soldering iron--the various
|
||
|
||
lines are brought out on to an accessible matrix and you use small
|
||
|
||
connectors to make (or break) the links you require. It's useful if
|
||
|
||
you have an 'unknown' modem, or an unusually configured computer.
|
||
|
||
|
||
|
||
Related, but much more expensive, is a RS232C/V24 analyser --this
|
||
|
||
gives LED status lights for each of the important lines, so you can
|
||
|
||
see what is happening.
|
||
|
||
|
||
|
||
Lastly, if you are a very rich and enthusiastic hacker, you can
|
||
|
||
buy a protocol analyser. This is usually a portable device with a
|
||
|
||
VDU, full keyboard, and some very clever firmware which examines the
|
||
|
||
telephone line or RS232C port and carries out tests to see which of
|
||
|
||
several popular datacomms protocols is in use. Hewlett Packard do a
|
||
|
||
nice range. Protocol analysers will handle synchronous transmissions
|
||
|
||
as well as synchronous. Cost: <20>1500 and up...and up.
|
||
|
||
|
||
|
||
** Page 29
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 4
|
||
|
||
|
||
|
||
|
||
|
||
Targets
|
||
|
||
|
||
|
||
Wherever hackers gather, talk soon moves from past achievements
|
||
|
||
and adventures to speculation about what new territory might be
|
||
|
||
explored. It says much about the compartmentalisation of computer
|
||
|
||
specialities in general and the isolation of micro- owners from
|
||
|
||
mainstream activities in particular that a great deal of this
|
||
|
||
discussion is like that of navigators in the days before Columbus:
|
||
|
||
the charts are unreliable, full of blank spaces and confounded with
|
||
|
||
myth.
|
||
|
||
|
||
|
||
In this chapter I am attempting to provide a series of notes on
|
||
|
||
the main types of services potentially available on dial-up, and to
|
||
|
||
give some idea of the sorts of protocols and conventions employed.
|
||
|
||
The idea is to give voyagers an outline atlas of what is interesting
|
||
|
||
and possible, and what is not.
|
||
|
||
|
||
|
||
|
||
|
||
On-line hosts
|
||
|
||
|
||
|
||
On-line services were the first form of electronic publishing: a
|
||
|
||
series of big storage computers--and on occasion, associated
|
||
|
||
dedicated networks -- act as hosts to a group of individual databases
|
||
|
||
by providing not only mass data storage and the appropriate 'search
|
||
|
||
language' to access it, but also the means for registering, logging
|
||
|
||
and billing users. Typically, users access the on-line hosts via a
|
||
|
||
phone number which links into a a public data network using packet
|
||
|
||
switching (there's more on these networks in chapter 7).
|
||
|
||
|
||
|
||
The on-line business began almost by accident; large corporations
|
||
|
||
and institutions involved in complicated technological developments
|
||
|
||
found that their libraries simply couldn't keep track of the
|
||
|
||
publication of relevant new scientific papers, and decided to
|
||
|
||
maintain indices of the papers by name, author, subject-matter, and
|
||
|
||
so on, on computer. One of the first of these was the armaments and
|
||
|
||
aircraft company, Lockheed Corporation.
|
||
|
||
|
||
|
||
In time the scope of these indices expanded and developed and
|
||
|
||
outsiders -- sub-contractors, research agencies, universities,
|
||
|
||
government employees, etc were granted access. Other organisations
|
||
|
||
with similar information-handling requirements asked if space could
|
||
|
||
be found on the computer for their needs.
|
||
|
||
|
||
|
||
** Page 30
|
||
|
||
|
||
|
||
Eventually Lockheed and others recognised the beginnings of a quite
|
||
|
||
separate business; in Lockheed's case it lead to the foundation of
|
||
|
||
Dialogue, which today acts as host and marketing agent for almost 300
|
||
|
||
separate databases. Other on-line hosts include BRS (Bibliographic
|
||
|
||
Retrieval Services), Comshare (used for sophisticated financial
|
||
|
||
modelling), DataStar, Blaise (British Library) I P Sharp, and
|
||
|
||
Euronet-Diane.
|
||
|
||
|
||
|
||
On-line services, particularly the older ones, are not especially
|
||
|
||
user-friendly by modern standards. They were set up at a time when
|
||
|
||
both core and storage memory was expensive, and the search languages
|
||
|
||
tend to be abbreviated and formal. Typically they are used, not by
|
||
|
||
the eventual customer for the information, but by professional
|
||
|
||
intermediaries--librarians and the like-- who have undertaken special
|
||
|
||
courses. Originally on-line hosts were accessed by dumb terminals,
|
||
|
||
usually teletypewriters like the Texas Whisperwriter portable with
|
||
|
||
built-in acoustic modem, rather than by VDUs. Today the trend is to
|
||
|
||
use 'front-end' intelligent software on an IBM PC which allows the
|
||
|
||
naive user to pose his/her questions informally while offline; the
|
||
|
||
software then redefines the information request into the formal
|
||
|
||
language of the on-line host (the user does not witness this process)
|
||
|
||
and then goes on-line via an auto-dial modem to extract the
|
||
|
||
information as swiftly and efficiently as possible.
|
||
|
||
|
||
|
||
On-line services require the use of a whole series of passwords:
|
||
|
||
the usual NUI and NUA for PSS (see chapter 7), another to reach the
|
||
|
||
host, yet another for the specific information service required.
|
||
|
||
Charges are either for connect-time or per record retrieved, or
|
||
|
||
sometimes a combination.
|
||
|
||
|
||
|
||
The categories of on-line service include bibliographic, which
|
||
|
||
merely indexes the existence of an article or book--you must then
|
||
|
||
find a physical copy to read; and source, which contains the article
|
||
|
||
or extract thereof. Full-text services not only contain the complete
|
||
|
||
article or book but will, if required, search the entire text (as
|
||
|
||
opposed to mere keywords) to locate the desired information. An
|
||
|
||
example of this is LEXIS, a vast legal database which contains nearly
|
||
|
||
all important US and English law judgements, as well as statutes.
|
||
|
||
|
||
|
||
|
||
|
||
News Services
|
||
|
||
|
||
|
||
The vast majority of news services, even today, are not, in the
|
||
|
||
strictest sense, computer-based, although computers play an important
|
||
|
||
role in assembling the information and, depending on the nature of
|
||
|
||
the newspaper or radio or tv station receiving it, its subsequent
|
||
|
||
handling.
|
||
|
||
|
||
|
||
** Page 31
|
||
|
||
|
||
|
||
The world's big press agencies--United Press, Associated Press,
|
||
|
||
Reuters, Agence France Presse, TASS, Xinhua, PAP, VoA -- use telex
|
||
|
||
techniques to broadcast their stories. Permanent leased telegraphy
|
||
|
||
lines exist between agencies and customers, and the technology is
|
||
|
||
pure telex: the 5-bit Baudot code (rather than ASCII) is adopted,
|
||
|
||
giving capital letters only, and 'mark' and space' are sent by
|
||
|
||
changing voltage conditions on the line rather than audio tones.
|
||
|
||
Speeds are 50 or 75 baud.
|
||
|
||
|
||
|
||
The user cannot interrogate the agency in any way. The stories
|
||
|
||
come in a single stream which is collected on rolls of paper and then
|
||
|
||
used as per the contract between agency and subscriber. To hack a
|
||
|
||
news agency line you will need to get physically near the appropriate
|
||
|
||
leased line, tap in by means of an inductive loop, and convert the
|
||
|
||
changing voltage levels (+80 volts on the line) into something your
|
||
|
||
RS232C port can handle. You will then need software to translate the
|
||
|
||
Baudot code into the ASCII which your computer can handle internally,
|
||
|
||
and display on screen or print to a file. The Baudot code is given in
|
||
|
||
Appendix IV.
|
||
|
||
|
||
|
||
None of this is easy and will probably involve breaches of several
|
||
|
||
laws, including theft of copyright material! However a number of news
|
||
|
||
agencies also transmit services by radio, in which case the signals
|
||
|
||
can be hijacked with a short-wave receiver. Chapter 9 explains.
|
||
|
||
|
||
|
||
Historic news, as opposed to the current stuff from agencies, is
|
||
|
||
now becoming available on-line. The New York Times, for example, has
|
||
|
||
long held its stories in an electronic 'morgue' or clippings library.
|
||
|
||
Initially this was for internal use, but for the last several years
|
||
|
||
it has been sold to outsiders, chiefly broadcasting stations and
|
||
|
||
large corporations. You can search for information by a combination
|
||
|
||
of keyword and date-range. The New York Times Information Bank is
|
||
|
||
available through several on-line hosts.
|
||
|
||
|
||
|
||
As the world's great newspapers increasingly move to electronic
|
||
|
||
means of production--journalists working at VDUs, sub-editors
|
||
|
||
assembling pages and direct-input into photo-typesetters--the
|
||
|
||
additional cost to each newspaper of creating its own morgue is
|
||
|
||
relatively slight and we can expect to see many more commercial
|
||
|
||
services.
|
||
|
||
|
||
|
||
In the meantime, other publishing organisations have sought to
|
||
|
||
make available articles, extract or complete, from leading magazines
|
||
|
||
also. Two UK examples are Finsbury Data Services' Textline and
|
||
|
||
Datasolve's d Reporter, the latter including material from the BBC's
|
||
|
||
monitoring service, Associated Press, the Economist and the Guardian.
|
||
|
||
Textline is an abstract service, but World Reporter gives the full
|
||
|
||
text. In October 1984 it already held 500 million English words.
|
||
|
||
|
||
|
||
** Page 32
|
||
|
||
|
||
|
||
In the US there is NEXIS, which shares resources with LEXIS; NEXIS
|
||
|
||
held 16 million full text articles at that same date. All these
|
||
|
||
services are expensive for casual use and are accessed by dial-up
|
||
|
||
using ordinary asynchronous protocols.
|
||
|
||
|
||
|
||
Many electronic newsrooms also have dial-in ports for reporters
|
||
|
||
out on the job; depending on the system these ports not only allow
|
||
|
||
the reporter to transmit his or her story from a portable computer,
|
||
|
||
but may also (like Basys Newsfury used by Channel Four News) let them
|
||
|
||
see news agency tapes, read headlines and send electronic mail. Such
|
||
|
||
systems have been the subject of considerable hacker speculation.
|
||
|
||
|
||
|
||
|
||
|
||
Financial Services
|
||
|
||
|
||
|
||
The financial world can afford more computer aids than any other
|
||
|
||
non-governmental sector. The vast potential profits that can be made
|
||
|
||
by trading huge blocks of currency, securities or commodities--and
|
||
|
||
the extraordinary advantages that a slight 'edge' in information can
|
||
|
||
bring--have meant that the City, Wall Street and the equivalents in
|
||
|
||
Hong Kong, Japan and major European capitals have been in the
|
||
|
||
forefront of getting the most from high-speed comms.
|
||
|
||
|
||
|
||
Ten years ago the sole form of instant financial information was
|
||
|
||
the ticker tape--telegraphy technology delivering the latest share
|
||
|
||
price movements in a highly abbreviated form. As with its news
|
||
|
||
equivalents, these were broadcast services (and still are, for the
|
||
|
||
services still exist) sent along leased telegraph lines. The user
|
||
|
||
could only watch, and 'interrogation' consisted of back-tracking
|
||
|
||
along a tape of paper. Extel (Exchange Telegraph) continues to use
|
||
|
||
this technique, though it is gradually upgrading by using viewdata
|
||
|
||
and intelligent terminals.
|
||
|
||
|
||
|
||
However, just over ten years ago Reuters put together the first
|
||
|
||
packages which gave some intelligence and 'questioning power' to the
|
||
|
||
end user. Each Reuters' Monitor is intelligent, containing (usually)
|
||
|
||
a DEC PDP-8 series mini and some firmware which accepts and selects
|
||
|
||
the stream of data from the host at the far end of the leased line,
|
||
|
||
marshalls interrogation requests and takes care of the local display.
|
||
|
||
Information is formatted in 'pages' rather like viewdata frames, but
|
||
|
||
without the colour. There is little point in eavesdropping into a
|
||
|
||
Reuters line unless you know what the terminal firmware does. Reuters
|
||
|
||
now face an aggressive rival in Telerate, and the fight is on to
|
||
|
||
deliver not only fast comprehensive prices services but international
|
||
|
||
screen-based dealing as well. The growth of Reuters and its rivals is
|
||
|
||
an illustration of technology creating markets--especially in
|
||
|
||
international currency--where none existed before.
|
||
|
||
|
||
|
||
** Page 33
|
||
|
||
|
||
|
||
The first sophisticated Stock Exchange prices 'screens' used
|
||
|
||
modified closed circuit television technology. London had a system
|
||
|
||
called Market Price Display Service--MPDS--which consisted of a
|
||
|
||
number of tv displays of current prices services on different
|
||
|
||
'channels' which could be selected by the user. But London now uses
|
||
|
||
TOPIC, a leased line variant on viewdata technology, though with its
|
||
|
||
magazine-like arrangement and auto-screen refresh, it has as much in
|
||
|
||
common with teletext as Prestel. TOPIC carries about 2,500 of the
|
||
|
||
total 7,500 shares traded in London, plus selected analytical
|
||
|
||
material from brokers. Datastream represents a much higher level of
|
||
|
||
sophistication: using its <20>40,000 plus pa terminals you can compare
|
||
|
||
historic data-- price movements, movements against sector indices
|
||
|
||
etc--and chart the results.
|
||
|
||
|
||
|
||
The hacker's reward for getting into such systems is that you can
|
||
|
||
see share and other prices on the move. None of these prices is
|
||
|
||
confidential; all could be obtained by ringing a stockbroker.
|
||
|
||
However, this situation is likely to change; as the City makes the
|
||
|
||
change from the traditional broker/jobber method of dealing towards
|
||
|
||
specialist market making, there will then be electronic prices
|
||
|
||
services giving privileged information to specialist share dealers.
|
||
|
||
All these services are only available via leased lines; City
|
||
|
||
professionals would not tolerate the delays and uncertainties of
|
||
|
||
dial-up facilities. However dial-up ports exist for demonstrations,
|
||
|
||
exhibitions, engineering and as back-up--and a lot of hacking effort
|
||
|
||
has gone into tracking them down.
|
||
|
||
|
||
|
||
In the United States, in addition to Reuters, Telerate and local
|
||
|
||
equivalents of official streams of stock exchange and over-the-
|
||
|
||
counter data, there is Dow Jones, best known internationally for its
|
||
|
||
market indices similar to those produced by the Financial Times in
|
||
|
||
London. Dow Jones is in fact the owner of the Wall Street Journal and
|
||
|
||
some influential business magazines. Its Dow Jones News/Retrieval
|
||
|
||
Service is aimed at businesses and private investors. It features
|
||
|
||
current share prices, deliberately delayed by 15 minutes, historic
|
||
|
||
price data, which can be charted by the user's own computer
|
||
|
||
(typically an Apple or IBM PC) and historic 'morgue' type company
|
||
|
||
news and analysis. Extensions of the service enable customers to
|
||
|
||
examine accounts of companies in which they are interested. The bulk
|
||
|
||
of the information is US-based, but can be obtained world-wide via
|
||
|
||
packet-switching networks. All you need are the passwords and special
|
||
|
||
software.
|
||
|
||
|
||
|
||
** Page 34
|
||
|
||
|
||
|
||
|
||
|
||
Business Information
|
||
|
||
|
||
|
||
Business information is usually about the credit-worthiness of
|
||
|
||
companies, company annual reports, trading opportunities and market
|
||
|
||
research. The biggest electronic credit data resource is owned by the
|
||
|
||
international company Dun & Bradstreet: during 1985-86 it is due to
|
||
|
||
spend <20>25m on making its data available all over Europe, including
|
||
|
||
the UK. The service, which covers more than 250,000 UK businesses, is
|
||
|
||
called DunsPrint and access is both on-line and via a viewdata
|
||
|
||
front-end processor. Another credit agency, CNN Services, extensively
|
||
|
||
used already by the big clearing banks, and with 3000 customers
|
||
|
||
accessing information via viewdata sets, has recently also announced
|
||
|
||
an extended electronic retrieval service for its own called Guardian
|
||
|
||
Business Information A third UK credit service available
|
||
|
||
electronically is called InfoLink.
|
||
|
||
|
||
|
||
In addition, all UK companies quoted on the London Stock Exchange
|
||
|
||
and many others of any size who are not, have a report and analysis
|
||
|
||
available from ICC (InterCompany Comparisons) who can be accessed via
|
||
|
||
on--line dial--up, through a viewdata interface and also by
|
||
|
||
Datastream customers. Dun & Bradstreet also have an on--line service
|
||
|
||
called KBE covering 20,000 key British enterprises.
|
||
|
||
|
||
|
||
Prodigious quantities of credit and background data on US
|
||
|
||
companies can be found on several of the major on--line hosts. A
|
||
|
||
valid phone number, passwords and extracts from the operations manual
|
||
|
||
of one of the largest US services, TRW--it has credit histories on 90
|
||
|
||
million people--sat on some hackers' bulletin boards (of which much
|
||
|
||
more later) for over twelve months during 1983 and 1984 before the
|
||
|
||
company found out. No one knows how many times hackers accessed the
|
||
|
||
service. According to the Washington Post, the password and manual
|
||
|
||
had been obtained from a Sears Roebuck national chain store in
|
||
|
||
Sacramento; some hackers claimed they were able to alter credit
|
||
|
||
records, but TRW maintain that telephone access to their systems is
|
||
|
||
designed for read-only operations alone, updating of files taking
|
||
|
||
place solely on magnetic tape.
|
||
|
||
|
||
|
||
US market research and risk analysis comes from Frost Sullivan.
|
||
|
||
Risk analysis tells international businessmen which countries are
|
||
|
||
politically or economically unstable, or likely t become so, and so
|
||
|
||
unsafe to do business with. I once found myself accessing a
|
||
|
||
viewdata-based international assessment service run b a company
|
||
|
||
called Control Risks, which reputedly has strong link to the Special
|
||
|
||
Air Service. As so often happens when hacker think they are about to
|
||
|
||
uncover secret knowledge, the actual data files seemed relatively
|
||
|
||
trivial, the sort of judgements that could be made by a bright sixth
|
||
|
||
former who read posh newspapers and thoughtful weekly magazines.
|
||
|
||
|
||
|
||
** Page 35
|
||
|
||
|
||
|
||
|
||
|
||
University facilities
|
||
|
||
|
||
|
||
In complete contrast to computers that are used to store and
|
||
|
||
present data are those where the value is to deliver processing power
|
||
|
||
to the outside world. Paramount among these are those installed in
|
||
|
||
universities and research institutes.
|
||
|
||
|
||
|
||
Although hackers frequently acquire phone numbers to enter such
|
||
|
||
machines, what you can do once you are there varies enormously. There
|
||
|
||
are usually tiers and banks of passwords, each allowing only limited
|
||
|
||
access to the range of services. It takes considerable knowledge of
|
||
|
||
the machine's operating system to break through from one to another
|
||
|
||
and indeed, in some cases, the operating system is so thoroughly
|
||
|
||
embedded in the mainframe's hardware architecture that the
|
||
|
||
substantial modifications necessary to permit a hacker to roam free
|
||
|
||
can only be done from a few designated terminals, or by having
|
||
|
||
physical access to the machine. However, the hobbyist bulletin board
|
||
|
||
system quite often provides passwords giving access to games and the
|
||
|
||
ability to write and run programs in exotic languages--my own first
|
||
|
||
hands--on experience of Unix came in exactly this way. There are
|
||
|
||
bulletin boards on mainframes and even, in some cases, boards for
|
||
|
||
hackers!
|
||
|
||
|
||
|
||
Given the nature of hacking, it is not surprising that some of the
|
||
|
||
earliest japes occurred on computers owned by universities. Way back
|
||
|
||
in the 1970s, MIT was the location of the famous 'Cookie Monster',
|
||
|
||
inspired by a character in the then-popular Rowan & Martin Laugh-in
|
||
|
||
television show. As someone worked away at their terminal, the word
|
||
|
||
'cookie' would appear across their screen, at first slowly wiping out
|
||
|
||
the user's work. Unless the user moved quickly, things started to
|
||
|
||
speed up and the machine would flash urgently: "Cookie, cookie, give
|
||
|
||
me a cookie". The whole screen would pulse with this message until,
|
||
|
||
after a while, the hacking program relented and the 'Monster' would
|
||
|
||
clear the screen, leaving the message: "I didn't want a cookie
|
||
|
||
anyway." It would then disappear into the computer until it snared
|
||
|
||
another unsuspecting user. You could save yourself from the Monster
|
||
|
||
by typing the word "Cookie", to which it replied "Thank you" and then
|
||
|
||
vanished.
|
||
|
||
|
||
|
||
In another US case, this time in 1980, two kids in Chicago,
|
||
|
||
calling themselves System Cruncher and Vladimir, entered the computer
|
||
|
||
at DePaul University and caused a system crash which cost $22,000 to
|
||
|
||
fix. They were prosecuted, given probation and were then made a movie
|
||
|
||
offer.
|
||
|
||
|
||
|
||
** Page 36
|
||
|
||
|
||
|
||
In the UK, many important university and research institution
|
||
|
||
computers have been linked together on a special data network called
|
||
|
||
SERCNET. SERC is the Science and Engineering Research Council.
|
||
|
||
Although most of the computers are individually accessible via PSS,
|
||
|
||
SERCNET makes it possible to enter one computer and pass through to
|
||
|
||
others. During early 1984, SERCNET was the target of much hacker
|
||
|
||
attention; a fuller account appears in chapter 7, but to anticipate a
|
||
|
||
little, a local entry node was discovered via one of the London
|
||
|
||
University college computers with a demonstration facility which, if
|
||
|
||
asked nicely, disgorged an operating manual and list of 'addresses'.
|
||
|
||
One of the minor joys of this list was an entry labelled "Gateway to
|
||
|
||
the Universe", pure Hitch-hiker material, concealing an extensive
|
||
|
||
long-term multi-function communications project. Eventually some
|
||
|
||
hackers based at a home counties university managed to discover ways
|
||
|
||
of roaming free around the network....
|
||
|
||
|
||
|
||
|
||
|
||
Banking
|
||
|
||
|
||
|
||
Prominent among public fantasies about hackers is the one where
|
||
|
||
banks are entered electronically, accounts examined and some money
|
||
|
||
moved from one to another. The fantasies, bolstered by
|
||
|
||
under-researched low-budget movies and tv features, arise from
|
||
|
||
confusing the details of several actual happenings.
|
||
|
||
|
||
|
||
Most 'remote stealing' from banks or illicit obtaining of account
|
||
|
||
details touch computers only incidentally and involve straight-
|
||
|
||
forward fraud, conning or bribery of bank employees. In fact, when
|
||
|
||
you think about the effort involved, human methods would be much more
|
||
|
||
cost-effective for the criminal. For hackers, however, the very
|
||
|
||
considerable effort that has been made to provide security makes the
|
||
|
||
systems a great challenge in them- selves.
|
||
|
||
|
||
|
||
In the United Kingdom, the banking scene is dominated by a handful
|
||
|
||
of large companies with many branches. Cheque clearing and account
|
||
|
||
maintenance are conducted under conditions of high security with
|
||
|
||
considerable isolation of key elements; inter-bank transactions in
|
||
|
||
the UK go through a scheme called CHAPS, Clearing House Automatic
|
||
|
||
Payments System, which uses the X.25 packet switching protocols (see
|
||
|
||
chapter 7). The network is based on Tandem machines; half of each
|
||
|
||
machine is common to the network and half unique to the bank. The
|
||
|
||
encryption standard used is the US Data Encryption Standard. Certain
|
||
|
||
parts of the network, relating to the en- and de-cryption of
|
||
|
||
messages, apparently auto-destruct if tampered with.
|
||
|
||
|
||
|
||
** Page 37
|
||
|
||
|
||
|
||
The service started early in 1984. The international equivalent
|
||
|
||
is SWIFT (Society for Worldwide Interbank Financial Transactions);
|
||
|
||
this is also X.25- based and it handles about half-a-million messages
|
||
|
||
a day. If you want to learn someone's balance, the easiest and most
|
||
|
||
reliable way to obtain it is with a plausible call to the local
|
||
|
||
branch. If you want some easy money, steal a cheque book and cheque
|
||
|
||
card and practise signature imitation. Or, on a grander scale, follow
|
||
|
||
the example of the <20>780,000 kruggerand fraud in the City. Thieves
|
||
|
||
intercepted a telephone call from a solicitor or bank manager to
|
||
|
||
'authenticate' forged drafts; the gold coins were then delivered to a
|
||
|
||
bogus company.
|
||
|
||
|
||
|
||
In the United States, where federal law limits the size of an
|
||
|
||
individual bank's operations and in international banking, direct
|
||
|
||
attacks on banks has been much easier because the technology adopted
|
||
|
||
is much cruder and more use is made of public phone and telex lines.
|
||
|
||
One of the favourite techniques has been to send fake authorisations
|
||
|
||
for money transfers. This was the approach used against the Security
|
||
|
||
National Pacific Bank by Stanley Rifkin and a Russian diamond dealer
|
||
|
||
in Geneva. $10.2m moved from bank to bank across the United States
|
||
|
||
and beyond. Rifkin obtained code numbers used in the bilateral Test
|
||
|
||
Keys. The trick is to spot weaknesses in the cryptographic systems
|
||
|
||
used in such authorisations. The specifications for the systems
|
||
|
||
themselves are openly published; one computer security expert, Leslie
|
||
|
||
Goldberg, was recently able to take apart one scheme--proposed but
|
||
|
||
not actually implemented--and show that much of the 'key' that was
|
||
|
||
supposed to give high level cryptographic security was technically
|
||
|
||
redundant, and could be virtually ignored. A surprisingly full
|
||
|
||
account of his 'perfect' fraud appears in a 1980 issue of the journal
|
||
|
||
Computer Fraud and Security Bulletin.
|
||
|
||
|
||
|
||
There are, however, a few areas where banking is becoming
|
||
|
||
vulnerable to the less mathematically literate hacker. A number of
|
||
|
||
international banks are offering their big corporation customers
|
||
|
||
special facilities so that their Treasury Departments (which ensure,
|
||
|
||
among other things, that any spare million dollars are not left doing
|
||
|
||
nothing over night but are earning short-term interest) can have
|
||
|
||
direct access to their account details via a PC on dial-up. Again,
|
||
|
||
telebanking is now available via Prestel and some of its overseas
|
||
|
||
imitators. Although such services use several layers of passwords to
|
||
|
||
validate transactions, if those passwords are mis-acquired, since no
|
||
|
||
signatures are involved, the bank account becomes vulnerable.
|
||
|
||
|
||
|
||
** Page 38
|
||
|
||
|
||
|
||
Finally, the network of ATMs (hole-in-the-wall cash machines) is
|
||
|
||
expanding greatly. As mentioned early in this book, hackers have
|
||
|
||
identified a number of bugs in the machines. None of them,
|
||
|
||
incidentally, lead directly to fraud. These machines allow card-
|
||
|
||
holders to extract cash up to a finite limit each week (usually
|
||
|
||
<EFBFBD>100). The magnetic stripe contains the account number, validation
|
||
|
||
details of the owner's PIN (Personal Identity Number), usually 4
|
||
|
||
digits, and a record of how much cash has been drawn that week. The
|
||
|
||
ATM is usually off-line to the bank's main computer and only goes
|
||
|
||
on-line in two circumstances--first, during business hours, to
|
||
|
||
respond to a customer's 'balance request'; and second, outside
|
||
|
||
regular hours, to take into local memory lists of invalid cards which
|
||
|
||
should not be returned to the customer, and to dump out cheque book
|
||
|
||
and printed statement requests.
|
||
|
||
|
||
|
||
Hackers have found ways of getting more than their cash limit each
|
||
|
||
week. The ATMs belonging to one clearing bank could be 'cheated' in
|
||
|
||
this way: you asked for your maximum amount and then, when the
|
||
|
||
transaction was almost completed, the ATM asked you 'Do you want
|
||
|
||
another transaction, Yes/No?' If you responded 'yes' you could then
|
||
|
||
ask for--and get--your credit limit again, and again, and again. The
|
||
|
||
weakness in the system was that the magnetic stripe was not
|
||
|
||
overwritten to show you had had a transaction till it was physically
|
||
|
||
ejected from the machine. This bug has now been fixed.
|
||
|
||
|
||
|
||
A related but more bizarre bug resided for a while on the ATMs
|
||
|
||
used by that first bank's most obvious High Street rivals. In that
|
||
|
||
case, you had to first exhaust your week's limit. You then asked for
|
||
|
||
a further sum, say <20>75. The machine refused but asked if you wanted a
|
||
|
||
further transaction. Then, you slowly decremented the amounts you
|
||
|
||
were asking for by <20>5...70, 65, 60...and so on, down to <20>10. You then
|
||
|
||
told the ATM to cancel the last <20>5 transaction...and the machine gave
|
||
|
||
you the full <20>75. Some hackers firmly believe the bug was placed
|
||
|
||
there by the original software writer. This bug too has now been
|
||
|
||
fixed.
|
||
|
||
|
||
|
||
Neither of these quirks resulted in hackers 'winning' money from
|
||
|
||
the banks involved; the accounts were in every case, properly
|
||
|
||
debited. The only victory was to beat the system. For the future, I
|
||
|
||
note that the cost of magnetic stripe reader/writers which interface
|
||
|
||
to PCs is dropping to very low levels. I await the first inevitable
|
||
|
||
news reports.
|
||
|
||
|
||
|
||
|
||
|
||
Electronic Mail
|
||
|
||
|
||
|
||
Electronic mail services work by storing messages created by some
|
||
|
||
users until they are retrieved by their intended recipients.
|
||
|
||
|
||
|
||
** Page 39
|
||
|
||
|
||
|
||
The ingredients of a typical system are: registration/logging on
|
||
|
||
facilities, storage, search and retrieval, networking, timing and
|
||
|
||
billing. Electronic mail is an easy add-on to most mainframe
|
||
|
||
installations, but in recent years various organisations have sought
|
||
|
||
to market services to individuals, companies and industries where
|
||
|
||
electronic mail was the main purpose of the system, not an add-on.
|
||
|
||
|
||
|
||
The system software in widest use is that of ITI-Dialcom; it's the
|
||
|
||
one that runs Telecom Gold. Another successful package is that used
|
||
|
||
in the UK and USA by Easylink, which is supported by Cable & Wireless
|
||
|
||
and Western Union.
|
||
|
||
|
||
|
||
In the Dialcom/Telecom Gold service, the assumption is made that
|
||
|
||
most users will want to concentrate on a relatively narrow range of
|
||
|
||
correspondents. Accordingly, the way it is sold is as a series of
|
||
|
||
systems, each run by a 'manager': someone within a company. The
|
||
|
||
'manager' is the only person who has direct contact with the
|
||
|
||
electronic mail owner and he in turn is responsible for bringing
|
||
|
||
individual users on to his 'system' -- he can issue 'mailboxes'
|
||
|
||
direct, determine tariff levels, put up general messages. In most
|
||
|
||
other services, every user has a direct relationship with the
|
||
|
||
electronic mail company.
|
||
|
||
|
||
|
||
The services vary according to their tariff structures and levels;
|
||
|
||
and also in the additional facilities: some offer bi-directional
|
||
|
||
interfaces to telex; and some contain electronic magazines, a little
|
||
|
||
like videotex.
|
||
|
||
|
||
|
||
The basic systems tend to be quite robust and hacking is mainly
|
||
|
||
concentrated on second-guessing users IDs. Many of the systems have
|
||
|
||
now sought to increase security by insisting on passwords of a
|
||
|
||
certain length--and by giving users only three or four attempts at
|
||
|
||
logging on before closing down the line. But increasingly their
|
||
|
||
customers are using PCs and special software to automate logging-in.
|
||
|
||
The software packages of course have the IDs nicely pre-stored....
|
||
|
||
|
||
|
||
|
||
|
||
Government computers
|
||
|
||
|
||
|
||
Among hackers themselves the richest source of fantasising
|
||
|
||
revolves around official computers like those used by the tax and
|
||
|
||
national insurance authorities, the police, armed forces and
|
||
|
||
intelligence agencies.
|
||
|
||
|
||
|
||
The Pentagon was hacked in 1983 by a 19-year-old Los Angeles
|
||
|
||
student, Ronald Austin. Because of the techniques he used, a full
|
||
|
||
account is given in the operating systems section of chapter 6. NASA,
|
||
|
||
the Space Agency, has also acknowledged that its e-mail system has
|
||
|
||
been breached and that messages and pictures of Kilroy were left as
|
||
|
||
graffiti.
|
||
|
||
|
||
|
||
** Page 40
|
||
|
||
|
||
|
||
This leaves only one outstanding mega-target, Platform, the global
|
||
|
||
data network of 52 separate systems focused on the headquarters of
|
||
|
||
the US's electronic spooks, the National Security Agency at Fort
|
||
|
||
Meade, Maryland. The network includes at least one Cray-1, the worlds
|
||
|
||
most powerful number-cruncher, and facilities provided by GCHQ at
|
||
|
||
Cheltenham.
|
||
|
||
|
||
|
||
Although I know UK phone freaks who claim to have managed to
|
||
|
||
appear on the internal exchanges used by Century House (M16) and
|
||
|
||
Curzon Street House (M15) and have wandered along AUTOVON, the US
|
||
|
||
secure military phone network, I am not aware of anyone bold or
|
||
|
||
clever enough to have penetrated the UK's most secure computers.
|
||
|
||
|
||
|
||
It must be acknowledged that in general it is far easier to obtain
|
||
|
||
the information held on these machines--and lesser ones like the DVLC
|
||
|
||
(vehicle licensing) and PNC (Police National Computer)-- by criminal
|
||
|
||
means than by hacking -- bribery, trickery or blackmail, for example.
|
||
|
||
Nevertheless, there is an interesting hacker's exercise in
|
||
|
||
demonstrating how far it is possible to produce details from open
|
||
|
||
sources of these systems, even when the details are supposed to be
|
||
|
||
secret. But this relates to one of the hacker's own secret
|
||
|
||
weapons--thorough research, the subject of the next chapter.
|
||
|
||
|
||
|
||
** Page 41
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 5
|
||
|
||
|
||
|
||
|
||
|
||
Hackers' Intelligence
|
||
|
||
|
||
|
||
Of all the features of hacking that mystify outsiders, the first
|
||
|
||
is how the hackers get the phone numbers that give access to the
|
||
|
||
computer systems, and the passwords that open the data. Of all the
|
||
|
||
ways in which hacking is portrayed in films, books and tv, the most
|
||
|
||
misleading is the concentration on the image of the solitary genius
|
||
|
||
bashing away at a keyboard trying to 'break in'.
|
||
|
||
|
||
|
||
It is now time to reveal one of the dirty secrets of hacking:
|
||
|
||
there are really two sorts of hacker. For this purpose I will call
|
||
|
||
them the trivial and the dedicated. Anyone can become a trivial
|
||
|
||
hacker: you acquire, from someone else, a phone number and a password
|
||
|
||
to a system; you dial up, wait for the whistle, tap out the password,
|
||
|
||
browse around for a few minutes and log off. You've had some fun,
|
||
|
||
perhaps, but you haven't really done anything except follow a
|
||
|
||
well-marked path. Most unauthorised computer invasions are actually
|
||
|
||
of this sort.
|
||
|
||
|
||
|
||
The dedicated hacker, by contrast, makes his or her own
|
||
|
||
discoveries, or builds on those of other pioneers. The motto of
|
||
|
||
dedicated hackers is modified directly from a celebrated split
|
||
|
||
infinitive: to boldly pass where no man has hacked before.
|
||
|
||
|
||
|
||
Successful hacking depends on good research. The materials of
|
||
|
||
research are all around: as well as direct hacker-oriented material
|
||
|
||
of the sort found on bulletin board systems and heard in quiet
|
||
|
||
corners during refreshment breaks at computer clubs, huge quantities
|
||
|
||
of useful literature are published daily by the marketing departments
|
||
|
||
of computer companies and given away to all comers: sheaves of
|
||
|
||
stationery and lorry loads of internal documentation containing
|
||
|
||
important clues are left around to be picked up. It is up to the
|
||
|
||
hacker to recognise this treasure for what it is, and to assemble it
|
||
|
||
in a form in which it can be used.
|
||
|
||
|
||
|
||
Anyone who has ever done any intelligence work, not necessarily
|
||
|
||
for a government, but for a company, or who has worked as an
|
||
|
||
investigative journalist, will tell you that easily 90% of the
|
||
|
||
information you want is freely available and that the difficult part
|
||
|
||
is recognising and analysing it. Of the remaining 10%, well over
|
||
|
||
half can usually be inferred from the material you already have,
|
||
|
||
because, given a desired objective, there are usually only a limited
|
||
|
||
number of sensible solutions.
|
||
|
||
|
||
|
||
** Page 42
|
||
|
||
|
||
|
||
You can go further: it is often possible to test your inferences and,
|
||
|
||
having done that, develop further hypotheses. So the dedicated
|
||
|
||
hacker, far from spending all the time staring at a VDU and 'trying
|
||
|
||
things' on the keyboard, is often to be found wandering around
|
||
|
||
exhibitions, attending demonstrations, picking up literature, talking
|
||
|
||
on the phone (voice-mode!) and scavenging in refuse bins.
|
||
|
||
|
||
|
||
But for both trivial operator, and the dedicated hacker who wishes
|
||
|
||
to consult with his colleagues, the bulletin board movement has been
|
||
|
||
the single greatest source of intelligence.
|
||
|
||
|
||
|
||
|
||
|
||
Bulletin Boards
|
||
|
||
|
||
|
||
Since 1980, when good software enabling solitary micro-computers
|
||
|
||
to offer a welcome to all callers first became widely available, the
|
||
|
||
bulletin board movement has grown by leaps and bounds. If you haven t
|
||
|
||
logged on to at least one already, now is the time to try. At the
|
||
|
||
very least it will test out your computer, modem and software --and
|
||
|
||
your skills in handling them. Current phone numbers, together with
|
||
|
||
system hours and comms protocol requirements, are regularly published
|
||
|
||
in computer mags; once you have got into one, you will usually find
|
||
|
||
current details of most of the others.
|
||
|
||
|
||
|
||
Somewhere on most boards you will find a series of Special
|
||
|
||
Interest Group (SIG) sections and among these, often, will be a
|
||
|
||
Hacker's Club. Entrance to each SIG will be at the discretion of the
|
||
|
||
Sysop, the Bulletin Board owner. Since the BBS software allows the
|
||
|
||
Sysop to conceal from users the list of possible SIGs, it may not be
|
||
|
||
immediately obvious whether a Hacker's section exists on a particular
|
||
|
||
board. Often the Sysop will be anxious to form a view of a new
|
||
|
||
entrant before admitting him or her to a 'sensitive' area. It has
|
||
|
||
even been known for bulletin boards to carry two hacker sections:
|
||
|
||
one, admission to which can be fairly easily obtained; and a second,
|
||
|
||
the very existence of which is a tightly-controlled secret, where
|
||
|
||
mutually trusting initiates swap information.
|
||
|
||
|
||
|
||
The first timer, reading through a hacker's bulletin board, will
|
||
|
||
find that it seems to consist of a series of discursive conversations
|
||
|
||
between friends. Occasionally, someone may write up a summary for
|
||
|
||
more universal consumption. You will see questions being posed. if
|
||
|
||
you feel you can contribute, do so, because the whole idea is that a
|
||
|
||
BBS is an information exchange. It is considered crass to appear on a
|
||
|
||
board and simply ask 'Got any good numbers?; if you do, you will not
|
||
|
||
get any answers. Any questions you ask should be highly specific,
|
||
|
||
show that you have already done some ground-work, and make clear that
|
||
|
||
any results derived from the help you receive will be reported back
|
||
|
||
to the board.
