1071 lines
49 KiB
Plaintext
1071 lines
49 KiB
Plaintext
Welcome to the Mishandled Information Publication!
|
||
|
||
This is a magazine put out for informational purposes to the masses. It is
|
||
created for the people that enjoy to learn new things, and this first issue is
|
||
a biggie. The magazine itself would not be in existance if it were not for the
|
||
help of these people:
|
||
|
||
Bellcon
|
||
Surge
|
||
Ansi-Christ
|
||
and DITTO
|
||
|
||
All the files in this magazine were donated by people who decided it was time
|
||
that thier knowledge be shown so that others could learn. Expect to see some
|
||
regular features in this magazine, and some big changes, so sit back, relax,
|
||
and start your journey into the land of knowledge, welcome to the first issue
|
||
of the Mishandled Information Publication!
|
||
|
||
The Fascist Plate
|
||
|
||
|
||
|
||
|
||
Please note that all files are not spell checked, so the appearance of
|
||
some of these files just depended on the "intelligence" of the writers. I
|
||
think I'll be buying some dictionaries for Christmas this year........BC
|
||
|
||
|
||
|
||
TABLE OF CONTENTS
|
||
|
||
1. Local Area Networks...................Ansi-Christ
|
||
2. On Payphones................................Surge
|
||
3. On Pedestals......................Bellcon & Surge
|
||
4. Hotel Fun.................................Bellcon
|
||
5. MERIT Systems...............................Surge
|
||
6. Ring-Busy Device............................Ditto
|
||
7. Crashing C-NET's II.........................Ditto
|
||
8. Caldor Numbers......................Fascist Plate
|
||
9. Neat Numbers........................Fascist Plate
|
||
10. Parody Song...................Bellcon & The Surge
|
||
|
||
|
||
|
||
Local Area Networks
|
||
(LAN)
|
||
by
|
||
Ansi-Christ
|
||
|
||
[This is the only file formatted for even printing.]
|
||
|
||
A local area network connects devices that are within a short range. Most LANs
|
||
are unable to connect to public communications services. LANs were developed
|
||
because most communications within a business either occur in the very same
|
||
building or within a short distance of each other. This allows for the sharing
|
||
of information and equipment and thus a large savings for the company.
|
||
|
||
This files is the first in a series of files. It is not meant to be a complete
|
||
systems manual for all LANs, but a basic reference manual on the terminology
|
||
and general set up. In later files there will be more specific information.
|
||
|
||
This file can be distributed freely as long as none of the information is
|
||
changed. If I have made a mistake, please remember that we are all human and
|
||
this does happen. Contact me on one of the two boards listed at the end to
|
||
point out an error.
|
||
|
||
|
||
Topologies:
|
||
|
||
Ring -
|
||
|
||
A ring type set up goes in one direction around a group of devices until it
|
||
reaches the device that is meant as the destination. The ring will be
|
||
connected by a cable to form the ring. The ring topology uses a method known
|
||
as token passing. A token is like a bucket in which information can be dumped.
|
||
If a certain device does not contain this "bucket" then it can not send out the
|
||
data until it gets it. This will prevent data collision from occurring.
|
||
|
||
A LAN will usually transmit data in packets (buckets = packets) and add the
|
||
necessary routing information to the packet. (this tells the packet where it's
|
||
destination is) Because a ring system has a circular shape the information is
|
||
routed in one direction and it will still reach its destination.
|
||
|
||
One note - I have altered the description of a token slightly to avoid
|
||
confusion. A token is usually sent before a packet and will tell the next
|
||
device if the following packet is full or is capable of receiving data.
|
||
|
||
Diagram of a ring topology:
|
||
|
||
O---------O
|
||
/ \ O = nodes
|
||
| |
|
||
O O (I apologize for the shitty diagram)
|
||
\ |
|
||
\ |
|
||
O-----O----O
|
||
|
||
|
||
Tree -
|
||
|
||
The tree set up links components to the network via connectors. The network
|
||
can be tapped at any available point. Data can pass from one device to another
|
||
and does not have to route through a centralized point. Just the way a tree
|
||
network is set up should make it much faster than a ring type network with the
|
||
same computers and devices connected to it. This type of network is also very
|
||
useful because you could add any additional devices as they were need via a
|
||
connector without having to go through major modifications to the network
|
||
itself.
|
||
|
||
A tree network does occasionally, just because of the nature of it's set up,
|
||
have certain problems with controlling the passing of data. There is a safety
|
||
factor involved with a tree network though. If one of the systems along the
|
||
network go down it will not adversely affect the network as a whole, just that
|
||
certain part.
|
||
|
||
Diagram of a tree network:
|
||
|
||
again I apologize for the shitty diagram.
|
||
|
||
O
|
||
/ \
|
||
O \
|
||
| O
|
||
| O |
|
||
| | O
|
||
O | /
|
||
| /
|
||
O
|
||
|
||
Star -
|
||
|
||
The star network is connected through a central processing device. This device
|
||
usually takes the form of a PBX or a host computer system. All lines in this
|
||
network are connected to this central unit. When information must go to
|
||
another node on this network it must first pass through the center. The star
|
||
topology is very common and is probably the most common set up for a network.
|
||
|
||
There is a problem with the star though. If the central unit goes down then
|
||
the whole network is useless.
|
||
|
||
Diagram of a star topology:
|
||
|
||
O
|
||
O | O
|
||
\ | /
|
||
\ | /
|
||
\ | /
|
||
O--------O--------O
|
||
/ |\
|
||
/ | \
|
||
/ | \
|
||
O | O
|
||
O
|
||
|
||
|
||
Transmission media -
|
||
|
||
Twisted pair wire is commonly used to connect all kinds of equipment. This is
|
||
used in older buildings where it may be very expensive to convert to newer
|
||
types of cable. Problems with this include distortion of signals especially at
|
||
higher transmission speeds.
|
||
|
||
Coaxial cable consists of a single conductor surrounded by a flexible metallic
|
||
shielding to minimize signal loss and interference. Coaxial permits a high
|
||
transmission speed.
|
||
|
||
Twin - Axial cable uses two Coaxial cables, one receiving and one transmitting.
