718 lines
35 KiB
Plaintext
718 lines
35 KiB
Plaintext
This is a compilation of Texts by Dysphunxion.. Most of it was
|
||
actually typed by me.. like the intro.. the boxes explained..
|
||
and the VMB Hacking.. the rest are just plans for boxes.. Some
|
||
may be on the older side but most still work!!!
|
||
|
||
Now on with the show...
|
||
|
||
|
||
Xx-x-x-x-x-x-x-x-x-x-x-xX
|
||
I Table of Contents I
|
||
Xx-x-x-x-x-x-x-x-x-x-x-xX
|
||
|
||
|
||
Introduction to hacking. . . . . . . . . . . . . . . . . . . . 1
|
||
|
||
Phone Phreaking. . . . . . . . . . . . . . . . . . . . . . . . 2
|
||
Basic Boxes Technically Explained . . . . . . . . . . . . 3
|
||
(BLUE,3); (BLACK,4); (CHEESE,5)
|
||
Voice mail box hacking. . . . . . . . . . . . . . . . . . 6
|
||
Blue Box Tones. . . . . . . . . . . . . . . . . . . . . . 9
|
||
Scarlet box . . . . . . . . . . . . . . . . . . . . . . . 10
|
||
Green Box . . . . . . . . . . . . . . . . . . . . . . . . 11
|
||
Blotto Box. . . . . . . . . . . . . . . . . . . . . . . . 12
|
||
|
||
|
||
Potpourri
|
||
Lunch Box . . . . . . . . . . . . . . . . . . . . . . . . 13
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
INTRODUCTION TO HACKING
|
||
|
||
Most people who have never hacked or are beginners think that
|
||
hackers are a small community of very knowledgeable computer
|
||
"geniuses" that randomly break into systems for fun and then
|
||
create havoc or steal information. I will speak of my own views
|
||
on hacking which shouldn't reflect the feelings of the entire
|
||
hacking community but I would guess a large amount. First of all
|
||
hacking is getting more and more risky everyday. Because of this,
|
||
hacking for fun isn't as safe as it used to be (although most of
|
||
my hacking is for fun). The reason people (people I know) hack is
|
||
because we believe in free information exchange. This means that
|
||
I should be able to freely access any information that is
|
||
available over the modem that I want. There are obvious reasons
|
||
why this can't be achieved, but if people have information that
|
||
is that sensitive then it should not be put out over the modem.
|
||
Now the second and biggest misconception about hacking is how the
|
||
hacker actually "hacks". Most people think that hacking is just
|
||
basically getting lucky and guessing a password that lets you
|
||
into a system. This is *very* untrue. Let us take an example that
|
||
you have just broken into the CIA's computer system. So suddenly
|
||
you get a -> prompt. Now what do you do?!? This is the difference
|
||
between the hacker and some kid that is good at guessing. The kid
|
||
may be able to guess a password, but if he doesn't know what to
|
||
do once he's in then he might as well have not even hacked the
|
||
password at all. So, the main objective of the hacker is to
|
||
concentrate on learning how to use a system. After he has done
|
||
that then he can figure out ways to get around certain kinds of
|
||
security and get to the stuff he wants. So what you should do is
|
||
read all the manual's and text files that you can get your hands
|
||
on. Because before you can defeat a system, you must know how it
|
||
works (this works for life in general). Ok, now you understand
|
||
what hacking is and how you should go about learning it.
