1711 lines
66 KiB
Plaintext
1711 lines
66 KiB
Plaintext
|
||
|
||
===== Phrack Magazine presents Phrack 16 =====
|
||
===== File 1 of 12 : Phrack 16 Intro =====
|
||
|
||
Greetings, and welcome to Phrack #16, we are a bit late, but bigger
|
||
then ever. I think you will find this issue very interesting.
|
||
Enjoy and have Phun
|
||
|
||
Elric of Imrryr - Editor
|
||
|
||
|
||
Contents this issue:
|
||
|
||
16.1 Phrack 16 Intro by Elric of Imrryr 2K
|
||
16.2 BELLCORE Information by The Mad Phone-Man 11K
|
||
16.3 A Hacker's Guide to Primos: Part 1 by Cosmos Kid 11K
|
||
16.4 Hacking GTN by The Kurgan 7K
|
||
16.5 Credit Card Laws Laws by Tom Brokow 7K
|
||
16.6 Tapping Telephone Lines by Agent Steal 9K
|
||
16.7 Reading Trans-Union Credit Reports by The Disk Jockey 6K
|
||
|
||
Phrack World News:
|
||
|
||
16.8 The Story Of the West German Hackers by Shooting Shark 3K
|
||
16.9 The Mad Phone-Man and the Gestapo by The Mad Phone-Man 2K
|
||
16.10 Flight of the Mad Phone-Man by The Mad Phone-Man 2K
|
||
16.11 Shadow Hawk Busted Again by Shooting Shark 2K
|
||
16.12 Coin Box Thief Wanted by The $muggler 2K
|
||
|
||
|
||
|
||
Submission to Phrack may be sent to the following BBSes:
|
||
|
||
Unlimited Reality 313-489-0747 Phrack
|
||
The Free World 301-668-7657 Phrack Inc. (*)
|
||
The Executive Inn 915-581-5145 Phrack
|
||
Lunatic Labs UnLtd. 415-278-7421 Phrack (*)
|
||
House of the Rising Sun 401-789-1809 Phrack
|
||
|
||
|
||
* You will get the quickest reply from these systems.
|
||
|
||
|
||
===== Phrack Magazine presents Phrack 16 =====
|
||
===== File 2 of 12 =====
|
||
|
||
--------------------------------------------------------------------
|
||
BELLCORE Information by The Mad Phone-man
|
||
--------------------------------------------------------------------
|
||
|
||
So, you've broken into the big phone box on the wall, and are looking at a
|
||
bunch of tags with numbers and letters on them. Which one is the modem line?
|
||
Which one is the 1-800 WATS line? Which one is the Alarm line? Bell has a
|
||
specific set of codes that enable you to identify what you're looking at.
|
||
These are the same codes the installer gets from the wire center to enable him
|
||
to set up the line, test it, and make sure it matches the customers order.
|
||
Here are some extracts from the Bellcore book.
|
||
|
||
First lets take a hypothetical line number I'm familiar with:
|
||
64FDDV 123456
|
||
-------------------------------------------------------------
|
||
The serial number format:
|
||
|
||
Prefix + service code + modifier + serial number +
|
||
digits: 1,2 3,4 5,6 7,8,9,10,11,12 continued
|
||
-------------------------------------------------------------------------
|
||
|
||
Suffix + CO assigning circuit number + segment
|
||
digits: 13,14,15 16,17,18,19 20,21,22
|
||
-------------------------------------------------------------------------
|
||
|
||
The important shit is in the 3rd thru 6th digit.
|
||
|
||
SERVICE CODES Intra or Inter LATA Block 1-26
|
||
-------------
|
||
AA- Packet analog access line
|
||
AB- Packet switch trunk
|
||
AD- Attendant
|
||
AF- Commercial audio fulltime
|
||
AI- Automatic identified outward dialing
|
||
AL- Alternate services
|
||
AM- Packet, off-network access line
|
||
AN- Announcement service
|
||
AO- International/Overseas audio (full time)
|
||
AP- Commercial audio (part time)
|
||
AT- International/Overseas audio (part time)
|
||
AU- Autoscript
|
||
BA- Protective alarm (CD)
|
||
BL- Bell & lights
|
||
BS- Siren control
|
||
CA- SSN Access
|
||
CB- OCC Audio facilities
|
||
CC- OCC Digital facility-medium speed
|
||
CE- SSN Station line
|
||
CF- OCC Special facility
|
||
CG- OCC Telegraph facility
|
||
CH- OCC Digital facility high-speed
|
||
CI- Concentrator Identifier trunk
|
||
CJ- OCC Control facility
|
||
CK- OCC Overseas connecting facility wide-band
|
||
CL- Centrex CO line
|
||
CM- OCC Video facility
|
||
CN- SSN Network trunk
|
||
CO- OCC Overseas connecting facility
|
||
CP- Concentrator identifier signaling link
|
||
CR- OCC Backup facility
|
||
CS- Channel service
|
||
CT- SSN Tie trunk
|
||
CV- OCC Voice grade facility
|
||
CW- OCC Wire pair facility
|
||
CZ- OCC Access facility
|
||
DA- Digital data off-net extension
|
||
DB- HSSDS 1.5 mb/s access line
|
||
DF- HSSDS 1.5 mb/s hub to hub
|
||
DG- HSSDS 1.5 mb/s hub to earth station
|
||
DH- Digital service
|
||
DI- Direct-in dial
|
||
DJ- Digit trunk
|
||
DK- Data link
|
||
DL- Dictation line
|
||
DO- Direct-out dial
|
||
DP- Digital data-2 4 kb/s
|
||
DQ- Digital data-4 8 kb/s
|
||
DR- Digital data-9.6 kb/s
|
||
DW- Digital data-56 kb/s
|
||
DY- Digital service (under 1 mb/s)
|
||
EA- Switched access
|
||
EB- ENFIA II end office trunk
|
||
EC- ENFIA II tandem trunk
|
||
EE- Combined access
|
||
EF- Entrance facility-voice grade
|
||
EG- Type #2 Telegraph
|
||
EL- Emergency reporting line
|
||
EM- Emergency reporting center trunk
|
||
EN- Exchange network access facility
|
||
EP- Entrance facility-program grade
|
||
EQ- Equipment only-(network only) assignment
|
||
ES- Extension service-voice grade
|
||
ET- Entrance facility-telegraph grade
|
||
EU- Extension service-telegraph grade
|
||
EV- Enhanced Emergency reporting trunk
|
||
EW- Off network MTS/WATS equivalent service
|
||
FD- Private line-data
|
||
FG- Group-supergroup spectrum
|
||
FR- Fire dispatch
|
||
FT- Foreign exchange trunk
|
||
FW- Wideband channel
|
||
FV- Voice grade facility
|
||
FX- Foreign exchange
|
||
HP- Non-DDS Digital data 2.4 kb/s
|
||
HQ- Non-DDS Digital data 4.8 kb/s
|
||
HR- Non-DDS Digital data 9.6 kb/s
|
||
HW- Non-DDS Digital data 56 kb/s
|
||
IT- Intertandem tie trunk
|
||
LA- Local area data channel
|
||
LL- Long distance terminal line
|
||
LS- Local service
|
||
LT- Long distance terminal trunk
|
||
MA- Cellular access trunk 2-way
|
||
MT- Wired music
|
||
NA- CSACC link (EPSCS)
|
||
NC- CNCC link (EPSCS)
|
||
ND- Network data line
|
||
OI- Off premises intercommunication station line
|
||
ON- Off network access line
|
||
OP- Off premises extension
|
||
OS- Off premises PBX station line
|
||
PA- Protective alarm (AC)
|
||
PC- Switched digital-access line
|
||
PG- Paging
|
||
PL- Private line-voice
|
||
PM- Protective monitoring
|
||
PR- Protective relaying-voice grade
|
||
PS- MSC constructed spare facility
|
||
PV- Protective relaying-telegraph grade
|
||
PW- Protective relaying-signal grade
|
||
PX- PBX station line
|
||
PZ- MSC constructed circuit
|
||
QU- Packet asynchronous access line
|
||
QS- Packet synchronous access line
|
||
RA- Remote attendant
|
||
RT- Radio landline
|
||
SA- Satellite trunk
|
||
SG- Control/Remote metering signal grade
|
||
SL- Secretarial line
|
||
SM- Sampling
|
||
SN- Special access termination
|
||
SQ- Equipment only-customer premises
|
||
SS- Dataphone select-a-station
|
||
TA- Tandem tie-trunk
|
||
TC- Control/Remote metering-telegraph grade
|
||
TF- Telephoto/Facsimile
|
||
TK- Local PBX trunk
|
||
TL- Non-tandem tie trunk
|
||
TR- Turret or automatic call distributor (ACD) trunk
|
||
TT- Teletypewriter channel
|
||
TU- Turret or automatic call distributor (ACD) line
|
||
TX- Dedicated facility
|
||
VF- Commercial television (full time)
|
||
VH- Commercial television (part time)
|
||
VM- Control/Remote metering-voice grade
|
||
VO- International overseas television
|
||
VR- Non-commercial television (7003,7004)
|
||
WC- Special 800 surface trunk
|
||
WD- Special WATS trunk (OUT)
|
||
WI- 800 surface trunk
|
||
WO- WATS line (OUT)
|
||
WS- WATS trunk (OUT)
|
||
WX- 800 service line
|
||
WY- WATS trunk (2-way)
|
||
WZ- WATS line (2-way)
|
||
ZA- Alarm circuits
|
||
ZC- Call and talk circuits
|
||
ZE- Emergency patching circuits
|
||
ZF- Order circuits, facility
|
||
ZM- Measurement and recording circuits
|
||
ZP- Test circuit, plant service center
|
||
ZQ- Quality and management circuits
|
||
ZS- Switching, control and transfer circuits
|
||
ZT- Test circuits, central office