|
||
These cables are better than twisted pair cable because of the higher
|
||
transmission speed and longer distance.
|
||
|
||
|
||
Baseband and Broadband Systems -
|
||
|
||
A baseband LAN assigns its entire capacity to a single user for a brief time.
|
||
Only one device can use its pathway. These networks usually use 3/8 inch
|
||
coaxial cable. Advantages are low cost, easy installation, and considerable
|
||
capacity. Baseband does, though, not lend itself to voice quality
|
||
communication.
|
||
|
||
A broadband LAN is sophisticated and uses common television cable and a modem.
|
||
Although it is expensive it will allow the network to handle voice, video,
|
||
teleconferencing, and graphics transmission. It does this by using different
|
||
bandwidths so one signal does not interfere with another signal. It is good
|
||
for high volume office communication.
|
||
|
||
Fiber Optics are the next step although very expensive it will eventually
|
||
replace the other cables. Fiber Optics use light to transmit large amounts of
|
||
information in a very short time. A single cable can carry 240 thousand calls
|
||
at once.
|
||
|
||
|
||
Interconnecting LANs -
|
||
|
||
Bridges are one way of connecting similar networks.
|
||
|
||
Gateways are a way of connecting dissimilar networks. It acts as a translator
|
||
between these networks. It understands different file structures, data types,
|
||
and access methods.
|
||
|
||
|
||
Vendors -
|
||
|
||
Ungermann-Bass is a large independent vendor. Offering both base and broadband
|
||
services and coaxial cable and fiber optic LANs.
|
||
|
||
Systek is the OEM supplier of IBM's broadband network.
|
||
|
||
3Com is a major supplier of PC LANs.
|
||
|
||
Corvus sells Omninet. They offer a system based on twisted
|
||
pair wiring.
|
||
|
||
Interlan Inc. provides Ethernet based products.
|
||
|
||
Wangnet by Wang laboratories.
|
||
|
||
Codex 4000 series by Codex corp.
|
||
|
||
Information systems network by none other than AT&T
|
||
information systems. (commonly abbreviated ISN)
|
||
|
||
Novell network
|
||
|
||
|
||
LAN terms and what they mean - (note - originally printed in LAN magazine)
|
||
|
||
Access method: a way to determine which workstation or PC will be next to use
|
||
the LAN. A set of rules by network hardware and software that direct the
|
||
traffic over the network. Examples include Token passing and Carrier Sense
|
||
Multiple Access for Collision Detection (CSMA/CD)
|
||
|
||
Collision: The result of two workstations trying to use a shared transmission
|
||
medium (cable) at the same time. The electronic signals collide and ruin both
|
||
signals. The whole process takes seconds.
|
||
|
||
Collision detection: The process of detecting when a collision has occurred.
|
||
Workstations know a collision has occurred if the other station sends no reply
|
||
that the signal was received.
|
||
|
||
Disk Server: a device equipped with disks and a program that allows users to
|
||
make and store files on the disks. Allows each user to have an increase in
|
||
storage space normally not accessible at their PC.
|
||
|
||
Drop cable: The cable which allows connection and access to the trunk cables
|
||
of a network.
|
||
|
||
Locking: prevents people from changing the same data at the same time.
|
||
|
||
Polling: used in star networks. allows the central "hub" system to know when
|
||
a node wants to transmit.
|
||
|
||
|
||
LAN Magazine Call Anarchia at 518-869-6035
|
||
12 West 21 Street TSD at 518-377-6487
|
||
New York, NY 10010
|
||
1-800-LIBRARY or boards for those who take their
|
||
212-691-8251 telecom seriously.
|
||
|
||
Look for part II soon - Novell Network commands and syntax
|
||
|
||
|
||
-------------------------------------------------------------------------------
|
||
On Payphones - By The Surge
|
||
|
||
A payphone is a payphone is a payphone, I think that Shakespeare said that
|
||
once. At anyrate, the payphone I will be dealing mostly with, due to my
|
||
familiarity with this model, is the Western Electric Rotary fone.This should
|
||
hold true to most models of payphones as I will not go into vivid detail on the
|
||
aspects of this model alone. This is basically my notes on the findings that I
|
||
have come up with upon opening payphones that I deem noteworthy to myself and
|
||
others who have not opened payphones or have not studied payphones that they
|
||
have opened in depth. Opening the phone.
|
||
|
||
One of the most important concepts to realize when opening a payphone is that a
|
||
payphone is basically a wall-mounted safe containing a phone (with dtmf
|
||
pad/rotary dial exposed) and a cashbox (and related mechanisms). When opening
|
||
a safe, you must realize that the easiest way to open a safe is through the
|
||
opening method provided. In the case of the payphone, this consists of a lock
|
||
and a turn-key insert. This lock is in the middle of the right hand side of
|
||
the phone. This contains many tumblers similar to a safe and can be
|
||
manipulated by drilling a hole around the key insert with a hole-saw drill.
|
||
The turn-key is on the left side at the same level as the cradle for the hand-
|
||
set. Drill a similar hole around this mechanism also. In removing the
|
||
tumblers of the right side, you will expose the slide that should be pressed
|
||
downward by a screwdriver or similar probing type tool. Then the same should
|
||
be done to the turn-key side. Use of a mallet may assist the pushing of the
|
||
probe to get the slide into the down position. At this time the top-front of
|
||
the phone should be lifted upward and outward and the insides will be exposed.
|
||
The black metal is only a shell that covers the inner metal and removal of this
|
||
metal will accomplish nothing.
|
||
|
||
Payphones were meant to withstand the attact of a vandal who does not have
|
||
power tools. No matter what gamma rays may turn you into the Incredible Hulk,
|
||
you will not be able to open the phone without power tools. To elaborate on
|
||
how strong the metal is, in opening a dented phone, I broke 1 hole-saw drill
|
||
bit, 2 screwdrivers and a mallet. All physical manhandling will do to a phone
|
||
is to bind the lock and wreck the electrical devices inside. Once the lock is
|
||
bound, it is next to impossible to open the phone without a blow-torch. Also,
|
||
if you know a locksmith well enough and the lock is still in working condition
|
||
you may be able to have a key made up for it (with the right connections, this
|
||
is not impossible as I have found out).
