1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-06 15:26:54 +02:00
This commit is contained in:
OPSXCQ
2018-02-08 19:44:11 -03:00
parent 44e68b3c83
commit 3dfdb6967e
65 changed files with 10195 additions and 0 deletions

View File

@@ -0,0 +1,351 @@
*** Dumpster Insights ***
Report #1 (NET/NYNEX)
by: ..oooOO Count Zero OOooo..
&
Brian Oblivion
: -=Restricted -=Data -=Transmissions :
: :
: "Truth is cheap, but information costs." :
(And *some* information you must DIG for...literally..)
Welcome to issue #1 of _Dumpster Insights_, the magazine that prints TRASH.
Yes, we at -=RDT have been 'dumpster diving' lately, and have found some
interesting tidbits of information. We intend to share some of these
findings in this issue and subsequent releases of _Dumpster Insights_. Of
course, the contents of each issue of _Dumpster Insights_ will vary according
to the contents of the DUMPSTERS! We can only print what we dig up.
Dumpster Diving is a thrill. Phrack #36 left out *one* important item in
the "REAL Cyberpunks" article:
REAL Cyberpunks aren't afraid to get their hands dirty.
Nuff said...here we go.
*** FAX Trash ***
Lots of faxes get tossed in NYNEX dumpsters. Currently, employee moral is
very low, with all the recent layoffs and employee/supervisor/union strife.
Around Christmas, we were delighted to find a number of faxes that illustrate
this nicely...
FAX transmission: Dec '91------------------------------------------------------
'TWAS A MONTH BEFORE CHRISTMAS
'Twas a month before Christmas and most managers agreed
What for Christmas this year we might get F M P'd!
The FMP forms were all carefully prepared,
In the hopes that, when time comes, our jobs would be spared.
There was Ranking and Rating and everyone was banded,
To make sure it was fair and not underhanded.
When one day in the office there arose such a clatter,
I sprang from my desk to se what was the matter.
A green letter was spreading unfortunate news,
Giving contract details and company views.
The new contract was settled a year in advance,
With full medical benefits - a real kick in the pants.
And they extented that sucker to nineteen ninety-five,
Which sent hopes for the future into a nosedive.
The atmosphere now was as cold as the snow,
And forget the morale - I've never seen it so low.
So we wait, and we work, but we're sad and angry,
That this "Family" company could treat us so badly.
When the president said, in a televised speech,
To reduce through attrition was a goad within reach.
But if layoffs become real, he said not to sob,
'Cause he'd set up a board that could get you a job.
Now he spoke with a tongue that was lively and quick,
And you knew in a moment that this man was a prick.
That feeling you had in your gut since the strike,
Like the Dutch boy whose finger was stuck in a dike,
Now became real as the whole "dam" thing falls,
And you realize the company has you by the balls.
Yeah, they talk about Quality and how it should work,
But they must think we're stupid - they take us for jerks.
For when push comes to shove, it's the union who's boss,
And they have the last to say, while we stand at a loss.
And I heard him exclaim as he turned off his mike,
Screw the management force, give union what they like.
-------------------------------------------------------------------------------
FAX transmission: Dec '91------------------------------------------------------
THE NYNEX TWELVE DAYS OF CHRISTMAS
ON THE TWELFTH DAY OF CHRISTMAS, NYNEX GAVE TO ME....
twelve buyout rumors
eleven nervous breakdowns
ten axes falling
nine lawsuits pending
eight RMC's closing
seven hundred layoffs
six officers indicted
five plus five
four force adjustments
three regions combining
two reorganizations and
** a head count that didn't include me! **
-------------------------------------------------------------------------------
FAX transmission: Jan '92------------------------------------------------------
New England Telephone EMPLOYEE SALE!!
SAVE up to 46%
That's right friends....you heard it here first.
We can't lay 'em off anymore, so we're SELLING 'em!
ALL OF THEM!
We have to downsize our new one-employee-per-business unit goal,
and you can help us do it.
YOU SAY YOU WANT NEW?...We've got 'em..employees with low mileage, high
performance, and a lot of good years left.
YOU SAY YOU WANT OLD RELIABLE?...We've got them, too. Their paint's a
little gray and they grumble a lot, but they've seen it all and keep
on working.
We've been thinking of the layoff business for months, and losing ALL that
severence pay will take it's TOLL. Now help us make a little money on the
deal!
So...come one, come all to the FIRST ANNUAL NEW ENGLAND TELEPHONE
EMPLOYEE SALE.
Don't miss a bargain!
SPECIAL - Buy TWO and get a FREE TOUCH TONE PHONE.
-------------------------------------------------------------------------------
Yes, those were GENUINE faxes...funny stuff, but it really gets across the
current state of employee morale..."We're the one for you New England,
New England Telephone...part of the NYNEX Family"...swell.
Here's a little blurb culled from a NYNEX Signature Graphics Standards manual:
"This manual describes the proper use of NYNEX signatures - the
building blocks of our corporate identity. It is designed to
assist both employees and suppliers alike who are responsible for
implementing our corporate identity in all of its visual manifestations.
As NYNEX people dedicated to projecting a positive image of NYNEX,
to both the public and our fellow employees, it is essential that we
apply these standards in a consistent and proper manner.
The NYNEX corporate signature, consisting of *only* the name NYNEX,
is the keystone of our identification system. When shown in its
specially designed letterforms, it becomes more than just letters or
a name. It is a symbol with nuances built into it which allude to
the origins of our information company. *NY* represents New York,
*NE* signifies New England, and *X* stands for the excellence of our
people, our products and services, and our future. These components
joined together with lines extending from the E throught the X form a
unique signature which EVOKES THOUGHTS OF HIGH TECHNOLOGY, LINES OF
COMMUNICATION AND A SENSE OF UNITY, ORDER, AND STABILITY."
Ahhh...inspiring...words to build an Empire...
Here's a list of Public Service Center telephone numbers..these are
for New England Telephone/NYNEX in Massachusetts...
PUBLIC SERVICE CENTER
TELEPHONE REFERENCE LIST
PUBLIC SERVICE CENTER---------------------------------
Semi-Public
Customer # 1-555-1717
Manager 617-965-9030
Intra/Expediting 617-965-9018
Fax # 617-964-7012
Public
Customer # 800-446-7691
Manager 617-965-9035
Intra
617/508 617-965-9040
All others 800-446-7691
PTACS 800-446-7691
SOA's 617-965-9014
Service Order Room 617-969-9726
Fax # 617-969-9726
COCOT Service Center
Customer # 800-621-0033
Manager 617-965-7468
Intra # 800-621-0033
Fax # 617-969-9249
Centralized Repair Bureau (CRSAB)
Business 1-555-1515
Coin 1-555-1611
Residence 1-555-1611
Customer Names & Addresses (CNA)
617-787-2750
Customer Response Center (CRC)
800-555-5000
Data Base Update Group (DBUG)
508-762-1648
Directory Assist Data Base
617-367-9952
Legal Department
Accident/Claims 617-743-2763
Claims Information 617-743-2670
All Other Inquiries 617-743-7773
Final Bills/Bankruptcy 617-743-6773
Ever want to call a NYNEX/NET garage?
Garage Telephone Number
------ ----------------
Milton 802-863-8440
Methuen 508-683-1942
Conway 603-447-2754
South Kingstown 401-789-1088
Portland 207-774-4565
Medford-West 617-391-9928
Framingham 508-879-0775
Springfield 413-734-9983
Medford-East 617-391-9945
Boston 617-451-8295
Dedham 617-326-9901
E Providence 401-438-9391
Brockton 508-587-9912
Shrewsbury 508-842-1818
Manchester 603-645-2062
Bangor 207-945-9996
Weymouth 617-337-9969
Northampton 413-586-1943
Hyannis 508-775-0902
Other interesting trash-prizes include issues of "Inside Operations,"
a monthly newsletter for NET Operations employees. Here are excerpts from
December '91 and January '92:
Operations Forum
(To provide a forum for employee thoughts and ideas...)
"If you could change one thing about your job, what would it be?"
Employee response: "I would implement a better system to fix NET's
circuit troubles. I've been told that unless our
own internal troubles are escalated, some trouble
tickets don't even get looked at. SCC circuits, for
example, impact our daily operation because they're
the CO's only link to the SCC for 24-hour alarm
service. Priority circuits should be identified
and noted in CIMAP/TIRKS."
** Dial Tone Left at Home **
Installation and network employees in the Pawtucket/Providence, RI
area are involved in a six-month trial of the Left In Dial Tone (LIDT)
process. The trial, which began last November in Pawtucket and Buffalo, NY,
will evaluate the impacts of the LIDT process on more than 20 provisioning
systems.
LIDT is a key component of RediServ, a major corporate business plan
initiative to provide dial tone to a customer's location quickly, cost
effectively, and with minimal manual intervention.
LIDT leaves a restriced dial tone on a subscriber's line when service
is disconnected. When new occupants move into the LIDT location, they have
access to Emergency Services (911/E911) and their Residence Service Center.
All other callls from the restriced dial tone, including "0" operator calls,
are intercepted by a recording advising the customer of the dialing
capabilities of the line.
Since the process begins with a customer's disconnect order, Pawtucket
was selected for the trial because of its high customer turnover. About
700 lines in the area are now working with restricted dial tone.
Mechanized Loop Assignment Center (MLAC) line assigners have matched
customer addresses between databases, and verified that cables and pairs
are wired from the CO to these locations. In addition, they manually assign
any LIDT orders that do not flow directly through the provisioning system.
In the Recent Change Memory Administration Center (RCMAC) [Oh GOD..please..
...make these acronyms from HELL go AWAY!... -c0] most translations on
LIDT orders are automatically completed.
For CO technicians the trial has meant more dedicated wiring on the
frame, but less rewire work on subsequent installations. And for splice
service technicians (SST) LIDT should mean fewer dispatches on installation
orders. However, as with any pilot program, problems occur.
Early in the trial SSTs were dispatched unnecessarily for installations
at restricted dial tone locations. A vendor-supported system had caused a
local coding problem for clerks in the posting of completions on LIDT orders.
The problem has since been corrected, and according to Manager Linda
Briggs, the "No Premise Visit" (NPV) rate in Pawtucket should drastically
improve to meet or exceed the 99.3 percent NPV rate in Buffalo, NY.
"Once the LIDT process is fully deployed, installation work for
technicians will become the exception rather than the rule. As a result,
technicians can spend more time on maintenance and outside plant
rehabilitation which will increase service reliability and decrease NET's
cost per access line," says Briggs.
Another issue involving unnecessary police dispatch to LIDT locations
briefly occurred. Rhode Island's Public Service Administration Board
mistakenly understood that 911 operators would be able to call back an LIDT
location if the customer hung up. To correct the situation new LIDT messages
were recorded, expedited through legal channels, and implemented in Pawtucket
on January 17.
"Access to emergency services has been a lifesaver for some Pawtucket
customers who dialed 911 from an LIDT location in a tru emergency and had
the appropriate authorities respond immediately," says Frank Lanza, staff
manager.
Yet another benefit for customers in the LIDT process is service
reliability. Throughout the night all central office lines, including the
LIDT lines, are scanned and tested by a computer [Hrmmmm...mebbe *monitored*
too?...hrmmm... -c0]. As a result, troubles are repaired by the maintenance
center often before customers are even aware that a problem existed.
"For customers Left In Dial Tone will make NET easy to do business
with and will positively position the company in the competitive marketplace,"
says Briggs.
** Of Note... **
More than 2.4 million (49.8 percent) of NET's residence and simple
business customer records have been verified using the NYNEX Data Validation
System (NDVS). The system compares critical information from five key
databases - CRIS, COSMOS, LFACS, LMOS, and PREMIS - and reports discrepancies
for follow up by Mechanized Loop Assignment Centers (MLACs), central offices,
and other work groups.
In association with RediServ, a major company initiative to allow
faster service installation, data management groups at NET and TRG are
coordinating the line-by-line record verification effort. Employees often
identify inaccurate records as a source of service problems and frustration.
Well, that's it for now....nothing 'earth-shattering'....but interesting
and fun to read nevertheless....and since NET/NYNEX is so ANAL about giving
out information, the only way to get it is to *trash*...
Look for the next issue of "DI" to come out next month or so......
Till then...don't stop exploring....and don't be afraid to get your hands
a bit dirty....
..oooOO Count Zero OOooo.. *cDc* -=RDT


View File

@@ -0,0 +1,254 @@
THE ........ULTIMATE..........GUIDE........ON...........TRASHING
///\\\ IT's NOT FUN, IT's SCIENCE! ///\\\
DEFINITION: Trashing is the operation of recovering paper
documents, bills, checks etc. from the persons or companies garbage
cans(bags). Trashing is one of the the oldest and safest ways to get any
kind of information(if u know what r doing)
SAFETY: This is very safe method, because usually it
doesn't involve any illegal actions, except trespassing when it's nececery,
it is virtually impossible to get into serious trouble for trashing.
Here's the tip, with it u are never gonna get in any kind of trouble,
REMEMBER u should never look like u are searching for paper documents or
any other kind of private information, which can easily be considered
illegal.(will be explained later)
STRATEGY: Strategy is more important than most of u kids
think it is. Everybody should have his own strategy, but here are some
hints. It's very important to see three parts of the process which are
targeting, planning and action. Most of u clearly see the last part.
Targeting or choosing the object for your next mission is very important,
u wouldn't like to trash some supermarket or store, and then find out that
they don't even accept credit cards or bank where they shred all the
fucking paper, however usually it's not so hard to choose the right object,
a little bit of research and common sense, basically thats all!
Planning - the most important and probably the most difficult part, here
u should plan your mission considering everything: time, weather conditions,
location, security (surveillance and police patrolling), crime situation in
the area (in poor neighbourhoods, where robberies and usual crimes like
that are very frequent, police and people are very suspicious of every dude
walking around dressed in the black) , crowdness , "dress code" and of
course action itself.
Action completely depends on your physical abilities
(jumping over the fence, sneaking in to the backyard,etc) and abilities of
your tools. Also u should know that trashing takes a lot of patience,
sometimes u have to go for weeks to the same place, until u find what u r
looking for, so it's not a good idea to mess the site up or burn the
garbage cans to the ground, even though that can be phun!:-0)
TARGETING: There are two ways of targeting : RANDOM - when u
are basically guessing your future objects using your common sense, for
example most people know that banks throw out a lot of paper, so why
shouldn't i check one of them. Usually when u use that method u don't know
exactly what are u looking for, u r just browsing the paper, searching for
something that could interest u, like numbers, signatures, handwriting.
POINTED - is the other, more sufisticated method of trashing, that involves
some research. Here, the goal is to get as much information as u can about
organization and its activity. The best example, is the trashing of
the private sector, everybody knows that most of the credit card companies
send their statements at the end of the month, so the good idea to trash it
around this time to get the best results. Following the recycling days also a
good example of pointed trashing.
PLANNING: Remember the most important thing is to plan your
actions, so it will take u the least amount of time possible, without
getting a lot of attention.
TIME: of course the best time to go trashing is from 2-5 am
(in the big cities), however from my own experience u should do this 4-5 am
when it's not dark anymore but there are still no people on the
streets and your local police units seem to be more relaxed, waiting for
the opening of Dunkin Donuts. Don't be too late, though, if in your area
garbage squad works on any kind of schedule(hehe), u don't wanna come over
and see all the garbage collected! The best night for trashing is the night
before collecting, which u can easily find out by the signs on the street
that say :NO PARKING on particular days, recycling days really can be
helpful since all the paper and cardboard should be wrapped and left in
front of the house, to find out recycling days in your area u should
contact your local department of sanitation (212-219-8090 for NYC
(sanitation action center)) recycling days usually go with interval of 2
weeks (except holidays). By the way do not spend more than 10-15 minuts
trashing, 15 minutes should be more than enough!
WEATHER: of course it doesn't really matter, but
if it's raining and weather is shitty itself chances are u'll be doing your
thing without major interruptions. It good to start right after the rain has
started, that way u won't find most of the paper documents damaged!
LOCATION: Most of the backyards these days remind
concentration camps of the WWII, so u gonna need some skill to go through
those fancy fences. If don't have a lot of experience or u just don't
feel like breaking the law, choose target with an easy access so u won't
get a lot trouble getting in and out.
DRESS CODE: Get your old dark clothes from the closet and u
are set! However u can't look different from the people in the
neighbourhood! And of course no need for army stuff like camouflage pants,
black gloves and hats, don't get extreme, people will figure some serial
killer they were expecting all their life finally came in their
neighbourhoods, and will call the cops, just for the regular check up!
PEOPLE (amount): U should avoid usual hang outs
and places where a lot of people happen to like walking through in the
nighttime.In the daytime big crowds are you best allies, if u planning to
trash the cashier's garbage can, in your local WIZ or whatever, the best
hours are from 12 to 4 pm, when either the store is so crowded that you can
take the cashier machine with the papers or it's empty, and most of the
employees happened to take a lunch break or too lazy even to look around!
SURVEILLANCE: Of course u know today most of the
companies, i don't even talk about banks, armed with the latest pieces of
surveillance equipment, cameras in the backyard of course are the worst and
most common enemies of the trasher, so before diving in, look around,
chances are, theres something that can see u, a lot of private houses have the
movement detectors, u know this really annoying thing that lights up when
someone's walking around, one of my stupid neighbours put one outside his
house, now it goes off, everytime someone walks by the the house, just
break the bulb, and that shouldn't be a big problem.
ACTION: Ok, here we are ,everything is prepared, the date is
set, your new armani suit is waiting for you in the closet, u are ready to
go! U are gonna need some tools to help you finish everything faster and
safer, of course! What u have to know is that u cannot take anything that
will not be helpful or can reveal your identity if u loose it.
BLADE - one of the most important tool for u!
Remember those old razors where u had to replace the blade, well thats the
blade u need! I know it's pretty hard to get one today, but u definitely
should check your local pharmacy for it!
Utility knives : some people use them
because it's safer to carry on and u can use them for other things like
striping wires, but i don't like to use utility knives because they are
pretty big and it's pretty hard to get rid of when u have to, the other
thing is that it doesn't work for me that well! If u don't want
accidentally slash yourself u may consider put some iso-tape(electrical)
over it, and use it as a handle.
Rubber(latex) GLOVE(s) - here's another tool, for people
like me, who don't really enjoy going through somebodies leftovers or
whatever is in there! I use one glove, the technique is: i carry blade in
one hand and on the other i put the glove, to go through the actual trash.
When u get used to this technique, the work goes amazingly fast. After the
job is done the good idea would be not to put the glove in the same
garbage can!
FLASHLIGHT: I know it's a very important thing
to have with u, but here in New York i used it maybe twice going trashing, the
streets are so lighten up, i guess u can find a penny in the trash here
without using any portable source of light!
BAG(s): First of all u are gonna need a
bag to put all you foundings in it, the second bag can be very useful (see
SLASHING) My advice do not carry the bag while going through the trash. Put
it in the can with the rest of the trash, and only after finishing take the
bag and leave fast, otherwise u will cause brain damage to the cop or guard
when he will be thinking why is the guy searching for his watches or cans
has a bag full of documentation and other paper, and we wouldn't want to do anything
like this!
GOOD LINE (story): REMEMBER, really good line
that can explain your actions can save maybe not the life, but your ass for
sure, something like: I was today in this bank, and left my student ID on
the counter(wherever), and when i called them up they told me that someone
must have put it in the garbage, so i called the sanitation and they told
that today is the collecting night in that area and to search for the
wallet would cost me 70$, so i have decided to go and search for it by
myself! This is very good line, even security and cops have a heart, so
that can even explain trespassing, and shouldn't cause any problem at all,
maybe warning! Now here u want to keep in mind the situation u r in, if u
have a bag full of paper u should come up with explanation, which is not so
easy, to avoid this situation please refer to the paragraph on disguise!
* DISGUISE: It's extremely important to
include this in your "action pack", what can be considered as disguise, is
something that can support your great story, remember this old disguise, i'm
sure most of u use, put a couple of cans in your bag, now u can bull shit
security about collecting the cans for some competition or just for
yourself, very nice! But here something i made up myself, and it seems to
be working for me with any line i use: U know, a lot of old people actually
collect all the plastic bags, why would they buy new ones, so if u are
gonna put about 5 plastic bags in your bag, u can easily get of the hook,
claiming that your old grandma asked you to pick up some plastic bags on
your way, since she knows that your going to go through the garbage!
(for whatever reason u told the cops) Usually they ask u to take out what
u have in the bag, u just look inside your bag and find your lifesaving
plastic bags, here u go sir, if the cop is really pain in the ass and finds
out that u have paper in the bag as well, just tell him that it must have
been in the plastic bags u 've found, and u didn't want to take it out here,
because it's kind of embarrassing u know, if some of your friends see u
diving in the garbage can! hehe Yeah right, i guess that sounds nice! As i
said before cop too has a heart and a little bit of brain so if your story
sounds LOGIC u shouldn't have a lot of shit on you! hehe Thats idiom!
Another tip before u've started, don't hang around people's cars,
windows and other valuable stuff, u know people usually get pissed off
because of that!
PRIVATE HOUSING: trashing here can be very complicated, if u
don't know how to do it right. Here u are gonna have to deal with bags.
(see SLASHING) First of all u should think before doing this on the
site: it will take u a lot of time, trash here is usually very dirty and if
u live in your own house or know some quite place outside, a good
idea would be to bring a couple trash bags in your back yard. If u live in
apartment like i do, here what u can do: DEPARTMENT OF SANITATION
in the big cities is very strict and always make up some shit like
recycling or just sorting the trash! Well i guess thats all u need, in NYC
city looking for the papers u should check all the GREEN garbage cans,
where all the paper should be. U can go further and use you social
engineering skills to call up people in the house, posing as an employee of
the department of sanitation, and tell them that last time, workers found
in the their trash checks, bills and statements, which is illegal
to put with the regular paper, because they contain some chemical
(dEnopEroXId......whatever)(i'm not Mendeleyev, neither have to be u)
which is none recycble, and can cause serious damage to the
atmosphere :). SO next time please put all your checks, bills
(whatever u want them to) in the pink bag, u can also ask them to mark it,
something like "RADIOACTIVE" or "BODY PARTS", even can
specify the date when they should take it out! hehe. So next time u'll be
around u can easily determine where is everything u need. This
method will work in the big cities where SANITATION is very powerful and
strict, once i put my paper in the bag, and got ticket just because i
didn't wrap it up.
GOVERNMENT and COMPANIES structures: all the garbage they
usually keep in the back yards, however if u don't see any drive access to
the back yard they probably take it out on the garbage day(a lot of banks
in my neighbourhood do that, because of the limited space in the backyard,
or because they don't have a drive access to it, they have to take it out
anyway) Certainly this can be the easiest way to trash, just wait until the
garbage day, go there and here u go, in front of the bank or whatever, u
see 3 or 4 carefully tied bags. If u want to be there first, u should go
right after the closing, and don't worry to be late for it, no
selfrespectful sanitation department will pick up the garbage earlier than
the middle of the night.
SLASHING: Slashing the bags is the fastest way to open them,
right!? If u gonna trash one of those big metal trash cans, u can dive in
and leave whatever mess u want, it doesn't really matter those big garbage
trucks will take the whole can, but when u trash private house it's very
important not to leave any mess after you. All the garbage from houses and
streets those garbage men will pick up with their hands, and i don't think
they will be happy to see slashed bags with all this mess around, the owner
will definitely get a ticket for that. The solution is to take another bag
where u can put all your mess, without getting hardworking men angry. U
gonna get used to slash the bags in the right places, so u won't get too
dirty and finish the damn thing faster.
CAUTION : Right now, when u r reading this, someone can
easily be trashing you, so if u don't want to become victim of this
document, please do not throw away any papers that can reveal anything
from your personal data!
release date: 11/97 by :
::::::::::::::::::::::::: GOLDEN DUST ::::::::::::::::::::::::::

View File

@@ -0,0 +1,110 @@
>>>>> TRASHING TECHNIQUES <><<<<<<<<<<
////////////////////////////////
/ MORDOR AE - 528-6467 ZANDAR /
/ THE BASEMENT - 223-6404 /
////////////////////////////////
THE UNDERGROUND ALLIANCE RULES!!!!!!!
Ok guys...first,there has to be a bell telephone station near you or someone
close to your heart......
The best type to look for is known as a "VAULT" if you have seen one you know
why it is called just that... it has four walls, no windows, and most likely a
digital combination lock.
NEEDED EQUIPMENT
======================================
1:Sneakers(in case of cops)
2:Sheet of paper w/excuses if caught
3:Clean garbage bag(several)the ones you find in the dumpster reek like all
hell
4:One flashlight(good batteries)
5:Dark(possibly camouflage)clothes
6:A friend(trustworthy not a wimp)
7:One bottle of j.d.(just for the hell of it)
======================================
LIST OF EXCUSES
======================================
1:I forgot murder was against the law
2:I was lost..
3:I was hungry
6:Needed a place to sleep
5:Why not?
6:Lost something in the garbage
7:Needed wallpaper
8:Fuck off and die
9:Read me my rights first
10:It's the new fad..garbage pursuit
======================================
BE PREPARED FOR...
======================================
1:An immediate unforseen departure from the premises(w/the stuff!)
2:Zandar's law...for every piece of inorganic garbage there is an
equal and substatially worse smelling piece of organic shit!
3:Your friendly neighborhood cop
4:A shower when ya get home
5:A lot of garbage
6:Potholes and ditches that you never knew existed
======================================
WHAT TO LOOK FOR
======================================
1:Anything that looks dead...
2:Anything that looks like a computer printout(or manual)
3:Hardware(with a lot of luck)
4:Police(look do not find!!)
5:The garbage area
6:An escape route
7:An obscure and well hidden stash area as well as an obscure
approach
=======================================
WHAT NOT TO DO
=======================================
1:Get caught
2:Panic
3:Leave any sign of your presence
4:(clean the damn place up)
5:Make noise
6:Have more than two people
7:Forget where you live
8:Do not go to the near by restaurant or bar for a quickie
9:Do not do it in the daytime
10:Throw anything back just because you aren't sure what it is...
(chances are it is worth all the more 'cause only telco employees
can understand it)
=======================================
We believe that if you follow these instructions you too can screw over BELL
w/a little luck and half a brain................
=======================================
as a final note,find out when your local sanitation co. picks up the garbage
and go the night before.. also,if the bell place nearest you incinerates its
garbage forget it!
=======================================
written by:
zandar zan
&
the boogyman
=======================================
u
insinerates its garbage forget it!
=======================================
written by:
zandar zan
&
the boogyman
=======================================
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,80 @@
Advanced Trashing Techniques
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
By: Jimmy'z
Introduction:
Trashing is the simple act of looking through other peoples
trash; to find interesting stuff. If you wonder why one would
ever want to consider doing such an act... Remember : One man's
garbage is another man's treasure.
The whole reason for trashing is to find INFORMATION. You
could be interested in getting credit card numbers, computer
system passwords, industrial secrets, blackmail material,
ANYTHING. 99 times out of 100 it'll be in their trash.
Trashing Techniques:
The best time for trashing is in the broad daylight *Unless
the place locks their trash* Remember, if you act really
inconspicuously, nobody will bother you. If by chance someone
asks you what the h*ll you're doing, tell them you're looking for
aluminum cans or something equally as stupid.
Remember to wear gloves, long sleeved shirts, and jeans of
some sort. I've jumped into a few dumpsters containing fiber
glass, nails, and even once : SHIT... It's a dirty business, BUT
IT CAN PAY OFF IF YOU DON'T GET DISCOURAGED. Last time I went, I
found over 500 TRW credit reports (Roughly 750 credit cards, plus
TRW accounts, and passwords.)
Best Places to Trash:
When thinking of a place to go trashing, you must first take
into account WHAT you are trying to find. (You don't want to
trash behind McDonalds if you are looking for credit card
numbers. I highly suggest you NOT trash at a McDonalds - why
look through all that crap. If you are looking for cards, the
best places are malls. Malls are good because they receive by
far THE MOST credit card payments. Trashing really requires
thought on the part of the trasher, and with a little help from
me, you'll be on the right track.
Flower shops are good places to trash. Most flower shops do
most or all of their business through credit (phone orders) And
besides, would you rather look through some smelly, shitty crap,
or dead flowers?! Another really cool place to trash is the
telephone company. If you have one of those big telephone
company buildings, you'd be surprised at the types of data they
throw away. Computer system's passwords, phone card numbers, the
list goes on.
Closing:
Trashing can prove to be very fun, interesting, AND
PROFITABLE! Just keep on doing it, and you'll stumble upon some
really interesting stuff. You never know when you'll find a
briefcase or something filled with cash, or drugs. Another
thing, when trashing - just jump right in there, leaning over one
of those dumpsters can start to hurt after a while!
Disclaimer:
This file is for informational use only. I am simply
reserving my right to free Speech! I love The USA!
----------------------------[ J I M M Y ' Z]---------------------

View File

@@ -0,0 +1,134 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% Better Homes and Trashing %
% %
% Written by..... The Saint %
%%%%%%%%%%%%% %%%%%%%%%%%%%
% Thanx to Ares for his help! %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Intro:
This file is intended for informational purposes only!!!
The authors (The Saint and Ares) take no responsibility whatsoever for
any actions taken by anyone who reads the contents of this file.
Primarily, this file will discuss the general idea behind trashing, the
risks involved, and some general tips to make your trashing venture
successful.
Basics:
The basic reasons for trashing can vary, but are generally:
1> To obtain credit cards and/or carbons of credit cards.
2> To obtain any information that may be useful in the aid of phreaking.
When choosing a place to go trashing, one must keep in mind the following:
1> Location of dumpster
2> Security of property where dumpster is located
3> Type of trash that may be found
First, the location. You generally want to pick a place that is somewhat
isolated, where there will not be a lot (preferably none) of people. To
accomplish this, it is also best to do your trashing at night, as there
will not likely be any employees at the location, and it is easier to hide
and to not be seen by passers-by.
Second, the security. Places such as Telco buildings and large companies
often have security guards on duty 24 hours, and often keep their dumpsters
behind fences so as to discourage trespassing. Yes, you are trespassing when
you start looking in someone's garbage can!!! So it is a good idea to check
out the place you are going to trash for a day or so to get a feel for what
kind of security they have. This way, you can avoid walking in blindly to
some place and getting nabbed, or you can figure out where to park your car,
or where to hide, or how to avoid the security (rent-a-cops).
Places such as department stores and banks most likely will not have any
security for the outside of their buildings as they may not be able to
afford it or may not anticipate trashers. Also, they may not have anything
worth taking! So basically, check the place out before you just go and hit
it.
Case in point. One night, my friend and I casually pulled into the
parking lot of a Pacific Bell office, and before we knew what was
happening, a security guard had a giant spotlight glaring down on us.
We just casually made a u-turn as if we were just turning around to go the
other way. (More on what to do if you get caught later).
Third, you must pick a place where you know there will be trash that is of
use to you. Don't go trashing at some little deli, all you'll get is a
bunch of rotten food! (Unless of course you know for a fact that the deli
deals alot with credit cards). In searching for cards, pick places such as
department stores or places that sell alot of expensive stuff.
Also, the local telephone company is, of course the place to go to find
your basic phreaking info.
These have been some of the basics to keep in mind before you hit aplace.
Now for some techniques to use to help increase the efficiency of your
trashing endeavors.
Tips:
First of all, don't be afraid to actually go into the trash can. This is
almost always necessary to reach the good stuff. Also, when you are ducking
down inside a big dumpster, you cannot be seen by passing police cars or
security guards who happen to waltz by.
Second, always have a lookout somewhere to keep an eye out for cops or
employees who may be coming out to throw trash away. You may want to have
some kind if signal so that if you have advanced warning of security, you
can take evasive measures, like burying yourself in the trash.
Try not to spend too long in a given trash can. The longer you stay, the
more you put yourself at risk of getting caught. This means that you cannot
be too picky about what trash you take. There is plenty of time for that
after you bail the scene with the goods. You may want to have a knife handy,
however, to cut open boxes or bags, and a small flashlight is a good idea,
although if possible, avoid using to much light or making too much noise,
anything that could potentially attract someone.
A car is a good thing to have, if possible. This greatly increases the
range of places you can hit in one night. It is a good idea, if you are
accumulating alot of stuff, to stop somewhere secluded and well lit
(like a school or empty shopping center) and sort out the trash so you
can get rid of useless garbage like food, etc. Take all the useless
garbage and dump it into another dumpster.
You may want to wear old clothes that can get messed up, and gloves are not a
bad idea either, both to keep your hands clean, and to keep prints off of
anything in case the place discovers what you have done.
What to do if you get caught:
This is perhaps the most important thing to keep in mind when trashing.
What to do if you happen to be caught be someone and they want to know what
you are doing.
If you can, run like hell! Only do this if you have a clean getaway
and you think you can get away without too much problem. Keep in mind that
trying to escape may only make your situation worse. Only run if it looks
like they are gonna bust you.
In most cases, the people may just tell you to get out. They will probably
ask you some dumb questions, like "What are you doing in the trash?"
In this case, make up a story, like "Oh, my friend here threw a ball
in here and I was looking for it." If the guard believes you, he will
probably just tell you to get out with a strong warning.
If they are serious about nailing you, however, chances are you'll only
get charged with trespassing, which is not a major crime. In any case,
however, maintain an extremely high level of caution when trashing, and
always remain calm and collected. You can usually bullshit your way out
of just about anything if you play your cards right.
Hope this has helped you to gain some insight into how to go about gaining
that valuable information you always wanted.
Look for more informative files in the future from Better Homes and
Anarchy. And if you have any comments or anything to add, you can get hold
of me on the Electric Kingdom at (619) 484-5243. Please upload this to
many BBS's around the country to help your phellow phreakers!
DOWNLOADED FROM P-80 SYSTEMS......