|
||
|
||
|
||
|
||
** Page 43
|
||
|
||
|
||
|
||
Confidential notes to individuals, not for general consumption,
|
||
|
||
can be sent using the E-Mail option on the bulletin board, but
|
||
|
||
remember, nothing is hidden from the Sysop.
|
||
|
||
|
||
|
||
A flavour of the type of material that can be seen on bulletin
|
||
|
||
boards appears from this slightly doctored excerpt (I have removed
|
||
|
||
some of the menu sequences in which the system asks what you want to
|
||
|
||
do next and have deleted the identities of individuals):
|
||
|
||
|
||
|
||
Msg#: 3538 *Modem Spot*
|
||
|
||
01/30/84 12:34:54 (Read 39 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: BBC/MAPLIN MODEMS
|
||
|
||
RE THE CONNECTIONS ON THE BBC/MAPLIN MODEM SETUP. THE crs PIN IS USED TO
|
||
|
||
HANDSHAKE WITH THE RTS PIN E.G. ONE UNIT SENDS RTS (READY TO SEND) AND
|
||
|
||
SECOND UNIT REPLIES CTS (CLEAR TO SEND). USUALLY DONE BY TAKING PIN HIGH. IF
|
||
|
||
YOU STRAP IT HIGH I WOULD SUGGEST VIA A 4K7 RESISTOR TO THE VCC/+VE RAIL (5V).
|
||
|
||
IN THE EVENT OF A BUFFER OVERFLOW THESE RTS/CTS PINS ARE TAKEN LOW AND THIS
|
||
|
||
STOPS THE DATA TRANSFER. ON A 25WAY D TYPE CONNECTOR TX DATA IS PIN 2
|
||
|
||
RX DATA IS PIN 3
|
||
|
||
RTS IS PIN 4
|
||
|
||
CTS IS PIN 5
|
||
|
||
GROUND IS PIN 7
|
||
|
||
|
||
|
||
ALL THE BEST -- ANY COMMTO XXXXXXXXX
|
||
|
||
(DATA COMMS ENGINEER)
|
||
|
||
|
||
|
||
Msg#: 3570 *Modem Spot*
|
||
|
||
01/31/84 23:43:08 (Read 31 Times)
|
||
|
||
From: XXXXXXXXXX
|
||
|
||
To: XXXXXXXXXXX
|
||
|
||
Subj: REPLY TO MSG# 3538 (BBC/MAPLIN MODEMS)
|
||
|
||
ON THE BBC COMPUTER IT IS EASIER TO CONNECT THE RTS (READY TO SEND) PIN HE
|
||
|
||
CTS (CLEAR TO SEND) PIN. THIS OVERCOMES THE PROBLEM OF HANDSHAKING.
|
||
|
||
SINCE THE MAPLIN MODEM DOES NOT HAVE HANDSHAKING.I HAVE PUT MY RTS CTS JUMPER
|
||
|
||
INSIDE THE MODEM. MY CABLES ARE THEN STANDARD AND CAN BE USED WITH HANDSHAKERS.
|
||
|
||
REGARDS
|
||
|
||
|
||
|
||
Hsg#: 3662 *HACKER'S CLUB*
|
||
|
||
02/04/84 23:37:11 (Read 41 Times)
|
||
|
||
From: XXXXXXXXXX
|
||
|
||
To: ALL
|
||
|
||
Subj: PUBLIC DATA NET
|
||
|
||
Does anyone know what the Public Data Net is? I appear to have access to it, &
|
||
|
||
I daren't ask what it is!
|
||
|
||
Also, can anyone tell me more about the Primenet systems... Again I seem to
|
||
|
||
have the means,but no info. For instance, I have a relative who logs on to
|
||
|
||
another Prime Both of our systems are on Primenet, is there any way we can
|
||
|
||
communicate?
|
||
|
||
More info to those who want it...
|
||
|
||
|
||
|
||
<N>ext msg, <R>eply, or <S>top?
|
||
|
||
Msg has replies, read now(Y/N)? y
|
||
|
||
|
||
|
||
Reply has been deleted
|
||
|
||
|
||
|
||
<N>ext msg, <R>eply, or <S>top?
|
||
|
||
|
||
|
||
Msg#: 3739 *HACKER'S CLUB*
|
||
|
||
02/06/84 22:39:06 (Read 15 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: xxxxxxxxxx
|
||
|
||
Subj: REPLY TO MSG# 3716 (PRIMENET COMMS)
|
||
|
||
Ahh, but what is the significance of the Address-does it mean a PSS number. or
|
||
|
||
some thing like that? Meanwhile, I'II get on-line (via voice-link on the phone!
|
||
)
|
||
|
||
to my cousin, and see what he has on it....
|
||
|
||
|
||
|
||
** Page 44
|
||
|
||
|
||
|
||
Msg#: 3766 *HACKER'S CLUB*
|
||
|
||
02/07/84 13:37:54 (Read 13 Times)
|
||
|
||
From: xxxxxxxxxxx
|
||
|
||
To: xxxxxxxxxxx
|
||
|
||
Subj: REPLY TO MSG# 3751 (PUBLIC DATA NET)
|
||
|
||
Primenet is a local network. I know of one in Poole, An BTGold use
|
||
|
||
one between their systems too. It Is only an internal network, I
|
||
|
||
suggest using PSS to communicate between different primes. Cheers.
|
||
|
||
|
||
|
||
<N>ext msg, <R>eply, or <S>top?
|
||
|
||
|
||
|
||
Msg#: 3799 *BBC*
|
||
|
||
02/07/84 22:09:05 (Read 4 Times)
|
||
|
||
From: xxxxxxxxxxx
|
||
|
||
To: xxxxxxxxxxx
|
||
|
||
Subj: REPLY TO MSG# 3751 (RGB VIDEO)
|
||
|
||
The normal video output BNC can be made to produce colour video by
|
||
|
||
making a link near to the bnc socket on the pcb. details are in the
|
||
|
||
advanced user guide under the chapter on what the various links do.
|
||
|
||
If you require more I will try to help, as I have done this mod and
|
||
|
||
it works fine
|
||
|
||
|
||
|
||
Msg#: 935 *EREWHON*
|
||
|
||
09/25/83 01:23:00 (Read 90 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: US PHONE FREAKING
|
||
|
||
USA Phone Freaking is done with a 2 out of 5 Code. The tones must be
|
||
|
||
with 30Hz, and have less than 1% Distortion.
|
||
|
||
|
||
|
||
Master Tone Frequency = 2600 Hz.
|
||
|
||
>1 = 700 & 900 Hz
|
||
|
||
>2 = 700 & 1100 Hz
|
||
|
||
>3 = 900 & 1100 HZ
|
||
|
||
>4 = 700 & 1300 Hz
|
||
|
||
>5 = 900 & 1300 Hz
|
||
|
||
>6 = 1100 & 1300 Hz
|
||
|
||
>7 = 700 & 1500 HZ
|
||
|
||
>8 = 900 & 1500 Hz
|
||
|
||
>9 = 1100 & 1500 Hz
|
||
|
||
>0 = 1300 & 1500 Hz
|
||
|
||
>Start Key Signal = 1100 & 1700 Hz
|
||
|
||
>End Key Signal = 1300 & 1700 Hz
|
||
|
||
> Military Priority Keys 11=700 & 1700 ; 12=900 & 1700 - I don't
|
||
|
||
recommend using these. ( The method of use will be explained in a
|
||
|
||
separate note. DO NOT DISCLOSE WHERE YOU GOT THESE FREQUENCIES TO
|
||
|
||
ANYONE!
|
||
|
||
|
||
|
||
Msg#: 936 *EREWHON*
|
||
|
||
09/20/83 01:34:43 (Read 89 Times)
|
||
|
||
From: xxxxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: UK PHONE FREAKING
|
||
|
||
|
||
|
||
The UK System also uses a 2 out of 5 tone pattern.
|
||
|
||
|
||
|
||
The Master Frequency is 2280 Hz
|
||
|
||
>I = 1380 & 1500 Hz
|
||
|
||
>2 = 1380 & 1620 Hz
|
||
|
||
>3 = 1500 & 1620 Hz
|
||
|
||
>4 = 1380 & 1740 Hz
|
||
|
||
>5 = 1500 & 1740 Hz
|
||
|
||
>6 = 1620 & 1740 Hz
|
||
|
||
>7 = 1380 & I860 Hz
|
||
|
||
>8 = 1500 & 1860 Hz
|
||
|
||
>9 = 1620 & 1860 Hz
|
||
|
||
>0 = 1740 & 1860 Hz
|
||
|
||
>Start Key = 1740 & 1980 ; End Keying = 1860 & 1980 Hz
|
||
|
||
>Unused I think 11 = 1380 & 1980 ; 12 = 1500 & 1980 Hz
|
||
|
||
|
||
|
||
This is from the CCITT White Book Vol. 6 and is known as SSMF No. 3
|
||
|
||
to some B.T. Personnel.
|
||
|
||
|
||
|
||
The 2280 Hz tone is being filtered out at many exchanges so you may
|
||
|
||
need quite high level for it to work.
|
||
|
||
|
||
|
||
** Page 45
|
||
|
||
|
||
|
||
Msg#: 951 *EREWHON*
|
||
|
||
09/21/83 17:44:28 (Read 79 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: PHONE FREAK's
|
||
|
||
Subj: NEED YOU ASK ?
|
||
|
||
In two other messages you will find the frequencies listed for the
|
||
|
||
Internal phone system controls. This note is intended to explain how
|
||
|
||
the system could be operated. The central feature to realise is that
|
||
|
||
( especially in the (USA) the routing information in a call is not in
|
||
|
||
the Dialled Code. The normal sequence of a call is that the Area Code
|
||
|
||
is received while the Subscriber No. Is stored for a short period.
|
||
|
||
The Local Exchange reads the area code and selects the best route at
|
||
|
||
that time for the call. The call together with a new "INTERNAL"
|
||
|
||
dialling code Is then sent on to the next exchange together with the
|
||
|
||
subscriber number. This is repeated from area to area and group to
|
||
|
||
group. The system this way provides many routes and corrects itself
|
||
|
||
for failures.
|
||
|
||
|
||
|
||
The Technique. make a Long Distance call to a number which does not
|
||
|
||
answer. Send down the Master Tone. (2600 or 22080 Hz) This will
|
||
|
||
clear the line back, but leave you in the system. You may now send
|
||
|
||
the "Start key Pulse" followed by the Routing Code and the Subscriber
|
||
|
||
No. Finish with the "End keying Pulse". The system sees you as being
|
||
|
||
a distant exchange requesting a route for a call.
|
||
|
||
|
||
|
||
Meanwhile back at the home base. Your local exchange will be logging
|
||
|
||
you in as still ringing on the first call. There are further problems
|
||
|
||
in this in both the USA and the UK as the techniques are understood
|
||
|
||
and disapproved of by those in authority. You may need to have a
|
||
|
||
fairly strong signal into the system to get past filters present on
|
||
|
||
the line. Warning newer exchanges may link these filters to alarms.
|
||
|
||
Try from a phone box or a Public Place and see what happens or who
|
||
|
||
comes.
|
||
|
||
|
||
|
||
Example:- To call from within USA to Uk:
|
||
|
||
> Ring Toll Free 800 Number
|
||
|
||
> Send 2600 Hz Key Pulse
|
||
|
||
> When line goes dead you are in trunk level
|
||
|
||
> Start Pulse 182 End Pulse = White Plains N.Y. Gateway continued in
|
||
|
||
next message
|
||
|
||
|
||
|
||
Hsg#: 952 *EREWHON*
|
||
|
||
09/21/83 18:03:12 (Read 73 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: PHONE FREAKS
|
||
|
||
Subj: HOW TO DO IT PT 2
|
||
|
||
|
||
|
||
> Start Pulse 044 = United Kingdom
|
||
|
||
> 1 = London ( Note no leading O please )
|
||
|
||
> 730 1234 = Harrods Department Store.
|
||
|
||
|
||
|
||
Any info on internal address codes would be appreciated from any
|
||
|
||
callers.
|
||
|
||
|
||
|
||
Msg#: 1028 *EREWHON*
|
||
|
||
09/25/83 23:02:35 (Read 94 Times)
|
||
|
||
From: xxxxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: FREEFONE PART I
|
||
|
||
|
||
|
||
The following info comes from a leaflet entitled 'FREEFONE':
|
||
|
||
|
||
|
||
"British Telecom's recent record profits and continuing appalling
|
||
|
||
service have prompted the circulation of this information. It
|
||
|
||
comprises a method of making telephone calls free of charge."
|
||
|
||
|
||
|
||
Circuit Diagram:
|
||
|
||
|
||
|
||
O---o------- -------o----O
|
||
|
||
: ! ! :
|
||
|
||
: ! ! :
|
||
|
||
L o-------- --------o P
|
||
|
||
I ! ! H
|
||
|
||
N ! ! O
|
||
|
||
E o-- ------ ----o N
|
||
|
||
: ! ! E
|
||
|
||
I ! ! :
|
||
|
||
N o------- -------o :
|
||
|
||
: :
|
||
|
||
: :
|
||
|
||
: :
|
||
|
||
O---------------------------O
|
||
|
||
|
||
|
||
** Page 46
|
||
|
||
|
||
|
||
S1 = XXX
|
||
|
||
C1 = XXX
|
||
|
||
D1 = XXX
|
||
|
||
D2 = XXX
|
||
|
||
R1 = XXX
|
||
|
||
|
||
|
||
Continued...
|
||
|
||
|
||
|
||
MSG#: 1029 *EREWHON*
|
||
|
||
09/25/83 23:19:17 (Read 87 Times)
|
||
|
||
From xxxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: FREEFONE PART 2
|
||
|
||
|
||
|
||
Circuit Operation:
|
||
|
||
|
||
|
||
The circuit inhibits the charging for incoming calls only. When a
|
||
|
||
phone is answered, there is normally approx. IOOmA DC loop current
|
||
|
||
but only 8mA or so is necessary to polarise the mic In the handset.
|
||
|
||
Drawing only this small amount is sufficient to fool BT's ancient
|
||
|
||
"Electric Meccano".
|
||
|
||
|
||
|
||
It's extremely simple. When ringing, the polarity of the line
|
||
|
||
reverses so D1 effectively answers the call when the handset is
|
||
|
||
lifted. When the call is established, the line polarity reverts and
|
||
|
||
R1 limits the loop current while D2 is a LED to indicate the circuit
|
||
|
||
is in operation. C1 ensures speech is unaffected. S1 returns the
|
||
|
||
telephone to normal.
|
||
|
||
|
||
|
||
Local calls of unlimited length can be made free of charge. Long
|
||
|
||
distance calls using this circuit are prone to automatic
|
||
|
||
disconnection this varies from area to area but you will get at least
|
||
|
||
3 minutes before the line is closed down. Further experimentation
|
||
|
||
should bear fruit in this respect.
|
||
|
||
|
||
|
||
Sith the phone on the hook this circuit is completely undetectable.
|
||
|
||
The switch should be cLosed if a call is received from an operator,
|
||
|
||
for example, or to make an outgoing call. It has proved extremely
|
||
|
||
useful, particularly for friends phoning from pay phones with jammed
|
||
|
||
coin slots.
|
||
|
||
|
||
|
||
*Please DO NOT tell ANYONE where yoU found this information*
|
||
|
||
|
||
|
||
Msg#: 1194 *EREWHON*
|
||
|
||
10/07/83 04:50:34 (Read 81 Times)
|
||
|
||
From: xxxxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: FREE TEST NUMBERS
|
||
|
||
|
||
|
||
Free Test Numbers
|
||
|
||
|
||
|
||
Here are some no's that have been found to work:
|
||
|
||
Dial 174 <last 4 figs of your no>: this gives unobtainable then when
|
||
|
||
you replace handset the phone rings.
|
||
|
||
|
||
|
||
Dial 175 <last 4 figs of your no: this gives 'start test...start
|
||
|
||
test...', then when you hang-up the phone rings. Pick it up and you
|
||
|
||
either get dial tone which indicates OK or you will get a recording
|
||
|
||
i.e 'poor insulation B line' telling you what's wrong. If you get
|
||
|
||
dial tone you can immediately dial 1305 to do a further test which
|
||
|
||
might say 'faulty dial pulses'. Other numbers to try are 182, 184 or
|
||
|
||
185. I have discovered my exchange (Pontybodkin) gives a test ring
|
||
|
||
for 1267. These numbers all depend on you local exchange so It pays
|
||
|
||
to experiment, try numbers starting with 1 as these are all local
|
||
|
||
functions. Then when you discover something of interest let me know
|
||
|
||
on this SIG.
|
||
|
||
|
||
|
||
|
||
|
||
Msg: 2241 *EREWHON*
|
||
|
||
12/04/83 20:48:49 (Read 65 Times)
|
||
|
||
From: SYSOP
|
||
|
||
To: SERIOUS FREAKS
|
||
|
||
Subj: USA INFO
|
||
|
||
|
||
|
||
There is a company (?) in the USA called Loopmaniacs Unlimited,
|
||
|
||
PO Box 1197, Port Townsend. WA, 98368, who publish a line of books on
|
||
|
||
telephone hacking. Some have circuits even. Write to M. Hoy there.
|
||
|
||
|
||
|
||
One of their publications is "Steal This Book" at S5.95 plus about $4
|
||
|
||
post. Its Worth stealing, but don't show it to the customs!
|
||
|
||
|
||
|
||
** Page 47
|
||
|
||
|
||
|
||
Msg#: 3266 *EREWHON*
|
||
|
||
01/22/84 06:25:01 (Read 53 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: UNIVERSITY COMPUTERS
|
||
|
||
As already described getting onto the UCL PAD allows various calls.
|
||
|
||
Via this network you can access many many university/research
|
||
|
||
computers To get a full list use CALL 40 then HELP, select GUIDE.
|
||
|
||
Typing '32' at the VIEW prompt will start listing the addresses. Host
|
||
|
||
of these can be used at the pad by 'CALL addr' where addr is the
|
||
|
||
address. For passwords you try DEMO HELP etc. If you find anything
|
||
|
||
interesting report it here.
|
||
|
||
HINT: To aviod the PAD hanging up at the end of each call use the
|
||
|
||
LOGON command - use anything for name and pwd. This seems to do the
|
||
|
||
trick.
|
||
|
||
Another number: Tel: (0235) 834531. This is another data
|
||
|
||
exchange. This one's a bit harder to wake up. You must send a 'break
|
||
|
||
level' to start. This can be done using software but with a maplin
|
||
|
||
just momentarily pull out the RS232 com. Then send RETURNs. To get a
|
||
|
||
list of 'classes' you could use say Manchesters HELP:- CALL 1020300,
|
||
|
||
user:DEMO pwd:DEMO en when you're on HELP PACX.
|
||
|
||
|
||
|
||
Msg#: 3687 *HACKER'S CLUB*
|
||
|
||
02/05/84 14:41:43 (Read 416 Times)
|
||
|
||
From: xxxxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: HACKERS NUMBERS
|
||
|
||
|
||
|
||
The following are some of the numbers collected in the Hackers SIG:
|
||
|
||
|
||
|
||
Commodore BBS (Finland) 358 61 116223
|
||
|
||
|
||
|
||
Gateway test 01 600 1261
|
||
|
||
PRESTEST (1200/75) 01 583 9412
|
||
|
||
Some useful PRESTEL nodes - 640..Res.D (Martlesham's experiments in
|
||
|
||
Dynamic Prestel DRCS, CEPT standards, Picture Prestel, 601
|
||
|
||
(Mailbox,Telemessaging, Telex Link - and maybe Telecom Gold), 651
|
||
|
||
(Scratchpad -always changing). Occasionally parts of 650 (IP News)
|
||
|
||
are not properly CUGed off. 190 sometimes is interesting well.
|
||
|
||
|
||
|
||
These boards all specialised in lonely hearts services !
|
||
|
||
The boards with an asterisk all use BELL Tones
|
||
|
||
*Fairbanks, AK, 907-479-0315
|
||
|
||
*Burbank, CA, 213-840-8252
|
||
|
||
*Burbank, CA, 213-842-9452
|
||
|
||
*Clovis, CA, 209-298-1328
|
||
|
||
*Glendale, CA, 213-242-l882
|
||
|
||
*La Palma, CA, 714-220-0239
|
||
|
||
*Hollywood, CA, 213-764-8000
|
||
|
||
*San Francisco CA, 415-467-2588
|
||
|
||
*Santa Monica CA, 213-390-3239
|
||
|
||
*Sherman Oaks CA, 213-990-6830
|
||
|
||
*Tar~ana , CA, 213-345-1047
|
||
|
||
*Crystal Rivers FL,904-795-8850
|
||
|
||
*Atlanta, GA, 912-233-0863
|
||
|
||
*Hammond, IN, 219-845-4200
|
||
|
||
*Cleveland, OH, 216-932-9845
|
||
|
||
*Lynnefield, MA, 6l7-334-6369
|
||
|
||
*Omaha, NE, 402-571-8942
|
||
|
||
*Freehold, NJ, 201-462-0435
|
||
|
||
*New York, NY, 212-541-5975
|
||
|
||
*Cary, NC, 919-362-0676
|
||
|
||
*Newport News,VA 804-838-3973
|
||
|
||
*Vancouver, WA, 200-250-6624
|
||
|
||
Marseilles, France 33-91-91-0060
|
||
|
||
|
||
|
||
Both USA nos. prefix (0101)
|
||
|
||
a) Daily X-rated Doke Service 516-922-9463
|
||
|
||
b) Auto-Biographies of young ladies who normally work in
|
||
|
||
unpublishable magazines on 212-976-2727.
|
||
|
||
c)Dial a wank 0101,212,976,2626; 0101,212,976,2727
|
||
|
||
|
||
|
||
** Page 48
|
||
|
||
|
||
|
||
Msg#: 3688 *HACKER'S CLUB*
|
||
|
||
02/05/84 14:44:51 (Read 393 Times)
|
||
|
||
From: xxxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: HACKERS NUMBERS CONT...
|
||
|
||
Hertford PDP 11/70 Hackers BBS:
|
||
|
||
Call 0707-263577 with 110 baud selected.
|
||
|
||
type: SET SPEED 300'CR'
|
||
|
||
After hitting CR switch to 300 baud.
|
||
|
||
Then type: HELLO 124,4'CR
|
||
|
||
!Password: HAE4 <CR>
|
||
|
||
When logged on type: COMMAND HACKER <CR>
|
||
|
||
Use: BYE to log out
|
||
|
||
*********
|
||
|
||
EUCLID 388-2333
|
||
|
||
TYPE A COUPLE OF <CR> THEN PAD <CR>
|
||
|
||
ONCE LOGGED ON TO PAD TYPE CALL 40 <CR> TRY DEMO AS A USERID WHY NOT
|
||
|
||
TRY A FEW DIFFER DIFFERENT CALLS THIS WILL LET U LOG ON TO A WHOLE
|
||
|
||
NETWORK SYSTEM ALL OVER EUROPE!
|
||
|
||
YOU CAN ALSO USE 01-278-4355.
|
||
|
||
********
|
||
|
||
unknown 300 Baud 01-854 2411
|
||
|
||
01-854 2499
|
||
|
||
******
|
||
|
||
Honeywell:From London dial the 75, else 0753(SLOUGH)
|
||
|
||
75 74199 75 76930
|
||
|
||
Type- TSS
|
||
|
||
User id: D01003
|
||
|
||
password: Unknown (up to 10 chars long)
|
||
|
||
Type: EXPL GAMES LIST to list games
|
||
|
||
To run a game type: FRN GAMES(NAME) E for a fotran game.
|
||
|
||
Replace FRN with BRN for BASIC games.
|
||
|
||
******
|
||
|
||
Central London Poly 01 637 7732/3/4/5
|
||
|
||
******
|
||
|
||
PSS (300) 0753 6141
|
||
|
||
******
|
||
|
||
Comshare (300) 01 351 2311
|
||
|
||
******
|
||
|
||
'Money Box' 01 828 9090
|
||
|
||
******
|
||
|
||
Imperial College 01 581 1366
|
||
|
||
01 581 1444
|
||
|
||
*******
|
||
|
||
These are most of the interesting numbers that have come up over the
|
||
|
||
last bit. If I have omitted any, please leave them in a message.
|
||
|
||
|
||
|
||
Cheers, xxxxx.
|
||
|
||
|
||
|
||
Msg#: 5156 *HACKER'S CLUB*
|
||
|
||
04/15/84 08:01:11 (Read 221 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: FINANCIAL DATABASES
|
||
|
||
You can get into Datastream on dial-up at 300/300 on 251 6180 - no I
|
||
|
||
don't have any passwords....you can get into Inter Company
|
||
|
||
Comparisons (ICC) company database of 60,000 companies via their
|
||
|
||
1200/75 viewdata front-end processor on 253 8788. Type ***# when
|
||
|
||
asked for your company code to see a demo...
|
||
|
||
|
||
|
||
|
||
|
||
Msg#: 5195 *HACKER'S CLUB*
|
||
|
||
04/17/84 02:28:10 (Read 229 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: PSS TELEX
|
||
|
||
THIS IS PROBOBLY OLD HAT BY NOW BUT IF YOU USE PSS THEN A92348******
|
||
|
||
WHERE **=UK TELEX NO. USE CTRL/P CLR TO BET OUT AFTER MESSAGE. YOU
|
||
|
||
WILL BE CHARGED FOR USE I GUESS
|
||
|
||
|
||
|
||
** Page 49
|
||
|
||
|
||
|
||
Msg#: 7468 *EREWHON*
|
||
|
||
06/29/84 23:30:24 (Read 27 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: PHREAKS
|
||
|
||
Subj: NEW(OLD..) INFO
|
||
|
||
TODAY I WAS LUCKY ENOUGH TO DISCOVER A PREVIOUSLY UNKNOWN CACHE OF
|
||
|
||
AMERICAN MAGAZINE KNOWN AS TAP. ALTHOUGH THEYRE RATHER OUT OF DATE
|
||
|
||
(1974-1981) OR SO THEY ARE PRETTY FUNNY AND HAVE A FEW INTERESTING
|
||
|
||
BITS OF INFORMATION, ESPECIALLY IF U WANT TO SEE THE CIRCUIT DIAGRAMS
|
||
|
||
OF UNTOLD AMOUNTS OF BLUE/RED/BLACK/??? BOXES THERE ARE EVEN A FEW
|
||
|
||
SECTIONS ON THE UK (BUT AS I SAID ITS COMPLETELY OUT OF DATE). IN THE
|
||
|
||
FUTURE I WILL POST SOME OF THE GOOD STUFF FROM TAP ON THIS BOARD
|
||
|
||
(WHEN AND IF I CAN GET ON THIS BLOODY SYSTEM''). ALSO I MANAGED TO
|
||
|
||
FIND A HUGE BOOK PUBLISHED BY AT&T ON DISTANCE DIALING (DATED 1975).
|
||
|
||
DUNNO, IF ANYBODY'S INTERESTED THEN LEAVE A NOTE REQUESTING ANY INFO
|
||
|
||
YOU'RE ARE CHEERS PS ANYBODY KNOW DEPRAVO THE RAT?? DOES HE STILL
|
||
|
||
LIVE?
|
||
|
||
|
||
|
||
Msg#: 7852 t*ACKER'S CLUB*
|
||
|
||
08/17/84 00:39:05 (Read 93 Times)
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: ALL USERS
|
||
|
||
Subj: NKABBS
|
||
|
||
NKABBS IS NOW ONLINE. FOR ATARI & OTHER MICRO USERS. OPERATING ON 300
|
||
|
||
BAUD VIA RINGBACK SYSTEM. TIMES 2130HRS-2400HRS DAILY. TEL :0795
|
||
|
||
842324. SYSTEM UP THESE TIMES ONLY UNTIL RESPONSE GROWS. ALL USERS
|
||
|
||
ARE WELCOME TO ON. EVENTUALLY WE WILL BE SERVING BBC,COMMODORE VIC
|
||
|
||
20/64 OWNERS.+NEWS ETC.
|
||
|
||
|
||
|
||
Msg#:8154 *EREWHON*
|
||
|
||
08/02/84 21:46:11 (Read 13 Times)
|
||
|
||
From: ANON
|
||
|
||
To: ALL
|
||
|
||
Subj: REPLY TO MSG# :1150 (PHREAK BOARDS)
|
||
|
||
|
||
|
||
PHREAK BOARD NUMBERS
|
||
|
||
ACROSS THE U.S.
|
||
|
||
|
||
|
||
|
||
|
||
IF YOU KNOW OF A BOARD THAT IS NOT LISTED HERE, PLEASE LET ME KNOW
|
||
|
||
ABOUT IT.
|
||
|
||
|
||
|
||
JOLLY ROGER 713-468-0174
|
||
|
||
PIRATE'S CHEST 617-981-1349
|
||
|
||
PIRATE'S DATA CENTER 213-341-3962
|
||
|
||
PIRATE'S SPACE STATION 617-244-8244
|
||
|
||
PIRATE'S OUTHOUSE 301-299-3953
|
||
|
||
PIRATE'S HANDLE 314-434-6187
|
||
|
||
PIRATE'S DREAM 713-997-5067
|
||
|
||
PIRATE'S TRADE 213-932-8294
|
||
|
||
PIRATE'S TREK 914-634-1268
|
||
|
||
PIRATE'S TREK III 914-835-3627
|
||
|
||
PIRATE-80 305-225-8059
|
||
|
||
SANCTUARY 201-891-9567
|
||
|
||
SECRET SERVICE ][ 215-855-7913
|
||
|
||
SKELETON ISLAND 804-285-0041
|
||
|
||
BOCA HARBOR 305-392-5924
|
||
|
||
PIRATES OF PUGET SOUND 206-783-9798
|
||
|
||
THE INSANITARIUM 609-234-6106
|
||
|
||
HAUNTED MANSION 516-367-8172
|
||
|
||
WASTELANDS 513-761-8250
|
||
|
||
PIRATE'S HARBOR 617-720-3600
|
||
|
||
SKULL ISLAND 203-972-1685
|
||
|
||
THE TEMPLE 305-798-1615
|
||
|
||
SIR LANCELOT'S CASTLE 914-381-2124
|
||
|
||
PIRATE'8 CITY 703-780-0610
|
||
|
||
PIRATE-S GALLEY 213-796-6602
|
||
|
||
THE PAWN SHOPPE 213-859-2735
|
||
|
||
HISSION CONTROL 301-983-8293
|
||
|
||
BIG BLUE MONSTER 305-781-1683
|
||
|
||
THE I.C.'S SOCKET 213-541-5607
|
||
|
||
THE MAGIC REALM 212-767-9046
|
||
|
||
PIRATE'S BAY 415-775-2384
|
||
|
||
BEYOND BELIEF 213-377-6568
|
||
|
||
PIRATE's TROVE 703-644-1665
|
||
|
||
CHEYANNE MOUNTAIN 303-753 1554
|
||
|
||
ALAHO CITY 512-623-6123
|
||
|
||
CROWS NEST 617-862-7037
|
||
|
||
PIRATE'S PUB ][ 617-891-5793
|
||
|
||
PIRATE'S I/0 201-543-6139
|
||
|
||
SOUNDCHASER 804-788-0774
|
||
|
||
SPLIT INFINITY 408-867-4455
|
||
|
||
CAPTAIN'S LOG 612-377-7747
|
||
|
||
THE SILHARILLION 714-535-7527
|
||
|
||
TWILIGHT PHONE 313-775-1649
|
||
|
||
THE UNDERGROUND 707-996-2427
|
||
|
||
THE INTERFACE 213-477-4605
|
||
|
||
THE DOC BOARD 713-471-4131
|
||
|
||
SYSTEM SEVEN 415-232-7200
|
||
|
||
SHADOW WORLD 713-777-8608
|
||
|
||
OUTER LIMITS 213-784-0204
|
||
|
||
METRO 313-855-6321
|
||
|
||
MAGUS 703-471-0611
|
||
|
||
GHOST SHIP 111 - PENTAGON 312-627-5138
|
||
|
||
GHOST SHIP - TARDIS 312-528-1611
|
||
|
||
DATA THIEVES 312-392-2403
|
||
|
||
DANGER ISLAND 409-846-2900
|
||
|
||
CORRUPT COMPUTING 313-453-9183
|
||
|
||
THE ORACLE 305-475-9062
|
||
|
||
PIRATE'S PLANET 901-756-0026
|
||
|
||
CAESER S PALACE 305-253-9869
|
||
|
||
CRASHER BBS 415-461-8215
|
||
|
||
PIRATE'S BEACH 305-865-5432
|
||
|
||
PIRATE'S COVE 516-698-4008
|
||
|
||
PIRATE'S WAREHOUSE 415-924-8338
|
||
|
||
PIRATE'S PORT 512-345-3752
|
||
|
||
PIRATE'S NEWSTAND ][ 213-373-3318
|
||
|
||
PIRATE'S GOLDMINE 617-443-7428
|
||
|
||
PIRATE'S SHIP 312-445-3883
|
||
|
||
PIRATE'S MOUNTAIN 213-472-4287
|
||
|
||
PIRATE'S TREK ][ 914-967-2917
|
||
|
||
PIRATE'S TREK IV 714-932-1124
|
||
|
||
PORT OR THIEVES 305-798-1051
|
||
|
||
SECRET SERVICE 213-932-8294
|
||
|
||
SHERWOOD FOREST 212-896-6063
|
||
|
||
GALAXY ONE 215-224-0864
|
||
|
||
R.A.G.T.I.H.E. 217-429-6310
|
||
|
||
KINGDOM OF SEVEN 206-767-7777
|
||
|
||
THE STAR SYSTEM 516-698-7345
|
||
|
||
ALPHANET 203-227-2987
|
||
|
||
HACKER HEAVEN 516-796-6454
|
||
|
||
PHANTOM ACCESS 814-868-1884
|
||
|
||
THE CONNECTION 516-487-1774
|
||
|
||
THE TAVERN 516-623-9004
|
||
|
||
PIRATE'S HIDEAWAY 617-449-2808
|
||
|
||
PIRATE'S PILLAGE 317-743-5789
|
||
|
||
THE PARADISE ON-LINE 512-477-2672
|
||
|
||
MAD BOARD FROM MARS 213-470-5912
|
||
|
||
NERVOUS SYSTEM 305-554-9332
|
||
|
||
DEVO 305-652-9422
|
||
|
||
TORTURE CHAMBER 213-375-6137
|
||
|
||
HELL 914-835-4919
|
||
|
||
CRASHER BBS 415-461-8215
|
||
|
||
ALCATRAZ 301-881-0846
|
||
|
||
THE TRADING POST 504-291-4970
|
||
|
||
DEATH STAR 312-627-5138
|
||
|
||
THE CPU 313-547-7903
|
||
|
||
TRADER'S INN 618-856-3321
|
||
|
||
PIRATE'S PUB 617-894-7266
|
||
|
||
BLUEBEARDS GALLEY 213-842-0227
|
||
|
||
MIDDLE EARTH 213-334-4323
|
||
|
||
EXIDY 2000 713-442-7644
|
||
|
||
SHERWOOD FOREST ][ 914-352-6543
|
||
|
||
WARLOCK~S CASTLE 618-345-6638
|
||
|
||
TRON 312-675-1819
|
||
|
||
THE SAFEHOUSE 612-724-7066
|
||
|
||
THE GRAPE VINE 612-454-6209
|
||
|
||
THE ARK 701-343-6426
|
||
|
||
SPACE VOYAGE 713-530-5249
|
||
|
||
OXGATE 804-898-7493
|
||
|
||
MINES OF MORIA ][ 408-688-9629
|
||
|
||
MERLIN'S TOWER 914-381-2374
|
||
|
||
GREENTREE 919-282-4205
|
||
|
||
GHOST SHIP ][ - ARAGORNS 312-644-5165
|
||
|
||
GENERAL HOSPITAL 201-992-9893
|
||
|
||
DARK REALM 713-333-2309
|
||
|
||
COSMIC VOYAGE 713-530-5249
|
||
|
||
CAMELOT 312-357-8075
|
||
|
||
PIRATE'S GUILD 312-279-4399
|
||
|
||
HKGES 305-676-5312
|
||
|
||
MINES OF MORIA 713-871-8577
|
||
|
||
A.S.C.I.I. 301-984-3772
|
||
|
||
|
||
|
||
** Page 50
|
||
|
||
|
||
|
||
If Anybody is mad enough to actually dial up one (or more') of these
|
||
|
||
BBs please log everything so thAt others may benefit from your
|
||
|
||
efforts. IE- WE only have to register once, and we find out if this
|
||
|
||
board suits our interest. Good luck and have fun! Cheers,
|
||
|
||
|
||
|
||
Msg#: 8163 *HACKER'S CLUB*
|
||
|
||
08/30/84 18:55:27 (Read 78 Times)
|
||
|
||
From: XXXXXXXXXX
|
||
|
||
To- ALL
|
||
|
||
Subj: XXXXXX
|
||
|
||
NBBS East is a relatively new bulletin board running from lOpm to
|
||
|
||
1230am on 0692 630610. There are now special facilities for BBC users
|
||
|
||
with colour, graphics etc. If you call it then please try to leave
|
||
|
||
some messages as more messages mean more callers, which in turn means
|
||
|
||
more messages Thanks a lot, Jon
|
||
|
||
|
||
|
||
Msg#: 8601 *HACKER'S CLUB*
|
||
|
||
09/17/84 10:52:43 (Read 57 Times!
|
||
|
||
From: xxxxxxxxxx
|
||
|
||
To: xxxxxxxxx
|
||
|
||
Subj: REPLY TO Msg# 8563 (HONEYWELL)
|
||
|
||
The thing is I still ( sort of I work for XXX so I don't think they
|
||
|
||
would be too pleased if I gave out numbers or anything else. and I
|
||
|
||
would rather keep my job Surely you don't mean MFI furniture ??
|
||
|
||
|
||
|
||
Msg#: 8683 *HACKER'S CLUB*
|
||
|
||
09/19/84 19:54:05 (Read 63 Times)
|
||
|
||
From: xxxxxxxxx
|
||
|
||
To: ALL
|
||
|
||
Subj: DATA NODE
|
||
|
||
To those who have difficulty finding interesting numbers. try the UCL
|
||
|
||
Data Node on 01-388 2333 (300 baud).When you get the Which Service?
|
||
|
||
prompt. type PAD and a couple of CRs. Then, when the PAD> prompt
|
||
|
||
appears type CALL XOOXOOX, where is any(number orrange of numbers.
|
||
|
||
Indeed you can try several formats and numbers until you find
|
||
|
||
something interesting. The Merlin Cern computer is 9002003 And it's
|
||
|
||
difficult to trace You through aq data exchange! If anyone finds any
|
||
|
||
interesting numbers, let me know on this board, or Pretsel mailbox
|
||
|
||
012495225.
|
||
|
||
|
||
|
||
Msg has replies, read now(Y/N)' Y
|
||
|
||
|
||
|
||
Msg#: 9457 *HACKER'S CLUB*
|
||
|
||
10/11/84 01:52:56 (Read 15 Times)
|
||
|
||
From: xxxxxxxxxxx
|
||
|
||
To: xxxxxxxxxxx
|
||
|
||
Subj: REPLY TO MSG# 8683 (DATA NODE)
|
||
|
||
IF YOU WANT TO KNOW MORE ABOUT THIS xxxxx PHONE PHONE xxxx xxxxxx
|
||
|
||
ON 000 0000
|
||
|
||
|
||
|
||
Msg#: 8785 *HACKER'S CLUB*
|
||
|
||
09/21/B4 20-28-59 (Read 40 Times)
|
||
|
||
From xxxxxxxxxxxxxx
|
||
|
||
Subj: NEW Number
|
||
|
||
|
||
|
||
NEW Computer ON LINE TRY RINGING 960 7868 SORRY THAT'S 01 (IN LONDON) IN FRONT.
|
||
|
||
good LUCK!
|
||
|
||
|
||
|
||
** Page 51
|
||
|
||
|
||
|
||
Please note that none of these hints, rumours, phone numbers and
|
||
|
||
passwords are likely to work by the time you are reading this...