|
||
|
||
Tone Oscilator-
|
||
|
||
AKA the redbox holds, on the Western Electric models at least, a 2 way switch
|
||
which you may find interesting. It is labled CF DTF for Coin First and
|
||
Dial-tone First as you may have read in BIOC 003's course VI on payphones. It
|
||
is very interesting and annoying to realize that it is a switch you will find
|
||
every time that you walk up to a phone that is set to CF. "Jeeze, all I have
|
||
to do is throw one stupid leetle (Mexican for little) switch and I could use a
|
||
Blue Box, code, 3rd party billing, collect-call, 800-diverter ect.... The tone
|
||
oscilator is connected to a central unit via 11 pin connector.
|
||
|
||
Dialing Unit-
|
||
|
||
The dialing unit is also connected into the central unit via an 11 pin
|
||
connector. The dialing unit holds the dtmf pad/rotary dialing wheel and the
|
||
cradle and the cord to the hand-set. The cord to the hand-set is protected
|
||
with an armoured outside shell and a very strong cable inside which the red,
|
||
yellow, black and green wires braid themselves around.
|
||
|
||
Coin Mechanism-
|
||
|
||
The coin mechanism starts in the upper left hand side of the phone and goes
|
||
back to the back of the phone, through the totalizer (red-box mechanism) and
|
||
and back out to the bottom-front of the phone. It will hold a maximum of 17
|
||
quarters before the load has to be dropped into the cashbox (that is why you
|
||
should never try to red-box more than $4.25 into a phone at any one interval.)
|
||
At that point as one noted friend of mine found out (Dr. Killdeath) something
|
||
like this will happen:
|
||
|
||
"Hello?"
|
||
|
||
"Hello sir, this is the operator. Just what exactly are you trying to pull
|
||
here?"
|
||
|
||
"Your leg baby!"
|
||
|
||
-click!
|
||
|
||
Conclusion-
|
||
|
||
Maybe I will find out even more with my next payphone and as allways, I will be
|
||
willing to share my findings with all that are willing to take interest and
|
||
read. Dr. Killdeath, if you read this, contact me at one of the boards I have
|
||
mentioned bellow as I haven't heard from you since Red Square. Any comments
|
||
(especially additions) please contact me at any of the boards I call.
|
||
|
||
-------------------------------------------------------------------------------
|
||
On pedestals - By The Surge & Bellcon
|
||
|
||
First off, by far, phreaking entails much much more than codes. The true
|
||
phreak is into the "hands-on" aspect of phreaking more than the bluebox
|
||
programs or the codes. This experience is using actual blueboxes, trashing and
|
||
the now ever so popular and still growing field of 'pedestal hacking.'
|
||
Pedestals are the 'cans', or grey-green boxes that are owned by Bell on the
|
||
side of the road. These appear only in rural or suburban areas. In cities,
|
||
you must use the same methods but these ports may be found in manholes instead.
|
||
Basically, a pedestal is an interface, are bridging gap, between two stretches
|
||
of telephone cables. The first stretch being from your Central Office to your
|
||
street, and the second from there to your house. In every-day use, it is
|
||
mainly used as an access port for line testing and installation by lineman.
|
||
They are no longer needed in the use of manual eavesdropping by Bell since all
|
||
modern eavesdropping is done in your Central Office, and will be undetected
|
||
because there is no voltage drop. This is not to say that you cannot eavesdrop
|
||
from these points though. Radio Schlock sells a $20.00 recorder that will only
|
||
record when there is a drop in voltage on the line (someone picks up a phone)
|
||
which can be attached at the terminal set of the person you wish to eavesdrop
|
||
on. Other than this device, Radio Schlock also sells the new CPA-1000 pen
|
||
register. This will keep acurate tabs on any phoneline you wish to keep these
|
||
records on and runs about $100.00. (See May '87 of 2600 Magazine.) Keep in
|
||
mind that to hook these devices up to someones phone lines is not only an
|
||
invasion of privacy but is also in many ways against the law. If you are in
|
||
the pedestal to begin with you obviously have no regard for either so I guess
|
||
it is no big deal. Of course you all have the files on how to build "beige"
|
||
boxes aka linesman's handsets so I won't bother with that. This is of course
|
||
an effective tool to monitor conversations. I personally use an actual test
|
||
set which has the built in monitor on it so it goes virtually un-noticed. If
|
||
you wish to modify your own phone to do the same, just disconnect the grey (or
|
||
blue or white) wire on the F1-Post and the same effect will be accomplished in
|
||
a cruder way. The big drawback is that you will wind up bringing the entire
|
||
base of the phone along with you to have this feature.
|
||
|
||
Next order of business is some annoying things that you can do to someone from
|
||
the pedestal. Basically, when you are at the pedestal you have much more power
|
||
than at any of their phones. If they detect you on the line and go to call the
|
||
"proper" authorities, just disconnect the wires from the terminal blocks and
|
||
they can not complete the call because their phone will be dead. Then run like
|
||
hell. Elsewhere in this issue of MIP are the plans for the 'ring-busy' device.
|
||
This may also be hooked to the terminal blocks easily. I do recommend printing
|
||
out that file or at least saving it to disk as it could come in very handy. It
|
||
makes the line ring once, then give busy status. The owner of the line can
|
||
make outgoing calls but will not even hear the first ring. One thing to
|
||
remember when using the monitor/disconnect or the ring-busy device is that if
|
||
the owner of the line has 2 lines, be sure to disconnect/busy both of them.
|
||
|
||
Experimentation is something that is the best about pedestal hacking. It is
|
||
pretty much wide open. [No pun intended.] One interesting thing that you can
|
||
do is to run wires from one set of terminal blocks to the other. Both lines
|
||
will be connected to each other and this provides quite a humourous effect to
|
||
listen in on a test set with. Another good way of phucking around is to take
|
||
the wires running from one set of terminal blocks and change them with wires
|
||
from another set of terminal blocks. This will cause all line A's calls to go
|
||
to house B and vice-versa. Another interesting device to hook up (neither of
|
||
us have tried this but in theory it could work) is to take a battery that will
|
||
produce a large (but not too large) amount of voltage (like a car battery) and
|
||
hook this up to an alternater which will cause the voltage to run in pulses.