|
||
|
||
Phone Hacking
|
||
Basic Boxes Technically Explained
|
||
|
||
BLUE
|
||
|
||
The "Blue Box" was so named because of the color of the first
|
||
one found. The design and hardware used in the Blue Box is fairly
|
||
sophisticated, and its size varies from a large piece of
|
||
equipment to the size of a pack of cigarettes. The Blue Box
|
||
contains 12 or 13 buttons or switches that emit multi-frequency
|
||
tones characteristic of the tones used in the normal operation of
|
||
the telephone toll (long distance) switching network. The Blue
|
||
Box enables the user to place free long distance calls by
|
||
circumventing toll billing equipment. The Blue Box may be
|
||
directly connected to a phone line, or it may be acoustically
|
||
coupled to a telephone handset by placing the Blue Box's speaker
|
||
next to the transmitter or the telephone handset. To understand
|
||
the nature of a fraudulent Blue Box call, it is necessary to
|
||
understand the basic operation of the Direct Distance Dialing
|
||
(DDD) telephone network. When a DDD call is properly originated,
|
||
the calling number is identified as an integral part of
|
||
establishing the connection. This may be done either
|
||
automatically or, in some cases, by an operator asking the
|
||
calling party for his telephone number. This information is
|
||
entered on a tape in the Automatic Message Accounting (AMA)
|
||
office. This tape also contains the number assigned to the trunk
|
||
line over which the call is to be sent. The information relating
|
||
to the call contained on the tape includes: called number
|
||
identification, time of origination of call, and info that the
|
||
called number answered the call and time of disconnect at the end
|
||
of the call. Although the tape contains info with respect to many
|
||
different calls, the various data entries with respect to a
|
||
single call are eventually correlated to provide billing info for
|
||
use by your Bell's accounting department. The typical Blue Box
|
||
user usually dials a number that will route the call into the
|
||
telephone network without charge. For example, the user will very
|
||
often call a well-known INWATS (toll-free) customer's number. The
|
||
Blue Box user, after gaining this access to the network and, in
|
||
effect, "seizing" control and complete dominion over the line,
|
||
operates a key on the Blue Box which emits a 2600 Hertz (cycles
|
||
per second) tone. This tone causes the switching equipment to
|
||
release the connection to the INWATS customer's line. The 2600Hz
|
||
tone is a signal that the calling party has hung up. The Blue Box
|
||
simulates this condition. However, in fact the local trunk on the
|
||
calling party's end is still connected to the toll network. The
|
||
Blue Box user now operates the "KP" (Key Pulse) key on the Blue
|
||
Box to notify the toll switching equipment that switching signals
|
||
are about to be emitted. The user then pushes the "number"
|
||
buttons on the Blue Box corresponding to the telephone # being
|
||
called. After doing so he/she uses the "ST" (Start) key to tell
|
||
the switching equipment that signalling is complete. If the call
|
||
is completed, only the portion of the original call prior to the
|
||
'blast' of 2600Hz tone is recorded on the AMA tape. The tones
|
||
emitted by the Blue Box are not recorded on the AMA tape.
|
||
Therefore, because the original call to the INWATS # is toll-
|
||
free, no billing is rendered in connection with the call.
|
||
Although the above is a description of a typical Blue Box call
|
||
using a common way of getting into the network, the operation of
|
||
a Blue Box may vary in any one or all of the following respects:
|
||
|
||
The Blue Box may include a rotary dial to apply the 2600Hz tone
|
||
and the switching signals. This type of Blue Box is called a
|
||
"dial pulser" or "rotary SF" Blue box. Getting into the DDD toll
|
||
network may be done by calling any other toll-free # such as
|
||
Universal Directory ASSistance (555-1212) or any number in the
|
||
INWATS network, either inter-state or intra-state, working or
|
||
non-working. Entrance into the DDD toll network may also be in
|
||
the form of "short haul" calling. A "short haul" call is a call
|
||
to any # which will result in a lesser amount of toll charges
|
||
than the charges for the call to be completed by the Blue Box.
|
||
For example, a call to Birmingham from Atlanta may cost $.80 for
|
||
the first 3 minutes while a call from Atlanta to Los Angeles is
|
||
$1.85 for 3 minutes. Thus, a short haul, 3-minute call to
|
||
Birmingham from Atlanta, switched by use of a Blue Box to Los
|
||
Angeles, would result in a net fraud of $1.05 for a 3 minute
|
||
call. A Blue Box may be wired into the telephone line or
|
||
acoustically coupled by placing the speaker of the Blue Box near
|
||
the transmitter of the phone handset. The Blue Box may even be
|
||
built inside a regular Touch-Tone phone, using the phone's push-
|
||
buttons for the Blue Box's signalling tones. A magnetic tape
|
||
recording may be used to record the Blue Box tones for certain
|
||
phone numbers. This way, it's less conspicuous to use since you
|
||
just make it look like a walkman or whatever, instead of a box.
|
||
|
||
All Blue Boxes, except "dial pulse" or "Rotary SF" Blue Boxes,
|
||
must have the following 4 common operating capabilities:
|
||
|
||
It must have signalling capability in the form of a 2600Hz tone.