|
||
|
||
However, in the case of the US credit agency TRW, described in the
|
||
|
||
previous chapter, valid phone numbers and passwords appear to have
|
||
|
||
sat openly on a number of bulletin boards for up to a year before the
|
||
|
||
agency realised it. Some university mainframes have hacker's boards
|
||
|
||
hidden on them as well.
|
||
|
||
|
||
|
||
It is probably bad taste to mention it, but of course people try
|
||
|
||
to hack bulletin boards as well. An early version of one of the most
|
||
|
||
popular packages could be hacked simply by sending two semi-colons
|
||
|
||
(;;) when asked for your name. The system allowed you to become the
|
||
|
||
Sysop, even though you were sitting at a different computer; you
|
||
|
||
could access the user file, complete with all passwords, validate or
|
||
|
||
devalidate whomever you liked, destroy mail, write general notices,
|
||
|
||
and create whole new areas...
|
||
|
||
|
||
|
||
|
||
|
||
Research Sources
|
||
|
||
|
||
|
||
The computer industry has found it necessary to spend vast sums on
|
||
|
||
marketing its products and whilst some of that effort is devoted to
|
||
|
||
'image' and 'concept' type advertising--to making senior management
|
||
|
||
comfortable with the idea of the XXX Corporation's hardware because
|
||
|
||
it has 'heard' of it--much more is in the form of detailed product
|
||
|
||
information.
|
||
|
||
|
||
|
||
This information surfaces in glossies, in conference papers, and
|
||
|
||
in magazine journalism. Most professional computer magazines are
|
||
|
||
given away on subscription to 'qualified' readers; mostly the
|
||
|
||
publisher wants to know if the reader is in a position to influence a
|
||
|
||
key buying decision--or is looking for a job.
|
||
|
||
|
||
|
||
I have never had any difficulty in being regarded as qualified:
|
||
|
||
certainly no one ever called round to my address to check up the size
|
||
|
||
of my mainframe installation or the number of employees. If in doubt,
|
||
|
||
you can always call yourself a consultant. Registration is usually a
|
||
|
||
matter of filling in a post-paid card. My experience is that, once
|
||
|
||
you are on a few subscription lists, more magazines, unasked for,
|
||
|
||
tend to arrive every week or month--together with invitations to
|
||
|
||
expensive conferences in far-off climes. Do not be put off by the
|
||
|
||
notion that free magazines must be garbage. In the computer industry,
|
||
|
||
as in the medical world, this is absolutely not the case. Essential
|
||
|
||
regular reading for hackers are Computing, Computer Weekly, Software,
|
||
|
||
Datalink, Communicate, Communications Management, Datamation,
|
||
|
||
Mini-Micro Systems, and Telecommunications.
|
||
|
||
|
||
|
||
** Page 52
|
||
|
||
|
||
|
||
The articles and news items often contain information of use to
|
||
|
||
hackers: who is installing what, where; what sort of facilities are
|
||
|
||
being offered; what new products are appearing and what features they
|
||
|
||
have. Sometimes you will find surveys of sub-sets of the computer
|
||
|
||
industry. Leafing through the magazine pile that has accumulated
|
||
|
||
while this chapter was being written, I have marked for special
|
||
|
||
attention a feature on Basys Newsfury, an electronic newsroom package
|
||
|
||
used, among others, by ITN's Channel Four News; several articles on
|
||
|
||
new on-line hosts; an explanation of new enhanced Reuters services; a
|
||
|
||
comparison of various private viewdata software packages and who is
|
||
|
||
using them; some puffs for new Valued Added Networks (VANs); several
|
||
|
||
pieces on computer security; news of credit agencies selling
|
||
|
||
on-line and via viewdata; and a series on Defence Data Networks.
|
||
|
||
|
||
|
||
In most magazines, however, this is not all: each advertisement is
|
||
|
||
coded with a number which you have to circle on a tear-out post-paid
|
||
|
||
'bingo card': each one you mark will bring wads of useful
|
||
|
||
information: be careful, however, to give just enough information
|
||
|
||
about yourself to ensure that postal packets arrive and not
|
||
|
||
sufficient to give the 'I was just passing in the neighbourhood and
|
||
|
||
thought I would call in to see if I could help' sales rep a 'lead' he
|
||
|
||
thinks he can exploit.
|
||
|
||
|
||
|
||
Another excellent source of information are exhibitions: there are
|
||
|
||
the ubiquitous 'product information' sheets, but also the actual
|
||
|
||
machines and software to look at and maybe play with; perhaps you can
|
||
|
||
even get a full scale demonstration and interject a few questions.
|
||
|
||
The real bonus of exhibitions, of course, is that the security sense
|
||
|
||
of salespersons, exhausted by performing on a stand for several days
|
||
|
||
and by the almost compulsory off-hours entertainment of top clients
|
||
|
||
or attempted seduction of the hired-in 'glamour' is rather low.
|
||
|
||
Passwords are often written down on paper and consulted in your full
|
||
|
||
view. All you need is a quick eye and a reasonable memory.
|
||
|
||
|
||
|
||
At both exhibitions and conferences it is a good idea to be a
|
||
|
||
freelance journalist. Most computer mags have relatively small
|
||
|
||
full-time staff and rely on freelancers, so you won't be thought odd.
|
||
|
||
And you'll have your questions answered without anyone asking 'And
|
||
|
||
how soon do you think you'll be making a decision? Sometimes the lack
|
||
|
||
of security at exhibitions and demonstrations defies belief. When ICL
|
||
|
||
launched its joint venture product with Sinclair, the One-Per-Desk
|
||
|
||
communicating executive work- stations; it embarked on a modest
|
||
|
||
road-show to give hands-on experience to prospective purchasers. The
|
||
|
||
demonstration models had been pre-loaded with phone numbers...of
|
||
|
||
senior ICL directors, of the ICL mainframe at its headquarters in
|
||
|
||
Putney and various other remote services....
|
||
|
||
|
||
|
||
** Page 53
|
||
|
||
|
||
|
||
Beyond these open sources of information are a few murkier ones.
|
||
|
||
The most important aid in tackling a 'difficult' operating system or
|
||
|
||
applications program is the proper documentation: this can be
|
||
|
||
obtained in a variety of ways. Sometimes a salesman may let you look
|
||
|
||
at a manual while you 'help' him find the bit of information he can't
|
||
|
||
remember from his sales training. Perhaps an employee can provide a
|
||
|
||
'spare', or run you a photocopy. In some cases, you may even find the
|
||
|
||
manual stored electronically on the system; in which case, print it
|
||
|
||
out. Another desirable document is an organisation's internal phone
|
||
|
||
book...it may give you the numbers for the computer ports, but
|
||
|
||
failing that, you will be able to see the range of numbers in use
|
||
|
||
and, if you are using an auto-dial modem coupled with a
|
||
|
||
search-and-try program, you will be able to define the search
|
||
|
||
parameters more carefully. A phone book will also reveal the names of
|
||
|
||
computer managers and system engineers; perhaps they use fairly
|
||
|
||
obvious passwords.
|
||
|
||
|
||
|
||
It never ceases to astonish me what organisations leave in refuse
|
||
|
||
piles without first giving them a session with the paper shredder.
|
||
|
||
|
||
|
||
I keep my cuttings carefully stored away in a second-hand filing
|
||
|
||
cabinet; items that apply to more than one interest area are
|
||
|
||
duplicated in the photocopier.
|
||
|
||
|
||
|
||
|
||
|
||
Inference
|
||
|
||
|
||
|
||
But hackers' research doesn't rely simply on collecting vast
|
||
|
||
quantities of paper against a possible use. If you decide to target
|
||
|
||
on a particular computer or network, it is surprising what can be
|
||
|
||
found out with just a little effort. Does the organisation that owns
|
||
|
||
the system publish any information about it. In a handbook, annual
|
||
|
||
report, house magazine? When was the hardware and software installed?
|
||
|
||
Did any of the professional weekly computer mags write it up? What do
|
||
|
||
you know about the hardware, what sorts of operating systems would
|
||
|
||
you expect to see, who supplied the software, do you know anyone with
|
||
|
||
experience of similar systems, and so on.
|
||
|
||
|
||
|
||
By way of illustration, I will describe certain inferences it is
|
||
|
||
reasonable to make about the principal installation used by Britain's
|
||
|
||
Security Service, MI5. At the end, you will draw two conclusions:
|
||
|
||
first that someone seriously interested in illicitly extracting
|
||
|
||
information from the computer would find the traditional techniques
|
||
|
||
of espionage--suborning of MI5 employees by bribery, blackmail or
|
||
|
||
appeal to ideology--infinitely easier than pure hacking; and second,
|
||
|
||
that remarkable detail can be accumulated about machines and
|
||
|
||
systems, the very existence of which is supposed to be a secret--and
|
||
|
||
by using purely open sources and reasonable guess-work.
|
||
|
||
|
||
|
||
** Page 54
|
||
|
||
|
||
|
||
The MI5 databanks and associated networks have long been the
|
||
|
||
subject of interest to civil libertarians. Few people would deny
|
||
|
||
absolutely the need for an internal security service of some sort,
|
||
|
||
nor deny that service the benefit of the latest technology. But,
|
||
|
||
civil libertarians ask, who are the legitimate targets of MI5's
|
||
|
||
activities? If they are 'subversives', how do you define them? By
|
||
|
||
looking at the type of computer power MI5 and its associates possess,
|
||
|
||
it possible to see if perhaps they are casting too wide a net for
|
||
|
||
anyone's good. If, as has been suggested, the main installation can
|
||
|
||
hold and access 20 million records, each containing 150 words, and
|
||
|
||
Britain's total population including children, is 56 million, then
|
||
|
||
perhaps an awful lot of individuals are being marked as 'potential
|
||
|
||
subversives'.
|
||
|
||
|
||
|
||
It was to test these ideas out that two journalists, not
|
||
|
||
themselves out-and-out hackers, researched the evidence upon which
|
||
|
||
hackers have later built. The two writers were Duncan Campbell of the
|
||
|
||
New Statesman and Steve Connor, first of Computing and more recently
|
||
|
||
on the New Scientist. The inferences work this way: the only
|
||
|
||
computer manufacturer likely to be entrusted to supply so sensitive a
|
||
|
||
customer would be British and the single candidate would be ICL. You
|
||
|
||
must therefore look at their product range and decide which items
|
||
|
||
would be suitable for a really large, secure, real-time database
|
||
|
||
management job. In the late 1970s, the obvious path was the 2900
|
||
|
||
series, possibly doubled up and with substantive rapid-access disc
|
||
|
||
stores of the type EDS200.
|
||
|
||
|
||
|
||
Checking through back issues of trade papers it is possible to see
|
||
|
||
that just such a configuration, in fact a dual 2980 with a 2960 as
|
||
|
||
back-up and 20 gigabytes of disc store, were ordered for classified
|
||
|
||
database work by the Ministry of Defence'. ICL, on questioning by
|
||
|
||
the journalists, confirmed that they had sold 3 such large systems
|
||
|
||
two abroad and one for a UK government department. Campbell and
|
||
|
||
Connor were able to establish the site of the computer, in Mount Row,
|
||
|
||
London W1, and, in later stories, gave more detail, this time
|
||
|
||
obtained by a careful study of advertisements placed by two
|
||
|
||
recruitment agencies over several years. The main computer, for
|
||
|
||
example, has several minis attached to it, and at least 200
|
||
|
||
terminals. The journalists later went on to investigate details of
|
||
|
||
the networks--connections between National Insurance, Department of
|
||
|
||
Health, police and vehicle driving license Systems.
|
||
|
||
|
||
|
||
In fact, at a technical level, and still keeping to open sources,
|
||
|
||
You can build up even more detailed speculations about the MI5 main
|
||
|
||
computer.
|
||
|
||
|
||
|
||
** Page 55
|
||
|
||
|
||
|
||
ICL's communication protocols, CO1, C02, C03, are published items;
|
||
|
||
you can get terminal emulators to work on a PC, and both the company
|
||
|
||
and its employees have published accounts of their approaches to
|
||
|
||
database management systems, which, incidentally, integrate software
|
||
|
||
and hardware functions to an unusually high degree, giving speed but
|
||
|
||
also a great deal of security at fundamental operating system level.
|
||
|
||
|
||
|
||
Researching MI5 is an extreme example of what is possible; there
|
||
|
||
are few computer installations of which it is in the least difficult
|
||
|
||
to assemble an almost complete picture.
|
||
|
||
|
||
|
||
** Page 56
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 6
|
||
|
||
|
||
|
||
Hackers' Techniques
|
||
|
||
|
||
|
||
The time has now come to sit at the keyboard, phone and modems at
|
||
|
||
the ready, relevant research materials convenient to hand and see
|
||
|
||
what you can access. In keeping with the 'handbook' nature of this
|
||
|
||
publication, I have put my most solid advice in the form of a
|
||
|
||
trouble-shooting appendix (I), so this chapter talks around the
|
||
|
||
techniques rather than spelling them out in great detail.
|
||
|
||
|
||
|
||
Hunting instincts Good hacking, like birdwatching and many other
|
||
|
||
pursuits, depends ultimately on raising your intellectual knowledge
|
||
|
||
almost to instinctive levels. The novice twitcher will, on being told
|
||
|
||
'There's a kingfisher!', roam all over the skies looking for the
|
||
|
||
little bird and probably miss it. The experienced ornithologist will
|
||
|
||
immediately look low over a patch of water, possibly a section shaded
|
||
|
||
by trees, because kingfishers are known to gulp the sort of flies
|
||
|
||
that hover over streams and ponds. Similarly, a good deal of skilful
|
||
|
||
hacking depends on knowing what to expect and how to react. The
|
||
|
||
instinct takes time to grow, but the first step is understanding that
|
||
|
||
you need to develop it in the first place.
|
||
|
||
|
||
|
||
|
||
|
||
Tricks with phones
|
||
|
||
|
||
|
||
If you don't have a complete phone number for a target computer,
|
||
|
||
then you can get an auto-dialler and a little utility program to
|
||
|
||
locate it for you. You will find a flow-chart for a program in
|
||
|
||
Appendix VII. An examination of the phone numbers in the vicinity of
|
||
|
||
the target machine should give you a range within which to search.
|
||
|
||
The program then accesses the auto-dial mechanism of the modem and
|
||
|
||
'listens' for any whistles. The program should enable the phone line
|
||
|
||
to be disconnected after two or three 'rings' as auto-anSwer modems
|
||
|
||
have usually picked up by then.
|
||
|
||
|
||
|
||
Such programs and their associated hardware are a little more
|
||
|
||
Complicated than the popularised portrayals suggest: you must have
|
||
|
||
software to run sequences of calls through your auto-dialler, the
|
||
|
||
hardware must tell you whether you have scored a 'hit' with a modem
|
||
|
||
or merely dialled a human being, and, since the whole point of the
|
||
|
||
exercise is that it works unattended, the process must generate a
|
||
|
||
list of numbers to try.
|
||
|
||
|
||
|
||
** Page 57
|
||
|
||
|
||
|
||
|
||
|
||
Logging on
|
||
|
||
|
||
|
||
You dial up, hear a whistle...and the VDU stays blank. What's gone
|
||
|
||
wrong? Assuming your equipment is not at fault, the answer must lie
|
||
|
||
either in wrong speed setting or wrong assumed protocol. Experienced
|
||
|
||
hackers listen to a whistle from an unknown computer before throwing
|
||
|
||
the data button on the modem or plunging the phone handset into the
|
||
|
||
rubber cups of an acoustic coupler. Different tones indicate
|
||
|
||
different speeds and the trained ear can easily detect the
|
||
|
||
difference--appendix III gives the common variants.
|
||
|
||
|
||
|
||
Some modems, particularly those on mainframes, can operate at more
|
||
|
||
than one speed; the user sets it by sending the appropriate number of
|
||
|
||
carriage returns. In a typical situation, the mainframe answers at
|
||
|
||
110 baud (for teletypewriters), and two carriage returns take it up
|
||
|
||
to 300 baud, the normal default for asynchronous working.
|
||
|
||
|
||
|
||
Some hosts will not respond until they receive a character from
|
||
|
||
the user. Try sending a space or a carriage return.
|
||
|
||
|
||
|
||
If these obvious things don't work and you continue to get no
|
||
|
||
response, try altering the protocol settings (see chapters 2 and 3).
|
||
|
||
Straightforward asynchronous protocols with 7-bit ASCII, odd or even
|
||
|
||
parity and surrounded by one stop and one start bit is the norm, but
|
||
|
||
almost any variant is possible.
|
||
|
||
|
||
|
||
Once you start getting a stream from the host, you must evaluate
|
||
|
||
it to work out what to do next. Are all the lines over-writing each
|
||
|
||
other and not scrolling down the screen? Get your terminal software
|
||
|
||
to insert carriage returns. Are you getting a lot of corruption?
|
||
|
||
Check your phone connections and your protocols. The more familiar
|
||
|
||
you are with your terminal software at this point, the more rapidly
|
||
|
||
you will get results.
|
||
|
||
|
||
|
||
|
||
|
||
Passwords
|
||
|
||
|
||
|
||
Everyone thinks they know how to invent plausible and acceptable
|
||
|
||
passwords; here are the ones that seem to come up over and over
|
||
|
||
again:
|
||
|
||
|
||
|
||
HELP - TEST - TESTER - SYSTEM - SYSTEM - MANAGER - SYSMAN - SYSOP -
|
||
|
||
ENGINEER - OPS - OPERATIONS - CENTRAL - DEMO - DEMONSTRATION - AID -
|
||
|
||
DISPLAY - CALL - TERMINAL - EXTERNAL - REMOTE - CHECK - NET - NETWORK
|
||
|
||
- PHONE - FRED
|
||
|
||
|
||
|
||
** Page 58
|
||
|
||
|
||
|
||
Are you puzzled by the special inclusion of FRED? Look at your
|
||
|
||
computer keyboard sometime and see how easily the one-fingered typist
|
||
|
||
can find those four letters!
|
||
|
||
|
||
|
||
If you know of individuals likely to have legitimate access to a
|
||
|
||
system, find out what you can about them to see if you can
|
||
|
||
second-guess their choice of personal password. Own names, or those
|
||
|
||
of loved ones, or initials are the top favourites. Sometimes there is
|
||
|
||
some slight anagramming and other forms of obvious jumbling. If the
|
||
|
||
password is numeric, the obvious things to try are birthdays, home
|
||
|
||
phone numbers, vehicle numbers, bank account numbers (as displayed on
|
||
|
||
cheques) and so on.
|
||
|
||
|
||
|
||
Sometimes numeric passwords are even easier to guess: I have found
|
||
|
||
myself system manager of a private viewdata system simply by offering
|
||
|
||
it the password 1234567890 and other hackers have been astonished at
|
||
|
||
the results obtained from 11111111, 22222222 etc or 1010101, 2020202.
|
||
|
||
|
||
|
||
It is a good idea to see if you can work on the mentality and known
|
||
|
||
pre-occupations of the legitimate password holder: if he's keen on
|
||
|
||
classic rock'n'roll, you could try ELVIS; a gardener might choose
|
||
|
||
CLEMATIS; Tolkien readers almost invariably select FRODO or BILBO;
|
||
|
||
those who read Greek and Roman Literature at ancient universities
|
||
|
||
often assume that no one would ever guess a password like EURIPIDES;
|
||
|
||
it is a definitive rule that radio amateurs never use anything other
|
||
|
||
than their call-signs.
|
||
|
||
|
||
|
||
Military users like words like FEARLESS and VALIANT or TOPDOG;
|
||
|
||
universities, large companies and public corporations whose various
|
||
|
||
departments are known by acronyms (like the BBC) can find those
|
||
|
||
initials reappearing as passwords.
|
||
|
||
|
||
|
||
One less-publicised trick is to track down the name of the top
|
||
|
||
person in the organisation and guess a computer identity for them;
|
||
|
||
the hypothesis is that they were invited to try the computer when it
|
||
|
||
was first opened and were given an 'easy' password which has neither
|
||
|
||
been used since nor wiped from the user files. A related trick is to
|
||
|
||
identify passwords associated with the hardware or software
|
||
|
||
installer; usually the first job of a system manager on taking over a
|
||
|
||
computer is to remove such IDs, but often they neglect to do so.
|
||
|
||
Alternatively, a service engineer may have a permanent ID so that, if
|
||
|
||
the system falls over, it can be returned to full activity with the
|
||
|
||
minimum delay.
|
||
|
||
|
||
|
||
Nowadays there is little difficulty in devising theoretically
|
||
|
||
secure password systems, and bolstering them by allowing each user
|
||
|
||
only three false attempts before the disconnecting the line, as
|
||
|
||
Prestel does, for example. The real difficulty lies in getting humans
|
||
|
||
to follow the appropriate procedures. Most of us can only hold a
|
||
|
||
limited quantity of character and number sequences reliably in our
|
||
|
||
heads.
|
||
|
||
|
||
|
||
** Page 59
|
||
|
||
|
||
|
||
Make a log-on sequence too complicated, and users will feel compelled
|
||
|
||
to write little notes to themselves, even if expressly forbidden to
|
||
|
||
do so. After a while the complicated process becomes
|
||
|
||
counter-productive. I have a encrypting/decrypting software pack- age
|
||
|
||
for the IBM PC. It is undoubtedly many times more secure than the
|
||
|
||
famous Enigma codes of World War II and after. The trouble is that
|
||
|
||
that you need up to 25 different 14-digit numbers of your
|
||
|
||
specification, which you and your correspondent must share if
|
||
|
||
successful recovery of the original text is to take place.
|
||
|
||
|
||
|
||
Unfortunately the most convenient way to store these sequences is
|
||
|
||
in a separate disk file (get one character wrong and decryption is
|
||
|
||
impossible) and it is all too easy to save the key file either with
|
||
|
||
the enciphered stream, or with the software master, in both of which
|
||
|
||
locations they are vulnerable.
|
||
|
||
|
||
|
||
Nowadays many ordinary users of remote computer services use
|
||
|
||
terminal emulator software to store their passwords. It is all too
|
||
|
||
easy for the hacker to make a quick copy of a 'proper' user's disk,
|
||
|
||
take it away, and then examine the contents of the various log-on
|
||
|
||
files--usually by going into an 'amend password' option. The way for
|
||
|
||
the legitimate user to obtain protection, other than the obvious one
|
||
|
||
of keeping such disks secure, is to have the terminal software itself
|
||
|
||
password protected, and all files encrypted until the correct
|
||
|
||
password is input. But then that new password has to be committed to
|
||
|
||
the owner's memory....
|
||
|
||
|
||
|
||
Passwords can also be embedded in the firmware of a terminal.
|
||
|
||
This is the approach used in many Prestel viewdata sets when the user
|
||
|
||
can, sometimes with the help of the Prestel computer, program his or
|
||
|
||
her set into an EAROM (Electrically Alterable Read Only Memory). If,
|
||
|
||
in the case of Prestel, the entire 14-digit sequence is permanently
|
||
|
||
programmed in the set, that identity (and the user bill associated
|
||
|
||
with it) is vulnerable to the first person who hits the 'viewdata'
|
||
|
||
button on the keypad. Most users only program in the first 10 digits
|
||
|
||
and key in the last four manually. A skilful hacker can make a
|
||
|
||
terminal disgorge its programmed ID by sticking a modem in
|
||
|
||
answer-mode on its back (reversing tones and, in the case of
|
||
|
||
viewdata, speeds also) and sending the ASCII ENQ (ctrl-E) character,
|
||
|
||
which will often cause the user's terminal to send its identity.
|
||
|
||
|
||
|
||
A more devious trick with a conventional terminal is to write a
|
||
|
||
little program which overlays the usual sign-on sequence. The program
|
||
|
||
captures the password as it is tapped out by the legitimate user and
|
||
|
||
saves it to a file where the hacker can retrieve it later.
|
||
|
||
|
||
|
||
** Page 60
|
||
|
||
|
||
|
||
People reuse their passwords. The chances are that, if you obtain
|
||
|
||
someone's password on one system, the same one will appear on another
|
||
|
||
system to which that individual also has access.
|
||
|
||
|
||
|
||
|
||
|
||
Programming tricks
|
||
|
||
|
||
|
||
In most longish magazine articles about electronic crime, the
|
||
|
||
writer includes a list of 'techniques' with names like Salami, Trap
|
||
|
||
Door and Trojan Horse. Most of these are not applicable to pure
|
||
|
||
hacking, but refer to activities carried out by programmers
|
||
|
||
interested in fraud.
|
||
|
||
|
||
|
||
The Salami technique, for example, consists of extracting tiny
|
||
|
||
sums of money from a large number of bank accounts and dumping the
|
||
|
||
proceeds into an account owned by the frauds man. Typically there's
|
||
|
||
an algorithm which monitors deposits which have as their last digit
|
||
|
||
'8'; it then deducts '1' from that and then <20>1 or $1 is siphoned off.
|
||
|
||
|
||
|
||
The Trojan Horse is a more generalised technique which consists of
|
||
|
||
hiding away a bit of unorthodox active code in a standard legitimate
|
||
|
||
routine. The code could, for example, call a special larger routine
|
||
|
||
under certain conditions and that routine could carry out a rapid
|
||
|
||
fraud before wiping itself out and disappearing from the system for
|
||
|
||
good.
|
||
|
||
|
||
|
||
The Trap Door is perhaps the only one of these techniques that
|
||
|
||
pure hackers use. A typical case is when a hacker enters a system
|
||
|
||
with a legitimate identity but is able to access and alter the user
|
||
|
||
files. The hacker than creates a new identity with extra privileges
|
||
|
||
to roam over the system, and is thus able to enter it at any time as
|
||
|
||
a 'super-user' or 'system manager'.
|
||
|
||
|
||
|
||
|
||
|
||
Hardware tricks
|
||
|
||
|
||
|
||
For the hacker with some knowledge of computer hardware and
|
||
|
||
general electronics, and who is prepared to mess about with circuit
|
||
|
||
diagrams, a soldering iron and perhaps a voltmeter, logic probe or
|
||
|
||
oscilloscope, still further possibilities open up. One of the most
|
||
|
||
useful bits of kit consists of a small cheap radio receiver (MW/AM
|
||
|
||
band), a microphone and a tape recorder. Radios in the vicinity of
|
||
|
||
computers, modems and telephone lines can readily pick up the chirp
|
||
|
||
chirp of digital communications without the need of carrying out a
|
||
|
||
physical phone 'tap'.
|
||
|
||
|
||
|
||
Alternatively, an inductive loop with a small low-gain amplifier in
|
||
|
||
the vicinity of a telephone or line will give you a recording you can
|
||
|
||
analyse later at your leisure.
|
||
|
||
|
||
|
||
** Page 61
|
||
|
||
|
||
|
||
By identifying the pairs of tones being used, you can separate the
|
||
|
||
caller and the host. By feeding the recorded tones onto an
|
||
|
||
oscilloscope display you can freeze bits, 'characters' and 'words';
|
||
|
||
you can strip off the start and stop bits and, with the aid of an
|
||
|
||
ASCII-to-binary table, examine what is happening. With experience it
|
||
|
||
is entirely possible to identify a wide range of protocols simply
|
||
|
||
from the 'look' of an oscilloscope. A cruder technique is simply to
|
||
|
||
record and playback sign-on sequences; the limitation is that, even
|
||
|
||
if you manage to log on, you may not know what to do afterwards.
|
||
|
||
|
||
|
||
Listening on phone lines is of course a technique also used by
|
||
|
||
some sophisticated robbers. In 1982 the Lloyds Bank Holborn branch
|
||
|
||
was raided; the alarm did not ring because the thieves had previously
|
||
|
||
recorded the 'all-clear' signal from the phone line and then, during
|
||
|
||
the break-in, stuffed the recording up the line to the alarm
|
||
|
||
monitoring apparatus.
|
||
|
||
|
||
|
||
Sometimes the hacker must devise ad hoc bits of hardware trickery
|
||
|
||
in order to achieve his ends. Access has been obtained to a
|
||
|
||
well-known financial prices service largely by stringing together a
|
||
|
||
series of simple hardware skills. The service is available mostly on
|
||
|
||
leased lines, as the normal vagaries of dial-up would be too
|
||
|
||
unreliable for the City folk who are the principal customers.
|
||
|
||
|
||
|
||
However, each terminal also has an associated dial-up facility, in
|
||
|
||
case the leased line should go down; and in addition, the same
|
||
|
||
terminals can have access to Prestel. Thus the hacker thought that it
|
||
|
||
should be possible to access the service with ordinary viewdata
|
||
|
||
equipment instead of the special units supplied along with the annual
|
||
|
||
subscription. Obtaining the phone number was relatively easy: it was
|
||
|
||
simply a matter of selecting manual dial-up from the appropriate
|
||
|
||
menu, and listening to the pulses as they went through the regular
|
||
|
||
phone.
|
||
|
||
|
||
|
||
The next step was to obtain a password. The owners of the terminal
|
||
|
||
to which the hacker had access did not know their ID; they had no
|
||
|
||
need to know it because it was programmed into the terminal and sent
|
||
|
||
automatically. The hacker could have put a micro 'back-to-front'
|
||
|
||
across the line and sent a ENQ to see if an ID would be sent back.
|
||
|
||
Instead he tried something less obvious.
|
||
|
||
|
||
|
||
The terminal was known to be programmable, provided one knew how
|
||
|
||
and had the right type of keyboard. Engineers belonging to the
|
||
|
||
service had been seen doing just that. How could the hacker acquire
|
||
|
||
'engineer' status? He produced the following hypothesis: the keyboard
|
||
|
||
used by the service's customers was a simple affair, lacking many of
|
||
|
||
the obvious keys used by normal terminals; the terminal itself was
|
||
|
||
manufactured by the same company that produced a range of editing
|
||
|
||
terminals for viewdata operators and publishers. Perhaps if one
|
||
|
||
obtained a manual for the editing terminal, important clues might
|
||
|
||
appear. A suitable photocopy was obtained and, lo and behold, there
|
||
|
||
were instructions for altering terminal IDs, setting auto-diallers
|
||
|
||
and so on.
|
||
|
||
|
||
|
||
** Page 62
|
||
|
||
|
||
|
||
Now to obtain a suitable keyboard. Perhaps a viewdata editing
|
||
|
||
keyboard or a general purpose ASCII keyboard with switchable baud
|
||
|
||
rates? So far, no hardware difficulties. An examination of the back
|
||
|
||
of the terminal revealed that the supplied keypads used rather
|
||
|
||
unusual connectors, not the 270<37> 6-pin DIN which is the Prestel
|
||
|
||
standard. The hacker looked in another of his old files and
|
||
|
||
discovered some literature relating to viewdata terminals. Now he
|
||
|
||
knew what sort of things to expect from the strange socket at the
|
||
|
||
back of the special terminal: he pushed in an unterminated plug and
|
||
|
||
proceeded to test the free leads with a volt-meter against what he
|
||
|
||
expected; eight minutes and some cursing later he had it worked out;
|
||
|
||
five minutes after that he had built himself a little patch cord
|
||
|
||
between an ASCII keyboard, set initially to 75 baud and then to 1200
|
||
|
||
baud as the most likely speeds; one minute later he found the
|
||
|
||
terminal was responding as he had hoped...
|
||
|
||
|
||
|
||
Now to see if there were similarities between the programming
|
||
|
||
commands in the equipment for which he had a manual and the equipment
|
||
|
||
he wished to hack. Indeed there were: on the screen before him was
|
||
|
||
the menu and ID and phone data he had hoped to see. The final test
|
||
|
||
was to move over to a conventional Prestel set, dial up the number
|
||
|
||
for the financial service and send the ID.
|
||
|
||
|
||
|
||
The hacker himself was remarkably uninterested in the financial
|
||
|
||
world and, after describing to me how he worked his trick, has now
|
||
|
||
gone in search of other targets.
|
||
|
||
|
||
|
||
|
||
|
||
Operating Systems
|
||
|
||
|
||
|
||
The majority of simple home micros operate only in two modes--
|
||
|
||
Basic or machine code. Nearly all computers of a size greater than
|
||
|
||
this use operating systems which are essentially housekeeping
|
||
|
||
routines and which tell the processor where to expect instructions
|
||
|
||
from, how to identify and manipulate both active and stored memory,
|
||
|
||
how to keep track of drives and serial ports (and Joy-sticks and
|
||
|
||
mice), how to accept data from a keyboard and locate it on a screen,
|
||
|
||
how to dump results to screen or printer or disc drive, and so on.
|
||
|
||
Familiar micro-based operating systems lnclude CP/M, MS-DOS, CP/M-86
|
||
|
||
and so on, but more advanced operating systems have more
|
||
|
||
facilities--capacity to allow several users all accessing the same
|
||
|
||
data and programs without colliding with each other, enlarged
|
||
|
||
standard utilities to make fast file creation, fast sorting and fast
|
||
|
||
calculation much easier. Under Simple operating systems, the
|
||
|
||
programmer has comparatively few tools to help him; often there is
|
||
|
||
just the Basic language, which elf contains no standard
|
||
|
||
procedures--almost everything must be written from scratch each time.
|
||
|
||
|
||
|
||
** Page 63
|
||
|
||
|
||
|
||
But most computer programs rely, in essence, on a small set of
|
||
|
||
standard modules: forms to accept data to a program, files to keep
|
||
|
||
the data in, calculations to transform that data, techniques to sort
|
||
|
||
the data, forms to present the data to the user upon demand, the
|
||
|
||
ability to present results in various graphics, and so on. So
|
||
|
||
programs written under more advanced operating systems tend to be
|
||
|
||
comparatively briefer for the same end-result than those with Basic
|
||
|
||
acting not only as a language, but also as the computer's
|
||
|
||
housekeeper.
|
||
|
||
|
||
|
||
When you enter a mainframe computer as an ordinary customer, you
|
||
|
||
will almost certainly be located in an applications program, perhaps
|
||
|
||
with the capacity to call up a limited range of other applications
|
||
|
||
programs, whilst staying in the one which has logged you on as user
|
||
|
||
and is watching your connect-time and central processor usage.
|
||
|
||
|
||
|
||
One of the immediate aims of a serious hacker is to get out of
|
||
|
||
this environment and see what other facilities might be located on
|
||
|
||
the mainframe. For example, if access can be had to the user-log it
|
||
|
||
becomes possible for the hacker to create a whole new status for
|
||
|
||
himself, as a system manager, engineer, whatever. The new status,
|
||
|
||
together with a unique new password, can have all sorts o f
|
||
|
||
privileges not granted to ordinary users. The hacker, having acquired
|
||
|
||
the new status, logs out in his original identity and then logs back
|
||
|
||
with his new one.
|
||
|
||
|
||
|
||
There is no single way to break out of an applications program
|
||
|
||
into the operating system environment; people who do so seldom manage
|
||
|
||
it by chance: they tend to have had some experience of a similar
|
||
|
||
mainframe. One of the corny ways is to issue a BREAK or ctrl-C
|
||
|
||
command and see what happens; but most applications programs
|
||
|
||
concerned with logging users on to systems tend to filter out
|
||
|
||
'disturbing' commands of that sort. Sometimes it easier to go beyond
|
||
|
||
the logging-in program into an another 'authorised' program and try
|
||
|
||
to crash out of that. The usual evidence for success is that the
|
||
|
||
nature of the prompts will change. Thus, on a well-known mini family
|
||
|
||
OS, the usual user prompt is
|
||
|
||
|
||
|
||
COMMAND ?
|
||
|
||
|
||
|
||
or simply
|
||
|
||
|
||
|
||
>
|
||
|
||
|
||
|
||
** Page 64
|
||
|
||
|
||
|
||
Once you have crashed out the prompt may change to a simple
|
||
|
||
|
||
|
||
.
|
||
|
||
|
||
|
||
or
|
||
|
||
|
||
|
||
*
|
||
|
||
|
||
|
||
or even
|
||
|
||
|
||
|
||
:
|
||
|
||
|
||
|
||
it all depends.
|
||
|
||
|
||
|
||
To establish where you are in the system, you should ask for a
|
||
|
||
directory; DIR or its obvious variants often give results. Directories
|
||
|
||
may be hierarchical, as in MS-DOS version 2 and above, so that at
|
||
|
||
the bottom level you simply get directories of other directories.
|
||
|
||
Unix machines are very likely to exhibit this trait. And once you get
|
||
|
||
a list of files and programs...well, that's where the exploration
|
||
|
||
really begins.
|
||
|
||
|
||
|
||
In 1982, two Los Angeles hackers, still in their teens, devised
|
||
|
||
one of the most sensational hacks so far, running all over the
|
||
|
||
Pentagon's ARPA data exchange network. ARPAnet was and is the
|
||
|
||
definitive packet-switched network (more about these in the next
|
||
|
||
chapter). It has been running for twenty years, cost more than $500m
|
||
|
||
and links together over 300 computers across the United States and
|
||
|
||
beyond. Reputedly it has 5,000 legitimate customers, among them
|
||
|
||
NORAD, North American Air Defence Headquarters at Omaha, Nebraska.
|
||
|
||
Ron Austin and Kevin Poulsen were determined to explore it.
|
||
|
||
|
||
|
||
Their weapons were an old TRS-80 and a VIC-20, nothing
|
||
|
||
complicated, and their first attempts relied on password-guessing.
|
||
|
||
The fourth try, 'UCB', the obvious initials of the University of
|
||
|
||
California at Berkeley, got them in. The password in fact was little
|
||
|
||
used by its legitimate owner and in the end, it was to be their
|
||
|
||
downfall.
|
||
|
||
|
||
|
||
Aspects of ARPAnet have been extensively written up in the
|
||
|
||
text-books simply because it has so many features which were first
|
||
|
||
tried there and have since become 'standard' on all data networks.
|
||
|
||
From the bookshop at UCLA, the hackers purchased the manual for UNIX,
|
||
|
||
the multi-tasking, multi-user operating system devised by Bell
|
||
|
||
Laboratories, the experimental arm of AT&T, the USA's biggest
|
||
|
||
telephone company.
|
||
|
||
|
||
|
||
** Page 65
|
||
|
||
|
||
|
||
At the heart of Unix is a small kernel containing system primitives;
|
||
|
||
Unix instructions are enclosed in a series of shells, and very
|
||
|
||
complicated procedures can be called in a small number of text lines
|
||
|
||
simply by defining a few pipes linking shells. Unix also contains a
|
||
|
||
large library of routines which are what you tend to find inside the
|
||
|
||
shells. Directories of files are arranged in a tree-like fashion,
|
||
|
||
with master or root directories leading to other directories, and so
|
||
|
||
on.
|
||
|
||
|
||
|
||
Ron and Kevin needed to become system 'super-users' with extra
|
||
|
||
privileges, if they were to explore the system properly; 'UCB' was
|
||
|
||
merely an ordinary user. Armed with their knowledge of Unix, they set
|
||
|
||
out to find the files containing legitimate users' passwords and
|
||
|
||
names. Associated with each password was a Unix shell which defined
|
||
|
||
the level of privilege. Ron wrote a routine which captured the
|
||
|
||
privilege shell associated with a known super-user at the point when
|
||
|
||
that user signed on and then dumped it into the shell associated with
|
||
|
||
a little-used identity they had decided to adopt for their own
|
||
|
||
explorations. They became 'Jim Miller'; the original super-user lost
|
||
|
||
his network status. Other IDs were added. Captured privilege shells
|
||
|
||
were hidden away in a small computer called Shasta at Stanford, at
|
||
|
||
the heart of California's Silicon Valley.
|
||
|
||
|
||
|
||
Ron and Kevin were now super-users. They dropped into SRI,
|
||
|
||
Stanford Research Institute, one of the world's great centres of
|
||
|
||
scientific research; into the Rand Corporation, known equally for its
|
||
|
||
extensive futurological forecasting and its 'thinking about the
|
||
|
||
unthinkable', the processes of escalation to nuclear war; into the
|
||
|
||
National Research Laboratory in Washington; into two private research
|
||
|
||
firms back in California and two defence contractors on the East
|
||
|
||
Coast; and across the Atlantic to the Norwegian Telecommunications
|
||
|
||
Agency which, among other things, is widely believed to have a
|
||
|
||
special role in watching Soviet Baltic activity. And, of course,
|
||
|
||
NORAD.