|
||
ZV- Order circuits, service
|
||
|
||
SERVICE CODES FOR LATA ACCESS
|
||
---------------------------------------------------
|
||
HC- High capacity 1.544 mb/ps
|
||
HD- High capacity 3.152 mb/ps
|
||
HE- High capacity 6.312 mb/ps
|
||
HF- High capacity 6.312
|
||
HG- High capacity 274.176 mb/s
|
||
HS- High capacity subrate
|
||
LB- Voice-non switched line
|
||
LC- Voice-switched line
|
||
LD- Voice-switched trunk
|
||
LE- Voice and tone-radio landline
|
||
LF- Data low-speed
|
||
LG- Basic data
|
||
LH- Voice and data-PSN access trunk
|
||
LJ- Voice and data SSN access
|
||
LK- Voice and data-SSN-intermachine trunk
|
||
LN- Data extension, voice grade data facility
|
||
LP- Telephoto/Facsimile
|
||
LQ- Voice grade customized
|
||
LR- Protection relay-voice grade
|
||
LZ- Dedicated facility
|
||
MQ- Metallic customized
|
||
NQ- Telegraph customized
|
||
NT- Protection alarm-metallic
|
||
NU- Protection alarm
|
||
NV- Protective relaying/Telegraph grade
|
||
NW- Telegraph grade facility-75 baud
|
||
NY- Telegraph grade facility- 150 baud
|
||
PE- Program audio, 200-3500 hz
|
||
PF- Program audio, 100-5000 hz
|
||
PJ- Program audio, 50-8000 hz
|
||
PK- Program audio, 50-15000 hz
|
||
PQ- Program grade customized
|
||
SB- Switched access-standard
|
||
SD- Switched access-improved
|
||
SE- Special access WATS-access-std
|
||
SF- Special access WATS access line improved
|
||
SJ- Limited switched access line
|
||
TQ- Television grade customized
|
||
TV- TV Channel one way 15khz audio
|
||
TW- TV Channel one way 5khz audio
|
||
WB- Wideband digital, 19.2 kb/s
|
||
WE- Wideband digital, 50 kb/s
|
||
WF- Wideband digital, 230.4 kb/s
|
||
WH- Wideband digital, 56 kb/s
|
||
WJ- Wideband analog, 60-108 khz
|
||
WL- Wideband analog 312-552 khz
|
||
WN- Wideband analog 10hz-20 khz
|
||
WP- Wideband analog, 29-44 khz
|
||
WR- Wideband analog 564-3064 khz
|
||
XA- Dedicated digital, 2.4 kb/s
|
||
XB- Dedicated digital, 4.8 kb/s
|
||
XG- Dedicated digital, 9.6 kb/s
|
||
XH- Dedicated digital 56. kb/s
|
||
|
||
|
||
|
||
Now the last two positions of real importance, 5 & 6 translate thusly:
|
||
|
||
Modifier Character Position 5
|
||
------------------------------
|
||
|
||
INTRASTATE INTERSTATE
|
||
-------------------------------------
|
||
A B Alternate data & non data
|
||
-------------------------------------
|
||
C Customer controlled service
|
||
-------------------------------------
|
||
D E Data
|
||
-------------------------------------
|
||
N L Non-data operation
|
||
-------------------------------------
|
||
P Only offered under intra restructured
|
||
private line (RPL) tariff
|
||
-------------------------------------
|
||
S T Simultaneous data & non-data
|
||
-------------------------------------
|
||
F Interexchange carriers is less than 50%
|
||
-------------------------------------
|
||
G Interstate carrier is more than 50%
|
||
usage
|
||
==============================================================================
|
||
|
||
MODIFIER CHARACTER POSITION 6
|
||
--------------------------------------------------------------
|
||
|
||
TYPE OF SERVICE Intra LATA
|
||
--------------------------------------
|
||
ALL EXCEPT US GOVT US GOVERNMENT
|
||
--------------------------------------
|
||
T M Circuit is BOC customer to BOC customer
|
||
all facilities are TELCO provided
|
||
--------------------------------------
|
||
C P Circuit is BOC/BOC and part of
|
||
facilities or equipment is telco
|
||
provided
|
||
--------------------------------------
|
||
A J Circuit is BOC/BOC all electrically
|
||
connected equip is customer provided
|
||
--------------------------------------
|
||
L F Circuit terminates at interexchange
|
||
carrier customers location
|
||
--------------------------------------
|
||
Z Official company service
|
||
--------------------------------------
|
||
Interlata
|
||
S S Circuit terminates at interexchange
|
||
carriers point of term (POT)
|
||
--------------------------------------
|
||
V V Circuit terminates at an interface of a
|
||
radio common carrier (RCC)
|
||
--------------------------------------
|
||
Z Official company service
|
||
--------------------------------------
|
||
|
||
Corridor
|
||
Y X Corridor circuit
|
||
--------------------------------------
|
||
International
|
||
K H Circuit has at least 2 terminations in
|
||
different countries
|
||
--------------------------------------
|
||
Interexchange carrier
|
||
Y X Transport circuit between interexchange
|
||
carrier terminals.
|
||
----------------------------------------
|
||
|
||
So 64FDDV would be a private line data circuit terminating at a radiocommon
|
||
carrier. Other examples can be decoded likewise.
|
||
|
||
Enjoy this information as much as I've had finding it.
|
||
|
||
-= The Mad Phone-man =-
|
||
|
||
|
||
===== Phrack Magazine presents Phrack 16 =====
|
||
===== File 3 of 12 =====
|
||
|
||
==========================================
|
||
==== Cosmos Kid Presents... ====
|
||
==== A Hacker's Guide To: PRIMOS ====
|
||
==== Part I ====
|
||
==== (c) 1987 by Cosmos Kid ====
|
||
==========================================
|
||
|
||
Author's Note:
|
||
--------------
|
||
This file is the first of two files dealing with PRIMOS and its operations.
|
||
The next file will be in circulation soon so be sure to check it out at any
|
||
good BBS.
|
||
|
||
|
||
Preface:
|
||
--------
|
||
This file is written in a form to teach beginners as well as experienced
|
||
Primos users about the system. It is written primarily for beginners however.
|
||
PRIMOS, contrary to popular belief can be a very powerful system if used
|
||
correctly. I have outlined some VERY BASIC commands and their use in this
|
||
file along with some extra commands, not so BASIC.
|
||
|
||
|
||
Logging On To A PRIMOS:
|
||
-----------------------
|
||
A PRIMOS system is best recognized by its unusual prompts. These are: 'OK',
|
||
and 'ER!'. Once connected, these are not the prompts you get. The System
|
||
should identify itself with a login such as:
|
||
|
||
Primenet V2.3
|
||
-or-
|
||
Primecom Network
|
||
|
||
The system then expects some input from you,preferably: LOGIN. You will
|
||
then be asked to enter your user identification and password as a security
|
||
measure. The login onto a PRIMOS is as follows:
|
||
|
||
CONNECT
|
||
Primenet V 2.3 (system)
|
||
LOGIN<CR> (you)
|
||
User id? (system)
|
||
AA1234 (you)
|
||
Password? (system)
|
||
KILLME (you)
|
||
OK, (system)
|
||
|
||
|
||
Preceding the OK, will be the systems opening message. Note that if you fail
|
||
to type login once connected, most other commands are ignored and the system
|
||
responds with:
|
||
|
||
Please Login
|
||
ER!
|
||
|
||
|
||
Logging Off Of A PRIMOS:
|
||
------------------------
|
||
If at any time you get bored with Primos, just type 'LOGOFF' to leave the
|
||
system. Some systems have a TIMEOUT feature implemented meaning that if you
|
||
fail to type anything for the specified amount of time the system will
|
||
automatically log you out, telling you something like:
|
||
|
||
Maximum Inactive Time Limit Exceeded
|
||
|
||
|
||
System Prompts:
|
||
---------------
|
||
As stated previously, the prompts 'ER!' and 'OK,' are used on Primos. The
|
||
'OK,' denotes that last command was executed properly and it is now waiting
|
||
for your next command. The 'ER!' prompt denotes that you made an error in
|
||
typing your last command. This prompt is usually preceded by an error
|
||
message.
|
||
|
||
|
||
Special Characters:
|
||
-------------------
|
||
Some terminals have certain characteristics that are built in to the terminal.
|
||
key
|
||
|
||
CONTROL-H
|
||
Deletes the last character typed.
|
||
|
||
|
||
Other Special Characters:
|
||
-------------------------
|
||
RETURN: The return key signals PRIMOS that you have completed typing a
|
||
command and that you are ready for PRIMOS to process the command.