|
||
This tone is used by the toll network to indicate, either by its
|
||
presence or its absence, an "on hook" (idle) or "off hook" (busy)
|
||
condition of the trunk. The Blue Box must have a "KP" tones that
|
||
unlocks or readies the multi-frequency receiver at the called end
|
||
to receive the tones corresponding to the called phone #. The
|
||
typical Blue Box must be able to emit M tones which are used to
|
||
transmit phone #'s over the toll network. Each digit of a phone #
|
||
is represented by a combination of 2 tones. For example, the
|
||
digit 2 is transmitted by a combination of 700Hz and 1100Hz. The
|
||
Blue Box must have an "ST" key which consists of a combination of
|
||
2 tones that tell the equipment at the called end that all digits
|
||
have been sent and that the equipment should start switching the
|
||
call to the called number.
|
||
|
||
BLACK
|
||
|
||
This Box was named because of the color of the first one
|
||
found. It varies in size and usually has one or two switches or
|
||
buttons. Attached to the telephone line of a called party, the
|
||
Black Box provides toll-free calling *to* that party's line. A
|
||
Black Box user tells other people beforehand that they will not
|
||
be charged for any call placed to him. The user then operates the
|
||
device causing a "non-charge" condition ("no answer" or
|
||
"disconnect") to be recorded on the telephone company's billing
|
||
equipment. A Black Box is relatively simple to construct and is
|
||
much less sophisticated than a Blue Box. NOTE: This will not work
|
||
on any type of Electronic Switching Systems, (ESS, DMS100 etc.)
|
||
|
||
CHEESE
|
||
|
||
This Box was named after the container in which the first one was
|
||
found. Its design may be crude or very sophisticated. Its size
|
||
varies; one was found the size of a half-dollar. A Cheese Box was
|
||
used most often by bookmakers or betters to place wagers without
|
||
detection from a remote location. The device inter-connects 2
|
||
phone lines, each having different #'s but each terminating at
|
||
the same location. In effect, there are 2 phones at the same
|
||
location which are linked together through a Cheese Box. It is
|
||
usually found in an unoccupied apartment connected to a phone
|
||
jack or connecting block. The bookmaker, at some remote location,
|
||
dials one of the numbers and stays on the line. Various bettors
|
||
dial the other number but are automatically connected with the
|
||
book maker by means of the Cheese Box interconnection. If, in
|
||
addition to a cheese box, a Black Box is included in the
|
||
arrangement, the combined equipment would permit toll-free
|
||
calling on either line to the other line. If a police raid were
|
||
conducted at the terminating point of the conversations -the
|
||
location of the Cheese Box- there would be no evidence of
|
||
gambling activity. This device is sometimes difficult to
|
||
identify. Law enforcement officials have been advised that when
|
||
unusual devices are found associated with telephone connections
|
||
the phone company security representatives should be contacted to
|
||
assist in identification.
|
||
|
||
(This probably would be good for a BBS, especially with the Black
|
||
Box set up. and if you ever decided to take the board down, you
|
||
wouldn't have to change your phone #. It also makes it so you
|
||
yourself cannot be traced. I am not sure about calling out from
|
||
one though.)
|
||
|
||
VOICE MAIL BOX HACKING
|
||
|
||
Hello again, and welcome to another <20>egions <20>f <20>ucifer text file!
|
||
This text file has to do with hacking and scanning VMBs. The
|
||
reason I am writing this file is because I am very good at it,
|
||
and have had years of experience. In fact I have been called by
|
||
MCI for screwing them over by attacking and taking over a whole
|
||
damn system with a few friends of mine. Anyway, hacking VMBs is
|
||
very simple and basically safe, and not only that but they are
|
||
cool to have around. You can give them to friends, you can trade
|
||
them for access on bulletin boards, or you can use it for
|
||
yourself. As for this 'Tutorial on Hacking VMBs', we will be
|
||
talking about what systems to hack, how you go about hacking
|
||
them, default passwords, hints on better scanning, and having
|
||
your very own box.
|
||
|
||
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a
|
||
VMB is like an answering machine. You can use it for all sorts of
|
||
things. Most VMB systems are dialed though 800 numbers. People
|
||
call up the VMB system that you have a box on, and dial in your
|
||
box number and then leave you a message. Whenever you want to
|
||
check your box, you just call up, enter your password and read
|
||
your messages. Inside a VMB you can do whatever, you can leave
|
||
messages to others on the system, you can change your 'Out Going'
|
||
message, you can have guest boxes (Explained later), you can have
|
||
the box call your house when you get an Urgent message, you can
|
||
do a lot of things. In fact, on some systems you can even CALL
|
||
OUT through them, so they can be used as a code of sorts! They
|
||
are cool to have.