|
||
|
||
|
||
|
||
Their running about had not gone unnoticed; ARPAnet and its
|
||
|
||
constituent computers keep logs of activity as one form of security
|
||
|
||
(see the section below) and officials both at UCLA (where they were
|
||
|
||
puzzled to see an upsurge in activity by 'UCB') and in one of the
|
||
|
||
defence contractors sounded an alarm. The KGB were suspected, the FBI
|
||
|
||
alerted.
|
||
|
||
|
||
|
||
One person asked to act as sleuth was Brian Reid, a professor of
|
||
|
||
electrical engineering at Stanford. He and his associates set up a
|
||
|
||
series of system trips inside a Unix shell to notify them when
|
||
|
||
certain IDs entered an ARPAnet computer. His first results seemed to
|
||
|
||
indicate that the source of the hacking was Purdue, Indiana, but the
|
||
|
||
strange IDs seemed to enter ARPAnet from all over the place.
|
||
|
||
|
||
|
||
** Page 66
|
||
|
||
|
||
|
||
Eventually, his researches lead him to the Shasta computer and he had
|
||
|
||
identified 'Miller' as the identity he had to nail. He closed off
|
||
|
||
entry to Shasta from ARPanet. 'Miller' reappeared; apparently via a
|
||
|
||
gateway from another Stanford computer, Navajo. Reid, who in his
|
||
|
||
sleuthing role had extremely high privileges, sought to wipe 'Miller'
|
||
|
||
out of Navajo. A few minutes after 'Miller' had vanished from his
|
||
|
||
screen, he re- appeared from yet another local computer, Diablo. The
|
||
|
||
concentration of hacking effort in the Stanford area lead Reid to
|
||
|
||
suppose that the origin of the trouble was local. The most effective
|
||
|
||
way to catch the miscreant was by telephone trace. Accordingly, he
|
||
|
||
prepared some tantalising, apparently private, files. This was bait,
|
||
|
||
designed to keep 'Miller' online as long as possible while the FBI
|
||
|
||
organised a telephone trace. 'Miller' duly appeared, the FBI went
|
||
|
||
into action--and arrested an innocent businessman.
|
||
|
||
|
||
|
||
But back at UCLA they were still puzzling about 'UCB'. In one of
|
||
|
||
his earliest sessions, Ron had answered a registration questionnaire
|
||
|
||
with his own address, and things began to fall into place. In one of
|
||
|
||
his last computer 'chats' before arrest, Kevin, then only 17 and only
|
||
|
||
beginning to think that he and his friend might have someone on their
|
||
|
||
trail, is supposed to have signed off: 'Got to go now, the FBI is
|
||
|
||
knocking at my door.' A few hours later, that is exactly what
|
||
|
||
happened.
|
||
|
||
|
||
|
||
|
||
|
||
Computer Security Methods
|
||
|
||
|
||
|
||
Hackers have to be aware of the hazards of being caught: there is
|
||
|
||
now a new profession of computer security experts, and they have had
|
||
|
||
some successes. The first thing such consultants do is to attempt to
|
||
|
||
divide responsibility within a computer establishment as much as
|
||
|
||
possible. Only operators are allowed physical access to the
|
||
|
||
installation, only programmers can use the operating system (and
|
||
|
||
under some of these, such as VM, maybe only part of it.). Only system
|
||
|
||
managers are permitted to validate passwords, and only the various
|
||
|
||
classes of users are given access to the appropriate applications
|
||
|
||
programs.
|
||
|
||
|
||
|
||
Next, if the operating system permits (it usually does), all
|
||
|
||
accesses are logged; surveillance programs carry out an audit, which
|
||
|
||
gives a historic record, and also, sometimes, perform monitoring,
|
||
|
||
which is real-time surveillance.
|
||
|
||
|
||
|
||
In addition, separate programs may be in existence the sole
|
||
|
||
purpose of which is threat monitoring: they test the system to see if
|
||
|
||
anyone is trying repeatedly to log on without apparent success (say
|
||
|
||
by using a program to try out various likely passwords).
|
||
|
||
|
||
|
||
** Page 67
|
||
|
||
|
||
|
||
They assess if any one port or terminal is getting more than usual
|
||
|
||
usage, or if IDs other than a regular small list start using a
|
||
|
||
particular terminal--as when a hacker obtains a legitimate ID but one
|
||
|
||
that normally operates from only one terminal within close proximity
|
||
|
||
to the main installation, whereas the hacker is calling from outside.
|
||
|
||
|
||
|
||
Increasingly, in newer mainframe installations, security is built
|
||
|
||
into the operating system at hardware level. In older models this was
|
||
|
||
not done, partly because the need was not perceived, but also because
|
||
|
||
each such 'unnecessary' hardware call tended to slow the whole
|
||
|
||
machine down. (If a computer must encrypt and decrypt every process
|
||
|
||
before it is executed, regular calculations and data accesses take
|
||
|
||
much longer.) However, the largest manufacturers now seem to have
|
||
|
||
found viable solutions for this problem....
|
||
|
||
|
||
|
||
** Page 68
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 7
|
||
|
||
|
||
|
||
|
||
|
||
Networks
|
||
|
||
|
||
|
||
Until ten years ago, the telecommunications and computer
|
||
|
||
industries were almost entirely separate. Shortly they will be almost
|
||
|
||
completely fused. Most of today's hackers operate largely in
|
||
|
||
ignorance of what goes on in the lines and switching centres between
|
||
|
||
the computer they own and the computer they wish to access.
|
||
|
||
Increasingly, dedicated hackers are having to acquire knowledge and
|
||
|
||
experience of data networks, a task made more interesting, but not
|
||
|
||
easier, by the fact that the world's leading telecommunications
|
||
|
||
organisations are pushing through an unprecedented rate of
|
||
|
||
innovation, both technical and commercial. Apart from purely local
|
||
|
||
lowspeed working, computer communications are now almost
|
||
|
||
exclusively found on separate high-speed data networks, separate that
|
||
|
||
is from the two traditional telecommunications systems telegraphy and
|
||
|
||
telephone. Telex lines operate typically at 50 or 75 baud with an
|
||
|
||
upper limit of 110 baud.
|
||
|
||
|
||
|
||
The highest efficient speed for telephone-line-based data is 1200
|
||
|
||
baud. All of these are pitifully slow compared with the internal
|
||
|
||
speed of even the most sluggish computer. When system designers first
|
||
|
||
came to evaluate what sort of facilities and performance would be
|
||
|
||
needed for data communications, it became obvious that relatively few
|
||
|
||
lessons would be drawn from the solutions already worked out in voice
|
||
|
||
communications.
|
||
|
||
|
||
|
||
|
||
|
||
Analogue Networks
|
||
|
||
|
||
|
||
In voicegrade networks, the challenge had been to squeeze as many
|
||
|
||
analogue signals down limited-size cables as possible. One of the
|
||
|
||
earlier solutions, still very widely used, is frequency division
|
||
|
||
multiplexing (FDM): each of the original speech paths is modulated
|
||
|
||
onto one of a specific series of radio frequency carrier waves; each
|
||
|
||
such rf wave is then suppressed at the transmitting source and
|
||
|
||
reinserted close to the receiving position so that only one of the
|
||
|
||
sidebands (the lower), the part that actually contains the
|
||
|
||
intelligence of the transmission, is actually sent over the main data
|
||
|
||
path. This is similar to ssb transmission in radio.
|
||
|
||
|
||
|
||
The entire series of suppressed carrier waves are then modulated onto
|
||
|
||
a further carrier wave, which then becomes the main vehicle for
|
||
|
||
taking the bundle of channels from one end of a line to the other.
|
||
|
||
|
||
|
||
** Page 69
|
||
|
||
|
||
|
||
Typically, a small coaxial cable can handle 60 to 120 channels in
|
||
|
||
this way, but large cables (the type dropped on the beds of oceans
|
||
|
||
and employing several stages of modulation) can carry 2700 analogue
|
||
|
||
channels. Changing audio channels (as they leave the telephone
|
||
|
||
instrument and enter the local exchange) into rf channels, as well as
|
||
|
||
making frequency division multiplexing possible, also brings benefits
|
||
|
||
in that over long circuits it is easier to amplify rf signals to
|
||
|
||
overcome losses in the cable.
|
||
|
||
|
||
|
||
Just before World War II, the first theoretical work was carried
|
||
|
||
out to find further ways of economising on cable usage; what was then
|
||
|
||
developed is called Pulse Code Modulation (PCM).
|
||
|
||
|
||
|
||
There are several stages. In the first, an analogue signal is
|
||
|
||
sampled at specific intervals to produce a series of pulses; this is
|
||
|
||
called Pulse Amplitude Modulation, and takes advantage of the
|
||
|
||
characteristic of the human ear that if such pulses are sent down a
|
||
|
||
line with only a very small interval between them, the brain smoothes
|
||
|
||
over the gaps and reconstitutes the entire original signal.
|
||
|
||
|
||
|
||
In the second stage, the levels of amplitude are sampled and
|
||
|
||
translated into a binary code. The process of dividing an analogue
|
||
|
||
signal into digital form and then reassembling it in analogue form is
|
||
|
||
called quantization. Most PCM systems use 128 quantizing levels, each
|
||
|
||
pulse being coded into 7 binary digits, with an eighth added for
|
||
|
||
supervisory purposes.
|
||
|
||
|
||
|
||
OPERATION OF A CHARACTER TDM
|
||
|
||
|
||
|
||
+-----+-----+-----+-----+-----+-----+-----+--
|
||
|
||
<------| SYN | CH1 | CH2 | CH3 | CH4 | SYN | CH1 |
|
||
|
||
+-----+-----+-----+-----+-----+-----+-----+--
|
||
|
||
|
||
|
||
+-----------------+ +-----------------+
|
||
|
||
1 | | | |1
|
||
|
||
--+ | +---+ +---+ | +--
|
||
|
||
2 | | | | | | | |2
|
||
|
||
--+ MULTIPLEXER |==+ M +--\/\/--+ M +==--+ MULTIPLEXER +--
|
||
|
||
3 | | | | | | | |3
|
||
|
||
--+ | +---+ +---+ | +--
|
||
|
||
4 | | | |4
|
||
|
||
--+-----------------+ +-----------------+--
|
||
|
||
|
||
|
||
--+-----+-----+-----+-----+-----+-----+----+
|
||
|
||
| CH1 | SYN | CH4 | CH3 | CH2 | CH1 |SYN |------->
|
||
|
||
--+-----+-----+-----+-----+-----+-----+----+
|
||
|
||
|
||
|
||
<---------------------------->
|
||
|
||
ONE DATA FRAME
|
||
|
||
|
||
|
||
** Page 70
|
||
|
||
|
||
|
||
By interleaving coded characters in a highspeed digital stream it
|
||
|
||
is possible to send several separate voice channels along one
|
||
|
||
physical link. This process is called Time Division Multiplexing
|
||
|
||
(TDM) and together with FDM still forms the basis of most of the
|
||
|
||
globe's voicegrade communications.
|
||
|
||
|
||
|
||
|
||
|
||
Digital Networks
|
||
|
||
|
||
|
||
Elegant though these solutions are, though, they are rapidly being
|
||
|
||
replaced by totally digital schemes. Analogue systems would be very
|
||
|
||
wasteful when all that is being transmitted are the discrete audio
|
||
|
||
tones of the output of a modem. In a speech circuit, the technology
|
||
|
||
has to be able to 'hear', receive, digitize and reassemble the entire
|
||
|
||
audio spectrum between 100 Hz and 3000 Hz, which is the usual
|
||
|
||
passband of what we have come to expect from the audio quality of the
|
||
|
||
telephone. Moreover, the technology must be sensitive to a wide range
|
||
|
||
of amplitude; speech is made up of pitch and associated loudness. In
|
||
|
||
a digital network, however, all one really wants to transmit are the
|
||
|
||
digits, and it doesn't matter whether they are signified by audio
|
||
|
||
tones, radio frequency values, voltage conditions or light pulses,
|
||
|
||
just so long as there is circuitry at either end which can encode and
|
||
|
||
decode.
|
||
|
||
|
||
|
||
There are other problems with voice transmission: once two parties
|
||
|
||
have made a connection with each other (by the one dialling a number
|
||
|
||
and the other lifting a handset), good sense has suggested that it
|
||
|
||
was desirable to keep a total physical path open between them, it not
|
||
|
||
being practical to close down the path during silences and re-open it
|
||
|
||
when someone speaks. In any case the electromechanical nature of most
|
||
|
||
of today's phone exchanges would make such turning off and on very
|
||
|
||
cumbersome and noisy.
|
||
|
||
|
||
|
||
But with a purely digital transmission, routing of a 'call'
|
||
|
||
doesn't have to be physical--individual blocks merely have to bear an
|
||
|
||
electronic label of their originating and destination addresses, such
|
||
|
||
addresses being 'read' in digital switching exchanges using chips,
|
||
|
||
rather than electromechanical ones. Two benefits are thus
|
||
|
||
simultaneously obtained: the valuable physical path (the cable or
|
||
|
||
satellite link) is only in use when some intelligence is actually
|
||
|
||
being transmitted and is not in use during 'silence'; secondly,
|
||
|
||
switching can be much faster and more reliable.
|
||
|
||
|
||
|
||
|
||
|
||
Packet Switching
|
||
|
||
|
||
|
||
These ideas were synthesised into creating what has now become
|
||
|
||
packet switching. The methods were first described in the mid-1960's
|
||
|
||
but it was not until a decade later that suitable cheap technology
|
||
|
||
existed to create a viable commercial service.
|
||
|
||
|
||
|
||
** Page 71
|
||
|
||
|
||
|
||
The British Telecom product is called Packet SwitchStream (PSS) and
|
||
|
||
notable comparable US services are Compuserve, Telenet and Tymnet.
|
||
|
||
Many other countries have their own services and international packet
|
||
|
||
switching is entirely possible--the UK service is called,
|
||
|
||
unsurprisingly, IPSS.
|
||
|
||
|
||
|
||
|
||
|
||
International Packet Switched Services and DNICs
|
||
|
||
|
||
|
||
INTERNATIONAL NETWORKS
|
||
|
||
|
||
|
||
Datacalls can be made to hosts on any listed International Networks.
|
||
|
||
The NIC (Data Network Identification Code) must precede the
|
||
|
||
international host's NUA. Charges quoted are for duration (per hour)
|
||
|
||
and volume (per Ksegment) and are raised in steps of 1 minute and 10
|
||
|
||
segments respectively.
|
||
|
||
|
||
|
||
Country Network DNIC
|
||
|
||
|
||
|
||
Australia Midas 5053
|
||
|
||
8elgium Euronet 2062
|
||
|
||
Belgium Euronet 2063
|
||
|
||
Canada Datapac 3020
|
||
|
||
Canada Globedat 3025
|
||
|
||
Canada Infoswitch 3029
|
||
|
||
Denmark Euronet 2383
|
||
|
||
France Transpac 2080
|
||
|
||
French Antilles Euronet 3400
|
||
|
||
Germany (FDR) Datex P 2624
|
||
|
||
Germany (FDR) Euronet 2623
|
||
|
||
Hong Kong IDAS 4542
|
||
|
||
Irish Republic Euronet 2723
|
||
|
||
Italy Euronet 2223
|
||
|
||
Japan DDX-P 4401
|
||
|
||
Japan Venus-P 4408
|
||
|
||
Luxembourg Euronet 2703
|
||
|
||
|
||
|
||
** Page 72
|
||
|
||
|
||
|
||
Netherlands Euronet 2043
|
||
|
||
Country Network DNIC
|
||
|
||
Norway Norpak 2422
|
||
|
||
Portugal N/A 2682
|
||
|
||
Singapore Telepac 5252
|
||
|
||
South Africa Saponet 6550
|
||
|
||
Spain TIDA 2141
|
||
|
||
Sweden Telepak 2405
|
||
|
||
Switzerland Datalink 2289
|
||
|
||
Switzerland Euronet 2283
|
||
|
||
U.S.A. Autonet 3126
|
||
|
||
U.S.A. Compuserve 3132
|
||
|
||
U.S.A. ITT (UDTS) 3103
|
||
|
||
U.S.A. RCA (LSDS) 3113
|
||
|
||
U.S.A. Telenet 3110
|
||
|
||
U.S.A. Tymnet 3106
|
||
|
||
U.S.A. Uninet 3125
|
||
|
||
U.S.A. WUI (DBS) 3104
|
||
|
||
|
||
|
||
|
||
|
||
Additionally, Datacalls to the U.K. may be initiated from:
|
||
|
||
|
||
|
||
Bahrain, Barbados, Bermuda, Israel, New Zealand and the United Arabs
|
||
|
||
Emirates.
|
||
|
||
|
||
|
||
Up to date Information can be obtained from IPSS Marketing on
|
||
|
||
01-9362743
|
||
|
||
|
||
|
||
In essence, the service operates at 48kbits/sec full duplex (both
|
||
|
||
directions simultaneously) and uses an extension of time division
|
||
|
||
multiplexing Transmission streams are separated in convenient- sized
|
||
|
||
blocks or packets, each one of which contains a head and tail
|
||
|
||
signifying origination and destination. The packets are assembled
|
||
|
||
either by the originating computer or by a special facility supplied
|
||
|
||
by the packet switch system. The packets in a single transmission
|
||
|
||
stream may all follow the same physical path or may use alternate
|
||
|
||
routes depending on congestion. The packets from one 'conversation'
|
||
|
||
are very likely to be interleaved with packets from many Other
|
||
|
||
'conversations'. The originating and receiving computers see none of
|
||
|
||
this. At the receiving end, the various packets are stripped of their
|
||
|
||
routing information, and re-assembled in the correct order before
|
||
|
||
presentation to the computer's VDU or applications program.
|
||
|
||
|
||
|
||
** Page 73
|
||
|
||
|
||
|
||
PACKET ASSEMBLY/DISASSEMBLY
|
||
|
||
|
||
|
||
+-------------------------
|
||
|
||
|
|
||
|
||
| PSS
|
||
|
||
+-----+
|
||
|
||
o> o> o> o> o> o> o> o> o> o> | | O> O> O>
|
||
|
||
Terminal D================================-+ PAD +-==========
|
||
|
||
<o <o <o <o <o <o <o <o <o <o | | <O <O <O
|
||
|
||
+-----+
|
||
|
||
|
|
||
|
||
|
|
||
|
||
+-------------------------
|
||
|
||
Key:
|
||
|
||
o> CHARACTERS O> PACKETS
|
||
|
||
<o <O
|
||
|
||
|
||
|
||
All public data networks using packet switching seek to be
|
||
|
||
compatible with each other, at least to a considerable degree. The
|
||
|
||
international standard they have to implement is called CCITT X.25.
|
||
|
||
This is a multi-layered protocol covering (potentially) everything
|
||
|
||
from electrical connections to the user interface.
|
||
|
||
|
||
|
||
The levels work like this:
|
||
|
||
|
||
|
||
7 APPLICATION User interface
|
||
|
||
|
||
|
||
6 PRESENTATION Data formatting & code conversion
|
||
|
||
|
||
|
||
5 SESSION Co-ordination between processes
|
||
|
||
|
||
|
||
4 TRANSPORT Control of quality service
|
||
|
||
|
||
|
||
3 NETWORK Set up and maintenance of connections
|
||
|
||
|
||
|
||
2 DATA LINK Reliable transfer between terminal and network
|
||
|
||
|
||
|
||
PHYSICAL Transfer of bitstream between terminal and network
|
||
|
||
|
||
|
||
** Page 74
|
||
|
||
|
||
|
||
At the moment international agreement has only been reached on the
|
||
|
||
lowest three levels, Physical, Data Link and Network. Above that,
|
||
|
||
there is a battle in progress between IBM, which has solutions to the
|
||
|
||
problems under the name SNA (Systems Network Architecture) and most
|
||
|
||
of the remainder of the principal main- frame manufacturers, whose
|
||
|
||
solution is called OSI (Open Systems Interconnection).
|
||
|
||
|
||
|
||
|
||
|
||
Packet Switching and the Single User
|
||
|
||
|
||
|
||
So much for the background explanation. How does this affect the
|
||
|
||
user? Single users can access packet switching in one of two
|
||
|
||
principal ways. They can use special terminals able to create the
|
||
|
||
data packets in an appropriate form--called Packet Terminals, in the
|
||
|
||
|
||
|
||
(In the original book there is a diagram showing Dial-up termials and
|
||
|
||
single users connecting to a PAD system and Packet Terminals directly
|
||
|
||
connected to the PSS. Note added by Electronic Images)
|
||
|
||
|
||
|
||
** Page 75
|
||
|
||
|
||
|
||
jargon--and these sit on the packet switch circuit, accessing it via
|
||
|
||
the nearest PSS exchange using a permanent dataline and modems
|
||
|
||
operating at speeds of 2400, 4800, 9600 or 48K baud, depending on
|
||
|
||
level of traffic. Alternatively, the customer can use an ordinary
|
||
|
||
asynchronous terminal without packet-creating capabilities, and
|
||
|
||
connect into a special PSS facility which handles the packet assembly
|
||
|
||
for him. Such devices are called Packet Assembler/ Disassemblers, or
|
||
|
||
PADs. In the jargon, such users are said to have Character Terminals.
|
||
|
||
PADs are accessed either via leased line at 300 or 1200, or via
|
||
|
||
dial-up at those speeds, but also at 110 and 1200/75.
|
||
|
||
|
||
|
||
Most readers of this book, if they have used packet switching at
|
||
|
||
all, will have done so using their own computers as character
|
||
|
||
terminals and by dialling into a PAD. The phone numbers of UK PADs
|
||
|
||
can be found in the PSS directory, published by Telecom National
|
||
|
||
Networks. In order to use PSS, you as an individual need a Network
|
||
|
||
User Identity (NUI), which is registered at your local Packet Switch
|
||
|
||
Exchange (PSE). The PAD at the PSE will throw you off if you don't
|
||
|
||
give it a recognisable NUI. PADs are extremely flexible devices; they
|
||
|
||
will configure their ports to suit your equipment, both as to speed
|
||
|
||
and screen addressing, rather like a bulletin board (though to be
|
||
|
||
accurate, it is the bulletin board which mimics the PAD).
|
||
|
||
|
||
|
||
Phone numbers to access PSS PADs
|
||
|
||
|
||
|
||
Terminal operating speed:
|
||
|
||
PSE (STD) 110 OR 300 1200/75 1200 Duplex
|
||
|
||
|
||
|
||
Aberdeen (0224) 642242 642484 642644
|
||
|
||
Birmingham (021) 2145139 2146191 241 3061
|
||
|
||
Bristol (0272) 216411 216511 216611
|
||
|
||
Cambridge (0223) 82511 82411 82111
|
||
|
||
Edinburgh (031) 337 9141 337 9121 337 9393
|
||
|
||
Glasgow (041) 204 2011 204 2031 204 2051
|
||
|
||
Leeds (0532) 470711 470611 470811
|
||
|
||
Liverpool (051) 211 0000 212 5127 213 6327
|
||
|
||
London (01) 825 9421 407 8344 928 2333
|
||
|
||
or (01) 928 9111 928 3399 928 1737
|
||
|
||
Luton (0582) 8181 8191 8101
|
||
|
||
Manchester (061) 833 0242 833 0091 833 0631
|
||
|
||
Newcastle/Tyne (0632) 314171 314181 314161
|
||
|
||
Nottingham (0602) 881311 881411 881511
|
||
|
||
Portsmouth (0705) 53011 53911 53811
|
||
|
||
Reading (0734) 389111 380111 384111
|
||
|
||
(*)Slough (0753) 6141 6131 6171
|
||
|
||
|
||
|
||
(*)Local area code access to Slough is not available.
|
||
|
||
Switch the modem/dataphone to 'data' on receipt of data tone.
|
||
|
||
|
||
|
||
** Page 76
|
||
|
||
|
||
|
||
Next, you need the Network User Address (NUA) of the host you are
|
||
|
||
calling. These are also available from the same directory: Cambridge
|
||
|
||
University Computing Services's NUA is 234 222339399, BLAISE is 234
|
||
|
||
219200222, Istel is 234 252724241, and so on. The first four numbers
|
||
|
||
are known as the DNIC (Data Network Identification Code); of these
|
||
|
||
the first three are the country ('234' is the UK identifier), and the
|
||
|
||
last one the specific service in that country, '2' signifying PSS.
|
||
|
||
You can also get into Prestel via PSS, though for UK purposes it is
|
||
|
||
an academic exercise: A9 234 1100 2018 gives you Prestel without the
|
||
|
||
graphics (A9 indicates to the system that you have a teletype
|
||
|
||
terminal).
|
||
|
||
|
||
|
||
Once you have been routed to the host computer of your choice,
|
||
|
||
then it is exactly if you were entering by direct dial; your password
|
||
|
||
and so on will be requested. Costs of using PSS are governed by the
|
||
|
||
number of packets exchanged, rather than the distance between two
|
||
|
||
computers or the actual time of the call. A typical PSS session will
|
||
|
||
thus contain the following running costs: local phone call to PAD (on
|
||
|
||
regular phone bill, time-related), PSS charges (dependent on number
|
||
|
||
of packets sent) and host computer bills (which could be time-related
|
||
|
||
or be per record accessed or on fixed subscription).
|
||
|
||
|
||
|
||
Packet switching techniques are not confined to public data
|
||
|
||
networks Prestel uses them for its own mini-network between the
|
||
|
||
various Retrieval Computers (the ones the public dial into) and the
|
||
|
||
Update and Mailbox Computers, and also to handle Gateway connections.
|
||
|
||
Most newer private networks are packet switched.
|
||
|
||
|
||
|
||
** Page 77
|
||
|
||
|
||
|
||
Valued Added Networks (VANs) are basic telecoms networks or
|
||
|
||
facilities to which some additional service--data processing or
|
||
|
||
hosting of publishing ventures, for example--has been added.
|
||
|
||
|
||
|
||
Public Packet Switching, by offering easier and cheaper access, is
|
||
|
||
a boon to the hacker. No longer does the hacker have to worry about
|
||
|
||
the protocols that the host computer normally expects to see from its
|
||
|
||
users. The X.25 protocol and the adaptability of the PAD mean that
|
||
|
||
the hacker with even lowest quality asynchronous comms can talk to
|
||
|
||
anything on the network. The tariff structure, favouring packets
|
||
|
||
exchanged and not distance, means that any computer anywhere in the
|
||
|
||
world can be a target.
|
||
|
||
|
||
|
||
Austin and Poulsen, the ARPAnet hackers, made dramatic use of a
|
||
|
||
private packet-switched net; the Milwaukee 414s ran around GTE's
|
||
|
||
Telenet service, one of the biggest public systems in the US. Their
|
||
|
||
self-adopted name comes from the telephone area code for Milwaukee, a
|
||
|
||
city chiefly known hitherto as a centre of the American beer
|
||
|
||
industry. During the Spring and Summer of 1983, using publicly
|
||
|
||
published directories, and the usual guessing games about
|
||
|
||
pass-numbers and pass-words, the 414s dropped into the Security
|
||
|
||
Pacific Bank in Los Angeles, the Sloan-Kettering Cancer Clinic in New
|
||
|
||
York (it is still not clear to me if they actually altered patients
|
||
|
||
records or merely looked at them), a Canadian cement company and the
|
||
|
||
Los Alamos research laboratory in New Mexico, home of the atomic
|
||
|
||
bomb, and where work on nuclear weapons continues to this day. It is
|
||
|
||
believed that they saw there 'sensitive' but not 'classified' files.
|
||
|
||
|
||
|
||
Commenting about their activities, one prominent computer security
|
||
|
||
consultant, Joesph Coates, said: 'The Milwaukee babies are great, the
|
||
|
||
kind of kids anyone would like their own to - ~be...There's nothing
|
||
|
||
wrong with those kids. The problem is with the idiots who sold the
|
||
|
||
system and the ignorant people who bought it. Nobody should buy a
|
||
|
||
computer without knowing how much ~ . security is built in....You
|
||
|
||
have the timid dealing with the foolish.'
|
||
|
||
|
||
|
||
During the first couple of months of 1984, British hackers carried
|
||
|
||
out a thorough exploration of SERCNET, the private packet-switched
|
||
|
||
network sponsored by the Science and Engineering Research Council and
|
||
|
||
centred on the Rutherford Appleton Laboratory in Cambridge. It links
|
||
|
||
together all the science and technology universities and polytechnics
|
||
|
||
in the United Kingdom and has gateways to PSS and CERN (European
|
||
|
||
Nuclear Research).
|
||
|
||
|
||
|
||
** Page 78
|
||
|
||
|
||
|
||
Almost every type of mainframe and large mini-computer can be
|
||
|
||
discovered hanging on to the system, IBM 3032 and 370 at Rutherford
|
||
|
||
itself, Prime 400s, 550s and 750s all over the place, VAX 11/780s at
|
||
|
||
Oxford, Daresbury, other VAXs at Durham, Cambridge, York, East Anglia
|
||
|
||
and Newcastle, large numbers of GEC 4000 family members, and the odd
|
||
|
||
PDP11 running Unix.
|
||
|
||
|
||
|
||
Penetration was first achieved when a telephone number appeared on
|
||
|
||
a popular hobbyist bulletin board, together with the suggestion that
|
||
|
||
the instruction 'CALL 40' might give results. It was soon discovered
|
||
|
||
that if the hacker typed DEMO when asked for name and establishment,
|
||
|
||
things started to happen. For several days hackers left each other
|
||
|
||
messages on the hobbyist bulletin board, reporting progress, or the
|
||
|
||
lack of it. Eventually, it became obvious that DEMO was supposed, as
|
||
|
||
its name suggests, to be a limited facilities demonstration for
|
||
|
||
casual users, but that it had been insecurely set up.
|
||
|
||
|
||
|
||
I can remember the night I pulled down the system manual, which
|
||
|
||
had been left in an electronic file, watching page after page scroll
|
||
|
||
down my VDU at 300 baud. All I had had to do was type the word
|
||
|
||
'GUIDE'. I remember also fetching down lists of addresses and
|
||
|
||
mnemonics of SERCNET members. Included in the manual were extensive
|
||
|
||
descriptions of the network protocols and their relation to
|
||
|
||
'standard' PSS-style networks.
|
||
|
||
|
||
|
||
As I complete this chapter I know that certain forms of access to
|
||
|
||
SERCNET have been shut off, but that hacker exploration appears to
|
||
|
||
continue. Some of the best hacker stories do not have a definite
|
||
|
||
ending. I offer some brief extracts from captured SERCNET sessions.
|
||
|
||
|
||
|
||
03EOEHaae NODE 3.
|
||
|
||
Which Service?
|
||
|
||
PAD
|
||
|
||
COM
|
||
|
||
FAD>CALL 40
|
||
|
||
Welcome to SERCNET-PSS Gateway. Type HELP for help.
|
||
|
||
|
||
|
||
Gatew::~cInkging in
|
||
|
||
user HELP
|
||
|
||
ID last used Wednesday, 18 January 1984 16:53
|
||
|
||
Started - Wed 18 Jan 19a4 17:07:55
|
||
|
||
Please enter your name and establishment DEMO
|
||
|
||
Due to a local FTP problem messages entered via the HELP system
|
||
|
||
during the last month have been lost. Please resubmit if
|
||
|
||
problem/question is still outstanding 9/1/84
|
||
|
||
|
||
|
||
No authorisation is required for calls which do not incur charges at
|
||
|
||
the Gateway. There is now special support for TELEX. A TELEX service
|
||
|
||
may be announced shortlY.
|
||
|
||
|
||
|
||
|
||
|
||
Copies of the PSS Guide issue 4 are available on request to Program
|
||
|
||
Advisory Office at RAL, telephone 0235 44 6111 (direct dial in) or
|
||
|
||
0235 21900 Ext 6111. Requests for copies should no longer be placed
|
||
|
||
in this help system.
|
||
|
||
|
||
|
||
The following options are available:
|
||
|
||
|
||
|
||
** Page 79
|
||
|
||
|
||
|
||
NOTES GUIDE TITLES ERRORS EXAMPLES HELP QUIT
|
||
|
||
Which option do you require? GUIDE
|
||
|
||
The program 'VIEW' is used to display the Gateway guide
|
||
|
||
Commands available are:
|
||
|
||
<CR> or N next page
|
||
|
||
p previous page
|
||
|
||
n list page n
|
||
|
||
+n or -n go forward or back n pages
|
||
|
||
S first page
|
||
|
||
E last page
|
||
|
||
L/string find line Containing string
|
||
|
||
F/string find line beginning string
|
||
|
||
Q exit from VIEW
|
||
|
||
|
||
|
||
VIEW Vn 6> Q
|
||
|
||
The following options are available:
|
||
|
||
|
||
|
||
NOTES GUIDE TITLES ERRORS EXAMPLES HELP OUIT
|
||
|
||
Which option do you require? HELP
|
||
|
||
NOTES replies to user queries & other notes
|
||
|
||
GUIDE Is the complete Gateway user guide (including the Appendices)
|
||
|
||
TITLES 1- a list of SERCNET L PSS addresses & mnemonics (Guide
|
||
|
||
Appendix 1)
|
||
|
||
ERRORS List of error codes you may receive EXAMPLES are ome examples
|
||
|
||
of use of the Gateway (Guide Appendix 2)
|
||
|
||
QUIT exits from this session
|
||
|
||
|
||
|
||
The following options are available:
|
||
|
||
|
||
|
||
NOTES GUIDE TITLES ERRORS EXAMPLES HELP QUIT
|
||
|
||
Which option do you require? TITLES
|
||
|
||
|
||
|
||
VIEW Vn o>
|
||
|
||
|
||
|
||
If you have any comments, please type them now, terminate with E
|
||
|
||
on a line on its own. Otherwise just type <cr>
|
||
|
||
|
||
|
||
CPU used: 2 ieu, Elapsed: 14 mins, IO: 2380 units, Break: 114
|
||
|
||
Budgets: this period = 32.000 AUs, used = 0.015 AU, left - 29.161 AUs
|
||
|
||
User HELP terminal 2 logged out Wed 18 Jan 1984 17:21:59
|
||
|
||
|
||
|
||
84/04/18. 18.47.00.
|
||
|
||
I.C.C.C. NETWORK OPERATING SYSTEM. NOS 1.1-430.20A
|
||
|
||
USER NUMBER:
|
||
|
||
PASSWORD:
|
||
|
||
IMPROPER LOG IN, TRY AGAIN.
|
||
|
||
USER NUMBER:
|
||
|
||
PASSWORD:
|
||
|
||
|
||
|
||
>SCIENCE AND ENGINEERING RESEARCH COUNCIL
|
||
|
||
|
||
|
||
>RUTHERFORD APPLETON LABORATORY
|
||
|
||
COMPUTING DIVISION
|
||
|
||
>
|
||
|
||
> ThE SERCNET - PSS Gateway
|
||
|
||
|
||
|
||
> User's Guide
|
||
|
||
|
||
|
||
A S Dunn
|
||
|
||
|
||
|
||
>Issue 4 16 February 1983
|
||
|
||
|
||
|
||
|
||
|
||
>Introduction
|
||
|
||
|
||
|
||
** Page 80
|
||
|
||
|
||
|
||
|
||
|
||
Frm 1; Next>
|
||
|
||
The SERCNET-PSS Gateway provides access from SERCNET to PSS and PSS
|
||
|
||
to SERCNET. It functions as a 'straight through' connection between
|
||
|
||
the networks, ie it is protocol transparant. It operates as a
|
||
|
||
Transport Level gateway, in accordance with the 'Yellow book'
|
||
|
||
Transport Service. However the present implementation does not have a
|
||
|
||
full Transport Service. and therefore there are some limitations in
|
||
|
||
the service provided. For X29 which is incompatible with the Yellow
|
||
|
||
book Transport Service. special facilities are provided for the input
|
||
|
||
of user identification and addresses.
|
||
|
||
|
||
|
||
No protocol conversion facilities are provided by the Gateway -
|
||
|
||
protocol conversion facilities (eg X29 - TS29) can be provided by
|
||
|
||
calling through a third party machine (usually on SERCNET).
|
||
|
||
|
||
|
||
The Transport Service addressing has been extended to include
|
||
|
||
authorisation fields, so that users can be billed for any charges
|
||
|
||
they incur.
|
||
|
||
|
||
|
||
The Gateway also provides facilities for users to inspect their
|
||
|
||
accounts and change their passwords, and also a limited HELP
|
||
|
||
facility.
|
||
|
||
|
||
|
||
User Interface
|
||
|
||
|
||
|
||
The interface which the user sees will depend on the local equipment
|
||
|
||
to
|
||
|
||
Frm 2; Next>
|
||
|
||
|
||
|
||
which he is attached. This may be a PAD in which case he will
|
||
|
||
probably be using the X29 protocol, or a HOST (DTE) in which case he
|
||
|
||
might be using FTP for example. The local equipment must have some
|
||
|
||
way of generating a Transport Service Called Address for the Gateway,
|
||
|
||
which also includes an authorisation field - the format of this is
|
||
|
||
described below. The documentation for the local system must
|
||
|
||
therefore be consulted in order to find out how to generate the
|
||
|
||
Transport Service Called Address. Some examples given in Appendix 2.
|
||
|
||
|
||
|
||
A facility is provided for the benefit of users without access to the
|
||
|
||
'Fast Select' facility, eg BT PAD users (but available to all X29
|
||
|
||
terminal users) whereby either a minimal address can be included in
|
||
|
||
the Call User Data Field or an X25 subaddress can be used and the
|
||
|
||
Call User Data Field left absent.
|
||
|
||
|
||
|
||
The authorisation and address can then be entered when prompted by
|
||
|
||
the Gateway.
|
||
|
||
|
||
|
||
|
||
|
||
Unauthorised Use
|
||
|
||
Frm 5: Next>
|
||
|
||
|
||
|
||
No unauthorised use of the Gateway is allowed regardless of whether
|
||
|
||
charges are Incurred at the Gateway or not.
|
||
|
||
|
||
|
||
However, there is an account DEMO (password will be supplied on
|
||
|
||
request) With a small allocation which is available for users to try
|
||
|
||
out the Gateway but it should be noted that excessive use of this
|
||
|
||
account will soon exhaust the allocation thus depriving others of its
|
||
|
||
use.
|
||
|
||
|
||
|
||
Prospective users of the Gateway should first contact User Interface
|
||
|
||
Group In the Computing Division of the Rutherford Appleton
|
||
|
||
Laboratory.
|
||
|
||
|
||
|
||
Addressing
|
||
|
||
|
||
|
||
To connect a call through the Gateway the following information is
|
||
|
||
required in the Transport Service Called Address:
|
||
|
||
|
||
|
||
1) The name of the called network
|
||
|
||
2) Authorisation. consisting of a USERID, PASSWORD and ACCOUNT, and
|
||
|
||
optionally, a reverse charging request
|
||
|
||
3) The address of the target host on the called network
|
||
|
||
|
||
|
||
The format is as follows:
|
||
|
||
|
||
|
||
<netname>(<authorisation>).<host address>
|
||
|
||
|
||
|
||
1) <Netname> is one of the following:
|
||
|
||
|
||
|
||
** Page 81
|
||
|
||
|
||
|
||
SERCNET to connect to the SERC network
|
||
|
||
PSS to connect to PSS
|
||
|
||
S an alias for SERCNET
|
||
|
||
69 another alias for SERCNET
|
||
|
||
|
||
|
||
2) <Authorisation> is a list of positional or keyword
|
||
|
||
parameters or booleans as follows:
|
||
|
||
|
||
|
||
keyword Meaning
|
||
|
||
|
||
|
||
US User identifier
|
||
|
||
PW User's password
|
||
|
||
AC the account - not used at present - talen to be same as US
|
||
|
||
RF 'reply paid' request (see below)
|
||
|
||
R reverse charging indicator (boolean)
|
||
|
||
|
||
|
||
keywords are separated from their values by '='.