|
||
This will cause the line to constantly ring [or at least make the bell ringer
|
||
lock up] until the phone is picked up. When the phone is put back down, this
|
||
will continue. This will disallow outgoing and incoming calls and be a general
|
||
annoyance.
|
||
|
||
Opening the pedestal can be acheived simply. If it is the type of a case that
|
||
has 2 doors on the front and opens like a closet (quiet front or QF) just
|
||
insert a 7/16" socket wrench (key word-socket since there are washers around
|
||
the nut that make it impossible to use anything but a socket wrench or
|
||
nut-driver) and just follow the directions printed above the handle. For the
|
||
'can' type boxes, just undo the nuts with a 7/16" socket wrench (again, only
|
||
socket) and lift the front cover off by pulling on the 'handle' at the bottom
|
||
and pulling down and off. (This also makes a great seat on those wet nights!).
|
||
|
||
Now all you have to do is find out what line you are accessing (be sure it's
|
||
not yours!) by using ANI. If you are not from the 518 area I would suggest
|
||
subscribing to 2600 and writing in for your ANI (if you don't allready know it)
|
||
If you are from 518, 998 (or in some weird places 997) is what you want to dial
|
||
to find the number of the line that you are on. Once you are sure that it is
|
||
not yours, you can call anywhere for free since you are using the phone of
|
||
someone else.
|
||
|
||
One thing that I have noticed in looking around at a lot of pedestals is what
|
||
we call a 'node'. It is protected by a black rubber cap. The nodes are easy
|
||
to see, as they are usally two or three feet up the pole, and have black wires
|
||
running either from the ground, or the top of the pole. The caps can be very
|
||
easily removed to expose a set of terminal posts. Since these nodes are
|
||
mounted on the telephone pole they provide easy access to the lines since you
|
||
don't have to open a pedestal at all to get at them. They are, other than the
|
||
access-ability factor, the same as the terminal blocks inside of a pedestal.
|
||
|
||
One thing that should be mentioned is a reminder. If you happen to cut any of
|
||
the wires inside, intentionally or not, you have committed a serious crime.
|
||
Not only is this theft and vandalism, it may be deemed by officials as
|
||
something more organized. Many things are carried over phone lines besides
|
||
just voices. Lines such as bank or lottery data, medical systems, and alarm
|
||
systems are a few of the things that when cut, could lead to some serious
|
||
trouble. In one such case similar to this, the local division of the FBI
|
||
showed up for some thorough investigating (along with TelCo and State Police.)
|
||
|
||
Well, that is just about all that I have to say 'on pedestals'.
|
||
|
||
One final note, a pedestal is not yet in use, there is still current running
|
||
through it although you will not get a dialtone from any of the terminals or
|
||
wires themselves. They are basically useless although the cases make great end
|
||
tables for your room. Look in the future for a follow up file dealing with
|
||
test probes and other lineman paraphenalia as well as with anything else that
|
||
we learn from Ma Bell (knock on wood).
|
||
|
||
TTFN! The Surge (T$) Bellcon
|
||
|
||
|
||
+-----------------------------------------------------------------------------+
|
||
! Getting The Most For Your Money -- Hotels !
|
||
! Written for M.I. Magazine -- 5-4-87 !
|
||
+-----------------------------------------------------------------------------+
|
||
|
||
|
||
Have you ever been on vacation and while staying in a hotel you realized that
|
||
they are ripping you off? If so, read on. I will list some various ways to
|
||
save money and possibly have a good time screwing them over.
|
||
|
||
While staying in a hotel room you may realize that it is not very easy to
|
||
phreak from the room due to the fact that they monitor every outgoing call. If
|
||
there is no charge for outgoing calls, feel 'free' to phreak as you normally
|
||
would from home. If there is a charge, you may be able to phreak using
|
||
alternative methods. On your hotel phone it may say 'dial 8+1+(area code) +
|
||
number.' This is of course is just designating that you want an outside line,
|
||
and to record billing for hotel records purposes. Try dialing other numbers
|
||
first other than an 8 first. If you get a dial tone then use that line to dial
|
||
out. You may still get billed for it, but then again, you may not. It sure as
|
||
hell can't hurt. For some reason hotels are now all going to modular
|
||
jacks...this is a direct invitation to take what (what could be easier?) When
|
||
most maids are done cleaning they will leave the doors to rooms open. Walk
|
||
right in and take a phone from that room. I would not advise that you take
|
||
your own phone (for obvious reasons.)
|
||
|
||
There is of course the tried and true method of walking over to a hotel pay
|
||
phone to carry out your business. This also brings up an interesting point.
|
||
Most hotel phones are indoors on hotel walls. The strongest support they have
|
||
to the wall is some plaster and a few wood screws. It would be a bit risky to
|
||
take one from this location, but it's always an option.
|
||
|
||
Upon looking around many hotels, you may notice that the power switches for
|
||
ENTIRE hallways are left in the open, unlocked. This could bring about a quite
|
||
chaotic situation, making it quite easy for you to enter someone's room and
|
||
take what you please. Be weary of the emergency power lights that are ALWAYS
|
||
in hotels. I would not suggest you do this, it is only proving that hotel
|
||
management is not always the smartest class of people in the world.
|
||
|
||
If the hotel is of any good quality, it will have a restaurant somewhere on the
|
||
premisis. Walk in and eat until you burst, upon paying your bill politely ask
|
||
if you can bill it to your hotel room. Be sure to ask if these arrangements
|
||
can be made before-hand. All they will want is a name and room number. Make
|
||
any room and name up as they will not usually verify it. (What hotel would
|
||
want to harrass and 'honest' customer?)
|
||
|
||
Finally, when checking in and out, keep your eyes on the computer. As stated
|
||
earlier, hotel management is not too smart. Not smart enough to remember logon
|
||
procedures and passwords that is. It is not unlikely that the whole procedure
|
||
will be written stamped on the terminal. Keep this for future reference!