|
||
|
||
BREAK/CONTROL-P: Stops whatever is currently being processed in memory and
|
||
will return PRIMOS to your control. To restart a process,
|
||
type:
|
||
START (abbreviated with S).
|
||
|
||
CONTROL-S: Stops the scrolling of the output on your terminal for viewing.
|
||
|
||
CONTROL-Q: Resumes the output scrolling on your terminal for inspection.
|
||
|
||
SEMICOLON ';': The logical end of line character. The semicolon is used to
|
||
enter more than one command on one line.
|
||
|
||
Getting Help:
|
||
-------------
|
||
You can get on-line information about the available PRIMOS commands by using
|
||
the 'HELP' command. The HELP system is keyword driven. That is, all
|
||
information is stored under keywords that indicate the content of the help
|
||
files. This is similar to VAX. Entering the single command 'HELP' will enter
|
||
the HELP sub-system and will display an informative page of text. The next
|
||
page displayed will provide you with a list of topics and their keywords.
|
||
These topics include such items as PRIME, RAP, MAIL, and DOC. If you entered
|
||
the MAIL keyword, you would be given information concerning the mail sub-
|
||
system available to users on P simply enter PRIME to obtain information on all
|
||
PRIMOS commands. You could then enter COPY to obtain information on that
|
||
specific topic.
|
||
|
||
|
||
Files And Directories:
|
||
----------------------
|
||
The name of a file or sub-directory may have up to 32 characters. The
|
||
filename may contain any of the following characters, with the only
|
||
restriction being that the first character of the filename may not be a digit.
|
||
Please note that BLANK spaces are NOT allowed ANYWHERE:
|
||
|
||
A-Z .....alphabet
|
||
0-9 .....numeric digits
|
||
& .....ampersand
|
||
# .....pound sign
|
||
$ .....dollar sign
|
||
- .....dash/minus sign
|
||
* .....asterisk/star
|
||
. .....period/dot
|
||
/ .....slash/divide sign
|
||
|
||
|
||
Naming Conventions:
|
||
-------------------
|
||
There are very few restrictions on the name that you may give a file.
|
||
However, you should note that many of the compilers (language processors) and
|
||
commands on the PRIME will make certain assumptions if you follow certain
|
||
guidelines. File name suffixes help to identify the file contents with regard
|
||
to the language the source code was written in and the contents of the file.
|
||
For instance, if you wrote a PL/1 program and named the file containing the
|
||
source code 'PROG1.PL1' (SEGmented loader) would take the binary file, link
|
||
all the binary libraries that you specify and produce a file named
|
||
'PROG1.SEG', which would contain the binary code necessary to execute the
|
||
program. Some common filename suffixes are: F77, PAS, COBOL, PL1G, BASIC,
|
||
FTN, CC, SPIT (source files). These all denote separate languages and get
|
||
into more advanced programming on PRIMOS. (e.g. FTN=Fortran).
|
||
|
||
BIN=the binary code produced by the compiler
|
||
LIST=the program listing produced by the compiler
|
||
SEG=the linked binary code produced by SEG
|
||
|
||
Some files which do not use standard suffixes may instead use the filename
|
||
prefixes to identify the contents of the file. Some common filename prefixes
|
||
are:
|
||
|
||
B Binary code produced by the compiler
|
||
L source program Listing
|
||
C Command files
|
||
$ Temporary work files (e.g. T$0000)
|
||
# Seg files
|
||
|
||
|
||
Commands For File Handling:
|
||
----------------------------
|
||
PRIMOS has several commands to control and access files and file contents.
|
||
These commands can be used to list the contents of files and directories, and
|
||
to copy, add, delete, edit, and print the contents of files. The capitalized
|
||
letters of each are deleted. A LIST must be enclosed in parenthesis.
|
||
|
||
Close arg ....Closes the file specified by 'arg'. 'Arg' could also be
|
||
a list of PRIMOS file unit numbers, or the word 'ALL' which
|
||
closes all open files and units.
|
||
|
||
LIMITS ....Displays information about the login account, including
|
||
information about resources allocated and used, grantor, and
|
||
expiration date.
|
||
|
||
Edit Access ....Edits the Access rights for the named directories and
|
||
files.
|
||
|
||
CName arg1 arg2 ....Changes the Name of 'arg1' to 'arg2'. The arguments can
|
||
be files or directories.
|
||
|
||
LD ....The List Directory command has several arguments that
|
||
allow for controlled listing format and selection of entries.
|
||
|
||
Attach arg ....allows you to Attach to the directory 'arg' with the
|
||
access rights specified in the directory Access Control List.
|
||
|
||
DOWN <arg> ....allows you to go 'DOWN into' a sub-ufd (directory). You
|
||
can specify which one of several sub-ufds to descend into
|
||
with the optional 'arg'.
|
||
|
||
UP <arg> ....allows you to go 'UP into' a higher ufd (directory). You
|
||
can specify which one of several to climb into with the
|
||
optional 'arg'.
|
||
|
||
WHERE ....Displays what the current directory attach point is and
|
||
your access rights.
|
||
|
||
CREATE arg ....CREATES a new sub-directory as specified by 'arg'.
|
||
|
||
COPY arg1 arg2 ....COPIES the file or directory specified by 'arg1' into a
|
||
file by the same name specified by 'arg2'. Both 'arg1' and
|
||
'arg2' can be filename with the SPOOL command, whose format
|
||
is:
|
||
|
||
SPOOL filename -AT destination
|
||
where filename is the name of the file you want printed, and
|
||
destination is the name of the printer where you want the
|
||
file printed. For example if you want the file 'HACK.FTN'
|
||
printed at the destination 'LIB' type:
|
||
|
||
SPOOL HACK.FTN -AT LIB
|
||
|
||
PRIMOS then gives you some information telling you that the file named was
|
||
SPOOLed and the length of the file in PRIMOS records. To see the entries in
|
||
the SPOOL queue, type:
|
||
|
||
SPOOL -LIST
|
||
|
||
PRIMOS then lists out all the files waiting to be printed on the printers on
|
||
your login system. Also included in this information will be the filename of
|
||
the files waiting to print, the login account name of the user who SPOOLed the
|
||
file, the time that the file was SPOOLed, the size of the file in PRIMOS
|
||
records, and the printer name where the file is to print.
|
||
|
||
|
||
Changing The Password Of An Account:
|
||
------------------------------------
|
||
If you wish to change the password to your newly acquired account you must use
|
||
the 'CPW' command (Change PassWord). To do this enter the current password on
|
||
the command line followed by RETURN. PRIMOS will then prompt you for your
|
||
desired NEW password and then ask you to confirm your NEW password. To change
|
||
your password of 'JOE' to 'SCHMOE' then type:
|
||
|
||
OK, (system)
|
||
CPW JOE (you)
|
||
New Password? (system)
|
||
|
||
You can save a copy of your terminal session by using the COMO (COMmand
|
||
Output) command. When you type:
|
||
|
||
COMO filename
|
||
|
||
Everything which is typed or displayed on your terminal is saved (recorded)
|
||
into the filename on the command line (filename). If a file by the same name
|
||
exists, then that file will be REPLACED with NO WARNING GIVEN! When you have
|
||
finished doing whatever it was you wanted a hardcopy of, you type:
|
||
|
||
COMO -End
|
||
|
||
which will stop recording your session and will close the COMO file. You can
|
||
now print the COMO file using the SPOOL command as stated earlier.
|
||
|
||
Conclusion:
|
||
-----------
|
||
This concludes this first file on PRIMOS. Please remember this file is
|
||
written primarily for beginners, and some of the text may have seemed BORING!
|
||
However, this filewaswrittenin a verbose fashion to FULLYINTRODUCEPRIMOS
|
||
to beginners. Part II will deal with more the several languages on PRIMOS and
|
||
some other commands.
|
||
|
||
|
||
Author's Endnote:
|
||
-----------------
|
||
I would like to thank the following people for the help in writing this file:
|
||
|
||
AMADEUS (an oldie who is LONG GONE!)
|
||
The University Of Kentucky
|
||
State University Of New York (SUNY) Primenet
|
||
|
||
And countless others.....
|
||
|
||
Questions, threats, or suggestions to direct towards me, I can be found on any
|
||
of the following:
|
||
|
||
The Freeworld ][.........301-668-7657
|
||
Digital Logic............305-395-6906
|
||
The Executive Inn........915-581-5146
|
||
OSUNY BBS................914-725-4060
|
||
|
||
-=*< Cosmos Kid >*=-
|
||
|
||
========================================
|
||
|
||
|
||
===== Phrack Magazine presents Phrack 16 =====
|
||
===== File 4 of 12 =====
|
||
|
||
|
||
Hacking the Global Telecommunications Network
|
||
Researched and written by: The Kurgan
|
||
Compiled on 10/5/87
|
||
|
||
|
||
Network Procedure Differences
|
||
|
||
The Global Telecommunications Network (GTN) is Citibanks's international data
|
||
network, which allows Citicorp customers and personnel to access Citibank's
|
||
worldwide computerized services.
|
||
|
||
Two different sign on procedures exist: Type A and Type B. All users, except
|
||
some in the U.S., must use Type B. (U.S. users: the number you dial into
|
||
and the Welcome Banner you receive determine what sign-on procedure to
|
||
follow.) Welcome banners are as follows:
|
||
|
||
TYPE A:
|
||
WELCOME TO CITIBANK. PLEASE SIGN ON.