View File

@@ -0,0 +1,67 @@
Uploaded By: PRIVATE PIRATE
---------------------------------------
Bell Trashing
By: The Dragyn
The Police Station
612-934-4880
The Phone Co. will go to extreams on occasions. In fact, unless you really
know what to expect from them, they will suprise the heck out of you with their
"unpublished tarriffs". Recently, a situation was brought to my attention that
up till then I had been totaly unaware of, least to mention, had any concern
about. It involved gar- bage! The phone co. will go as far as to prosecute
anyone who rumages through their garbage and helps himself to some.
Of course, they have their reasons for this, and no doubt benefit from such
action. But, why should they be so picky about garbage? The answer soon
became clear to me: those huge metal bins are filled up with more than waste
old food and refuse... Although it is Pacific Tele. policy to recycle paper
waste pro ducts, sometimes employees do overlook this sacred operation when sor
ting the garbage. Thus top-secret confidential Phone Co. records go to the
garbage bins instead of the paper shredders. Since it is constantly being
updated with "company memorandums, and supplied with extensive reference
material, the Phone co. must continualy dispose of the outdated materials.
Some phone companies are supplied each year with the complete "System
Practices" guide. This publication is an over 40 foot long library of
reference material about everything to do with telephones. As the new edition
arrives each year, the old version of "System Practices" must also be thrown
out.
I very quickly figured out where some local phone phreaks were getting their
material. They crawl into the garbage bins and remove selected items that are
of particular i nterest to them and their fellow phreaks. One phone phreak in
the Los Angeles area has salvaged the complete 1972 edition of "Bell System
Practices". It is so large and was out of order (the binders had been removed)
that it took him over a year to sort it out and create enough shelving for it
in his garage.
Much of this "Top Secret" information is so secret that most phone companies
have no idea what is in their files. They have their hands full simply
replacing everything each time a change in wording requires a new revision. It
seems they waste more paper than they can read!
It took quite a while for Hollywood Cal traffic manager to figure out how all
of the local phone phreaks constantly discovered the switchroom test numbers.
Whenever someone wanted to use the testboard, they found the local phone
phreaks on the lines talking to all points all over the world. It got to the
point where the local garbage buffs knew more about the office operations than
the employees themselves. One phreak went so far as to call in and tell a
switchman what his next daily assignment would be. This, however, proved to be
too much. The switchman traced the call and one phone phreak was denied the
tool of his trade.
In another rather humorous incident, a fellow phreak was rumaging through the
trash bin when he heard someone approaching. He pressed up against the side of
the bin and silently waited for the goodies to come. You can imagine his
surprise when the garbage from the lunchroom landed on his head. Most people
find evenings best for checking out their local telco trash piles. The only
thing necessary is a flashlight and, in the case mentioned above, possibly a
rain coat. A word of warning though, before you rush out and dive into the
trash heap. It is probably illegal, but no matter where you live, you
certainly won't get the local policeman to hold your flashlight for you.
---------------------------------------
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,170 @@
\Anti-Social Magazine
\ Issue 12 31/03/99
+------------------
=====================
Trashing - The Guide
By Crashd
=====================
Hey, Nice to be back again, This is my first interesting file in a long time,
And as far as I can tell (sorry if I'm wrong) this subject hasnt been covererd
at all (for the UK) Although I remeber some rather amusing incidents involving
trash :) Trashing, is basically just wading through bags of shit and rubbish,
looking for interesting things - documents, flopwarez, equipment etc..
This deal is split into 2 main areas, personal and business (just like the BT
phone book :)
Ok, i'm gonna deal with personal first, as this is probably the easiest.
1.\ Personal Trashing
=====================
Let's take target #1. He's maybe a businessman, you want his CC number,
mobile ESN, Girlfriends phone number, or just want to invade on the poor man's
private life. Well the best place to start, is find his home address, and
preferably the post code (if you cant find the latter, just knock at the few
houses around his, they will probably glady give you it, lie and say your new
to the neighbourhood) Now, phone the local council dude's, and ask when the
refuse collectors (garbage men :) pick up the trash/shit. Or just ask the
nice neighbours again.
The Night before the trash pick-up, be prepared. For clothes, I recommend
something warm, this is my standard atire:
* 1 heavy-duty flashlight
* 1 backpack lined with binbag
* 1 black beanie hat
* 1 pair of gardeners gloves
* 1 pair of latex gloves
* 1 Pair of lightweight bottoms
* 1 rain-coat, just in case
Now, go for a stroll, probably the best time is about 10 or 11. Walk past the
person's house, and check to see if he/she has left out their groovy wheely
bin (most houses in the UK have these, a gift from the Labour Government).
If so, walk straight past, towards say a shop or phone box, or whatever.
About 10 minutes later, stroll past again, and accidently shunt into the bin,
pick it up off of the ground, and walk away with it, take it down a
back-street or whatever. Open it up, and get searching, dont forget the
flashlight, dont shine it into cars going past or whatever. If you see
anything worth stealing, pop it into your nice bag.
Common stuff for stealing is:
* Phone Bill
* Receipts
* Business Cards
* Filo-Fax's
* Diary's (blackmail anyone?)
Most people tend not to chuck out Tv's etc..but if you find any electronical
junk, take it and salvage for components :) When your finished with this bin,
walk past nice and calm, make the drop off, turn a corner and walk slowly
home, along with your sack of delights :)
2.\ Business Trashing
=====================
Business Trashing is much more popular than the latter shit. Stuff you can
get from Companies include:
* Big Lists of ESN's
* Manuals for Computers etc..
* Journals (par example, the first Blue Box was derived from a technical
manual found in a bin in the US) [Correction, No it wasn't, it was built
using the tones published in a technical
journal, publically available though
not a well distributed one -Ed]
* Equipment no longer needed
Hmm, the atire should basically remain the same, nice and conspicous and most
of all old - it will take a little more than vanish to get rid of that Bad
smell :)
The only time to trash business's is at NIGHT. Make it a weekend (maybe friday
or saturday). Walk past Target company at about 10 to check out any security
measures that may harras you, such as watchmen, dog's or camera's. (A
favourite target of UK phreakers is BT's Exchanges/Offices. A lot of the MED
archives is supposedly found through trashing =) Pop back to your house and
pick up any decoy's or help you may need:
Example:
* Dog's - Mace (cruel) some fresh bloddy dripping meat (nice, but expensive
and short term)
OR
An Ultrasonice grenade (Schematic shown below..it works as
well...damn good.
* Camera's - Spray paint (good), blakck paper or just wear a lot of black and
hope to hell they aint infra-red.
* Watchmen - You will almost certainly need some friends to help, get them to
either phone the place in question, or create a decoy, ie:
harrasing him while you nip round the back.
Also, bring the bag, in it put some chain cutters, and a crowbar.
If there is chains, cut them. A door? Crowbars work wonders.
Once past the first obstacle, if there any of the above (dog, camera's etc..)
If it is a yard etc.. the bins are big green/grey plastic/metal effors,
probably chained, cut the chains and get rooting, try to have a look-out
keeping tabs for you.
Obvious items of interest (from experience in BT places) are:
* Big Chunks Manuals
* Any Reams of form-feed paper (usually phone bills or quotes)
* ANY Equipment, electrical or otherwise
Now, your trashing mission is complete, try and escape a different way to
your way of entry, and if you disturbed anything, for example the camera's,
leave them, Looks better in the long run.
If you repeat trash a place You will probably get caught quickly, sorry but
that's the long and short of it, so go trashing maybe once every 2 months,
and make it a nice big thorough inspection as you aint coming back for a
while
* Schematics For Ultrasonic grenade.
====================================
Ok, here's what you will need:
* 1 Gutted Tennis Ball
* Circuit Board - Bread-Board will do for this.
* 1 Ultrasonic Transducer (sender, not receiver), (Maplin, rapid, about <20>1)
* 1 555 Timer chip
* 2 resistors, preferably variable
* 2 capacitors - .1 Muf should do.
* 1 Mercury Tilt Switch
* 1 1 Normal SPDT switch
Ok, first, if you Cant set up a monostable timing circuit, please please
please dont bother trying to build this. Go check the web or ask a
electronics lecturer. Ok, for the input of the timing circuit(Chip's pin 1),
we want the mercury tilt switch, these are bi-polar. Have the timing circuit
on it's own little PCB, and between then battery and the circuit, have the
normal SPDT switch, cut out a small hole for this on the tennis ball. Also
cut out another one, about 2cm's in diameter, for our transducer. Now wire
the ultrasonice transducer as the output (pin 3) of the timing circuit. Glue
the transducer into the tennis ball, and close it up with a bit of
araldite/black tape/whatever.
Operation
=========
When you want to use this, throw the SPDT switch, and lob it at a wall, make
sure that it spins, or at least rolls. No dog/cat/bat for a good few meter's
will be able to come near it and if they do, they will be in a little pain.
IF you want the Proper PCB Schematics and FULL instructions for this (yes,
even how to build the fucking timer circuit) mail: crash_dave_1997@yahoo.com
Ok, thanks for reading, and if you havent..you've missed it all :)
Werd
Mail me:
crash_dave_1997@yahoo.com
ICQ UIN: 7538027
IRC: EFNET: #2600-uk, #phuk

View File

@@ -0,0 +1,119 @@
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
:% %:
:% BASIC TRASHING MANUAL %:
:% Written by: %:
:% The Blue Buccaneer %:
:% %:
:% The Rebel Alliance MegCatLine : [615] - 942 - 6670 %:
:% %:
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
This is an elementry manual on trashing. I don't think I am qualified to
do one on advanced trashing, so here are the basics:
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
Trashing is the act of sorting through trash captured from the garbage bins
and cans of your local MaBell office. The trash often contains many valuable
things which can range from office memos instructing an operator to carry out a
special task (trace someone's line..etc) to actual working phones! In addition
to those things, you are also very likely to pick up Bell manuals (they have
this habit of replacing them every time one word is revised)
The following is a list of suggested instructions and tips to follow when or
if you go trashing. Trashing can be quite profitable and fun, provided you do
it right and don't get smelly, dirty, or busted.
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
STEP #1: LOCATE YOUR TARGET
This involves deciding on where exactly the place is you want to
trash. The place you want to go trashing at is the Switching Office
since that's where everything happens. The easiest way to find the
S.O. is to look for a lot of microwave towers. (not too hard, eh?)
A good place for advanced trashing is your local COSMOS Office. To
find it, look for the place in your city which most resembles:
1. A Castle or Fort
2. A Bunker out of WWII.
3. Your local Federal Prison.
4. A Building with the slogan "The more you hear.." on it.
The security around these places is that of any of the 1, 2, or 3.
Other possible targets would include:
1. Relay stations.
1. Look for a medium to small size tower with a little shack.
2. Look for a big-ass tower with a house with AT&T on the door.
The little shacks are usually good to break into because they
are left with some really good stuff and are usually out in the
middle (maybe a little to the west) or nowhere.
I've never been into the houses. You can easily spot them
because of the towers in the backyard and the odd fact that they
have only one door (the front) and no (0) windows.
STEP #2: SCOUT THE TARGET AREA
One person should go out to the place you plan to trash and take a
good look around. He should look for: Doors, cameras, fences, dogs,
and the garbage bins. This is to minimize the amount of confusion
when you go trashing that night or whenever-the-hell you go.
The scout might want to make out a small map of the streets & stuff
in the area if the group is unfamiliar with it. You might also want
to use it for quick, safe escape routes.
STEP #3: GATHER EQUIPMENT
Here is a brief list of equipment you might want to take along:
MAP : Streets, doors, security guards/cameras, garbage bins, etc...
CAR : Doors and trunk open (lights off) Liscence Plate Covered
While the car is not necessary, it is helpful in quick getaways and
is easier than biking or walking.
PEOPLE: More than one; Less than six.
Almost never go trashing alone. And never bring more than five guys
along with you. It's a little obvious when you have six or seven
teenage guys with sacks, dark clothing, and flashlights.
The recommended group is three, but a duty chart shows more or less:
Number of people: 1 2 3 4 5 6
Number to search: 1 1 2 3 3 4
Number to watch : 0 1 1 1 2 2
--- BEST WAY ---: ^
EQUIP : Sack (each - nylon recommended as is light & easily washed/hidden)
FlashLight (each - with handkerchief)
Use the handkerchief to cover the lmght at all times.
(Light looks really unusual comming out of a garbage bin at 3am)
Sneakers (ratty as possible - it is, afterall, garbage)
Dark Clothing (no bright orange or other florecent materials)
<+- ADVANCED EQUIPMENT -+>
Nitefinder goggles
Ski Mask
Gloves
Walkie Talkies / CB Radio
Lockpicks
A word on the lockpicks:
Lockpicks are very handy to have if the garbage is locked up.
BUT DO NOT bring them if you don't know for a fact that there
are locks -or- if you don't know how to use them correctly.
Should you get caught, you don't want to have attempted breaking
and entry and shit like that trying to be pinned on you.
Diversion Equipment: Smoke, Gas, Bang, or Flame bombs
Bring only that- no pipe bombs, soda can bombs, or harmful stuff
like that. If you get caught with that stuff, they get nasty.
It is also tempting to level the garbage bin just before you
leave, which is not too wise.
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
AND NOW, THE EVER PRESENT: DOs and DON'Ts
If you're going advanced trashing, bring along a voltage meter to test fences,
doors, and stuff that might be electrically wired or monitored.
DO NOT go poking around anywhere other than the bins. There are probably
silent alarms on the doors and possibly hidden cameras watching those other
places you might feel tempted to go poking around.
DO NOT make a lot of noise. Tipping over the cans and telling dead baby jokes
is generally unwise.
// FILE ABRUPTLY ENDS //
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,138 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% Better Homes and Trashing %
% %
% Written by..... The Saint %
%%%%%%%%%%%%% %%%%%%%%%%%%%
% Thanx to Ares for his help! %
% %
% June 24, 1987 %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Intro:
This file is intended for informational purposes only!!!
The authors (The Saint and Ares) take no responsibility whatsoever for any
actions taken by anyone who reads the contents of this file.
Primarily, this file will discuss the general idea behind trashing, the risks
involved, and some general tips to make your trashing venture successful.
Basics:
The basic reasons for trashing can vary, but are generally:
1> To obtain credit cards and/or carbons of credit cards.
2> To obtain any information that may be useful in the aid of phreaking.
When choosing a place to go trashing, one must keep in mind the following:
1> Location of dumpster
2> Security of property where dumpster is located
3> Type of trash that may be found
First, the location. You generally want to pick a place that is somewhat
isolated, where there will not be a lot (preferably none) of people. To
accomplish this, it is also best to do your trashing at night, as there will
not likely be any employees at the location, and it is easier to hide and to
not be seen by passers-by.
Second, the security. Places such as Telco buildings and large companies
often have security guards on duty 24 hours, and often keep their dumpsters
behind fences so as to discourage trespassing. Yes, you are trespassing when
you start looking in someone's garbage can!!! So it is a good idea to check
out the place you are going to trash for a day or so to get a feel for what
kind of security they have. This way, you can avoid walking in blindly to some
place and getting nabbed, or you can figure out where to park your car, or
where to hide, or how to avoid the security (rent-a-cops).
Places such as department stores and banks most likely will not have any
security for the outside of their buildings as they may not be able to afford
it or may not anticipate trashers. Also, they may not have anything worth
taking! So basically, check the place out before you just go and hit it.
Case in point. One night, my friend and I casually pulled into the parking
lot of a Pacific Bell office, and before we knew what was happening, a security
guard had a giant spotlight glaring down on us. We just casually made a u-turn
as if we were just turning around to go the other way. (More on what to do if
you get caught later).
Third, you must pick a place where you know there will be trash that is of
use to you. Don't go trashing at some little deli, all you'll get is a bunch
of rotten food! (Unless of course you know for a fact that the deli deals alot
with credit cards). In searching for cards, pick places such as department
stores or places that sell alot of expensive stuff.
Also, the local telephone company is, of course the place to go to find your
basic phreaking info.
These have been some of the basics to keep in mind before you hit aplace.
Now for some techniques to use to help increase the efficiency of your trashing
endeavors.
Tips:
First of all, don't be afraid to actually go into the trash can. This is
almost always necessary to reach the good stuff. Also, when you are ducking
down inside a big dumpster, you cannot be seen by passing police cars or
security guards who happen to waltz by.
Second, always have a lookout somewhere to keep an eye out for cops or
employees who may be coming out to throw trash away. You may want to have some
kind if signal so that if you have advanced warning of security, you can take
evasive measures, like burying yourself in the trash.
Try not to spend too long in a given trash can. The longer you stay, the
more you put yourself at risk of getting caught. This means that you cannot be
too picky about what trash you take. There is plenty of time for that after
you bail the scene with the goods. You may want to have a knife handy,
however, to cut open boxes or bags, and a small flashlight is a good idea,
although if possible, avoid using to much light or making too much noise,
anything that could potentially attract someone.
A car is a good thing to have, if possible. This greatly increases the range
of places you can hit in one night. It is a good idea, if you are accumulating
alot of stuff, to stop somewhere secluded and well lit (like a school or empty
shopping center) and sort out the trash so you can get rid of useless garbage
like food, etc. Take all the useless garbage and dump it into another
dumpster.
You may want to wear old clothes that can get messed up, and gloves are not a
bad idea either, both to keep your hands clean, and to keep prints off of
anything in case the place discovers what you have done.
What to do if you get caught:
This is perhaps the most important thing to keep in mind when trashing. What
to do if you happen to be caught be someone and they want to know what you are
doing.
If you can, run like hell! Only do this if you have a clean getaway and you
think you can get away without too much problem. Keep in mind that trying to
escape may only make your situation worse. Only run if it looks like they are
gonna bust you.
In most cases, the people may just tell you to get out. They will probably
ask you some dumb questions, like "What are you doing in the trash?" In this
case, make up a story, like "Oh, my friend here threw a ball in here and I was
looking for it." If the guard believes you, he will probably just tell you to
get out with a strong warning.
If they are serious about nailing you, however, chances are you'll only get
charged with trespassing, which is not a major crime. In any case, however,
maintain an extremely high level of caution when trashing, and always remain
calm and collected. You can usually bullshit your way out of just about
anything if you play your cards right.
Hope this has helped you to gain some insight into how to go about gaining
that valuable information you always wanted.
Look for more informative files in the future from Better Homes and Anarchy.
And if you have any comments or anything to add, you can get hold of me on the
Electric Kingdom at (619) 484-5243. Please upload this to many BBS's around
the country to help your phellow phreakers!
The Saint
Lunatic Labs (415) 278-7421


View File

@@ -0,0 +1,58 @@
*************************************************
* *
* BASICS OF TRASHING *
* PART I *
* *
* BY:THE GRIM TRASHER *
* *
*************************************************
IN THIS ARTICLE I WILL COVER THE VERY FIRST STEPS OF TRASHING. THE TRASHING
METHOD IS VERY SIMPLE SO I DO IT ALL THE TIME. HERE ARE THE STEPS:
STEP I:FIRST YOU TAKE A DISK YOU WANT TO TRASH AND BRING IT OVER TO THE
COMPUTER. THE DISK SHOULD HAVE SOMTHING VERY *IMPORTANT* ON IT (LIKE SOMTHING
YOU HAVE BEEN WORKING ON FOR 3 YEARS) OR A DISK THAT COST ABOUT $500.
WHEN YOU BRING THE DISK TO TRASH OVER TO THE COMPUTER *BE SURE* TO HOLD IN THE
*DISK PART*!
STEP II:THERE ARE A LOT OF WAYS TO TRASH A DISK BUT
HERE ARE A FEW TO GET THING GOING:
1--PUT THE DISK IN THE DRIVE AND GET TO COMMAND LEVEL THEN TYPE 'INIT'.
2--PUT A MAGNET TO THE *DISK PART*.
3--SET ON TOP OF THE DRIVE OR MONITOR AND LEAVE THERE FOR 1 HOUR.
4--TAKE SOMETHING SHARP LIKE A PENCIL ORKNIFE AND START TO SCRATCH THE SURFACE
OF THE DISK NICE AND HARD.
NOTE:YOU CAN USE MANY OF THESE TRASHINw TECHNIQUES TO MAKE ONE *ULTIMATE
TRASH!!*
CLASSIC TRASH--PUT THE DISK IN THE MICRO-WAVE!!
STEP III:WHEN YOU ARE ALL DONE WITH THE TRASHING PROCESS THEN LEAVE THE DISK
LAY IN A NICE DUST PILE AND BURY IT.COME BACK IN ABOUT 2 HOURS AND THE
TRASHING PROCESS IS COMPLETE!!
IN MY NEXT ARTICLES I WILL COVER THE MORE ADVANCED METHODS OF TRASHING BUT FOR
NOW JUST:
***K E E P O N T R A S H I N G***
NOTE:IF YOU OR ANY ONE OF YOUR FRIENDS WANT TO KNOW MORE ON TRASHING CALL MY
HOT-LINE AT:50-MAD-TRASH OR:62-EL-TRASHO.<-LOCAL NUMBER
THE ONE AND ONLY,
THE GRIM TRASHER
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,44 @@
<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>Phone Phreaking: Voice Mail</H1>
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/3rdpart1.txt">3rdpart1.txt</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Fraud and Voicemail Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/800vms.txt">800vms.txt</A> <tab to=T><TD> 1020<BR><TD> 1-800 Voice Mail Extenders
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/amhack.txt">amhack.txt</A> <tab to=T><TD> 12372<BR><TD> Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/anmchhak.txt">anmchhak.txt</A> <tab to=T><TD> 1233<BR><TD> Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/ans_exc.txt">ans_exc.txt</A> <tab to=T><TD> 2319<BR><TD> Answering Machine Stopper Gadger, by Jon Sreekanth
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/ansmache.xcl">ansmache.xcl</A> <tab to=T><TD> 3653<BR><TD> Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/aspentut.txt">aspentut.txt</A> <tab to=T><TD> 8040<BR><TD> A Tutorial of Aspen Voice Mailbox Systems, by Slycath
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/at&amp;t.txt">at&t.txt</A> <tab to=T><TD> 1234<BR><TD> Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/audexvp.txt">audexvp.txt</A> <tab to=T><TD> 19656<BR><TD> Hacking Guide to the Audex Voice Power, by Crazybyte
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/cinditut.txt">cinditut.txt</A> <tab to=T><TD> 12608<BR><TD> The CINDI (Voicemail System) Tutorial
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hack6">hack6</A> <tab to=T><TD> 5241<BR><TD> Hacking Voice Mail Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hackam1990.txt">hackam1990.txt</A> <tab to=T><TD> 13065<BR><TD> Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hackvmb.txt">hackvmb.txt</A> <tab to=T><TD> 10057<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/lol12.txt">lol12.txt</A> <tab to=T><TD> 10698<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/phonhack.txt">phonhack.txt</A> <tab to=T><TD> 17674<BR><TD> Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/phreak8">phreak8</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Calling and Voicemail Information
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/tollfree.txt">tollfree.txt</A> <tab to=T><TD> 1314<BR><TD> A Collection of Toll-Free Answering Services
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/unt-att1.txt">unt-att1.txt</A> <tab to=T><TD> 2610<BR><TD> Hacking AT&T Answering Machines by Aoflex of Karma Sutra
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb.rl">vmb.rl</A> <tab to=T><TD> 3505<BR><TD> Renegade Legion Presents: Voice Mailbox Hacking by The Knight
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb.txt">vmb.txt</A> <tab to=T><TD> 3296<BR><TD> Voice Mail Made Easy by Hagar of Phantom Networks
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb_smc.txt">vmb_smc.txt</A> <tab to=T><TD> 15681<BR><TD> On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbh-rl.txt">vmbh-rl.txt</A> <tab to=T><TD> 3508<BR><TD> Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhack.hac">vmbhack.hac</A> <tab to=T><TD> 3918<BR><TD> Voice Mailbox Hacking, by the Knight of the Renegade Legion
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 2764<BR><TD> Zod's Voice Mailbox Hacker Doxs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhaq.txt">vmbhaq.txt</A> <tab to=T><TD> 32929<BR><TD> Voice Mail Hacking by Road Kill (March/April, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmblol.txt">vmblol.txt</A> <tab to=T><TD> 13996<BR><TD> Voice Mailbox Hacking by the Legions of Lucifer (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbrl.txt">vmbrl.txt</A> <tab to=T><TD> 3920<BR><TD> Voice Mailbox Hacking by The Knight of Renegade Legion
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbs1.txt">vmbs1.txt</A> <tab to=T><TD> 3071<BR><TD> Voice Mail Boxes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbzan.hac">vmbzan.hac</A> <tab to=T><TD> 4774<BR><TD> How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmx.txt">vmx.txt</A> <tab to=T><TD> 1101<BR><TD> Toll-Free Answering Services
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/voicmail.txt">voicmail.txt</A> <tab to=T><TD> 3753<BR><TD> Using Voice Mail on the Inner Sanctum by Jesters
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/xvmecinf.txt">xvmecinf.txt</A> <tab to=T><TD> 904<BR><TD> Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 32 files for a total of 230,684 bytes.</SMALL></TABLE>

View File

@@ -0,0 +1,44 @@
<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
<H1>Phone Phreaking: Voice Mail</H1>
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="3rdpart1.txt">3rdpart1.txt</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Fraud and Voicemail Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="800vms.txt">800vms.txt</A> <tab to=T><TD> 1020<BR><TD> 1-800 Voice Mail Extenders
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="amhack.txt">amhack.txt</A> <tab to=T><TD> 12372<BR><TD> Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="anmchhak.txt">anmchhak.txt</A> <tab to=T><TD> 1233<BR><TD> Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ans_exc.txt">ans_exc.txt</A> <tab to=T><TD> 2319<BR><TD> Answering Machine Stopper Gadger, by Jon Sreekanth
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ansmache.xcl">ansmache.xcl</A> <tab to=T><TD> 3653<BR><TD> Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="aspentut.txt">aspentut.txt</A> <tab to=T><TD> 8040<BR><TD> A Tutorial of Aspen Voice Mailbox Systems, by Slycath
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="at&amp;t.txt">at&t.txt</A> <tab to=T><TD> 1234<BR><TD> Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="audexvp.txt">audexvp.txt</A> <tab to=T><TD> 19656<BR><TD> Hacking Guide to the Audex Voice Power, by Crazybyte
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cinditut.txt">cinditut.txt</A> <tab to=T><TD> 12608<BR><TD> The CINDI (Voicemail System) Tutorial
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hack6">hack6</A> <tab to=T><TD> 5241<BR><TD> Hacking Voice Mail Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackam1990.txt">hackam1990.txt</A> <tab to=T><TD> 13065<BR><TD> Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackvmb.txt">hackvmb.txt</A> <tab to=T><TD> 10057<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lol12.txt">lol12.txt</A> <tab to=T><TD> 10698<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonhack.txt">phonhack.txt</A> <tab to=T><TD> 17674<BR><TD> Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phreak8">phreak8</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Calling and Voicemail Information
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tollfree.txt">tollfree.txt</A> <tab to=T><TD> 1314<BR><TD> A Collection of Toll-Free Answering Services
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="unt-att1.txt">unt-att1.txt</A> <tab to=T><TD> 2610<BR><TD> Hacking AT&T Answering Machines by Aoflex of Karma Sutra
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb.rl">vmb.rl</A> <tab to=T><TD> 3505<BR><TD> Renegade Legion Presents: Voice Mailbox Hacking by The Knight
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb.txt">vmb.txt</A> <tab to=T><TD> 3296<BR><TD> Voice Mail Made Easy by Hagar of Phantom Networks
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb_smc.txt">vmb_smc.txt</A> <tab to=T><TD> 15681<BR><TD> On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbh-rl.txt">vmbh-rl.txt</A> <tab to=T><TD> 3508<BR><TD> Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhack.hac">vmbhack.hac</A> <tab to=T><TD> 3918<BR><TD> Voice Mailbox Hacking, by the Knight of the Renegade Legion
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 2764<BR><TD> Zod's Voice Mailbox Hacker Doxs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhaq.txt">vmbhaq.txt</A> <tab to=T><TD> 32929<BR><TD> Voice Mail Hacking by Road Kill (March/April, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmblol.txt">vmblol.txt</A> <tab to=T><TD> 13996<BR><TD> Voice Mailbox Hacking by the Legions of Lucifer (1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbrl.txt">vmbrl.txt</A> <tab to=T><TD> 3920<BR><TD> Voice Mailbox Hacking by The Knight of Renegade Legion
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbs1.txt">vmbs1.txt</A> <tab to=T><TD> 3071<BR><TD> Voice Mail Boxes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbzan.hac">vmbzan.hac</A> <tab to=T><TD> 4774<BR><TD> How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmx.txt">vmx.txt</A> <tab to=T><TD> 1101<BR><TD> Toll-Free Answering Services
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="voicmail.txt">voicmail.txt</A> <tab to=T><TD> 3753<BR><TD> Using Voice Mail on the Inner Sanctum by Jesters
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="xvmecinf.txt">xvmecinf.txt</A> <tab to=T><TD> 904<BR><TD> Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 32 files for a total of 230,684 bytes.</SMALL></TABLE>

View File

@@ -0,0 +1,103 @@
3RD PARTY FRAUD & VOICE MAIL SYSTEMS
============================================================================
3rd Party Dialing was first brought to my attention when it was listed
on my telephone bill. I was billed by some person(s) without my authorization.
This happened about 3 times on the same bill, and all of the times I got the
charges dropped.
A few weeks later, after paging through the telephone book for downtown
prefixes, I noticed information on 3rd Party Calling, which included:
HOW TO PLACE 0+ CALLS
Third-Number Calls
1. Dial "0" + Area Code (if needed) + telephone number.
2. If you hear a tone, ignore it, and a billing operator will come
on the line.
3. Tell the operator you are placing a third number billed called.
4. Give the Area Code and telephone number you with the charges billed to.
5. The operator will call that number to verify acceptance of the charges
on calls from coin pay phones. No verification on calls from
non-coin pay phones.
The line that caught my eye was like #5. This line pointed out that calls
from pay phones had to be verified, while non pay phones needed no
verification.
With experience, I found out that sometimes there is nothing a person can do
about unauthorized 3rd Party Calls billed to a another person's number. A lot
of the times, the operator you call to complain to will simply tell you there's
nothing they can do.
With this in mind, I realized that you could bill a call to anybody's number
and get away with it, and no charges directed to you. Although, as many of you
know by now...this not safe. For one, you are directing attention to yourself
as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
Party Call to...that person has your number and where you called. Bell can
also use that information to take action if they feel it necessary.
One alternative would be to complete a 3rd Party Billed Call from a pay
phone. This however brings up a question. Who is going to accept the charges
if you don't want to pay for it in any way?
Here is what I came up with for 3rd Party Calling Fraud:
First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
PhoneMail type VMS to handle the call. The reason you need these types of
VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
have to enter a process extension number such as 8509. These types of VMS's
bring you directly to the box.
You don't know what Voice Mail Systems are? Look for a file. But, here's a
layman's description of VMS's. You can say that VMS's are distance answering
services. They are usually set up in other prefixes you can dial in/directly
on to. They include instructions on how to use them, and have system
passwords. In respect, they are electronic mail devices...only they use voice
communications instead. You can find these by scanning, if you have one local.
Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
In between the HELLO and YEAH SURE, the billing operator will say something
like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
Now go to a pay phone and dial any number anywhere you want, in this
format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
and wait for an operator to come on. The operator will announce her/his-self
as a billing operator and ask you how he/she can help you on billing the call.
Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
name if you wish, but it's not necessary. No real names of course also. The
operator will call the VMS and he/she will hear the previous recording of you
saying "HELLO" etc.
After the operator hears an affirmative from the VMS...the operator will say
thank you, then put the call through. The only person that gets billed for
the call is the business/person that owns the VMS that you used by hacking the
default password.
I've found out that you can dial overseas, and anywhere in the United States
this way, with no problems or bad connections. If you have a portable computer
with an acoustic couple...you can go online. It would be suggested to do this
in a car, so as not to draw attention during the day. I've tried to set up a
conference by the 800 Conference Operator and requesting to set up a
conference. You have to give her the person's numbers and names you want to
conference with...and the number you want to conference billed to. The
operator will verify this if you are at a pay phone. I have figured out what
the Conference Operator asked the 3rd Party as of yet...to time the responses
preset on the VMS, but if anyone can, it would prove to be very useful.
Another technique might be to bill 976's to your VMS if you into that.
Again, you need to attempt to time the perfect responses to the operator's
questions to the 3rd Party.
*A Word of Warning*: In most cases, the Operator you handle the 3rd party
call with will stay on the line. So it's good to have a conversation with
yourself on the VMS for about 30 seconds after connection if you are making a
collect call to the VMS.

View File

@@ -0,0 +1,31 @@
1-800 Voice Mail Systems
1-800-222-5275 VMS
1-800-222-9825 VMS Box:[9]+3 DIGITS
1-800-228-6423 VoiceBank Box:[4] *Another Dialup for 88-Voice*
1-800-262-8477 UniSys Answering Service Box:[4]
1-800-284-6245 Meridian Mail
1-800-323-3433 VMS
1-800-323-4555 Dexter Midland Box:[3]
1-800-323-3938 VMS Box:[4]
1-800-325-5554 VMS Box:[4]
1-800-331-1763 INNOVATIVE SOFTWARE BOX:[4]
1-800-333-6245 PHONE MAIL SYSTEM
1-800-342-6245 PHONE MAIL SYSTEM
1-800-346-5104 SECURITY LINK AND TELELINK BOX:[3]
1-800-423-7574 VMBS BOX:[4]
1-800-437-6100 PHONE MAIL SYSTEM
1-800-445-6245 PHONE MAIL SYSTEM
1-800-521-6245 VMBS
1-800-541-0641 VMBS BOX:[2]
1-800-545-6245 VMBS ID:[7], PASS:[8]
1-800-631-1146 VMBS
1-800-654-8692 SECURITY CN LIFE INSURANCE BOX:[4]
1-800-662-6245 VOICE MESSAGE EXCHANGE
1-800-678-6245 VMBS
1-800-759-5000 INGRAM SWITCHBOARD BOX:[4]
1-800-777-6245 MCI MAIL ID:[5], BOX:[7]
1-800-847-6181 WESTERN DIGITAL BOX:[4]

View File

@@ -0,0 +1,257 @@
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
Hacking Answering Machines 1990
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
by: Predat0r of Blitzkrieg Bbs 502/499-8933
AT&T reports that in the year 1990, 11 million people
will buy an answering machine for their home use. In 1989, 10
million machines were sold. Everyone has called up a person
at one time or another and got the old "leave your name at
the beep" message. With this increase in homes using these
machines there is also a new form of hacking developing. One
of hacking an answering machine.
Why would anyone even want to hack an answering machine
and for what purpose? There are many reasons and things you
can do once you have control of someone elses machine. If for
some reason you need to spy on a business or person you can
hack their machine and take control using the information for
your own personal use. There is also the old "change the
message" secret to make it say something to the effect of
this line accepts all toll charges so you can bill third
party calls to that number. You can also use an answering
machine for your own personal use, as in making it your own
voice mail type system for people to call. Only do this if
you know someone is out of town. If they come home from
shopping and find their machine changed it might cause
problems. With these basic ideas in mind you can see hacking
an answering machine could be very useful to certain
individuals.
How can a person hack an answering machine? Well most
answering machines built now have remote access features
which allow the owner, or anyone to call in and press a
security code to play their messages. This is where the fun
begins. Some older models don't have remote access so you
cannot do anything to them. Also if you know someone has a
machine but you call and it doesn't answer, let the phone
ring about 15 times. This will tell the machine to turn
itself on, so you can hack it. The actual number varies
between machines.
To practice hacking some machines i will show you how to
get remote access on a few models. Just look and see what
kind your friend has and hack it for starters.
Record a Call- Model 2120
-------------------------
Call in and during the message or after the beep tone to
leave a message enter the 3 digit security code. Which you
must find yourself. This will rewind the tape and play all
new messages. Press 2 to backspace and repeat the last
message. Press 3 to fast foward the tape.
Changing your message from remote. Call your phone and enter
the secret code. After several rapid beeps enter your secret
code again. After a short delay you will hear a long tone.
After the tone ends begin speaking your message which may be
17 seconds in length. When finished press the second digit of
your secret code to end. The machine will then save your
message and play it back. To turn the unit on from remote let
it ring 11 times then hangup. Or stay on and it will answer
so you can access the machine. For express calls or frequent
calls hit the second digit for two seconds to skip the out
going message announcement.
Goldstar- Models 6000/6100
--------------------------
Call and enter your 1 digit secret code after you hear the
out going message announcement. The machine will then play
back new messages. Hangup to save messages or after all
messages have been played the machine will give a double
beeptone, you may enter your code to erase all messages.
You cannot change the out going message on this unit.
Cobra- Model AN-8521
--------------------
For this machine there are 2 codes. Both are one digit in
length. The first one is the play code. The second is to
erase messages from remote. After the outgoing message and
beeptone press the play code for 2 seconds to play messages.
After each message ends there will be a single beep. At the
end of all message it will beep twice. You may then do the
following. Replay by pressing the play code again. Erase
messages by pressing the erase code. Hang-up and save
messages and continue to take additional calls. To turn this
unit on from remote you must let it ring 16 times before it
will activate. If it rings 10 times then you hear 3 beeps it
is full and messages need to be erased.
Uniden- Model AM 464
--------------------
This model is one of the more advanced when it comes to
remote capabilities. The factory preset security code is 747.
This can be changed to as many as five digits of your choice.
To gain access from remote type your security code while the
outgoing message is playing. Press 1 after hearing the tone
and the machine will rewind and play your messages. To fast
foward press 7, to resume normal playback press 8. To stop
the messages from playing press 8 again. Press 8 to restart
the messages or 1 to start from the beginning again. Press 9
to rewind and 8 to resume playing. If you rewind all the way
it will beep twice. You need to press 1 to play messages.To
save messages press 4. To erase press 6. To turn the machine
off from remote press 5 after all messages have been played
and the machine beeps twice. To turn the machine on from
remote let the phone ring 12 to 14 times. The machine will
beep and then you enter your remote code. This will then turn
your machine to answer mode. This machine also has room
monitor options. This allows you to listen to what is going
on in the room of the machine. To do this call the machine
enter your security code after the beep press 0. The monitor
stays on for 60 seconds. You will be warned with 2 beeps at
45 seconds. To continue press 0 again.To change the outgoing
message from remote erase all the messages. Then call back
and enter your code after the tone press 3. It will beep
again and you may then leave your new message. Press 3 when
finished. To change the security code from remote after the
beep press # then 1 after the next beep enter your new code
followed by the # again. There is also a call break through
where you enter 256 while the outgoing message is playing.
This will alarm the persons in the house someone is calling
with a series of loud beeps. Press the * key to stop.
Code-a-phone Model 930
----------------------
To access from remote call and enter your security code after
the announcement and tone. Press your code for 3 full
seconds. After the new messages have been played you will
hear 2 tones. You may then save messages by pressing your
code then hanging up. repeat by entering code wait for 4
tones then enter code again. To erase message hangup when the
tape is done playing. To turn the machine on from remote call
and let ring ten times. When the system answers it will have
a two second tone. Press your security code. You will hear
three double tones to let you know the system is on.
Unisonic- Model 8720
--------------------
One digit code entered after the outgoing message and tone
will allow you to hear messages. To change message wait till
all new messages have been played 2 beep tones will be heard.
Press code for four seconds. Two beeps will be heard then the
tape will rewind and beep again. Now leave the new message.
Press your code when finished to save new outgoing message.
New message will play for you to hear.
Panasonic- Model KX-T2427
-------------------------
Call and enter the three digit code during the outgoing
message. Machine will beep once, then beep amount of times
equal to messages. Then rewind and play messages. There will
be three beeps after the last message. Six beeps means the
tape is full. Press 2 to foward. Press 1 to rewind. Press 3
to reset machine and erase messages. To monitor the room
press 5 after the beeps indicating the number of messages the
machine has. Press 7 to change the outgoing message, it will
beep a few quick times rewind then a long beep will be heard.
Leave new message press 9 when finished. Press 0 right after
the beep tones to shut the machine off. To turn the machine
on let it ring 15 times then hangup after machine turns on.
Panasonic- Model KX-T2385d
--------------------------
During the outgoing message enter the 1 digit code. This will
playback messages. Press the code again to rewind. After the
messages have played the machine will beep three times. Press
your code again and it will reset the machine. For remote
turn on let phone ring 15 times. Then after the outgoing
message hangup.
AT&T- Model 1504
----------------
Enter 2 digit code before or after announcement. System will
beep after each message and five times when messages are
done. Press the # key anytime to pause. Hanging up will save
messages. Press 7 and it will rewind and play messages again.
Press 5 to fast foward. Press 2 to rewind. Press 33 after all
messages have been played to reset without saving messages.
To record onto the tape press * after the system answers.
This will then beep and you may leave a four minute message
on the tape. Press # when done. This is not an outgoing
message announcement, only a memo. To turn on from remote let
ring ten times press 0 when system answers. To turn the
system off dial and enter your code. Press 88 and it will
shut the machine down.
Phonemate- Model 4050
---------------------
Enter your 3 digit code during the outgoing message. Pressing
* or # will allow you to scan through the messages. When
finished pressing 1 will replay the messages. Pressing 2 will
erase them. To turn on from remote let ring for 15 times.
Then proceed with remote operations.
Phonemate- Model 7200
---------------------
Enter 1 digit code during of after the outgoing message. A
voice will tell you how many messages you have, then play
them back for you. To rewind press your code and hold it for
however long you want to rewind. Let go and it will resume
playing. After the last message a voice will prompt you with
a list of options. You have five seconds to respond or it
will proceed to the next option. These are as follows. The
first is hanging up to save messages. Next is enter code to
replay messages. Next enter code to erase messages. Last is
enter code to change greeting. Follow the voice and it will
give you complete directions on exact steps to follow. To
turn on from remote let ring ten times then hang up. If tape
is full it will say sorry tape is full, enter code and erase
messages.
Spectra Phone- Model ITD300
---------------------------
Enter your 1 digit code after the greeting. Messages will
play back. Hanging up will save them. Or wait for four beeps
and press your code to replay them. To erase press your code
after 2 beeps. To turn the machine on from remote let it ring
10 times.
Notes: Outgoing message and greeting is what you hear when
you first call. Code is your personal security code.
Hacking answering machines can be very easy. It can also help
you obtain valuable information. If you have a targeted
machine you can try going to a store and saying you just
bought one and it didn't have instructions in the box. They
will usually give you a set or make copies for you. This
basic guide is just to introduce you to answering machine
hacking and changing the outgoing message and listening to
messages left by callers. To keep your own machine safe
purchase one with a changeable security code of 3 or more
digits. Most home machines are of the 1 digit type and are
easy to hack. I have no knwoledge of the laws concerning
hacking into someones answering machine. I am sure once it
becomes more common we will find out. Of course this article
is for informational purposes only so you would never have to
find out the actual laws.
Taken from TAP Magazine Issue #100
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 510-527-1662
My Dog Bit Jesus Suzanne d'Fault 510-658-8078
New Dork Sublime Demented Pimiento 415-864-DORK
The Shrine Tom Joseph 408-747-0778
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