|
||
|
||
You should scan/hack out Virgin Systems, this is another way of
|
||
calling a system that hasn't been hack out yet. Also, CINDI
|
||
Systems and ASPEN Systems have the best boxes and the most
|
||
options that VMB Systems can offer. I will be talking about ASPEN
|
||
System today since I know most about those.
|
||
|
||
Okay once you've found your Virgin VMB System, you start to scan.
|
||
Just incase you don't know what scanning is, that means you
|
||
search for boxes that are hackable (Explained later on). Now you
|
||
dial up the system and when it picks up and the bitch starts to
|
||
talk, press the "#" key. It will then ask you for your box
|
||
number... now there are two different way the ASPEN System can be
|
||
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital
|
||
Box Number System". Now lets just say this system is a 3 Digit
|
||
System. Okay, when it asks for your Box Number, enter in 999, now
|
||
it will say one of three things: [These are known as 'Greeting
|
||
Names']
|
||
|
||
1. John Doe [Box owners name]
|
||
2. "Box Number 999 Is Not a Valid Box Number"
|
||
3. "Box Number 999"
|
||
Now, if it either says 1 or 2, go to box number
|
||
998...997...996...995..etc, but if it says 3, then you are lucky,
|
||
now it will ask you for your password, now you are probably
|
||
saying 'Oh no this is where it gets difficult'... well you are
|
||
WRONG! This part is easy. Here is a list of ASPEN Default
|
||
Passwords:
|
||
|
||
* We will use box number 666 as an example box #
|
||
[ BN = Box Number ]
|
||
|
||
List of Default Password: Combination Result
|
||
|
||
1-BN 1666
|
||
BN+1 667
|
||
0-BN 0666
|
||
BN-0 6660
|
||
Most Common <20>į BN 666
|
||
|
||
Now enter in a those defaults, try JUST the Box Number first,
|
||
ASPENs usually use that most. Now, if you try all those Defaults
|
||
and still can not get into that Voice Mail Box, then that means
|
||
that the box has been already taken, but the owner hasn't changed
|
||
his 'Generic Message', if you don't get in, you will just have to
|
||
search until you get in.
|
||
|
||
Okay, once you get your first box, *DO NOT* change anything!!
|
||
That will come later. Your first box is, as what is known as a
|
||
'Scanning Box'! What you do with your Scanning Box is this: You
|
||
enter "3" from the main commands menu, and it will ask you for
|
||
the box number. Now that command is the "Check for Receipt"
|
||
command, what it does it check Box #xxx for mail from you. This
|
||
command is very convenient for us VMB Hackers. To use that
|
||
command to your advantage, you enter in box a box number and it
|
||
will say 1 of the three 'Greeting Names', like before, if it say
|
||
#3, then you write down that Box Number and hack it later. But if
|
||
it says 1 or 2, then just keep scanning! All boxes with the
|
||
number 3 Greeting Name is known as a 'Hackable Box'. Now you keep
|
||
scanning until you have gone all the way down to Box number 000
|
||
or whatever is the lowest box it supports. Now, once you have
|
||
your list this is when all the fun starts! Now you are ready to
|
||
hack!
|
||
|
||
|
||
Hacking Out Your New Found 'Hackable' Boxes:
|
||
|
||
Okay this is the easy part. After you spent most of your time by
|
||
scanning the system you should be used to the system and how it
|
||
works, that should make hacking the ASPEN all the easier. Now, if
|
||
you had a 'Scanning Box', you should know what the default
|
||
password was for your Scanning Box. Well if the password for your
|
||
Scanning Box was just the Box Number, then *EVERY* other hackable
|
||
box should have the SAME default password. VMB Systems have only
|
||
one default password, If one box has the BN for a Default PW, the
|
||
all the others will too.
|
||
|
||
Okay, you call up the VMB System will the list of 'Hackable'
|
||
boxes by your side, and when the bitch is talking, press the "#"
|
||
key. When it asks you for your box number, enter in the first box
|
||
number on your list. When it asks for your password, enter in the
|
||
Default Password Sequence. Now if you don't get into that box,
|
||
it's not a problem, just keep going down your list. You should
|
||
get into a few. But remember, just because a box is marked
|
||
'Hackable', it doesn't mean you will definitely get into it.