|
||
XXXXXXXX
|
||
|
||
@
|
||
PASSWORD =
|
||
|
||
@
|
||
|
||
TYPE B:
|
||
PLEASE ENTER YOUR ID:-1->
|
||
PLEASE ENTER YOUR PASSWORD:-2->
|
||
|
||
CITICORP (CITY NAME). KEY GHELP FOR HELP.
|
||
XXX.XXX
|
||
PLEASE SELECT SERVICE REQUIRED.-3->
|
||
|
||
|
||
Type A User Commands
|
||
|
||
User commands are either instructions or information you send to the network
|
||
for it to follow. The commands available are listed below.
|
||
|
||
User Action: Purpose:
|
||
|
||
@ (CR) To put you in command mode (mode in which you can put
|
||
your currently active service on hold and ask the network
|
||
for information, or log-off the service). (NOTE: This
|
||
symbol also serves as the network prompt; see Type A
|
||
messages.)
|
||
|
||
BYE (CR) To leave service from command mode.
|
||
|
||
Continue (CR) To return to application from command mode (off hold)
|
||
|
||
D (CR) To leave service from command mode.
|
||
|
||
ID To be recognized as a user by the network (beginning of
|
||
sign on procedure), type ID, then a space and your
|
||
assigned network ID. (Usually 5 or 6 characters long)
|
||
|
||
Status (CR) To see a listing of network address (only from @
|
||
prompt). You need this address when "reporting a
|
||
problem."
|
||
|
||
Type A messages
|
||
|
||
The network displays a variety of messages on your screen which either require
|
||
a user command or provide you with information.
|
||
|
||
Screen shows: Explanation:
|
||
|
||
@ Network prompt -- request for Network ID.
|
||
|
||
BAD PASSWORD Network does not except your password.
|
||
|
||
<address> BUSY The address is busy, try back later.
|
||
|
||
|
||
WELCOME TO CITIBANK. Network welcome banner. Second line provides address
|
||
PLEASE SIGN ON. # to be used when reporting "problems."
|
||
XXX.XXX
|
||
|
||
<address> ILLEGAL You typed in an address that doesn't exist.
|
||
|
||
<address> CONNECTED Your connection has been established.
|
||
|
||
DISCONNECTED Your connect has been disconnected.
|
||
|
||
NOT CONNECTED You're not connected to any service at the time.
|
||
|
||
NUI REQUIRED Enter your network user ID.
|
||
|
||
PASSWORD = Request for your assigned password.
|
||
|
||
STILL CONNECTED You are still connected to the service you were using.
|
||
|
||
? Network doesn't understand your entry.
|
||
|
||
|
||
Type B User Commands and Messages
|
||
|
||
Since the Type B procedure is used with GTN dial-ups, it requires fewer
|
||
commands to control the network. There is only 1 Type B command. Break plus
|
||
(CR) allows you to retain connection to one service, and connect with another.
|
||
|
||
|
||
Screen Shows: Explanation:
|
||
|
||
CITICORP (CITY NAME). Network Welcome banner. Type in service address.
|
||
PLEASE SELECT SERVICE
|
||
|
||
COM Connection made.
|
||
|
||
DER The port is closed out of order, or no open routes are
|
||
available.
|
||
|
||
DISCONNECTED You have disconnected from the service and the network.
|
||
|
||
ERR Error in service selected.
|
||
|
||
INV Error in system.
|
||
|
||
MOM Wait, the connection is being made.
|
||
|
||
NA Not authorized for this service.
|
||
|
||
NC Circuits busy, try again.
|
||
|
||
NP Check service address.
|
||
|
||
OCC Service busy, try again.
|
||
|
||
|
||
Sign-on Procedures:
|
||
|
||
There are two types of sign on procedures. Type A and Type B.
|
||
|
||
|
||
Type A:
|
||
|
||
To log onto a system with type A logon procedure, the easiest way is through
|
||
Telenet. Dial your local Telenet port. When you receive the "@" prompt, type
|
||
in the Type-A service address (found later in the article) then follow the
|
||
instructions from there on.
|
||
|
||
Type-B:
|
||
Dial the your GTN telephone #, then hit return twice. You will then see:
|
||
|
||
"PLEASE ENTER YOUR ID:-1->"
|
||
|
||
Type in a network ID number and hit return.
|
||
|
||
You will then see
|
||
|
||
"PLEASE ENTER YOUR PASSWORD:-2->"
|
||
|
||
Type in Network Password and hit return.
|
||
|
||
Finally you will see the "CITICORP (city name)" welcome banner, and it
|
||
will ask you to select the service you wish to log onto. Type the address and
|
||
hit return. (A list of addresses will be provided later)
|
||
|
||
Trouble Shooting:
|
||
|
||
If you should run into any problems, the Citicorp personnel will gladly
|
||
help their "employees" with any questions. Just pretend you work for Citibank
|
||
and they will give you a lot. This has been tried and tested. Many times,
|
||
when you attempt to log on to a system and you make a mistake with the
|
||
password, the system will give you a number to call for help. Call it and
|
||
tell them that you forgot your pass or something. It usually works, since
|
||
they don't expect people to be lying to them. If you have any questions about
|
||
the network itself, call 305-975-5223. It is the Technical Operations Center
|
||
(TOC) in Pompano, Florida.
|
||
|
||
Dial-Ups:
|
||
|
||
The following list of dial-ups is for North America. I have a list of
|
||
others, but I don't think that they would be required by anyone. Remember:
|
||
Dial-ups require Type-B log-on procedure. Type-A is available on systems
|
||
accessible through Telenet.
|
||
|
||
Canada Toronto 416-947-2992 (1200 Baud V.22 Modem Standard)
|
||
U.S.A. Los Angeles 213-629-4025 (300/1200 Baud U.S.A. Modem Standard)
|
||
Jersey City 201-798-8500
|
||
New York City 212-269-1274
|
||
212-809-1164
|
||
|
||
Service Addresses:
|
||
|
||
The following is a VERY short list of just some of the 100's of service
|
||
addresses. In a later issue I will publish a complete list.
|
||
|
||
Application Name: Type-A Type-B
|
||
|
||
CITIADVICE 2240001600 CADV
|
||
CITIBANKING ATHENS 2240004000 :30
|
||
CITIBANKING PARIS 2240003300 :33
|
||
CITIBANKING TOKYO 2240008100 :81
|
||
CITICASH MANAGER
|
||
INTERNATIONAL 1 (NAFG CORP) 2240001200 CCM1
|
||
INTERNATIONAL 7 (DFI/WELLS FARGO) 2240013700 CCM7
|
||
COMPMARK ON-LINE 2240002000 CS4
|
||
ECONOMIC WEEK ON-LINE 2240011100 FAME1
|
||
INFOPOOL/INFOTEXT 2240003800 IP
|
||
|
||
EXAMPLE OF LOGON PROCEDURE:
|
||
|
||
THE FOLLOWING IS THE BUFFERED TEXT OF A LOG-ON TO CITIBANKING PARIS THROUGH
|
||
TELENET.
|
||
|
||
|
||
|
||
CONNECT 1200
|
||
TELENET
|
||
216 13.41
|
||
|
||
TERMINAL=VT100
|
||
|
||
@2240003300
|
||
|
||
223 90331E CONNECTED
|
||
|
||
ENTER TYPE NUMBER OR RETURN
|
||
|
||
TYPE B IS BEEHIVE DM20
|
||
TYPE 1 IS DEC VT100
|
||
TYPE A IS DEC VT100 ADV VIDEO
|
||
TYPE 5 IS DEC VT52
|
||
TYPE C IS CIFER 2684
|
||
TYPE 3 IS LSI ADM 3A
|
||
TYPE L IS LSI ADM 31
|
||
TYPE I IS IBM 3101
|
||
TYPE H IS HP 2621
|
||
TYPE P IS PERKIN ELMER 1200
|
||
TYPE K IS PRINTER KEYBOARD
|
||
TYPE M IS MAI BASIC 4
|
||
TYPE T IS TELEVIDEO 9XX
|
||
TYPE V IS VOLKER CRAIG 4404
|
||
TYPE S IS SORD MICRO WITH CBMP
|
||
RELEASE BSC9.5 - 06JUN85
|
||
FOR 300 BAUD KEY ! AND CARRIAGE RETURN
|
||
CONFIG. K1.1-I11H-R-C-B128
|
||
ENTER TYPE NUMBER OR RETURN K
|
||
|
||
CONNECTED TO CITIBANK PARIS - CBP1 ,PORT 5
|
||
|
||
Have fun with this info, and remember, technology will rule in the end.
|
||
|
||
|
||
===== Phrack Magazine presents Phrack 16 =====
|
||
===== File 5 of 12 =====
|
||
|
||
----------------------------------------------------------------------------
|
||
| The Laws Governing Credit Card Fraud |
|
||
| |
|
||
| Written by Tom Brokaw |
|
||
| September 19, 1987 |
|
||
| |
|
||
| Written exclusively for: |
|
||
| Phrack Magazine |
|
||
| |
|
||
----------------------------------------------------------------------------
|
||
(A Tom Brokaw/Disk Jockey Law File Production)
|
||
|
||
|
||
Introduction:
|
||
------------
|
||
|
||
In this article, I will try to explain the laws concerning the illegal
|
||
use of credit cards. Explained will be the Michigan legislative view on the
|
||
misuse and definition of credit cards.