View File

@@ -0,0 +1,33 @@
Hacking AT&T Answering Machines
Quick and Dirty by oleBuzzard
Written Today / 14-SEP-95
(c) 1995 <k0p> Communications
1. Dial telephone and wait for AT&T Answering Machine to answer.
2. Quickly Enter the following string.
1234567898765432135792468642973147 (btw: this is the shortest
4193366994488552277539596372582838 string for entering every
491817161511026203040506070809001 possible 2-digit combo.)
3. You'll know you hit the code because the messages will start playing.
4. Heres a list of TouchTone(c) Commands
Listen to messages: 7
Listen to new messages: 6
Stop: #
Rewind Tape: 2
Advance Tape: 5
Clear Messages: 3,3
Record memo: *
Record Announcement: 4,*
Play Announcement: 4,1
Turn System On: 0
Turn System Off: 8,8
****************************************************************************
*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
****************************************************************************

View File

@@ -0,0 +1,62 @@
This is the schematic I traced for an answering machine stopper
gadget : it cuts off the answering machine in case any line is picked
up. Some answering machines have this feature built-in; the older or
inexpensive ones don't. The gadget is called Message Stopper (R), by
Design Tech International Inc., Springfield, VA. Several other mfrs
make this kind of gadget, so this is just one I happened to buy.
Cost, roughly $10.
The gadget is in the same form factor as a wall-plug-in Y-splitter.
That is, it plugs into the wall RJ11 outlet, and has two RJ11 outlets
on it, one marked TEL, the other marked ANS. There are two LED's, the
green one on top of the ANS outlet, the red one on top of the TEL outlet.
The two outer wires of the three RJ11's are wired in parallel. The
schematic for the center two wires is :
.-------------- phone
.-----------------
| |
C1 ----|
C2 -| |
| |
| |
| '----------------- answering machine
|
+--|<--+--|<--->|----
| | two zeners
+-->|--+
two leds
Top led is green, bottom is red.
It turns out the leds are basically idiot lights. The outside design
makes it look like the green should light up when the ANS is offhook,
and the red when TEL is offhook, but actually, depending on the line
polarity, only one will glow, and only when the ANS outlet is offhook.
If a load is connected on the ANS outlet, both leds will glow when
ring voltage comes through.
I could not read the zener voltage off the diodes, but I measured 11V
across one of them when operating.
The theory of operation is straightforward. All telephone extensions
in the house are in parallel with each other, and with any device connected
on the TEL outlet. If any of these devices is offhook, the phone line
voltage is expected to drop below 12V or so, at which point the zeners
isolate the ANS outlet from the line.
It's a fairly simplistic design, and will not work in all situations,
but it mostly works.
----
Regards,
/ Jon Sreekanth
Assabet Valley Microsystems, Inc. | Fax and PC products
5 Walden St #3, Cambridge, MA 02140 | (617) 876-8019
jon_sree@world.std.com |

Binary file not shown.