|
||
|
||
keyword-value pairs positional parameters and booleans are separated
|
||
|
||
from each other by ','. The whole string is enclosed in parentheses:
|
||
|
||
().
|
||
|
||
|
||
|
||
Examples:
|
||
|
||
|
||
|
||
(FRED.XYZ R)
|
||
|
||
(US=FRED,PW=XYZ,R)
|
||
|
||
(R,PW=XYZ,US=FRED)
|
||
|
||
|
||
|
||
All the above have exactly the same meaning. The first form is the
|
||
|
||
most usual.
|
||
|
||
|
||
|
||
When using positionals, the order is: US,PW,AC,RP,R
|
||
|
||
|
||
|
||
|
||
|
||
3)<Host address> is the address of the machine being called on the
|
||
|
||
target network. It may be a compound address, giving the service
|
||
|
||
within the target machine to be used. It may begin with a mnemonic
|
||
|
||
instead of a full DTE address. A list of current mnemonics for both
|
||
|
||
SERCNET and PSS is given in Appendix 1.
|
||
|
||
|
||
|
||
A restriction of using the Gateway is that where a Transport Service
|
||
|
||
address (service name) is required by the target machine to identify
|
||
|
||
the service to be used, then this must be included explicitly by the
|
||
|
||
user in the Transport Service Called Address, and not assumed from
|
||
|
||
the mnemonic, since the Gateway cannot Inow from the mnemonic. which
|
||
|
||
protocol is being used.
|
||
|
||
|
||
|
||
Examples:
|
||
|
||
|
||
|
||
RLGS.FTP
|
||
|
||
4.FTP
|
||
|
||
|
||
|
||
Both the above would refer to the FTP service on the GEC 'B' machine
|
||
|
||
at Rutherford.
|
||
|
||
|
||
|
||
RLGB alone would in fact connect to the X29 server, since no service
|
||
|
||
name is Frm 7; Next>
|
||
|
||
required for X29.
|
||
|
||
|
||
|
||
In order to enable subaddresses to be entered more easily with PSS
|
||
|
||
addresses, the delimiter '-' can be used to delimit a mnemonic. When
|
||
|
||
the mnemonic is translated to an address the delimiting '-' is
|
||
|
||
deleted so that the following string is combined with the address.
|
||
|
||
Eg:
|
||
|
||
|
||
|
||
SERC-99 is translated to 23422351919199
|
||
|
||
|
||
|
||
Putting the abovementioned three components together, a full
|
||
|
||
Transport Service Called Address might look like:
|
||
|
||
|
||
|
||
S(FRED,XYZ,R).RLGS.FTF
|
||
|
||
|
||
|
||
** Page 82
|
||
|
||
|
||
|
||
Of course a request for reverse charging on SERCNET is meaningless,
|
||
|
||
but not illegal.
|
||
|
||
|
||
|
||
Reply Paid Facility (Omit at first reading)
|
||
|
||
|
||
|
||
In many circumstances it is necessary for temporary authorisation to
|
||
|
||
be passed to a third party. For example, the recipient of network
|
||
|
||
MAIL may not himself be authorised to use the Gateway, and therefore
|
||
|
||
the sender may wish to grant him temporary authorisation in order to
|
||
|
||
reply. With the Job Transfer and maniplulation protocol, there is a
|
||
|
||
requirement to return output documents from jobs which have been
|
||
|
||
executed on a remote site.
|
||
|
||
|
||
|
||
The reply paid facility is involved by including the RP keyword in the
|
||
|
||
authorisation. It can be used either as a boolean or as a
|
||
|
||
keyword-value pair. When used as a boolean, a default value of I is
|
||
|
||
assumed.
|
||
|
||
|
||
|
||
The value of the RP parameter indicates the number of reply paid
|
||
|
||
calls which are to be authorised. All calls which use the reply paid
|
||
|
||
authorisation will be charged to the account of the user who
|
||
|
||
initiated the reply paid authorisation.
|
||
|
||
|
||
|
||
Frm 9; Next:
|
||
|
||
|
||
|
||
The reply paid authorisation parameters are transmitted to the
|
||
|
||
destination address of a call as a temporary user name and password
|
||
|
||
in the Transport Service Calling Address. The temporary user name and
|
||
|
||
password are in a form available for use by automatic systems in
|
||
|
||
setting up a reply to the address which initiated the original call.
|
||
|
||
|
||
|
||
Each time a successful call is completed using the temporary user
|
||
|
||
name and password, the number of reply paid authorisations is reduced
|
||
|
||
by 1, until there are none left, when no further replies are allowed.
|
||
|
||
In addition there is an expiry date of I week, after which the
|
||
|
||
authorisations are cancelled.
|
||
|
||
|
||
|
||
In the event of call failures and error situations, it is important
|
||
|
||
that the effects are clearly defined. In the following definitions,
|
||
|
||
the term 'fail' is used to refer to any call which terminates with
|
||
|
||
either a non-zero clearing cause or diagnostic code or both,
|
||
|
||
regardless of whether data has been communicated or not. The rules
|
||
|
||
are defined as follows:
|
||
|
||
|
||
|
||
1) If a call which has requested reply paid authorisation fails for
|
||
|
||
any reason, then the reply paid authorisation is not set up.
|
||
|
||
|
||
|
||
2) If the Gateway is unable to set up the reply paid authorisation
|
||
|
||
for any reason (eg insufficient space), then the call requesting the
|
||
|
||
authorisation will be refused.
|
||
|
||
|
||
|
||
3) A call which is using reply paid authorisation may not create
|
||
|
||
another reply paid authorisation.
|
||
|
||
|
||
|
||
4) If a call which is using reply paid authorisation fails due to a
|
||
|
||
network error (clearing cause non zero) then the reply paid count is
|
||
|
||
not reduced.
|
||
|
||
|
||
|
||
5) If a call which is using reply paid authorisation fails due to a
|
||
|
||
host clearing (clearing cause zero, diagnostic code non-zero) then
|
||
|
||
the reply paid count is reduced, except where the total number of
|
||
|
||
segments transferred on the call is zero (ie call setup was never
|
||
|
||
completed).
|
||
|
||
|
||
|
||
Frm 11; Next?
|
||
|
||
|
||
|
||
X29 Terminal Protocol
|
||
|
||
|
||
|
||
There is a problem in that X29 is incompatible with the Transport
|
||
|
||
Service. For this reason, it is possible that some PAD
|
||
|
||
implementations will be unable to generate the Transport Service
|
||
|
||
Called Address. Also some PAD's, eg the British Telecom PAD, may be
|
||
|
||
unable to generate Fast Select calls - this means that the Call User
|
||
|
||
Data Field is only 12 bytes long - insufficient to hold the Transport
|
||
|
||
Service Address.
|
||
|
||
|
||
|
||
If a PAD is able to insert a text string into the Call User Data Field
|
||
|
||
beginning at the fifth byte, but is restricted to 12 characters
|
||
|
||
because of inability to generate Fast Select calls, then a partial
|
||
|
||
address can be included consisting of either the network name being
|
||
|
||
called, or the network name plus authorisation.
|
||
|
||
|
||
|
||
** Page 83
|
||
|
||
|
||
|
||
The first character is treated as a delimiter, and should be entered
|
||
|
||
as the character '7'. This is followed by the name of the called
|
||
|
||
network - SERCNET.
|
||
|
||
|
||
|
||
Alternatively, if the PAD is incapable of generating a Call User Data
|
||
|
||
Field, then the network name can be entered as an X25 subaddress. The
|
||
|
||
mechanism employed by the Gateway is to transcribe the X25 subaddress
|
||
|
||
to the beginning of the Transport Service Called Address, converting
|
||
|
||
the digits of the subaddress into ASCII characters in the process.
|
||
|
||
Note that this means only SERCNET can be called with this method at
|
||
|
||
present by using subaddress 69.
|
||
|
||
|
||
|
||
The response from the Gateway will be the following message:
|
||
|
||
|
||
|
||
Please enter your authorisation and address required in form:
|
||
|
||
(user,password).address
|
||
|
||
|
||
|
||
Reply with the appropriate response eg:
|
||
|
||
|
||
|
||
(FRED,XYZ).RLGB
|
||
|
||
|
||
|
||
There is a timeout of between 3 and 4 minutes for this response.
|
||
|
||
after which the call will be cleared. There is no limit to the number
|
||
|
||
of attempts which may be made within this time limit - if the
|
||
|
||
authorisation or address entered is invalid, the Gateway will request
|
||
|
||
it again. To abandon the attempt. the call should be cleared from the
|
||
|
||
local PAD.
|
||
|
||
|
||
|
||
A restriction of this method of use of the Gateway is that a call
|
||
|
||
must be correctly authorised by the Gateway before charging can
|
||
|
||
begin, thus reverse charge calls from PSS which do not contain
|
||
|
||
authorisation in the Call Request packet will be refused. However it
|
||
|
||
is possible to include the authorisation but not the address in the
|
||
|
||
Call Request packet. The authorisation must then be entered again
|
||
|
||
together with the address when requested by the Gateway.
|
||
|
||
|
||
|
||
The above also applies when using a subaddress to identify the called
|
||
|
||
network. In this case the Call User Data Field will contain only the
|
||
|
||
authorisation in parentheses (preceded by the delimiter '@')
|
||
|
||
|
||
|
||
- 5 -
|
||
|
||
|
||
|
||
Due to the lack of a Transport Service ACCEPT primitive in X29 it will be
|
||
|
||
found, on some PADs, that a 'call connected' message will appear on the
|
||
|
||
terminal as soon as the call has been connected to the Gateway. The 'call
|
||
|
||
connected' message should not be taken to imply that contact has been made
|
||
|
||
With the ultimate destination. The Gateway will output a message 'Call
|
||
|
||
connected to remote address' when the connection has been established.
|
||
|
||
|
||
|
||
Frm 14; Next
|
||
|
||
|
||
|
||
ITP Terminal Protocol
|
||
|
||
|
||
|
||
The terminal protocol ITP is used extensively on SERCNET and some
|
||
|
||
hosts support only this terminal protocol. Thus it will not be
|
||
|
||
possible to make calls directly between these hosts on SERCNET and
|
||
|
||
addresses on PSS which support only X29 or TS29. In these cases it
|
||
|
||
will be necessary to go through an intermediate machine on SERCNET
|
||
|
||
which supports both x29 and ITP or TS29 and ITP, such as a GEC ITP.
|
||
|
||
This is done by first making a call to the GEC MUM, and then making
|
||
|
||
an outgoing call from there to the desired destination.
|
||
|
||
|
||
|
||
PTS29 Terminal Protocol
|
||
|
||
|
||
|
||
This is the ideal protocol to use through the Gateway. since there
|
||
|
||
should be no problem about entering the Transport Service address.
|
||
|
||
However, it is divisable first to ascertain that the machine to be
|
||
|
||
called will support
|
||
|
||
|
||
|
||
When using this protocol, the service name of the TS29 server should be
|
||
|
||
entered explicitly, eg:
|
||
|
||
|
||
|
||
** Page 84
|
||
|
||
|
||
|
||
S(FRED,XYZ).RLGB.TS29
|
||
|
||
|
||
|
||
Restrictions
|
||
|
||
|
||
|
||
Due to the present lack of a full Transport Service in the Gateway,
|
||
|
||
some primitives are not fully supported.
|
||
|
||
|
||
|
||
In particular, the ADRESS, DISCONNECT and RESET primitives are not
|
||
|
||
fully supported. Howerver this should not present serious problems,
|
||
|
||
since the ADDRESS and REASET primitives are not widely used, and the
|
||
|
||
DISCONNECT primitive can be carried in a Clear Request packet.
|
||
|
||
|
||
|
||
IPSS
|
||
|
||
Access to IPSS is through PSS. Just enter the IPSS address in place
|
||
|
||
of the PSS address.
|
||
|
||
|
||
|
||
................ and on and on for 17 pages
|
||
|
||
|
||
|
||
** Page 85
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 8
|
||
|
||
|
||
|
||
|
||
|
||
Viewdata Systems
|
||
|
||
|
||
|
||
Viewdata, or videotex, has had a curious history. At one stage, in
|
||
|
||
the late 1970s, it was possible to believe that it was about to take
|
||
|
||
over the world, giving computer power to the masses via their
|
||
|
||
domestic tv sets. It was revolutionary in the time it was developed,
|
||
|
||
around 1975, in research laboratories owned by what was then called
|
||
|
||
the Post Office, but which is now British Telecom. It had a
|
||
|
||
colour-and-graphics display, a user-friendly means of talking to it
|
||
|
||
at a time when most computers needed precise grunts to make them
|
||
|
||
work, and the ordinary layperson could learn how to use it in five
|
||
|
||
minutes.
|
||
|
||
|
||
|
||
The viewdata revolution never happened, because Prestel, its most
|
||
|
||
public incarnation, was mismarketed by its owners, British Telecom,
|
||
|
||
and because, in its original version, it is simply too clumsy and
|
||
|
||
limited to handle more sophisticated applications. All information is
|
||
|
||
held on electronic file cards which can easily be either too big or
|
||
|
||
too small for a particular answer and the only way you can obtain the
|
||
|
||
desired information is by keying numbers, trundling down endless
|
||
|
||
indices. In the early days of Prestel, most of what you got was
|
||
|
||
indices, not substantive information. By the time that viewdata sets
|
||
|
||
were supposed to exist in their hundreds of thousands, home
|
||
|
||
computers, which had not been predicted at all when viewdata first
|
||
|
||
appeared, had already sold into the millionth British home.
|
||
|
||
|
||
|
||
Yet private viewdata, mini-computers configured to look like
|
||
|
||
Prestel and to use the same special terminals, has been a modest
|
||
|
||
success. At the time of writing there are between 120 and 150
|
||
|
||
significant installations. They have been set up partly to serve the
|
||
|
||
needs of individual companies, but also to help particular trades,
|
||
|
||
industries and professions. The falling cost of viewdata terminals
|
||
|
||
has made private systems attractive to the travel trade, to retail
|
||
|
||
stores, the motor trade, to some local authorities and to the
|
||
|
||
financial world.
|
||
|
||
|
||
|
||
** Page 86
|
||
|
||
|
||
|
||
The hacker, armed with a dumb viewdata set, or with a software
|
||
|
||
fix for his micro, can go ahead and explore these services. At the
|
||
|
||
beginning of this book, I said my first hack was of a viewdata
|
||
|
||
service. Viditel, the Dutch system. It is astonishing how many
|
||
|
||
British hackers have had a similar experience. Indeed, the habit of
|
||
|
||
viewdata hacking has spread throughout Europe also: the wonder- fully
|
||
|
||
named Chaos Computer Club of Hamburg had some well-publicised fun
|
||
|
||
with Bildschirmtext, the West German Prestel equivalent
|
||
|
||
colloquially-named Btx.
|
||
|
||
|
||
|
||
What they appear to have done was to acquire the password of the
|
||
|
||
Hamburger Sparkasse, the country's biggest savings bank group.
|
||
|
||
Whereas telebanking is a relatively modest part of Prestel --the
|
||
|
||
service is called Homelink--the West German banks have been a
|
||
|
||
powerful presence on Btx since its earliest days. In fact, another
|
||
|
||
Hamburg bank, the Verbraucher Bank, was responsible for the world's
|
||
|
||
first viewdata Gateway, for once in this technology, showing the
|
||
|
||
British the way. The 25-member Computer Chaos Club probably acquired
|
||
|
||
the password as a result of the carelessness of a bank employee.
|
||
|
||
Having done so, they set about accessing the bank's own, rather high
|
||
|
||
priced, pages, some of which cost almost DM10 (<28>2.70). In a
|
||
|
||
deliberate demonstration, the Club then set a computer to
|
||
|
||
systematically call the pages over and over again, achieving a
|
||
|
||
re-access rate of one page every 20 seconds. During a weekend in
|
||
|
||
mid-November 1984, they made more than 13,000 accesses and ran up a
|
||
|
||
notional bill of DM135,000 (<28>36,000). Information Providers, of
|
||
|
||
course, are not charged for looking at their own pages, so no bill
|
||
|
||
was payable and the real cost of the hack was embarrassment.
|
||
|
||
|
||
|
||
In hacking terms, the Hamburg hack was relatively trivial-- simple
|
||
|
||
password acquisition. Much more sophisticated hacks have been
|
||
|
||
perpertrated by British enthusiasts.
|
||
|
||
|
||
|
||
Viewdata hacking has three aspects: to break into systems and become
|
||
|
||
user, editor or system manager thereof; to discover hidden parts of
|
||
|
||
systems to which you have been legitimately admitted, and to uncover
|
||
|
||
new services.
|
||
|
||
|
||
|
||
|
||
|
||
Viewdata software structures
|
||
|
||
|
||
|
||
An understanding of how a viewdata database is set up is a great
|
||
|
||
aid in learning to discover what might be hidden away. Remember,
|
||
|
||
there are always two ways to each page--by following the internal
|
||
|
||
indexes, or by direct keying using *nnn#. In typical viewdata
|
||
|
||
software, each electronic file card or 'page' exists on an overall
|
||
|
||
tree-like structure:
|
||
|
||
|
||
|
||
** Page 87
|
||
|
||
|
||
|
||
Page
|
||
|
||
0
|
||
|
||
|
|
||
|
||
---------------------+----------------------- ...
|
||
|
||
1 2 3 4 5 6 7 8
|
||
|
||
|
|
||
|
||
------------+-------------------------------- ...
|
||
|
||
31 32 33 34 35 36 37 38
|
||
|
||
|
|
||
|
||
------------------------+-------------------- ...
|
||
|
||
351 352 353 354 355 356 357 358 3-digit
|
||
|
||
| node
|
||
|
||
-------------+------------------------------- ...
|
||
|
||
3531 3532 3533 3534 3535 3536 3537 3538
|
||
|
||
|
|
||
|
||
-------------------------------------------+-- ...
|
||
|
||
|
||
|
||
Top pages are called parents; lower pages filials. Thus page 3538
|
||
|
||
needs parent pages 353, 35, 3 and 0 to support it, i.e. these pages
|
||
|
||
must exist on the system. On Prestel, the parents owned by
|
||
|
||
Information Providers (the electronic publishers) are 3 digits long
|
||
|
||
(3-digit nodes). Single and double-digit pages (0 to 99) are owned by
|
||
|
||
the 'system manager' (and so are any pages beginning with the
|
||
|
||
sequences 100nn-199nn and any beginning with a 9nnn). When a page is
|
||
|
||
set up by an Information Provider (the process of going into 'edit'
|
||
|
||
mode varies from software package to package; on Prestel, you call up
|
||
|
||
page 910) two processes are necessary--the overt page (i.e. the
|
||
|
||
display the user sees) must be written using a screen editor. Then
|
||
|
||
the IP must select a series of options--e.g. whether the page is for
|
||
|
||
gathering a response from the user or is just to furnish information;
|
||
|
||
whether the page is to be open for viewing by all, by a Closed User
|
||
|
||
Group, or just by the IP (this facility is used while a large
|
||
|
||
database is being written and so that users don't access part of it
|
||
|
||
by mistake); the price (if any) the page will bear--and the 'routing
|
||
|
||
instructions'. When you look at a viewdata page and it says 'Key 8
|
||
|
||
for more information on ABC', it is the routing table that is
|
||
|
||
constructed during edit that tells the viewdata computer: 'If a user
|
||
|
||
on this page keys 8, take him through to the following next page'.
|
||
|
||
Thus, page 353880 may say 'More information on ABC....KEY 8'. The
|
||
|
||
information on ABC is actually held on page 3537891. The routing
|
||
|
||
table on page 353880 will say: 8=3537891. In this example, you will
|
||
|
||
see that 3537891 i9 not a true filial of 353880--this does not
|
||
|
||
matter; however, in order for 3537891 to exist on the system, its
|
||
|
||
parents must exist, i.e. there must be pages 353789, 35378, 3537
|
||
|
||
etc.
|
||
|
||
|
||
|
||
** Page 88
|
||
|
||
|
||
|
||
P R E S T E L
|
||
|
||
PRESTEL EDITING SYSTEM
|
||
|
||
Input Details -
|
||
|
||
|
||
|
||
|
||
|
||
Update option o
|
||
|
||
|
||
|
||
Pageno 4190100 Frame-Id a
|
||
|
||
|
||
|
||
User CUG User access y
|
||
|
||
|
||
|
||
Frame type i Frame price 2p
|
||
|
||
|
||
|
||
Choice type s
|
||
|
||
|
||
|
||
Choices
|
||
|
||
0- * 1- 4196121
|
||
|
||
2- 4196118 3- 4196120
|
||
|
||
4- 4196112 5- 4196119
|
||
|
||
6- 4196110 7- *
|
||
|
||
8- 4190101 9- 4199
|
||
|
||
|
||
|
||
Prestel Editing. This is the 'choices' page which se s up the frame
|
||
|
||
before the overt page - the one the user sees - is prepared.
|
||
|
||
|
||
|
||
These quirky features of viewdata software can help the hacker
|
||
|
||
search out hidden databases:
|
||
|
||
|
||
|
||
* Using a published directory, you can draw up a list of 'nodes' and
|
||
|
||
who occupies them. You can then list out apparently 'unoccupied'
|
||
|
||
nodes and see if they contain anything interesting. It was when a
|
||
|
||
hacker spotted that an 'obvious' Prestel node, 456, had been unused
|
||
|
||
for a while, that news first got out early in 1984 about the Prestel
|
||
|
||
Micro computing service, several weeks ahead of the official
|
||
|
||
announcement.
|
||
|
||
|
||
|
||
* If you look at the front page of a service, you can follow the
|
||
|
||
routings of the main index--are all the obvious immediate filials
|
||
|
||
used? If not, can you get at them by direct keying?
|
||
|
||
|
||
|
||
** Page 89
|
||
|
||
|
||
|
||
* Do any services start lower down a tree than you might expect
|
||
|
||
(i.e. more digits in a page number than you might have thought)? In
|
||
|
||
that case, try accessing the parents and see what happens.
|
||
|
||
|
||
|
||
* Remember that you can get a message 'no such page' for two
|
||
|
||
reasons: because the page really doesn't exist, or because the
|
||
|
||
Information Provider has put it on 'no user access'. In the latter
|
||
|
||
case, check to see whether this has been done consistently--look at
|
||
|
||
the immediate possible filials. To go back to when Prestel launched
|
||
|
||
its Prestel Microcom- puting service, using page 456 as a main node,
|
||
|
||
456 itself was closed off until the formal opening, but page 45600
|
||
|
||
was open.
|
||
|
||
|
||
|
||
|
||
|
||
Prestel Special Features
|
||
|
||
|
||
|
||
In general, this book has avoided giving specific hints about
|
||
|
||
individual services, but Prestel is so widely available in the UK and
|
||
|
||
so extensive in its coverage that a few generalised notes seem
|
||
|
||
worthwhile.
|
||
|
||
|
||
|
||
Not all Prestel's databases may be found via the main index or in
|
||
|
||
the printed directories; even some that are on open access are
|
||
|
||
unadvertised. Of particular interest over the last few years have
|
||
|
||
been nodes 640 (owned by the Research and Development team at
|
||
|
||
Martlesham), 651 (Scratchpad--used for ad hoc demonstration
|
||
|
||
databases), 601 (mostly mailbox facilities but also known to carry
|
||
|
||
experimental advanced features so that they can be tried out), and
|
||
|
||
650 (News for Information Providers--mostly but not exclusively in a
|
||
|
||
Closed User Group). Occasionally equipment manufacturers offer
|
||
|
||
experimental services as well: I have found high-res graphics and
|
||
|
||
even instruction codes for digitised full video lurking around.
|
||
|
||
|
||
|
||
In theory, what you find on one Prestel computer you will find on
|
||
|
||
all the others. In practice this has never been true, as it has
|
||
|
||
always been possible to edit individually on each computer, as well
|
||
|
||
as on the main updating machine which is supposed to broadcast to all
|
||
|
||
the others. The differences in what is held in each machine will
|
||
|
||
become greater over time.
|
||
|
||
|
||
|
||
Gateway is a means of linking non-viewdata external computers to
|
||
|
||
the Prestel system. It enables on-screen buying and booking, complete
|
||
|
||
with validation and confirmation. It even permits telebanking, Most
|
||
|
||
'live' forms of gateway are very secure, with several layers of
|
||
|
||
password and security. However, gateways require testing before they
|
||
|
||
can be offered to the public; in the past, hackers have been able to
|
||
|
||
secure free rides out of Prestel....
|
||
|
||
|
||
|
||
** Page 90
|
||
|
||
|
||
|
||
Careful second-guessing of the routings on the databases including
|
||
|
||
telesoftware(*) have given users free programs while the
|
||
|
||
telesoftware(*) was still being tested and before actual public
|
||
|
||
release.
|
||
|
||
|
||
|
||
Prestel, as far as the ordinary user is concerned, is a very
|
||
|
||
secure system--it uses 14-digit passwords and disconnects after three
|
||
|
||
unsuccessful tries. For most purposes, the only way of hacking into
|
||
|
||
Prestel is to acquire a legitimate user's password, perhaps because
|
||
|
||
they have copied it down and left it prominently displayed. Most
|
||
|
||
commercial viewdata sets allow the owner to store the first ten
|
||
|
||
digits in the set (some even permit the full 14), thus making the
|
||
|
||
casual hacker's task easier. However, Prestel was sensationally
|
||
|
||
hacked at the end of October 1984, the whole system Iying at the feet
|
||
|
||
of a team of four West London hackers for just long enough to
|
||
|
||
demonstrate the extent of their skill to the press. Their success was
|
||
|
||
the result of persistence and good luck on their side and poor
|
||
|
||
security and bad luck on the part of BT. As always happens with
|
||
|
||
hacking activities that do not end up in court, some of the details
|
||
|
||
are disputed; there are also grounds for believing that news of the
|
||
|
||
hack was deliberately held back until remedial action had taken
|
||
|
||
place, but this is the version I believe:
|
||
|
||
|
||
|
||
|
||
|
||
The public Prestel service consists of a network of computers,
|
||
|
||
mostly for access by ordinary users, but with two special-purpose
|
||
|
||
machines, Duke for IPs to update their information into and Pandora,
|
||
|
||
to handle Mailboxes (Prestel's variant on electronic mail). The
|
||
|
||
computers are linked by non-public packet-switched lines. Ordinary
|
||
|
||
Prestel users are registered (usually) onto two or three computers
|
||
|
||
local to them which they can access with the simple three-digit
|
||
|
||
telephone number 618 or 918. In most parts of the UK, these two
|
||
|
||
numbers will return a Prestel whistle. (BT Prestel have installed a
|
||
|
||
large number of local telephone nodes and
|
||
|
||
|
||
|
||
(*)Tefesoftware is a technique for making regular computer programs
|
||
|
||
available via viewdata the program lines are compressed according to
|
||
|
||
a simple set of rules and set up on a senes of viewdata frames. Each
|
||
|
||
frame contains a modest error-checking code. To receive a program,
|
||
|
||
the user's computer, under the control of a 'download' routine calls
|
||
|
||
the first program page down from the viewdata host, runs the error
|
||
|
||
check on it, and demands a re transmission if the check gives a
|
||
|
||
'false' If it gives a 'true', the user's machine unsqueezes the
|
||
|
||
programmes and dumps them into the Computers main memory or disc
|
||
|
||
store. It then requests the next viewdata page unfil the whole
|
||
|
||
program is collected. You then have a text file which must be
|
||
|
||
Converted into program instructions. Depending on what model of
|
||
|
||
micro you have, and which telesoftware package, you can either run
|
||
|
||
the program immediately or expect it. Personally I found the
|
||
|
||
telesoftware experience interesting the first time I tried it, and
|
||
|
||
quite useless in terms of speed, reliability and quality afterwards.
|
||
|
||
|
||
|
||
** Page 91
|
||
|
||
|
||
|
||
leased lines to transport users to their nearest machine at local
|
||
|
||
call rates, even though in some cases that machine may be 200 miles
|
||
|
||
away). Every Prestel machine also has several regular phone numbers
|
||
|
||
associated with it, for IPs and engineers. Most of these numbers
|
||
|
||
confer no extra privileges on callers: if you are registered to a
|
||
|
||
particular computer and get in via a 'back-door' phone number you
|
||
|
||
will pay Prestel and IPs exactly the same as if you had dialled 618
|
||
|
||
or 918. If you are not registered, you will be thrown off after three
|
||
|
||
tries.
|
||
|
||
|
||
|
||
In addition to the public Prestel computers there are a number of
|
||
|
||
other BT machines, not on the network, which look like Prestel and
|
||
|
||
indeed carry versions of the Prestel database. These machines, left
|
||
|
||
over from an earlier stage of Prestel's development, are now used for
|
||
|
||
testing and development of new Prestel features. The old Hogarth
|
||
|
||
computer, originally used for international access, is now called
|
||
|
||
'Gateway Test' and, as its name implies, is used by IPs to try out
|
||
|
||
the interconnections of their computers with those of Prestel prior
|
||
|
||
to public release. It is not clear how the hackers first became aware
|
||
|
||
of the existence of these 'extra' machines; one version is that it
|
||
|
||
was through the acquisition of a private phone book belonging to a BT
|
||
|
||
engineer. Another version suggests that they tried 'obvious' log-in
|
||
|
||
pass-numbers--2222222222 1234--on a public Prestel computer and found
|
||
|
||
themselves inside a BT internal Closed User Group which contained
|
||
|
||
lists of phone numbers for the develop computers. The existence of at
|
||
|
||
least two stories suggests that the hackers wished to protect their
|
||
|
||
actual sources. In fact, some of the phone numbers had, to my certain
|
||
|
||
knowledge, appeared previously on bulletin boards.
|
||
|
||
|
||
|
||
At this first stage, the hackers had no passwords; they could
|
||
|
||
simply call up the log-in page. Not being registered on that
|
||
|
||
computer, they were given the usual three tries before the line was
|
||
|
||
disconnected.
|
||
|
||
|
||
|
||
For a while, the existence of these log-in pages was a matter of
|
||
|
||
mild curiosity. Then, one day, in the last week of October, one of
|
||
|
||
the log-in pages looked different: it contained what appeared to be a
|
||
|
||
valid password, and one with system manager status, no less. A
|
||
|
||
satisfactory explanation for the appearance of this password
|
||
|
||
imprinted on a log-in page has not so far been forthcoming. Perhaps
|
||
|
||
it was carelessness on the part of a BT engineer who thought that, as
|
||
|
||
the phone number was unlisted, no unauthorised individual would ever
|
||
|
||
see it. The pass-number was tried and admission secured.
|
||
|
||
|
||
|
||
** Page 92
|
||
|
||
|
||
|
||
After a short period of exploration of the database, which
|
||
|
||
appeared to be a 'snapshot' of Prestel rather than a live version of
|
||
|
||
it--thus showing that particular computer was not receiving constant
|
||
|
||
updates from Duke--the hackers decided to explore the benefits of
|
||
|
||
System Manager status. Since they had between them some freelance
|
||
|
||
experience of editing on Prestel, they knew that all Prestel special
|
||
|
||
features pages are in the *9nn# range: 910 for editing; 920 to change
|
||
|
||
personal passwords; 930 for mailbox messages and so ...what would
|
||
|
||
pages 940, 950, 960 and so on do? It became obvious that these pages
|
||
|
||
would reveal details of users together with account numbers
|
||
|
||
(systelnos), passwords and personal passwords. There were facilities
|
||
|
||
to register and deregister users.
|
||
|
||
|
||
|
||
However, all this was taking place on a non-public computer. Would
|
||
|
||
the same passwords on a 'live' Prestel machine give the same
|
||
|
||
benefits? Amazingly enough, the passwords gave access to every
|
||
|
||
computer on the Prestel network. It was now time to examine the user
|
||
|
||
registration details of real users as opposed to the BT employees who
|
||
|
||
were on the development machine. The hackers were able to assume any
|
||
|
||
personality they wished and could thus enter any Closed User Group,
|
||
|
||
simply by picking the right name. Among the CUG services they swooped
|
||
|
||
into were high-priced ones providing investment advice for clients of
|
||
|
||
the stockbroker Hoare Govett and commentary on international currency
|
||
|
||
markets supplied by correspondents of the Financial Times. They were
|
||
|
||
also able to penetrate Homelink, the telebanking service run by the
|
||
|
||
Nottingham Building Society. They were not able to divert sums of
|
||
|
||
money, however, as Homelink uses a series of security checks which
|
||
|
||
are independent of the Prestel system.
|
||
|
||
|
||
|
||
Another benefit of being able to become whom they wished was the
|
||
|
||
ability to read Prestel Mailboxes, both messages in transit that had
|
||
|
||
not yet been picked up by the intended recipient and those that had
|
||
|
||
been stored on the system once they had been read. Among the
|
||
|
||
Mailboxes read was the one belonging to Prince Philip. Later, with a
|
||
|
||
newspaper reporter as witness, one hacker sent a Mailbox, allegedly
|
||
|
||
from Prince Philip to the Prestel System Manager:
|
||
|
||
|
||
|
||
I do so enjoy puzzles and games. Ta ta. Pip! Pip!
|
||
|
||
|
||
|
||
H R H Hacker
|
||
|
||
|
||
|
||
Newspaper reports also claimed that the hackers were able to gain
|
||
|
||
editing passwords belonging to IPs, enabling them to alter pages and
|
||
|
||
indeed the Daily Mail of November 2nd carried a photograph of a
|
||
|
||
Prestel page from the Financial Times International Financial Alert
|
||
|
||
saying:
|
||
|
||
|
||
|
||
** Page 93
|
||
|
||
|
||
|
||
FT NEWSFLASH!!! 1 EQUALS $50
|
||
|
||
|
||
|
||
The FT maintained that, whatever might theoretically have been
|
||
|
||
possible, in fact they had no record of their pages actually being so
|
||
|
||
altered and hazarded the suggestion that the hacker, having broken
|
||
|
||
into their CUG and accessed the page, had 'fetched it back' onto his
|
||
|
||
own micro and then edited there, long enough for the Mail's
|
||
|
||
photographer to snap it for his paper, but without actually
|
||
|
||
retransmitting the false page back to Prestel. As with so many other
|
||
|
||
hacking incidents, the full truth will never be known because no one
|
||
|
||
involved has any interest in its being told.
|
||
|
||
|
||
|
||
However, it is beyond doubt that the incident was regarded with the
|
||
|
||
utmost seriousness by Prestel itself. They were convinced of the
|
||
|
||
extent of the breach when asked to view page 1, the main index page,
|
||
|
||
which bore the deliberate mis-spelling: Idnex. Such a change
|
||
|
||
theoretically could only have been made by a Prestel employee with
|
||
|
||
the highest internal security clearance. Within 30 minutes, the
|
||
|
||
system manager password had been changed on all computers, public and
|
||
|
||
research. All 50,000 Prestel users signing on immediately after
|
||
|
||
November 2nd were told to change their personal password without
|
||
|
||
delay on every computer to which they were registered. And every IP
|
||
|
||
received, by Special Delivery, a complete set of new user and editing
|
||
|
||
passwords.
|
||
|
||
|
||
|
||
Three weeks after the story broke, the Daily Mail thought it had
|
||
|
||
found yet another Prestel hack and ran the following page 1 headline:
|
||
|
||
'Royal codebuster spies in new raid on Prestel', a wondrous
|
||
|
||
collection of headline writer's buzzwords to capture the attention of
|
||
|
||
the sleepy reader. This time an Information Provider was claiming
|
||
|
||
that, even after new passwords had been distributed, further security
|
||
|
||
breaches had occurred and that there was a 'mole' within Prestel
|
||
|
||
itself. That evening, Independent Television News ran a feature much
|
||
|
||
enjoyed by cognoscenti: although the story was about the Prestel
|
||
|
||
service, half the film footage used to illustrate it was wrong: they
|
||
|
||
showed pictures of the Oracle (teletext) editing facility and of
|
||
|
||
some-one using a keypad that could only have belonged to a TOPIC set,
|
||
|
||
as used for the Stock Exchange's private service. Finally, the name
|
||
|
||
of the expert pulled in for interview was mis-spelled although he was
|
||
|
||
a well-known author of micro books. The following day, BBC-tv's
|
||
|
||
breakfast show ran an item on the impossibility of keeping Prestel
|
||
|
||
secure, also full of ludicrous inaccuracies.
|
||
|
||
|
||
|
||
** Page 94
|
||
|
||
|
||
|
||
It was the beginning of a period during which hackers and hacking
|
||
|
||
attracted considerable press interest. No news service operating in
|
||
|
||
the last two months of 1984 felt it was doing an effective job if it
|
||
|
||
couldn't feature its own Hacker's Confession, suitably filmed in deep
|
||
|
||
shadow. As happens now and again, press enthusiasm for a story ran
|
||
|
||
ahead of the ability to check for accuracy and a number of Hacks That
|
||
|
||
Never Were were reported and, in due course, solemnly commented on.
|
||
|
||
|
||
|
||
BT had taken much punishment for the real hack--as well as causing
|
||
|
||
deep depression among Prestel staff, the whole incident had occurred
|
||
|
||
at the very point when the corporation was being privatised and
|
||
|
||
shares being offered for sale to the public--and to suffer an
|
||
|
||
unwarranted accusation of further lapses in security was just more
|
||
|
||
than they could bear. It is unlikely that penetration of Prestel to
|
||
|
||
that extent will ever happen again, though where hacking is
|
||
|
||
concerned, nothing is impossible.
|
||
|
||
|
||
|
||
There is one, relatively uncommented-upon vulnerability in the
|
||
|
||
present Prestel set-up: the information on Prestel is most easily
|
||
|
||
altered via the bulk update protocols used by Information Providers,
|
||
|
||
where there is a remarkable lack of security. All the system
|
||
|
||
presently requires is a 4-character editing password and the IP's
|
||
|
||
systel number, which is usually the same as his mailbox number
|
||
|
||
(obtainable from the on-system mailbox directory on page *7#) which
|
||
|
||
in turn is very likely to be derived from a phone number.
|
||
|
||
|
||
|
||
|
||
|
||
Other viewdata services
|
||
|
||
|
||
|
||
Large numbers of other viewdata services exist: in addition to the
|
||
|
||
Stock Exchange's TOPIC and the other viewdata based services
|
||
|
||
mentioned in chapter 4, the travel trade has really clutched the
|
||
|
||
technology to its bosom: the typical High Street agent not only
|
||
|
||
accesses Prestel but several other services which give up-to-date
|
||
|
||
information on the take-up of holidays, announce price changes and
|
||
|
||
allow confirmed air-line and holiday bookings.
|
||
|
||
|
||
|
||
Several of the UK's biggest car manufacturers have a stock locator
|
||
|
||
system for their dealers: if you want a British Leyland model with a
|
||
|
||
specific range of accessories and in the colour combinations of your
|
||
|
||
choice, the chances are that your local dealer will not have it
|
||
|
||
stock. He can, however, use the stock locator to tell him with which
|
||
|
||
other dealer such a machine may be found.
|
||
|
||
|
||
|
||
Stock control and management information is used by retail chains
|
||
|
||
using, in the main, a package developed by a subsidiary of Debenhams.
|
||
|
||
Debenhams had been early enthusiasts of Prestel in the days when it
|
||
|
||
was still being pitched at a mass consumer audience--its service was
|
||
|
||
called Debtel which wags suggested was for people who owed money or,
|
||
|
||
alternatively, for upper-class young ladies.
|
||
|
||
|
||
|
||
** Page 95
|
||
|
||
|
||
|
||
Later it formed DISC to link together its retail outlets, and this
|
||
|
||
was hacked in 1983. The store denied that anything much had
|
||
|
||
happened, but the hacker appeared (in shadow) on a tv program
|
||
|
||
together with a quite convincing demonstration of his control over
|
||
|
||
the system.