|
||
|
||
|
||
Definition:
|
||
----------
|
||
|
||
Well, Michigan Law section 157, defines a credit card as "Any instrument
|
||
or device which is sold, issued or otherwise distributed by a business
|
||
organization identified thereon for obtaining goods, property, services or
|
||
anything of value." A credit card holder is defined as: 1) "The person or
|
||
organization who requests a credit card and to whom or for whose benefit a
|
||
credit card is subsequently issued" or 2) "The person or organization to whom
|
||
a credit card was issued and who uses a credit card whether the issuance of
|
||
the credit card was requested or not." In other words, if the company or
|
||
individual is issued a card, once using it, they automatically agree to all
|
||
the laws and conditions that bind it.
|
||
|
||
|
||
Stealing, Removing, Retaining or Concealment:
|
||
--------------------------------------------
|
||
|
||
Michigan Law states, that it is illegal to "steal, knowingly take or
|
||
remove a credit card from a card holder." It also states that it is wrongful
|
||
to "conceal a credit card without the consent of the card holder." Notice
|
||
that it doesn't say anything about carbons or numbers acquired from BBSes,
|
||
but I think that it could be considered part of the laws governing the access
|
||
of a persons account without the knowledge of the cardholder, as described
|
||
above.
|
||
|
||
|
||
Possession with Intent to Circulate or Sell
|
||
-------------------------------------------
|
||
|
||
The law states that it is illegal to possess or have under one's control,
|
||
or receive a credit card if his intent is to circulate or sell the card. It
|
||
is also illegal to deliver, circulate or sell a credit card, knowing that such
|
||
a possession, control or receipt without the cardholders consent, shall be
|
||
guilty of a FELONY. Notice again, they say nothing about possession of
|
||
carbons or numbers directly. It also does not clearly state what circulation
|
||
or possession is, so we can only stipulate. All it says is that possession of
|
||
a card (material plastic) is illegal.
|
||
|
||
|
||
Fraud, forgery, material alteration, counterfeiting.
|
||
----------------------------------------------------
|
||
|
||
However, it might not be clearly illegal to possess a carbon or CC
|
||
number. It IS illegal to defraud a credit card holder. Michigan law states
|
||
that any person who, with intent to defraud, forge, materially alter or
|
||
counterfeit a credit card, shall be guilty of a felony.
|
||
|
||
|
||
Revoked or cancelled card, use with intent to defraud.
|
||
------------------------------------------------------
|
||
|
||
This states that "Any person who knowingly and with intent to defraud for
|
||
the purpose of obtaining goods, property or services or anything of value on a
|
||
credit card which has been revoked or cancelled or reported stolen by the
|
||
issuer or issuee, has been notified of the cancellation by registered or
|
||
certified mail or by another personal service shall be fined not more than
|
||
$1,000 and not imprisoned not more than a year, or both. However, it does not
|
||
clearly say if it is a felony or misdemeanor or civil infraction. My guess is
|
||
that it would be dependant on the amount and means that you used and received
|
||
when you defraud the company. Usually, if it is under $100, it is a
|
||
misdemeanor but if it is over $100, it is a felony. I guess they figure that
|
||
you should know these things.
|
||
|
||
|
||
The People of The State of Michigan vs. Anderson (possession)
|
||
------------------------------------------------
|
||
|
||
On April 4, 1980, H. Anderson attempted to purchase a pair of pants at
|
||
Danny's Fashion Shops, in the Detroit area. He went up to the cashier to pay
|
||
for the pants and the cashier asked him if he had permission to use the credit
|
||
card. He said "No, I won it last night in a card game". The guy said that I
|
||
could purchase $50 dollars worth of goods to pay back the debt. At the same
|
||
time, he presumed the card to be a valid one and not stolen. Well, as it
|
||
turned out it was stolen but he had no knowledge of this. Later, he went to
|
||
court and pleased guilty of attempted possession of a credit card of another
|
||
with intent or circulate or sell the same. At the guilty hearings, Mr.
|
||
Anderson stated that the credit card that he attempted to use had been
|
||
acquired by him in payment of a gambling debt and assumed that the person was
|
||
the owner. The trial court accepted his plea of guilty. At the sentencing,
|
||
Mr. Anderson, denied that he had any criminal intent. Anderson appealed the
|
||
decision stating that the court had erred by accepting his plea of guilty on
|
||
the basis of insufficient factual data. Therefore, the trial court should not
|
||
have convicted him of attempted possession and reversed the charges.
|
||
|
||
|
||
The People of the State of Michigan vs. Willie Dockery
|
||
------------------------------------------------------
|
||
|
||
On June 23, 1977, Willie Dockery attempted to purchase gas at a Sears gas
|
||
station by using a stolen credit card. The attendant noticed that his
|
||
driver's license picture was pasted on and notified the police. Dockery
|
||
stated that he had found the credit card and the license at an intersection,
|
||
in the city of Flint. He admitted that he knowingly used the credit card and
|
||
driver's license without the consent of the owner but he said that he only had
|
||
purchased gasoline on the card. It turns out that the credit card and
|
||
driver's license was stolen from a man, whose grocery store had been robbed.
|
||
Dockery said that he had no knowledge of the robbery and previous charges on
|
||
the cardwhich totalled$1,373.21. He admitted that he did paste his picture
|
||
on the driver's license. Butagain the court screws up, they receive evidence
|
||
that the defendant had a record of felonies dating back to when he was sixteen
|
||
and then assumed that he was guilty on the basis of his prior offenses. The
|
||
judge later said that the present sentence could not stand in this court so
|
||
the case was referred to another court.
|
||
|
||
|
||
Conclusion
|
||
----------
|
||
|
||
I hope that I have given you a better understanding about the law, that
|
||
considers the illegal aspects of using credit cards. All this information was
|
||
taken from The Michigan Compiled Laws Annotated Volume 754.157a-s and from The
|
||
Michigan Appeals Report.
|
||
|
||
In my next file I will talk about the laws concerning Check Fraud.
|
||
|
||
|
||
-Tom Brokaw
|
||
|
||
|
||
===== Phrack Magazine presents Phrack 16 =====
|
||
===== File 6 of 12 =====
|
||
|
||
******************************************************************************
|
||
* *
|
||
* Tapping Telephone Lines *
|
||
* *
|
||
* Voice or Data *
|
||
* *
|
||
* For Phun, Money, and Passwords *
|
||
* *
|
||
* Or How to Go to Jail for a Long Time. *
|
||
* *
|
||
******************************************************************************
|
||
|
||
Written by Agent Steal 08/87
|
||
|
||
|
||
Included in this file is...
|
||
|
||
* Equipment needed
|
||
|
||
* Where to buy it
|
||
|
||
* How to connect it
|
||
|
||
* How to read recorded data
|
||
|
||
|
||
But wait!! There's more!!
|
||
|
||
* How I found a Tymnet node
|
||
|
||
* How I got in
|
||
|
||
|
||
|
||
*************
|
||
THE EQUIPMENT
|
||
*************
|
||
|
||
First thing you need is an audio tape recorder. What you will be
|
||
recording, whether it be voice or data, will be in an analog audio format.
|
||
>From now on, most references will be towards data recording. Most standard
|
||
cassette recorders will work just fine. However, you are limited to 1 hour
|
||
recording time per side. This can present a problem in some situations. A
|
||
reel to reel can also be used. The limitations here are size and availability
|
||
of A.C. Also, some reel to reels lack a remote jack that will be used to
|
||
start and stop the recorder while the line is being used. This may not
|
||
present a problem. More later. The two types of recorders I would advise
|
||
staying away from (for data) are the micro cassette recorders and the standard
|
||
cassette recorders that have been modified for 8 to 10 hour record time. The
|
||
speed of these units is too unstable. The next item you need, oddly enough,
|
||
is sold by Radio Shack under the name "Telephone recording control" part
|
||
# 43-236 $24.95. See page 153 of the 1987 Radio Shack catalog.
|
||
|
||
|
||
|
||
*****************
|
||
HOW TO CONNECT IT
|
||
*****************
|
||
|
||
The Telephone recording control (TRC) has 3 wires coming out of it.
|
||
|
||
#1 Telco wire with modular jack. Cut this and replace with alligator clips.
|
||
|
||
#2 Audio wire with miniature phone jack (not telephone). This plugs
|
||
into the microphone level input jack of the tape recorder.
|
||
|
||
#3 Audio wire with sub miniature phone jack. This plugs into the "REM"
|
||
or remote control jack of the tape recorder.
|
||
|
||
Now all you need to do is find the telephone line, connect the alligator
|
||
clips, turn the recorder on, and come back later. Whenever the line goes off
|
||
hook, the recorder starts. It's that simple.