View File

@@ -0,0 +1,275 @@
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
* *
* A Tutorial Of: ASPEN VOICE MAILBOX SYSTEMS *
* *
* Written by: SLYCATH *
* *
* Greetz to: Firefly, Adam, Sintax, Voltage and *
* *
* Everyone who knows me.... Happy Hacking.. *
* *
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Intro:
Well you may be thinking that, Oh! yes I've read tutorials
before and they are about as helpful as a dead parrot.....
I thought it was about time to write a little series of
textfiles on how to use (and abuse) Mailbox systems.
This series will NOT just cover Hacking and scanning of mail
systems but also the facilities used on each................
Start:
O.K. After recently coming across an ASPEN system which I
successfully managed to hack a couple of mailboxes for my
personal use, I didn't realise all the many facilities
available to the (Ab)user. I have collated the following
information myself I hope it will be of some help to U.
Assuming that you already have a mailbox on the system:
When Entering your mailbox number and passcode the system
will tell you if you have any new (or saved) messages.
Let's assume you have ONE new message.
You may select the following options:
Push:
----- 1 - Recieve Messages
2 - Send a message
3 - Check Reciept
4 - Personal Options
Option chosen:
--------------
1:
"" Whilst message is playing you have a sub-menu of options.
1: Rewind Message Ten Seconds
11: Rewind To Start Of Message
2: Pause Message (Press Again To Unpause)
3: Fast Forward Message Ten seconds
33: Fast Forward To End Of Message
4: Decrease Playing Speed (Slow Down)
6: Increase Playing Speed (Speed Up)
8: Decrease Volume
9: Increase Volume
After listening to the message you may select one of these.
4: Replay Message
5: Envelope Message (Find Source Mailbox+Time+Date+Length)
6: Send On Message To Another Subscriber - Record Intro Msg.
7: ERASE Message
8: Reply To Message
9: Save Message In Archives (For Later Listening)
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
2:
"" Send a Message will ask you to speak whilst it records you.
Press # to stop recording then enter Destination Mailbox.
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
3:
"" Check reciept of messages sent.
This will allowyou to check if a message has been read and
also if a message has been saved.
There are other uses for this function (See L8ter)
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
4:
"" Personal Options. Good fun can be had by all !!
1: Change Your Passwords
------------------------
This Section Refers To Guest Box Control.
If you are Strapped for boxes then you can assign
Guest Boxes so you can send messages to each other even
if One person doesn't have a mailbox.
1: Change Guest 1's Password
Guest Can Leave AND Recieve Messages
2: Change Guest 2's Password
Guest Can Leave AND Recieve Messages
3: Change Home Password
Guest Can Leave AND Recieve Messages
4: Change Secretary Password
Can Check How Many Messages You Have +
Recieve Messages
5: Change Mailbox Password (MAIN)
This is your password. DON'T FORGET IT
~~~~
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
2: Change Your Greetings
------------------------
1: Change Your Name
This is the name which people hear when
sending you messages from other boxes.
i.e. "Your message will be sent to xxxxxx"
2: Change Your Greeting
This is what Non-Subscribers who are leaving
you mail will hear.
3: Change Your Extended Abscence Greeting
This is the same as the ordinary greeting but
people leaving messages will be alerted that
you may not be back for some time.
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
3: Distribution Lists
---------------------
Distribution lists are so you can record a message and have
it automatically sent to all users on your list.
i.e. Your list could contain EVERYONE'S number
Or All Your M8s On the system.
1: Create Distribution Lists
2: Edit Distribution Lists
3: Delete Distribution Lists
4: Find Names Of People On Lists
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
OK ENUFF OF THE OPTIONS NOW ONTO THE HACK STUFF.
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Passwords:
~~~~~~~~~~
Defaults For ASPEN Are:
(E.G. Box is 888)
-------------------------------
Passcode | Example
-------------------------------
Box number - 888
Box number + 1 - 889
Box number & 1 - 8881
1 & Box number - 1888
Box number + 0 - 8880
0 & Box number - 0888
-------------------------------
Use Normal Hacking Techniques:
-------------------------------
i.e.
1111
|
\|/
9999
1234
4321
-------------------------------
Scanning:
~~~~~~~~~
Once you have found a NEW Mailbox, or even a used one.
.-------------------------,
/ DON'T CHANGE JACK SHIT /
`-------------------------'
Press '3' from the main menu.
This Checks for Reciept of messages (See Previous)
Enter Mailbox Number: xxxx
When entered number the system will say one of the following:
1: The Mailbox Users Name
2: "xxxx Is not a Valid Number"
3: "xxxx"
Start at 0000 then move up to 9999 making a note as follows:
If you get :
1. Ignore and enter the next number.
2. Ignore and enter the next number.
3. Jump up and down and go WHOOOOPPPEEEEE , you may be in luck.
When You Have finished you should have a list of POSSIBLE
Hackable Mailboxes.
______
/ \
/ THEN: /
\ /
`----'
1. Hang Up And call back the system.
2. Press '#'
3. Enter One of Numbers on the list.
4. If it says 'Enter Password' You can either try and hack it
but isn't gonna be a VIRGIN mailbox.
5. If it says 'This is a voice messaging bollox.... blahh blahh.'
then it will come to a point where it says,
'Please enter the temporary password assigned by your System
Manager'.
6. Enter Default Passwords.
Defaults Are most likely to be the same for all the other VIRGIN
voice mail boxes if not, try the other ones.
7. If It hangs up then GOTO 1.
8. If it allows you access then play with the options (See Previous)
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Thanx For Reading All Of This Text File.
I Hope That It Will Be Of Some Use To You.
And See Ya All In
----------------------------
" The Guide To CINDI Systems "
----------------------------
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Extra Greeting: Thanx To FIREFLY For Alerting Me To
Some Of The Extra Options Which I Hadn't Previously
Noticed When Playing Around With It. THANX M8.
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
/ \
*-+-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-+-*
| |
| I Expect The Next Bit Will Get Adverts Stuck To It! |
| |
`-----------------------------------------------------'

View File

@@ -0,0 +1,33 @@
Hacking AT&T Answering Machines
Quick and Dirty by oleBuzzard
Written Today / 14-SEP-95
(c) 1995 <k0p> Communications
1. Dial telephone and wait for AT&T Answering Machine to answer.
2. Quickly Enter the following string.
1234567898765432135792468642973147 (btw: this is the shortest
4193366994488552277539596372582838 string for entering every
491817161511026203040506070809001 possible 2-digit combo.)
3. You'll know you hit the code because the messages will start playing.
4. Heres a list of TouchTone(c) Commands
Listen to messages: 7
Listen to new messages: 6
Stop: #
Rewind Tape: 2
Advance Tape: 5
Clear Messages: 3,3
Record memo: *
Record Announcement: 4,*
Play Announcement: 4,1
Turn System On: 0
Turn System Off: 8,8
****************************************************************************
*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
****************************************************************************

View File

@@ -0,0 +1,432 @@
AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
UDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX
DEX- DEX-
EX-A HACKING GUIDE TO THE EX-A
X-AU X-AU
-AUD AUDEX VOICE POWER -AUD
AUDE AUDE
UDEX WRITTEN BY UDEX
DEX- DEX-
EX-A --==>> CRAZYBYTE <<==-- EX-A
X-AU X-AU
-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
UDEX UDEX
DEX- CALL SIN CITY: +32-3-8252274 DEX-
EX-A EX-A
X-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AU
-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
/\/--> DISCLAIMER <--\/\
------------------------
Ohooh... I'm scared as shit so I accept no responsibility for any actions
taken by readers... blahblah NOOOOOOO...
This text is written with the intention that readers of this text hack
Audex Voice Power vmb's, and I sure as hell hope that as from now on every
fucking Audex Voice Power in the galaxy gets abused by hackers.
/\/--> INTRODUCTION <--\/\
--------------------------
The Audex Voice Power is the predecessor of the Audex we all know just under
the name Audex today. There aren't that much of this older system around,
but the few I found were fucking easy to hack. And again: vmb's are fun to
have, you can trade them for xxx (fill this in), they lower your phone
bill,... (you've heard this shit before).
Anyway, lets get down to business...
/\/--> IDENTIFYING THE AUDEX VOICE POWER VMB <--\/\
----------------------------------------------------
Well, you can't recognize them from the first greeting, but the greeting
will probably contain the usual 'press the ext. of the person you want to
reach' and the (special for Audex Voice Power) 'if you want to transfer
using names instead, press the pound (#) key'.
To REALLY be sure it's an Audex Voice Power: press *7, if it responds with:
'Welcome to Audex Voice Power, please enter extension and # sign' you've
got yourself an easy-to-hack Audex Voice Power vmb.
/\/--> LOGGING IN <--\/\
------------------------
Press *7, you are asked to enter your box number, these are can be 3 or 4
digits, but I haven't found a mixture of the two on one system so far.
After you've entered the box number, press #, enter your password and press
# again. If you entered and incorrect box number or password, it will say
'Login incorrect, please try again,...'. On the systems I found you could
try 4 times to login before you get disconnected. When you get disconnected
it will say: 'Contact administrator for help, please disconnect... goodbye'.
/\/--> FINDING A VALID BOX AND PASSWORD <--\/\
----------------------------------------------
The boxes are grouped, and they will usually be in 2XX or 2XXX. The default
password is the same as the box number, just like on allmost all other VMB
systems.
There are two easy ways to find boxes (and one difficult, and another one
if you really want a box but had extremely bad luck):
1. On the two systems I'm using right now, the attendant-extension (0)
has 0 as password, and on one of those two, the options at the login-menu
have also got the same password as their extension number (1 for xxx, 2
for yyy,...). So first thing to do is trying 0 -> 9, if you can't get in
with these, read 2.
2. So you couldn't get in by trying extensions 0 -> 9.
Most systems have a directory where you can transfer to people's
extensions by entering the first letters of their last name.
To find the directory, just listen to the first greeting you hear when
you call the VMB. (you know, 'welcome to xxx... if you need assistance
press 0, otherwise press the extension of...'). Usually you have to
press # at the login menu. Now, when you enter the directory option,
the system will respond with: 'Please enter the last name of the person
you want to reach'. Don't enter a complete name, just press 5 or somtehing
and the # sign. By the way: lots of VMB systems have some sort of
directory, and allmost every VMB system I found had users with last names
'Smith' or 'Jones' (some popular names in the US, and characters from a
stupid TV series). Well, lets continue with Audex Voice Power. After you've
pressed #, the system will say 'to select blahblah press x' and will
start saying names. Now a lot of users also say their box number, so
a lot of these names will be like 'John Doe, extension xxxx'. Just
write these down. If you found how many digits the box numbers are,
and where they are grouped, hang up and call again.
Now start trying the box numbers you just found, you probably will get
in using the box number as password the 2nd or 3rd time you call, since
a lot of people don't use their VMB's, or don't know shit about it, so
haven't changed their password.
3. Couldn't get in with one of the above methods ? Never happened to me,
but I guess it's possible. Here's what I would do in such a situation.
Don't use the login (*7) options to scan for boxes because then you don't
even know if it's a valid box. Just transfer to them from the main menu,
so you know how much digits the boxes are, and where they're located
(since they 'live' in groups). There's a 90% chance the boxes are located
in 2xx(x). If you entered an invalid box number, it will first try to
transfer you, and then it will say something like 'your transfer couldn't
be completed'. Since you don't have to press # after entering an extension
to transfer to, it's possible that f.e. after pressing only one digit you
will get transfered (read point 1 of this paragraph). When you've located
an area that contains lots of valid extensions, try to hack a box in that
area with the login (*7) option.
4. Still didn't find a box ??? Well, the best thing you could do in this
case is bullshit to the operator. If you couldn't find the area that
contains the boxes, and there's no directory, ask her for the extension
of f.e. Smith and say you don't know anything else about this Smith.
If bullshitting the operator didn't work either, just try to transfer to
an extension, and ask the person that picks up the phone for their
password. You could say that you're from maintenance, and are installing
a new option in the boxes so that people are able to use outside lines
from within their boxes or something.
5. You still couldn't get a box ? Well, give up on this system and scan for
another VMB system. I NEVER found a system I couldn't get a box after
about ten minutes using the method in points 1 and 2 so you are trying to
hack a system that has allready been badly abused by hackers or otherwise
you are EXTREMELY dumb.
/\/--> OK, YOU'RE IN A BOX, WHAT NOW ??? <--\/\
------------------------------------------------
Well, use press 2 to listen to the messages, but only listen to the dates they
were created. So press # every time to skip to the next message.
If it contains new messages from 3 months ago, then it means that the legit
user didn't use his box in 3 months. You can safely listen to the messages
and use this box without the risk of loosing it in 2 days.
If it contains no messages it could be possible that the user checks the VMB
regulary, or that it has never been used in which case you got yourself a
good box again. There's no quick way to find out if it's unused or often used
in this case, just use this box to scan for other ones (look below), or check
regulary if there are new messages and if they get deleted afterwards.
/\/--> SCANNING FOR OTHER BOXES <--\/\
---------------------------------------
There are different ways of scanning for other boxes, but the quickest is
the following:
First choose option 5 from the main menu, then press 1 to create a
distribution list. You will be asked for an ID for the list, just press 1
or something followed by #. Now start entering box numbers, followed by #.
If the box is valid, the system will respond with the name of the owner, or
when you're lucky, the system will sa: 'Extension xxx', in which case you
should write the number down because you've got a 99% chance this is an
unused box. If the box is not valid, the system will say 'Extension xxx not
valid'. When you've collected some numbers, press *# and then *3 to delete
the list. Now hang up, call again and try what boxes have the same passwords
as their box numbers.
/\/--> OPTIONS AND COMMANDS <--\/\
----------------------------------
From the main menu you've got the following options:
1. Record a message
2. Listen to messages
3. Administer name or greeting
5. Administer password and distribution lists
6. Change outcalling info (INTERESTING)
*8. Transfer to another extension
1. RECORDING MESSAGES :
You will hear a beep, record your message after the beep. When
finished recording, press 1. Now you've got the following options:
21: Re-record : Your message will be deleted and you can record
it again.
23: Playback : Just as it says: your just-recorded message will
be played back.
*3: Delete : Your message will be deleted
*#: Approve : Now enter the boxes you wish to send your message
to, followed by #. When finished type *#. To delete
the last entry (box), type *3.
2. LISTENING TO MESSAGES :
When there are no messages, you will go back to the main menu.
Otherwise you will hear the date and time the actual message was
delivered, and the name (if specified) of the sender.
Options:
0 : Listen : Listen to actual message
While listening you can use these commands:
2 : Rewind message. If you press it again you will go to
the previous message.
3 : Pause. Press 3 again to continue playing.
5 : Rewind and play
6 : Goto end of message
# : Skip : go to next message
*3: Delete : actual message will be deleted
1 : Respond/forward message
1 : Reply : Send an answer to the sender
2 : Forward : Record a comment before the message and send
it to someone else.
4 : Record new : Record a new message. This does exactly the
same as option 1 from the main menu.
3. ADMINISTERING OF NAME AND GREETING :
This submenu will enable you to record name and greeting, and to
specify what greeting will be used.
Options:
1 : Greeting : The message that will be heard whenever someone
wants to leave a message in your box.
1 : Record : Record after the beep the greeting that should
be played. Press 1 to end recording.
2 : Listen : Listen to your greeting.
*#: Select which greeting should answer.
9 : Personal greeting.
6 : Standard system greeting.
2 : Name : The message that is heard when someone sends or
reveices messages to/from your box.
0 : Listen : Listen to name.
1 : Record : Record name.
5. CREATING DISTRIBUTION LISTS AND CHANGING YOUR PASSWORD :
Distribution lists are used when you regulary need to send messages to
several people, and don't want to waste time with typing all their
boxes.
1 : Create : Creates a new distribution list. First you will be
asked for an ID for the list. Now enter f.e. 1 followed
by #. You can now enter a box number followed by #,
repeat this untill you inputed all the box numbers for
the distribution list. If you entered a wrong number,
just press *3 to delete the last entry. When finished
press *#.
2 : Scan : With this option all distribution lists ( If you got
any ) will be said, and after saying the ID of the
list, you've got the following options:
*3: Delete : Delete this distribution list.
# : Skip : Go to the next distribution list.
3 : Review : This option will allow you to change other users' or
your own distribution lists. First enter the box number
followed by #, or for your own box, just press #.
Now enter the ID of the distribution list followed
by #. The system will say how much entries there are in
the list, and name them one by one, giving you the
following options after naming each entry:
# : Skip : Go to the next box.
*3: Delete : Delete this box.
1 : Add : Add a box.
*#: Quit : Stop review of the entries in the list.
4 : Change PW : Enter your new password followed by #. After
entering it, you have to enter it again followed
by # to check if you didn't enter it wrong the
first time. The password can be 1 till 9 digits.
If you just press # when you're asked to enter it,
no passwords will be assigned to your box.
6. CHANGE OUTCALLING INFORMATION :
The outcalling option is quite fun. Not everyone is allowed to do it,
but if you find boxes allowing outcalling, you can use them to call
friends, boards or even alliance... I wouldn't suggest putting your
own number there, but it would be quite fun that when someone calls
you up using the VMB (on a tollfree number ???), and you don't answer,
he can leave a message and stuff...
Options:
1 : Change : Enter the number your calls should be transfered to,
followed by #. To exit press *#.
3 : Info : Will give you instructions on how to enter the number
with option 1. If you want to insert a pause in the
dial string, use * to pause for 4 seconds. If your
number needs to be ended with a #, start your dialing
string with ##. Normally you can't end with a #
because if you do that, the system thinks that it's
the end of the dialing string. This is usefull for
pagers and other stuff (use your imagination).
6 : Disable : Turn outcalling off.
9 : Period : Specify the outcalling period.
1 : Outcalling allowed during the system administration hours.
F.e.: Only between 8 AM and 6 PM.
2 : Outcalling allowed 24 hours a day.
/\/--> GREETINGS <--\/\
-----------------------
And last but not least some greetings to:
(A-Z to avoid 'why did ya put X before me ?')
Analog: Forget that I told you to kick off Flaming Chaos as a CO.
Making a new BBS proggy ?
Apollo: Hope your exams are better than mine... nice talking to ya
over the VMB.
A.R.U.P.: For having such a nice and virgin Audex Voice Power VMB.
Cops (the): FUCK OFF !!! I EXTREMELY HATE ALL COPS... I WOULD KILL ALL
COPS IF I HAD THE CHANCE (same goes for all kind of security
personnel and the endless amount of lamers on this planet).
Donald Duck: Where R you ? Is your girlfriend SO interesting ? We miss
your expertise...
Einstein: You're lame and you know it. Hah, I puke on guys like you.
I'm not a violent guy, but I swear I'll smash your head when
I ever meet you.
Flaming Chaos: Sorry I offended you dude, but I didn't know about that '|',
so I thought the message was specifically written for me.
Invalid Media: Quite nice board... too bad you had to make it codefree.
Jules: Your board is OK, but why is it down so much ?
Larry: You're a lamer and your problem is that you won't admit it.
Oink: Hmmm... so you agree that HP3000's are Boooring... Unixes are
1000 times more phun...
Ralph: Been fucking around on the nets lately ???
Sintax: Happy now that I put some greets in ? Don't you ever get bored
of CIS ?
Slycath: Nice texts, continue your good work...
btw: I LUV Robbie Robot... (and his frog puppet)
Predat0r: Your board is the living proof that a board doesn't need an
HST to be one of the best.
Thor: How is army ? Why don't you do something usefull while you're
there and look for their computer dialups (if they're using
any (hehe)).
Trap Zer0: Nice texts about the VMB's. Getting active again ?
Vinny: You probably won't read this, hehe... your handle is with 'V'
so you're last... anyways, THANKS for everything you 'teached'
me, THANKS for the job you can get me, GOOD LUCK with the PC.
???: To all guys who call me when I'm sleeping: FUCK OFF.
And... to all guys I forgot and also the few cool guys I know among all the
lamers in the lame Amiga scene. Only greets here to guys I know involved
in HPA, this will be the first and the last time I put up such a greetings
list...
/\/--> RECOMMENDED READING <--\/\
---------------------------------
- All texts about Night Ranger, he's the VMB expert.
- Texts about Aspen and Cindi systems written by Slycath.
- Texts about the IADS and Message Centers by Trap Zer0.
- Ofcourse all texts written by me (hehe).
/\/--> OTHER TEXTS WRITTEN BY ME <--\/\
---------------------------------------
- Unix command overview
- Hacking Meridian Mail
- HP3000 quick command reference
/\/--> TEXTS TO WATCH OUT FOR <--\/\
-------------------------------------
- Maybe a text about the IADS coz I think it's the best VMB ever made.
- Text about Audex (the new Audex Voice Power system).
- Probably some texts about hacking Unix or the MPE XL or V OS on HP3000's.
L8R ALLIG8R
User CRAZYBYTE ending interactive session at 17:02.
NO CARRIER

View File

@@ -0,0 +1,361 @@
. + . . .
+ ___/\ /\_/\_______________________/\________
. /\__\/\/ /_________________________/ /________\ . +
. . / / __\ \/_________/\_____ _______/ /_________/ .
. \/ / /\ \/ // \ / \ / / /\ / /
. + . \ \ / /\ // /\// /\ \ / / / / / / . .
. ________________/\ / / / // / \/\/ // / / /__/ / . +.
/\_______________\/ \ \/ / \ \_/\ / // / / / / / .
\/_________________/ \ / \___/ / / \/ \/ / / .
. / \ . / / . . \/ .
. + . . . \/\/ . \/ +
. IS PROUD TO PRESENT TO YOU:
. ___________________________
/\_________________________/\
/ / \ \
/ / * CINDI SYSTEM TUTORIAL * \ \
\/\___________________________/\/
YO GUYZ, I'M BACK AS PROMISED WITH ANOTHER TUTORIAL.
LEAVE ME MAIL IF YOU NEED HELP WITH SOMETHING.
YOU CAN CATCH ME ON:
BORDERLINE: +61 (0) 4987-4875
SIN CITY: +32 (0) 3825-2274
CONSPIRACY: +44 (0) 633-894-490
ULTIMATE DREAM: +44 (0) 222-495-919
MEGA GREETZ GO TO THESE GUYZ:
.--------------------------------------.
| FIREFLY, TAS, SINTAX, OINK, VOLTAGE, |
| HYBRID, PUNISHER, CRAZYBYTE, GRAFFITI|
| AND OF COURSE EVERYONE WHO KNOWS ME, |
| AND ARE ALSO COOL HACKER - PHREAKERS |
`-.----------------------------------.-'
/ CAN SOMEONE DO ME A COOL ANSI ? TA.\
\____________________________________/
ARE YOU SITTING COMFORTABLY ?
-----------------------------
THEN I'LL BEGIN.
-----------------------------------------
1. Identifying Voice Mail System As CINDI
-----------------------------------------
When you have connected to your System, upon pressing #,
You should get a voice saying :
"Please enter the persons name using your touchtone keypad, last
name followed by first. To enter a Q or a Z push 1... etc etc.."
Also when you get kicked off the message will be:
"Thank You, Good-Day."
One of the most common phrases you are likely to hear will be:
"If you'd like to speak with someone press zero"
This is contained in almost all instruction lists.
----------------------------------------------
2. Ok So It's CINDI... So How Do I Find A Box?
----------------------------------------------
Mailboxes Are Going To Be Either 3 or 4 Digits.
The CINDI Mailboxes Mostly come in Blocks...
e.g. 860,861,862,865 etc
So When You Find One Person You Can Find Lots Of Others.
When Looking For Boxes The System Will Kick You Off If You Get A Box Number
Wrong After Three Tries.
The Three Possibilities For Mailboxes Are:
1: Invalid Box "Mailbox XXX Does Not Exist !"
2: The Greeting Of The Owner Will Play
3: It Will Say "Mailbox XXX"
Once You Have At Least One Valid Box Number Everything Is sooo EASY!
Upon Second Failure (Of Invalid Mailbox Number)Press Hash To Enter
Another Box Number. Now Enter A Valid Box Number.
If You Don't Want That Box You Can Press '0'
Then Instead Of entering Password You Can Press '#' To Enter Another Box
Number, Now There Is No Fear Of Being Cut Off.
Admin Boxes Are Found At Numbers Like 991, 900, 100, 101 although
Some Systems Require You To Press '0' As Soon As Connected.......
This Will Then Give You An 'Enter Passcode' Prompt.
----------------------------------------------------
3. Strategic Hacking Using The 'Fault' Of The System.
----------------------------------------------------
The easiest method to hack a box is as follows:
e.g. Mailbox you want to hack is 1000.
a. When the system asks you to enter your mailbox number enter: 1000.
b. When the message starts playing you can press '0' to stop.
c. The system will then ask you for a password.
d. The Default Password on a CINDI system is (LAME) '0'
Most Users will have passwords of:
Mailbox number.
'123 (4)'
1, 2, 3, --> 9..
Passwords Are 3/4 Digits...
Odds are at Least 1/8 Of users will have passwords like these..
e. If Password was wrong, then try another..
f. Upon 2nd Failed Attempt press '#' - This causes the system to give you
an 'Enter Mailbox' Prompt... You can repeat this Over, and Over...
The System Doesn't Kick You Off and you can find Them Boxes...
**** Nice Little Bug In The Software METHINKS!!!! ****
---------------------------------------------------------
4. WOW! That Was Easy... What Can I Do With My New BOX ??
---------------------------------------------------------
The Full Commands Available Are As Follows:
Upon Entering Yor Box You Can Select:
0 - TRANSFER TO ATTENDANT
1 - PLACE A CALL (To another mailbox)
2 - RECIEVE MESSAGES
3 - MESSAGE FORWARDING
4 - CALL PLACEMENTS
5 - GROUP MESSAGES
6 - CERTIFIED MESSAGES
7 - GUEST ACCOUNTS
8 - PERSONALISE MAILBOX
* - VOLUME. Quiet, Medium OR Loud.
====
-----------------------------------------------------------------------
___
| |
| 0 | WILL ALMOST ALWAYS TAKE YOU TO THE ATTENDANT / OPERATOR
|___|
Lots Of CINDI System Operators Are Quite Stupid...
Don't Ask Me Why But This Is Fact....
Wind Them Up And Make Their Life Hell.
Or If Your Kind, Just Worm Info About Other Country Dialups Etc..
Use Your Imagination.
-----------------------------------------------------------------------
___
| |
| 1 | PLACE A CALL
|___|
This Will Prompt You To Enter A Mailbox Number...
Then You Just Start Recording Your Message.
The Point Of This Is So That You Can Reply To Messages..
i.e. They Will Have Your Mailbox Number Recorded With Them
-----------------------------------------------------------------------
___
| |
| 2 | RECIEVE MESSAGES
|___|
Yup, The Whole Point Of A VMB Is To Transfer Messages..
So Lets Look At The Available Options.
1 - Keep Message
2 - Repeat Message
3 - -10 Seconds
4 - +10 Seconds
5 - Skip Message
6 - Stop playback for 30secs.
7 - Take Action
---------------------------------------
PRESS:
1 - Copy Message With Comments
2 - Copy Message Without Comments
6 - Relay Info To Another Mailbox
7 - Respond To Sender
9 - Take NO Action
---------------------------------------
8 - Delete Message
9 - End Recieving
-----------------------------------------------------------------------
___
| |
| 3 | MESSAGE FORWARDING
|___|
This Sends All New Messages To A Given Telephone Number.
Allows You To Enter Date, Time.. And How Often To Call.
1 - Enable Message Forwarding
2 - Review Message Forwarding Status
8 - Cancel Message Forwarding
9 - Exit
-----------------------------------------------------------------------
___
| |
| 4 | CALL PLACEMENTS
|___|
This Allows You To Send A Message To A Telephone Number.
The Format For Entering Number Will Allow You To Enter Pauses,
Stars, and '#'. This Enables You To Call A PBX Using A Long String Of
Commands, And Get The System To Give You A Wake Up Call At Home,
Even If You Are Not In USA.....
One Thing To Remember Is, Once Call Has Been Made Or Not, Check Up
On The Status Of Messages And If A Call Couldn't Be Completed Then
Kill It As To Avoid Leaving Your Number On The System..
( Note On Some Systems Call Placement May Be Off Or Only Available
On Specific Mailboxes. Find Admin. Box And Turn It ON !)
1 - Place A Call
This Will Ask You To Enter The Telephone Number You Wish To Leave
A Message For.. The Systems I Have Found Only Call USA But This Is
Adequate Enough. You Can Enter Pauses ( ), '*' And '#'
You Will Then Be Prompted To Enter A Password For The Message.
This Is So That When The Number You Are Calling Answers They Have
To Enter A Password To Allow Them To Hear The Message..
If No Password Is Required Then Enter '0' As The Password.
2 - To Check Status Of Calls
9 - Exit
-----------------------------------------------------------------------
___
| |
| 5 | GROUP MESSAGES
|___|
Allows You To Send A Message To Lots Of People At Once. If You Have
A Group With Everyone Listed In It The Chances Are That When You Send
A Message The System Will Crash.. (Mention No Names: TAS)
1 - Record A Group Message
3 - Add Members To A Group
4 - List A Group
8 - Delete A Group
-----------------------------------------------------------------------
___
| |
| 6 | CERTIFIED MESSAGES
|___|
These Are Messages Which Once Read Will Cause The System To Send
The Sender A Message Which Says The Message Sent To:.. On ...
Has Been Recieved.
1 - Send A Certified Message
2 - Check Delivery Status Of A Message
8 - Cancel Notification Of A Message
This Stops The System From Sending A Message Once The Sent
Message Has Been Read.
9 - Exit
-----------------------------------------------------------------------
___
| |
| 7 | GUEST ACCOUNTS
|___|
These Allow You To Record And Recieve Messages To And From Non
Subscribers (Heheh) To The System.
1 - Record A Guest Message
2 - Check Status Of A Message
3 - Open New Guest Account
4 - List Your Guests
8 - Delete A Guest
-----------------------------------------------------------------------
___
| |
| 8 | PERSONALISE MAILBOX
|___|
1 - Change Personal Greeting
2 - Change Password
3 - Change Name
4 - Recover System Bulletin
This Will Recover System Defaults For The Box.
5 - Check Message Waiting Notification Status
This Will Tell You If You Have New Messages.
-----------------------------
Press:
1 - Change
9 - Exit
-----------------------------
6 - Change Call Management Level
This Will Allow Your Calls To Be Screened.
-----------------------------
Press:
1 - Change
9 - Exit
-----------------------------
7 - Change Order Of Message Retrieval
-----------------------------
Press:
1 - Change
Last In First Out +
First In First Out
-----------------------------
9 - Exit.
-----------------------------------------------------------------------
CINDI Systems Are Fun.. Especially For OutDialling Messages....
If You Are ALONE ! (awww!) You Can Get The System To Send All Messages
At A Specific Time To One Side Of A Loop.. Where You Will Be Waiting
On The Other Side... The Possibilities Are Endless... Wake Up Calls.. etc.
I Hope This Was As/More Helpful Than The ASPENTUT.TXT, If You
Don't Have That Then Download It NOW From One Of The Boards Listed
At the Top Of This TextFile...
Good Luck And HAPPY HACKING !!!!!!!!!!!!!!
.. ..
\ /
/\/\/\/\
| ## |
[| .. |] ROBBIE THE ROBOT SAY'S HELLLOOOOOOOOOOOO.
|________|
\|-|-|-|-/ <In A Monotone Sort Of Voice >
--------
___|--|___ ..
/ \ {<>} < Do You Like His Frog Puppet ? >
/ | /\/\ | \/ /
/ / | \/\/ | \ /
-----------------------------------------------------------------------
The Next Bit Is Where The TEXT ADDERS Do Their Worst:
-----------------------------------------------------------------------

View File

@@ -0,0 +1,87 @@
Hacking Voice Mail Systems
Voice Mail is a relatively new concept and not much has been said about it.
It is a very useful tool for the business person and the phreak. The way it
works is that somebody wishing to get in touch with you calls a number,
usually a 1-800, and punches in on his touch-pad your mailbox number and then
he is able to leave a message for you. Business experts report that this
almost totally eliminates telephone tag. When a person wishes to pick up his
message all he needs to do is call the number enter a certain code and he can
hear his messages, transfer them, and do other misc. mailbox utilities.
Most VMSs are similar in the way they work. There are a few different ways
the VMSs store the voice. One way is that the voice is recorded digitally and
compressed and when heard it is reproduced back into the voice that recorded
it. Another method that is slower and uses more space, but costs less, stores
the voice on magnetic tape, the same type that is used to store data on a
computer, and then runs the tape at a slow speed. Using this method the voice
does not need to be reproduced in any way and will sound normal as long as the
tape is running at a constant speed. On some of the newer VMSs the voice is
digitally recorded and is transformed from the magnetic tape at about 2400
bits per second.
There are many different types and versions of voice mail systems. Some of
the best and easiest to get on will be discussed.
Centagram
---------
These are direct dial (you don't have to enter a box number). To get on one
of these, first have a number to any box on the system. All of the other
boxes will be on the same prefix; just start scanning them until you find one
that has a message saying that person you are calling is not available. This
usually means that the box has not been assigned to anybody yet. Before the
nice lady's voice tells you to leave the message, hit #. You will then be
prompted for your password. The password will usually be the same as the last
four digits of the box's number or a simple number like 1000, 2000, etc. Once
you get on, they are very user friendly and will prompt you with a menu of
options. If you can't find any empty boxes or want to do more, you can hack
but the system administrators box, which will usually be 9999 on the same
prefix as the other boxes, will allow you to hear anybody's messages and
create and delete boxes.
Sperry Link
-----------
These systems are very nice. They will usually be found on an 800 number.
These are one of the hardest to get a box on because you must hack out a user
ID (different from the person's box number) and a password. When it answers,
if it says, "This is a Sperry Link voice station. Please enter your user ID,"
you will have to start trying to find a valid user ID. On most Sperrys it
will be a five digit number. If it answers and says, "This is an X answering
service," you first have to hit *# to get the user number prompt. Once you
get a valid user number will have to guess the password on most systems, it
will be 4 digits. Once you get in, these are also very user friendly and have
many different options available.
RSVP
----
This is probably one of the worst VMSs but it is by far the easiest to get
yourself a box. When it answers you can hit * for a directory of the boxes on
it (it will only hold 23). If you hit # you will be given a menu of options
and when you choose an option you will then be prompted for your ID number.
The ID number on an RSVP system will just about always be the same as the
mailbox number, which are always only 2 digits.
A.S.P.E.N.
----------
The Aspen voice message systems made by Octel Telecommunications is in my
opinion the BEST VMS made. To get a box on an Aspen, you need to find an
empty box. To find an empty box, scan the box numbers and if one says, "You
entered XXXX. Please leave a message at the tone," then this is an empty box.
You next just press # and when prompted for your box number enter the number
of the empty box and friendly voice of the nice lady will guide you through
all of the steps of setting up your box. She first tells you what you can do
with the box and then will prompt you with, "Please enter the temporary
password assigned to you by your system manager." This password will usually
be 4 digits long and the same as the box number like 1000, etc. Once you get
on their are many things you can do. You can make a distribution list where
if you want to leave a certain message to more than one person, you can enter
the list number and all of the boxes on the list will get the message. You can
also have the system call you and notify you that you have new messages. These
systems also have what they call "Information center mailboxes" that are
listen only and can also have a password on them so the person calling has to
enter the password before he hears the greeting message. Aspen VMSs have a
system managers mailbox that will just about give you total control of the
whole system and let you listen to people's mail, create and delete boxes, and
many other things.


View File

@@ -0,0 +1,265 @@
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
Hacking Answering Machines 1990
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
by: Predat0r of Blitzkrieg Bbs 502/499-8933
AT&T reports that in the year 1990, 11 million people
will buy an answering machine for their home use. In 1989, 10
million machines were sold. Everyone has called up a person
at one time or another and got the old "leave your name at
the beep" message. With this increase in homes using these
machines there is also a new form of hacking developing. One
of hacking an answering machine.
Why would anyone even want to hack an answering machine
and for what purpose? There are many reasons and things you
can do once you have control of someone elses machine. If for
some reason you need to spy on a business or person you can
hack their machine and take control using the information for
your own personal use. There is also the old "change the
message" secret to make it say something to the effect of
this line accepts all toll charges so you can bill third
party calls to that number. You can also use an answering
machine for your own personal use, as in making it your own
voice mail type system for people to call. Only do this if
you know someone is out of town. If they come home from
shopping and find their machine changed it might cause
problems. With these basic ideas in mind you can see hacking
an answering machine could be very useful to certain
individuals.
How can a person hack an answering machine? Well most
answering machines built now have remote access features
which allow the owner, or anyone to call in and press a
security code to play their messages. This is where the fun
begins. Some older models don't have remote access so you
cannot do anything to them. Also if you know someone has a
machine but you call and it doesn't answer, let the phone
ring about 15 times. This will tell the machine to turn
itself on, so you can hack it. The actual number varies
between machines.
To practice hacking some machines i will show you how to
get remote access on a few models. Just look and see what
kind your friend has and hack it for starters.
Record a Call- Model 2120
-------------------------
Call in and during the message or after the beep tone to
leave a message enter the 3 digit security code. Which you
must find yourself. This will rewind the tape and play all
new messages. Press 2 to backspace and repeat the last
message. Press 3 to fast foward the tape.
Changing your message from remote. Call your phone and enter
the secret code. After several rapid beeps enter your secret
code again. After a short delay you will hear a long tone.
After the tone ends begin speaking your message which may be
17 seconds in length. When finished press the second digit of
your secret code to end. The machine will then save your
message and play it back. To turn the unit on from remote let
it ring 11 times then hangup. Or stay on and it will answer
so you can access the machine. For express calls or frequent
calls hit the second digit for two seconds to skip the out
going message announcement.
Goldstar- Models 6000/6100
--------------------------
Call and enter your 1 digit secret code after you hear the
out going message announcement. The machine will then play
back new messages. Hangup to save messages or after all
messages have been played the machine will give a double
beeptone, you may enter your code to erase all messages.
You cannot change the out going message on this unit.
Cobra- Model AN-8521
--------------------
For this machine there are 2 codes. Both are one digit in
length. The first one is the play code. The second is to
erase messages from remote. After the outgoing message and
beeptone press the play code for 2 seconds to play messages.
After each message ends there will be a single beep. At the
end of all message it will beep twice. You may then do the
following. Replay by pressing the play code again. Erase
messages by pressing the erase code. Hang-up and save
messages and continue to take additional calls. To turn this
unit on from remote you must let it ring 16 times before it
will activate. If it rings 10 times then you hear 3 beeps it
is full and messages need to be erased.
Uniden- Model AM 464
--------------------
This model is one of the more advanced when it comes to
remote capabilities. The factory preset security code is 747.
This can be changed to as many as five digits of your choice.
To gain access from remote type your security code while the
outgoing message is playing. Press 1 after hearing the tone
and the machine will rewind and play your messages. To fast
foward press 7, to resume normal playback press 8. To stop
the messages from playing press 8 again. Press 8 to restart
the messages or 1 to start from the beginning again. Press 9
to rewind and 8 to resume playing. If you rewind all the way
it will beep twice. You need to press 1 to play messages.To
save messages press 4. To erase press 6. To turn the machine
off from remote press 5 after all messages have been played
and the machine beeps twice. To turn the machine on from
remote let the phone ring 12 to 14 times. The machine will
beep and then you enter your remote code. This will then turn
your machine to answer mode. This machine also has room
monitor options. This allows you to listen to what is going
on in the room of the machine. To do this call the machine
enter your security code after the beep press 0. The monitor
stays on for 60 seconds. You will be warned with 2 beeps at
45 seconds. To continue press 0 again.To change the outgoing