|
||
|
||
Okay, now you have a few dozen boxes. You can now use you
|
||
Scanning Box to do whatever you please.
|
||
|
||
ASPEN Guest Boxes:
|
||
|
||
Once you have a box of your own, you can give out 'Guest Boxes'.
|
||
Guest Boxes are like Sub Boxes in your box. In ASPEN you have 4
|
||
of them. If you give out Guest Box #1 to John Doe, Mr. Doe can
|
||
call in, enter in the password YOU set for him, and leave you
|
||
messages, but not only that, you can leave messages to HIM! Which
|
||
means, if his is in New York, and you are in California, and
|
||
neither of you have codes to call each other, then you can leave
|
||
messages thru your 800 VMB. Here is a list and explanation of all
|
||
4 of the Guest Boxes:
|
||
|
||
0. Main Box - Your Voice Mail Box!
|
||
1. Guest Box #1 - Can Leave & Receive Messages
|
||
2. Guest Box #2 - Can Leave & Receive Messages
|
||
3. Home Box - Can Leave & Receive Messages
|
||
4. Secretary Box - Can Check How Many Messages You Have & Receive
|
||
Messages
|
||
|
||
|
||
Hints On Better Scanning:
|
||
A lot of people say hacking and scanning for VMBs is too damn
|
||
hard... well that's because they are going at it all wrong, they
|
||
probably read some lame piece of text file on Hacking VMBs that
|
||
was about 500 bytes long. Well, here is a small list of hints on
|
||
better scanning and hacking:
|
||
|
||
1. Do not use a Voice Mail Box hacking/scanning program (i.e.:
|
||
VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..) 2. Do not hack in
|
||
random order (i.e.: B#999, 345, 810, etc) Always hack in order:
|
||
999, 998, 997, 996, 995...000. 3. Try to find out if it's virgin.
|
||
The newer the System, the better.
|
||
4. If you have a phone with memory dial, change one entry to the
|
||
number of the VMB System. 5. Don't hack the System Managers box
|
||
unless you really want to.
|
||
|
||
Ideas of Things To Do With Your Extra Boxes:
|
||
|
||
Well since you can have up to 500 extra Voice Mail Boxes, you
|
||
might not know what to do with them, here are a few ideas that
|
||
can help you out:
|
||
|
||
1. Give them to friends
|
||
2. Sell them to friends
|
||
3. Offer them to sysops for better access
|
||
4. Trade them for HSTs or whatever
|
||
5. Use them as a Voice Verifying line (So you don't have to give
|
||
out your real voice number to BBSs when you apply!)
|
||
|
||
|
||
Blue Box Tones
|
||
In this short section I will attempt to list some tones that Ma
|
||
Bell uses and what they are. Well here goes: Blue box
|
||
frequencies: 2600 hz - used to get on/off trunk tone matrix to
|
||
use after 2600 hz.
|
||
700: 1 : 2 : 4 : 7 : 11 :
|
||
900: + : 3 : 5 : 8 : 12 :
|
||
1100: + : + : 6 : 9 : KP :
|
||
1300: + : + : + : 10 : KP2 :
|
||
1500: + : + : + : + : ST :
|
||
900 :1100 :1300 :1500 : 1700 :
|
||
Use KP to start a call and ST (1500+1700) to stop. Use 2600 HZ to
|
||
disconnect. Red box freqs: 1700 hz and 2200 hz mixed together. A
|
||
nickel is 66 ms on (1 beep). A dime is 66ms on, 66ms off, 66ms on
|
||
(2 beeps) a quarter is 33ms on, 33ms off repeated 5 times. (Ms =
|
||
millisecond). For those of you who don't know, a red box
|
||
simulates money being put into a pay phone. You must put in some
|
||
money first though (the operator can tell if money was put in but
|
||
as to how much she lets the computer answer that. (Yeah for the
|
||
computer) TASI locking freq: TASI (time assignment speech
|
||
interpolation) is used on satellite trunks, and basically allows
|
||
more than one person to use a trunk by putting them on while the
|
||
other person isn't talking. Of course, you'd never hear the other
|
||
person talking on your trunk. When you start to talk, however,
|
||
the TASI controller has to find an open trunk for you. Because of
|
||
this, some of your speech is lost (because of the delay in
|
||
finding a trunk) this is called clipping. Well, if you were
|
||
transmitting data over a trunk, clipping would really mess up the
|
||
data. So there is something called a TASI locking frequency which
|
||
keeps the TASI from putting anyone else on your trunk or you on
|
||
anyone else's trunk. In any case the freq. is 1850 hz. (Sent
|
||
before the transmission). Have fun!!!