|
||
|
||
|
||
|
||
****************
|
||
READING THE DATA
|
||
****************
|
||
|
||
This is the tricky part. Different modems and different software respond
|
||
differently but there are basics. The modem should be connected as usual to
|
||
the telco line and computer. Now connect the speaker output of the tape
|
||
player directly to the telephone line. Pick up the phone and dial the high
|
||
side of a loop so your line doesn't make a lot of noise and garble up your
|
||
data. Now, command your modem into the answer mode and press play. The tape
|
||
should be lined up at the beginning of the recorded phone call, naturally, so
|
||
you can see the login. Only one side of the transmission between the host and
|
||
terminal can be monitored at a time. Going to the originate mode you will see
|
||
what the host transmitted. This will include the echoes of the terminal. Of
|
||
course the password will be echoed as ####### for example, but going to the
|
||
answer mode will display exactly what the terminal typed. You'll understand
|
||
when you see it. A couple of problems you might run into will be hum and
|
||
garbage characters on the screen. Try connecting the speaker output to the
|
||
microphone of the hand set in your phone. Use a 1 to 1 coupling transformer
|
||
between the tape player input and the TRC audio output. These problems are
|
||
usually caused when using A.C. powered equipment. The common ground of this
|
||
equipment interferes with the telco ground which is D.C. based.
|
||
|
||
I was a little reluctant to write this file because I have been
|
||
unsuccessful in reading any of the 1200 baud data I have recorded. I have
|
||
spoke with engineers and techs. Even one of the engineers who designs modems.
|
||
All of them agree that it IS possible, but can't tell me why I am unable to do
|
||
this. I believe that the problems is in my cheap ass modem. One tech told me
|
||
I needed a modem with phase equalization circuitry which is found in most
|
||
expensive 2400 baud modems. Well one of these days I'll find $500 lying on
|
||
the street and I'll have nothing better to spend it on! Ha! Actually, I have
|
||
a plan and that's another file.....
|
||
|
||
I should point out one way of reading 1200 baud data. This should work in
|
||
theory, however, I have not attempted it.
|
||
|
||
Any fully Hayes compatible modem has a command that shuts off the carrier
|
||
and allows you to monitor the phone line. The command is ATS10. You would
|
||
then type either answer or originate depending on who you wanted to monitor.
|
||
It would be possible to write a program that records the first 300 or so
|
||
characters then writes it to disk, thus allowing unattended operation.
|
||
|
||
**************
|
||
HOW CRAZY I AM
|
||
**************
|
||
|
||
PASSWORDS GALORE!!!!
|
||
|
||
After numerous calls to several Bell offices, I found the one that handled
|
||
Tymnet's account. Here's a rough transcript:
|
||
|
||
Op: Pacific Bell priority customer order dept. How may I help you?
|
||
Me: Good Morning, this is Mr. Miller with Tymnet Inc. We're interested in
|
||
adding some service to our x town location.
|
||
Op: I'll be happy to help you Mr. Miller.
|
||
Me: I need to know how many lines we have coming in on our rotary and if we
|
||
have extra pairs on our trunk. We are considering adding ten additional
|
||
lines on that rotary and maybe some FX service.
|
||
Op: Ok....What's the number this is referenced to?
|
||
Me: xxx-xxx-xxxx (local node #)
|
||
Op: Hold on a min....Ok bla, bla, bla.
|
||
|
||
Well you get the idea. Anyway, after asking her a few more unimportant
|
||
questions I asked her for the address. No problem, she didn't even hesitate.
|
||
Of course this could have been avoided if the CN/A in my area would give out
|
||
addresses, but they don't, just listings. Dressed in my best telco outfit,
|
||
Pac*Bell baseball cap, tool belt and test set, I was out the door. There it
|
||
was, just an office building, even had a computer store in it. After
|
||
exploring the building for awhile, I found it. A large steel door with a push
|
||
button lock. Back to the phone. After finding the number where the service
|
||
techs were I called it and talked to the tech manager.
|
||
|
||
Mgr: Hello this is Joe Moron.
|
||
Me: Hi this is Mr. Miller (I like that name) with Pacific Bell. I'm down
|
||
here at your x town node and we're having problems locating a gas leak
|
||
in one of our Trunks. I believe our trunk terminates pressurization in
|
||
your room.
|
||
Mgr: I'm not sure...
|
||
Me: Well could you have someone meet me down here or give me the entry code?
|
||
Mgr: Sure the code is 1234.
|
||
Me: Thanks, I'll let you know if there's any trouble.
|
||
|
||
|
||
So, I ran home, got my VCR (stereo), and picked up another TRC from Trash
|
||
Shack. I connected the VCR to the first two incoming lines on the rotary.
|
||
One went to each channel (left,right). Since the volume of calls is almost
|
||
consistent, it wasn't necessary to stop the recorder between calls. I just
|
||
let it run. I would come back the next day to change the tape. The VCR was
|
||
placed under the floor in case a tech happened to come by for maintenance.
|
||
These nodes are little computer rooms with air conditioners and raised floors.
|
||
The modems and packet switching equipment are all rack mounted behind glass.
|
||
Also, most of the nodes are unmanned. What did I get? Well a lot of the
|
||
logins were 1200, so I never found out what they were. Still have 'em on tape
|
||
though! Also a large portion of traffic on both Tymnet and Telenet is those
|
||
little credit card verification machines calling up Visa or Amex. The
|
||
transaction takes about 30 secs and there are 100's on my tapes. The rest is
|
||
as follows:
|
||
|
||
Easylink CompuServe Quantumlink 3Mmail
|
||
PeopleLink Homebanking USPS Chrysler parts order
|
||
Yamaha Ford Dow Jones
|
||
|
||
And a few other misc. systems of little interest. I'm sure if I was
|
||
persistent, I'd get something a little more interesting. I spent several
|
||
months trying to figure out my 1200 baud problem. When I went back down there
|
||
the code had been changed. Why? Well I didn't want to find out. I was out
|
||
of there! I had told a couple of people who I later found could not be
|
||
trusted. Oh well. Better safe than sorry.
|
||
|
||
|
||
**************************************
|
||
|
||
Well, if you need to reach me,try my VMS at 415-338-7000 box 8130. But no
|
||
telling how long that will last. And of course there's always P-80 systems at
|
||
304-744-2253. Probably be there forever. Thanks Scan Man, whoever you are.
|
||
Also read my file on telco local loop wiring. It will help you understand how
|
||
to find the line you are looking for. It should be called Telcowiring.Txt
|
||
|
||
<<< AGENT STEAL >>>
|
||
|
||
|
||
===== Phrack Magazine presents Phrack 16 =====
|
||
===== File 7 of 12 =====
|
||
|
||
------------------------------------------------------------------------
|
||
- The Disk Jockey -
|
||
- presents: -
|
||
- -
|
||
- Reading Trans-Union Reports: -
|
||
- A lesson in terms used -
|
||
- (A 2af presentation) -
|
||
------------------------------------------------------------------------
|
||
|
||
This file is dedicated to all the phreaks/hacks that were busted in the summer
|
||
of 1987, perhaps one of the most crippling summers ever for us.
|
||
|
||
Preface:
|
||
-------
|
||
Trans-Union is a credit service much like CBI, TRW or Chilton, but offers
|
||
more competitive rates, and is being used more and more by many credit
|
||
checking agencies.
|
||
|
||
Logging in:
|
||
----------
|
||
Call one of the Trans Union dial-ups at 300,E,7,1, Half Duplex. Such a
|
||
dial-up is 314-XXX-XXXX. After connecting, hit Ctrl-S. The system will echo
|
||
back a 'GO ' and then awaits you to begin the procedure of entering the
|
||
account and password, then mode, i.e.: S F1111,111,H,T. The system will
|
||
then tell you what database you are logged on to, which is mostly
|
||
insignificant for your use. To then pull a report, you would type the
|
||
following: P JONES,JIM* 2600,STREET,CHICAGO,IL,60604** <Ctrl-S>. The name
|
||
is Jim Jones, 2600 is his street address, street is the street name, Chicago
|
||
is the city, IL is the state, 60604 is the zip.
|
||
|
||
The Report:
|
||
----------
|
||
The report will come out, and will look rather odd, with all types of
|
||
notation. An example of a Visa card would be:
|
||
|
||
SUB NAME/ACCT# SUB# OPEND HICR DTRP/TERM BAL/MAX.DEL PAY.PAT MOP
|
||
|
||
CITIBANK B453411 3/87 $1000 9/87A $0 12111 R01
|
||
4128XXXXXXXXX $1500 5/87 $120
|
||
|
||
|
||
Ok, Citibank is the issuing bank. B453411 is their subscriber code. 3/87 is
|
||
when the account was opened. HICR is the most that has been spent on that
|
||
card. 9/87 is when the report was last updated (usually monthly if active).
|
||
$1000 is the credit line. $0 is the current balance. 12111 is the payment
|
||
pattern, where 1=pays in 30 days and 2=pays in 60 days. R01 means that it is a
|
||
"Revolving" account, meaning that he can make payments rather than pay the
|
||
entire bill at once. 4128-etc is his account number (card number). $1500 is
|
||
his credit line. 5/87 is when he was late on a payment last. $120 is the
|
||
amount that he was late with.