message from remote erase all the messages. Then call back
and enter your code after the tone press 3. It will beep
again and you may then leave your new message. Press 3 when
finished. To change the security code from remote after the
beep press # then 1 after the next beep enter your new code
followed by the # again. There is also a call break through
where you enter 256 while the outgoing message is playing.
This will alarm the persons in the house someone is calling
with a series of loud beeps. Press the * key to stop.
Code-a-phone Model 930
----------------------
To access from remote call and enter your security code after
the announcement and tone. Press your code for 3 full
seconds. After the new messages have been played you will
hear 2 tones. You may then save messages by pressing your
code then hanging up. repeat by entering code wait for 4
tones then enter code again. To erase message hangup when the
tape is done playing. To turn the machine on from remote call
and let ring ten times. When the system answers it will have
a two second tone. Press your security code. You will hear
three double tones to let you know the system is on.
Unisonic- Model 8720
--------------------
One digit code entered after the outgoing message and tone
will allow you to hear messages. To change message wait till
all new messages have been played 2 beep tones will be heard.
Press code for four seconds. Two beeps will be heard then the
tape will rewind and beep again. Now leave the new message.
Press your code when finished to save new outgoing message.
New message will play for you to hear.
Panasonic- Model KX-T2427
-------------------------
Call and enter the three digit code during the outgoing
message. Machine will beep once, then beep amount of times
equal to messages. Then rewind and play messages. There will
be three beeps after the last message. Six beeps means the
tape is full. Press 2 to foward. Press 1 to rewind. Press 3
to reset machine and erase messages. To monitor the room
press 5 after the beeps indicating the number of messages the
machine has. Press 7 to change the outgoing message, it will
beep a few quick times rewind then a long beep will be heard.
Leave new message press 9 when finished. Press 0 right after
the beep tones to shut the machine off. To turn the machine
on let it ring 15 times then hangup after machine turns on.
Panasonic- Model KX-T2385d
--------------------------
During the outgoing message enter the 1 digit code. This will
playback messages. Press the code again to rewind. After the
messages have played the machine will beep three times. Press
your code again and it will reset the machine. For remote
turn on let phone ring 15 times. Then after the outgoing
message hangup.
AT&T- Model 1504
----------------
Enter 2 digit code before or after announcement. System will
beep after each message and five times when messages are
done. Press the # key anytime to pause. Hanging up will save
messages. Press 7 and it will rewind and play messages again.
Press 5 to fast foward. Press 2 to rewind. Press 33 after all
messages have been played to reset without saving messages.
To record onto the tape press * after the system answers.
This will then beep and you may leave a four minute message
on the tape. Press # when done. This is not an outgoing
message announcement, only a memo. To turn on from remote let
ring ten times press 0 when system answers. To turn the
system off dial and enter your code. Press 88 and it will
shut the machine down.
Phonemate- Model 4050
---------------------
Enter your 3 digit code during the outgoing message. Pressing
* or # will allow you to scan through the messages. When
finished pressing 1 will replay the messages. Pressing 2 will
erase them. To turn on from remote let ring for 15 times.
Then proceed with remote operations.
Phonemate- Model 7200
---------------------
Enter 1 digit code during of after the outgoing message. A
voice will tell you how many messages you have, then play
them back for you. To rewind press your code and hold it for
however long you want to rewind. Let go and it will resume
playing. After the last message a voice will prompt you with
a list of options. You have five seconds to respond or it
will proceed to the next option. These are as follows. The
first is hanging up to save messages. Next is enter code to
replay messages. Next enter code to erase messages. Last is
enter code to change greeting. Follow the voice and it will
give you complete directions on exact steps to follow. To
turn on from remote let ring ten times then hang up. If tape
is full it will say sorry tape is full, enter code and erase
messages.
Spectra Phone- Model ITD300
---------------------------
Enter your 1 digit code after the greeting. Messages will
play back. Hanging up will save them. Or wait for four beeps
and press your code to replay them. To erase press your code
after 2 beeps. To turn the machine on from remote let it ring
10 times.
Notes: Outgoing message and greeting is what you hear when
you first call. Code is your personal security code.
Hacking answering machines can be very easy. It can also help
you obtain valuable information. If you have a targeted
machine you can try going to a store and saying you just
bought one and it didn't have instructions in the box. They
will usually give you a set or make copies for you. This
basic guide is just to introduce you to answering machine
hacking and changing the outgoing message and listening to
messages left by callers. To keep your own machine safe
purchase one with a changeable security code of 3 or more
digits. Most home machines are of the 1 digit type and are
easy to hack. I have no knwoledge of the laws concerning
hacking into someones answering machine. I am sure once it
becomes more common we will find out. Of course this article
is for informational purposes only so you would never have to
find out the actual laws.
Taken from TAP Magazine Issue #100
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
The Salted Slug Strange 408-454-9368
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 510-527-1662
Lies Unlimited Mick Freen 415-583-4102
Tomorrow's 0rder of Magnitude Finger_Man 415-961-9315
My Dog Bit Jesus Suzanne D'Fault 510-658-8078
New Dork Sublime Demented Pimiento 415-566-0126
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diverse sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"

View File

@@ -0,0 +1,202 @@
Hacking & Scanning Voice Mail Boxes: The Tutorial
Hello again, and welcome to another Legions of Lucifer text phile! This
text file has to do with hacking and scanning VMBs. The reason I am writing
this phile is because I am very good at it, and have had years of experience.
Infact I have been called by MCI for screwing them over by attacking and
taking over a whole damn system with a few friends of mine.
Anyways, hacking VMBs is very simple and basically safe, and not only that
but they are kewl to have around. You can give them to friends, you can
trade them for access on bulletin boards, or you can use it for yourself.
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
to hack, how you go about hacking them, default passwords, hints on better
scanning, and having your very own box.
Basics:
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
like an answering machine. You can use it for all sorts of things. Most
VMB systems are dialed though 800 numbers. People call up the VMB system
that you have a box on, and dial in your box number and then leave you a
message. Whenever you want to check your box, you just call up, enter your
password and read your messages. Inside a VMB you can do whatever, you can
leave messages to others on the system, you can change your 'Out Going'
message, you can have guest boxes (Explained later), you can have the box
call your house when you get an Urgent message, you can do a lot of things.
Infact, on some systems you can even CALL OUT through them, so they can be
used as a code of sorts! They are cool to have.
What Type of System You Should Scan/Hack:
You should scan/hack out Virgin Systems, this is another way of calling a
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
have the best boxes and the most options that VMB Systems can offer. I will
be talking about ASPEN System today since I know most about those.
Scanning Your 'Virgin ASPEN VMB System':
Okay once you've found your Virgin VMB System, you start to scan. Just incase
you don't know what scanning is, that means you search for boxes that are
hackable (Explained later on). Now you dial up the system and when it picks
up and the bitch starts to talk, press the "#" key. It will then ask you for
your box number... now there are two different way the ASPEN System can be
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digit Box Number
System". Now lets just say this system is a 3 Digit System. Okay, when it
asks for your Box Number, enter in 999, now it will say one of three things:
[These are known as 'Greeting Names']
1. John Doe [Box owners name]
2. "Box Number 999 Is Not a Valid Box Number"
3. "Box Number 999"
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
but if it says 3, then you are lucky, now it will ask you for your password,
now you are probably saying 'Shit this is where it gets difficult'... well
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
* We will use box number 666 as an example box #
[ BN = Box Number ]
List of Default Password: Combination Result
1-BN 1666
BN+1 667
0-BN 0666
BN-0 6660
Most Common BN 666
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
use that most. Now, if you try all those Defaults and still can not get into
that Voice Mail Box, then that means that the box has been already taken, but
the owner hasn't changed his 'Generic Message', if you don't get in, you
will just have to search until you get in.
Once You Get Into a Box:
Okay, once you get your first box, *DO NOT* change anything!! That will come
later. Your first box is, as what is known as a 'Scanning Box'! What you do
with your Scanning Box is this: You enter "3" from the main commands menu,
and it will ask you for the box number. Now that command is the "Check for
Reciept" command, what it does it check Box #xxx for mail from you. This
command is very convienient for us VMB Hackers. To use that command to your
advantage, you enter in box a box number and it will say 1 of the three
'Greeting Names', like before, if it say #3, then you write down that Box
Number and hack it later. But if it says 1 or 2, then just keep scanning!
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
Now you keep scanning until you have gone all the way down to Box number 000
or whatever is the lowest box it supports. Now, once you have your list this
is when all the fun starts! Now you are ready to hack!
Hacking Out Your New Found 'Hackable' Boxes:
Okay this is the easy part. After you spent most of your time by scanning
the system you should be used to the system and how it works, that should
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
should know what the default password was for your Scanning Box. Well if the
password for your Scanning Box was just the Box Number, then *EVERY* other
hackable box should have the SAME default password. VMB Systems have only
one default password, If one box has the BN for a Default PW, the all the
others will too.
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
side, and when the bitch is talking, press the "#" key. When it asks you for
your box number, enter in the first box number on your list. When it asks for
your password, enter in the Default Password Sequence. Now if you don't get
into that box, it's not a problem, just keep going down your list. You should
get into a few. But remember, just because a box is marked 'Hackable', it
doesn't mean you will definatly get into it.
Okay, now you have a few dozen boxes. You can now use you Scanning Box to do
whatever you please.
ASPEN Guest Boxes:
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
for him, and leave you messages, but not only that, you can leave messages
to HIM! Which means, if his is in New York, and you are in California, and
neither of you have codes to call eachother, then you can leave messages thru
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
0. Main Box - Your Voice Mail Box!
1. Guest Box #1 - Can Leave & Recieve Messagez
2. Guest Box #2 - Can Leave & Recieve Messagez
3. Home Box - Can Leave & Recieve Messagez
4. Secretary Box - Can Check How Many Messagez You
Have & Receive Messagez
Hints On Better Scanning:
A lot of people say hacking and scanning for VMBs is too damn hard... well
that's because they are going at it all wrong, they probably read some lame
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
here is a small list of hints on better scanning and hacking:
1. Do not use a Voice Mail Box hacking/scanning program
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
2. Do not hack in random order (ei: B#999, 345, 810, etc)
Always hack in order: 999, 998, 997, 996, 995...000.
3. Try to find out if it's virgin. The newer the System,
the better.
4. If you have a phone with memory dial, change one entry
to the number of the VMB System.
5. Don't hack the System Managers box unless you really
want to.
Ideas of Things To Do With Your Extra Boxez:
Well since you can have up to 500 extra Voice Mail Boxes, you might
not know what to do with them, here are a few ideas that can help you out:
1. Give them to friends
2. Sell them to friends
3. Offer them to sysops for
for better access
4. Trade them for HSTs or
whatever
5. Use them as a Voice Verifing line (So you don't have to give out
your real voice number to BBSes when you apply!)
Well, that's it to the Legions of Lucifer Hacking & Scanning Voice Mail Box
Systems Tutorial! I hope it helped you and I, along with L.o.L wish you the
best of luck with your new found hobby! And remeber if you found this text
of any help, please spread it around to help others! Also, if you think you
are any good at writing H/P, please apply to be a Member! Call the L.o.L Home
at:
Digital Hackers Network
Legions of Lucifer HeadQuarters/Home
No Warez! A truely serious Hack/Phreak board
Hack, Phreak, Scanning, Phraud, Crashing disscusions
Viral Research & Development Sections (500+ Virii!)
"Personalized ANSi Bombs" made by request
Running AfterShock v1.20 - 2400 Baud
PH: 213-274-1333
Call these Legions of Lucifer support boards for information or application
inquiries:
Digital Hackers Network 213/274+1333 L.o.L HeadQuaters/Home
Electric Eye ][ 313/776+8928 L.o.L Distribution Site #1
Digital Information Exchange 612/356+2209 L.o.L Distribution Site #2
Legions of Lucifer High Office Members:
Prezident/Founder: Wave Runner!
Vice Prezident : Count_Zer0
This text file is (C)Copyrite 1990 L.o.L Inc.
L.o.L is a registered trademark of DHN, All rights reserved
Any modifications to this text file is a violation of copyrite.
Digital Hackers Network 213/274+1333 -=L.o.L Home=-

View File

@@ -0,0 +1,210 @@
The THC Hack/Phreak Archives: LOL12.TXT (205 lines)
Note: I did not write any of these textfiles. They are being posted from
the archive as a public service only - any copyrights belong to the
authors. See the footer for important information.
==========================================================================
Hacking & Scanning Voice Mail Boxes: The Tutorial
Hello again, and welcome to another <20>egions <20>f <20>ucifer text phile! This
text file has to do with hacking and scanning VMBs. The reason I am writing
this phile is because I am very good at it, and have had years of experience.
Infact I have been called by MCI for screwing them over by attacking and
taking over a whole damn system with a few friends of mine.
Anyways, hacking VMBs is very simple and basically safe, and not only that
but they are kewl to have around. You can give them to friends, you can
trade them for access on bulletin boards, or you can use it for yourself.
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
to hack, how you go about hacking them, default passwords, hints on better
scanning, and having your very own box.
Basics:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
like an answering machine. You can use it for all sorts of things. Most
VMB systems are dialed though 800 numbers. People call up the VMB system
that you have a box on, and dial in your box number and then leave you a
message. Whenever you want to check your box, you just call up, enter your
password and read your messages. Inside a VMB you can do whatever, you can
leave messages to others on the system, you can change your 'Out Going'
message, you can have guest boxes (Explained later), you can have the box
call your house when you get an Urgent message, you can do a lot of things.
Infact, on some systems you can even CALL OUT through them, so they can be
used as a code of sorts! They are cool to have.
What Type of System You Should Scan/Hack:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
You should scan/hack out Virgin Systems, this is another way of calling a
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
have the best boxes and the most options that VMB Systems can offer. I will
be talking about ASPEN System today since I know most about those.
Scanning Your 'Virgin ASPEN VMB System':
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Okay once you've found your Virgin VMB System, you start to scan. Just incase
you don't know what scanning is, that means you search for boxes that are
hackable (Explained later on). Now you dial up the system and when it picks
up and the bitch starts to talk, press the "#" key. It will then ask you for
your box number... now there are two different way the ASPEN System can be
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
System". Now lets just say this system is a 3 Digit System. Okay, when it
asks for your Box Number, enter in 999, now it will say one of three things:
[These are known as 'Greeting Names']
1. John Doe [Box owners name]
2. "Box Number 999 Is Not a Valid Box Number"
3. "Box Number 999"
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
but if it says 3, then you are lucky, now it will ask you for your password,
now you are probably saying 'Shit this is where it gets difficult'... well
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
* We will use box number 666 as an example box #
[ BN = Box Number ]
List of Default Password: Combination Result
1-BN 1666
BN+1 667
0-BN 0666
BN-0 6660
Most Common <20>į BN 666
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
use that most. Now, if you try all those Defaults and still can not get into
that Voice Mail Box, then that means that the box has been already taken, but
the owner hasn't changed his 'Generic Message', if you don't get in, you
will just have to search until you get in.
Once You Get Into a Box:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Okay, once you get your first box, *DO NOT* change anything!! That will come
later. Your first box is, as what is known as a 'Scanning Box'! What you do
with your Scanning Box is this: You enter "3" from the main commands menu,
and it will ask you for the box number. Now that command is the "Check for
Reciept" command, what it does it check Box #xxx for mail from you. This
command is very convienient for us VMB Hackers. To use that command to your
advantage, you enter in box a box number and it will say 1 of the three
'Greeting Names', like before, if it say #3, then you write down that Box
Number and hack it later. But if it says 1 or 2, then just keep scanning!
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
Now you keep scanning until you have gone all the way down to Box number 000
or whatever is the lowest box it supports. Now, once you have your list this
is when all the fun starts! Now you are ready to hack!
Hacking Out Your New Found 'Hackable' Boxes:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Okay this is the easy part. After you spent most of your time by scanning
the system you should be used to the system and how it works, that should
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
should know what the default password was for your Scanning Box. Well if the
password for your Scanning Box was just the Box Number, then *EVERY* other
hackable box should have the SAME default password. VMB Systems have only
one default password, If one box has the BN for a Default PW, the all the
others will too.
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
side, and when the bitch is talking, press the "#" key. When it asks you for
your box number, enter in the first box number on your list. When it asks for
your password, enter in the Default Password Sequence. Now if you don't get
into that box, it's not a problem, just keep going down your list. You should
get into a few. But remember, just because a box is marked 'Hackable', it
doesn't mean you will definatly get into it.
Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
whatever you please.
ASPEN Guest Boxes:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
for him, and leave you messages, but not only that, you can leave messages
to HIM! Which means, if his is in New York, and you are in California, and
neither of you have codes to call eachother, then you can leave messages thru
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
0. Main Box - Your Voice Mail Box!
1. Guest Box #1 - Can Leave & Recieve Messagez
2. Guest Box #2 - Can Leave & Recieve Messagez
3. Home Box - Can Leave & Recieve Messagez
4. Secretary Box - Can Check How Many Messagez You
Have & Recieve Messagez
Hints On Better Scanning:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
A lot of people say hacking and scanning for VMBs is too damn hard... well
that's because they are going at it all wrong, they probably read some lame
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
here is a small list of hints on better scanning and hacking:
1. Do not use a Voice Mail Box hacking/scanning program
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
2. Do not hack in random order (ei: B#999, 345, 810, etc)
Always hack in order: 999, 998, 997, 996, 995...000.
3. Try to find out if it's virgin. The newer the System,
the better.
4. If you have a phone with memory dial, change one entry
to the number of the VMB System.
5. Don't hack the System Managers box unless you really
want to.
Ideas of Things To Do With Your Extra Boxez:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Well since you can have up to 500 extra Voice Mail Boxes, you might
not know what to do with them, here are a few ideas that can help you out:
1. Give them to friends
2. Sell them to friends
3. Offer them to sysops for
for better access
4. Trade them for HSTs or
whatever
5. Use them as a Voice Verifing line (So you don't have to give out
your real voice number to BBSes when you apply!)
Well, that's it to the <20>egions <20>f <20>ucifer Hacking & Scanning Voice Mail Box
Systems Tutorial! I hope it helped you and I, along with <20>.<2E>.<2E> wish you the
best of luck with your new found hobby! And remeber if you found this text
of any help, please spread it around to help others! Also, if you think you
are any good at writing H/P, please apply to be a Member! Call the <20>.<2E>.<2E> Home
at:
Digital Hackers Network
<20>egions <20>f <20>ucifer HeadQuarters/Home
No Warez! A truely serious Hack/Phreak board
Hack, Phreak, Scanning, Phraud, Crashing disscusions
Viral Research & Development Sections (500+ Virii!)
Running AfterShock v1.20 - 2400 Baud
PH: 213-274-1333
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Call these <20>egions <20>f <20>ucifer support boards for information or application
inquiries:
Digital Hackers Network 213/274+1333 <20>.<2E>.<2E> HeadQuaters/Home
Electric Eye ][ 313/776+8928 <20>.<2E>.<2E> Distribution Site #1
Digital Information Exchange 612/356+2209 <20>.<2E>.<2E> Distribution Site #2
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
This text file is (C)Copyrite 1990 <20>.<2E>.<2E> Inc.
<20>.<2E>.<2E> is a registered trademark of DHN, All rights reserved
Any modifications to this text file is a violation of copyrite.
Digital Hackers Network 213/274+1333 -=<3D>.<2E>.<2E> Home=-
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>

View File

@@ -0,0 +1,330 @@
Hacking Telephone Answering Machines
by Doctor Pizz and Cybersperm
******************************************************************************
DISCLAIMER: The following is for informational purposes only. All information
provided is simply to point out how easy it is to access such a system. The
author accepts no responsibility for irresponsible use of this knowledge, and
it is provided solely so people can be aware of the low security of such
systems. (Now that I'm off the hook in case you do something stupid...).
******************************************************************************
It seems that lately there is very little discussion of one of the most
simple but useful and rewarding forms of electronic information gathering,
hacking the telephone answering machine. Almost everyone has one of these
wonderful devices these days, to catch important messages while they are away
from their phones, or to screen important telephone calls. Nowadays, they
typically have the added advantage of being accessible from remote telephones,
so one needs to simply call his or her answering machine, enter their secret
code, and then either retrieve new messages, or listen to anything they had
previously recorded on the incoming messages tape, or perform any of a set of
additional functions determined by which key they press on their touch tone
phone. They also typically ignore the fact that virtually anyone else can
gain access to their messages by entering the appropriate code. Hence this is
a wonderful system to gather information from anyone without their knowledge,
especially if they are technologically illiterate.
For the most part, there are two main types of "electronic password"
used by these systems. They are amazingly simple to crack, as they are
typically only 2-digit or even 1-digit numbers!!!!!! On some machines, the
code must be entered before the outgoing message is over, on others, it must
be entered after the outgoing message, and on more sophisticated models, it
can be entered at any time.
MODERN 2-DIGIT PASSCODE SYSTEMS:
These are the most common systems in use today, typically made by
Panasonic, AT&T, etc. In these systems, the code can be entered before during
or after
the beep tone. For security reasons, we recommend BEFORE the beep tone, so
your intrusions are unnoticed... We will begin by discussing how to identify
the passcode.
Now, the question of how to hack their code. Well, this is so simple,
you don't even need a computer to do it. You can just enter all 2-digit
combinations until you get the right one (usually signalled by a series of
beeps on the other end). A relatively crude way was to enter each number in
sequence 01, 02, 03, 04,...,99. This works, but may take too long to enter
all numbers within the 20-30 second window we typically have before the beep
(The best time to play arounnd, as any tones entered after the beep will be
recorded on his incoming messages tape, and could let him know something is
up...). It is also important to stop as soon as you hit the right number, as
the additional entered numbers may be interpreted by the answering machine as
codes, and cause you to delete all their messages, or record a new greeting,
etc. That is really asking for trouble, and may cause them to try and change
their password (though it's usually only possible to choose from a range of
three consecutive numbers anyway...). Still, you need to be careful not to
let them catch on, eh?
A more sophisticated and fast way to do this is to take advantage of the
fact that such machines typically do not read two numbers at a time, and
discard them, but just look for the correct sequence, reading one at a time.
In other words, you can enter all 100 possible codes with roughly 1/2 the
number of keystrokes. Just enter as follows:
0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9,etc.
By reading in one phase we get:
0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1,1 2,1 3,1 4,1 5,1 6,1 7,1 8,1 9,etc.
In the other phase we get:
0 1,0 2,0 3,0 4,0 5,0 6,0 7,0 8,0 9,1 1,2 1,3 1,4 1,5 1,6 1,7 1,8 1,etc.
So by proceeding as follows we enter the following matrix sequentially,
encompassing all possible 2 digit numbers:
0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9
1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9
2 2 3 2 4 2 5 2 6 2 7 2 8 2 9
3 3 4 3 5 3 6 3 7 3 8 3 9
4 4 5 4 6 4 7 4 8 4 9
5 5 6 5 7 5 8 5 9
6 6 7 6 8 6 9
7 7 8 7 9
8 8 9
9 0
The last zero is important, as it completes the cycle, and allows for the code
9 0, which is the only one not as yet allowed for. I must emphasize the
importance of quitting as soon as you get the correct code, and also do not
keep going after the beep, if you are on a modern 2-digit access code system.
This way, you can record the passcode for your future reference, and prevent
detection.
Now, we shall get on to the question of how to use their system, once
you've broken in. In general, it is recommended to obtain a copy of the
owners' manual for various machines, but I have summarized some of the basics
below.
PANASONIC
Here are the codes for a Panasonic Easa-phone KX-T1450. The KX-T2420 is
identical without Room Monitor function In this case, strange things happen
when you enter 5:
1 = Back Space (Rewind the OGM tape)
2 = Skip Forward (Fast forward the OGM tape)
3 = Reset (Go back to the beginning of the OGM tape. MAY CAUSE ERASURE!!!)
4 = Memory Playback (Listen to new messages)
5 = Room Monitor (!!!! Listen to what is going on in the room NOW !!!!)
(This is only available on some models... But, try it...)
7 = OGM-REC (Record a new greeting!!!)
9 = OGM-STOP (Stop recording the new greeting)
* = OGM Skip (Don't Listen to the OGM)
0 = Turn off the machine !!!!!
To set to the answer mode remotely,
1. Dial the phone number
2. Wait 15 rings and hang up
To turn off the unit remotely (!!),
1. Dial the phone number
2. Push the code number, wait for the beep, enter 0, and hang up. Panasonic answering machines also respond to the user with a series of
codes which I will now outline. If you hear something different, you may not
be on a Panasonic system.
1 long beep : This is the "beep" after which people can leave their messages.
Also, this is sounded when the correct passcode is entered from
a remote telephone. (Same sound- Hint for software developpers)
It sounds when the tape has fully rewound, and after each
message is played back in entirety.
3 short bps : This sounds after the last message has been played back.
2 short bps : (10 seconds later) You are then being recorded - marker message
6 short bps : End of the incoming message tpe
6 short bps : (Quickly) Tape Broken (either incoming or outgoing)
Also, after entering the correct code, and after the one long beep, you will
hear n additional short beeps, where n is the number of new messages since the
last time the messages were retrieved. Remember, you can listen to earlier
ones on the same tape, by additionally backspacing from the first new message.
Anyway, that is a basic summary of the Panasonic answering machine system for
this machine. Many machines unfortunately do not have the Room monitor
function, so you can not see if you left your TV on, or anything like that...
Also, not all systems are identical, but on Panasonic machines, the numbers 1-
4 are the same, so this is the most important thing for you to remember
anyway...
AT&T
On AT&T machines, like the Answering System 1304, the passcode is again a 2-
digit number enterable before, during, or after the beep. Follow the same
guidelines as above.
After you enter the correct code on these machines, the system will
automatically begin to play back new messages. This is one key way to
distinguish these machines from the Panasonic ones discussed above.
To summarize the key functions for the AT&T system, look below:
2 Rewind tape (tape rewinds for as long as this key is depressed)
3 3 Clear messages (reset the tape to the beginning.)
5 Fast Forward (tape ffwds for as long as this key is depressed)
7 Replay messages from the beginning
8 8 Turn off the answering machine
* Record a memo (After listening to messages) OR
Skip the greeting (w/o entering code)
0 Turn on the machine (after hearing two beeps)
# Pause (for 5-7 seconds)
Basically this system is less sophisticated than the Panasonic. You cannot
change the OGM remotely (Damn!). As seen above, the codes are also quite
different, but fortunately they are easily distinguished by how they answer
after the security code is entered. The AT&T plays the messages, while the
Panasonic just beeps to tell you how many new messages are waiting. Here
also, the rewind and fast forward functions operate for the length of time you
depress the 2 and 5 keys respectively. On the Panasonic, they reewind or fast
forward for 15 seconds. Also, this system has a pause feature. By entering
the # sign, you can pause for a few seconds while listening to a message. One
extra safety (from your perspective...) feature is that on this system you
cannot erase messages until they have all played back, so you have less risk
of fucking up someone's system if it is an AT&T. You cannot change his
greeting, and it is difficult to accidentally erase his messages. If you wish
to do so, however, you must hit the 3 key twice after listening to the
messages in their entirety. To record a memo (why would you want to do
this???), you can press the * key after you hear 5 beeps (after listening to
the messages). Then begin to record. Also, the * key can be used before the
message is finished to skip listening to the OGM (useful for long distance
callers who are actually paying for the calls...) without the need for
entering a security code. To turn on the system from remote points, you need
to let it ring ten times, and after it answers with 2 "beeps", hit the 0 key.
It will subsequently be on. Similarly to turn it off, just enter 88. If the
machine answers the phone with no greeting, and just 2 beeps, it means the
tape is full. You can now enter the security code (without risk of them
recording the BEEPS!!!) and listen away for a long time!!! Basically, this
sums up the properties of the two most common systems I've encountered of the
2-digit passcode variety. SINGLE DIGIT PASSCODE MACHINES:
On some old model Panasonic and Phone Mate systems, the secret entry
passcode is only a one digit number(!!!). On these primitive systems, one
merely enters the correct number, during the message, and playback begins.
The other codes are simple to derive, and just for the sake of making this
hobby a sport, I will not give details for these systems. It is easy enough
to figure them out, and on these systems, it is hard to screw things up, as
there is little you can do anyway.
APPLICATIONS:
This can be a rewarding adventure if you decide to follow those
instructions (though far be it from me to suggest you to do this...). I will
point out some of the potentially entertaining, useful, and/or informative
applications of this technology.
As the true weirdos that we are, we shall begin with what we consider
the truly entertaining applications... If you have ever read the Village
Voice, Screw or other such newspaper, you will notice a large number of
advertisements for "unlicensed massage parlors", "Oriental relaxation spas",
"Escort services", etc. Call some of those numbers, preferrably at off-duty
hours (6-9 AM??) and try to hack their answering machine codes, listen to
their messages, and let the fun begin. You can hear lots of perverts, and
lowlifes making appointments for "services" about which they are sometimes
graphic. Also, they often leave telephone and credit card numbers (What
fun!!!). In case they are married, think of the blackmail potential...
Further, these "adult entertainment companies" also often run help
wanted ads in the Village Voice, and other such publications. Call these, and
you will get a plethora of phone numbers for nubile young women who might
believe you are the proprietor of the establishment in question. You might be
able to con some "free samples" as a sort of "job interview"... (hehehe)
Especially given the illegal activity they desire to become involved in, they
will be in no position to complain when they find out you are not for real...
Also, this way, the girls are often not so jaded as the old pros... They will
be trying to impress you if you get my drift, so you'll "hire" them.
Other similar companies can be hacked to get similar entertaining and
enjoyable results. In many cases, the outcomes can be QUITE LUCRATIVE in one
way or another... I do not advocate that you do these things, but I just want
to point out what COULD be done...
Let us move on to the informative espionnage type of application of this
technology. One could very easily use this technology to listen to the
messages of friends, and see what they are up to. If you are trying to call
your buddy Evan, and he isn't home, perhaps you can find out where he is by
going through some of his old answering messages. Say, Eric called him a
couple of hours ago and suggested that Evan come over to his place for some
beers. Well, you could then call Eric and voila, you may connect with Evan.
Now, let us assume you have a girlfriend, and you suspect she might be
cheating on you, yet you do not wish to confront her about it without any
evidence, or certainty of her cheating. Well, her new beau probably thinks
her answering machine is secure, and calls leaving messages about their
upcoming dates, or various discussions of their relationship. If you can hack
her machine {actually, you might even look at the bottom (where the passcode
is usually printed...) to save time and energy.} you will be afforded with a
plethora of potentially incriminating evidence. Hehehe.
A similar application can be when you have a new love interest. Suppose
there is some woman you are interested in, but you aren't sure if she is
available. A little phone answering machine surveillance can provide all of
the answers, and then some... In case she asks her friends about you, you'll
know everything she does. Also, you will learn details about her life, and
schedule, the better to run into her "accidentally", or strike up a
conversation about "common" interests...
Now, if you know someone in the same profession, say musicians, and you
call his answering machine, and hear someone offering him a gig. You could
call that person back, and accept the gig in your name, saying the originally
called musician was unavailable, but suggested that you call. Then be sure to
erase the original message on your buddy's machine. He'll never be the wiser,
and you'll get more work. Though he may wonder why he isn't getting much work
anymore...
Millions of applications exist, and if you have any additional
suggestions, please leave them with us. We can be reached on several BBS'es,
in 212, 718, and 914 area codes. Thanks. Also, if you have information on
other answering machine systems, please pass it along...
Again, in closing, we reiterate that the authors take no responsibility
for the misuse of this information. The ideas for applications were presented
for informational and entertainment purposes only, and we do not encourage you
to try any of the above suggestions. Remember, listening to the pass-code
protected messages of others constitutes an invasion of privacy, and may be in
violation of state and federal laws.
******************************************************************************
ANOTHER FINE PIZZ-SPERM T-FILE...
Please upload this file to other fine BBS'es, and give credit to the original
authors, Doctor Pizz and Cybersperm, of the TUBA crew.
******************************************************************************
***************************************************************
* *
* Another Fine File From the libraries of the TUBA crew. *
* *
***************************************************************
____ _______ *
/ \ ___ ___ ____ ___ ___ / / ___ ___
/ // // / / // / /______/ / / /
/ // // / / //-< / / / /
/_____//__//__ / /__// / / / /__ /__
-N-
CCCC Y Y BBB EEEE RRR SSSS PPP EEEE RRR M M
C Y Y B B E R R S P P E R R MM MM
C Y BBB EEE RRR SSSS PPP EEE RRR M M M
C Y B B E R R S P E R R M M M
CCCC Y BBB EEEE R R SSSS P EEEE R R M M M


View File

@@ -0,0 +1,103 @@
3RD PARTY FRAUD & VOICE MAIL SYSTEMS
============================================================================
3rd Party Dialing was first brought to my attention when it was listed
on my telephone bill. I was billed by some person(s) without my authorization.
This happened about 3 times on the same bill, and all of the times I got the
charges dropped.
A few weeks later, after paging through the telephone book for downtown
prefixes, I noticed information on 3rd Party Calling, which included:
HOW TO PLACE 0+ CALLS
Third-Number Calls
1. Dial "0" + Area Code (if needed) + telephone number.
2. If you hear a tone, ignore it, and a billing operator will come
on the line.
3. Tell the operator you are placing a third number billed called.
4. Give the Area Code and telephone number you with the charges billed to.
5. The operator will call that number to verify acceptance of the charges
on calls from coin pay phones. No verification on calls from
non-coin pay phones.
The line that caught my eye was like #5. This line pointed out that calls
from pay phones had to be verified, while non pay phones needed no
verification.
With experience, I found out that sometimes there is nothing a person can do
about unauthorized 3rd Party Calls billed to a another person's number. A lot
of the times, the operator you call to complain to will simply tell you there's
nothing they can do.
With this in mind, I realized that you could bill a call to anybody's number
and get away with it, and no charges directed to you. Although, as many of you
know by now...this not safe. For one, you are directing attention to yourself
as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
Party Call to...that person has your number and where you called. Bell can
also use that information to take action if they feel it necessary.
One alternative would be to complete a 3rd Party Billed Call from a pay
phone. This however brings up a question. Who is going to accept the charges
if you don't want to pay for it in any way?
Here is what I came up with for 3rd Party Calling Fraud:
First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
PhoneMail type VMS to handle the call. The reason you need these types of
VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
have to enter a process extension number such as 8509. These types of VMS's
bring you directly to the box.
You don't know what Voice Mail Systems are? Look for a file. But, here's a
layman's description of VMS's. You can say that VMS's are distance answering
services. They are usually set up in other prefixes you can dial in/directly
on to. They include instructions on how to use them, and have system
passwords. In respect, they are electronic mail devices...only they use voice
communications instead. You can find these by scanning, if you have one local.
Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
In between the HELLO and YEAH SURE, the billing operator will say something
like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
Now go to a pay phone and dial any number anywhere you want, in this
format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
and wait for an operator to come on. The operator will announce her/his-self
as a billing operator and ask you how he/she can help you on billing the call.
Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
name if you wish, but it's not necessary. No real names of course also. The
operator will call the VMS and he/she will hear the previous recording of you
saying "HELLO" etc.
After the operator hears an affirmative from the VMS...the operator will say
thank you, then put the call through. The only person that gets billed for
the call is the business/person that owns the VMS that you used by hacking the
default password.
I've found out that you can dial overseas, and anywhere in the United States
this way, with no problems or bad connections. If you have a portable computer
with an acoustic couple...you can go online. It would be suggested to do this