|
||
|
||
If you are not impressed with this file, stop complaining. Request something
|
||
next issue, or take whatever you get. You're not PAYING for this!
|
||
|
||
(A Mishandled Magazine Production!)
|
||
|
||
================================?==============================
|
||
Merit destinations---
|
||
|
||
Autonet CMU-Cyber Datapac Dial1200-AA
|
||
Dial300-AA Internet ITI MAGNET
|
||
MSUnet-CLSI MSUnet-EGRNET MSUnet-IBM MSUnet
|
||
MTU MTUS5 OU-SECS RPI
|
||
RUAC SDSC Telenet UM-CAVAX
|
||
UM-CLINFO UM-CVVAX UM-DSC UM-EnginHarris
|
||
UM-MMVAX UM-QuickSlides UM-RAVAX umix
|
||
UMLIB UMLIB-300 WMU-CAE WMU-Kanga
|
||
WMU-Pooh WMU-Puff WMU-Tigger WSU-CSVAX
|
||
WSU-ET ZOOnet-KCollege Zoonet-KVCC
|
||
|
||
Here are some additional destinations that are accessable via merit.....
|
||
|
||
ABA/NET ACP ADPNS-261 ADPNS-3
|
||
ADPNS-446 ADPNS-9 Alberta ARTFL
|
||
Automail-23 Automail-297 Boeing British-Columbia
|
||
BRS Cal-Berkeley Calgary Caltech-HEP
|
||
Carnegie-DEC-20 Carnegie-MICOM Carnegie-11/45 CompuServe
|
||
Comshare Cornell Dalhousie DatapacInfo
|
||
Dialcom Dialog-Index Dialog-V1 Dialog-V2
|
||
Dow-Jones Guelph Illinois Illinois-Cyber
|
||
LEXIS Manitoba Maryland-Unix McGill
|
||
MGH Minnesota-Cyber Minnesota-VAX MIT-Multics
|
||
MIT-VM Montreal Natl-Lib-Med NCAR-Telenet
|
||
New-Brunswick Newsnet NJIT-EIES NLM
|
||
NLM-MCS Notre-Dame NRC NYTimes
|
||
OAG Queens Rice RLIN
|
||
SDC SFU Simon-Fraser Source
|
||
Source-11 Source-12 Source-13 Stanford
|
||
STN Sumex Telenet-Cust-Serv Telenet-Mail
|
||
Telenet-Telemail Toronto TUCC UBC
|
||
UBC-CS UBC-EAN UBC-VISION UQV
|
||
Press RETURN to continue
|
||
Victoria VMShare Vutext-Can Vutext-Freep
|
||
Vutext-other Washington Waterloo-TSS Waterloo-VM
|
||
WestLaw Wilsonline Wisconsin-MACC Wisconsin-VAX
|
||
Yale
|
||
|
||
This is the best list that I could get a hold of. Hacking Merit is very
|
||
interesting as you can reach telenet via merit as well as all these adresses
|
||
that are listed above. If you know telenet, you know that this makes Merit
|
||
practically unlimited. I hear from Bellcon that there is a UNIX out there with
|
||
the uucp account and password uucp but it needs a core dump to get to the
|
||
prompt. If you are into that sort of thing, go for it! If not, there are
|
||
still quite a few other destinations that you may wish to hack. I am sure that
|
||
that UNIX is wide open seeing that uucp's pw was uucp. Try the other default
|
||
accounts. Merit is down at this time due to extensive hacking and a friend of
|
||
mine got a little note on his MTS account about this so be carefull not to do
|
||
this from MTS or anywhere where it can be tied to you. To get to MERIT just
|
||
|
||
type:
|
||
%call 999900009999
|
||
|
||
when you are connected to the 266-8989 dialup or any dialup of ISNET. I hear
|
||
that the 266 prefix will be soon changed to 276 but the last 4 digits of ISNET
|
||
will remain the same 8989. I hope you enjoyed this file. It took no great
|
||
intelligence to write but can be used as a reference for serious hackers who
|
||
have not tried MERIT yet. This is a way for you to get started and I wish you
|
||
the best of luck on getting accounts in all your travels and hope you never
|
||
choose to destroy any data or system anywhere. Remember, the greatest sence of
|
||
power comes from holding the power to destroy a system, and choosing not to..
|
||
T$
|
||
===============================================================================
|
||
|
||
.......................................
|
||
. The HOW TO File .
|
||
. On Making .
|
||
. The Ring-Busy Device .
|
||
. Designed And Written By .
|
||
. ]>itto AKA Shlomo .
|
||
.......................................
|
||
|
||
|
||
Introduction
|
||
------------
|
||
Well this is the How To file on The Ring-Busy Device. This is very simple to
|
||
construct and is also very simple to connect on someones fone line. It is
|
||
probably the easiest thing you will ever do what is actually worth what little
|
||
effort you put in. Now your probably saying to yourslef:
|
||
|
||
|
||
What The Hell Is A Ring-Busy Device?
|
||
------------------------------------
|
||
A Ring-Busy Device is of course a device that when connected on to you enemys
|
||
fone line will make it so that when you call this persons fone you will get a
|
||
Ring-Busy. A ring-busy is exactly what it says, A ring and then a busy, That
|
||
is One ring and from then on busy. Also the pathetic person who has the fone
|
||
that this device is being used on will not have his fone ring. This means he
|
||
will not even know that anyone is calling. Your probably saying BIG DEAL, why
|
||
not just cut his line! Well this is better because he can still use his fone,
|
||
thats right, if he wanted to he could pick up his fone and he would get a dial
|
||
tone, he could then dial out not knowing of this device. This is especially
|
||
useful for those r0dent BBS's that are pissing you off. If someone has a BBS
|
||
and this device is on the line then they wont get any calls for their BBS
|
||
(hehe), and they wont know why either!
|
||
|
||
|
||
How the Ring-Busy Device Was Conceived
|
||
--------------------------------------
|
||
It all started one morning at 4am when I went out special to steal this
|
||
emergency police/fire fone. Once I got it home I hooked it up to my line and
|
||
noticed that whenever someone called me they would get a ring-busy, this was
|
||
extremely odd, so I tried to figure out why the hell that was happening, and I
|
||
did, and now we have the Ring-Busy device. It is also useful if dont want to
|
||
talk to someone but you dont want to put the fone off the hook, just put this
|
||
little device on and those leeches that keep bothering you for games wont be a
|
||
problem anymore.