|
||
|
||
|
||
|
||
Audience research data is despatched in viewdata mode to
|
||
|
||
advertising agencies and broadcasting stations by AGB market
|
||
|
||
research. There are even alternate viewdata networks rivalling that
|
||
|
||
owned by Prestel, the most important of which is, at the time of
|
||
|
||
writing, the one owned by Istel and headquartered at Redditch in the
|
||
|
||
Midlands. This network transports several different trade and
|
||
|
||
professional services as well as the internal data of British
|
||
|
||
Leyland, of whom Istel is a subsidiary.
|
||
|
||
|
||
|
||
A viewdata front-end processor is a minicomputer package which
|
||
|
||
sits between a conventionally-structured database and its ports which
|
||
|
||
look into the phone-lines. Its purpose is to allow users with
|
||
|
||
viewdata sets to search the main database without the need to
|
||
|
||
purchase an additional conventional dumb terminal. Some view- data
|
||
|
||
front-end processors (FEPs) expect the user to have a full alphabetic
|
||
|
||
keyboard, and merely transform the data into viewdata pages 40
|
||
|
||
characters by 24 lines in the usual colours. More sophisticated FEPs
|
||
|
||
go further and allow users with only numeric keypads to retrieve
|
||
|
||
information as well. By using FEPs a database publisher or system
|
||
|
||
provider can reach a larger population of users. FEPs have been known
|
||
|
||
to have a lower standard of security protection than the conventional
|
||
|
||
systems to which they were attached.
|
||
|
||
|
||
|
||
|
||
|
||
Viewdata standards
|
||
|
||
|
||
|
||
The UK viewdata standard--the particular graphics set and method
|
||
|
||
of transmitting frames -- is adopted in many other European countries
|
||
|
||
and in former UK imperial possessions. Numbers and passwords to
|
||
|
||
access these services occasionally appear on bulletin boards and the
|
||
|
||
systems are particularly interesting to enter while they are still on
|
||
|
||
trial. As a result of a quirk of Austrian law, anyone can
|
||
|
||
legitimately enter their service without a password; though one is
|
||
|
||
needed if you are to extract valuable information. However, important
|
||
|
||
variants to the UK standards exist: the French (inevitably) have a
|
||
|
||
system that is remarkably similar in outline but incompatible.
|
||
|
||
|
||
|
||
** Page 96
|
||
|
||
|
||
|
||
In North America, the emerging standard which was originally put
|
||
|
||
together by the Canadians for their Telidon service but which has
|
||
|
||
now, with modifications, been promoted by Ma Bell, has high
|
||
|
||
resolution graphics because, instead of building up images from block
|
||
|
||
graphics, it uses picture description techniques (eg draw line, draw
|
||
|
||
arc, fill-in etc) of the sort relatively familiar to most users of
|
||
|
||
modern home micros. Implementations of NALPS (as the US standard is
|
||
|
||
called) are available for the IBM PC.
|
||
|
||
|
||
|
||
The Finnish public service uses software which can handle nearly
|
||
|
||
all viewdata formats, including a near-photographic mode.
|
||
|
||
|
||
|
||
Software similar to that used in the Finnish public service can be
|
||
|
||
found on some private systems. Countries vary considerably in their
|
||
|
||
use of viewdata technology: the German and Dutch systems consist
|
||
|
||
almost entirely of gateways to third-party computers; the French
|
||
|
||
originally cost-justified their system by linking it to a massive
|
||
|
||
project to make all telephone directories open to electronic enquiry,
|
||
|
||
thus saving the cost of printed versions. French viewdata terminals
|
||
|
||
thus have full alpha-keyboards instead of the numbers-only versions
|
||
|
||
common in other countries. For the French, the telephone directory is
|
||
|
||
central and all other information peripheral. Teletel/Antiope, as the
|
||
|
||
service is called, suffered its first serious hack late in 1984 when
|
||
|
||
a journalist on the political/satirical weekly Le Canard Finchaine
|
||
|
||
claimed to have penetrated the Atomic Energy Commission's computer
|
||
|
||
files accessible via Teletel and uncovered details of laser projects,
|
||
|
||
nuclear tests in the South Pacific and an experimental nuclear
|
||
|
||
reactor.
|
||
|
||
|
||
|
||
|
||
|
||
Viewdata: the future
|
||
|
||
|
||
|
||
Viewdata grew up at a time when the idea of mass computer
|
||
|
||
ownership was a fantasy, when the idea that private individuals could
|
||
|
||
store and process data locally was considered far-fetched and when
|
||
|
||
there were fears that the general public would have difficulties in
|
||
|
||
tackling anything more complicated than a numbers- only key-pad.
|
||
|
||
These failures of prediction have lead to the limitations and
|
||
|
||
clumsiness of present-day viewdata. Nevertheless, the energy and
|
||
|
||
success of the hardware salesmen plus the reluctance of companies and
|
||
|
||
organisations to change their existing set-ups will ensure that for
|
||
|
||
some time to come, new private viewdata systems will continue to be
|
||
|
||
introduced...and be worth trying to break into.
|
||
|
||
|
||
|
||
There is one dirty trick that hackers have performed on private
|
||
|
||
viewdata systems. Entering them is often easy, because high-level
|
||
|
||
editing passwords are, as mentioned earlier, sometimes desperately
|
||
|
||
insecure (see chapter 6) and it is easy to acquire editing status.
|
||
|
||
|
||
|
||
** Page 97
|
||
|
||
|
||
|
||
Once you have discovered you are an editor, you can go to edit
|
||
|
||
mode and edit the first page on the system, page 0: you can usually
|
||
|
||
place your own message on it, of course; but you can also default all
|
||
|
||
the routes to page 90. Now *90# in most viewdata systems is the
|
||
|
||
log-out command, so the effect is that, as soon as someone logs in
|
||
|
||
successfully and tries to go beyond the first page, the system logs
|
||
|
||
them out....
|
||
|
||
|
||
|
||
However, this is no longer a new trick, and one which should be
|
||
|
||
used with caution: is the database used by an important organisation?
|
||
|
||
Are you going to tell the system manager what you have done and
|
||
|
||
urge more care in password selection in future?
|
||
|
||
|
||
|
||
** Page 98
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 9
|
||
|
||
|
||
|
||
|
||
|
||
Radio Computer Data
|
||
|
||
|
||
|
||
Vast quantities of data traffic are transmitted daily over the
|
||
|
||
radio frequency spectrum; hacking is simply a matter of hooking up a
|
||
|
||
good quality radio receiver and a computer through a suitable
|
||
|
||
interface. On offer are news services from the world's great press
|
||
|
||
agencies, commercial and maritime messages, meteorological data, and
|
||
|
||
plenty of heavily-encrypted diplomatic and military traffic. A
|
||
|
||
variety of systems, protocols and transmission methods are in use and
|
||
|
||
the hacker jaded by land-line communication (and perhaps for the
|
||
|
||
moment put off by the cost of phone calls) will find plenty of fun on
|
||
|
||
the airwaves.
|
||
|
||
|
||
|
||
The techniques of radio hacking are similar to those necessary for
|
||
|
||
computer hacking. Data transmission over the airwaves uses either a
|
||
|
||
series of audio tones to indicate binary 0 and 1 which are modulated
|
||
|
||
on transmit and demodulated on receive or alternatively frequency
|
||
|
||
shift keying which involves the sending of one of two slightly
|
||
|
||
different radio frequency carriers, corresponding to binary 0 or
|
||
|
||
binary 1. The two methods of transmission sound identical on a
|
||
|
||
communications receiver (see below) and both are treated the same for
|
||
|
||
decoding purposes. The tones are different from those used on
|
||
|
||
land-lines--'space' is nearly always 1275 Hz and 'mark' can be one of
|
||
|
||
three tones: 1445 Hz (170 Hz shift--quite often used by amateurs and
|
||
|
||
with certain technical advantages); 1725 Hz (450 Hz shift--the one
|
||
|
||
most commonly used by commercial and news services) and 2125 Hz (850
|
||
|
||
Hz shift--also used commercially). The commonest protocol uses the
|
||
|
||
5-bit Baudot code rather than 7-bit or 8-bit ASCII. The asynchronous,
|
||
|
||
start/stop mode is the most common. Transmission speeds include: 45
|
||
|
||
baud (60 words/minute), 50 baud (66 words/minute), 75 baud (100
|
||
|
||
words/ minute). 50 baud is the most common. However, many
|
||
|
||
interesting variants can be heard--special versions of Baudot for
|
||
|
||
non- European languages, error correction protocols, and various
|
||
|
||
forms of facsimile.
|
||
|
||
|
||
|
||
The material of greatest interest is to be found in the high
|
||
|
||
frequency or 'short wave' part of the radio spectrum, which goes from
|
||
|
||
2 MHz, just above the top of the medium wave broadcast band, through
|
||
|
||
to 30 MHz, which is the far end of the 10-meter amateur band which
|
||
|
||
itself is just above the well-known Citizens' Band at 27 MHz.
|
||
|
||
|
||
|
||
** Page 99
|
||
|
||
|
||
|
||
The reason this section of the spectrum is so interesting is that,
|
||
|
||
unique among radio waves, it has the capacity for world-wide
|
||
|
||
propagation without the use of satellites, the radio signals being
|
||
|
||
bounced back, in varying degrees, by the ionosphere. This special
|
||
|
||
quality means that everyone wants to use HF (high frequency)
|
||
|
||
transmission--not only international broadcasters, the propaganda
|
||
|
||
efforts of which are the most familiar uses of HF. Data transmission
|
||
|
||
certainly occurs on all parts of the radio spectrum, from VLF (Very
|
||
|
||
Low Frequency, the portion below the Long Wave broadcast band which
|
||
|
||
is used for submarine communication), through the commercial and
|
||
|
||
military VHF and UHF bands, beyond SHF (Super High Frequency, just
|
||
|
||
above 1000 MHz) right to the microwave bands. But HF is the most
|
||
|
||
rewarding in terms of range of material available, content of
|
||
|
||
messages and effort required to access it.
|
||
|
||
|
||
|
||
Before going any further, hackers should be aware that in a number
|
||
|
||
of countries even receiving radio traffic for which you are not
|
||
|
||
licensed is an offence; in nearly all countries making use of
|
||
|
||
information so received is also an offence and, in the case of news
|
||
|
||
agency material, breach of copyright may also present a problem.
|
||
|
||
|
||
|
||
However, owning the equipment required is usually not illegal and,
|
||
|
||
since few countries require a special license to listen to amateur
|
||
|
||
radio traffic (as opposed to transmitting, where a license is needed)
|
||
|
||
and since amateurs transmit in a variety of data modes as well,
|
||
|
||
hackers can set about acquiring the necessary capability without
|
||
|
||
fear.
|
||
|
||
|
||
|
||
|
||
|
||
Equipment
|
||
|
||
|
||
|
||
The equipment required consists of a communications receiver, an
|
||
|
||
antenna, an interface unit/software and a computer.
|
||
|
||
|
||
|
||
Communications receiver - This is the name given to a good quality
|
||
|
||
high frequency receiver. Suitable models can be obtained,
|
||
|
||
second-hand, at around <20>100; new receivers cost upwards of <20>175.
|
||
|
||
There is no point is buying a radio simply designed to pick up
|
||
|
||
shortwave broadcasts which will lack the sensitivity, selectivity and
|
||
|
||
resolution necessary. A minimum specification would be:
|
||
|
||
|
||
|
||
Coverage 500 kHz--30 MHz
|
||
|
||
|
||
|
||
Resolution >100 Hz
|
||
|
||
|
||
|
||
** Page 100
|
||
|
||
|
||
|
||
Modes AM, Upper Side Band, Lower Side Band,
|
||
|
||
CW (Morse)
|
||
|
||
|
||
|
||
Tuning would be either by two knobs, one for MHz, one for kHz, or
|
||
|
||
by keypad. On more expensive models it is possible to vary the
|
||
|
||
bandwidth of the receiver so that it can be widened for musical
|
||
|
||
fidelity and narrowed when listening to bands with many signals close
|
||
|
||
to one another.
|
||
|
||
|
||
|
||
Broadcast stations transmit using AM (amplitude modulation), but
|
||
|
||
in the person-to-person contacts of the aeronautical, maritime and
|
||
|
||
amateur world, single-side-band-suppressed carrier techniques are
|
||
|
||
used--the receiver will feature a switch marked AM, USB, LSB, CW etc.
|
||
|
||
Side-band transmission uses less frequency space and so allows more
|
||
|
||
simultaneous conversations to take place, and is also more efficient
|
||
|
||
in its use of the power available at the transmitter. The chief
|
||
|
||
disadvantage is that equipment for receiving is more expensive and
|
||
|
||
must be more accurately tuned. Upper side band is used on the whole
|
||
|
||
for voice traffic, and lower side band for data traffic. (Radio
|
||
|
||
amateurs are an exception: they also use lower side-band for voice
|
||
|
||
transmissions below 10 MHz.) Suitable sources of supply for
|
||
|
||
communications receivers are amateur radio dealers, whose addresses
|
||
|
||
may be found in specialist magazines like Practical Wireless, Amateur
|
||
|
||
Radio, Ham Radio Today.
|
||
|
||
|
||
|
||
Antenna - Antennas are crucial to good shortwave reception--the sort
|
||
|
||
of short 'whip' aerial found on portable radios is quite insufficient
|
||
|
||
if you are to capture transmissions from across the globe. When using
|
||
|
||
a computer close to a radio you must also take considerable care to
|
||
|
||
ensure that interference from the CPU and monitor don't squash the
|
||
|
||
signal you are trying to receive. The sort of antenna I recommend is
|
||
|
||
the 'active dipole', which has the twin advantages of being small and
|
||
|
||
of requiring little operational attention. It consists of a couple of
|
||
|
||
1-meter lengths of wire tied parallel to the ground and meeting in a
|
||
|
||
small plastic box. This is mounted as high as possible, away from
|
||
|
||
interference, and is the 'active' part. From the plastic box descends
|
||
|
||
coaxial cable which is brought down to a small power supply next to
|
||
|
||
the receiver and from there the signal is fed into the receiver
|
||
|
||
itself. The plastic box contains special low-noise transistors.
|
||
|
||
|
||
|
||
It is possible to use simple lengths of wire, but these usually
|
||
|
||
operate well only on a limited range of frequencies, and you will
|
||
|
||
need to cover the entire HF spectrum. Active antennas can be obtained
|
||
|
||
by mail order from suppliers advertising in amateur radio
|
||
|
||
magazines--the Datong is highly recommended.
|
||
|
||
|
||
|
||
** Page 101
|
||
|
||
|
||
|
||
Interface The 'interface' is the equivalent of the modem in landline
|
||
|
||
communications; indeed, advertisements of newer products actually refer to
|
||
|
||
radio modems. Radio tele-type, or RTTY, as it is called, is traditionally
|
||
|
||
received on a modified teleprinter or telex machine; and the early interfaces
|
||
|
||
or terminal units (TUs) simply converted the received audio tones into 'mark'
|
||
|
||
and 'space' to act as the equivalent of the electrical line conditions of a
|
||
|
||
telex circuit. Since the arrival of the microcomputer, however, the design
|
||
|
||
has changed dramatically and the interface now has to perform the following
|
||
|
||
functions:
|
||
|
||
|
||
|
||
1 Detect the designated audio tones
|
||
|
||
|
||
|
||
2 Convert them into electrical logic states
|
||
|
||
|
||
|
||
3 Strip the start/stop bits, convert the Baudot code into ASCII
|
||
|
||
equivalents, reinsert start/stop bits
|
||
|
||
|
||
|
||
4 Deliver the new signal into an appropriate port on the computer.
|
||
|
||
(If RS232C is not available, then any other port, e.g. Game, that
|
||
|
||
is)
|
||
|
||
|
||
|
||
A large number of designs exist: some consist of hardware
|
||
|
||
interfaces plus a cassette, disc or ROM for the software; others
|
||
|
||
contain both the hardware for signal acquisition and firmware for its
|
||
|
||
decoding in one box.
|
||
|
||
|
||
|
||
Costs vary enormously and do not appear to be related to quality
|
||
|
||
of result. The kit-builder with a ZX81 can have a complete set-up for
|
||
|
||
under <20>40; semi-professional models, including keyboards and screen
|
||
|
||
can cost in excess of <20>1000.
|
||
|
||
|
||
|
||
The kit I use is based on the Apple II (because of that model's
|
||
|
||
great popularity in the USA, much hardware and software exists); the
|
||
|
||
interface talks into the game port and I have several items of
|
||
|
||
software to present Baudot, ASCII or Morse at will. There is even
|
||
|
||
some interesting software for the Apple which needs no extra
|
||
|
||
hardware--the audio from the receiver is fed direct into the cassette
|
||
|
||
port of the Apple, but this method is difficult to replicate on other
|
||
|
||
machines because of the Apple's unique method of reading data from
|
||
|
||
cassette.
|
||
|
||
|
||
|
||
** Page 102
|
||
|
||
|
||
|
||
Excellent inexpensive hard/firmware is available for many Tandy
|
||
|
||
computers, and also for the VlC20/Commodore 64. On the whole US
|
||
|
||
suppliers seem better than those in the UK or Japan-- products are
|
||
|
||
advertised in the US magazines QST and 73.
|
||
|
||
|
||
|
||
Setting Up Particular attention should be paid to linking all the
|
||
|
||
equipment together; there are special problems about using sensitive
|
||
|
||
radio receiving equipment in close proximity to computers and VDUs.
|
||
|
||
Computer logic blocks, power supplies and the synchronising pulses on
|
||
|
||
VDUs are all excellent sources of radio interference (rfi). RFI
|
||
|
||
appears not only as individual signals at specific points on the
|
||
|
||
radio dial, but also as a generalised hash which can blank out all
|
||
|
||
but the strongest signals.
|
||
|
||
|
||
|
||
Interference can escape from poorly packaged hardware, but also
|
||
|
||
from unshielded cables which act as aerials. The remedy is simple to
|
||
|
||
describe: encase and shield everything, connecting all shields to a
|
||
|
||
good earth, preferably one separate from the mains earth. In
|
||
|
||
practice, much attention must be paid to the detail of the
|
||
|
||
interconnections and the relative placing of items of equipment. In
|
||
|
||
particular, the radio's aerial should use coaxial feeder with a
|
||
|
||
properly earthed outer braid, so that the actual wires that pluck the
|
||
|
||
signals from the ether are well clear of computer-created rfi. It is
|
||
|
||
always a good idea to provide a communications receiver with a proper
|
||
|
||
earth, though it will work without one: if used with a computer, it
|
||
|
||
is essential.
|
||
|
||
|
||
|
||
Do not let these paragraphs put you off; with care excellent
|
||
|
||
results can be obtained. And bear in mind my own first experience:
|
||
|
||
ever eager to try out same new kit, I banged everything together with
|
||
|
||
great speed--ribbon cable, poor solder joints, an antenna taped
|
||
|
||
quickly to a window in a metal frame less than two meters from the
|
||
|
||
communications receiver--and all I could hear from 500 kHz to 30
|
||
|
||
MHz, wherever I tuned, was a great howl-whine of protest...
|
||
|
||
|
||
|
||
|
||
|
||
Where to listen
|
||
|
||
|
||
|
||
Scanning through the bands on a good communications receiver, you
|
||
|
||
realise just how crowded the radio spectrum is. The table in Appendix
|
||
|
||
VI gives you an outline of the sandwich-like fashion in which the
|
||
|
||
bands are organised.
|
||
|
||
|
||
|
||
The 'fixed' bands are the ones of interest; more particularly, the
|
||
|
||
following ones are where you could expect to locate news agency
|
||
|
||
transmissions (in kHz):
|
||
|
||
|
||
|
||
** Page 103
|
||
|
||
|
||
|
||
3155 -- 3400 14350 -- 14990
|
||
|
||
3500 -- 3900 15600 -- 16360
|
||
|
||
3950 -- 4063 17410 -- 17550
|
||
|
||
4438 -- 4650 18030 -- 18068
|
||
|
||
4750 -- 4995 18168 -- 18780
|
||
|
||
5005 -- 5480 18900 -- 19680
|
||
|
||
5730 -- 5950 19800 -- 19990
|
||
|
||
6765 -- 7000 20010 -- 21000
|
||
|
||
7300 -- 8195 21850 -- 21870
|
||
|
||
9040 -- 9500 22855 -- 23200
|
||
|
||
ggoo -- 9995 23350 -- 24890
|
||
|
||
10100 -- 11175 25010 -- 25070
|
||
|
||
11400 -- 11650 25210 -- 25550
|
||
|
||
12050 -- 12330 26175 -- 28000
|
||
|
||
13360 -- 13600 29700 -- 30005
|
||
|
||
13800 -- 14000
|
||
|
||
|
||
|
||
In addition, amateurs tend to congregate around certain spots on the
|
||
|
||
frequency map: 3590, 14090, 21090, 28090, and at VHF/UHF: 144.600,
|
||
|
||
145.300, MHz 432.600, 433.300.
|
||
|
||
|
||
|
||
|
||
|
||
Tuning In
|
||
|
||
|
||
|
||
Radio Teletype signals have a characteristic two-tone warble sound
|
||
|
||
which you will hear properly only if your receiver is operating in
|
||
|
||
SSB (single-side-band) mode. There are other digital tone-based
|
||
|
||
signals to be heard: FAX (facsimile), Helschcrieber (which uses a
|
||
|
||
technique similar to dot-matrix printers and is used for Chinese and
|
||
|
||
related pictogram-style alphabets), SSTV (slow scan television, which
|
||
|
||
can take up to 8 seconds to send a low-definition picture), and
|
||
|
||
others.
|
||
|
||
|
||
|
||
But with practice, the particular sound of RTTY can easily be
|
||
|
||
recognised. More experienced listeners can also identify shifts and
|
||
|
||
speeds by ear.
|
||
|
||
|
||
|
||
You should tune into the signal watching the indicators on your
|
||
|
||
terminal unit to see that the tones are being properly captured--
|
||
|
||
typically, this involves getting two LEDs to flicker simultaneously.
|
||
|
||
|
||
|
||
The software will now try to decode the signal, and it will be up
|
||
|
||
to you to set the speed and 'sense'. The first speed to try is 66/7
|
||
|
||
words per minute, which corresponds to 50 baud, as this is the most
|
||
|
||
common. On the amateur bands, the usual speed is 60 words per minute
|
||
|
||
(45 baud); thereafter, if the rate sounds unusually fast, you try 100
|
||
|
||
words per minute (approximately 75 baud).
|
||
|
||
|
||
|
||
** Page 104
|
||
|
||
|
||
|
||
By 'sense' or 'phase' is meant whether the higher tone corresponds
|
||
|
||
to logical 1 or logical 0. Services can use either format; indeed
|
||
|
||
the same transmission channel may use one 'sense' on one occasion and
|
||
|
||
the reverse 'sense' on another. Your software can usually cope with
|
||
|
||
this. If it can't, all is not lost: you retune your receiver to the
|
||
|
||
opposite, side-band and the phase will thereby be reversed. So, if
|
||
|
||
you are listening on the lower side-band (LSB), usually the
|
||
|
||
conventional way to receive, you simply switch over to USB (upper
|
||
|
||
side-band), retune the signal into the terminal unit, and the sense'
|
||
|
||
will have been reversed.
|
||
|
||
|
||
|
||
Many news agency stations try to keep their channels open even if
|
||
|
||
they have no news to put out: usually they do this by sending test
|
||
|
||
messages like: 'The quick brown fox....' or sequences like
|
||
|
||
'RYRYRYRYRYRY...' such signals are useful for testing purposes, if
|
||
|
||
a little dull to watch scrolling up the VDU screen.
|
||
|
||
|
||
|
||
You will discover many signals that you can't decode: the
|
||
|
||
commonest reason is that the transmissions do not use European
|
||
|
||
alphabets, and all the elements in the Baudot code have been
|
||
|
||
re-assigned--some versions of Baudot use not one shift, but two, to
|
||
|
||
give the required range of characters. Straightforward en- crypted
|
||
|
||
messages are usually recognisable as coming in groups of five
|
||
|
||
letters, but the encryption can also operate at the bit- as well as
|
||
|
||
at the character-level -- in that case, too, you will get
|
||
|
||
gobbleydegook.
|
||
|
||
|
||
|
||
A limited amount of ASCII code as opposed to Baudot is to be
|
||
|
||
found, but mostly on the amateur bands.
|
||
|
||
|
||
|
||
Finally, an error-correction protocol, called SITOR, is
|
||
|
||
increasingly to be found on the maritime bands, with AMTOR, an amateur
|
||
|
||
variant, in the amateur bands, SITOR has various modes of operation
|
||
|
||
but, in its fullest implementation, messages are sent in blocks which
|
||
|
||
must be formally acknowledged by the recipient before the next one is
|
||
|
||
despatched. The transmitter keeps trying until an acknowledgement is
|
||
|
||
received. You may even come across, on the amateur bands, packet
|
||
|
||
radio, which has some of the features of packet switching on digital
|
||
|
||
land lines. This is one of the latest enthusiasms in amateur radio
|
||
|
||
with at least two different protocols in relatively wide use.
|
||
|
||
Discussion of SITOR and packet radio is beyond the scope of this
|
||
|
||
book, but the reader is referred to BARTG (the British Amateur Radio
|
||
|
||
Teletype Group) and its magazine Datacom for further information. You
|
||
|
||
do not need to be a licensed radio amateur to join. The address is:
|
||
|
||
27 Cranmer Court, Richmond Road, Kingston KT2 SPY.
|
||
|
||
|
||
|
||
Operational problems of radio hacking are covered at the end of
|
||
|
||
Appendix I, the Baudot code is given Appendix IV and an outline
|
||
|
||
frequency plan is to be found in Appendix VI.
|
||
|
||
|
||
|
||
** Page 105
|
||
|
||
|
||
|
||
The material that follows represents some of the types of common
|
||
|
||
transmissions: news services, test slips (essentially devices for
|
||
|
||
keeping a radio channel open), and amateur. The corruption in places
|
||
|
||
is due either to poor radio propagation conditions or to the presence
|
||
|
||
of interfering signals.
|
||
|
||
|
||
|
||
REVUE DE LA PRESSE ITALIENNE DU VENDREDI 28 DECEMBRE 1984
|
||
|
||
|
||
|
||
LE PROCES AUX ASSASSINS DE L~ POIELUSZKO, LA VISITE DE
|
||
|
||
M. SPADOLINI A ISRAEL, LA SITUATION AU CAMBODGE ET LA GUER-
|
||
|
||
ILLA AU MOZAMBIQUE FONT LES TITES DES PAGES POLITIQUES
|
||
|
||
|
||
|
||
MOBILISATION TO WORK FOR THE ACCOUNT OF 1985
|
||
|
||
|
||
|
||
- AT THE ENVER HOXHA AUTOMOBILE AND
|
||
|
||
TRACTOR COMBINE IN TIRANA 2
|
||
|
||
|
||
|
||
TIRANA, JANUARY XATA/. - THE WORKING PEOPLE OF THE ENVER HOXH~/
|
||
|
||
AUTOMOBILE AND TRACTOR COMBINE BEGAN THEIR WORR WITH VIGOUR
|
||
|
||
AND MOBILISATION FOR THE ACCOUNT OF 1985. THE WORK IN THIS
|
||
|
||
IMPROVOWNT CENTER FOR MECHANICAL INDUSTRY WAS NOT INTERRUPTED
|
||
|
||
FOR ONE MOMENT AND THE WORKING PEOPLE 8~S ONE ANOTHER FOR
|
||
|
||
FRESHER GREATER VICTORIES UNDER THE LEADERSHIP OF THE PARTY
|
||
|
||
WITH ENVER HOXHA AT THE HEAD, DURING THE SHIFTS, NEAR
|
||
|
||
THE FURNANCES~ PRESSES ETC.. JUST LIKE SCORES OF WORKING COLLE-
|
||
|
||
CTIVES OF THE COUNTRY WHICH WERE NOT AT HOME DURING THE NEW
|
||
|
||
YEAR B
|
||
|
||
|
||
|
||
IN THE FRONTS OF WORK FOR THE BENEFITS OF THE SOCI-
|
||
|
||
ALIST CONSTRUCTION OF THE COUNTRY.
|
||
|
||
PUTTING INTO LIFE THE TEACHINGS OF THE PARTY AND THE INSTRU-
|
||
|
||
CTIONS OF COMRADE ENVER HOXHA, THE WORKING COLLECTIVE OF THIS
|
||
|
||
COMBINE SCORED FRESH SUCCESSES DURING 1984 TO REALIZE THE
|
||
|
||
INDICES OF THE STATE PLAN BY RASING THE ECEONOMIC EFFECTIVE-
|
||
|
||
NESS. THE WORKING PEOPLE SUCCESSFULLY REALIZED AND OVERFUL
|
||
|
||
FILLED THE OBJECTIVE OF THE REVOLUTIONARY DRIVE ON THE HIGHER
|
||
|
||
EFFECTIOVENESS OF PRODUCTION, UNDERTAKEN IN KLAIDQAULSK SO~
|
||
|
||
WITHIN 1984 THE PLANNED PRODUCTIVITY, ACCORDING TO THE INDEX
|
||
|
||
OF THE FIVE YEAR PLAN, WAS OVERFULFILLED BY 2 PER CENT.
|
||
|
||
MOREOVER, THE FIVE YEAR PLAN FOR THE GMWERING OF THE COST OF
|
||
|
||
PRODUCTION WAS RAISED 2 MONTHS AHEAD OF TIME, ONE FIVE YEAR
|
||
|
||
PLAN FOR THE PRODUCTION OF MACHINERIES LAND EQUIPMENT AND
|
||
|
||
THE PRODUCTION OF THE TRACTORS WAS OVER-
|
||
|
||
FULFILLED. THE NET INCOME OF THE FIVE YEAR PLAN WAS REALIZED
|
||
|
||
WITHIN 4 YEARS. ETCM
|
||
|
||
|
||
|
||
YRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRY
|
||
|
||
RYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYR
|
||
|
||
|
||
|
||
** Page 106
|
||
|
||
|
||
|
||
YRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRY
|
||
|
||
YRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRY
|
||
|
||
RYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYRYR~ u UL ~v_.~v
|
||
|
||
|
||
|
||
GJ4YAD GJ4YAD DE G4DF G4DF
|
||
|
||
SOME QRM BUT MOST OK. THE SHIFT IS NORMAL...SHIFT IS NORMAL.
|
||
|
||
FB ON YOUR RIG AND NICE TO MEET YOU IN RTTY. THE WEATHER HERE
|
||
|
||
TODAY IS FINE AND BEEN SUNNY BUT C9LD. I HAVE BEEN IN THIS MODE
|
||
|
||
BEFORE BUT NOT FOR A FEW YEARS HI HI.
|
||
|
||
|
||
|
||
GJ4YAD GJ4YAD DE G4DF G4DF
|
||
|
||
PSE KKK
|
||
|
||
|
||
|
||
G4ElE G4EJE DE G3IMS G3IMS
|
||
|
||
TNX FOR COMING BACk. RIG HERE IS ICOM 720A BUT I AM SENDING
|
||
|
||
AFSk; NOT FSk'. I USED TO HAVE A CREED BUT CHUCKED IT OUT IT WAS
|
||
|
||
TOO NOISY AND NOW HAVE VIC2D SYSTEM AND SOME US kIT MY SON
|
||
|
||
BROUGHT ME HE TRAVELS A LOT.
|
||
|
||
HAD LOTS OF TROUBLE WITH RFI AND HAVE NOT YET CURED IT. VERTY BAD
|
||
|
||
|
||
|
||
QRM AT MOMENT. CAN GET NOTHING ABOVE 1CI MEGS AND NOT MUCH EX-G ON
|
||
|
||
S(:). HI HI. SUNSPOT COUNT IS REALLY LOW.
|
||
|
||
|
||
|
||
G4EJE G4EJE DE G3IMS G3IMS
|
||
|
||
~I.Of;KKKk'KKKK
|
||
|
||
RYRYRYRYRYRYRYRYRYR
|
||
|
||
~K~fk'KKKKKKK
|
||
|
||
|
||
|
||
G3IMS G3IMS DE G4EJE G4EJE
|
||
|
||
FB OM. URM IS GETTING WORSE. I HAVE ALWAYS LIk.ED ICOM RIGS BUT
|
||
|
||
THEY ARE EXEPENSIVE. CAN YOU RUN FULL 1QCI PER CENT DUTY CYCLE ON
|
||
|
||
RTTY OR DO YOU HAVE TO RUN AROUND 50 PER CENT. I GET OVER-HEATING
|
||
|
||
ON THIS OLD YAESU lQl. WHAT SORT OF ANTENNA SYSTEM DO YOU USE.
|
||
|
||
HERE IS A TRAPPED VERTICAL WITH 8CI METERS TUNED TO RTTY SPOT AT
|
||
|
||
~;59(:1.
|
||
|
||
I STILL USE CREED 7 THOUGH AM GETTING FED UP WITH MECHANICAL
|
||
|
||
BREAK- W WN AND NOISE BUT I HAVE HEARD ABOUT RFI AND HOME
|
||
|
||
COMPUTER5. MY NEPHEW HAS A SPECTRUM, CAN YOU GET RTTY SOFTWARE
|
||
|
||
FOR THAT/.
|
||
|
||
|
||
|
||
G3IMs G3IMS DE G4EJE G4EJE
|
||
|
||
|
||
|
||
** Page 107
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CHAPTER 10
|
||
|
||
|
||
|
||
|
||
|
||
Hacking: the Future
|
||
|
||
|
||
|
||
Security is now probably the biggest single growth area within the
|
||
|
||
mainstream computer business. At conference after conference,
|
||
|
||
consultants compete with each other to produce the most frightening
|
||
|
||
statistics.
|
||
|
||
|
||
|
||
The main concern, however, is not hacking but fraud. Donn Parker,
|
||
|
||
a frequent writer and speaker on computer crime based at the Stanford
|
||
|
||
Research Institute has put US computer fraud at $3000 million a year;
|
||
|
||
although reported crimes amount to only $100 million annually. In
|
||
|
||
June 1983 the Daily Telegraph claimed that British computer-related
|
||
|
||
frauds could be anything between <20>500 million and <20>2.5 billion a
|
||
|
||
year. Detective Inspector Ken McPherson, head of the computer crime
|
||
|
||
unit at the Metropolitan Police, was quoted in 1983 as saying that
|
||
|
||
within 15 years every fraud would involve a computer. The trouble is,
|
||
|
||
very few victims are prepared to acknowledge their losses. To date,
|
||
|
||
no British clearing bank has admitted to suffering from an
|
||
|
||
out-and-out computer fraud, other than the doctoring of credit and
|
||
|
||
plastic ID cards. Few consultants believe that they have been immune.
|
||
|
||
|
||
|
||
However, to put the various threats in perspective, here are two
|
||
|
||
recent US assessments. Robert P Campbell of Advanced Information
|
||
|
||
Management, formerly head of computer security in the US Army,
|
||
|
||
reckons that only one computer crime in 100 is detected; of those
|
||
|
||
detected, 15 per cent or fewer are reported to the authorities, and
|
||
|
||
that of those reported, one in 33 is successfully prosecuted--a
|
||
|
||
'clear-up' rate of one in 22,000.
|
||
|
||
|
||
|
||
And Robert Courtney, former security chief at IBM produced a list
|
||
|
||
of hazards to computers: 'The No 1 problem now and forever is errors
|
||
|
||
and omissions'. Then there is crime by insiders, particularly
|
||
|
||
non-technical people of three types: single women under 35; 'little
|
||
|
||
old ladies' over 50 who want to give the money to charity; and older
|
||
|
||
men who feel their careers have left them neglected. Next, natural
|
||
|
||
disasters. Sabotage by disgruntled employees. Water damage. As for
|
||
|
||
hackers and other outsiders who break in, he estimates it is less
|
||
|
||
than 3 per cent of the total.
|
||
|
||
|
||
|
||
** Page 108
|
||
|
||
|
||
|
||
Here in the UK, the National Computing Centre says that at least
|
||
|
||
90 per cent of computer crimes involve putting false information into
|
||
|
||
a computer, as opposed to sophisticated logic techniques; such crimes
|
||
|
||
are identical to conventional embezzlement: looking for weaknesses
|
||
|
||
in an accounting system and taking advantage. In such cases the
|
||
|
||
computer merely carries out the fraud with more thoroughness than a
|
||
|
||
human, and the print-out gives the accounts a spurious air of being
|
||
|
||
correct.
|
||
|
||
|
||
|
||
In the meantime, we are on the threshold of a new age of
|
||
|
||
opportunities for the hacker. The technology we can afford has
|
||
|
||
suddenly become much more interesting.
|
||
|
||
|
||
|
||
The most recent new free magazines to which I have acquired
|
||
|
||
subscriptions are for owners of the IBM PC, its variants and clones.
|
||
|
||
There are two UK monthlies for regular users, another for corporate
|
||
|
||
buyers and several US titles.
|
||
|
||
|
||
|
||
The IBM PC is only partly aimed at small business users as a
|
||
|
||
stand-alone machine to run accounting, word processing, spread- sheet
|
||
|
||
calculation and the usual business dross; increasingly the marketing
|
||
|
||
is pitching it as an executive work-station, so that the corporate
|
||
|
||
employee can carry out functions not only local to his own office,
|
||
|
||
but can access the corporate mainframe as well--for data, messaging
|
||
|
||
with colleagues, and for greater processing power.
|
||
|
||
|
||
|
||
In page after page, the articles debate the future of this
|
||
|
||
development--do employees want work-stations? Don't many bosses still
|
||
|
||
feel that anything to do with typing is best left to their secretary?
|
||
|
||
How does the executive workstation relate to the mainframe? Do you
|
||
|
||
allow the executive to merely collect data from it, or input as well?
|
||
|
||
If you permit the latter, what effect will this have on the integrity
|
||
|
||
of the mainframe's files? How do you control what is going on? What
|
||
|
||
is the future of the DP professional? Who is in charge?
|
||
|
||
|
||
|
||
And so the articles go on. Is IBM about to offer packages which
|
||
|
||
integrate mainframes and PCs in one enormous system, thus effectively
|
||
|
||
blocking out every other computer manufacturer and software publisher
|
||
|
||
in the world by sheer weight and presence?
|
||
|
||
|
||
|
||
I don't know the answers to these questions, but elsewhere in
|
||
|
||
these same magazines is evidence that the hardware products to
|
||
|
||
support the executive workstation revolution are there--or, even if
|
||
|
||
one has the usual cynicism about computer trade advertising ahead of
|
||
|
||
actual availability, about to be.
|
||
|
||
|
||
|
||
The products are high quality terminal emulators, not the sort of
|
||
|
||
thing hitherto achieved in software--variants on asynchronous
|
||
|
||
protocols with some fancy cursor addressing--but cards capable of
|
||
|
||
supporting a variety of key synchronous communications, like 327x
|
||
|
||
(bisynch and SDLC), and handling high-speed file transfers in CICs,
|
||
|
||
TSO, IMS and CMS.
|
||
|
||
|
||
|
||
** Page 109
|
||
|
||
|
||
|
||
These products feature special facilities, like windowing or
|
||
|
||
replicate aspects of mainframe operating systems like VM (Virtual
|
||
|
||
Machine), giving the user the experience of having several different
|
||
|
||
computers simultaneously at his command. Other cards can handle IBM's
|
||
|
||
smaller mini- mainframes, the Systems/34 and /38. Nor are other
|
||
|
||
mainframe manufacturers with odd-ball comms requirements ignored:
|
||
|
||
ICL, Honeywell and Burroughs are all catered for. There are even
|
||
|
||
several PC add-ons which give a machine direct X.25; it can sit on a
|
||
|
||
packet-switched network without the aid of a PAD.
|
||
|
||
|
||
|
||
Such products are expensive by personal micro standards, but it
|
||
|
||
means that, for the expenditure of around <20>8000, the hacker can call
|
||
|
||
up formidable power from his machine. The addition of special
|
||
|
||
environments on these new super micros which give the owner direct
|
||
|
||
experience of mainframe operating systems--and the manuals to go with
|
||
|
||
them--will greatly increase the population of knowledgeable computer
|
||
|
||
buffs. Add to this the fact that the corporate workstation market, if
|
||
|
||
it is at all succesful, must mean that many executives will want to
|
||
|
||
call their mainframe from home --and there will be many many more
|
||
|
||
computer ports on the PTSN or sitting on PSS.