|
||
|
||
|
||
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||
:% %:
|
||
:% THE GREEN BOX %:
|
||
:% %:
|
||
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||
|
||
|
||
The Green Box generates useful tonessuch as COIN COLLECT, COIN RETURN, and
|
||
RINGBACK. These are the tones that ACTS or the TSPS operator would send to
|
||
the CO when appropriate. Unfortunately, the green box cannot be used at a
|
||
fortress station, but must be used by the CALLED party. The tones (hz) are:
|
||
|
||
COIN COLLECT 700 + 1100
|
||
COIN RETURN 1100 + 1700
|
||
RINGBACK 700 + 1700
|
||
|
||
Before the called party sends any of these tones, an operator released
|
||
signal should be sent to alert the MF detectors at the CO. This can be done
|
||
by sending 900 + 1500 Hz or a single 2600 Hz wink (90 ms) followed by a 60 ms
|
||
gap and then the appropriate signal for at least 900 ms. Also, do not forget
|
||
that the initial rate is collected shortly before the 3 minute period is up.
|
||
|
||
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-: -:-:-:-:-:-:-:-:
|
||
|
||
|
||
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||
:% %:
|
||
:% THE BLOTO BOX %:
|
||
:% %:
|
||
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||
|
||
|
||
HOW TO BUILD A BLOTO BOX
|
||
|
||
Finally, it is here! What was first conceived as a joke to fool the inncoent
|
||
phreakers around America has finally been concieved by the one phreak who is
|
||
the expert on lines and voltage: The Traveler. Other boxes by the Traveler
|
||
include the White Gold Box, the Aqua Box, The Diverti Box, and the Cold Box.
|
||
All of those plans will soon be available in a BBS/AE near you!
|
||
Well, for you people who are unenlightened about the Blotto Box, here is a
|
||
brief summery of a legend.
|
||
|
||
--*-=> The Blotto Box <=-*--
|
||
For years now every pirate has dreamed of the Blotto Box. It was at first
|
||
made as a joke to mock more ignorant people into thinking that the function
|
||
of it actually was possible. Well, if you are The Voltage Master, it is
|
||
possible. Originally conceived by King Blotto of much fame, the Blotto Box is
|
||
finally available to the public.
|
||
NOTE: The Traveler can not be responcable for the information disclosed in
|
||
the file! This file is strictly for informational purposes and should not be
|
||
actually built and used! Usage of this electronical impulse machine could
|
||
have the severe results listed below and could result in high federal
|
||
prosecution!
|
||
Again, The Traveler
|
||
|
||
TAKES NO RESPONCABILITY!
|
||
|
||
All right, now that that is cleared up, here is the basis of the box and
|
||
it's function.
|
||
The Blotto Box is every phreaks dream... you could hold AT&T down on it's
|
||
knee's with this device. Because, quite simply, it can turn off the phone
|
||
lines everywhere. Nothing. Blotto. No calls will be allowed out of an area
|
||
code, and no calls will be allowed in. No calls can be made inside it for
|
||
that matter. As long as the switchhing system stays the same, this box will
|
||
not stop at a mere area code. It will stop at nothing. The electrical
|
||
impulses that emit from this box will open every line. Every line will ring
|
||
and ring and ring... the voltage will never be cut off until the box/
|
||
generator is stopped. This is no 200 volt job, here. We are talking
|
||
GENERATOR. Every phone line will continue to ring, and people close to the
|
||
box may be electricuted if they pick up the phone.
|
||
But, the Blotto Box can be stopped by merely cutting of the line or
|
||
generator. If they are cut off then nothing will emit any longer. It will
|
||
take a while for the box to calm back down again, but that is merely a
|
||
superficial aftereffect. Once again: Construction and use of this box is not
|
||
advised! The Blotto Box will continue as long as there is electricity to
|
||
continue with.
|
||
OK, that is what it does, now, here are some interesting things for you to
|
||
do with it...
|
||
|
||
--*-=> The Blotto Box Functions and Installation <=-*--
|
||
Once you have installed your Blotto, there is no turning back. The
|
||
following are the instructions for construction and use of this box. Please
|
||
read and heed all warnings in the above section before you attempt to
|
||
construct this box.