|
||
|
||
|
||
Ring-Busy Device Plans
|
||
----------------------
|
||
As I said before this is very very simple to construct.
|
||
|
||
Parts Needed:
|
||
(1) 7k resistor (7000 OHMS)
|
||
(1) Fone line
|
||
(1/2) a brain (at least)
|
||
|
||
Procedure:
|
||
Now all you have to do is connect up this 7k resistor to the fone line on the
|
||
red and green terminals, Here is an easy diagram of how to add it onto someones
|
||
fone line. The diagram represents the nice little box that the fone line comes
|
||
through on the side of your house.
|
||
|
||
NOTE: This is for a 1 fone line configuration. If they have two I think you'd
|
||
figure it out? If not too Bad...
|
||
|
||
Diagram:
|
||
#########
|
||
# #
|
||
# G-7-R #
|
||
# #
|
||
#########
|
||
G - Green terminal
|
||
R - Red Terminal
|
||
7 - 7k resistor
|
||
|
||
Now if they have 2 fone lines then connect another 7k resistor to the
|
||
black and yellow terminals.
|
||
|
||
Its That Simple....
|
||
|
||
7k resistors might be a some-what hard to get, try your local electronics store
|
||
and dont bother with Rat Shack, I already checked, they dont sell them.
|
||
|
||
If you must, a 6.5k or maybe 7.5k resistor will work, but Ma Bell uses 7k so I
|
||
do the same.
|
||
|
||
|
||
Suggestions
|
||
-----------
|
||
Here are a few ways to use or misuse this device.
|
||
|
||
1) Connect it on to your fone: Simple just cut off the modular end of your
|
||
fone cord and connect it to the red and green wires, then connect the modular
|
||
plug you cut off to the resistor too, and then just plug the fone in and you
|
||
have a permanent Ring-Busy Device, Another way of doing it would be to put a
|
||
SPST switch in there so you can turn it on or off, thats what I do and it works
|
||
great (Especially when r0dents start bothering me)
|
||
|
||
2) Connect it to your favorite enemys fone line, and enjoy while watching him
|
||
try to figure out why he isn't getting any fone calls, BUT if the luser has 2
|
||
fone lines I suggest that you connect one Ring-Busy Device onto each fone so he
|
||
doesn't get calls on the other fone from people telling him that his fone is
|
||
phucked.
|
||
|
||
|
||
Conclusion
|
||
----------
|
||
Well as this file comes to an end, I would like to tell you to call some of the
|
||
best boards around:
|
||
|
||
|
||
Disclaimer
|
||
----------
|
||
This file is for informational purposes only, it is not meant for small
|
||
children or the mentally unbalanced. In no way is the author liable for use or
|
||
misuse of this device. Also note that the author can not and will not take any
|
||
responsiblity for any actions as a result of this file.
|
||
|
||
==============================================================================
|
||
|
||
.......................................
|
||
. The HOW TO File .
|
||
. On Crashing A C-Net .
|
||
. Part Two .
|
||
. By ]>itto .
|
||
. AKA Shlomo .
|
||
.......................................
|
||
|
||
|
||
Introduction:
|
||
-------------
|
||
In this file on Crahing a C-Net I will discuss methods of making, using, and
|
||
getting backdoors on C-Net, I will also show some C-Net programming and how to
|
||
make your very own backdoor!
|
||
|
||
First I will discuss ways to get SysOp access on a cnet...There are a few ways
|
||
and most are effective.
|
||
|
||
|
||
Method 1
|
||
--------
|
||
Now this method is quite simple BUT a certain access level is needed. This
|
||
works like this:
|
||
|
||
First: you must try and convince the SysOp to give you SubOp access of one of
|
||
the UD sections, this is the only thing stopping you from complete control of
|
||
his board. If you dont have a commie then try to convince him to have maybe a
|
||
g-philes section or a UD section of your computer type and for him to make you
|
||
a subop, this won't be too hard if you are an expert in the art of
|
||
bullshitting.
|
||
|
||
Second: (This is the easy part) Log on the board real late at night (somewhere
|
||
between 2-4am) and go into your sub in the UD section, then hit Z for subop
|
||
maintenance and once in there hit 2, once you are at this menu change the name
|
||
of the UD section to: name/e (where the name is the name of the UD). Then
|
||
leave the subop maintenance and leave the UD section, then go back into the UD
|
||
section and you will see that your UD section is now a ENTIRE DISK EXCHANGE
|
||
MODE which means you can kill/upload/download anything on the disk.
|
||
|
||
Third: Now you must make for yourself backdoor, and then upload it to the
|
||
board in place of the a prg. file already on the disk (making a backdoor for
|
||
yourself will be discussed later)
|
||
|
||
Fourth: Now just execute the prg. file you replaced with your backdoor and
|
||
your set!!
|
||
|
||
|
||
Method 2
|
||
--------
|
||
Now this method is simple and you dont need subop access BUT the sysop of the
|
||
BBS you want to install this backdoor on has to be either:
|
||
|
||
1) a Lazy bum
|
||
or
|
||
2) a completely stupid asshole
|
||
|
||
This is how it works...
|
||
|
||
First: You must go into the p-files section and see if there are any games in
|
||
there, if not then funs over, this method wont work. Dont get your hopes up
|
||
just because there are online games, now what you have to do is execute each
|
||
one and make sure that each one is there and make sure you dont see: 'Error
|
||
reading "name of game"', if you dont get any errors and all the games are there
|
||
then your out of luck.
|
||
|
||
Sorry, but the reason why it would say error reading the game is because that
|
||
game isn't on the disk (or maybe it is just that the sysop misspelled the name
|
||
, in any case...If there is an error than you now have the ability to install a
|
||
backdoor.
|
||
|
||
Second: This is easy from now on, now all you have to do is go into the UD
|
||
section and upload a game with the name prg.name of game missing. Example:
|
||
game missing is wrestling, so you upload a game called prg.wrestling.