in a car, so as not to draw attention during the day. I've tried to set up a
conference by the 800 Conference Operator and requesting to set up a
conference. You have to give her the person's numbers and names you want to
conference with...and the number you want to conference billed to. The
operator will verify this if you are at a pay phone. I have figured out what
the Conference Operator asked the 3rd Party as of yet...to time the responses
preset on the VMS, but if anyone can, it would prove to be very useful.
Another technique might be to bill 976's to your VMS if you into that.
Again, you need to attempt to time the perfect responses to the operator's
questions to the 3rd Party.
*A Word of Warning*: In most cases, the Operator you handle the 3rd party
call with will stay on the line. So it's good to have a conversation with
yourself on the VMS for about 30 seconds after connection if you are making a
collect call to the VMS.


View File

@@ -0,0 +1,23 @@
Toll-Free Answering Services
Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
American Discount Dialing System 800-227-1617 (CA 800-852 7777)(CA800-772-3545)
Dialog Marketing 800-447-4700 (IL 800-322-4400)
Direct Marketing Services Inc. 800-223-1944
Executive Locator 800-323-6556
H Q Co 800-227-3004 (800-652-1848)
National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
National Data Corperation 800-257-9611
National Switchboard 800-528-6052
Nice-National Instant Consumer Exchange 800-453-9000
Operator 800 800-448-4511 (NY 800-962-1480)
Ring America 800-621-5199
Share-a-Wats Inc. 800-854-2003
Skycall 800-631-5488 (NJ 800-352-4951)
Team Telephone 800-228-5000
Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
Teletrak Response Center 800-328-5257
USA 800 800-821-2280 (MO 800-892-7655)

View File

@@ -0,0 +1,62 @@
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
<EFBFBD>UNTOUCHABLES! <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>[File Name]: UNT-ATT1.ZIP <20> Difficulty <20>
<EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>[Writer] : Aoflex <20> <20>
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>[Packager] : Karma Sutra <20> [ ] 0 <20>
<EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20> [X] 1 <20>
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20>[Description]: Hacking <20> [ ] 2 <20>
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>At&t Answering Machines. <20> [ ] 3 <20>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20> [ ] 4 <20>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> 1996! <20>[Date]: 06/18/96 <20> [ ] 5 <20>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>-<2D><><EFBFBD><EFBFBD><EFBFBD>
1. Dial the telephone that is being answered by an AT&T Answering Machine.
2. When the machine answers, quickly enter the following:
1234567898765432135792468642973147
4193366994488552277539596372582838
491817161511026203040506070809001
3. The messages should start playing after this.
4. Here is a short list of common AT&T Answering Machine comands:
Message Commands:
-----------------
Review Messages: 7
Locate New Messages: 6
Stop: #
Rewind Messages: 2
Clear Messages: 3, 3
Announcement Commands:
---------------------
Record New Announcement: 4, *
Play Current Announcement: 4, 1
System Commands:
----------------
Turn System On: 0
Turn System Off: 8, 8
Please Note: The easiest way to play the numbers to the answering
machine would be program them in your phone's memory dialing
setup.
________ _ _
/|/| | __ ____ _ _ ____ _ __ ___ _ ____/ ________ _ _ . .
/| | | |/ |/| _| \/| | |/ __\|| |/ \| \| || ___| |__
|| | | | | || | || | | /|| | | /| || __||__ |
|| \| | | | || | | \| | \_|_|| | || | \| ||_ \____| |
|/\____|_|___||_|\__/\____|\____\|_|_||_|___/|____|_______|
\/___/_//__//_/\/_/\/___/\/____/_/_//_//__//____//__/___/
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
ARRESTED DEVELOPMENT II - UNT WORLD HEADQUARTERS - 410-720-5305
BLACK OPIUM - UNT CENTERAL HQ - 701-523-5909
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

View File

@@ -0,0 +1,124 @@
R e n e g a d e L e g i o n
T e c h n i c a l R e p o r t s
Technical Report #3
....
........
.........
... ....
... ....
.....
....
....
... ...
... ...
.. ...
...
February 1991
RL HQ - 617.623.7151
VMB Hacking
-----------
Written By: The Knight
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
a great deal of 'hidden info' that isn't common sense. But, If you are out
there trying to hack a box and can't, follow through the VERY logical and
simple steps and make sure they are matching up.
Step 1:
Finding a VMB System
There are many ways you can find a VMB system, for instance, on a BBS when
someone says 'Here are some systems' usually thats what they're referring
to. Also, Try setting up your scanner and listening for 'Welcome to XX
company, Enter extension #' or something similar to that. Then you have
found a VMB system.
Step 2:
Finding a Box
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
You must make sure that no one is using it. There are several ways to do
this. One EASY way is when you hack it, check the date on the latest
messages, if they are OVER a month old, then I'd say your safe to use them.
Also, watch in case there is just like _2_ messages in there from the last
4 months that those messages could be messages sent to ALL the boxes, see if
they sound personal. If they DON'T, then grab the box.
Let's say there's a box you REALLY want bad and someone's using it regularly,
try doing this: Go in twice a day (make SURE you DON'T change the greeting
etc.) and erase all the messages. He will complain and will eventually move
out of the box. Then there is a good chance of you having that box. It's
happned to me.
Step 3:
Hacking the VMB
This is the most SIMPLE part of all. MY general method is as follows:
Find a box, let's say box 260. It's empty and I want it (obviously).
First, try passcode '000', if that doesn't work, try passcode '260',
just make very general guesses that's ALL. Some of the MOST Common passcodes
are:
3 digit boxes:
000
123
111
222
333
444
555
666
777
888
999
box # (say it's box 260, passcode: 260)
321
4 digit boxes:
1234
0000
1111
2222
3333
4444
5555
6666
7777
8888
9999
box # (Say its box 1200, try passcode: 1200)
The Key: REALLY try ALL of those. I knew one system with a passcode of
'5555' and NO ONE could hack it. And I did. So don't give up.
UNLESS you've exhausted all of those possibilities. Then forget
it.
That's it really. The most simple thing to do. Just remember not to
give up before you should and also try 3 digit passcodes on 4 digit
boxes. Also, once you get in for added security, a lot of these boxes
allow more digits for passcodes, so make a 5 digit passcode. Or if you
thing its worth it, try like '00000' so that's really about all.
Have fun and don't stop.

View File

@@ -0,0 +1,82 @@
_____ __ __ ____ _ _ ______ ____ __ __
| __ \ | | | | / _ | | \ | | |__ __| / __ | \ / |
| | \ | ||___|| | / | | | \ | | || | / \ | | \ / |
| | | | | ___ | | | | | | \| | || || || | |\ \/ /| |
| |__/ | || || | \_| | | |\ | || | \__/ | | | \ / | |
| ___/ |__| |__| \____| |_| \__| |__| \____/ |_| \/ |_|
| |
| | N E T W O R K S P R O D U C T I O N
|_|
Voice Mail Made Easy
by HAGAR
CoSysop and PHREAK Sigop, Phantom Networks
Voice Mail Boxes, yes, VMB's. They seem so trivial to the advanced phreak yet
most beginners find them very fascinating. They often make a habit of begging
other people for them. A real pain in the ass.
I am not a studly VMB hacker. VMB's should not encompass your entire phreak
activities, as they really can be a waste of time. This article is just the
basiic guidelines for attaining a VMB.
[1] Find a system. The easiest way to do this is to just find
a codeline.
[2] Get in good with the codeline operator. If you continuously
post shit he will get to like you..
[3] Ask him where you can find empty boxes on the system. If he
readily complies ask if he might know the system default (more
on this later)
[4] Scan for an empty box. You will know that you have hit
an empty when it says "Box XXXX, Please leave your message
after the tone.." You now have your empty box.
[5] Hack the box. In order to do this you will need to find the
point where it says "Enter your password". On some systems you
will have to enter pound (#) as soon as you log in. It will
then ask for your box number (the empty one you just scanned)
and then your password. Try defaults (again, see below). Some
systems will require you to enter the box by calling up the
box in a regular manner, and during the greeting hit star (*).
You will then be asked for your password.
[Defaults]
Some systems have a certain password that is used for all empty boxes. Many
times this password will be "1234" or the box number. Here is where you get
creative. The password COULD be up to 14 digits, but will usually only be
four. Once you find a password that works it will probably be applicable to
every empty box on the system..
Here is also some good news.. on some systems empty boxes will have NO
password.
This is just a basic overrview... a crash course. For more information check
out the Phrack World News article on this subject, you will get a bit of a
background on how these damn things work.
Produced February 8, 1990. Leave me comments on my Direct Dial VMB at
714/665-5190
Special thanks to:
Huntington Hangout BBS (Hobbes)
Blackened
Misfit
Go ahead and upload this file, just make sure that all of the original credits
are intact.


View File

@@ -0,0 +1,309 @@
On the Essentials of Voice Mail Hacking
by the Kryptic Night
-S M C-
This file will describe several simple ways for hacking out
your own voice mail box. It is by no means a comprehensive
document on the subject, but rather, is meant to help those
beginning in the field. I myself have several voice mail boxes,
and have hacked on various systems. I will describe several of
the methods I have used, and try to explain the format for them.
An overview of several common commands:
# (Pound) - Used either to access the password prompt or a
dialing list.
* (Star) - This is either used to abort the current menu, or
to amplify the volume.
0 (Duh) - Used either to access the password prompt, or to chat
with our friend, the operator.
9 - This is occasionally used to hang up.
The First Step
Type of systems to look for
First of all you need a system to hack at. Unless you are a
pre-teenage new kid fan, answering machines usually aren't that
exciting.
Try to look for an 800 voice mail system. I know I don't like
having to pull out codes every time I want to call a VMB, only to
find that their is nothing there worth my while, and I'm sure
other people feel the same. This will not only provide yourself
with a free method for calling your box, but will also allow you
to call it from a payphone, and you can call it anytime, rather
than when you just have a code handy.
Another great advantage is using a system that is up for all
24 hours. This isn't a necessity, but is a great convenience. For
instance, imagine that you just gave out your number to someone
who be beneficial to your VMB as a good source of codes or
general info, but he has better things to do at night than call
VMB systems, with an afterhours VMB, you cut him off, is that what
you want? I'd hope not.
The Second Step
Finding out how many digits the boxes are
Ok, so you now have a system to play with. Let's see if the
system is worth your time, and find out the basics of it.
Now you have to try to ascertain how many digits the box numbers
are, this may take a while if it requires you to press a '#'
(pound) sign after the box number, as these systems usually do not
tell you whether you entered the correct amount of digits or not.
For now, I'd recommend you just ignore these, as they would
require extra work. Try entering any 3 digits, you will in most
cases get an 'incorrect box number' message if the system is only
a 3 digit system. However, if it just hangs, does nothing, then
the odds are it's a four digit system. Try typing 4 digits now,
and if you still get no message, then it's either one of two
things. One, you may need to press a '#' (pound) sign after the
number, or in some cases, before it. Or two, the system is longer
than 4 digits, in which case you should ignore it for now. Some
systems contain a built-in time delay that will tell you a message
if you haven't entered the correct box in a given time, these
should also be avoided for now, as they will say something even if
you only type one digit, or if you type 100 digits.
The Third Step
Finding where the boxes are located
Now comes a rather tedious chore, finding out where on the
system the boxes are located. Unless it is a professional voice
mail company, they will probably have under 100-200 mail boxes in
use at any one time. These boxes may be found on the system in any
of two forms, clumped or scattered. Clumped boxes are when their
are several boxes all in one area of the system. Usually this is
the only area on the system that boxes are located, but
occasionally some systems have scattered clumps all around the
system. Scattered boxes occur when the boxes seem to have no
apparent order for their location, these are more difficult to
find empty boxes on, but not impossible.
Now you need to start looking for the clumps (We will start
with these, as they are generally easier to locate). Start
searching from 100, for a three digit system, or 1000, for a 4
digit system. Increment your searching by 25-50 for a three digit
system, and 100-500 on a four digit system. This will undoubtedly
be inaccurate, but it will allow you a better chance of finding
the clumps than random guessing. You may get several messages
while looking for these, anything from 'Boxes cannot start with
an x' to 'Incorrect box number' Generally these should be self-
explanatory, and you should be able to figure out how to respond
on your own. You are looking for any box with a message in it, any
message. When you find a used box, mark down the number, and scan
around that box in increments of 5 or so. If you find any more,
mark down that location as a clump. Remember however, that if you
get an incorrect box number message, that doesn't mean that that
area isn't a clump, just that that box is empty. This will provide
added inaccuracy to the job, but it's a fact that can't be
overcome by anything other than monotonous scanning by 1.
Try to make this fun, invite your friends over, have a phone
party....they can be fun and profitable if you know what you are
looking for.
As for scattered boxes, I don't have much to say, they aren't
the easiest systems to play with, as you can't tell with any
certainty where on the system a box will be, and if it's a four
digit system, that's 10,000 possible boxes...Not an encouraging
number. If you are on a system with scattered boxes, just ignore
this section and read how to find empty boxes next.
The Fourth Step
The Miraculous Void
Once you've found the system, your real job has just begun.
You now need to find an empty box. Although it is possible to hack
out used boxes, this is usually undesirable, since used boxes tend
to have people who use them (makes sense doesn't it...I thought so
too) When some complaining customer calls and gets a message such
as "To call cosmos and fuck up the entire region, dial...blah blah
blah...remember to slaughter a cat for Halloween...", they will
most likely be a bit suspicious and will call the business
bitching about how they are so unprofessional, and that their
employees really should clean up their mouths...blah blah, you
know, the usual line of bullshit. If that doesn't happen, then the
person who owns the box will check it out, and if that happens,
you can be assured that the box won't last.
Now is the time to pull out that list of clumps you made.
Start searching around these boxes in increments of 1, yes one,
this may take a while...but if you've come this far...you
obviously have too much free time.
What you are looking for is any box that asks you to leave a
message at the tone, and doesn't play a prerecorded message to you
before that. These are relatively easy to recognize, and you
shouldn't have any problems with it. Just look for the anomaly.
The Fifth Step
On the Art of Hacking
This is where the excitement begins, or the agony ends. By
now you should have found an empty box or two. If you haven't,
start over again with a different system. There are several ways
to access the password prompt. Usually most systems tell you right
up front at the main menu how to do it, but since some do not,
I'll explain the most common ways that I know of.
The magical pound sign is the most common way of accessing
the password prompt. From the main menu you should press the #
sign, and then the box number. It will then ask for your security
password, or some other such inane jargon. The other common way of
accessing the prompt is to dial the box number, and press 0 while
the message is playing, or sometime after you dial the box number.
You will then be asked to enter your security password, or
whatever they choose to call it.
A security password is usually, but not always, the same
length as the box number. The most common default password for
voice mail systems is a string of zero's, 000 for three digit
systems and 0000 for four digit systems. Other common passwords
are: The box number, IE - box 2045 would have a password of 2045,
box of 0981 (four digit system) would have a password of 0981, and
a three digit system might have something like 521 for a box
number of 521, a string of some common digits, such as 1111,
2222, 3333, ainsi du suite, the year, or 1234. By no means are
these the only default passwords, but these are the ones I've
seen, and have heard about. You should be able to catch a
significant number of empty boxes with these.
The Sixth Step
You're in, now what
So you think you're cool, right? You've found a box or two
that you can get into. Well, congrats, from here on out everything
is cake. This section and following sections won't tell you too
much that you shouldn't be able to figure out with
experimentation, but I'm trying to be thorough...
You've gotten past the password, and are at a prompt that
asks you to 'send a message to another box' 'read new mail', or
what not. If their are messages in the box, you should read them
and pay attention to the date stamp if it's there. If the message
is only a day or so old, then you might want to make sure you have
other boxes to fall back on. Besides that, just enjoy the thrill
of listening to other people's private mail...I once got a message
from some guy's mistress...Funnier than hell. All the commands for
these options should be readily apparent, and told to you when you
get in.
To configure your system with your message, name, and
password you will need to enter the 'Setup menu' or whatever it is
called. Sometimes this function won't be told to you, but that's
not really a problem, their are only 12 digits to try. Most
systems default to an 8 or a 3. I'll assume you can find it on
your own...
You've gotten into the config menu by now, and you are
confronted with a multitude of options. First you should ALWAYS
change your password to something that you feel is unhackable,
your phone number is not a good choice. Next you should enter your
own personal message. Try to figure out if the message is time
limited to 30 seconds or a minute, a lot of systems do that. These
systems are usually only good for personal message boxes, and not
code lines. Next, change your name if the system allows you to do
that...I don't think you want to be called Edwina Lipshitz when
someone tries to leave you a message.
Their may be other functions, such as message forwarding,
call placements, group messages, message waiting status, etc.
Generally these should be ignored, unless you're adventurous and
willing to risk your box with something like having the system
call you when you get a message.
So, you've done everything, and set up a cool box, eh? Great,
now just for fun, go back to the main system menu, and try to
enter your box as a user would. Type to box number and listen to
your message, if it's satasfactory...You've done it, you now have
a brand new box you can tell your friends.
The Seventh Step
What to do with a VMB
Just for kicks, you might want to figure out what to do with
a VMB once you have it. I'll describe two of these options, their
are infinity more to the imaginative.
Code lines: These are quite possibly the best thing you can
ever have if you are interested in the underground scene. If it is
well advertised, and you post all the info you get, you will have
a popular box. With a popular box, you'll get a vast amount of
information that you wouldn't find on most boards, such as cosmos
dialups, telenet accounts, codes, and other such info. These type
of boxes can get you into trouble quite quickly if the gestapo
finds out about it, as they are a bit more annoyed with someone
who posts all their private information, over someone who just
asks to leave a message at the prompt. But when you live the life
you need to, the risks are not a factor.
Personal boxes are also great for several reasons. You can
post your VMB to people who need to get in touch with you, even
when they don't have a code. You can also use them in the fine
art of carding. When the salesperson asks for your phone number,
tell 'em something like "It's being fixed, but you can call my
voice mail system at XXX-XXX-XXXX." This will make them a lot less
suspicious then if you give them a bad phone number. Of course you
would want to change the box message to that of the person whose
card you used, but that's obvious.
The Eighth Step
How to keep your VMB safe and sound
Once you've gone through all the trouble of hacking out a
VMB, the last thing you want is for it to go bad the next week,
their is little in this more infuriating then spending a lot of
time getting a box, to find it go dead the next day.
Several ways to keep your box safe include...
NEVER hack out more than 1 or 2 boxes at ANY time. If you
need another VMB be kind to yourself, do it on another system.
Their have been too many busts of people who get greedy.
DON'T allow other people to hack on your system. Threats or
warnings will sometimes be effective, threaten them with things
such as ruining their credit ratings with TRW, sending a few
thousand dildo's to their mother, care of them, or whatever...be
imaginative. Or you can offer to hack out a box for them somewhere
else. This may seem like a bitch to do, but it's worth your time
if the person is an asshole.
DON'T post your VMB on lame systems, or on systems where
their are a large amount of people who dislike you. These idiots
usually have less of a life than you, and are not against spending
days trying to hack out your password. Since you probably can't
kill them upfront, just make sure they don't get your number.
The Conclusion
The Usual Bullshit
This file was researched are written by the Kryptic Night. It
was produced as the first in a series of quality SMC text files
released for the private public. In no way do I care whether you
get busted or not, and accept no responsibility for corrupting
your young minds. Thanx go out to the members of SMC, Scooter, and
everyone else who is interested in freedom of speech.
Information is the most powerful weapon one can possess
against the masses.
|
| \
| /\/\ / <20>\ <20><><EFBFBD>
| / \ / <20> \ A <20> A
| / |/| / / \ <20> / <20> /
|/ | < \ <20>/ <20>/ U L T
|\ RYPTIC / | \ \ / <20>\
| \ / | \ <20> \
|\ | | \
| \ |
| \|IGHT
/ `
- Servants of the Mushroom Cloud -
Data Kult, Kryptic Night, Lord Logics, Nacht Habicht,
Shadow Walker, the Scorpion

View File

@@ -0,0 +1,126 @@
R e n e g a d e L e g i o n
T e c h n i c a l R e p o r t s
Technical Report #3
....
........
.........
... ....
... ....
.....
....
....
... ...
... ...
.. ...
...
February 1991
RL HQ - 617.oOo.oOOo
VMB Hacking
-----------
Written By: The Knight
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
a great deal of 'hidden info' that isn't common sense. But, If you are out
there trying to hack a box and can't, follow through the VERY logical and
simple steps and make sure they are matching up.
Step 1:
Finding a VMB System
There are many ways you can find a VMB system, for instance, on a BBS when
someone says 'Here are some systems' usually thats what they're referring
to. Also, Try setting up your scanner and listening for 'Welcome to XX
company, Enter extension #' or something similar to that. Then you have
found a VMB system.
Step 2:
Finding a Box
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
You must make sure that no one is using it. There are several ways to do
this. One EASY way is when you hack it, check the date on the latest
messages, if they are OVER a month old, then I'd say your safe to use them.
Also, watch in case there is just like _2_ messages in there from the last
4 months that those messages could be messages sent to ALL the boxes, see if
they sound personal. If they DON'T, then grab the box.
Let's say there's a box you REALLY want bad and someone's using it regularly,
try doing this: Go in twice a day (make SURE you DON'T change the greeting
etc.) and erase all the messages. He will complain and will eventually move
out of the box. Then there is a good chance of you having that box. It's
happned to me.
Step 3:
Hacking the VMB
This is the most SIMPLE part of all. MY general method is as follows:
Find a box, let's say box 260. It's empty and I want it (obviously).
First, try passcode '000', if that doesn't work, try passcode '260',
just make very general guesses that's ALL. Some of the MOST Common passcodes
are:
3 digit boxes:
000
123
111
222
333
444
555
666
777
888
999
box # (say it's box 260, passcode: 260)
321
4 digit boxes:
1234
0000
1111
2222
3333
4444
5555
6666
7777
8888
9999
box # (Say its box 1200, try passcode: 1200)
The Key: REALLY try ALL of those. I knew one system with a passcode of
'5555' and NO ONE could hack it. And I did. So don't give up.
UNLESS you've exhausted all of those possibilities. Then forget
it.
That's it really. The most simple thing to do. Just remember not to
give up before you should and also try 3 digit passcodes on 4 digit
boxes. Also, once you get in for added security, a lot of these boxes
allow more digits for passcodes, so make a 5 digit passcode. Or if you
thing its worth it, try like '00000' so that's really about all.
Have fun and don't stop.

View File

@@ -0,0 +1,127 @@
R e n e g a d e L e g i o n
* * T e c h n i c a l R e p o r t s * *
* R * * L *
* *
Eastern Western
....
Net Runner ........ Overdose
The Knight ......... Sirus
Kingpin ... .... Snuggle
Highlander ... ....
Nemesis .....
Rogue .... Canadien
Zardoz ....
Cursor ... ...
The Gypsy ... ... Blackheart
Iceburg .. ...
White Knight ...
Presents
Eastern RL HQ - 617-XXX-XXXX
Canadien HQ - 902-XXX-XXXX
VMB Hacking
-----------
Written By: The Knight
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
a great deal of 'hidden info' that isn't common sense. But, If you are out
there trying to hack a box and can't, follow through the VERY logical and
simple steps and make sure they are matching up.
Step 1:
Finding a VMB System
There are many ways you can find a VMB system, for instance, on a BBS when
someone says 'Here are some systems' usually thats what they're referring
to. Also, Try setting up your scanner and listening for 'Welcome to XX
company, Enter extension #' or something similar to that. Then you have
found a VMB system.
Step 2:
Finding a Box
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
You must make sure that no one is using it. There are several ways to do
this. One EASY way is when you hack it, check the date on the latest
messages, if they are OVER a month old, then I'd say your safe to use them.
Also, watch in case there is just like _2_ messages in there from the last
4 months that those messages could be messages sent to ALL the boxes, see if
they sound personal. If they DON'T, then grab the box.
Let's say there's a box you REALLY want bad and someone's using it regularly,
try doing this: Go in twice a day (make SURE you DON'T change the greeting
etc.) and erase all the messages. He will complain and will eventually move
out of the box. Then there is a good chance of you having that box. It's
happned to me.
Step 3:
Hacking the VMB
This is the most SIMPLE part of all. MY general method is as follows:
Find a box, let's say box 260. It's empty and I want it (obviously).
First, try passcode '000', if that doesn't work, try passcode '260',
just make very general guesses that's ALL. Some of the MOST Common passcodes
are:
3 digit boxes:
000
123
111
222
333
444
555
666
777
888
999
box # (say it's box 260, passcode: 260)
321
4 digit boxes:
1234
0000
1111
2222
3333
4444
5555
6666
7777
8888
9999
box # (Say its box 1200, try passcode: 1200)
The Key: REALLY try ALL of those. I knew one system with a passcode of
'5555' and NO ONE could hack it. And I did. So don't give up.
UNLESS you've exhausted all of those possibilities. Then forget
it.
That's it really. The most simple thing to do. Just remember not to
give up before you should and also try 3 digit passcodes on 4 digit
boxes. Also, once you get in for added security, a lot of these boxes
allow more digits for passcodes, so make a 5 digit passcode. Or if you
thing its worth it, try like '00000' so that's really about all.
Have fun and don't stop.
-- The Knight, Sysop Eastern RL HQ BBS


View File

@@ -0,0 +1,59 @@

+------------------------+
| A.C.E. Presents |
| |
| Zod's VMB Hacker Dox |
+------------------------+
Dox by Zod
I wrote this program because of the amount of time and effort that is
needed to hack out a VMB by hand manually. This program is not totally auto-
mated because the computer has no way of knowing if it got the correct PW or
not, but it will certainly speed up the process of hacking out a VMB and make
it much easier.
How To Use It
-------------
Using VMB Hacker is very easy. Just load it up and answer all the questions.
First, (obviosly) enter the VMB's number. Then, enter the numbers and signs
that VMB Hacker should dial before it dials the security code (such as *, #
or box number, etc.) Next, enter the code that VMB Hacker should start hacking
at. VMB Hacker can either go down or up. Next, enter the PW length so it knows
how many 0's to add before the number (PW length can be 3, 4, 5, or 6... Maybe
next version will be able to do longer ones). Next, enter either 1 to hack up
or -1 to go down. In the next version, I may add random hacking, if and when
VMBs start tracing (who knows). Next, enter the comport that your modem is in.
Next, enter the amount of attempts that VMB Hacker should make before hanging
up, calling the VMB back and trying some more, or just 0 if the VMB lets u
keep trying. Next, is auto-hack. If you select Auto-Hack, VMB Hacker will keep
trying PWs until you press C for Correct PW. This is very useful cuz it lets
u just sit back and relax and listen, but it will only work well if your modem
has a nice loud speaker. If you select Auto-Hack, u must now tell it the amount
of seconds to wait for u tel press C before it tries the next code. Next, you
must tell VMB Hacker how many seconds to wait after dialing the VMB before it
starts hacking.
Hope this program helps you out in hackout out your VMB's. If u have any
questions, u can call my board and ask me or contact me on any of the other
A.C.E. boards in New York. Also, I'd like to thank PO\/\/ER 1 and Outlaw for
for giving me the idea to write this program.
L8r, d00dz...
---===< Zod >===---
Call These Fine A.C.E. Boards:
The Dead Of Night BBS
(212)979-0719
Sysop - Zod
HPCLand
(718)531-7846
Sysop - PO\/\/ER 1

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,248 @@
<31><6D><31><31><6D><EFBFBD><EFBFBD> <31><6D><31><31><6D><EFBFBD><EFBFBD> <31><6D><31><31><6D><EFBFBD><EFBFBD><34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><31><6D><EFBFBD><34><6D><EFBFBD><EFBFBD><31><6D><31><6D><EFBFBD><31><31><31><6D><34><31><6D><31><6D><EFBFBD><34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<><75><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><31><6D><EFBFBD><34><31><6D><31><31><6D><31><6D><EFBFBD><31><31><31><6D><34><31><6D><31><6D><EFBFBD><34><31><6D><31><34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D>
<31><31><6D><EFBFBD> <30><34><31><6D><31><31><6D><EFBFBD><EFBFBD><34><31><6D><31><31><6D><EFBFBD> <30><34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><37><6D><30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><30><6D> <35><31><35> Cardin
g <35><31><35> Phreaking <35><32><35> Hacking <35><36><35> Anarchy <35><33><35> Phraud <35><37><35>Written by: Wave Runner!
Date: 10/22/90Edited by : Count_ZER0<36>egions <31>f <31>uciferText # 12Part 1 out of 1<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<><75><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Hacking & Scanning Voice Mail Boxes: The Tutorial<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Legions of Lucifer ('l<>jen ov l<>cif<69>r) n. 1. Any multitude of followers
of the chief evil spirit, Satan. 2. A group of Anarchists and Computer
Experts that work together as one to cause havok in the anarchy bound
society of this nation.
Hello again, and welcome to another <20>egions <20>f <20>ucifer text phile! This
text file has to do with hacking and scanning VMBs. The reason I am writing
this phile is because I am very good at it, and have had years of experience.
Infact I have been called by MCI for screwing them over by attacking and
taking over a whole damn system with a few friends of mine.
Anyways, hacking VMBs is very simple and basically safe, and not only that
but they are kewl to have around. You can give them to friends, you can
trade them for access on bulletin boards, or you can use it for yourself.
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
to hack, how you go about hacking them, default passwords, hints on better
scanning, and having your very own box.
Basics:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
like an answering machine. You can use it for all sorts of things. Most
VMB systems are dialed though 800 numbers. People call up the VMB system
that you have a box on, and dial in your box number and then leave you a
message. Whenever you want to check your box, you just call up, enter your
password and read your messages. Inside a VMB you can do whatever, you can
leave messages to others on the system, you can change your 'Out Going'
message, you can have guest boxes (Explained later), you can have the box
call your house when you get an Urgent message, you can do a lot of things.
Infact, on some systems you can even CALL OUT through them, so they can be
used as a code of sorts! They are cool to have.
What Type of System You Should Scan/Hack:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
You should scan/hack out Virgin Systems, this is another way of calling a
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
have the best boxes and the most options that VMB Systems can offer. I will
be talking about ASPEN System today since I know most about those.
Scanning Your 'Virgin ASPEN VMB System':
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Okay once you've found your Virgin VMB System, you start to scan. Just incase
you don't know what scanning is, that means you search for boxes that are
hackable (Explained later on). Now you dial up the system and when it picks
up and the bitch starts to talk, press the "#" key. It will then ask you for
your box number... now there are two different way the ASPEN System can be
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
System". Now lets just say this system is a 3 Digit System. Okay, when it
asks for your Box Number, enter in 999, now it will say one of three things:
[These are known as 'Greeting Names']
1. John Doe [Box owners name]
2. "Box Number 999 Is Not a Valid Box Number"
3. "Box Number 999"
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
but if it says 3, then you are lucky, now it will ask you for your password,
now you are probably saying 'Shit this is where it gets difficult'... well
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
* We will use box number 666 as an example box #
[ BN = Box Number ]
List of Default Password: Combination Result
1-BN 1666
BN+1 667
0-BN 0666
BN-0 6660
Most Common <20>į BN 666
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
use that most. Now, if you try all those Defaults and still can not get into
that Voice Mail Box, then that means that the box has been already taken, but
the owner hasn't changed his 'Generic Message', if you don't get in, you
will just have to search until you get in.
Once You Get Into a Box:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Okay, once you get your first box, *DO NOT* change anything!! That will come
later. Your first box is, as what is known as a 'Scanning Box'! What you do
with your Scanning Box is this: You enter "3" from the main commands menu,
and it will ask you for the box number. Now that command is the "Check for
Reciept" command, what it does it check Box #xxx for mail from you. This
command is very convienient for us VMB Hackers. To use that command to your
advantage, you enter in box a box number and it will say 1 of the three
'Greeting Names', like before, if it say #3, then you write down that Box
Number and hack it later. But if it says 1 or 2, then just keep scanning!
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
Now you keep scanning until you have gone all the way down to Box number 000
or whatever is the lowest box it supports. Now, once you have your list this
is when all the fun starts! Now you are ready to hack!
Hacking Out Your New Found 'Hackable' Boxes:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Okay this is the easy part. After you spent most of your time by scanning
the system you should be used to the system and how it works, that should
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
should know what the default password was for your Scanning Box. Well if the
password for your Scanning Box was just the Box Number, then *EVERY* other
hackable box should have the SAME default password. VMB Systems have only
one default password, If one box has the BN for a Default PW, the all the
others will too.
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
side, and when the bitch is talking, press the "#" key. When it asks you for
your box number, enter in the first box number on your list. When it asks for
your password, enter in the Default Password Sequence. Now if you don't get
into that box, it's not a problem, just keep going down your list. You should
get into a few. But remember, just because a box is marked 'Hackable', it
doesn't mean you will definatly get into it.
Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
whatever you please.
ASPEN Guest Boxes:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
for him, and leave you messages, but not only that, you can leave messages
to HIM! Which means, if his is in New York, and you are in California, and
neither of you have codes to call eachother, then you can leave messages thru
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
0. Main Box - Your Voice Mail Box!
1. Guest Box #1 - Can Leave & Recieve Messagez
2. Guest Box #2 - Can Leave & Recieve Messagez
3. Home Box - Can Leave & Recieve Messagez
4. Secretary Box - Can Check How Many Messagez You
Have & Recieve Messagez
Hints On Better Scanning:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
A lot of people say hacking and scanning for VMBs is too damn hard... well
that's because they are going at it all wrong, they probably read some lame
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
here is a small list of hints on better scanning and hacking:
1. Do not use a Voice Mail Box hacking/scanning program
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
2. Do not hack in random order (ei: B#999, 345, 810, etc)
Always hack in order: 999, 998, 997, 996, 995...000.
3. Try to find out if it's virgin. The newer the System,
the better.
4. If you have a phone with memory dial, change one entry
to the number of the VMB System.
5. Don't hack the System Managers box unless you really
want to.
Ideas of Things To Do With Your Extra Boxez:
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Well since you can have up to 500 extra Voice Mail Boxes, you might
not know what to do with them, here are a few ideas that can help you out:
1. Give them to friends
2. Sell them to friends
3. Offer them to sysops for
for better access
4. Trade them for HSTs or
whatever
5. Use them as a Voice Verifing line (So you don't have to give out
your real voice number to BBSes when you apply!)
Well, that's it to the <20>egions <20>f <20>ucifer Hacking & Scanning Voice Mail Box
Systems Tutorial! I hope it helped you and I, along with <20>.<2E>.<2E> wish you the
best of luck with your new found hobby! And remeber if you found this text
of any help, please spread it around to help others! Also, if you think you
are any good at writing H/P, please apply to be a Member! Call the <20>.<2E>.<2E> Home
at:
Digital Hackers Network
<20>egions <20>f <20>ucifer HeadQuarters/Home
No Warez! A truely serious Hack/Phreak board
Hack, Phreak, Scanning, Phraud, Crashing disscusions
Viral Research & Development Sections (500+ Virii!)
"Personalized ANSi Bombs" made by request
Running AfterShock v1.20 - 2400 Baud
PH: 213-274-1333

<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<35><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <31><6D> <30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<33><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<31><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><30><6D><EFBFBD><EFBFBD><EFBFBD>
<30><43><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><31><6D><31><6D><EFBFBD><EFBFBD><EFBFBD><30><6D><EFBFBD><EFBFBD><EFBFBD>
<39><43><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><31> <20><31><6D><EFBFBD><EFBFBD><30><6D><EFBFBD><EFBFBD>
<38><43><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><31><34><30><6D><EFBFBD><EFBFBD><EFBFBD><30><6D><EFBFBD><EFBFBD>
<38><43><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><31><36><31><6D><EFBFBD><EFBFBD><30><6D><EFBFBD> <36>
<30><6D><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><31><38><30><6D><EFBFBD><EFBFBD><30><6D><EFBFBD><EFBFBD><36><6D><36>
<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><6D><EFBFBD><EFBFBD><EFBFBD><30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><36>
<31><36><6D><36><36><6D><EFBFBD><36><6D><EFBFBD><EFBFBD><36><30><6D><EFBFBD><EFBFBD><31><36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><36><6D><EFBFBD><EFBFBD><36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><36><6D><EFBFBD><36>
<31><6D><36><30><6D><EFBFBD> <31><6D><EFBFBD><EFBFBD><31><34><31><6D><EFBFBD><EFBFBD><30><6D><EFBFBD>
<36><36><30><6D><EFBFBD> <31><6D><EFBFBD><EFBFBD><EFBFBD><31><36><30><6D><EFBFBD><EFBFBD><EFBFBD> <30><6D><EFBFBD>
<30><43><37><30><6D><EFBFBD><EFBFBD><31><38><31><6D><EFBFBD><EFBFBD> <30><31><6D><EFBFBD>
<31><31><31><6D><EFBFBD><31><31><30><6D><EFBFBD><EFBFBD><30><6D><31><6D>
<33><43><EFBFBD><EFBFBD><EFBFBD><38><43><31><30><6D><EFBFBD><EFBFBD>
<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><39><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><31><30><6D><EFBFBD><EFBFBD><EFBFBD>
<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <31><31><6D><EFBFBD><EFBFBD>
<31><31><6D><31>
"Anarchy is the base of todays society, without it, we would be in chaos"
- Anarchist
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Call these <20>egions <20>f <20>ucifer support boards for information or application
inquiries:
Digital Hackers Network 213/274+1333 <20>.<2E>.<2E> HeadQuaters/Home
Electric Eye ][ 313/776+8928 <20>.<2E>.<2E> Distribution Site #1
Digital Information Exchange 612/356+2209 <20>.<2E>.<2E> Distribution Site #2
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<EFBFBD>egions <20>f <20>ucifer High Office Members:
Prezident/Founder: Wave Runner!
Vice Prezident : Count_Zer0
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
This text file is (C)Copyrite 1990 <20>.<2E>.<2E> Inc.
<20>.<2E>.<2E> is a registered trademark of DHN, All rights reserved
Any modifications to this text file is a violation of copyrite.
Digital Hackers Network 213/274+1333 -=<3D>.<2E>.<2E> Home=-
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>