|
||
|
||
Here is a list of terms that will help you identify and understand the reports
|
||
better:
|
||
|
||
ECOA Inquiry and Account Designators
|
||
------------------------------------
|
||
I Individual account for sole use of applicant
|
||
C Joint spousal contractual liability
|
||
A Authorized user of shared account
|
||
P Participant in use of account that is neither C nor A
|
||
S Co-signer, not spouse
|
||
M Maker primarily liable for account, co-signer involved
|
||
T Relationship with account terminated
|
||
U Undesignated
|
||
N Non-Applicant spouse inquiry
|
||
|
||
Remarks and FCBA Dispute Codes
|
||
------------------------------
|
||
AJP Adjustment pending
|
||
BKL Bankruptcy loss
|
||
CCA Consumer counseling account
|
||
CLA Placed for collection
|
||
CLO Closed to further purchases
|
||
CTS Contact Subscriber
|
||
DIS Dispute following resolution
|
||
DRP Dispute resolution pending
|
||
FCL Foreclosure
|
||
MOV Moved, left no forwarding address
|
||
ND No dispute
|
||
PRL Profit and loss write-off
|
||
RFN Account refinanced
|
||
RLD Repossession, paid by dealer
|
||
RLP Repossession, proceeds applied towards debt
|
||
RPO Repossession
|
||
RRE Repossession, redeemed
|
||
RS Dispute resolved
|
||
RVD Returned voluntarily, paid by dealer
|
||
RVN Returned voluntarily
|
||
RVP Returned voluntarily, proceeds go towards debt
|
||
RVR Returned voluntarily, redeemed
|
||
SET Settled for less than full balance
|
||
STL Plate (card) stolen or lost
|
||
TRF Transferred to another office
|
||
|
||
Type of Account
|
||
---------------
|
||
O Open account (30 or 90 days)
|
||
R Revolving or option account (open-end)
|
||
I Installment (fixed number of payments)
|
||
M Mortgage
|
||
C Check credit (line of credit at a bank)
|
||
|
||
Usual Manner of Payment
|
||
-----------------------
|
||
00 Too new to rate; approved, but not used or not rated
|
||
01 Pays (or paid) within 30 days of billing, pays accounts as agreed
|
||
02 Pays in more than 30 days, but not more than 60 days
|
||
03 Pays in more than 60 days, but not more than 90 days
|
||
04 Pays in more than 90 days, but not more than 120 days
|
||
05 Pays in 120 days or more
|
||
07 Makes payments under wage earner plan or similar arrangement
|
||
08 Repossession
|
||
8A Voluntary repossession
|
||
8D Legal repossession
|
||
8R Redeemed repossession
|
||
09 Bad debt; placed for collection; suit; judgement; skip
|
||
9B Placed for collection
|
||
UR Unrated
|
||
UC Unclassified
|
||
|
||
Kinds of Business Classification
|
||
-------------------------------
|
||
A Automotive
|
||
B Banks
|
||
C Clothing
|
||
D Department and variety
|
||
F Finance
|
||
G Groceries
|
||
H Home furnishings
|
||
I Insurance
|
||
J Jewelry and cameras
|
||
K Contractors
|
||
L Lumber, building materials
|
||
M Medical and related health
|
||
N National credit card
|
||
O Oil and national credit card
|
||
P Personal services other than medical
|
||
Q Mail order houses
|
||
R Real estate and public accommodations
|
||
S Sporting goods
|
||
T Farm and garden supplies
|
||
U Utilities and fuel
|
||
V Government
|
||
W Wholesale
|
||
X Advertising
|
||
Y Collection services
|
||
Z Miscellaneous
|
||
|
||
Type of Installment Loan
|
||
------------------------
|
||
AF Appliance/Furniture
|
||
AP Airplane
|
||
AU Automobile
|
||
BT Boat
|
||
CA Camper
|
||
CL Credit line
|
||
CM Co-maker
|
||
CO Consolidation
|
||
EQ Equipment
|
||
FH FHA contract loan
|
||
FS Finance statement
|
||
HI Home improvement
|
||
IN Insurance
|
||
LE Leases
|
||
MB Mobile home
|
||
MC Miscellaneous
|
||
MT Motor home
|
||
PI Property improvement plan
|
||
PL Personal loan
|
||
RE Real estate
|
||
ST Student loan
|
||
SV Savings bond, stock, etc.
|
||
US Unsecured
|
||
VA Veteran loan
|
||
|
||
Date Codes
|
||
----------
|
||
A Automated, most current information available
|
||
C Closed date
|
||
F Repossessed/Written off
|
||
M Further updates stopped
|
||
P Paid
|
||
R Reported data
|
||
S Date of last sale
|
||
V Verified date
|
||
|
||
Employment Verification Indicator
|
||
---------------------------------
|
||
D Declined verification
|
||
I Indirect
|
||
N No record
|
||
R Reported, but not verified
|
||
S Slow answering
|
||
T Terminated
|
||
V Verified
|
||
X No reply
|
||
|
||
|
||
Hope this helps. Anyone that has used Trans-Union will surely appreciate
|
||
this, as the result codes are sometimes hard to decipher.
|
||
|
||
-The Disk Jockey
|
||
|
||
|
||
#### PHRACK PRESENTS ISSUE 16 ####
|
||
^*^*^*^Phrack World News, Part 1^*^*^*^
|
||
**** File 8 of 12 ****
|
||
|
||
|
||
>From the 9/16 San Francisco Chronicle, page A19:
|
||
|
||
GERMAN HACKERS BREAK INTO NASA NETWORK (excerpted)
|
||
|
||
Bonn
|
||
A group of West German computer hobbyists broke into an international
|
||
computer network of the National Aeronautics and Space Administration and
|
||
rummaged freely among the data for at least three months before they were
|
||
discovered, computer enthusiasts and network users said yesterday.
|
||
|
||
An organization in Hamburg called the Chaos Computer Club, which
|
||
claimed to be speaking for an anonymous group that broke into the network,
|
||
said the illicit users managed to install a "Trojan horse," and gain entry
|
||
into 135 computers on the European network.
|
||
|
||
A "Trojan Horse" is a term for a permanent program that enables
|
||
amateur computer enthusiasts [as opposed to professionals?], or "hackers,"
|
||
to use a password to bypass all the security procedures of a system and gain
|
||
access to all the data in a target computer.
|
||
|
||
[Actually, this type of program is a 'back door' or a 'trap door.' The group
|
||
may very well have *used* a Trojan horse to enable them to create the back
|
||
door, but it probably wasn't a Trojan horse per se. A Trojan horse is a
|
||
program that does something illicit and unknown to the user in addition to its
|
||
expected task. See Phrack xx-x, "Unix Trojan Horses," for info on how to
|
||
create a Trojan horse which in turn creates a trap door into someone's
|
||
account.]
|
||
|
||
The NASA network that was broken into is called the Space Physics
|
||
Analysis Network [ooh!] and is chiefly designed to provide authorized
|
||
scientists and organizations with access to NASA data. The security system in
|
||
the network was supplied by an American company, the Digital Equipment Corp.
|
||
[Probably DECNET. Serves them right.] Users said the network is widely used
|
||
by scientists in the United States, Britain, West Germany, Japan and five
|
||
other countries and does not carry classified information.
|
||
|
||
A Chaos club spokesman, Wau Holland, denied that any data had been
|
||
changed. This, he said, went against "hacker ethics."
|
||
|
||
West German television reports said that computer piracy carries a
|
||
penalty of three years in prison in West Germany. The government has not said
|
||
what it plans to do.
|
||
|
||
The Chaos club clearly views its break-in as a major coup. Holland,
|
||
reached by telephone in Hamburg, said it was "the most successful running of a
|
||
Trojan horse" to his knowledge, and the club sent a lengthy telex message to
|
||
news organizations.
|
||
|
||
It said the "Trojan horse" was spotted by a user in August, and the
|
||
infiltrating group then decided to go public because "they feared that they
|
||
had entered the dangerous field of industry espionage, economic crime, East-
|
||
West conflict...and the legitimate security interests of high-tech
|
||
institutions."
|
||
|
||
The weekly magazine Stern carried an interview with several anonymous
|
||
hobbyists who showed how they gained access to the network. One described his
|
||
excitement when for the first time he saw on his screen, "Welcome to the NASA
|
||
headquarters VAX installation."
|
||
|
||
According to Chaos, the hobbyists discovered a gap in the Digital VAX
|
||
systems 4.4 and 4.5 and used it to install their "Trojan Horse."
|
||
|
||
[Excerpted and Typed by Shooting Shark. Comments by same.]
|
||
|
||
|
||
#### PHRACK PRESENTS ISSUE 16 ####
|
||
^*^*^*^Phrack World News, Part 2^*^*^*^
|
||
**** File 9 of 12 ****
|
||
|
||
[Ed's Note: CertainThings in the article have been blanked (XXXXX) at the
|
||
request of the author]
|
||
|
||
The Story of the Feds on XXXXXXX BBS
|
||
By The Mad Phone Man
|
||
|
||
Returninghome one afternoon with a friend, I knew something wasn't
|
||
right when I walked into the computer room. I see a "Newuser" on the board...
|
||
and the language he's using is... well "Intimidating"...
|
||
|
||
"I want you all to know I'm with the OCC task force and we know who you are...
|
||
we are going to have a little get-together and 'talk' to you all."