|
||
|
||
|
||
|
||
There can be little doubt that the need for system security will
|
||
|
||
play an increasing role in the specification of new mainframe
|
||
|
||
installations. For some time, hardware and software engineers have
|
||
|
||
had available the technical devices necessary to make a computer
|
||
|
||
secure; the difficulty is to get regular users to implement the
|
||
|
||
appropriate methods--humans can only memorise a limited number of
|
||
|
||
passwords. I expect greater use will be made of threat monitoring
|
||
|
||
techniques: checking for sequences of unsuccessful attempts at
|
||
|
||
logging in, and monitoring the level of usage of customers for
|
||
|
||
extent, timing, and which terminals or ports they appear on.
|
||
|
||
|
||
|
||
The interesting thing as far as hackers are concerned is that it
|
||
|
||
is the difficulty of the exercise that motivates us, rather than the
|
||
|
||
prospect of instant wealth. It is also the flavour of naughty, but
|
||
|
||
not outright, illegality. I remember the Citizens Band radio boom of
|
||
|
||
a few years ago: it started quietly with just a handful of London
|
||
|
||
breakers who had imported US sets, really simply to talk to a few
|
||
|
||
friends. One day everyone woke up, switched on their rigs and
|
||
|
||
discovered overnight there was a whole new sub-culture out there,
|
||
|
||
breathing the ether. Every day there were more and more until no
|
||
|
||
spare channels could be found. Then some talented engineers found out
|
||
|
||
how to freak the rigs and add another 40 channels to the original 40.
|
||
|
||
And then another 40. Suddenly there were wholesalers and retailers
|
||
|
||
and fanzines, all selling and promoting products the using or
|
||
|
||
manufacturing of which was illegal under British law.
|
||
|
||
|
||
|
||
** Page 110
|
||
|
||
|
||
|
||
Finally, the government introduced a legalised CB, using different
|
||
|
||
standards from the imported US ones. Within six months the illegal
|
||
|
||
scene had greatly contracted, and no legal CB service of comparable
|
||
|
||
size ever took its place. Manufacturers and shop- keepers who had
|
||
|
||
expected to make a financial killing were left with warehouses full
|
||
|
||
of the stuff. Much of the attraction of AM CB was that it was
|
||
|
||
forbidden and unregulated. There is the desire to be an outlaw, but
|
||
|
||
clever and not too outrageous with it, in very many of us.
|
||
|
||
|
||
|
||
So I don't believe that hacking can be stopped by tougher
|
||
|
||
security, or by legislation, or even by the fear of punishment.
|
||
|
||
|
||
|
||
Don't get me wrong: I regard computers as vastly beneficial. But
|
||
|
||
they can threaten our traditional concepts of freedom, individuality
|
||
|
||
and human worth I like to believe hacking is a curious
|
||
|
||
re-assertion of some of those ideas.
|
||
|
||
|
||
|
||
The challenge of hacking is deeply ingrained in many computer
|
||
|
||
enthusiasts; where else can you find an activity the horizons of
|
||
|
||
which are constantly expanding, where new challenges and dangers can
|
||
|
||
be found every day, where you are not playing a visibly artificial
|
||
|
||
'game', where so much can be accessed with so little resource but a
|
||
|
||
small keyboard, a glowing VDU, an inquisitive and acquisitive brain,
|
||
|
||
and an impish mentality?
|
||
|
||
|
||
|
||
** Page 111
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX I
|
||
|
||
|
||
|
||
|
||
|
||
Trouble Shooting
|
||
|
||
|
||
|
||
The assumption is that you are operating in the default mode of
|
||
|
||
300/300 baud asynchronous using CCITT tones, 7 bits, even parity, one
|
||
|
||
stop bit, full-duplex/echo off, originate. You have dialled the
|
||
|
||
remote number, seized the line and can hear a data tone. Something is
|
||
|
||
not working properly. This is a partial list of possibilities.
|
||
|
||
|
||
|
||
|
||
|
||
The screen remains blank.
|
||
|
||
|
||
|
||
* A physical link has failed -- check the cables between computer,
|
||
|
||
modem and phone line.
|
||
|
||
|
||
|
||
* The remote modem needs waking up--send a <cr> or failing that, a
|
||
|
||
ENQ (<ctrl>E), character.
|
||
|
||
|
||
|
||
* The remote modem is operating at a different speed. Some modems
|
||
|
||
can be brought up to speed by hitting successive <cr>s; they usually
|
||
|
||
begin at 110 baud and then go to 300,so two successive <cr>s should
|
||
|
||
do the trick.
|
||
|
||
|
||
|
||
* The remote modem is not working at V21 standards, either because
|
||
|
||
it is a different CCITT standard, e.g. V22, V22 bis, V23 etc or
|
||
|
||
operates on Bell (US) tones.
|
||
|
||
|
||
|
||
* Since different standards tend to have different 'wake-up' tones
|
||
|
||
which are easily recognised with practice, you may be able to spot
|
||
|
||
what is happening. It shouldn't need to be said that if you are
|
||
|
||
calling a North American service you should assume Bell tones.
|
||
|
||
|
||
|
||
* Both your modem and that of the remote service are in answer or in
|
||
|
||
originate and so cannot 'speak' to each other. Always assume you are
|
||
|
||
in the originate mode.
|
||
|
||
|
||
|
||
* The remote service is not using ASCII/International Alphabet No 5.
|
||
|
||
|
||
|
||
|
||
|
||
The screen fills with random characters
|
||
|
||
|
||
|
||
* Data format different from your defaults--check 7 or 8 bit
|
||
|
||
characters, even/odd parity, stop and start bits.
|
||
|
||
|
||
|
||
* Mismatch of characters owing to misdefined protocol--check
|
||
|
||
start/stop, try alternately EOB/ACK and XON/XOF.
|
||
|
||
|
||
|
||
* Remote computer operating at a different speed from you-- try, in
|
||
|
||
order, 110, 300, 600, 1200, 75.
|
||
|
||
|
||
|
||
** Page 112
|
||
|
||
|
||
|
||
* Poor physical connection--if using an acoustic coupler check
|
||
|
||
location of handset, if not, listen on line to see if it is noisy or
|
||
|
||
crossed.
|
||
|
||
|
||
|
||
* The remote service is not using ASCII/International Alphabet No 5.
|
||
|
||
|
||
|
||
|
||
|
||
Every character appears twice
|
||
|
||
|
||
|
||
* You are actually in half-duplex mode and the remote computer as
|
||
|
||
well as your own are both sending characters to your screen--switch
|
||
|
||
to full-duplex/echo off.
|
||
|
||
|
||
|
||
|
||
|
||
All information appears on only one line, which is constantly
|
||
|
||
overwritten.
|
||
|
||
|
||
|
||
* The remote service is not sending line feeds--if your terminal
|
||
|
||
software has the facility, enable it to induce line feeds when each
|
||
|
||
display line is filled. Many on-line services and public dial-up
|
||
|
||
ports let you configure the remote port to send line feeds and vary
|
||
|
||
line length. Your software may have a facility to show control
|
||
|
||
characters, in which case you will see <ctrl>J if the remote service
|
||
|
||
is sending line feeds.
|
||
|
||
|
||
|
||
|
||
|
||
Wide spaces appear between display lines.
|
||
|
||
|
||
|
||
* The remote service is sending line feeds and your software is
|
||
|
||
inducing another one simultaneously--turn off your induced carriage
|
||
|
||
return facility. In 'show control character' mode, you will see
|
||
|
||
<ctrl>Js.
|
||
|
||
|
||
|
||
|
||
|
||
Display lines are broken awkwardly
|
||
|
||
|
||
|
||
* The remote service is expecting your screen to support more
|
||
|
||
characters than it is able. Professional services tend to expect 80
|
||
|
||
characters across whilst many personal computers may have less than
|
||
|
||
40, so that they can be read on a tv screen. Check if your software
|
||
|
||
can help, but you may have to live with it. Alternatively, the
|
||
|
||
remote computer may let you reconfigure its character stream.
|
||
|
||
|
||
|
||
|
||
|
||
Most of the display makes sense, but every so often it becomes
|
||
|
||
garbled
|
||
|
||
|
||
|
||
* You have intermittent line noise--check if you can command the
|
||
|
||
remote computer to send the same stream again and see if you get the
|
||
|
||
garbling.
|
||
|
||
|
||
|
||
* The remote service is sending graphics instructions which your
|
||
|
||
computer and software can't resolve.
|
||
|
||
|
||
|
||
** Page 113
|
||
|
||
|
||
|
||
The display contains recognisable characters in definite groupings,
|
||
|
||
but otherwise makes no sense The data is intended for an intelligent
|
||
|
||
terminal, which will combine the transmitted data with a local
|
||
|
||
program so that it makes sense.
|
||
|
||
|
||
|
||
* The data is intended for batch processing.
|
||
|
||
|
||
|
||
* The data is encrypted Although the stream of data appeared
|
||
|
||
properly on your vdu, when you try to print it out, you get
|
||
|
||
corruption and over-printing
|
||
|
||
|
||
|
||
* Most printers use a series of special control characters to enable
|
||
|
||
various functions--line feeds, back-space, double- intensity, special
|
||
|
||
graphics etc. The remote service is sending a series of control
|
||
|
||
characters which, though not displayed on your screen, are
|
||
|
||
'recognised' by your printer, though often in not very helpful ways.
|
||
|
||
You may be able to correct the worst problems in software, e.g. by
|
||
|
||
enabling line-feeds; alternatively many printers can be re-configured
|
||
|
||
in hardware by appropriate settings of DIL switches internally.
|
||
|
||
|
||
|
||
|
||
|
||
When accessing a viewdata service, the screen fills with squares.
|
||
|
||
|
||
|
||
* The square is the standard display default if your viewdata
|
||
|
||
terminal can't make sense of the data being sent to it.
|
||
|
||
|
||
|
||
* Check physical connections and listen for line noise.
|
||
|
||
|
||
|
||
* The viewdata host does not work to UK viewdata standards-- French
|
||
|
||
viewdata uses parallel attributes and has a number of extra features.
|
||
|
||
The CEPT standard for Europe contains features from both the UK and
|
||
|
||
French systems and you may be able to recognise some of the display.
|
||
|
||
North American videotex is alpha-geometric and sends line drawing
|
||
|
||
instructions rather than characters.
|
||
|
||
|
||
|
||
* The viewdata host has enhanced graphics features, perhaps for
|
||
|
||
dynamically redefined character sets, alphageometric instructions, or
|
||
|
||
alpha-photographic (full resolution) pictures. If the host has some
|
||
|
||
UK standard-compatible features, you will be able to read them
|
||
|
||
normally. If the cursor jumps about the screen, the host has dynamic
|
||
|
||
graphics facilities. If the viewdata protocol is anything at all like
|
||
|
||
the UK standard, you should see regular clear-screens as each new
|
||
|
||
page comes up; however, advanced graphics features tend to work by
|
||
|
||
suppressing clear-screens.
|
||
|
||
|
||
|
||
** Page 114
|
||
|
||
|
||
|
||
* The service you have dialled is not using viewdata. PSS is
|
||
|
||
accessible at 75/1200, as are one or two direct-dial services. In
|
||
|
||
this case you should be seeing a conventional display or trying one
|
||
|
||
of the other suggestions in this appendix. It is usual to assume that
|
||
|
||
any subscriber dialling into a 75/1200 port has only a 40 character
|
||
|
||
display.
|
||
|
||
|
||
|
||
|
||
|
||
You can't see what you are typing
|
||
|
||
|
||
|
||
* The remote computer is not echoing back to you--switch to
|
||
|
||
half-duplex. If the remote computer's messages now appear doubled;
|
||
|
||
that would be unusual but not unique; you will have to toggle back to
|
||
|
||
full-duplex for receive.
|
||
|
||
|
||
|
||
|
||
|
||
Data seems to come from the remote computer in jerky bursts rather
|
||
|
||
than as a smooth stream.
|
||
|
||
|
||
|
||
* If you are using PSS or a similar packet-switched service and it
|
||
|
||
is near peak business hours either in your time zone or in that of
|
||
|
||
the host you are accessing, the effect is due to heavy packet
|
||
|
||
traffic. There is nothing you can do--do not send extra commands to
|
||
|
||
'speed things up' as those commands will arrive at the host
|
||
|
||
eventually and cause unexpected results.
|
||
|
||
|
||
|
||
* The host is pausing for a EOB/ACK or XON/XOF message-- check your
|
||
|
||
protocol settings--try sending ctrl-Q or ctrl-F.
|
||
|
||
|
||
|
||
|
||
|
||
You have an apparently valid password but it is not accepted.
|
||
|
||
|
||
|
||
* You don't have a valid password, or you don't have all of it.
|
||
|
||
|
||
|
||
* The password has hidden control characters which don't display on
|
||
|
||
the screen. Watch out for <ctrl>H -- the back-space, which will
|
||
|
||
over-write an existing displayed character.
|
||
|
||
|
||
|
||
* The password contains characters which your computer doesn't
|
||
|
||
normally generate--check your terminal software and see if there is a
|
||
|
||
way of sending them.
|
||
|
||
|
||
|
||
|
||
|
||
Most of the time everything works smoothly, but you can't get past
|
||
|
||
certain prompts
|
||
|
||
|
||
|
||
* The remote service is looking for characters your computer doesn't
|
||
|
||
normally generate. Check your terminal software and see if there is a
|
||
|
||
way of sending them.
|
||
|
||
|
||
|
||
|
||
|
||
A list or file called up turns out to be boring--can you stop it?
|
||
|
||
|
||
|
||
* Try sending <ctrl>S; this may simply make the remote machine
|
||
|
||
pause, until a <ctrl>Q is sent--and you may find the list resumes
|
||
|
||
where it left off. On the other hand it may take you on to a menu.
|
||
|
||
|
||
|
||
* Send a BREAK signal (<ctrl>1). If one BREAK doesn't work, send
|
||
|
||
another in quick succession.
|
||
|
||
|
||
|
||
** Page 115
|
||
|
||
|
||
|
||
You wish to get into the operating system from an applications
|
||
|
||
program.
|
||
|
||
|
||
|
||
* Don't we all? There is no standard way of doing this, and indeed
|
||
|
||
it might be almost impossible, because the operating system can only
|
||
|
||
be addressed by a few privileged terminals, of which yours (and its
|
||
|
||
associated password) is not one. However, you could try the
|
||
|
||
following:
|
||
|
||
|
||
|
||
* Immediately after signing on, send two BREAKs (<ctrl>1).
|
||
|
||
|
||
|
||
* Immediately after signing on, try combinations of ESC, CTRL and
|
||
|
||
SHIFT. As a desperate measure, send two line feeds before signing
|
||
|
||
on--this has been known to work!.
|
||
|
||
|
||
|
||
* At an options page, try requesting SYSTEM or some obvious
|
||
|
||
contraction like SYS or X. If in the Basic language, depending on the
|
||
|
||
dialect, SYSTEM or X in immediate mode should get you the operating
|
||
|
||
system.
|
||
|
||
|
||
|
||
|
||
|
||
You are trying to capture data traffic from a short-wave radio and are having
|
||
|
||
little success
|
||
|
||
|
||
|
||
* Your computer could be emitting so much radio noise itself that
|
||
|
||
any signal you are attempting to hear is squashed. To test: tune your
|
||
|
||
radio to a fairly quiet short-wave broadcast and then experiment
|
||
|
||
listening to the background hash with the computer switched first
|
||
|
||
on, then off. If the noise level drops when you turn off the
|
||
|
||
computer, then you need to arrange for more rf suppression and to
|
||
|
||
move the computer and radio further apart. Another source of rf noise
|
||
|
||
is the sync scan in a tv tube.
|
||
|
||
|
||
|
||
* If you can hear the two-tones of rtty traffic but can't get
|
||
|
||
letters resolved, check that your terminal unit is locking on to the
|
||
|
||
signal (often indicated by LEDs); you should then at least get some
|
||
|
||
response on your screen, if it doesn't make immediate sense.
|
||
|
||
|
||
|
||
* Once you have letters on screen, try altering the speed at which
|
||
|
||
you are receiving (see chapter 10); check also that you are reading
|
||
|
||
in the right 'sense', ie that mark and space have not been reversed.
|
||
|
||
|
||
|
||
* In addition to signals sent with the conventional International
|
||
|
||
Telegraphic Code No 2 (Baudot), variants exist for foreign letter
|
||
|
||
sets, like Cyrillic, which your software may not be able to resolve.
|
||
|
||
|
||
|
||
* There are other data-type services which sound a little like RTTY,
|
||
|
||
but are not: they include FAX (facsimile) hellschreiber ( a form of
|
||
|
||
remote dot-matrix printing), SITOR (see chapter 10) and special
|
||
|
||
military/diplomatic systems.
|
||
|
||
|
||
|
||
** Page 116
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX II
|
||
|
||
|
||
|
||
|
||
|
||
Glossary
|
||
|
||
|
||
|
||
This glossary collects together the sort of name, word, abbreviation
|
||
|
||
phrase you could come across during your network adventures
|
||
|
||
and for which you may not be able to find a precise definition
|
||
|
||
|
||
|
||
ACK
|
||
|
||
Non--printing character used in some comms protocols to indicate that
|
||
|
||
a block has been received and that more can be sent; used in
|
||
|
||
association with EOB.
|
||
|
||
|
||
|
||
ANSI
|
||
|
||
American National Standards Institute--one of a number of standards
|
||
|
||
organizations.
|
||
|
||
|
||
|
||
Answer mode
|
||
|
||
When a modem is set up to receive calls--the usual mode for a host.
|
||
|
||
The user's computer will be in originate.
|
||
|
||
|
||
|
||
ARQ
|
||
|
||
Automatic Repeat Request--method of error correction.
|
||
|
||
|
||
|
||
ASCII
|
||
|
||
American Standard Code for Information Interchange--alternate name
|
||
|
||
for International Telegraph Alphabet No 5: 7-bit code to symbolise
|
||
|
||
common characters and comms instructions, usually transmitted as
|
||
|
||
8-bit code to include a parity bit.
|
||
|
||
|
||
|
||
ASR
|
||
|
||
Automatic Send Receive--any keyboard terminal capable of generating a
|
||
|
||
message into off-line storage for later transmission; includes
|
||
|
||
paper-tape telex machines as well as microcomputers.
|
||
|
||
|
||
|
||
Asynchronous
|
||
|
||
Description of communications which rely on 'start' and 'stop' bits
|
||
|
||
to synchronise originator and receiver of data--hence asynchrnous
|
||
|
||
protocols, channels, modems, terminals etc.
|
||
|
||
|
||
|
||
** Page 117
|
||
|
||
|
||
|
||
Backward channel
|
||
|
||
Supervisory channel, not used as main channel of communication; in
|
||
|
||
viewdata the 75 baud back from the user to the host.
|
||
|
||
|
||
|
||
Baud
|
||
|
||
Measure of the signalling rate on a data channel, number of
|
||
|
||
signalling elements per second.
|
||
|
||
|
||
|
||
Baseband
|
||
|
||
Modulation is direct on the comms line rather than using audio or
|
||
|
||
radio frequencies; used in some local area networks. A baseband or
|
||
|
||
'short-haul' modem can be used to link computers in adjacent offices,
|
||
|
||
but not over telephone lines.
|
||
|
||
|
||
|
||
Baudot
|
||
|
||
5-bit data code used in telegraphy, telex and RTTY--also known as
|
||
|
||
International Telegraph Alphabet No 2.
|
||
|
||
|
||
|
||
Bell
|
||
|
||
(1) non-printing character which sounds a bell or bleep, usually
|
||
|
||
enabled by <ctrl> G; (2) Common name for US phone company and, in
|
||
|
||
this context, specifiers for a number of data standards and services,
|
||
|
||
e.g. Bell 103a, 202a, 212a, etc--see Appendix V
|
||
|
||
|
||
|
||
Bit Binary digit
|
||
|
||
value 0 or 1.
|
||
|
||
|
||
|
||
Broadband
|
||
|
||
Broadband data channels have a wider bandwidth than ordinary
|
||
|
||
telephone circuits--12 times in fact, to give a bandwidth of 48kHz,
|
||
|
||
over which may simultaneous high-speed data transfers can take place.
|
||
|
||
|
||
|
||
Broadcast service
|
||
|
||
Data service in which all users receive the same information
|
||
|
||
simultaneously, without the opportunity to interrogate or query;
|
||
|
||
e.g. news services like AP, Reuters News, UPI etc. See also on-line
|
||
|
||
service.
|
||
|
||
|
||
|
||
Bisynchronous
|
||
|
||
IBM protocol involving synchronous transmission of binary coded data.
|
||
|
||
|
||
|
||
** Page 118
|
||
|
||
|
||
|
||
BLAISE
|
||
|
||
British Library Automated Information Service-- substantial
|
||
|
||
bibliographic on-line host.
|
||
|
||
|
||
|
||
BREAK
|
||
|
||
Non-printing character used in some data transmission protocols and
|
||
|
||
found on some terminals--can often be regenerated by using <ctrl> 1.
|
||
|
||
|
||
|
||
BSC
|
||
|
||
Binary Synchronous Communications--see bisynchronous.
|
||
|
||
|
||
|
||
I Byte
|
||
|
||
Group of bits (8) representing one data character.
|
||
|
||
|
||
|
||
Call accept
|
||
|
||
In packet-switching, the packet that confirms the party is willing to
|
||
|
||
proceed with the call.
|
||
|
||
|
||
|
||
Call redirection
|
||
|
||
In packet-switching, allows call to be automatically redirected from
|
||
|
||
original address to another, nominated address.
|
||
|
||
|
||
|
||
Call request
|
||
|
||
In packet-switching, packet sent to initiate a datacall.
|
||
|
||
|
||
|
||
CCITT
|
||
|
||
Comite Consultatif International Telephonique et Telegraphique
|
||
|
||
--committee of International Telecommunications Union which sets
|
||
|
||
international comms standards. Only the US fails to follow its
|
||
|
||
recommendations in terms of modem tones, preferring 'Bell' tones. The
|
||
|
||
CCITT also sets such standards as V21, 24, X25 etc.
|
||
|
||
|
||
|
||
Character terminal
|
||
|
||
In packet-switching, a terminal which can only access via a PAD.
|
||
|
||
|
||
|
||
Cluster
|
||
|
||
When two or more terminals are connected to a data channel at a
|
||
|
||
single point.
|
||
|
||
|
||
|
||
Common Carrier
|
||
|
||
A telecommunications resource providing facilities to the public.
|
||
|
||
|
||
|
||
** Page 119
|
||
|
||
|
||
|
||
Connect-time
|
||
|
||
Length of time connected to a remote computer, often the measure of
|
||
|
||
payment. Contrast with cpu time or cpu units, which measures how
|
||
|
||
much 'effort' the host put into the communication.
|
||
|
||
|
||
|
||
CPS
|
||
|
||
Characters Per Second.
|
||
|
||
|
||
|
||
Cpu Time
|
||
|
||
In an on-line session, the amount of time the central processor
|
||
|
||
actually spends on the interaction process, as opposed to connect-
|
||
|
||
time; either can be used as the basis of tariffing.
|
||
|
||
|
||
|
||
CRC
|
||
|
||
Cyclic Redundancy Check--error detection method.
|
||
|
||
|
||
|
||
CUG
|
||
|
||
Closed User Group--group of users/terminals who enjoy privacy with
|
||
|
||
respect to a public service.
|
||
|
||
|
||
|
||
Datacall
|
||
|
||
In packet-switching, an ordinary call, sometimes called a 'switched
|
||
|
||
virtual call'.
|
||
|
||
|
||
|
||
Dataline
|
||
|
||
In packet-switching, dedicated line between customer's terminal and
|
||
|
||
packet-switch exchange (PSE).
|
||
|
||
|
||
|
||
DCE
|
||
|
||
Data Circuit-terminating Equipment--officialese for modems.
|
||
|
||
|
||
|
||
DTE
|
||
|
||
Data Terminal Equipment--officialese for computers.
|
||
|
||
|
||
|
||
EBCDIC
|
||
|
||
Extended Binary Coded Decimal Interchange Code--IBM's alternative to
|
||
|
||
ASCII, based on an 8-bit code, usually transmitted synchronously. 256
|
||
|
||
characters are available.
|
||
|
||
|
||
|
||
Emulator
|
||
|
||
Software/hardware set-up which makes one device mimic another, e.g. a
|
||
|
||
personal computer may emulate an industry-standard dumb terminal like
|
||
|
||
the VT100. Compare simulator, which gives a device the attributes of
|
||
|
||
another, but not necessarily in real time, e.g. when a large mini
|
||
|
||
carries a program making it simulate another computer to develop
|
||
|
||
software.
|
||
|
||
|
||
|
||
** Page 120
|
||
|
||
|
||
|
||
Euronet-Diane
|
||
|
||
European direct access information network.
|
||
|
||
|
||
|
||
Datel
|
||
|
||
BT's name for its data services, covering both the equipment and the
|
||
|
||
type of line, e.g. Datel 100 corresponds to telegraph circuits, Datel
|
||
|
||
200 is the usual 300/300 asynchronous service, Datel 400 is for
|
||
|
||
one-way transmissions e.g. monitoring of remote sites, Datel 600 is
|
||
|
||
a two- or four-wire asynchronous service at up to 1200 baud, Datel
|
||
|
||
2400 typically uses a 4-wire private circuit at 2400 baud
|
||
|
||
synchronous, etc. etc.
|
||
|
||
|
||
|
||
DES
|
||
|
||
Data Encryption Standard--a US-approved method of encrypt- ing data
|
||
|
||
traffic, and somewhat controversial in its effectiveness.
|
||
|
||
|
||
|
||
Dialog
|
||
|
||
Well-established on-line host available world-wide covering an
|
||
|
||
extensive range of scientific, bibiographic and news services. Also
|
||
|
||
known as Lockheed Dialog.
|
||
|
||
|
||
|
||
Dial-up
|
||
|
||
Call initiated via PTSN, no matter where it goes after that; as
|
||
|
||
opposed to service available via permanent leased line.
|
||
|
||
|
||
|
||
Duplex
|
||
|
||
Transmission in two directions simultaneously, sometimes called
|
||
|
||
full-duplex; contrast half-duplex, in which alternate transmissions
|
||
|
||
by either end are required. NB this is terminology used in data
|
||
|
||
communications over land-lines. Just to confuse matters, radio
|
||
|
||
technology refers to simplex, when only one party can transmit at a
|
||
|
||
time and a single radio frequency is used; two-frequency-simplex or
|
||
|
||
half-duplex when only one party can speak but two frequencies are
|
||
|
||
used, as in repeater and remote base working; and full-duplex, when
|
||
|
||
both parties can speak simultaneously and two radio frequencies are
|
||
|
||
used, as in radio-telephones.
|
||
|
||
|
||
|
||
Echo
|
||
|
||
(1) When a remote computer sends back to the terminal each letter as
|
||
|
||
it is sent to it for confirming re-display locally. (2) Effect on
|
||
|
||
long comms lines caused by successive amplifications
|
||
|
||
--echo-suppressors are introduced to prevent disturbance caused by
|
||
|
||
this phenomenon, but in some data transmission the echo- suppressors
|
||
|
||
must be switched off.
|
||
|
||
|
||
|
||
** Page 121
|
||
|
||
|
||
|
||
EIA
|
||
|
||
Electronic Industries Association, US standards body.
|
||
|
||
|
||
|
||
ENQ
|
||
|
||
Non-printing character signifying 'who are you?' and often sent by
|
||
|
||
hosts as they are dialled up. When the user's terminal receives ENQ
|
||
|
||
it may be programmed to send out a password automatically.
|
||
|
||
Corresponds to <esc> E.
|
||
|
||
|
||
|
||
EOB
|
||
|
||
End Of Block--non-printing character used in some protocols, usually
|
||
|
||
in association with ACK.
|
||
|
||
|
||
|
||
Equalisation
|
||
|
||
Method of compensation for distortion over long comms channels.
|
||
|
||
|
||
|
||
FDM
|
||
|
||
Frequency Division Multiplexing--a wide bandwidth transmission
|
||
|
||
medium, e.g. coaxial cable, supports several narrow band- width
|
||
|
||
channels by differentiating by frequency; compare time division
|
||
|
||
multiplexing.
|
||
|
||
|
||
|
||
FSK
|
||
|
||
Frequency Shift Keying--a simple signalling method in which
|
||
|
||
frequencies but not phase or amplitude are varied according to
|
||
|
||
whether '1' or '0' is sent--used in low-speed asynchronous comms both
|
||
|
||
over land-line and by radio.
|
||
|
||
|
||
|
||
Handshaking
|
||
|
||
Hardware and software rules for remote devices to communicate with
|
||
|
||
each other, supervisory signals such as 'wait', 'acknowledge',
|
||
|
||
'transmit', 'ready to receive' etc.
|
||
|
||
|
||
|
||
HDLC
|
||
|
||
In packet-switching, High Level Data Link Control procedure, an
|
||
|
||
international standard which detects and corrects errors in the
|
||
|
||
stream of data between the terminal and the exchange--and to provide
|
||
|
||
flow control. Host The 'big' computer holding the information the
|
||
|
||
user wishes to retrieve.
|
||
|
||
|
||
|
||
** Page 122
|
||
|
||
|
||
|
||
Infoline
|
||
|
||
Scientific on-line service from Pergamon.
|
||
|
||
|
||
|
||
ISB
|
||
|
||
see sideband.
|
||
|
||
|
||
|
||
ISO
|
||
|
||
International Standards Organisation.
|
||
|
||
|
||
|
||
LAN
|
||
|
||
Local Area Network--normally using coaxial cable, this form of
|
||
|
||
network operates at high speed over an office or works site, but no
|
||
|
||
further. May have inter-connect facility to PTSN or PSS.
|
||
|
||
|
||
|
||
LF
|
||
|
||
Line Feed--cursor moves active position down one line--usual code is
|
||
|
||
<ctrl>J; not the same as carriage return, which merely sends cursor
|
||
|
||
to left-hand side of line it already occupies. However, in many
|
||
|
||
protocols/terminals/set-ups, hitting the <ret> or <enter> button
|
||
|
||
means both <lf> and <cr>.
|
||
|
||
|
||
|
||
Logical Channel
|
||
|
||
Apparently continuous path from one terminal to another.
|
||
|
||
|
||
|
||
LSB
|
||
|
||
see sideband.
|
||
|
||
|
||
|
||
KSR
|
||
|
||
Keyboard Send Receive--terminal with keyboard on which anything that
|
||
|
||
is typed is immediately sent. No off-line preparation facility, e.g.
|
||
|
||
teletypewriter, 'dumb' terminals.
|
||
|
||
|
||
|
||
Macro software
|
||
|
||
Facility frequently found in comms programs which permits the
|
||
|
||
preparation and sending of commonly-used strings of information,
|
||
|
||
particularly passwords and routing instructions.
|
||
|
||
|
||
|
||
Mark
|
||
|
||
One of the two conditions on a data communications line, the other
|
||
|
||
being 'space'; mark indicates 'idle' and is used as a stop bit.
|
||
|
||
|
||
|
||
** Page 123
|
||
|
||
|
||
|
||
Message switching
|
||
|
||
When a complete message is stored and then forwarded, as opposed to a
|
||
|
||
packet of information. This technique is used in some electronic mail
|
||
|
||
services, but not for general data transmission.
|
||
|
||
|
||
|
||
Modem
|
||
|
||
Modulator-demodulator.
|
||
|
||
|
||
|
||
Multiplexer
|
||
|
||
Device which divides a data channel into two or more independent
|
||
|
||
channels .
|
||
|
||
|
||
|
||
MVS
|
||
|
||
Multiple Virtual Storage--IBM operating system dating from mid-70s.
|
||
|
||
|
||
|
||
NUA
|
||
|
||
Network User Address, number by which each terminal on a
|
||
|
||
packet-switch network is identified (character terminals don't have
|
||
|
||
them individually, because they use a PAD). In PSS, it's a 10-digit
|
||
|
||
number.
|
||
|
||
|
||
|
||
NUI
|
||
|
||
Network User Identity, used in PSS for dial-up access by each user.
|
||
|
||
|
||
|
||
Octet
|
||
|
||
In packet-switching, 8 consecutive bits of user data, e.g. 1
|
||
|
||
character.
|
||
|
||
|
||
|
||
On-line service
|
||
|
||
Interrogative or query service available for dial-up. Examples
|
||
|
||
include Lockheed Dialog, Blaise, Dow Jones News Retrieval, etc;
|
||
|
||
leased-line examples include Reuters Monitor, Telerate.
|
||
|
||
|
||
|
||
Originate
|
||
|
||
Mode-setting for a modem operated by a user about to call another
|
||
|
||
computer.
|
||
|
||
|
||
|
||
OSI
|
||
|
||
Open Systems Interconnect--intended world standard for digital
|
||
|
||
network connections--c.f. SNA. Packet terminal Terminal capable of
|
||
|
||
creating and disassembling packets, interacting with a
|
||
|
||
packet-network, c.f. character terminal.
|
||
|
||
|
||
|
||
** Page 124
|
||
|
||
|
||
|
||
PAD
|
||
|
||
Packet Assembly/disassembly Device--permits 'ordinary' terminals to
|
||
|
||
connect to packet switch services by providing addressing, headers,
|
||
|
||
(and removal), protocol conversion etc.
|
||
|
||
|
||
|
||
Parity checking
|
||
|
||
Technique of error correction in which one bit is added to each data
|
||
|
||
character so that the number of bits is always even (or always odd).
|
||
|
||
|
||
|
||
PDP/8 & /11
|
||
|
||
Large family of minis, commercially very sucessful, made by DEC. the
|
||
|
||
PDP 8 was 12-bit, the PDP 11 is 16-bit. The LSI 11 have strong family
|
||
|
||
connections to the PDP 11, as have some configurations of the
|
||
|
||
desk-top Rainbow.
|
||
|
||
|
||
|
||
Polling
|
||
|
||
Method of controlling terminals on a clustered data network, where
|
||
|
||
each is called in turn by the computer to see if it wishes to
|
||
|
||
transmit or receive.
|
||
|
||
|
||
|
||
Protocol
|
||
|
||
Agreed set of rules.
|
||
|
||
|
||
|
||
PSE
|
||
|
||
Packet Switch Exchange--enables packet switching in a network.
|
||
|
||
|
||
|
||
PTSN
|
||
|
||
Public Switched Telephone Network--the voice-grade telephone network
|
||
|
||
dialled from a phone. Contrast with leased lines, digital networks,
|
||
|
||
conditioned lines etc.
|
||
|
||
|
||
|
||
PTT
|
||
|
||
jargon for the publicly-owned telecommunications authority/ utility
|
||
|
||
|
||
|
||
PVC
|
||
|
||
Permanent Virtual Circuit--a connection in packet switching which is
|
||
|
||
always open, no set-up required.
|
||
|
||
|
||
|
||
** Page 125
|
||
|
||
|
||
|
||
Redundancy checking
|
||
|
||
Method of error correction.
|
||
|
||
|
||
|
||
RS232C
|
||
|
||
The list of definitions for interchange circuit: the US term for
|
||
|
||
CCITT V24--see Appendix III.
|
||
|
||
|
||
|
||
RSX-ll
|
||
|
||
Popular operating system for PDP/11 family.
|
||
|
||
|
||
|
||
RTTY
|
||
|
||
Radio Teletype -- method of sending telegraphy over radio waves.
|
||
|
||
|
||
|
||
RUBOUT
|
||
|
||
Back-space deleting character, using <ctrl>H.
|
||
|
||
|
||
|
||
Secondary channel
|
||
|
||
Data channel, usually used for supervision, using same physical path
|
||
|
||
as main channel; in V23 which is usually 600 or 1200 baud
|
||
|
||
half-duplex, 75 baud traffic is supervisory but in viewdata is the
|
||
|
||
channel back from the user to the host, thus giving low-cost full
|
||
|
||
duplex.
|
||
|
||
|
||
|
||
Segment
|
||
|
||
Chargeable unit of volume on PSS.
|
||
|
||
|
||
|
||
Serial transmission
|
||
|
||
One bit at a time, using a single pair of wires, as opposed to
|
||
|
||
parallel transmission, in which several bits are sent simultaneously
|
||
|
||
over a ribbon cable. A serial interface often uses many more than two
|
||
|
||
wires between computer and modem or computer and printer, but only
|
||
|
||
two wires carry the data traffic, the remainder being used for
|
||
|
||
supervision, electrical power and earthing, or not at all.
|
||
|
||
|
||
|
||
Sideband
|
||
|
||
In radio the technique of suppressing the main carrier and limiting
|
||
|
||
the transmission to the information-bearing sideband. To listen at
|
||
|
||
the receiver, the carrier is re-created locally. The technique, which
|
||
|
||
produces large economies in channel occupany, is extensively used in
|
||
|
||
professional, non-broadcast applications. The full name is single
|
||
|
||
side-band, supressed carrier. Each full carrier supports two
|
||
|
||
sidebands, an upper and lower, USB and LSB respectively; in general,
|
||
|
||
USB is used for speech, LSB for data, but this is only a
|
||
|
||
convention--amateurs used LSB for speech below 10 MHz, for example.
|
||
|
||
ISB, independent side-band, is when the one carrier supports two
|
||
|
||
sidebands with separate information on them, usually speech on one
|
||
|
||
and data on the other. If you listen to radio teletype on the 'wrong'
|
||
|
||
sideband, 'mark' and 'space' values become reversed with a consequent
|
||
|
||
loss of meaning.
|
||
|
||
|
||
|
||
** Page 126
|
||
|
||
|
||
|
||
SITOR
|
||
|
||
Error-correction protocol for sending data over radio-path using
|
||
|
||
frequent checks and acknowledgements.
|
||
|
||
|
||
|
||
SNA
|
||
|
||
System Network Architecture-- IBM proprietary networking protocol,
|
||
|
||
the rival to OSI.
|
||
|
||
|
||
|
||
Space
|
||
|
||
One of two binary conditions in a data transmission channel, the
|
||
|
||
other being 'mark'. Space is binary 0.
|
||
|
||
|
||
|
||
Spooling
|
||
|
||
Simultaneous Peripheral Operation On-Line--more usually, the ability,
|
||
|
||
while accessing a database, to store all fetched information in a
|
||
|
||
local memory buffer, from which it may be recalled for later
|
||
|
||
examination, or dumped to disc or printer.
|
||
|
||
|
||
|
||
Start/Stop
|
||
|
||
Asynchronous transmission; the 'start' and 'stop' bits bracket each
|
||
|
||
data character.
|
||
|
||
|
||
|
||
Statistical Multiplexer
|
||
|
||
A statmux is an advanced multiplexer which divides one physical link
|
||
|
||
between several data channels, taking advantage of the fact that not
|
||
|
||
all channels bear equal traffic loads.
|
||
|
||
|
||
|
||
STX
|
||
|
||
Start Text--non-printing character used in some protocols.
|
||
|
||
|
||
|
||
SVC
|
||
|
||
Switched Virtual Circuit--in packet switching, when connection
|
||
|
||
between two computers or computer and terminal must be set up by a
|
||
|
||
specific call.
|
||
|
||
|
||
|
||
** Page 127
|
||
|
||
|
||
|
||
SYN
|
||
|
||
Non-printing character often used in synchronous transmission to tell
|
||
|
||
a remote device to start its local timing mechanism.
|
||
|
||
|
||
|
||
Synchronous
|
||
|
||
Data transmission in which timing information is super-imposed ~,n
|
||
|
||
pure data. Under this method 'start/stop' techniques are not used
|
||
|
||
and data exchange is more efficient, hence synchronous channel,
|
||
|
||
modem, terminal, protocol etc.