View File

@@ -0,0 +1,126 @@
R e n e g a d e L e g i o n
* * T e c h n i c a l R e p o r t s * *
* R * * L *
* *
Eastern Western
....
Net Runner ........ Overdose
The Knight ......... Sirus
Kingpin ... .... Snuggle
Highlander ... ....
Nemesis .....
Rogue .... Canadien
Zardoz ....
Cursor ... ...
The Gypsy ... ... Blackheart
Iceburg .. ...
White Knight ...
Presents
Eastern RL HQ - 617-XXX-XXXX
Canadien HQ - 902-XXX-XXXX
VMB (Voice Mail Box) Hacking
----------------------------
Written By: The Knight
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
a great deal of 'hidden info' that isn't common sense. But, If you are out
there trying to hack a box and can't, follow through the VERY logical and
simple steps and make sure they are matching up.
Step 1:
Finding a VMB System
There are many ways you can find a VMB system, for instance, on a BBS when
someone says 'Here are some systems' usually thats what they're referring
to. Also, Try setting up your scanner and listening for 'Welcome to XX
company, Enter extension #' or something similar to that. Then you have
found a VMB system.
Step 2:
Finding a Box
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
You must make sure that no one is using it. There are several ways to do
this. One EASY way is when you hack it, check the date on the latest
messages, if they are OVER a month old, then I'd say your safe to use them.
Also, watch in case there is just like _2_ messages in there from the last
4 months that those messages could be messages sent to ALL the boxes, see if
they sound personal. If they DON'T, then grab the box.
Let's say there's a box you REALLY want bad and someone's using it regularly,
try doing this: Go in twice a day (make SURE you DON'T change the greeting
etc.) and erase all the messages. He will complain and will eventually move
out of the box. Then there is a good chance of you having that box. It's
happned to me.
Step 3:
Hacking the VMB
This is the most SIMPLE part of all. MY general method is as follows:
Find a box, let's say box 260. It's empty and I want it (obviously).
First, try passcode '000', if that doesn't work, try passcode '260',
just make very general guesses that's ALL. Some of the MOST Common passcodes
are:
3 digit boxes:
000
123
111
222
333
444
555
666
777
888
999
box # (say it's box 260, passcode: 260)
321
4 digit boxes:
1234
0000
1111
2222
3333
4444
5555
6666
7777
8888
9999
box # (Say its box 1200, try passcode: 1200)
The Key: REALLY try ALL of those. I knew one system with a passcode of
'5555' and NO ONE could hack it. And I did. So don't give up.
UNLESS you've exhausted all of those possibilities. Then forget
it.
That's it really. The most simple thing to do. Just remember not to
give up before you should and also try 3 digit passcodes on 4 digit
boxes. Also, once you get in for added security, a lot of these boxes
allow more digits for passcodes, so make a 5 digit passcode. Or if you
think it's worth it, try like '00000' so that's really about all.
Have fun and don't stop.
-- The Knight, Sysop Eastern RL HQ BBS

View File

@@ -0,0 +1,52 @@
VMB's (Voice Mail Box) | 1&2 = Both call same number
| 1 = One calls this number
Call : 213-598-7900 (Party Pirate Line) BRIDGE| 2 = the other calls this
Call : 317-265-4488 (Unused Bridge) |
VMB Number |EXTEN | Operator of VMB | Loops
_______________| SION|______________________ | _____________________
N O L E E C H I N G |
716-987-7439 : None : The Pirate | 1&2 @ 212-567-9938
716-987-7648 : None : AK 47 (Brother) | 1&2 @ 504-356-5619
716-987-7666 : None : Jack the RIPPER | 1 @ 202-678-8049
716-987-7623 : None : Romper | 2 @ " " 8048
716-987-7502 : None : DEATH (Not Master) | 1 @ 504-831-9099
213-856-2580 : None : Black Ball Mis ]I[! | 2 @ " " 9098
1-800-333-5625 : 354 : The Flaw |
1-800-438-1061 : 135 : MW 8 |__________________________
312-410-7213 : : MC Docs | 1999 | 0488 |
213-494-9700 : : Public Enemy |_________|________________|
714-647-1958 : : Mr Music | | |
213-202-4381 : : JDT | | |
313-399-2596 : : The Stranger | | |
1-800-525-7243 :**8889: Pure Genius | | |
619-492-8087 : : Trixder Ice |_________|________________|
1-800-632-6681 : 2614: Con Artist | 0266 | AT&T |
1-800-552-2440 : 5206: Console Cowboy | |80446713159980 |
619-496-3393 : : The Saint | |60110804335933 |
1-800-289-2121 : 255: Gremlin | |71333331316212 |
818-594-7049 :**7751: WhipLash | |70238697343418 |
818-594-7049 :**7754: Ace / WhipLash | | |
818-594-7049 :**7757: ChainSaw | | |
818-594-7049 :**7759: Hercules | | |
818-594-7049 :**7760: The Faker | | |
714-987-5128 : : AlphaBits | | |
213-856-8450 : : Iniolater | | |
: : | | |
: : | | |
: : | | |
____________________________________________________________________________
-Don't Work for me. -
950-0488
0471041692102
7261041692102
1151041692102
7411041692102
0721041692102
2591041692102
950-0266 Public Bridges:
5024180 312-630-9590;9592;9594;9596;9598
312-606-9214
312-606-0766
312-704-0724

View File

@@ -0,0 +1,86 @@
###############################################################################
## <20><><EFBFBD>Zhit Axis Nation presents<74><73><EFBFBD> W () W ##
## How to have your own VMB \||/ ##
## || ##
## Written by: The Exorcist _/ \_ ##
## Dated: 7/24/91 ##
## Greet(s) to: Doc Logic, my teacher at school, and the godly CoP... ##
## ##
## Ying Yang BBS The Baron's Bistro FuNHouse BBS ##
## ZAN Promised Land ZAN Mosque#001 ZAN Mosque#002 ##
## SysOp: CoP SysOp: The Baron SysOp: Erasmus ##
###############################################################################
Here is another ultimately cool ZAN text file brought to you by the Exorcist.
Call 1-312-839-3850 and leave all the shit you want, codes and nos and shit..
This file is only based upon the information gathered from VMB's with the
839 prefix.
Ok here is a file from Z.A.N. so I wont be purged! What is a VMB? A VMB
is a Voice Mail Box.. or sometimes known as a Voice Mail System. Their
purpose is to record messages for people.. (id est OB/Gyn's and Pediatrists,
Drug Dealers, and a curious of other rich and filthy scum.) Lets say Joe
Supplier is out with his hoe.. Of course he can't get in touch with his
fiendish hommies so what does he do? No, he doesn't get a beeper cuz that
might tick of his hoe.. He get's a VMB where he has the caller has the option
to leave a phone no. or a voice message.
Joe S. finishes with his hoe calls up his VMB listens to his pre-recorded
message for a little while " Yea Man, I ain't no home now, but you leave
message an I call you when I done with yo sis'" then presses "0" on his touch
tone phone. A nice little voice comes on saying "Please enter your access
code." He enters his code and hears " You have xx messages press 7 to play."
He presses 7 and hears his messages.
So you get the point by now, and if you don't you shouldn't be reading this..
So how do you get one, why you just look it up in the yellow pages and let
your fingers do the talking.. But everyone knows that the real way is to
HACK it.. Find out some pager prefixes, I know some in Illinois are 312-839
and then theres 708-xxx. Then attempt to call every no. combination there is
unless you have a scanner or something that you can program to act upon
different messages.. To make your time go faster try little combinations
like 839-fuck or 839-hack. About 95% of the time you will simply here a few
beeps. This is for the conventional pager, the correct procedure is to type
in your phone no. and press the # button. By the way, if you really get
pissed at someone, you can type in their no. and then they will be getting
calls from people saying "John Doe from 1st National back returning your
call" or "Yeah man, dis be Tyrone, wha you be, G?"
When you finally get one, either by taking someone elses - trying to hack
their passwords or believe this, some persons are to stupid to even have
passwords - or by finding an empty one. The second of the two being the
better and safer. Hacking someones VMB cant get you in any trouble.. Just
don't attemt to change the message right away.. But if you are the true
anarchist, you will change his/her message, Call back the next day, and find
the old message back with a new password.. Now is your time to have fun.
Keep saying "I got your VMB along with your address and shit, be expecting
a ton of manure on your front lawn Monday." I kept doing this along with
saying "I am going to kill your Grandmother" After awhile the guy changed
his message to say something like "Hey man stop leaving me messages, I'll
use ANI to bust you" What a looser!
What exactly are the commands once you get in to your own little VMB?
Pressing the "*" will give you the following options..
3 to delete
2 to play again
4 to skip forward in message
11 to update greeting
13 to forward message
17 to change access code
I also found out some that they don't tell you once you press "*"
8 will get you the time that the messages were left
5 will tell you what message you are at
6 sets you back to the beginning
If you do succeed, please post your VMBs so that the anarchistic public can
leave you mail. Who knows maybe you'll get some CC's or codes and shit..
Downloaded From P-80 International Information Systems 304-744-2253

View File

@@ -0,0 +1,52 @@
==)--- P TO PAUSE S TO STOP ---(==
Toll-Free Answering Services
Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
American Discount Dialing System 800-227-1617 (CA 800-852 7777) (CA 800-772-3545)
Dialog Marketing 800-447-4700 (IL 800-322-4400)
Direct Marketing Services Inc. 800-223-1944
Executive Locator 800-323-6556
H Q Co 800-227-3004 (800-652-1848)
National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
National Data Corperation 800-257-9611
National Switchboard 800-528-6052
Nice-National Instant Consumer Exchange 800-453-9000
Operator 800 800-448-4511 (NY 800-962-1480)
Ring America 800-621-5199
Share-a-Wats Inc. 800-854-2003
Skycall 800-631-5488 (NJ 800-352-4951)
Team Telephone 800-228-5000
Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
Teletrak Response Center 800-328-5257
USA 800 800-821-2280 (MO 800-892-7655)
DOWNLOADED FROM P-80 SYSTEMS

Archives #4
<2>United Kingdom BBS'S
<3>Weers Group...... 02 238 9034                          

View File

@@ -0,0 +1,84 @@
____________________________ _____
\___ | ___/___/_ ___\___/ _ \/ ___/
| | |/ /____| | | | | |\ )/____
| | |>____ / | | |> | __/___ /
___| | |____/ /| | | |__| |\ \_/ /
\____|____/__/ |_| |____/_| \_\_/ HL
-------------------------------------
THERE IS NOW A NEW FACILITY FOR COOL DUDES WHO WANTS IT....
IT'S TOTALLY FREE, BUT IS RESTRICTED TO THOSE WHO....
A) OWN A TONE PAD OR TONE DIALING PHONE.
B) WILL USE IT REGULARLY.
C) AREN'T LAME!!
THE FACILITY IS A FREE-PHONE MESSAGE BOX SYSTEM FOR YOU TO CALL AND LEAVE
MESSAGES, GOSSIP, ETC TO OTHERS ON THE SYSTEM. EACH PERSON IS GIVEN
HIS/HER OWN PERSONAL MAIL BOX WITH ITS OWN PASSWORD (CHANGABLE!). THE
SYSTEM ALSO ALLOWS THOSE OF YOU UNABLE TO PHREAK TO HAVE CHATS USING MAIL.
APPLYING FOR A MAIL BOX IS REALLY EASY. YOU CAN EITHER....
A) PHONE 0800 899224, LEAVE A MESSAGE CONTAINING YOUR NAME AND PHONE
NUMBER TO LORD FLIGHT/JESTERS AT MAIL BOX 510. THIS IS DONE BY DIALING
THE FREE=PHONE NUMBER, PRESSING THE `*' KEY AS SOON AS YOU HEAR THE
RECORDED VOICE, ENTERING `510', LEAVE YOUR DETAILS AFTER THE TONE, AND
HANGING UP WHEN YOU HAVE FINISHED!
B) CALL A BBS AND MAIL YOUR DETAILS TO ANY OF THESE USERS, IF THEY ARE
MEMBERS OF THE BOARD :-
SKITZ
HIGHLANDER
JESTERS
ZEBEDI
C) MAIL YOUR DETAILS TO ANY OF THE ABOVE USERS AT THE JESTERS HQ...
INNER SANCTUM ON 44 (0)229 430327.
IF YOUR APPLICATION IS ACCEPTED YOU'LL GET A CALL AND WILL BE TOLD YOUR
MAIL BOX NUMBER, YOUR PASSWORD (WHICH MUST BE CHANGED) AND A LIST OF
OTHER USERS ON THE SYSTEM.
NB : AS SOON AS YOU READ THIS TEXT, GIVE IT A GO, CAUSE EVERYTHING IS
FREE. THIS NUMBER WILL NOT GO DOWN FOR A GOOD 2 MONTHS OR SO, BUT IT WILL
EVENTUALLY, AND WHEN IT DOES YOU WILL BE NOTIFIED OF A NEW NUMBER TO CALL
WITHIN A WEEK!
CREDITS GO TO DEATH FOR FINDING THE ORIGINAL NUMBER...
ALLOCATED MAIL BOXES THAT ARE ABUSED OR NOT USED WILL BE RE-ALLOCATED TO
MORE APPRECIATIVE USERS!
NO TRICKS, NO CHARGES....WE DO THIS OUT OF THE GOODNESS OF OUR HEARTS!!
BULK ORDERS CAN ALSO BE MADE FROM LARGE GROUPS! RESERVATIONS ONLY TAKE
A SECOND!!!
/* LORD FLIGHT */ - YOUR SYSTEM ADMINISTRATOR
_ __ ______ __________________
THE //\// \ // // \ // // ___// __ \ SYSOP: HIGHLANDER
// // \ // // \ // // /_ // /// /
// // /\ \/ // /\ \/ // __/// __/ COSYSOPS: RUTGER SOUND
// // / \\ // / \\ // / // /\ \ RISK
// // / \\_// / \\_// /__// / \\ \_________________________
\\/\\_/ \\_/ \\____/\\_/ \\__________________________/
________ ________ __ ________________________ __ __ __
// ___ \ // ____ \// \ // // __ \\____ ___// \ // \// \ // \
// / \\_/// / // // \ // // / \\_/ // / // / // // \/ \
\\ \___ // \_// // /\ \/ // / // / // / // // /\ /\ \
__\\___ \// /\__ // / \\ // / __ // / // / // // / \/// /
// \__// // / // // / \\_// \// \ // / // \// // / // /
\\_______/\\/ \\_/\\_/ \\______/ \\_/ \\_______/\\_/ \\_/
68030 POWER * 200 MEG STORAGE * DUAL STANDARD 14.4K * SERIAL LOCKED AT 38.4K
JESTERS U.K HQ * 0-1 DAYS ONLY
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
->->->->->->->->-> THE INNER SANCTUM +44 (0) 229 430327 <-<-<-<-<-<-<-<-<-
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>

View File

@@ -0,0 +1,36 @@
========================================
= =
= Xerox Voice Message Exchange Commands=
= =
= Written & Typed By:The Lineman =
= =
= Atlantis BBS 215/844-8836 (Private) =
= =
========================================
Command List:
1 = Start/Stop Recording
2 = Start/Stop Playing
3 = Back Up
33 = Back Up to Beginning
4 = Skip Forward
44 = Skip to End
5 = Send/Erase
55 = Notification of Non-Delivery
7 = Save/Scan
8 = Future Delivery
0 = End of Address
* = End of Address
Special Commands:
011 = New Message Queues
012 = Saved Message Queues
021 = Redirect
022 = Reply
Any questions? Dial 1-800-TEAM-XRX (1-800-832-5979)
8/86

View File

@@ -0,0 +1,80 @@
<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>Phone Phreaking: Wiretapping and Bugs</H1>
<P>
The Great Fear of people who use telephones to conduct their business (private
or professional) is that someone is listening in, taking notes, recording.
It's a concern that has allowed some very rough laws to be put into place, and
it's a central theme of these files. They tell you how to bug telephones or
rooms, get in the way of electronic transmissions, and they even touch on
some of the politics behind this method of information gathering.
<P>
Of course, it should be noted that not everyone out there wiretapping is a
private citizen.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bellinfo.txt">bellinfo.txt</A> <tab to=T><TD> 10630<BR><TD> Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bug.txt">bug.txt</A> <tab to=T><TD> 9176<BR><TD> Automatic Phone Recorder by Atomic Punk (May 1, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugdetct.phk">bugdetct.phk</A> <tab to=T><TD> 1893<BR><TD> Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugging.guide">bugging.guide</A> <tab to=T><TD> 7040<BR><TD> Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugging.phk">bugging.phk</A> <tab to=T><TD> 7201<BR><TD> Bugs on a Budget, Inexpensive Surveillance, 8-85
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/buggy.phk">buggy.phk</A> <tab to=T><TD> 1579<BR><TD> A little history about the Infinity Transmitter
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugphone.phk">bugphone.phk</A> <tab to=T><TD> 4640<BR><TD> An Automatic Phone Recorder, by Atomic Punk
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugstaps.txt">bugstaps.txt</A> <tab to=T><TD> 1891<BR><TD> Bugs and How to Tap Someone's Room by Fireball
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/buildbug.phk">buildbug.phk</A> <tab to=T><TD> 3852<BR><TD> How to Build a Bug Detector by The Gremlin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/caller">caller</A> <tab to=T><TD> 6623<BR><TD> Notes on Recording Caller ID Signals and Voice Notes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/callwai.txt">callwai.txt</A> <tab to=T><TD> 2878<BR><TD> The Call Waiting Tap, by The Byte
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/cordless.phk">cordless.phk</A> <tab to=T><TD> 6713<BR><TD> How to listen into cordless phone conversations, by Beowulf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/datatap.hac">datatap.hac</A> <tab to=T><TD> 3968<BR><TD> Tapping Computer Data is Easy! By Rick Blackmon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/detectbug.phk">detectbug.phk</A> <tab to=T><TD> 2912<BR><TD> Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/dltp1.txt">dltp1.txt</A> <tab to=T><TD> 4738<BR><TD> Detecting Line Taps of C-Net Compatibles
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/dltp2.txt">dltp2.txt</A> <tab to=T><TD> 3585<BR><TD> Detecting Line Taps Part type by C-Net Compatibile
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/eaves1.txt">eaves1.txt</A> <tab to=T><TD> 14460<BR><TD> Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/es.txt">es.txt</A> <tab to=T><TD> 25505<BR><TD> Electronic Bug Detection
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/faxint.phk">faxint.phk</A> <tab to=T><TD> 14663<BR><TD> Fax Machine Interception, from Full Disclosure #23
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fmbug.hac">fmbug.hac</A> <tab to=T><TD> 4736<BR><TD> How to Make an FM Wireless Bug, by Johnny Rotten
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fmphone.bug">fmphone.bug</A> <tab to=T><TD> 2340<BR><TD> Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonebugs.hac">fonebugs.hac</A> <tab to=T><TD> 2199<BR><TD> Bug Detection on Home Phones
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonepole.txt">fonepole.txt</A> <tab to=T><TD> 4097<BR><TD> Climbing Phone Poles- Tips and techniques by The Mad Phone-man
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/foneptch.phk">foneptch.phk</A> <tab to=T><TD> 29642<BR><TD> Building and Using Phone Patches, by Julian Macassey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonesci.phk">fonesci.phk</A> <tab to=T><TD> 18900<BR><TD> The Science of Telephone Surveilance, by Eric The Red
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/intercpt.txt">intercpt.txt</A> <tab to=T><TD> 22529<BR><TD> Pager, Fax, and Data Intercept Techniques
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lbt-alt1.txt">lbt-alt1.txt</A> <tab to=T><TD> 3651<BR><TD> Info on Automatic Line Testers (APR) by RiPMax of Liberty
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lbt-alt2.txt">lbt-alt2.txt</A> <tab to=T><TD> 3796<BR><TD> Automatic Line Testers (SALT) by RiPMaX of Liberty
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lineman.phk">lineman.phk</A> <tab to=T><TD> 6645<BR><TD> Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/listenin.txt">listenin.txt</A> <tab to=T><TD> 4520<BR><TD> How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lmos.phk">lmos.phk</A> <tab to=T><TD> 4286<BR><TD> How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism32.hac">mism32.hac</A> <tab to=T><TD> 5248<BR><TD> Wiretape Loophole Concerns by Geoffrey S. Goodfellow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism36.hac">mism36.hac</A> <tab to=T><TD> 12928<BR><TD> Private Audience (The Art of Listening In) by The Overlord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism37.hac">mism37.hac</A> <tab to=T><TD> 7040<BR><TD> Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mobfone.phk">mobfone.phk</A> <tab to=T><TD> 9745<BR><TD> How to Get Into the AT&T Network by Building Your Own Mobile Phone
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/nightl.txt">nightl.txt</A> <tab to=T><TD> 21788<BR><TD> Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phone.tap">phone.tap</A> <tab to=T><TD> 4243<BR><TD> How Many Different Phone Taps Work
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phonetap.phk">phonetap.phk</A> <tab to=T><TD> 2896<BR><TD> Bug Detection on Home Phones, by Mr. Jimmy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phonetap.txt">phonetap.txt</A> <tab to=T><TD> 3767<BR><TD> Phone Tapping, by Lord Jaxom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phontap.phk">phontap.phk</A> <tab to=T><TD> 2913<BR><TD> The Call Waiting Tap, by The Byte
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/precord.phk">precord.phk</A> <tab to=T><TD> 5878<BR><TD> Automatic Phone Recorder by Atomic Punk, May 1, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/ptapping.phk">ptapping.phk</A> <tab to=T><TD> 14476<BR><TD> Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/swtchbrd.phk">swtchbrd.phk</A> <tab to=T><TD> 7031<BR><TD> Building Your Own Switchboard by Autopsy Saw
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapfones.hac">tapfones.hac</A> <tab to=T><TD> 11956<BR><TD> Private Audience: A Basic Guide to the Art of Listening In
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/taphones.phk">taphones.phk</A> <tab to=T><TD> 3105<BR><TD> How to Tap Into Your Neighbor's Phones, by Lord Jaxon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapownline.phk">tapownline.phk</A> <tab to=T><TD> 4533<BR><TD> How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapphon.txt">tapphon.txt</A> <tab to=T><TD> 8303<BR><TD> How to Listen in to Cordless Phone Conversaitons by Beowulf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapping.phk">tapping.phk</A> <tab to=T><TD> 1644<BR><TD> Bugs and How to Tap Someone's Room, by Fireball
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapping.txt">tapping.txt</A> <tab to=T><TD> 2468<BR><TD> The Call Waiitng Tap by The Byte and Road Agent
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/taps2.txt">taps2.txt</A> <tab to=T><TD> 4550<BR><TD> Some Information on Phone Taps
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tempest.txt">tempest.txt</A> <tab to=T><TD> 46237<BR><TD> Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wait.tap">wait.tap</A> <tab to=T><TD> 2683<BR><TD> The Call Waiting Tap by The Byte, Distributed by RAM Kracker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretap.ana">wiretap.ana</A> <tab to=T><TD> 3896<BR><TD> General Wiretap Information
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretap.txt">wiretap.txt</A> <tab to=T><TD> 13663<BR><TD> Wiretapping Abuse Report on the FBI in 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretapp">wiretapp</A> <tab to=T><TD> 6479<BR><TD> Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretaps.txt">wiretaps.txt</A> <tab to=T><TD> 23758<BR><TD> Can Wiretaps Remain Cost-Effective? By Robin Hanson
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 56 files for a total of 472,516 bytes.</SMALL></TABLE>
</BODY>
</HTML>

View File

@@ -0,0 +1,80 @@
<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
<H1>Phone Phreaking: Wiretapping and Bugs</H1>
<P>
The Great Fear of people who use telephones to conduct their business (private
or professional) is that someone is listening in, taking notes, recording.
It's a concern that has allowed some very rough laws to be put into place, and
it's a central theme of these files. They tell you how to bug telephones or
rooms, get in the way of electronic transmissions, and they even touch on
some of the politics behind this method of information gathering.
<P>
Of course, it should be noted that not everyone out there wiretapping is a
private citizen.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bellinfo.txt">bellinfo.txt</A> <tab to=T><TD> 10630<BR><TD> Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bug.txt">bug.txt</A> <tab to=T><TD> 9176<BR><TD> Automatic Phone Recorder by Atomic Punk (May 1, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugdetct.phk">bugdetct.phk</A> <tab to=T><TD> 1893<BR><TD> Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugging.guide">bugging.guide</A> <tab to=T><TD> 7040<BR><TD> Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugging.phk">bugging.phk</A> <tab to=T><TD> 7201<BR><TD> Bugs on a Budget, Inexpensive Surveillance, 8-85
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="buggy.phk">buggy.phk</A> <tab to=T><TD> 1579<BR><TD> A little history about the Infinity Transmitter
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugphone.phk">bugphone.phk</A> <tab to=T><TD> 4640<BR><TD> An Automatic Phone Recorder, by Atomic Punk
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugstaps.txt">bugstaps.txt</A> <tab to=T><TD> 1891<BR><TD> Bugs and How to Tap Someone's Room by Fireball
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="buildbug.phk">buildbug.phk</A> <tab to=T><TD> 3852<BR><TD> How to Build a Bug Detector by The Gremlin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="caller">caller</A> <tab to=T><TD> 6623<BR><TD> Notes on Recording Caller ID Signals and Voice Notes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="callwai.txt">callwai.txt</A> <tab to=T><TD> 2878<BR><TD> The Call Waiting Tap, by The Byte
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cordless.phk">cordless.phk</A> <tab to=T><TD> 6713<BR><TD> How to listen into cordless phone conversations, by Beowulf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="datatap.hac">datatap.hac</A> <tab to=T><TD> 3968<BR><TD> Tapping Computer Data is Easy! By Rick Blackmon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="detectbug.phk">detectbug.phk</A> <tab to=T><TD> 2912<BR><TD> Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dltp1.txt">dltp1.txt</A> <tab to=T><TD> 4738<BR><TD> Detecting Line Taps of C-Net Compatibles
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dltp2.txt">dltp2.txt</A> <tab to=T><TD> 3585<BR><TD> Detecting Line Taps Part type by C-Net Compatibile
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eaves1.txt">eaves1.txt</A> <tab to=T><TD> 14460<BR><TD> Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="es.txt">es.txt</A> <tab to=T><TD> 25505<BR><TD> Electronic Bug Detection
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="faxint.phk">faxint.phk</A> <tab to=T><TD> 14663<BR><TD> Fax Machine Interception, from Full Disclosure #23
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fmbug.hac">fmbug.hac</A> <tab to=T><TD> 4736<BR><TD> How to Make an FM Wireless Bug, by Johnny Rotten
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fmphone.bug">fmphone.bug</A> <tab to=T><TD> 2340<BR><TD> Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonebugs.hac">fonebugs.hac</A> <tab to=T><TD> 2199<BR><TD> Bug Detection on Home Phones
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonepole.txt">fonepole.txt</A> <tab to=T><TD> 4097<BR><TD> Climbing Phone Poles- Tips and techniques by The Mad Phone-man
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foneptch.phk">foneptch.phk</A> <tab to=T><TD> 29642<BR><TD> Building and Using Phone Patches, by Julian Macassey
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonesci.phk">fonesci.phk</A> <tab to=T><TD> 18900<BR><TD> The Science of Telephone Surveilance, by Eric The Red
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="intercpt.txt">intercpt.txt</A> <tab to=T><TD> 22529<BR><TD> Pager, Fax, and Data Intercept Techniques
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lbt-alt1.txt">lbt-alt1.txt</A> <tab to=T><TD> 3651<BR><TD> Info on Automatic Line Testers (APR) by RiPMax of Liberty
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lbt-alt2.txt">lbt-alt2.txt</A> <tab to=T><TD> 3796<BR><TD> Automatic Line Testers (SALT) by RiPMaX of Liberty
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lineman.phk">lineman.phk</A> <tab to=T><TD> 6645<BR><TD> Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="listenin.txt">listenin.txt</A> <tab to=T><TD> 4520<BR><TD> How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lmos.phk">lmos.phk</A> <tab to=T><TD> 4286<BR><TD> How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism32.hac">mism32.hac</A> <tab to=T><TD> 5248<BR><TD> Wiretape Loophole Concerns by Geoffrey S. Goodfellow
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism36.hac">mism36.hac</A> <tab to=T><TD> 12928<BR><TD> Private Audience (The Art of Listening In) by The Overlord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism37.hac">mism37.hac</A> <tab to=T><TD> 7040<BR><TD> Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mobfone.phk">mobfone.phk</A> <tab to=T><TD> 9745<BR><TD> How to Get Into the AT&T Network by Building Your Own Mobile Phone
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nightl.txt">nightl.txt</A> <tab to=T><TD> 21788<BR><TD> Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phone.tap">phone.tap</A> <tab to=T><TD> 4243<BR><TD> How Many Different Phone Taps Work
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonetap.phk">phonetap.phk</A> <tab to=T><TD> 2896<BR><TD> Bug Detection on Home Phones, by Mr. Jimmy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonetap.txt">phonetap.txt</A> <tab to=T><TD> 3767<BR><TD> Phone Tapping, by Lord Jaxom
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phontap.phk">phontap.phk</A> <tab to=T><TD> 2913<BR><TD> The Call Waiting Tap, by The Byte
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="precord.phk">precord.phk</A> <tab to=T><TD> 5878<BR><TD> Automatic Phone Recorder by Atomic Punk, May 1, 1989
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ptapping.phk">ptapping.phk</A> <tab to=T><TD> 14476<BR><TD> Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="swtchbrd.phk">swtchbrd.phk</A> <tab to=T><TD> 7031<BR><TD> Building Your Own Switchboard by Autopsy Saw
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapfones.hac">tapfones.hac</A> <tab to=T><TD> 11956<BR><TD> Private Audience: A Basic Guide to the Art of Listening In
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taphones.phk">taphones.phk</A> <tab to=T><TD> 3105<BR><TD> How to Tap Into Your Neighbor's Phones, by Lord Jaxon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapownline.phk">tapownline.phk</A> <tab to=T><TD> 4533<BR><TD> How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapphon.txt">tapphon.txt</A> <tab to=T><TD> 8303<BR><TD> How to Listen in to Cordless Phone Conversaitons by Beowulf
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapping.phk">tapping.phk</A> <tab to=T><TD> 1644<BR><TD> Bugs and How to Tap Someone's Room, by Fireball
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapping.txt">tapping.txt</A> <tab to=T><TD> 2468<BR><TD> The Call Waiitng Tap by The Byte and Road Agent
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taps2.txt">taps2.txt</A> <tab to=T><TD> 4550<BR><TD> Some Information on Phone Taps
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tempest.txt">tempest.txt</A> <tab to=T><TD> 46237<BR><TD> Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wait.tap">wait.tap</A> <tab to=T><TD> 2683<BR><TD> The Call Waiting Tap by The Byte, Distributed by RAM Kracker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretap.ana">wiretap.ana</A> <tab to=T><TD> 3896<BR><TD> General Wiretap Information
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretap.txt">wiretap.txt</A> <tab to=T><TD> 13663<BR><TD> Wiretapping Abuse Report on the FBI in 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretapp">wiretapp</A> <tab to=T><TD> 6479<BR><TD> Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretaps.txt">wiretaps.txt</A> <tab to=T><TD> 23758<BR><TD> Can Wiretaps Remain Cost-Effective? By Robin Hanson
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 56 files for a total of 472,516 bytes.</SMALL></TABLE>
</BODY>
</HTML>

View File

@@ -0,0 +1,201 @@
/-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\
! Bell Telephone Info !
\-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/
******************************************************************************
BRIDGING HEADS, RESIDENTIAL AND BUSINESS MULTILINE DISTRIBUTION BOXES, LINE
AND TRUNK SPLITTERS, AND OTHER BELL SYSTEM WIRE TERMINATIONS.
- HOW TO USE, AND/OR ABUSE THEM -
(INCLUDING A TUTORIAL ON BASIC TELEPHONE EAVESDROPPING TECHNIQUES.)
******************************************************************************
WRITTEN BY : PHUCKED
AGENT 07/29/84
04
REVISED FOR LOD! 10/84
CURRENTLY REVISION II
****************************************************************************
IN THIS ARTICLE, I WILL FIRST BESCRIBE THE TERMINATION, WIRING, AND
TERMINAL HARDWARE MOST COMMONLY USED IN THE BELL SYSTEM, AND I WILL INCLUDE
A SECTION ON METHODS OF USING THEM.
*****************************************************************************
-------------
LOCAL NETWORK
-------------
THE LOCAL TELEPHONE NETWORK BETWEEN THE CENTRAL OFFICE/EXCHANGE AND
THE TELEPHONE SUBSCRIBERS CAN BE BREIFLY DESCRIBED AS FOLLOWS:
FROM THE CENTRAL OFFICE (OR LOCAL EXCHANGE) OF A CERTAIN PREFIX(ES),
UNDERGROUND AREA FEEDER TRUNKS GO TO EACH AREA THAT HAS THAT PREFIX. (USUALLY
MORE THAN ONE PREFIX PER AREA) AT EVERY FEW STREETS OR TRACT AREAS, THE
UNDERGROUND CABLES SURFACE. THEY THEN GO TO THE SECONDARY TERMINATION, (THE
AERIAL TELEPHONE FEEDER CABLE) (OR BACK UNDERGROUND, DEPENDING ON THE AREA) AND
THEN TO THE SUBSRIBERS HOUSE (OR IN THE CASE OF AN APARTMENT BUILDING OR
MUTLILINE BUSINESS, TO A SPLITTER OR DISTRIBUTION BOX/PANEL).
NOW THAT WE HAVE THE BASICS, I'LL TRY AND GO IN-DEPTH ON THE SUBJECT.
------------------
UNDERGROUND CABLES
------------------
THESE ARE SOMETIMES INTEROFFICE TRUNKS, BUT USUALLY IN A RESIDENTIAL AREA
THEY ARE FEEDER GROUPS THAT GO OTO BRIDGING HEADS OR DISTRIBUTION CASES. THE
CABLES ARE ABOUT 2-3 INCHES THICK (VARIES), AND ARE EITHER IN A METAL OR
PVC-TYPE PIPE (OR SIMILAR). RARELY (MAYBE NOT IN SOME REMOTE RURAL AREAS) ARE
THE CABLES JUST 'ALONE' IN THE GROUND. INSTEAD, THEY ARE USUALLY IN AN
UNDERGROUND CEMENT TUNNEL (RESEMBLES A SMALL SEWER OR STORMDRAIN). THE MANHOLES
ARE >HEAVY< AND WILL SAY 'BELL SYSTEM' ON THEM. THEY CAN BE OPEN ED WITH A 1/2
INCH WIDE CROWBAR (HOOK SIDE) INSERTED IN THE TOP RECTANGULAR HOLE. IF YOU GET
IT OPEN, GO INSIDE!! THERE ARE LADDER RUNGS TO HELP YOU CLIMB DOWN. YOU WILL
SEE THE CABLE PIPES ON THE WALL, WITH THE BLUE AND WHITE STRIPED ONE BEING THE
INTEROFFICE TRUNK GRP (AT LEAST IN MY AREA). THE OTHERS ARE LOCAL LINES, AND
ARE USUALLY MARKED OR COLOR CODED. THERE IS ALMOST ALWAYS A POSTED COLOR CODE
CHART ON THE WALL, NOT TO MENTION TELCO MANUALS DESCRIBING THE CABLES AND
TERMINALS, SO I NEED NOT GET INTO DETAIL. AGAIN: >IF YOU CAN GET INTO A
BELL MANHOLE, DO IT!, IT WILL PAY OFF<. ALSO, THERE IS USUALLY SOME KIND OF
TEST EQUIPMENT, AND OFTEN BELL TEST SETS ARE LEFT IN THERE. SO GET YOUR
CROWBARS!
--------------
BRIDGING HEADS - (WE MS2'S)
--------------
THE INNOCENT-LOOKING GRAYISH-GREEN BOXES. WHEN IN GROUPS OF TWO OR THREE,
THEY ARE FOR SECONDAY/TERTIARY TERMINATION AND ACCESS POINTS (BRIDGED ACCESS).
THESE ARE THE WESTERN ELECTRIC SAI 55 OR 22/E TERMINAL CASES. THEY HOLD ON THE
ORDER OF 900-1200 CABLE PAIRS. THIS IS USUALLY THE SECOND TERM. POSITION ON THE
LOCAL LOOP (AFTER THE MTF FRAME AT THE CO/ OR THE UNDERGROUND 'FTP' POSITION).
THESE CAN BE EITHER TRUNK BRIDGES OR BRIDGING FOR RESIDENCES. THE AREA FEEDER
BRIDGING HEADS ARE USUALLY LARGER, AND THEY HAVE THE 'WESTERN ELECTRIC' LOGO AT
THE BOTTOM, WHEREAS THE NORMAL BRIDGING HEADS (WHICH MAY BE DIFFERENT IN SOME
AREAS DEPENDING ON THE COMPANY YOU ARE SERVED BY. GTE B.H'S LOOK SLIGHTLY
DIFFERENT. ALSO, DO NOT BE FOOLED BY SPRINKLER BOXES!) CAN BE FOUND IN JUST
ABOUT EVERY CITY.
TO OPEN A BRIDGING HEAD: IF IT IS LOCKED (AND YOU'RE FEELING DESTRUCTIVE),
PUT A HAMMER OR CROWBAR (THE SAME ONE YOU USED ON THE MANHOLE) IN THE SLOT
ABOVE THE TOP HINGE OF THE RIGHT DOOR. PULL HARD, AND THE DOOR WILL RIP OFF.
VERY EFFECTIVE!
IF IT ISN'T LOCKED (AS USUAL), TAKE A 7/16 INCH HEX SOCKET AND WITH IT, TURN
THE BOLT ABOUT 1/8 OF A TURN TO THE LEFT (YOU SHOULD HEAR A SPRING RELEASE
INSIDE). HOLDING THE BOLT, TURN THE HANDLE ALL THE WAY TO THE RIGHT AND PULL
OUT.
NOW INSIDE, FIRST CHECK FOR A TEST-SET (WHICH ARE OFTEN LEFT BY BELL
EMPLOYEES). THERE SHOULD BE A PANEL OF CABLE PAIRS + SCREW TERMINALS (TYPE
45/47IB REGULAR BINDERS) . PUSH THE PANEL BACK ABOUT AN INCH OR SO, AND ROTATE
THE TOP LATCH (ROUND WITH A FLAT SECTION) DOWNWARD. RELEASE THE PANEL AND IT
WILL FALL ALL THE WAY FORWARD. THERE IS USUALLY A LARGE AMOUNT OF WIRE AND
EXTRA TERMINALS. THE TEST-SETS ARE OFTEN HIDDEN HERE, SO DONT OVERLOOK IT (400
FOOT ROLLS OF #22 SOLID WIRE ARE OFTEN NEAR THE TOP IN THE BACK OF THE BOX.
'BORROW THEM'). ON THE RIGHT DOOR IS A METAL BOX OF INSULATORS, BINDERS, CLIPS,
ETC. TAKE A FEW (COMPLIMENTS OF BELL...). ON EACH DOOR IS A USEFUL ROUND METAL
DEVICE. (SAYS 'INSERT GENTLY' OR 'CLAMP GENTLY - DO NOT OVERTIGHTEN' ETC..) ON
THE FRONT OF THE DISC, YOU SHOULD FIND TWO TERMINALS. THESE ARE FOR YOUR TEST
SET. (IF YOU DONT HAVE ONE, DONT DEPAIR -I'LL SHOW YOU WAYS TO MAKE BASIC TEST
SETS LATER IN THIS ARTICLE). HOOKING THE RING (-) WIRE TO THE 'R' TERMINAL; AND
THE TIP (+) WIRE TO THE OTHER. (BY THE WAY, AN EASY WAY TO DETERMINE THE
CORRECT POLARITY IS WITH A 1.5V LED. TAP IT TO THE TERM. PAIR, IF IT DOESNT
LIGHT, SWITCH THE POLES UNTIL IT DOES. WHEN IT LIGHTS, FIND THE LONGER OF THE
TWO LED POLES. THIS ONE WILL BE ON THE TIP WIRE (+)) BEHIND THE DISC IS A
COILED UP CORD. THIS SHOULD HAVE A SPECIALIZED CONNECTOR. ITS VERY USEFUL,
BECAUSE YOU DONT HAVE TO KEEP CONNECTING AND DISCONNECTING THE FONE (TEST SET)
ITSELF, AND THE CLIP IS DESIGNED TO AID IN LOCATING THE PAIR AND ASSURING THE
CORRECT POLARITY.
ON THE TERMINAL BOARD, THERE SHOULD BE ABOUT 20 PAIRS (RED/WHITE) PER ROW
PER SIDE. HOOK THE CLIP TO ANY TERMINAL PAIR, AND YOU'RE SET! DIAL OUT IF YOU
WANT, OR JUST LISTEN (IF SOMEONE'S ON THE LINE). LATER, I'LL SHOW YOU A WAY TO
SET UP A TRUE 'TAP' THAT YOU CAN SETUP, AND WILL LET THE PERSON DIAL OUT ON HIS
LINE AND RECEIVE CALLS AS NORMAL, AND YOU CAN LISTEN IN THE WHOLE TIME. MORE
ABOUT THIS LATER...
ON MAJOR PREFIX-AREA BRIDGING HEADS ('SAI' FOR AREA C.O. FEEDER CABLE) YOU
CAN SEE TEMPORARY 'LOCAL LOOPS', WHICH ARE TWO CABLE PAIRS (CABLE PAIR =RING +
TIP, A FONE LINE) THAT ARE DIRECTLY CONNECTED TO EACH OTHER ON THE TERMINAL
BOARD. THESE 'CHEAP LOOPS' AS THEY ARE CALLED, DO NOT WORK NEARLY AS WELL AS
THE EXISTING ONES SET UP IN THE SWITCHING HARDWARE AT THE EXCHANGE OFFICE. (TRY
SCANNING YOUR PREFIXES' 00XX OR 99XX #'S. THE TONE SIDES WILL ANNOUNCE
THEMSELVES WITH THE 1000 HZ LOOP TONE, AND THE HANG SIDE WILL GIVE NO RESPONSE.
THE FIRST PERSON SHOULD DIAL THE 'HANG' SIDE, AND THE OTHER PERSON DIAL THE,
TONE SIDE, AND THE TONE SHOULD STOP IF YOU HAVE GOT THE RIGHT LOOP). THE LOOPS
ARE USED IN FRAME TERMINATION AND IN SONIC/600 OHM TERM. TESTING AND
LINE/CABLE/FEEDER LOCATION.
IF YOU WANT TO FIND THE NUMBER OF THE LINE THAT YOU'RE ON, YOU CAN EITHER
TRY TO DECIPHER THE 'BRIDGING LOG' (OR WHATEVER), WHICH IS ON THE LEFT DOOR. IF
THAT DOESNT WORK, YOU CAN USE THE FOLLWING:
---
ANI # (AUTOMATIC NUMBER INDENTICATION)
---
THIS IS A TELCO TEST NUMBER THAT REPORTS TO YOU THE NUMBER THAT YOU'RE
CALLING FROM (IT'S THE SAME, CHOPPY 'BELL BITCH' VOICE THAT YOU GET WHEN YOU
REACH A DISCONNECTED #) (PIP OR ONE OF THE 11X SERIES ANNOUNCE MENT FRAME
MACHINES.)
FOR THE 213 NPA - DIAL 1223
213 NPA - (GTE AREAS) DIAL 114
408 NPA - DIAL 760
914 NPA - DIAL 990
THESE ARE EXTREMELY USEFUL WHEN MESSING WITH ANY KIND OF LINE TERMINALS,
FEEDER BOXES, ETC.
WHEN FINISHED, BE SURE TO CUT OFF THE CONNECTOR AND TAKE IT WITH YOU (THEY
ARE VERY HANDY), AND CLOSE/LATCH THE BOX TO AVOID SUSPICION.
"CANS" - AERIAL-MOUNTED (TELEPHONE POLE TERMINAL) BRANCH FEEDER CABLE
SPLITTER.
----
BASICALLY, TWO TYPES:
1> MS3A SERVICE AREA INTERFACE. (LARGE, RECTANGULAR SILVER BOX AT THE END OF
EACH STREET.)
2> SERIES 600 LOADING COIL, INCLUDES THE MSX AERIAL DROP SPLITTER. (BLACK,
ROUND OR RECTANGULAR THING AT EVERY TELEPHONE POLE.)
TYPE 1 - THIS IS THE CASE THAT TAKES THE UNDERGROUND CABLE FROM THE BRIDGER
AND RUNS IT TO THE AERIAL BRANCH FEEDER CABLE (THE LOWEST, LARGEST WIRE ON THE
TELEPHONE POLE). THE BOX IS ALWAYS ON THE POLE NEAREST THE BRIGING HEAD, WHERE
THE LINE COMES UP. LOOK FOR THE 'CALL BEFORE YOU DIG - UNDERGROUND CABLE'
STICKERS..
THE CASE BOX IS HINGED, SO IF YOU WANT TO CLIMB THE POLE, YOU CAN OPEN IT
WITH NO PROBLEMS. THESE USUALLY HAVE 2 ROWS OF TERMINAL SETS. (TOTAL APPROX.
200-600 PAIRS, DEPENDING ON THE AREA.) THESE ARE ALL THE CABLE PAIRS FOR YOUR
STREET. (ITS SIMILAR TO A MINIATURE BRIDGING HEAD). USE/ABUSE IT IN THE SAME
MANNER AS WE DID BEFORE. (NOTE: ALL THE ACTIVE LINES CARRY FROM 15 TO 48 VDC,
AND EVEN 90VAC (WHEN RINGING), SO BE CAREFUL - IT'S NOT GOING TO HURT YOU,
BUT IT CAN SURPRISE YOU (AND IF YOU'RE HANGING BY ONE HAND FROM A TEL. POLE, IT
>CAN< BE HARMFUL!))
OH, BY THE WAY, IF YOU USE ANI ON EVERY PAIR AND YOU FIND ONE THAT ISNT IN
USE ON YOUR STREET, YOU CAN HOOK IT UP FOR YOURSELF (ALMOST). ALSO, YOU HAVE TO
BE ABLE TO IMPERSONATE A TELCO TECHNICIAN AND REPORT THE NUMBER AS 'NEW ACTIVE'
(GIVING A FAKE NAME AND FAKE REPORT, ETC) I DONT RECOMMEND THIS AND IT PROBABLY
WONT (ALMOST POSITIVELY WONT) WORK, BUT THIS IS BASICALLY WHAT TELCO LINEMEN
DO).*
* THE USE OF THE 'TEST BOARD' (A 7D# FOR LINEMEN TESTS, OFTEN FOUND
NXX-0003 OR NXX-0004) IS BEYOND THE SCOPE OF THIS ARTICLE, BUT WILL BE COVERED
IN A FUTURE ARTICLE.
TYPE 2 - THIS IS THE SPLITTER BOX FOR THE AERIAL DROP WIRES FOR THE GROUP OF
HOUSES AROUND THE POLE. (USUALLY 4 OR 5 HOUSES). USE IT LIKE I MENTIONED
BEFORE. THE TERMINALS (20 OR SO) WILL BE IN 2 HORIZONTAL ROWS OF SETS. THE
EXTRA WIRES THAT ARE JUST 'HANGING THERE' ARE PROVISIONS FOR EXTRA LINES TO
RESIDENCES (1 EXTRA LINE PER HOUSE, THATS WHY THE INSANE CHARGE FOR LINE #3).
IF ITS THE BOX FOR YOUR HOUSE ALSO, HAVE FUN AND SWAP LINES WITH YOUR NEIGHBOR!
'PIGGYBACK' THEM OR USE A CHEESEBOX FOR A LOOP-AROUND, ETC. AGAIN, I DONT
RECOMMEND THIS, AND ITS DIFFICULT TO DO IT CORRECTLY. (ALTHOUGH USEFUL)

View File

@@ -0,0 +1,208 @@
Automatic Phone Recorder
by
Atomic Punk
May 1, 1989
This device will allow any standard cassette tape recorder the
ability to automatically record phone conversations. The device
will start the tape recorder when the phone handset is lifted and
stop the recorder when the handset is returned to the cradle.
The device is a DC switch that is normally on via the forward
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
biasing its complement well into a saturated state via R4. The
DC switch is turned off via a negative voltage above that of the
Zener (D1). This voltage is usually about 48 volts and is the on
hook value of the phone line. This negative voltage over rides
the effect of R3 and keeps the circuit off. When the phone is
off the hook, the 48 volts drops to 10 volts, which is below the
[more]
zener voltage of D1, and R3 now turns the circuit on. Audio
signal is via attenuator resistor R1 and DC isolating capacitors
C1 and C2.
This device is really only a high impedance switch that isolates
the recording controlled device from the phone line via some
simple electronic circuitry. It requires no battery and obtains
power for operating from the remote jack that in most recorders
is a source of 6 volts. When the remote jack is grounded,
recorder operation starts, and when the grounding condition is
removed, recorder operation stops.
Parts list: Here's all you need:
Name Qty Description
R4 1 220 ohm 1/4 watt resistor
R3 1 39k ohm 1/4 watt resistor
R1 & R2 2 100k ohm 1/4 watt resistor
C1 & C2 2 0.01 mfd/ 50V disc cap.
Q2 1 PN2222 NPN Silicon
Q1 1 PN2907 NPN Silicon
[more]
Z1 1 15 volt Zener diode
P1 1 Sub-mini plug 2.5mm dia.
CL1 & CL2 2 Alligator clips
P2 1 Mini-Plug 3.5mm dia.
Enclosure 1 Suitable enclosure for device
PB1 1 1.25x1.67 perfboard
WR4 (18") #24 hook-up black wire
WR3 (18") #24 hook-up red wire
Casto Castolite or paraffin wax
[more]
Circuit Diagram
Red wire
----------|---------Z1--------|--------------------|--------|----------
| | | |
Green | | | |
-----| | | | |
| | | | |
| | | e |
| | | | |
| | R3 |-----R4---b-Q2 |---P1
| | *No connection* | | | |To remote
| | | c c |of
| *|* | | | |recorder
|--- | ------------------|-----b-Q1 | |
| | | | |
| | e | |
| | |------------|--------|
| |
| | C1
[more]
| |----------------------------3 3-----------------|
| |
| |---P2
| C2 |To Aux
|--------------R1-----------------3 3-----------------|on
Recorder
** Green and Red wires go to corresponding color of telephone wires.
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
with the wires facing toward you and flat side up.
- c is the located on the upper right hand side