|
||
|
||
Hmmm... a loser?... I go into chat mode... "Hey dude, what's up?" I ask.
|
||
"Your number asshole" he says.... Well, fine way to log on to a board if I do
|
||
say.... "Hey, you know I talked to you and I know who you are.." "Oh
|
||
yeah...Who am I?." he hesitates and says... "Well uh.. you used to work for
|
||
Sprint didn't you?"
|
||
I say, "No, you've got me confused with someone else I think, I'm a junior
|
||
in high school."
|
||
"Ohyeah?.. You got some pretty big words for a high school kid," he
|
||
says....
|
||
"Well, in case you didn't know, they teach English as a major these
|
||
days...."
|
||
He says... "Do you really want to know which LD company I'm with?"
|
||
I say "NO, but if it will make you happy, tell me."
|
||
He says MCI. (Whew! I don't use them)... "Well you're outta luck
|
||
asshole, I pay for my calls, and I don't use MCI." He's dumbfounded.
|
||
I wish him the worst as he asks me to leave his rather threatening
|
||
post up on my board and we hang up on him.
|
||
|
||
Now, I'm half paralyzed... hmmm.... Check his info-form... he left a
|
||
number in 303... Denver.... I grab the phone and call it.. It's the Stromberg
|
||
Telephone company... Bingo.. I've got him.
|
||
I search my user files and come up with a user called "Cocheese" from
|
||
there, and I voice validated him, and he said he worked for a small telco
|
||
called Stromberg... I'm onto him now.
|
||
Later in the week, I'm in a telco office in a nearby major city, I
|
||
happen to see a book, marked "Confidential Employee Numbers for AT&T." I
|
||
thumb thru and lo and behold, an R.F. Stromberg works at an office of AT&T in
|
||
Denver, and I can't cross reference him to an office. (A sure sign he's in
|
||
security). Well, not to be out-done by this loser... I dial up NCIC and check
|
||
for a group search for a driver's licence for him... Bingo. Licence number,
|
||
cars he owns, his SS number, and a cross reference of the licence files finds
|
||
his wife, two kids and a boat registered to him.
|
||
I've never called him back, but If I do have any trouble with him, I'm
|
||
gonna pay a little visit to Colorado....
|
||
|
||
|
||
#### PHRACK PRESENTS ISSUE 16 ####
|
||
^*^*^*^Phrack World News, Part 3^*^*^*^
|
||
**** File 10 of 12 ****
|
||
|
||
|
||
[Ed's Note: Certain names have been change in the article to protect the
|
||
author]
|
||
|
||
The Flight of The Mad Phone-Man's BBS to a Friendly Foreign Country
|
||
|
||
|
||
Using my knowledge that the pigs grab your computer when they bust
|
||
you,I got real worried about losing a BIG investment I've got in my IBM. I
|
||
decide there's a better way.... Move it! But where? Where's safe from the
|
||
PhBI? Well in the old days, to escape the draft, you went to Canada, why not
|
||
expatriate my board.... Well the costs of a line are very high, let's see
|
||
what's available elsewhere.
|
||
One afternoon, I'm working at a local hospital,(one I do telecom work
|
||
for) and I ask the comm mgr if they have any links to Canada? He says why
|
||
yes, we have an inter-medical link over a 23ghz microwave into the city just
|
||
across the border. I ask to see the equipment. WOW! My dreams come true,
|
||
it's a D4 bank (Rockwell) and it's only got 4 channel cards in it. Now, being
|
||
a "nice" guy, I offer to do maintenance on this equipment if he would let me
|
||
put up another channel...he agrees. The plot thickens.
|
||
I've got a satellite office for a business near the hospital on the
|
||
other side, I quickly call up good ole Bell Canada, and have them run a 2 wire
|
||
line from the equipment room to my office. Now the only thing to get is a
|
||
couple of cards to plug into the MUX to put me on the air.
|
||
A 2 wire E&M card goes for bout $319, and I'd need two. Ilook around
|
||
the state, and find one bad one in Rochester.... I'm on my way that afternoon
|
||
via motorcycle. The card is mine, and the only thing I can find wrong is a
|
||
bad voltage regulator. I stop by the Rockwell office in suburban Rochester
|
||
and exchange the card, while I'm there, I buy a second one (Yeah, on my card)
|
||
and drive home.... by 9pm that night the circuit is up, and we are on the air.
|
||
Results- Very good line, no noise, can be converted with another card
|
||
for a modest fee if I want the bandwidth. So that's the story of how the
|
||
board went to a "friendly foreign country."
|
||
|
||
|
||
The Mad Phone-Man
|
||
|
||
|
||
#### PHRACK PRESENTS ISSUE 16 ####
|
||
^*^*^*^Phrack World News, Part 4^*^*^*^
|
||
**** File 11 of 12 ****
|
||
|
||
|
||
Shadow Hawk Busted Again
|
||
========================
|
||
|
||
As many of you know, Shadow Hawk (a/k/a Shadow Hawk 1) had his home
|
||
searched by agents of the FBI, Secret Service, and the Defense Criminal
|
||
Investigative Services and had some of his property confiscated by them on
|
||
September 4th. We're not going to reprint the Washington Post article as it's
|
||
available through other sources. Instead, a summary:
|
||
|
||
In early July, SH bought an AT&T 3B1 ("Unix PC") with a 67MB drive for
|
||
a dirt-cheap $525. He got Sys V 3.5 for another $200 but was dissatisfied
|
||
with much of the software they gave him (e.g. they gave him uucp version 1.1).
|
||
|
||
When he was tagged by the feds, he had been downloading software (in
|
||
the form of C sources) from various AT&T systems. According to reports, these
|
||
included the Bell Labs installations at Naperville, Illinois and Murray Hill,
|
||
New Jersey. Prosecutors said he also gained entry to (and downloaded software
|
||
from) AT&T systems at a NATO installation in Burlington, North Carolina and
|
||
Robins AFB in Georgia. AT&T claims he stole $1 million worth of software.
|
||
Some of it was unreleased software taken from the Bell Labs systems that was
|
||
given hypothetical price tags by Bell Labs spokespersons. Agents took his
|
||
3B1, two Atari STs he had in his room, and several diskettes.
|
||
|
||
SH is 17 and apparently will be treated as a minor. At the time of
|
||
this writing, he will either be subject to federal prosecution for 'computer
|
||
theft' or will be subject to prosecution only by the State of Illinois.
|
||
|
||
SH's lawyer, Karen Plant, was quoted as saying that SH "categorically
|
||
denies doing anything that he should not have been doing" and that he "had
|
||
absolutely no sinister motives in terms of stealing property." As we said, he
|
||
was just collecting software for his new Unix PC. When I talked to Ms. Plant
|
||
on September 25th, she told me that she had no idea if or when the U.S.
|
||
Attorney would prosecute. Karen Plant can be reached at (312) 263-1355. Her
|
||
address is 134 North LaSalle, #306, Chicago, Illinois.
|
||
|
||
|
||
---------
|
||
|
||
On July 9th SH wrote:
|
||
|
||
So you see, I'm screwed. Oh yeah, even worse! In my infinite (wisdom
|
||
|| stupidity, take your pick 8-)) I set up a local AT&T owned 7300 to call me
|
||
up and send me their uucp files (my uucp works ok for receive) and guess what.
|
||
I don't think I've to elaborate further on THAT one... (holding my breath, so
|
||
to type)
|
||
(_>Sh<_
|
||
|
||
---
|
||
|
||
|
||
#### PHRACK PRESENTS ISSUE 16 ####
|
||
^*^*^*^Phrack World News, Part 5^*^*^*^
|
||
**** File 12 of 12 ****
|
||
|
||
|
||
"Phone Companies Across U.S. Want Coins Box Thief's Number"
|
||
From the Tribune - Thursday, Nov. 5, 1987
|
||
|
||
|
||
SAN FRANCISCO - Seven telephone companies across the country, including
|
||
Pacific Bell, are so frazzled by a coin box thief that they are offering a
|
||
reward of $25,000 to catch him.
|
||
|
||
He's very clever, telephone officials say, and is the only known suspect in
|
||
the country that is able to pick the locks on coin boxes in telephone
|
||
booths with relative ease.
|
||
|
||
He is believed responsible for stealing hundreds of thousands of dollars from
|
||
coin boxes in the Bay Area and Sacramento this year.
|
||
|
||
The suspect has been identified by authorities as James Clark, 47, of
|
||
Pennisula, Ohio, a machinist and tool-and-die maker, who is believed
|
||
responsible for coin box thefts in 24 other states.
|
||
|
||
Other companies sharing in the reward are Ohio Bell, Southern Bell, South
|
||
Carolina Bell, South Central Bell, Southwestern Bell, Bell Telephone of
|
||
Pennsylvania and U.S. West.
|
||
|
||
Clark allegedly hit pay phones that are near freeways and other major
|
||
thoroughfares. Clark, described as 5 feet 9 inches tall, with shoulder
|
||
length brown hair and gold-rimmed glasses, is reported to be driving a new
|
||
Chevrolet Astro van painted a dark metallic blue.
|
||
|
||
He was recently in Arizona but is believed to be back in California.
|
||
|
||
Written by a Tribune Staff Writer
|
||
|
||
|
||
Typed by the $muggler
|
||
|