|
||
|
||
|
||
|
||
TDM
|
||
|
||
Time Division Multiplex--technique for sharing several data channels
|
||
|
||
along one high-grade physical link. Not as efficient as statistical
|
||
|
||
techniques.
|
||
|
||
|
||
|
||
Telenet
|
||
|
||
US packet-switch common carrier.
|
||
|
||
|
||
|
||
Teletex
|
||
|
||
High-speed replacement for telex, as yet to find much commercial
|
||
|
||
support.
|
||
|
||
|
||
|
||
Teletext
|
||
|
||
Use of vertical blanking interval in broadcast television to transmit
|
||
|
||
magazines of text information, e.g. BBC's Ceefax and IBA's Oracle.
|
||
|
||
|
||
|
||
Telex
|
||
|
||
Public switched low-speed telegraph network.
|
||
|
||
|
||
|
||
TOPIC
|
||
|
||
The Stock Exchange's market price display service; it comes down a
|
||
|
||
leased line and has some of the qualities of both viewdata and
|
||
|
||
teletext.
|
||
|
||
|
||
|
||
Tymnet
|
||
|
||
US packet-switch common carrier.
|
||
|
||
|
||
|
||
V-standards
|
||
|
||
Set of recommendations by CCITT--see Appendix III.
|
||
|
||
|
||
|
||
VAX
|
||
|
||
Super-mini family made by DEC; often uses Unix operating system.
|
||
|
||
|
||
|
||
** Page 128
|
||
|
||
|
||
|
||
Viewdata
|
||
|
||
Technology allowing large numbers of users to access data easily on
|
||
|
||
terminal based (originally) on modified tv sets. Information is
|
||
|
||
presented in 'page' format rather than on a scrolling screen and the
|
||
|
||
user issues all commands on a numbers-only keypad. Various standards
|
||
|
||
exist of which the UK one is so far dominant; others include the
|
||
|
||
European CEPT standard which is similar to the UK one, a French
|
||
|
||
version and the US Presentation Level Protocol. Transmission speeds
|
||
|
||
are usually 1200 baud from the host and 75 baud from the user.
|
||
|
||
Viewdata together with teletext is known jointly as videotex(t).
|
||
|
||
|
||
|
||
Virtual
|
||
|
||
In the present context, a virtual drive, store, machine etc is one
|
||
|
||
which appears to the user to exist, but is merely an illusion
|
||
|
||
generated on a computer; thus several users of IBM's VM operating
|
||
|
||
system each think they have an entire separate computer, complete
|
||
|
||
with drives, discs and other peripherals--in fact the one actual
|
||
|
||
machine can support several lower-level operating systems
|
||
|
||
simultaneously.
|
||
|
||
|
||
|
||
VT52/100
|
||
|
||
Industry-standard general purpose computer terminals with no storage
|
||
|
||
capacity or processing power but with the ability to be locally
|
||
|
||
programmed to accept a variety of asynchronous transmission
|
||
|
||
protocols--manufactured by DEC. The series has developed since the
|
||
|
||
VT100
|
||
|
||
|
||
|
||
X-standards
|
||
|
||
Set of recommendations by CCITT--see Appendix III.
|
||
|
||
|
||
|
||
XON/XOF
|
||
|
||
Pair of non-printing characters sometimes used in protocols to tell
|
||
|
||
devices when to start or stop sending. XON often corresponds to
|
||
|
||
<ctrl>Q and XOF to <ctrl>S.
|
||
|
||
|
||
|
||
80-80
|
||
|
||
Type of circuit used for telex and telegraphy--mark and space are
|
||
|
||
indicated by conditions of--or + 80 volts. Also known in the UK as
|
||
|
||
Tariff J. Usual telex speed is 50 baud, private wire telegraphy (news
|
||
|
||
agencies etc) 75 baud.
|
||
|
||
|
||
|
||
** Page 129
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX III
|
||
|
||
|
||
|
||
Selected CCITT Recommendations
|
||
|
||
|
||
|
||
V series: Data transmission over telephone circuits
|
||
|
||
V1 Power levels for data transmission over telephone lines
|
||
|
||
V3 International Alphabet No S (ASCII)
|
||
|
||
V4 General structure of signals of IA5 code for data
|
||
|
||
transmission over public telephone network
|
||
|
||
V5 Standardisation of modulation rates and data signalling
|
||
|
||
rates for synchronous transmission in general switched
|
||
|
||
network
|
||
|
||
V6 Ditto, on leased circuits
|
||
|
||
V13 Answerback simulator
|
||
|
||
V15 Use of acoustic coupling for data transmission
|
||
|
||
V19 Modems for parallel data transmission using telephone
|
||
|
||
signalling frequencies
|
||
|
||
V20 Parallel data transmission modems standardised for
|
||
|
||
universal use in the general switched telephone network
|
||
|
||
V21 200 baud modem standardised
|
||
|
||
V22 1200 bps full-duplex 2-wire modem for PTSN
|
||
|
||
V22bis 2400 bps full-duplex 2-wire modem for PTSN
|
||
|
||
V23 600/1200 bps modem for PTSN
|
||
|
||
V24 List of definitions for interchange circuits between data
|
||
|
||
terminal equipment and data circuit-terminating equipment
|
||
|
||
V25 Automatic calling and/or answering equipment on PTSN
|
||
|
||
V26 2400 bps modem on 4-wire circuit
|
||
|
||
V26bis 2400/1200 bps modem for PTSN
|
||
|
||
V27 4800 bps modem for leased circuits
|
||
|
||
V27bis 4800 bps modem (equalised) for leased circuits
|
||
|
||
V27 4800 bps modem for PTSN
|
||
|
||
V29 9600 bps modem for leased circuits
|
||
|
||
V35 Data transmission at 48 kbits/sec using 60-108 kHz band
|
||
|
||
circuits
|
||
|
||
|
||
|
||
** Page 130
|
||
|
||
|
||
|
||
X series: recommendations covering data networks
|
||
|
||
X1 International user classes of services in public data networks
|
||
|
||
X2 International user facilities in public data networks
|
||
|
||
X3 Packet assembly/disassembly facility (PAD)
|
||
|
||
X4 General structure of signals of IA5 code for transmission
|
||
|
||
over public data networks
|
||
|
||
X20 Interface between data terminal equipment and data
|
||
|
||
circuit-terminating equipment for start-stop transmission
|
||
|
||
services on public data networks
|
||
|
||
X20bis V21-compatible interface
|
||
|
||
X21 Interface for synchronous operation
|
||
|
||
X25 Interface between data terminal equipment and data
|
||
|
||
circuit-terminating equipment for terminals operating in
|
||
|
||
the packet-switch mode on public data networks
|
||
|
||
X28 DTE/DCE interface for start/stop mode terminal equipment
|
||
|
||
accessing a PAD on a public data network
|
||
|
||
X29 Procedures for exchange of control information and user
|
||
|
||
data between a packet mode DTE and a PAD
|
||
|
||
X95 Network parameters in public data networks
|
||
|
||
X96 Call progress signals in public data networks
|
||
|
||
X121 International addressing scheme for PDNs
|
||
|
||
|
||
|
||
** Page 131
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX IV
|
||
|
||
|
||
|
||
|
||
|
||
Computer Alphabets
|
||
|
||
|
||
|
||
Four alphabets are in common use for computer communications:
|
||
|
||
ASCII, also known as International Telegraphic Alphabet No 5; Baudot,
|
||
|
||
used in telex and also known as International Telegraphic Alphabet No
|
||
|
||
2; UK Standard videotex, a variant of ASCII; and EDCDIC, used by IBM.
|
||
|
||
|
||
|
||
ASCII
|
||
|
||
This is the standard, fully implemented character set. There are a
|
||
|
||
number of national variants: # in the US variant is <20> in the UK
|
||
|
||
variant. Many micro keyboards cannot generate all the characters
|
||
|
||
directly, particularly the non-printing characters used for control
|
||
|
||
of transmission, effectors of format and information separators. The
|
||
|
||
'keyboard' column gives the usual method of providing them, but you
|
||
|
||
should check the firmware/software manuals for your particular
|
||
|
||
set-up. You should also know that many of the 'spare' control
|
||
|
||
characters are often used to enable special features on printers.
|
||
|
||
|
||
|
||
HEX DEC ASCII Name Keyboard Notes
|
||
|
||
|
||
|
||
00 0 NUL Null ctrl @
|
||
|
||
01 1 SOH Start heading ctrl A
|
||
|
||
02 2 STX Start text ctrl B
|
||
|
||
03 3 ETX End text ctrl C
|
||
|
||
04 4 EOT End transmission ctrl D
|
||
|
||
05 5 ENQ Enquire ctrl E
|
||
|
||
06 6 ACK Acknowledge ctrl F
|
||
|
||
07 7 BEL Bell ctrl G
|
||
|
||
08 8 BS Backspace ctrl H or special key
|
||
|
||
09 9 HT Horizontal tab ctrl I or special key
|
||
|
||
OA 10 LF Line feed ctrl J
|
||
|
||
OB 11 VT Vertical tab ctrl K
|
||
|
||
0C 12 FF Form feed ctrl L
|
||
|
||
|
||
|
||
** Page 132
|
||
|
||
|
||
|
||
OD 13 CR Carriage return ctrl M or special key
|
||
|
||
OE 14 SO Shift out ctrl N
|
||
|
||
OF 15 Sl Shift in ctrl O
|
||
|
||
10 16 DLE Data link escape ctrl P
|
||
|
||
11 17 DC1 Device control 1 ctrl Q also XON
|
||
|
||
12 18 DC2 Device control 2 ctrl R
|
||
|
||
13 19 DC3 Device control 3 ctrl S also XOF
|
||
|
||
14 20 DC4 Device control 4 ctrl T
|
||
|
||
15 21 NAK Negative acknowledge ctrl U
|
||
|
||
16 22 SYN Synchronous Idle ctrl V
|
||
|
||
17 23 ETB End trans. block ctrl W
|
||
|
||
18 24 CAN Cancel ctrl X
|
||
|
||
19 25 EM End medium ctrl Y
|
||
|
||
1A 26 SS Special sequence ctrl Z spare
|
||
|
||
1B 27 ESC Escape check manuals to
|
||
|
||
transmit
|
||
|
||
1C 28 FS File separator
|
||
|
||
1D 29 GS Group separator
|
||
|
||
1E 30 RS Record separator
|
||
|
||
1F 31 US Unit separator
|
||
|
||
20 32 SP Space
|
||
|
||
21 33 ~
|
||
|
||
22 34 "
|
||
|
||
23 35 # <20>
|
||
|
||
24 36 $
|
||
|
||
25 37 %
|
||
|
||
26 38 &
|
||
|
||
27 39 ' Apostrophe
|
||
|
||
28 40 (
|
||
|
||
29 41 )
|
||
|
||
2A 42 ~
|
||
|
||
2B 43 +
|
||
|
||
2C 44 , Comma
|
||
|
||
2D 45 -
|
||
|
||
2E 46 . Period
|
||
|
||
2F 47 / Slash
|
||
|
||
30 48 0
|
||
|
||
31 49 1
|
||
|
||
32 50 2
|
||
|
||
33 51 3
|
||
|
||
34 52 4
|
||
|
||
35 53 5
|
||
|
||
36 54 6
|
||
|
||
37 55 7
|
||
|
||
|
||
|
||
** Page 133
|
||
|
||
|
||
|
||
38 56 8
|
||
|
||
39 57 9
|
||
|
||
3A 58 : Colon
|
||
|
||
3B 59 ; Semicolon
|
||
|
||
3C 60 <
|
||
|
||
3D 61
|
||
|
||
3E 62 >
|
||
|
||
3F 63 ?
|
||
|
||
40 64 @
|
||
|
||
41 65 A
|
||
|
||
42 66 B
|
||
|
||
43 67 C
|
||
|
||
44 68 D
|
||
|
||
45 69 E
|
||
|
||
46 70 F
|
||
|
||
47 71 G
|
||
|
||
48 72 H
|
||
|
||
49 73 1
|
||
|
||
4A 74 J
|
||
|
||
4B 75 K
|
||
|
||
4C 76 L
|
||
|
||
4D 77 M
|
||
|
||
4E 78 N
|
||
|
||
4F 79 O
|
||
|
||
50 80 P
|
||
|
||
51 81 Q
|
||
|
||
52 82 R
|
||
|
||
53 83 S
|
||
|
||
54 84 T
|
||
|
||
55 85 U
|
||
|
||
56 86 V
|
||
|
||
57 87 W
|
||
|
||
58 88 X
|
||
|
||
59 89 Y
|
||
|
||
5A 90 Z
|
||
|
||
5B 91 [
|
||
|
||
5C 92 \ Backslash
|
||
|
||
5D 93 1
|
||
|
||
5E 94 ^ Circumflex
|
||
|
||
5F 95 _ Underscore
|
||
|
||
60 96 Grave accent
|
||
|
||
61 97 a
|
||
|
||
62 98 b
|
||
|
||
|
||
|
||
** Page 134
|
||
|
||
|
||
|
||
63 99 c
|
||
|
||
64 100 d
|
||
|
||
65 101 e
|
||
|
||
66 102 f
|
||
|
||
67 103 9
|
||
|
||
68 104 h
|
||
|
||
69 105 i
|
||
|
||
6A 106 j
|
||
|
||
6B 107 k
|
||
|
||
6C 108 l
|
||
|
||
6D 109 m
|
||
|
||
6E 110 n
|
||
|
||
6F 111 o
|
||
|
||
70 112 p
|
||
|
||
71 113 q
|
||
|
||
72 114 r
|
||
|
||
73 115 s
|
||
|
||
74 116 t
|
||
|
||
75 117 u
|
||
|
||
76 118 v
|
||
|
||
77 119 w
|
||
|
||
78 120 x
|
||
|
||
79 121 y
|
||
|
||
7A 122 z
|
||
|
||
7B 123 {
|
||
|
||
7C 124
|
||
|
||
7D 125 }
|
||
|
||
7E 126 ~ Tilde
|
||
|
||
7F 127 DEL Delete
|
||
|
||
|
||
|
||
Baudot
|
||
|
||
This is the telex/telegraphy code known to the CCITT as International
|
||
|
||
Alphabet No 2. It is essentially a 5-bit code, bracketed by a start
|
||
|
||
bit (space) and a stop bit (mark). Idling is shown by 'mark'. The
|
||
|
||
code only supports capital letters, figure and two 'supervisory'
|
||
|
||
codes: 'Bell' to warn the operator at the far end and 'WRU'--'Who are
|
||
|
||
you?' to interrogate the far end 'Figures' changes all characters
|
||
|
||
received after to their alternates and 'Letters' switches back. The
|
||
|
||
letters/figures shift is used to give the entire character set.
|
||
|
||
|
||
|
||
** Page 135
|
||
|
||
|
||
|
||
Viewdata
|
||
|
||
This is the character set used by the UK system, which is the most
|
||
|
||
widely used, world-wide. The character-set has many features in
|
||
|
||
common with ASCII but also departs from it in significant ways,
|
||
|
||
notably to provide various forms of graphics, colour controls,
|
||
|
||
screen-clear (ctrl L) etc. The set is shared with teletext which in
|
||
|
||
itself requires further special codes, e.g. to enable sub-titling to
|
||
|
||
broadcast television, news flash etc. If you are using proper
|
||
|
||
viewdata software, then everything will display properly; if you are
|
||
|
||
using a conventional terminal emulator then the result may look
|
||
|
||
confusing. Each character consists of 10 bits:
|
||
|
||
|
||
|
||
Start binary 0
|
||
|
||
7 bits of character code
|
||
|
||
Parity bit even
|
||
|
||
Stop binary 1
|
||
|
||
|
||
|
||
ENQ (Ctrl E) is sent by the host on log-on to initiate the
|
||
|
||
auto-log-on from the user's terminal. If no response is obtained, the
|
||
|
||
user is requested to input the password manually. Each new page
|
||
|
||
sequence opens with a clear screen instruction (Ctrl L, CHR$12)
|
||
|
||
followed by a home (Ctrl M, CHR$14).
|
||
|
||
|
||
|
||
Some viewdata services are also available via standard asynchronous
|
||
|
||
300/300 ports (Prestel is, for example); in these cases, the graphics
|
||
|
||
characters are stripped out and replaced by ****s; and the pages will
|
||
|
||
scroll up the screen rather than present themselves in the
|
||
|
||
frame-by-frame format.
|
||
|
||
|
||
|
||
** Page 136
|
||
|
||
|
||
|
||
*** Original contains a diagram of Viewdata Graphic Character Set.
|
||
|
||
|
||
|
||
** Page 137
|
||
|
||
|
||
|
||
If you wish to edit to a viewdata system using a normal keyboard,
|
||
|
||
or view a viewdata stream as it comes from a host using
|
||
|
||
'control-show' facilities, the table below gives the usual
|
||
|
||
equivalents. The normal default at the left-hand side of each line is
|
||
|
||
alphanumeric white. Each subsequent 'attribute', i.e. if you wish to
|
||
|
||
change to colour, or a variety of graphics, occupies a character
|
||
|
||
space. Routing commands and signals to start and end edit depend on
|
||
|
||
the software installed on the viewdata host computer: in Prestel
|
||
|
||
compatible systems, the edit page is *910#, options must be entered
|
||
|
||
in lower case letters and end edit is called by <esc>K.
|
||
|
||
|
||
|
||
esc A alpha red esc Q graphics red
|
||
|
||
esc B alpha green esc R graphics green
|
||
|
||
esc C alpha yellow esc S graphics yellow
|
||
|
||
esc D alpha blue esc T graphics blue
|
||
|
||
esc E alpha magenta esc U graphics magenta
|
||
|
||
esc F alpha cyan esc V graphics cyan
|
||
|
||
esc G alpha white esc W graphics white
|
||
|
||
esc H flash esc I steady
|
||
|
||
esc L normal height esc M double height
|
||
|
||
esc Y contiguous graphics esc Z separated graphics
|
||
|
||
|
||
|
||
esc ctrl D black background esc-shift M new background
|
||
|
||
(varies)
|
||
|
||
esc J start edit esc K end edit
|
||
|
||
|
||
|
||
EBCDIC
|
||
|
||
The Extended Binary Coded Decimal Interchange Code is a 256-state
|
||
|
||
8-bit extended binary coded digit code employed by IBM for internal
|
||
|
||
purposes and is the only important exception to ASCII. Not all 256
|
||
|
||
codes are utilised, being reserved for future expansion, and a number
|
||
|
||
are specially identified for application- specific purposes. In
|
||
|
||
transmission, it is usual to add a further digit for parity checking.
|
||
|
||
Normally the transmission mode is synchronous, so there are no
|
||
|
||
'start' and 'stop' bits. The table shows how EBCDIC compares with
|
||
|
||
ASCII of the same bit configuration.
|
||
|
||
|
||
|
||
** Page 138
|
||
|
||
|
||
|
||
IBM control characters:
|
||
|
||
|
||
|
||
EBCDIC bits Notes
|
||
|
||
|
||
|
||
NUL 0000 0000 Nul
|
||
|
||
SOH 0000 0001 Start of Heading
|
||
|
||
STX 0000 0010 Start of Text
|
||
|
||
ETX 0000 0011 End of Text
|
||
|
||
PF 0000 0100 Punch Off
|
||
|
||
HT 0000 0101 Horizontal Tab
|
||
|
||
LC 0000 0110 Lower Case
|
||
|
||
DEL 0000 0111 Delete
|
||
|
||
0000 1000
|
||
|
||
RLF 0000 1001 Reverse Line Feed
|
||
|
||
SMM 0000 1010 Start of Manual Message
|
||
|
||
VT 0000 1011 Vertical Tab
|
||
|
||
FF 0000 1100 Form Feed
|
||
|
||
CR 0000 1101 Carriage Return
|
||
|
||
SO 0000 1110 Shift Out
|
||
|
||
Sl 0000 1111 Shift In
|
||
|
||
DLE 0001 0000 Data Link Exchange
|
||
|
||
DC1 0001 0001 Device Control 1
|
||
|
||
DC2 0001 0010 Device Control 2
|
||
|
||
TM 0001 0011 Tape Mark
|
||
|
||
RES 0001 0100 Restore
|
||
|
||
NL 0001 0101 New Line
|
||
|
||
BS 0001 0110 Back Space
|
||
|
||
IL 0001 0111 Idle
|
||
|
||
CAN 0001 1000 Cancel
|
||
|
||
EM 0001 1001 End of Medium
|
||
|
||
CC 0001 1010 Cursor Control
|
||
|
||
CU1 0001 1011 Customer Use 1
|
||
|
||
IFS 0001 1100 Interchange File Separator
|
||
|
||
IGS 0001 1101 Interchange Group Separator
|
||
|
||
IRS 0001 1110 Interchange Record Separator
|
||
|
||
IUS 0001 1111 Interchange Unit Separator
|
||
|
||
DS 0010 0000 Digit Select
|
||
|
||
SOS 0010 0001 Start of Significance
|
||
|
||
FS 0010 0010 Field Separator
|
||
|
||
0010 0011
|
||
|
||
BYP 0010 0100 Bypass
|
||
|
||
LF 0010 0101 Line Feed
|
||
|
||
ETB 0010 0110 End of Transmission Block
|
||
|
||
|
||
|
||
** Page 139
|
||
|
||
|
||
|
||
EBCDIC bits Notes
|
||
|
||
ESC 0010 0111 Escape
|
||
|
||
0010 1000
|
||
|
||
0010 1001
|
||
|
||
SM 0010 1010 Set Mode
|
||
|
||
CU2 0010 1011 Customer Use 1
|
||
|
||
0010 1100
|
||
|
||
ENQ 0010 1101 Enquiry
|
||
|
||
ACK 0010 1110 Acknowledge
|
||
|
||
BEL 0010 1111 Bell
|
||
|
||
0011 0000
|
||
|
||
0011 0001
|
||
|
||
SYN 0011 0010 Synchronous Idle
|
||
|
||
0011 0011
|
||
|
||
PN 0011 0100 Punch On
|
||
|
||
RS 0011 0101 Reader Stop
|
||
|
||
UC 0011 0110 Upper Case
|
||
|
||
EOT 0011 0111 End of Transmission
|
||
|
||
0011 1000
|
||
|
||
0011 1001
|
||
|
||
0011 1010
|
||
|
||
CU3 0011 1011 Customer Use 3
|
||
|
||
DC4 0011 1100 Device Control 4
|
||
|
||
NAK 0011 1101 Negative Acknowledge
|
||
|
||
0011 1110
|
||
|
||
SUB 0011 1111 Substitute
|
||
|
||
SP 0100 0000 Space
|
||
|
||
|
||
|
||
** Page 140
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX V
|
||
|
||
|
||
|
||
|
||
|
||
Modems and Services
|
||
|
||
|
||
|
||
The table below shows all but two of the types of service you are likely to
|
||
|
||
come across; V-designators are the world-wide 'official names given by the
|
||
|
||
CCITT; Bell-designators are the US names:
|
||
|
||
|
||
|
||
Service Speed Duplex Transmit Receive Answer
|
||
|
||
Designator 0 1 0 1
|
||
|
||
|
||
|
||
V21 orig 300(*) full 1180 980 1850 1650 -
|
||
|
||
V21 ans 300(*) full 1850 1650 1180 980 2100
|
||
|
||
V23 (1) 600 half 1700 1300 1700 1300 2100
|
||
|
||
V23 (2) 1200 f/h(**) 2100 1300 2100 1300 2100
|
||
|
||
V23 back 75 f/h(**) 450 390 450 390 -
|
||
|
||
Bell 103 orig 300(*) full 1070 1270 2025 2225 -
|
||
|
||
Bell 103 ans 300(*) full 2025 2225 1070 1270 2225
|
||
|
||
Bell 202 1200 half 2200 1200 2200 1200 2025
|
||
|
||
|
||
|
||
(*)any speed up to 300 baud, can also include 75 and 110 baud
|
||
|
||
services
|
||
|
||
|
||
|
||
(**)service can either be half-duplex at 1200 baud or asymmetrical
|
||
|
||
full duplex, with 75 baud originate and 1200 baud receive (commonly
|
||
|
||
used as viewdata user) or 1200 transmit and 75 receive (viewdata
|
||
|
||
host)
|
||
|
||
|
||
|
||
The two exceptions are:
|
||
|
||
V22 1200 baud full duplex, two wire
|
||
|
||
Bell 212A The US equivalent
|
||
|
||
Both these services operate by detecting phase as well as tone.
|
||
|
||
|
||
|
||
British Telecom markets the UK services under the name of Datel as
|
||
|
||
follows--for simplicity The list covers only those services which use
|
||
|
||
the PTSN or are otherwise easily accessible--4-wire services, for
|
||
|
||
example are excluded.
|
||
|
||
|
||
|
||
** Page 141
|
||
|
||
|
||
|
||
Datel Speed Mode Remarks
|
||
|
||
|
||
|
||
100(H) 50 async Teleprinters, Baudot code
|
||
|
||
100(J) 75-110 async News services etc, Baudot code
|
||
|
||
50 async Telex service, Baudot code
|
||
|
||
200 300 async full duplex, ASCII
|
||
|
||
400 600 Hz async out-station to in-station only
|
||
|
||
600 1200 async several versions exist--for 1200
|
||
|
||
half-duplex; 75/1200 for viewdata
|
||
|
||
users; 1200/75forviewdata hosts; and
|
||
|
||
a rare 600 variant. The 75 speed is
|
||
|
||
technically only for supervision but
|
||
|
||
gives asymetrical duplex
|
||
|
||
|
||
|
||
BT has supplied the following modems for the various services-- the
|
||
|
||
older ones are now available on the 'second-user' market:
|
||
|
||
|
||
|
||
Modem No Remarks
|
||
|
||
|
||
|
||
1200 half-duplex--massive
|
||
|
||
2 300 full-duplex--massive
|
||
|
||
11 4800 synchronous--older type
|
||
|
||
12 2400/1200 synchronous
|
||
|
||
13 300 full-duplex--plinth type
|
||
|
||
20(1) 1200 half-duplex--'shoe-box' style
|
||
|
||
(2) 1200/75 asymetrical duplex--'shoe-box' style
|
||
|
||
(3) 75/1200 asymetrical duplex--'shoe-box' style
|
||
|
||
21 300 full-duplex--modern type
|
||
|
||
22 1200 half-duplex--modern type
|
||
|
||
24 4800 synchronous--modern type (made by Racal)
|
||
|
||
27A 1200 full duplex, sync or async (US made &
|
||
|
||
modified from Bell 212A to CCITT tones)
|
||
|
||
27B 1200 full duplex, sync or async (UK made)
|
||
|
||
|
||
|
||
You should note that some commercial 1200/1200 full duplex modems
|
||
|
||
also contain firmware providing ARQ error correction protocols;
|
||
|
||
modems on both ends of the line must have the facilities, of course.
|
||
|
||
|
||
|
||
** Page 142
|
||
|
||
|
||
|
||
|
||
|
||
BT Line Connectors
|
||
|
||
|
||
|
||
Modems can be connected directly to the BT network ('hard- wired')
|
||
|
||
simply by identifying the pair that comes into the building. Normally
|
||
|
||
the pair you want are the two outer wires in a standard 4 x 2 BT
|
||
|
||
junction box. (The other wires are the 'return' or to support a
|
||
|
||
'ringing' circuit.)
|
||
|
||
|
||
|
||
A variety of plugs and sockets have been used by BT. Until
|
||
|
||
recently, the standard connector for a modem was a 4-ring jack, type
|
||
|
||
505, to go into a socket 95A. Prestel equipment was terminated into a
|
||
|
||
similar jack, this time with 5 rings, which went into a socket type
|
||
|
||
96A. However, now all phones, modems, viewdata sets etc, are
|
||
|
||
terminated in the identical modular jack, type 600. The corresponding
|
||
|
||
sockets need special tools to insert the line cable into the
|
||
|
||
appropriate receptacles.
|
||
|
||
|
||
|
||
Whatever other inter-connections you see behind a socket, the two
|
||
|
||
wires of the twisted pair are the ones found in the centres of the
|
||
|
||
two banks of receptacles. North America also now uses a modular jack
|
||
|
||
and socket system, but not one which is physically compatible with UK
|
||
|
||
designs...did you expect otherwise?
|
||
|
||
|
||
|
||
** Page 143
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX VI
|
||
|
||
|
||
|
||
|
||
|
||
The Radio Spectrum
|
||
|
||
|
||
|
||
The table gives the allocation of the radio frequency spectrum up
|
||
|
||
30 MHz. The bands in which radio-teletype and radio-data traffic are
|
||
|
||
most common are those allocated to 'fixed' services, but data traffic
|
||
|
||
is also found in the amateur and maritime bands.
|
||
|
||
|
||
|
||
LF,MF,HF, RADIO FREQUENCY SPECTRUM TABLE
|
||
|
||
|
||
|
||
9 -- 14 Radionavigation
|
||
|
||
14 -- 19.95 Fixed/Maritime mobile
|
||
|
||
20 Standard Frequency & Time
|
||
|
||
20.05 -- 70 Fixed & Maritime mobile
|
||
|
||
70 -- 90 Fixed/Maritime mobile/Radionavigation
|
||
|
||
90 -- 110 Radionavigation
|
||
|
||
|
||
|
||
110 -- 130 Fixed/Maritime mobile/Radionavigation
|
||
|
||
130 -- 148.5 Maritime mobile/Fixed
|
||
|
||
148.5 -- 255 Broadcasting
|
||
|
||
255 -- 283.5 Broadcasting/Radionavigation(aero)
|
||
|
||
283.5 -- 315 Maritime/Aeronautical navigation
|
||
|
||
|
||
|
||
315 -- 325 Aeronautical radionavigation/Maritime
|
||
|
||
radiobeacons
|
||
|
||
325 -- 405 Aeronautical radionavigation
|
||
|
||
405 -- 415 Radionavigation (410 = DF)
|
||
|
||
415 -- 495 Aeronautical radionavigation/Maritime mobile
|
||
|
||
495 -- 505 Mobile (distress & calling) > 500:cw&rtty
|
||
|
||
|
||
|
||
505 -- 526.5 Maritime mobile/Aeronautical navigation
|
||
|
||
526.5 -- 1606.5 Broadcasting
|
||
|
||
1606.5 -- 1625 Maritime mobile/Fixed/Land mobile
|
||
|
||
1625 -- 1635 Radiolocation
|
||
|
||
1635 -- 1800 Maritime mobile/Fixed/Land mobile
|
||
|
||
1800 -- 1810 Radiolocation
|
||
|
||
1810 -- 1850 Amateur
|
||
|
||
1850 -- 2000 Fixed/Mobile
|
||
|
||
|
||
|
||
** Page 144
|
||
|
||
|
||
|
||
2000 -- 2045 Fixed/Mobile
|
||
|
||
2045 -- 2160 Maritime mobile/Fixed/Land mobile
|
||
|
||
2160 -- 2170 Radiolocation
|
||
|
||
2170 -- 2173.5 Maritime mobile
|
||
|
||
2173.5 -- 2190.5 Mobile (distress & calling) >2182--voice
|
||
|
||
2190.5 -- 2194 Maritime & Mobile
|
||
|
||
2194 -- 2300 Fixed & Mobile
|
||
|
||
2300 -- 2498 Fixed/Mobile/Broadcasting
|
||
|
||
2498 -- 2502 Standard Frequency & Time
|
||
|
||
2502 -- 2650 Maritime mobile/Maritime radionavigation
|
||
|
||
2650 -- 2850 Fixed/Mobile
|
||
|
||
2850 -- 3025 Aeronautical mobile (R)
|
||
|
||
3025 -- 3155 Aeronautical mobile (OR)
|
||
|
||
3155 -- 3200 Fixed/Mobile/Low power hearing aids
|
||
|
||
3200 -- 3230 Fixed/Mobile/Broadcasting
|
||
|
||
3230 -- 3400 Fixed/Mobile/Broadcasting
|
||
|
||
3400 -- 3500 Aeronautical mobile (R)
|
||
|
||
3500 -- 3800 Amateur/Fixed/Mobile
|
||
|
||
3800 -- 3900 Fixed/Aeronautical mobile (OR)
|
||
|
||
3900 -- 3930 Aeronautical mobile (OR)
|
||
|
||
3930 -- 4000 Fixed/Broadcasting
|
||
|
||
|
||
|
||
4000 -- 4063 Fixed/Maritime mobile
|
||
|
||
4063 -- 4438 Maritime mobile
|
||
|
||
4438 -- 4650 Fixed/Mobile
|
||
|
||
4650 -- 4700 Aeronautical mobile (R)
|
||
|
||
4700 -- 4750 Aeronautical mobile (OR)
|
||
|
||
|
||
|
||
4750 -- 4850 Fixed/Aeronautical mobile (OR)/
|
||
|
||
Land mobile/Broadcasting
|
||
|
||
4850 -- 4995 Fixed/Land mobile/Broadcasting
|
||
|
||
|
||
|
||
4995 -- 5005 Standard Frequency & Time
|
||
|
||
5005 -- 5060 Fixed/Broadcasting
|
||
|
||
5060 -- 5450 Fixed/Mobile
|
||
|
||
5450 -- 5480 Fixed/Aeronautical mobile (OR)/Land mobile
|
||
|
||
5480 -- 5680 Aeronautical mobile (R)
|
||
|
||
5680 -- 5730 Aeronautical mobile (OR)
|
||
|
||
5730 -- 5950 Fixed/Land mobile
|
||
|
||
|
||
|
||
5950 -- 6200 Broadcasting
|
||
|
||
6200 -- 6525 Maritime mobile
|
||
|
||
6525 -- 6685 Aeronautical mobile (R)
|
||
|
||
6685 -- 6765 Aeronautical mobile ~OR)
|
||
|
||
6765 -- 6795 Fixed/lSM
|
||
|
||
|
||
|
||
7000 -- 7100 Amateur
|
||
|
||
7100 -- 7300 Broadcasting
|
||
|
||
7300 -- 8100 Maritime mobile
|
||
|
||
|
||
|
||
** Page 145
|
||
|
||
|
||
|
||
8100 -- 8195 Fixed/Maritime mobile
|
||
|
||
8195 -- 8815 Maritime mobile
|
||
|
||
|
||
|
||
8815 -- 8965 Aeronautical mobile (R)
|
||
|
||
8965 -- 9040 Aeronautical mobile ~OR)
|
||
|
||
9040 -- 9500 Fixed
|
||
|
||
9500 -- 9900 Broadcasting
|
||
|
||
ggoo -- 9995 Fixed
|
||
|
||
|
||
|
||
9995 -- 10005 Standard Frequency & Time
|
||
|
||
10005 -- 10100 Aeronautical mobile (R)
|
||
|
||
10100 -- 10150 Fixed/Amateur(sec)
|
||
|
||
10150 -- 11175 Fixed
|
||
|
||
11175 -- 11275 Aeronautical mobile (OR)
|
||
|
||
11275 -- 11400 Aeronautical mobile (R)
|
||
|
||
11400 -- 11650 Fixed
|
||
|
||
|
||
|
||
11650 -- 12050 Broadcasting
|
||
|
||
2050 -- 12230 Fixed
|
||
|
||
12230 -- 13200 Maritime mobile
|
||
|
||
|
||
|
||
13200 -- 13260 Aeronautical mobile (OR)
|
||
|
||
13260 -- 13360 Aeronautical mobile (R)
|
||
|
||
13360 -- 13410 Fixed/Radio Astronomy
|
||
|
||
13410 -- 13600 Fixed
|
||
|
||
13600 -- 13800 Broadcasting
|
||
|
||
13800 -- 14000 Fixed
|
||
|
||
|
||
|
||
14000 -- 14350 Amateur
|
||
|
||
14350 -- 14990 Fixed
|
||
|
||
|
||
|
||
14990 -- 15010 Standard Frequency & Time
|
||
|
||
15010 -- 15100 Aeronautical mobile (OR)
|
||
|
||
15100 -- 15600 Broadcasting
|
||
|
||
15600 -- 16360 Fixed
|
||
|
||
|
||
|
||
16360 -- 17410 Maritime mobile
|
||
|
||
17410 -- 17550 Fixed
|
||
|
||
17550 -- 17900 Broadcasting
|
||
|
||
17900 -- 17970 Aeronautical mobile (R)
|
||
|
||
17970 -- 18030 Aeronautical mobile (OR)
|
||
|
||
|
||
|
||
18030 -- 18052 Fixed
|
||
|
||
18052 -- 18068 Fixed/Space Research
|
||
|
||
18068 -- 18168 Amateur
|
||
|
||
18168 -- 18780 Fixed
|
||
|
||
18780 -- 18900 Maritime mobile
|
||
|
||
18900 -- 19680 Fixed
|
||
|
||
|
||
|
||
** Page 146
|
||
|
||
|
||
|
||
19680 -- 19800 Maritime mobile
|
||
|
||
19800 -- 19990 Fixed
|
||
|
||
19990 -- 20010 Standard Frequency & Time
|
||
|
||
20010 -- 21000 Fixed
|
||
|
||
21000 -- 21450 Amateur
|
||
|
||
21450 -- 21850 Broadcasting
|
||
|
||
21850 -- 21870 Fixed
|
||
|
||
21870 -- 21924 Aeronautical fixed
|
||
|
||
21924 -- 22000 Aeronautical (R)
|
||
|
||
22000 -- 22855 Maritime mobile
|
||
|
||
22855 -- 23200 Fixed
|
||
|
||
23200 -- 23350 Aeronautical fixed & mobile (R)
|
||
|
||
23350 -- 24000 Fixed/Mobile
|
||
|
||
24000 -- 24890 Fixed/Land mobile
|
||
|
||
24890 -- 24990 Amateur
|
||
|
||
24990 -- 25010 Standard Frequency & Time
|
||
|
||
25010 -- 25070 Fixed/Mobile
|
||
|
||
25070 -- 25210 Maritime mobile
|
||
|
||
25210 -- 25550 Fixed/Mobile
|
||
|
||
25550 -- 25670 Radio Astronomy
|
||
|
||
25670 -- 26100 Broadcasting
|
||
|
||
26100 -- 26175 Maritime mobile
|
||
|
||
26175 -- 27500 Fixed/Mobile (CB) (26.975-27.2835 ISM)
|
||
|
||
27500 -- 28000 Meteorological aids/Fixed/Mobile (CB)
|
||
|
||
28000 -- 29700 Amateur
|
||
|
||
29700 -- 30005 Fixed/Mobile
|
||
|
||
|
||
|
||
Note: These allocations are as they apply in Europe, slight variations occur
|
||
|
||
in other regions of the globe.
|
||
|
||
|
||
|
||
** Page 147
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX VII
|
||
|
||
|
||
|
||
Port-finder Flowchart
|
||
|
||
|
||
|
||
This flow-chart will enable owners of auto-diallers to carry out
|
||
|
||
an automatic search of a range of telephone numbers to determine
|
||
|
||
which of them have modems hanging off the back.
|
||
|
||
|
||
|
||
It's a flow-chart and not a program listing, because the whole
|
||
|
||
exercise is very hardware dependent: you will have to determine what
|
||
|
||
sort of instructions your auto-modem will accept, and in what form;
|
||
|
||
you must also see what sort of signals it can send back to your
|
||
|
||
computer so that your program can 'read' them.
|
||
|
||
|
||
|
||
You will also need to devise some ways of sensing the phone line,
|
||
|
||
whether it has been seized, whether you are getting 'ringing', if
|
||
|
||
there is an engaged tone, a voice, a number obtainable tone, or a
|
||
|
||
modem whistle. Line seizure detect, if not already available on your
|
||
|
||
modem, is simply a question of reading the phone line voltage; the
|
||
|
||
other conditions can be detected with simple tone decoder modules
|
||
|
||
based on the 567 chip.
|
||
|
||
|
||
|
||
The lines from these detectors should then be brought to a A/D
|
||
|
||
board which your computer software can scan and read.
|
||
|
||
|
||
|
||
** End of File
|
||
|
||
:-)om these detectors should then be brought to
|