|
||
Materials:
|
||
|
||
- A Honda portable generator or a main power outlet like in a
|
||
stadium or some such place.
|
||
|
||
- A radio shack cord set for 400 volts that splices a female
|
||
plug into a phone line jack.
|
||
|
||
- A meter of voltage to attach to the box itself.
|
||
|
||
- A green base (i.e. one of the nice boxes about 3' by 4' that
|
||
you see around in your neighborhood. They are the main switch
|
||
boards and would be a more effective line to start with.
|
||
or: A regular phone jack (not your own, and not in your area code!
|
||
|
||
- A soudering iron and much souder.
|
||
|
||
- A remote control or long wooden pole.
|
||
|
||
Now. You must have guessed the construction from that. If not, here goes,
|
||
I will explain in detail. Take the Honda Portable Generator and all of the
|
||
other listed equiptment and go out and hunt for a green base. Make sure it is
|
||
one on the ground or hanging at head level from a pole, not the huge ones at
|
||
the top of telephone poles. Open it up with anything convienent, if you are
|
||
two feeble that fuck don't try this. Take a look inside... you are hunting
|
||
for color-coordinating lines of green and red. Now, take out your radio shack
|
||
cord and rip the meter thing off. Replace it with the voltage meter about. A
|
||
good level to set the voltage to is about 1000 volts. Now, attach the voltage
|
||
meter to the cord and set the limit for one thousand. Plug the other end of
|
||
the cord into the generator. Take the phone jack and splice the jack part
|
||
off. Open it up and match the red and green wires with the other red and
|
||
green wires. NOTE: If you just had the generator on and have done this in the
|
||
correct order, you will be a crispy critter. Keep the generator off until you
|
||
plan to start it up. Now, sauder those lines together carefully. Wrap duck
|
||
tape or insultation tape around all of the wires. Now, place the remote
|
||
control right on to the startup of the generator. If you have the long pole,
|
||
make sure it is very long and stand back as far away as you can get and reach
|
||
the pole over. NOTICE: If you are going right along with this without reading
|
||
the file first, you sill realize now tHat your area code is about to become
|
||
null! Then, getting back, twitch the pole/remote control and run for your
|
||
damn life. Anywhere, just get away from it. It will be generating so much
|
||
electricity that if you stand to close you will kill yourself. The generator
|
||
will smoke, etc. but will not stop. You are now killing your area code,
|
||
because all of that energy is spreading through all of the phone lines around
|
||
you in every direction.
|
||
Have a nice day!
|
||
|
||
|
||
<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>
|
||
<%> <%>
|
||
<%> Making the <%>
|
||
<%> <%>
|
||
<%> Lunch Box <%>
|
||
<%> ===== === <%>
|
||
<%> <%>
|
||
<%> Written, Typed and Created by: Dr. D-Code <%>
|
||
<%> <%>
|
||
<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>
|
||
|
||
Introduction
|
||
============
|
||
|
||
The Lunch Box is a VERY simple transmitter which can be handy for all sorts of
|
||
things. It is quite small and can easily be put in a number of places. I have
|
||
successfully used it for tapping fones, getting inside info, blackmail and
|
||
other such things. The possibilities are endless. I will also include the plans
|
||
for an equally small receiver for your newly made toy. Use it for just about
|
||
anything. You can also make the transmitter and receiver together in one box
|
||
and use it as a walkie talkie.
|
||
|
||
Materials you will need
|
||
=======================
|
||
|
||
(1) 9 volt battery with battery clip
|
||
(1) 25-mfd, 15 volt electrolytic capacitor
|
||
(2) .0047 mfd capacitors
|
||
(1) .022 mfd capacitor
|
||
(1) 51 pf capacitor
|
||
(1) 365 pf variable capacitor
|
||
(1) Transistor antenna coil
|
||
(1) 2N366 transistor
|
||
(1) 2N464 transistor
|
||
(1) 100k resistor
|
||
(1) 5.6k resistor
|
||
(1) 10k resistor
|
||
(1) 2meg potentiometer with SPST switch
|
||
Some good wire, solder, soldering iron, board to put it on, box (optional)
|
||
|
||
Schematic for The Lunch Box
|
||
===========================
|
||
|
||
This may get a tad confusing but just print it out and pay attention.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
!