|
||
|
||
Get it? Well anyways this prg. that you upload must be you very own backdoor
|
||
(this will be discussed later) Third: Just execute that game after you have
|
||
uploaded it and you in control.
|
||
|
||
|
||
Method 3
|
||
--------
|
||
This is probably the most worthless method and the hardest to do, but what the
|
||
hell. In this method you must:
|
||
|
||
First: Get ahold of an online game that the sysop does not have and is
|
||
somewhat a good game, then install a backdoor (discussed later) and then upload
|
||
it to the UD section, if the sysop is an idiot he will add it to the p-files
|
||
section without even checking it, if he is smart he will check it for backdoors
|
||
and if he is a complete idiot or you are good at hiding back doors than he'll
|
||
add it to the p-files section.
|
||
|
||
Second: Once it's in the p-files section just execute it and go with your
|
||
backdoor. That simple!
|
||
|
||
|
||
Method 4
|
||
--------
|
||
Do the same as method 3 BUT do not install a backdoor in the game, and wait
|
||
till he puts it in the p-files section, once he does go into the UD section you
|
||
uploded it to and check if its still there, if so then since you uploaded it,
|
||
just kill it and then upload your backdoor, then execute the game and Ta Da!
|
||
|
||
|
||
Making A Backdoor For Yourself
|
||
------------------------------
|
||
NOTE: It always helps to have a commie at hand when editing or making games or
|
||
backdoors for CNET but I'm sure any computer will do.
|
||
|
||
Here I will discuss some of the variables needed and some sub-routuines need to
|
||
make a backdoor or game.
|
||
|
||
Well first of all to start out all CNET games MUST be between the lines of
|
||
512-580, and you can not skip lines.
|
||
|
||
---------------------
|
||
Important Variables:
|
||
---------------------
|
||
a$ - used to print out things on the BBS, goes with a gosub 40, for example if you wanted to print out 'axeman is
|
||
an asshole' you could do that by doing:
|
||
a$="axeman is an asshole":gosub40
|
||
ac% - this is your access level, the access levels of cnet go from 0-9 (9
|
||
being sysop, and 0 being new user) I will discuss access levels in detail
|
||
in a later file.
|
||
NOTE: one easy way to make a backdoor would be to but somewhere in the game
|
||
a line like this:
|
||
ac%=9, that would give you sysop access an$ - the response of an input, (in
|
||
other words what the luser typed in)
|
||
b$ - current board # your in.
|
||
cm$ - prompt (example=MAIN:)
|
||
id - your id
|
||
d1$ - last call date
|
||
d2$ - current time and date
|
||
pw$ - your password
|
||
------------------------
|
||
Important Sub-Routines:
|
||
------------------------
|
||
gosub 2100 - like input.(an$=the inputs response)
|
||
gosub 40 - to print something out to the modem,(Example: a$="hello":gosub40
|
||
will print out 'hello')
|
||
goto 6000 - logoff the user
|
||
goto 1300 - the main menu
|
||
goto 512 - execute a p-file(game)
|
||
goto 16000 - read a file
|
||
gosub61000 - do this 1st before going
|
||
to 512 for loading in a game example:
|
||
to load 'dumb game' do this:
|
||
a$="dumb game":goto61000:goto512
|
||
Well those are some of the real neccesities.
|
||
|
||
NOTE: When printing something out to the modem a ctrl-k will act as a
|
||
carriage return. Example:
|
||
a$="<ctrl-k>hello<ctrl-k>":gosub40 that will print a return then hello and
|
||
then another return.
|
||
|
||
|
||
Backdoor Example:
|
||
-----------------
|
||
Here is a very simple example of a backdoor file for cnet, if you want you can
|
||
use this, or your very own backdoor.
|
||
|
||
Here goes:
|
||
|
||
512 a$=" a stupid backdoor ":gosub40
|
||
513 ac%=9:goto1300
|
||
|
||
As you probably know the example i've given will print out' a stupid backdoor '
|
||
and will then give you sysop access, and then return you to the main menu. The
|
||
above is ofcourse a lame example, I dont have time for a complicated one. But
|
||
I think you got the idea...If not then leave me mail on any board I'm on. Also
|
||
try contacting your local commie user, he might be able to supply you with some
|
||
nice ones, If you need one real bad, let me know and I'll make a few for you.
|
||
|
||
|
||
C-Net Trick
|
||
-----------
|
||
This isn't much but it is a simple way to find out who posted a anonymous msg
|
||
on a CNET, this only works with the main message not the responses. What you
|
||
do is read the message and then privately reply to the idiot who posted the
|
||
message(Ooops I forgot to tell ya that you have to have a good idea of who the
|
||
hell posted it...) then once you have done that go into the e-mail section by
|
||
hitting M at the main menu and then type V to verify someones mail then all you
|
||
do is enter that persons name and if it says that guy has a msg from you that
|
||
you know it's him... Not so great a trick eh?