|
||
51 pf
|
||
!
|
||
---+---- ------------base collector
|
||
! )( 2N366 +----+------/\/\/----GND
|
||
365 pf () emitter !
|
||
! )( ! !
|
||
+-------- ---+---- ! !
|
||
! ! ! ! !
|
||
GND / .022mfd ! !
|
||
10k\ ! ! !
|
||
/ GND +------------------------emitter
|
||
! ! ! 2N464
|
||
/ .0047 ! base collector
|
||
2meg \----+ ! ! +--------+ !
|
||
/ ! GND ! ! !
|
||
GND ! ! !
|
||
+-------------+.0047+--------------------+ ! !
|
||
! +--25mfd-----+
|
||
-----------------------------------------+ ! !
|
||
microphone +--/\/\/-----+
|
||
---------------------------------------------+ 100k !
|
||
!
|
||
GND---->/<---------------------!+!+!+---------------+
|
||
switch Battery
|
||
from 2meg pot.
|
||
|
||
|
||
Notes about the schematic
|
||
=========================
|
||
|
||
1. GND means ground
|
||
2. The GND near the switch and the GND by the 2meg potentiometer should be
|
||
connected.
|
||
3. Where you see: )(
|
||
()
|
||
)( it is the transistor antenna coil with 15 turns of
|
||
regular hook-up wire around it.
|
||
4. The middle of the loop on the left side (the left of "()") you should run
|
||
a wire down to the "+" which has nothing attached to it. There is a .0047
|
||
capacitor on the correct piece of wire.
|
||
5. For the microphone use a magnetic earphone (1k to 2k).
|
||
6. Where you see "[!]" is the antenna. Use about 8 feet of wire to broadcast
|
||
approx 300ft. Part 15 of the FCC rules and regulation says you can't
|
||
broadcast over 300 feet without a license. (Hahaha). Use more wire for an
|
||
antenna for longer distances. (Attach it to the black wire on the fone
|
||
line for about a 250 foot antenna!)
|
||
|
||
Operation of the Lunch Box
|
||
==========================
|
||
|
||
This transmitter will send the signals over the AM radio band. You use the
|
||
variable capacitor to adjust what freq. you want to use. Find a good unused
|
||
freq. down at the lower end of the scale and you're set. Use the 2 meg pot. to
|
||
the 2meg is for turning the Lunch Box on and off. When everything is adjusted,
|
||
turn on an AM radio adjust it to where you think the signal is. Have a friend
|
||
say some shit thru the Box and tune in to it. That's all there is to it. The
|
||
plans for a simple receiver are shown below:
|
||
|
||
The Lunch Box receiver
|
||
======================
|
||
|
||
(1) 9 volt battery with battery clip
|
||
(1) 365 pf variable capacitor
|
||
(1) 51 pf capacitor
|
||
(1) 1N38B diode
|
||
(1) Transistor antenna coil
|
||
(1) 2N366 transistor
|
||
(1) SPST toggle switch
|
||
(1) 1k to 2k magnetic earphone
|
||
|
||
Schematic for receiver
|
||
======================
|
||
|
||
[!]
|
||
!
|
||
51 pf
|
||
!
|
||
+----+----+
|
||
! !
|
||
) 365 pf
|
||
(----+ !
|
||
) ! !
|
||
+---------+---GND
|
||
!
|
||
+---*>!----base collector-----
|
||
diode 2N366 earphone
|
||
emitter +-----
|
||
! !
|
||
GND !
|
||
-
|
||
+
|
||
- battery
|
||
+
|
||
GND------>/<------------+
|
||
switch
|
||
|
||
Closing statement
|
||
=================
|
||
|
||
This two devices can be built for under a total of $10.00. Not too bad. Using
|
||
these devices in illegal ways is your option. If you get caught, I accept NO
|
||
responsibility for your actions. This can be a lot of fun if used correctly.
|
||
Hook it up to the red wire (I think) on the fone line and it will send the
|
||
conversation over the air waves. If you have any problems or are confused,
|
||
leave me mail on:Hi-Times=702/832/7469 Warez House=702/827/9273
|
||
|
||
______________________________________________________________________________
|
||
Sysops of other systems may use the file as long as none of it is altered.
|
||
______________________________________________________________________________
|
||
|
||
This has been a High Mountain Hackers Production- (c) 1985 by HMH Industries
|
||
______________________________________________________________________________
|
||
|