|
||
|
||
==============================================================================
|
||
|
||
-----------------
|
||
/ / BY
|
||
/ HAVE SOME /
|
||
/ / THE
|
||
/ FUN WITH /
|
||
/ / FASCIST
|
||
/ CALDOR PHONES! /
|
||
/ / PLATE
|
||
-----------------
|
||
|
||
So, you are walking through your local Caldor, you see a phone sitting there,
|
||
there are no clerks around, and nobody is watching you, it is now time to use
|
||
the phone. Yes, you too can make calls to lots of different and strange places
|
||
in your Caldor! In this first issue of Caldor Phone Numbers, I will give you
|
||
some neat numbers to mess around with. To use these numbers, pick up the
|
||
phone, dial a 7, then wait for a louder dial tone, then you can put in the
|
||
number of your choice. Here are the numbers you could use:
|
||
|
||
SPECIAL NUMBERS
|
||
------- -------
|
||
|
||
Accounts Payable 6235
|
||
Accounts Payable Adjustments 6234
|
||
Admore Distribution 7186
|
||
Advertisement Department 6161
|
||
Cafeteria 6269
|
||
Charge Sales 6219
|
||
Central Delivery 6129
|
||
Check Authorization 6401
|
||
Check Control 6211
|
||
Co-op Advertisement 6253
|
||
Computer Room 6025
|
||
Conference Room I 6244
|
||
Conference Room II 6356
|
||
Conference Room III 6388
|
||
Conference Room IV 6337
|
||
Construction Department 6266
|
||
Consumer Affairs 6004
|
||
Controller 6008
|
||
Data Processing 6365
|
||
Distribution Center 3020
|
||
Duplicating 6158
|
||
Executive Benefits 6003
|
||
Expense Department 6215
|
||
Gym 6196
|
||
Help Desk 6667
|
||
Internal Audit 6083
|
||
Inventory Control 6222
|
||
Legal Department 6242
|
||
Leisure Line Toys 7300
|
||
Mailroom 6159
|
||
Maintenance Department 6678
|
||
Operations Supervisor 6230
|
||
Payroll 6251
|
||
Personnel 6174
|
||
Personnel Benefits 6317
|
||
Printshop 6272
|
||
Purchasing 6203
|
||
Ralar Distribution 7195
|
||
Real Estate 6242
|
||
REceptionist 6240
|
||
Sales Audit 6217
|
||
Security Department 6256
|
||
Security REgionals 6256
|
||
Telelcommunications 6339
|
||
Traffic Accounts Payable 6663
|
||
Traffic Hauling 6315
|
||
TWX Message Center 6152
|
||
|
||
Those are all the numbers for this first file on Caldor Phone System.
|
||
|
||
One last thing you might want to do is to dial 0, then ask the operator to page
|
||
customer assistance to hardware or some other department, it might be
|
||
interesting...remember, these numbers are for informational purposes only, I do
|
||
not approve of you using them. Be sure to look for the next file on Caldor
|
||
Phone Systems!
|
||
|
||
TFP
|
||
|
||
|
||
Some neat telephone numbers to call on a boring day.
|
||
-------------------------------------------------------------------------------
|
||
|
||
NATIONAL STATES' RIGHTS PARTY 404-427-0283
|
||
NAZIS IN ARLINGTON 703-524-2175
|
||
NAZIS IN CHICAGO 312-863-8700
|
||
NAZIS IN CLEVELAND 216-631-6448
|
||
LIBERTY LOBBY 703-546-5611
|
||
NATIONAL ALLIANCE 703-525-3223
|
||
|
||
KU KLUX KLAN CHAPTERS:
|
||
|
||
DAVID DUKE 404-835-7959
|
||
HAROLD COVINGTON 919-834-0063
|
||
BILL WILKINSON 504-665-1018
|
||
FRED WILKINS 303-232-8114
|
||
FALLBROOK, CALIFORNIA 714-728-0280
|
||
SAN DIEGO, CALIFORNIA 714-563-4555
|
||
ANAHEIM, CALIFORNIA 714-750-7848
|
||
LAKEWOOD, COLORADO 303-232-8373
|
||
|
||
OTHER REACTIONARY LOWLIFES:
|
||
|
||
PHYLISS SCHLAFFLY 618-462-5415
|
||
G. GORDON LIDDY 301-567-3607
|
||
DAVID ATLEE PHILIPS 301-365-2238
|
||
PETER BOURNE 202-462-7266
|
||
WILLIAM COLBY 301-320-4646
|
||
RICHARD HELMS 202-686-1560
|
||
BERNARD BARKER 305-266-2220
|
||
L. PATRICK GRAY 203-535-1685
|
||
|
||
I am not too sure if these numbers are all still correct, these people might
|
||
have moved since these were compiled. It is a little bit old. Oh well, have
|
||
fun with them anyways...and remember...phone harassment is against the law!
|
||
|
||
One little address you might want to write to...
|
||
|
||
THE CROSS & THE FLAG
|
||
P.O. BOX 27895
|
||
L.A., CALIFORNIA 90027
|
||
|
||
Remember, this stuff is just informational, and the author of this file can not
|
||
take responsibility for what the readers do with this information!
|
||
|
||
|
||
This information was taken from the book GETTING EVEN 2.
|
||
-------------------------------------------------------------------------------
|
||
"Commies" -- To the tune of "Fight For Your Right"
|
||
by the Beastie Boys.
|
||
|
||
|
||
Yeah! Boot it!
|
||
|
||
Turn your commie on, and it don't wanna go...
|
||
Ask your mom for an ST, but she still says no...
|
||
|
||
You blow three power packs, and it still won't work...
|
||
So you boot up Zaxxon like some kinda jerk...
|
||
|
||
You gotta fight, to get it right, on commies-----!
|
||
|
||
You saw your drive smokin' and you said no way...
|
||
Some dude crashed your board and it's been spinnin' all day...
|
||
|
||
Those 1541's are such a drag...
|
||
It just set fire to your best Commodore mag...
|
||
|
||
You gotta fight, to get it right, on commies-----!
|
||
|
||
<guitar solo here>
|
||
|
||
You're not leavin' this board unless you u/l k00l warez...
|
||
I'll trace this call and I bet you'll be scared...
|
||
|
||
You're mom bust's in and says what that smell?
|
||
Mommie don't worry my system's shot to hell...
|
||
|
||
You gotta fight, to get it right, on commies-----!
|
||
|
||
On commies--------!
|
||
On commies--------!
|
||
On commies--------!
|
||
|
||
Yeah!
|
||
|
||
This file brought to you by the Beastly Boyz.......
|
||
Bellcon & The Surge
|
||
5/87
|
||
|
||
Well, that was the first issue of the Mishandled Information Publication! If
|
||
you would like to talk with any of the writers of this magazine, please call
|
||
these fine BBS's:
|
||
|
||
TSD 24 HOURS 518/377-6487
|
||
ANARCHIA 24 HOURS 518/869-6035
|
||
|
||
If you would like to submit an article for upcoming issues of MIP, please
|
||
contact me on TSD or Anarchia, I am on them as The Fascist Plate.
|
||
|
||
I hope you have enjoyed reading the Mishandled Information Publication, if you
|
||
have any comments or questions, contact me on the boards listed above.
|
||
|
||
The Fascist Plate
|
||
|
||
|