- b is the next wire left of c
- e is the next wire left of b
Anyway that concludes this circuit. Now you'll be able to
monitor your phone line, and hear what goes on while you not
around.
**** Coming soon ******
How to safely build waterproof M-80s.
(>
(>
(>

Automatic Phone Recorder
by
Atomic Punk
May 1, 1989
This device will allow any standard cassette tape recorder the
ability to automatically record phone conversations. The device
will start the tape recorder when the phone handset is lifted and
stop the recorder when the handset is returned to the cradle.
The device is a DC switch that is normally on via the forward
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
biasing its complement well into a saturated state via R4. The
DC switch is turned off via a negative voltage above that of the
Zener (D1). This voltage is usually about 48 volts and is the on
hook value of the phone line. This negative voltage over rides
the effect of R3 and keeps the circuit off. When the phone is
off the hook, the 48 volts drops to 10 volts, which is below the
[more]
zener voltage of D1, and R3 now turns the circuit on. Audio
signal is via attenuator resistor R1 and DC isolating capacitors
C1 and C2.
This device is really only a high impedance switch that isolates
the recording controlled device from the phone line via some
simple electronic circuitry. It requires no battery and obtains
power for operating from the remote jack that in most recorders
is a source of 6 volts. When the remote jack is grounded,
recorder operation starts, and when the grounding condition is
removed, recorder operation stops.
Parts list: Here's all you need:
Name Qty Description
R4 1 220 ohm 1/4 watt resistor
R3 1 39k ohm 1/4 watt resistor
R1 & R2 2 100k ohm 1/4 watt resistor
C1 & C2 2 0.01 mfd/ 50V disc cap.
Q2 1 PN2222 NPN Silicon
Q1 1 PN2907 NPN Silicon
[more]
Z1 1 15 volt Zener diode
P1 1 Sub-mini plug 2.5mm dia.
CL1 & CL2 2 Alligator clips
P2 1 Mini-Plug 3.5mm dia.
Enclosure 1 Suitable enclosure for device
PB1 1 1.25x1.67 perfboard
WR4 (18") #24 hook-up black wire
WR3 (18") #24 hook-up red wire
Casto Castolite or paraffin wax
[more]
Circuit Diagram
Red wire
----------|---------Z1--------|--------------------|--------|----------
| | | |
Green | | | |
-----| | | | |
| | | | |
| | | e |
| | | | |
| | R3 |-----R4---b-Q2 |---P1
| | *No connection* | | | |To remote
| | | c c |of
| *|* | | | |recorder
|--- | ------------------|-----b-Q1 | |
| | | | |
| | e | |
| | |------------|--------|
| |
| | C1
[more]
| |----------------------------3 3-----------------|
| |
| |---P2
| C2 |To Aux
|--------------R1-----------------3 3-----------------|on
Recorder
** Green and Red wires go to corresponding color of telephone wires.
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
with the wires facing toward you and flat side up.
- c is the located on the upper right hand side
- b is the next wire left of c
- e is the next wire left of b
Anyway that concludes this circuit. Now you'll be able to
monitor your phone line, and hear what goes on while you not
around.
**** Coming soon ******
How to safely build waterproof M-80s.

View File

@@ -0,0 +1,40 @@
File: BUG DETECTION AT HOME
Read 24 times
Bug Detection on Home phones
(COURTESY OF DR JIMMY AND MR JIM)
First of all to test for bugs, you need a VOM (Multimeter) the higher the
impedance the better (a Digital with FET circuitry or a Vacuum Tube Volt Meter
is the best).
First disconnect the phone line(s) AT BOTH ENDS. Undo the phone instrument and
hook it up to the entry point of the phone line from the outside world (Ma Bell
does not like you cut her off completely.) The scheme is the physically
isolate your house, apartment, etc from the outside world. But before you do
this measure the line voltage (It should be approximately 48 Volts).
Now with the wires disconnected at both ee set your resistance scale to a high
reading and measure the resistance of the phone line, it should be very high on
the order of million ohms or more, this is the normal condition, since you
are measuring the resistance of an open circuit. If it is much less, say
50-100Kohms then you a device on the line that does not belong there, probably
a parallel bug.
Now twist the end of the disconnected wire and go to the other end and measure
the resistance of this. This resistance should be about one ohm or two at the
most in a big house with a lot of phones. If it is more, then you probably
have a series bug.
If in the first case, taking parallel measurements using a meter (not LED/LCD)
and you notice a "kick" in the needle, you probably have a line tap
Now if you also make a measurement with the wire end twisted together and you
notice the resistance reads about 1-2kohms, then you may have a drop-out relay.
A drop-out relay is a relay that senses a phone going off hook, and signals a
tape recorder to start recording.
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


Binary file not shown.

View File

@@ -0,0 +1,121 @@
Bugs on a Budget
Inexpensive surveillance
Data Line 8-85.
Post this phile as you will, but leave my name on it.
Gordon Liddy dreamt up an elaborate scheme for bugging the Democratic National
Headquarters. Included were such things as a type of UHF bug that required an
O-scope for the listeners to find, and other bugs that got power thru paint-on
electrical connectors. He was also financed out of a slush fund controlled by
the most powerful men in the nation.
I'm not that lucky. My money comes from a "Blue" collar job, so spending $5k
on a bug is laughable. Still, not getting the information I need because I
couldn't find any appropriate devices is just as silly. With a small bit of
skill, you can build a reliable intelligence collecting system for about $250.
1. FOR LIVE SETUPS. If it's important or your targets are just paranoid,
forget about phone taps. They may set up a meeting place on the line and that
is about it. Besides, you can do a huge amount of random eavesdropping with a
live collection system. You'll need a good cardioid mike element, amplifier,
and set of headphones. The most efficient way to go is to purchase a Hunter's
or Bionic Ear (See the Sources section at the end for locations). They run from
$50 to $90. Everything is included in a package that looks a lot like a metal
police flashlight. But to narror the collection angle, a parabolic dish is
essential. Don't get the one available with the Ear, it's small and you'll look
dumb using it. Instead, but ETCO's 18" dish for about $35. Bend 3 heavy wires
(e.g. welding rods) to grip the dish edge and syspend the Ear in the center. I
used a hose clamp to secure it. Rubber bands link he support rods at te rear of
the dish. Note: the focus is at a point intersected by the plane of the dish
and a line extending out from the plastic "pip" in te center. Since the dish is
transparent and the amp faces the target, the setup isn't too conspicuous from a
distance. The regular commercial reflector is black and quite obvious when in
use.
How good is the system? My hearing is below par and I was able to understand
whispers at 30m. The range you get may differ. In summer, crickets will drown
out a lot. Traffic and overhead jets can also do nasty things. Oh yes, there's
an automatic cutoff so if the target coughs, you won't have to pick up your
eardrums from the ground.
2. VISUAL SURVEILLANCE. Sometimes this is all you need, but mostly it
complements the audio. Forget the 17x80 monster binoculars you saw in Soldier
of Fortune. If a gnat on your arm farts, the scene will jump. Instead save a
lot of money and get one or two more suitable pieces of equipment. One is a
good pair of 7x50 binoculars. Buy from a wholesale place in Shotgun News and
save big. These can be used well at night because of their large objective
size. Some like a zoom feature, but I find it raises price and at these powers
isn't needed.
Personally, I like to get further away and stay stationary for as long as
possible. Of course the parabolic setup is no good for audio at such a range
(100 to 300m). Oddly, I've never felt handicapped by not being able to hear the
action. You'd be surprised what lipreading and nonverbal cues you can pick up
with a little practice. I use a 20-60x60mm. spotting scope. It comes mounted
on a tripod for flat surface use, but I find a photographers C-clamp tripod is
handier for using on car windows. In daylight nothing can come close to this
system. It's less than 1/2m long and at 60x it's actually easy to reas
newspaper headlines at 1Km or so. After all, these things were meant to spor
bullet holes in targets at up to 500m and the cheapest low power spotter will do
that with no problem. Just how much is 60x ? Well, most rifle scopes are 4x,
binoculars are typically 7x, and the classic sniper scopes (Unertl and
Leatherwood) are only 10x. Just look through one at a sporting goods store and
you'll see what a deal these are. Astronomy-type telescopes usually are too
big, show an upside-down image, and have too much magnification for their
objective size, making the view too dark.
In fact, at night the spotter is a bit dim even at only 20x. Nothing's
perfect.
3. WIRELESS. Here's the area most people immediately go for and sometimes
get suckered real bad. Worst are "Law Enforcement Supply" places. Some sell to
anyone with a letterhead. For the money they charge, it actually makes no
difference who you are; besides it's YOU who will get nailed for impersonating a
cop if THEY decide to turn you in. One of these joints advertises in Soldier of
Fortune and chagres $10 for their catalog. Its full of neat shit, all at least
5x over what anyone else could even think of charging. ETCO, on the other hand,
sells lots of transmitters for "wireless mikes". They also sell cheap mike
elements. Hmmm. For $25 you can build a workable unit. Nothing Harry Call
would be caught using, but usable nonetheless. Those little wireless mikes you
see in the backs of magazines shown next to a paper clip are really quite good,
but make sure they use the Mercury batteries. Even Alkalines will crap out
after a few hours of constant transmitting.
Those and most inexpensive transmitters work in the Commercial FM Band. The
good news is that you don't need a VHF receiver to pick them up, a regular FM
set does fine. Unfortunately, the same goes for the target. The best way out
is to find a station at either end of the band (88 or 108) that the target isn't
likely to listen to. In St. Louis it's KMJM at 107.7, an all Black station
(assuming the target is a WASPish businessman or a rocker) . Set your bug to
transmit on top of the station, and get in REAL CLOSE with your receiver. Since
it's at the end of tha dial, he/she isn't likely to tune past it and get a jolt
of audio feedback.
Finally, a bit of common sense. Wireless equipment should not take up a large
portion of your budget. It's hard to place, risky to maintain, and will be
destroyed if found. Also, the cops sort of look down on this sort of thing to
the tune of Federal time. Watergate did a lot to influence that. Don't be a
putz and try to break in a place to recover a $40 transmitter. Consider them
disposable and you may stay free.
4.GETTING IT DOWN. Buy a Voice-activated (VOX) microcassette. It'll free you
up for more important stuff than listening to silence or irrelevant bullshit.
Especially with transmitters, a lot of time is just wasted. Live monitoring is
fun... for fifteen minutes. A good unit is the Panasonic RN 109A at about $50.
It'll record 1 hour per side at low speed. With the VOX on, that's an hour of
solid sound. Use one on the parabolic dish, too. Replay through your stereo
and use the equalizer or tone controls to sharpen up the stuff you may have
missed the first time.
Stay tuned to this BBS for more philes from Data Line, the Old Man who taught
Donald Segretti how to rig his first election in college.
MCI Telex # 650-240-6356.


View File

@@ -0,0 +1,30 @@
IN ANSWER TO ALL THOSE WHO DON'T KNOW WHAT AN INFINITY TRANSMITTER IS, HERE
IS A LITTLE HISTORY:
A GUY BY THE NAME OF MANNY MITTLEMAN RAN A COMPANY CALLED THE WIRELESS GUITAR
COMPANY LOCATED ON LIBERTY ST. IN NY. ASIDE FROM WIRELESS GUITARS, MANNY ALSO
BUILT ALL SORTS OF ELECTRONIC WIRELESS "BUGS". ONE ITEM, THE INFINITY
TRANSMITTER WAS A DEVICE THAT WAS PLACED INSIDE AN UNSUSPECTING PERSONS
TELEPHONE. WHEN THE PHONE NUMBER OF THAT TELEPHONE WAS DIALED AND A CERTAIN
NOTE WAS BLOWN INTO THE PHONE FROM A HOHNER, KEY-OF-C, HARMONICA, THE BUGGED
PHONE DID NOT RING, AND WHAT'S MORE, ENABLED THE CALLER TO THEN HEAR EVERYTHING
SAID IN THE ROOM THAT THE PHONE WAS LOCATED IN. AS LONG AS THE CALLER WANTED
TO STAY ON THE PHONE, ALL WAS OPEN TO HIM OR HER. IF THE PHONE WAS LIFTED OFF
THE HOOK, THE TRANSMITTER WAS DISCONECTED AND THE "BUGGED" PARTY RECEIVED A
DIAL TONE AS IF NOTHING WAS WRONG WITH THE LINE.
REMEMBER, ALL THIS WAS CONSTRUCTED IN THE 1960x'S WHEN IC'S WERE NOT AS
COMMONPLACE AS THEY ARE TODAY. ALSO BEAR IN MIND THAT DURING THAT PERIOD IN
TIME, EVEN THE TELEPHONE COMPANY WAS NOT QUITE SURE ON HOW WELL OR HOW PORTABLE
TONE DECODING WAS.
MY HAT IS STILL OFF TO TO MANNY MITTLEMAN, THE GREATEST DEVELOPER OF
TELEPHONE GIMMICKERY AND BUGGER OF HOTEL ROOMS IN DIVORCE CASES.
IF THERE IS ANY INTEREST ON BUGGING, I'LL BE GLAD TO LET YOU KNOW SOME MORE
OF MANNY'S STUFF.
PS. MANY GOVERNMENT AGENCY'S WERE SOME OF MANNY'S BEST CUSTOMERS.
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,96 @@
bugoph   phone.txt
Automatic Phone Recorder
by
Atomic Punk
May 1, 1989
This device will allow any standard cassette tape recorder the
ability to automatically record phone conversations. The device
will start the tape recorder when the phone handset is lifted and
stop the recorder when the handset is returned to the cradle.
The device is a DC switch that is normally on via the forward
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
biasing its complement well into a saturated state via R4. The
DC switch is turned off via a negative voltage above that of the
Zener (D1). This voltage is usually about 48 volts and is the on
hook value of the phone line. This negative voltage over rides
the effect of R3 and keeps the circuit off. When the phone is
off the hook, the 48 volts drops to 10 volts, which is below the
[more] zener voltage of D1, and R3 now turns the circuit on. Audio
signal is via attenuator resistor R1 and DC isolating capacitors
C1 and C2.
This device is really only a high impedance switch that isolates
the recording controlled device from the phone line via some
simple electronic circuitry. It requires no battery and obtains
power for operating from the remote jack that in most recorders
is a source of 6 volts. When the remote jack is grounded,
recorder operation starts, and when the grounding condition is
removed, recorder operation stops.
Parts list: Here's all you need:
Name Qty Description
R4 1 220 ohm 1/4 watt resistor
R3 1 39k ohm 1/4 watt resistor
R1 & R2 2 100k ohm 1/4 watt resistor
C1 & C2 2 0.01 mfd/ 50V disc cap.
Q2 1 PN2222 NPN Silicon
Q1 1 PN2907 NPN Silicon
[more] Z1 1 15 volt Zener diode
P1 1 Sub-mini plug 2.5mm dia.
CL1 & CL2 2 Alligator clips
P2 1 Mini-Plug 3.5mm dia.
Enclosure 1 Suitable enclosure for device
PB1 1 1.25x1.67 perfboard
WR4 (18") #24 hook-up black wire
WR3 (18") #24 hook-up red wire
Casto Castolite or paraffin wax
[more] Circuit Diagram
Red wire
----------|---------Z1--------|--------------------|--------|----------
| | | |
Green | | | |
-----| | | | |
| | | | |
| | | e |
| | | | |
| | R3 |-----R4---b-Q2 |---P1
| | *No connection* | | | |To remote
| | | c c |of
| *|* | | | |recorder
|--- | ------------------|-----b-Q1 | |
| | | | |
| | e | |
| | |------------|--------|
| |
| | C1
[more] | |----------------------------<2D> <20>-----------------|
| |
| |---P2
| C2 |To Aux
|--------------R1-----------------<2D> <20>-----------------|on
Recorder
** Green and Red wires go to corresponding color of telephone wires.
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
with the wires facing toward you and flat side up.
- c is the located on the upper right hand side
- b is the next wire left of c
- e is the next wire left of b
Anyway that concludes this circuit. Now you'll be able to
monitor your phone line, and hear what goes on while you not
around.
**** Coming soon ******
How to safely build waterproof M-80s.
(>

View File

@@ -0,0 +1,48 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% BUGS & %
% HOW TO TAP SOMEONES ROOM %
% %
% BY ---> *$> FIREBALL <$* %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
HAVE YOU EVER HAD A STRONG DESIRE TO KNOW WHAT BOY YOUR OLDER SISTER LIKES
OR HOW YOUR PARENTS SEX LIFE IS GOING, WELL NOW YOU CAN KNOW ALL BY
BUGGING THERE ROOMS!
THE FIRST THING YOU CAN USE IS THE WIRELESS MICROPHONE FROM RADIO SHACK-
$6.99. IT IS DESIGNED TO PUT VOICES ON TO AN FM RADIO BUT NO ONE SAYS YOU
CAN'T HIDE IT AND LET IT PICK UP UNSUSPECTING PEOPLE....FIRST TUNE THE
MICROPHONE WITH ANY BLANKSPOT ON YOUR FM RADIO (DON'T WORRY IT WILL
EXPLAIN HOW TO TUNE IT ON THE BACK OF THE PACKAGE.) ....THEN HIDE IT WHEN
NO ONE IS AROUND (WHEN HIDING THE MICRO- PHONE TALK INTO IT AS YOU'RE
WALKING TO MAKE SURE YOU HAVEN'T WALKED OUT OF IT'S RANGE.)
THERE ARE, HOWEVER, 2 DISADVANTAGES TO USING ONE OF THESE MICROPHONES:
1) YOU CAN ONLY PUT IT IN A ROOM THAT
IS RIGHT NEXT TO YOUR ROOM AND ONLY
ONE WALL CAN SEPERATE THEM.
2) THE MIKE IS 8 INCHES LONG AND THE
ONLY DECENT HIDING PLACES FOR SOMETHING
THAT BIG IS UNDER A BED OR IN A CLOSET.
(YOU MAY WANT TO TAKE IT APART TO MAKE
IT SMALLER BUT I DONT RECCOMMEND DOING
THIS.)
ANOTHER THING YOU CAN USE IS THE CLIP ON WIRELESS MIKE BY RADIO SHACK FOR
ABOUT $18. IT WORKS IN BASICLY THE SAME WAY EXCEPT IT IS VERY SMALL AND IT
WILL WORK THE DISTANCE OF YOUR HOUSE AND POSSIBLY EVEN YOUR NEIGHBORS
HOUSE.
HAVE PHUN...I SURE DID!!
STORE MANAGER.
CALL THE UNDERGROUND AT:
201-223-64 CALL THE BASEMENT:HEAD UNDERGROUND
BBS AT......201-223-6404....
Downloaded from Just Say Yes. 2 lines, More than 500 files online!
Full access on first call. 415-922-2008 CASFA

View File

@@ -0,0 +1,118 @@
This file Presented by METRONET system (301)-944-3023 The bug's that this
device detects are Infinity transmitters, read the Infinity transmitter
bulletin for more info.
::::::::::::::::::::::::::::::::::::::
: :
: How to build a Bug Detector :
: :
: by :
: :
: The Gremlin :
: :
::::::::::::::::::::::::::::::::::::::
Warning: This formatted for 80 column and upper/lower case capabilities...
][][][
Basic theory
][][][
Because most bugs are triggered through certain frequencies, it is very simple
to build a small sweeping device that will trigger any bug present. The two
IC's are what create the oscillating tone. The IC1 operates at .8 Hz where the
IC2 runs at about 10 Hz. Frequency is determined by this formula:
f=1.44/(R1+2R2)C)
f measured in Hertz, R in megohms, and C in microfarads
The oscillation can be varied by the voltage placed upon pin #5. This is how
we create the wave sound. When voltage goes up, so does the frequency, and
vice-versa.
Normally, the output pin 3 is a square wave. Since we need varying wave at pin
#5, we need a triangular wave. We get this through integrating the square wave
created at pin #3 of IC1. It is acheived by D1, D2, R3, R4 and C2.
This varying output is fed into the phone line by transformer T1 which has an 8
ohm winding going to pin #3 of IC2 and the 500 end to a 0.1 microfarad capaci-
tator at the phone line.
Enuf talk..let's get movin!
][][][
Schematic Design
][][][
+9v
__________|_____________________________
| _|__|_ _|__|_ |
R1 | 4 8 | _|<D1__R3__ | 4 8 | R5
| | | | | | | |
+-----+2 3+---+ +-+5 2|--+----+----+
| | | |_>|R2__R4__| | | | |
R2 | ic1 | | | ic2 | R6 D3
| +-+6 | ___| | 6+-+ | V
| | | | | | | | | -
+---+-+7 | | +--+3 7+-+-----+----+
| |___1__| | | |___1__| |
| | | | | C4
| | | | | ^
C1 | C2 T1 _|_._C3|(_. |
^ | ^ 8--500<_|_. |
|_________|______________|__|______|__________|
|
-G-
][][][
Parts List
][][][
C1 10-uF electrolytic capacitator 25 WDVC
C2 300-uF electrolytic capacitator 25 WDVC
C3 0.1-uF capacitator
C4 0.068-uF capacitator
D1-D3 1N914
IC1,IC2 555 timers
R1, R4-R6 1-kilohm resistors
R2 91-kilohm resistor
R3 22 kilohm resistor
T1 500-to-8 ohm audio output transformer
][][][
Construction
------------
When building this unit, it is very useful to use a breadboard or vector board.
I suggest that leads being connected to phone line (T1, C3) end in a jack or a
modular connector to make the hookup easier. To test it, hook it to the phone
line (not the suspected line) and call the line you suspect is being bugged.
The party you are calling should not answer the phone. Now, the unit is
activated. 3 times, every 4 seconds, the oscillator will go up to 10 kHz and
back down again..like a bell curve..If there is a frequency sensitive bug on
the line, the phone will stop ringing, and you will be able to hear everything
said in the room. If the phone keeps ringing, chances are that all is
fine..unless the bug requires a multi-frequency trigger..but these are very
rare..
So, we can see that 415-BUG-1111 really does work! It creates the tone..any
click heard is the Phone Co's (or whoever is bugging) speaker/tape recorder
picking up!
Have phun, and hope it helped!
The Gremlin
...call the Gremlin's Lair..201-536-7794..today!...
[Thanks again Metronet!]
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,133 @@
NOTES ON RECORDING CALLER ID signals ....(AND VOICE NOTES)
There have been a number of people who have complained that caller
id is not working perfectly in their area. I have been working
with ZyXEL to try to get it and distinctive ring working perfectly.
It now does work in most of Canada and the US.
Caller id works great combined
with distinctive ring.
I enjoy such features as, if the modem encounters a busy bbs, it
sets distinctive ring to answer a CALL return (another feature
from the phone company), then answers in originate mode. Thus you
can make contact with the bbs at the first opportunity after the
line clears, and not have your modem be disturbed by other calls.
For those (hopefully few) people who still have problems with
caller-id, here is a simple way to get information to allow
these problems to be resolved more quickly. In the past I circulated
a circuit to do this.
However, thanks to the new voice features, there is an easier way.
The idea is to record the ring/callerid signalling on a voice file
which can then be listened to, and uploaded to the engineers
if necessary. This also allows the cadence of the distinctive ring
to be measured if necessary.
It is REALLY simple to do also and is fun because you can even
listen to the signal and get a bit of an idea what might be wrong,
even without sending in the file. It is also instructive to
write a little voice display program to become more familiar with
this format-- since the signals are predictable, monotonic, and
thus relatively easy to analyse with a simple program.
One of the problems is that some exchanges do not seem to follow
the Bellcore specs for callerid. The way it is supposed to work,
is that after the first complete ring (or distinctive ring)
stops, there is a 500 ms
pause, then a 250 ms section of "continuous"
U characters sent (called a channel seizure signal), then a 150 ms
section of mark sent, then the data. A simple number will take
about 200 ms further. Then silence reigns until the next ring.
Now the tones used are 1200 hz for the mark or 1 bit, and
2200 for the space or 0 bit. Data is sent at 1200 baud in
an asychronous mode. (this is called bell 202 standard).
Now the The U character is interesting in that it is 1 bit on ,
one bit off.
Thus when it is being sent in a continuous mode, it also looks
like 250 ms of the frequency shift keying signal shaped as
a 600 hz square wave. What does this mean?? it means that
it sounds like a quarter second of 600 hz tone.
So you should hear a ring, a 1/2 second of silence, a 1/4 second
of 600 hz (fundamental) tone, and then a quarter second
of 1200 hz tone-- followed by a short blast of a higher note.
What can go wrong?? 1st, one problem is that some switches don;t
have a proper pause. you might get the U's not sent continuously
which might sound like a lower note. Third the mark might not
be long enough. next the frequencies may not be correct.
The data can come slowly--with up to 2 characters of mark
signals between data. (according to the spec). Thus you can
give ZyXEL some information without sending the file. Your local
exchange sends all these notes (they are not sent from long distance),
so they are not attenuated very much.
Please also try to find out what kind of switch the exchange has. This
information can often be obtained from 611 repair service from a
nice teckie. Another interesting thing is some of these switches have
more than one way caller id can be sent. They may just be set to
do it the non compliant way!! perhaps the technical people do not
know they have a choice.
Once you have the voice file,
Another crude way of timing, is to use a hex editor, and lop off pieces
from the end of the file (checking for the shielded code--and
preserving shielded data--make sure the file is properly terminated).
this way you can listen do some timing
by looking a t the size of the lopped off file. You can even look
at the raw data, and get the idea which area you are in. (espec
in 2 bit mode).
A less crude way, is to write a little program-- hey and what better
way for all you folks wanting to write a voice mail system to
force yourself to get started!. You can convert the voice file
into one readable by some of the standard voice/oscilloscope
sound blaster type programs. so you can see it on your screen.
The idea is to find out what went wrong, tell ZyXEL and provide
a backup recording.
Now-- you may ask,, how do I get started. WELLL,, there is
a little trick. You need to read the signals without actually
answering the line. The best way to do this is to fool the
phone company into thinking you have not answered the line.
One very easy way to do this is to get a capacitor and put it
in series with the line. I found a .68 microfarad 400 volt
non polarized (ie no + on one of the terminals)
capacitor (eg from radio shack).--just a cheap
mylar capacitor (could even be 200 volts). (but
.22 - 4 microfarad also seemed to work). and put it
in series with the line. ONe easy way to do this is to modify
your wall plug (which has screws ). Unscrew one red wire,
and put a capacitor in series with it and the other red wire
formerly going to the same terminal. You may want to leave
an extension phone plugged in on another outlet so you can
hear the ring (and answer any calls you get while playing).
Now bring up your zfax and select the voice utilties. pick
record voice and select the telco line. then before starting
the recording by pushing enter on the OK message,
have someone dial your phone. press enter about the time they
have finished dialing your phone. This will creat a nice short
voice file. PUSH ESCAPE as the second ring starts. This
should create a nice 30k file or so with all the info on it.
Then play back the voice and start analysing. You should be
able to hear it as well as a regular call on your internal
modem speaker. The ring will sound like a blast of sound--but
not too loud and you should hear a beat of nothing (.5 sec) then
beeep(600hz,1/4 sec) beep (1200hz 1/8 sec) bep (1800-2400hz 1/16 sec).
I am interested in any voice software people do also. Please
send me a note if you have some success. I would also love to
supply you with a ZyXEL modem, esp if you are in Canada.
(I can provide extra callerid software also)
George Vande Bunte PENG
OCOMP
416 5341508 gvb@telly.on.ca
238 Davenport Rd. Toronto m5r1j6
Please keep whole file together.

View File

@@ -0,0 +1,67 @@
==)--- P TO PAUSE S TO STOP ---(==

+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
* *
+ THE CALL WAITING TAP +
* *
+ WRITTEN BY: The Byte +
* *
+ DISTRIBUTED BY: Marauder +
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*
So, you have an enemy who talks behind your back, eh? Or, maybe you just
would like to "listen" in on your friend's conversations? Well, if you have
2 phone lines and call waiting on one of them, you are in luck. (Only one
prob|em: your friend must also have call waiting!)
Procedure:
[1] Call up your friend with the phone you want to listen with. When he
answers call waiting (he's already on the phone, and you are the 2nd
caller), then you either sit there or say: sorry, I have the wrong #.
[2] Next, you wait until he goes back to the other line (puts you on hold).
[3] Then, pick up your other line and call ->YOUR<- call waiting.
[4] Answer call waiting
[5] Then go back to him. (Answer, and then click back.. Click ->2<- times
Answer, and go back..)
[6] Hang up your second line
[7] You are now on the line!
[8] Listen and be Q U I E T ! He can hear you!
Techniques I use to prevent noise or confusion:
If you have call forwarding, turn it on and forward calls somewhere
before you start listening. If a call comes through on your call waiting
circuit, the people talking (your buddie and his pal) will not hear
anything, but after you answer call waiting and come back, they will
hear the other call hang up (two clicks). If you don't have call forwarding,
I suggest you get it if you are going to make a habit of this, because it
will become a major pain in the ass. When your call waiting rings, you are
removed from the "listening" conversation and placed back on his hold
circuit. In order to get back on, you must answer the phone and wait for
your party (when you answer the phone, tell the guy you are in a hurry and
you have to go or you'll call him back later or something) to hang up. When
he or she hangs up, you will be back on the conversation. Then, one of your
pals will say: What was that? (because of the clicks).. So, try to use call
forwarding if you can. Remember: Have fun, and don't abuse it. I am not sure
about it, because I just discovered it. It is illegal (what isn't these days)
because it is "invading privacy". I don't know if the phone company just did
not realize there was a flaw in it, or that was planned for line testing, I
am not sure. Have fun!
-THE BYTE
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[ Be careful and remember in no way ]
[ am I responsible for your actions ]
Uploaded to P-80 by John Tynes
  'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS

View File

@@ -0,0 +1,117 @@
<The Restaurant at the End of the Universe 609/921-1994 10Meg/BBS/AE/Catfur>
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
)( How To Listen In On Cordless Telephone Conversations )(
)( )(
)( An Original 'Phile' By: Beowulf )(
)( )(
)( Call The Outhouse BBS 201-756-9575 )(
)( )(
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
Have you ever wanted to know what your brother/sister/parents/ friends/enemies
were saying as they hid somewhere, cordless phone in hand? With this phile, now
you can! Just follow the simple instructions outlined inside.
First some information about cordless telephones:
The original cordless telephones (1978-about late 1983) were made to be used
on the 1.6 to 1.8 MHz band. If you will notice, 1.6 MHz is also the top end of
the AM broadcast band. These phones operate on AM (just like the radio
stations) and use the wiring in your house for an antenna. The power of these
phones is 1/10 of a watt in most cases, or about 1/50th of the power that your
average CB radio will put out. So, not having a lot of power, it is tough to
hear these phones. You know how they say '500 foot range'? Sure, that's the
range of the handset to the base, but not of the signals emitted by the base!
Which means that on good nights you can hear them for many miles (I live in NJ
an have heard telephones VERY loudly from NY City, 35 MILES away!).
The newer phones, however, are not as easy to hear. They operate on FM on the
49 MHz band, which is the same frequency which your little walkie-talkies that
you loved as a ten year old operate on. These phones require a little bit more
effort to be heard than do the old ones (and a little $$$). Never fear,
however, because about 1 out of 10 phones is the old style, and they are still
being made and sold today.
How To Do It:
For the old style phones, you will need to get a pocket size AM transistor
radio. The one I used was an AM/FM Realistic (bought for $9 at Radio Shack).
There should be a small plastic box inside the radio. This little 'box' is the
VFO (Variable Frequency Oscillator) which controlls the frequency of the radio.
Now of course, you aren't going to have a digital frequency counter (they only
cost $400, so everyone should have at least two of them) so before you do
anything, turn on the radio and tune to the top of the band and find the station
which is closest to the top of the broadcast band. Write down the frequency so
you have something to compare to later.
Now, turn off the radio, get a small size screwdriver, and adjust the small
screw(s) on the back of the little plastic box. Don't turn them more than a
quarter turn at a time. Now, when you have done your first 'tweak' of the
screws, turn on the radio and see where that station at the top of the band is
now on the frequency dial. When you have gotten the station 150-200 kHz down
from where it was, (like if the frequency was 1600, get it down between 1400 and
1450), you are all set to recieve cordless telephones at the top end of the
radio! Note: this little 'trick' may not work as well on all radios, but it is
worth a try. If worse comes to worse, you can turn them back.
The ideal distance is a close to the base as you can get, but this sucker
should pull in signals from up to 500 feet away with no problem. Simply go near
someones house with this, and then have fun!
Another way: Another way to do this, if the VFO adjustment trick doesn't
work, is to adjust the small metal boxes that have little colored screws in
them. These are the tuning coils for the reciever circuit, and they affect the
frequency also. Another possibility is a combination of turning the VFO screws
and the coils to try to get the desired effect. Good Luck!
Now for the tough ones, the new phones. The new phones work on the 49 MHz
band. You are going to need one of the 'new' walkie talkies that operate on 49
MHz ===- FM -=== (the cheap shit ones are AM). If you decide to invest in one
at Radio Shack or similar store, make damn sure you get FM walkie talkies. If
you get AM, you're screwed, unless you have a friend who is killer into
electronics or ham radio who has the knowledge to convert AM to FM. (Yes, it
can be done. I have done it with CB's, and it is great for CB because no one
can understand what you are saying unless they have a FM-converted
CB.....Hmm.....that may be my next text phile...look for it!!) Anyway.....when
you get your FM walkie talkie, you can do one of two things:
A) You can play the adjust the coils trick as mentioned in the last article
(there is no VFO because walkie talkies are crystal controlled).
B) You can change the crystal. Popular frequencies for cordless phones are
49.830, 49.860 and 49.890 MHz. These crystals can be obtained from electronic
supply houses (like ones that sell chips for your Apple) for about $2 or less
each.
And that just about concludes this phile. There are two other shortcut
methods that can be used to bypass this mess and get you listening in right
away.
1) Get a general coverage receiver. They cover all frequencies from 100 kHz
to 30 MHz, and will provide you with 'armchair' reception because you can hook
up a monster antenna. (I have a 1964 vintage model that I got for $10 sitting
on my desk with a 600 foot long piece of wire for an antenna....boy, I know
everything in my neighborhood before the ladies start gossiping!)
2) If you play guitar or bass, and have a 'wireless' system for your guitar
like the Nagy 49R, you can hook up a 12 volt lantern battery and go prowling
around listening for the phones. (Bass rules!)
Method 1 only works on the old phones because of the frequency limitations of
the reciever, and method 2 is for new phones only because the 'wireless' systems
only work on 49 MHz FM.
Have phun with your new knowledge, and look for more philes from me in the
future (that CB FM is a good idea.....hmmmm...)
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
)( This has been on original phile by: Beowulf )(
)( Copyright June 1985 This file is for use on AE, Catsend, and )(
)( AE/BBS's only. )(
)( Call The Outhouse BBS 201-756-9575 24 hours a day! )(
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


Binary file not shown.

View File

@@ -0,0 +1,61 @@
Title: Bugging, detecting bugs
[ Detecting Bugs on Home Phones ]
[ By: Dr. Jimmy and Mr. Jim ]
FIRST OF ALL TO TEST FOR BUGS, YOU NEED A VOM (MULTIMETER) THE HIGHER
THE IMPEDANCE THE BETTER (A DIGITAL WITH FET CIRCUITRY OR A VACUUM TUBE
VOLT METER IS THE BEST).
FIRST DISCONNECT THE PHONE LINE(S) AT BOTH ENDS. UNDO THE PHONE INSTRUMENT
AND HOOK IT UP TO THE ENTRY POINT OF THE PHONE LINE FROM THE OUTSIDE WORLD
(MA BELL DOES NOT LIKE YOU CUT HER OFF COMPLETELY.) THE SCHEME IS THE PHYSI-
CALLY ISOLATE YOUR HOUSE, APARTMENT, FROM THE OUTSIDE WORLD. BUT BEFORE YOU
DO THIS MEASURE THE LINE VOLTAGE (IT SHOULD BE APPROXIMATELY 48 VOLTS).
NOW WITH THE WIRES DISCONNECTED AT BOTH ENDS SET YOUR RESISTANCE SCALE TO A
HIGH READING AND MEASURE THE RESISTANCE OF THE PHONE LINE, IT SHOULD BE VERY
HIGH ON THE ORDER OF MILLION OHMS OR MORE, THIS IS THE NORMAL CONDITION,
SINCE YOU ARE MEASURING THE RESISTANCE OF AN OPEN CIRCUIT. IF IT IS MUCH LESS,
SAY 50-100KOHMS THEN YOU HAVE A DEVICE ON THE LINE THAT DOES NOT BELONG THERE,
PROBABLY A PARALLEL BUG.
NOW TWIST THE END OF THE DISCONNECTED WIRE AND GO TO THE OTHER END AND
MEASURE THE RESISTANCE OF THIS. THIS RESISTANCE SHOULD BE ABOUT ONE OHM OR
TWO AT THE MOST IN A BIG HOUSE WITH A LOT OF PHONES. IF IT IS MORE, THEN
YOU PROBABLY HAVE A SERIES BUG.
IF IN THE FIRST CASE, TAKING PARALLEL MEASUREMENTS USING A METER (NOT LED/
LCD) AND YOU NOTICE A "KICK" IN THE NEEDLE, YOU PROBABLY HAVE A LINE TAP
NOW IF YOU ALSO MAKE A MEASUREMENT WITH THE WIRE END TWISTED TOGETHER AND YOU
NOTICE THE RESISTANCE READS ABOUT 1-2KOHMS, THEN YOU MAY HAVE A DROP-OUT
RELAY. A DROP-OUT RELAY IS A RELAY THAT SENSES A PHONE GOING OFF HOOK, AND
SIGNALS A TAPE RECORDER TO START RECORDING.
ANOTHER TEST TO DO WITH THE PHONES STIL HOOKED UP TO THE OUTSIDE WORLD, ON HOOK
VOLTAGE IS ABOUT 48 VOLTS AND OFF HOOK IS ABOUT 6-10 VOLTS. ANY OTHER CON-
DITIONS MAY MEAN TELEPHONE SURVEILLANCE
IF YOU USE A WIDE RANGE AUDIO FREQUENCY GENERATOR AND CALL YOU HOUSE, APARTMENT
ETC. FROM ANOTHER PHONE AND SWEEP UP AN DOWN TE SPECTRUM, AND YOU NOTICE THE
PHONE ANSWERS ITSELF SOMEWHERE IN THE SWEEP YOU PROBABLY HAVE AN INFINITY
TRANSMITTER ON YOUR LINE.
THE ABOVE INFORMATION TELLS NOTHING BUT TELCO TAPS AT THE CENTRAL OFFICE,
OR ANYWHERE ELSE ALONG THE LINE, BUT THIS INFORMATION MAY TELL YOU THAT YOUR
WIFE, GIRLFRIEND(BOYFRIEND), OR BUSINES ASSOCIATE MAY BE MONITORING YOUR PHONE
ACTIVITIES.
AN INFINITY TRANSMITTER,IS A NEAT DEVICE IT ALLOWS YOU TO CALL THE BUGGED PLACE
AND IT SHUTS OFF THE RINGER AND DEFEATS THE SWITCHHOOK, SO THE MOUTHPIECE NOW
BECOMES A ROOM BUG. IT WAS ORGINALLY SOLD FROM THE TRAVELLING BUSINESS MAN
TO MAKE SURE HIS WIFE WAS SAFE AT HOME NOT BEING ATTAKCED...
[ DETECTING PHONE BUGS - DR. JIMMY & MR. JIM ]
Downloaded From P-80 International Information Systems 304-744-2253

View File

@@ -0,0 +1,95 @@
MAD! PRESENTS...
A C-NET COMPATABLE MAD! FILE.
DETECTING LINE TAPS
PART #1
THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
RESPONSIBILITY FOR ANY OF ITS CONTENTS.
INTRODUCTION BY THE COMMODORE KID.
WITH THE FBI WATCHING US ALL THE TIME, YOU CAN NEVER BE SURE IF ITS SAFE TO SAY
SOMETHING. EVEN IF YOUR NOT INTO GOOD STUFF, ITS STILL NICE TO KNOW THAT YOUR THE ONLY
ONE ON THE PHONE. YOU DON'T WANT YOUR SISTER LISTENING IN ON YOU. IT IS ALSO WELL
KNOWN THAT ALOT OF THE MAJOR BBS'S ARE BEING MONITORED BY THE FEDS. WELL, WE HOPE
THAT THE INFORMATION PRESENTED HERE WILL ALLOW YOU TO FEEL SAFER ON YOUR TELEPHONE.
MOST TELEPHONE SURVEILLANCE DEVICES USED ON HACKERS NUMBERS ARE VERY SIMPLE. THEY
USUALLY SAVE THE GOOD STUFF FOR SPYS AND PEOPLE LIKE THAT. IT IS IMPOSSIBLE TO TELL
IF THE GOOD STUFF IS ON, BUT WE HAVE LISTED WAYS TO DETECT SOME OF THE CHEAPER MACHINES,
AND IN SOME CASES HOW TO SHUT THEM OFF OR SCREW THEM UP.
THE MLT-2. THIS DEVICE IS ONE OF THE MAINSTAYS OF BS (BELL SECURITY). ITS MAIN
WEAKNESS IS IN THAT GIVE TONES TO DO ITS OPERATION. A FRIEND OF MAD!'S IS CURRENTLY
WORKING ON A DEVICE HE PLANS TO CALL A PURPLE BOX THAT WILL DETECT THESE TONES. YOU
WILL JUST BE ABLE TO KEEP IT ON, AND IT WILL REPORT ON ANY SUCH TONES. WE WILL KEEP
YOU UPDATED IN FUTURE FILES. OK, IF THE MLT-2 IS IN MON (MONITOR) MODE, YOU CAN DO THE
FOLLOWING: A GOOD OLD LOUD 2600HZ WILL USUALLY SWITCH IT TO LOOP MODE. SOME TIMES A
7200 WILL EXECUTE A TT (DIAL MODE). THESE WILL GET THEM OFF YOUR BACK FOR A WHILE.
IF YOU OWN A MLT-2 ALSO, YOU CAN DAMAGE THE OTHER MLT-2. FIRST GET THE OTHER MLT-2 INTO
LOOP MODE. NOW WAIT TILL IT GETS TO LIN (TEST THE INSIDE PART OF THE LOOP). NOW DO
A K2. THIS WILL PUT THE MLT-2 INTO A STATE OF LIMBO. NOW TO FINISH UP, DO A MLT SOAK
TEST. THIS WILL PUT THE OFFENDING MACHINE OUT OF COMMISSION FOR A LITTLE WHILE. IF
YOU HAVE AN OMEGA BOX (NICE LITTLE THINGS), A FLAT TONE WILL PUT THE MLT-2 INTO A LRM
(FAST LOOP MEASUREMENT), THUS GETTING IT OFF YOUR LINE).
CONDUCTER TAGGER AND ANALYZER TEST.
THIS WILL SHOW YOU APPROXAMATLY HOW MANY PEOPLE ARE ON A LINE. FIRST YOU NEED TO HOOK
A VOLT/OHMS METER UP TO THE PHONE BOX IN YOUR WALL. HOOK THE LINE AND THE GROUND UP
TO THE RED AND GREEN WIRES. YOU CAN USE ONE MADE FOR IT, OR YOU CAN MODITY THE KIND
YOU USE TO CHECK BATTERYS BY PUTTING ALIGATOR CLIPS ON IT. NOW THE VOLT METER WILL RISE
AN FALL DEPENDING ON HOW MANY PEOPLE PICK UP THE PHONE, AND HOW GOOD THE CONNECTION IS.
IF YOUR SISTER PICKS UP THE PHONE, IT WILL FALL. IT PICKS UP OPERATORS, AND WHATEVER.
MOST OF THE CHEAPER TAPPING MACHINES WILL BE DETECTABLE. TAPE RECORDERS CAN ALSO BE
DETECTED. EVEN A PERSON ON A TEST PHONE WILL SHOW UP. ITS A GREAT TOOL. TRY USING IT ON CONFERENCES SOME TIME.
IF YOU HAVE FRIENDS (OR ENEMYS) THAT LIKE TO LISTEN TO THEIR PHONE CONVERSATION OUT
A PHONE BOXES WITH TEST PHONE THERES SOMETHING YOU CAN DO ABOUT IT. THE FOLLOWING
INFORMATION COMES FROM ABBIE HOFFMAN AND GEORGE HAYDUKE IN THE CLASSIC BOOK 'GETTING
EVEN' THE COMPLETE BOOK OF DIRTY TRICKS.
CUT THE FEMALE END OFF AN ORDINARY EXTENSION CORD. UNSCREW THE MOUTHPIECE ON THE
TELEPHONE. YOU WILL SEE A TERMINAL FOR A RED WIRE AND ONE FOR A BLACK. ATTACH ONE OF
THE WIRES FROM THE EXTENSION CORD TO THE RED, AND ONE TO THE BLACK. NOW PLUG THE
EXTENSION CORD INTO A POWER SOCKET. ACCORDING TO HOFFMAN YOU ARE SENDING 20 VOLTS OF
ELECTRICITY BACK THROUGH EQUIPMENT MADE FOR 6 VOLTS. FIZZ.
NOTE! MAD! SUGGESTS YOU DO NOT TRY THIS. IT IS NOT RESPONSIBLY FOR ANY DAMAGE DONE TO
PHONE EQUIPMENT, OR TO YOU. ACTUALLY YOU WOULD BE SENDING 110 VOLTS THROUGH EQUIPMENT
MADE FOR 48. IF YOU ARE REALLY SERIOUS ABOUT DOING THIS, WE SUGGEST YOU GET A
TRANSFORMER TO STEP THE VOLTAGE LEVEL DOWN.
ANY INFOMATION THAT IS PASSED OVER PHONE LINE CAN BE INTERCEPTED BY THE PHONE COMPANY.
THIS INCLUDES MODEM SIGNALS. REMEMBER, THEY INVENTED ALL THAT STUFF. IN PART TWO WE
WILL EXAMINE WAYS TO STOP THEM FROM MONITORING BBS'S AND EXAMINE OTHER EQUIPMENT.
THIS FILE WAS WRITTEN BY THE TRIO.
THE COMMODORE KID
DEATH-STALKER
MR. C0SMOS
GUEST WRITERS THIS WEEK WERE M, QVI, PHONE BANDIT, THE GREMLIN, AND EXORCIST.
MAD! IS A GROUP DEVOTED TO G-FILES. IF YOU HAVE ANY QUESTIONS, OR THERE IS ANYTHING
YOU WANT US TO WRITE ABOUT, CONTACT US AT MAD! WORLD HEADQUARTERS- PC MAIN (313)
386-4698
8/20/85
CALL THE CIA FOR ALL MAD FILES
607-324-0197 TELL'EM MAD SENT YA'

View File

@@ -0,0 +1,98 @@
MAD! PRESENTS...
A C-NET COMPATABLE MAD! FILE.
DETECTING LINE TAPS PART 2
THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
RESPONSIBILITY FOR ANY OF ITS CONTENTS.
THANKS TO MR. X OF A BELL COMPANY WE HAVE LEARNED HOW TO DEFEAT MOST SURVEILLANCE
DEVICES USING BLUE/OMEGA BOXES. THE BLUES RANGE IS VERY LIMITED, BUT THE OMEGA BOXES
COVERS MOST OF THEM. SEE MAD!'S NEW OMEGA BOX HANDBOOK FOR MORE INFO.
DEVICE NAME RANGE TONE
NOTES.
MLT-2 1400-7200 4800
SEE DETECTING TAPS #1
MLT-1 1400-6400 1200
AT&T SCANCAT 900-1200 2600
SEE SCANNER BY CAN-AM PIRATING
NETWORK
SCANCAT 2 1200-2600 2600
ADS SCANNING SYSTEM 2600-4800 12000
BELL 1021 7200 12000
BELL 1100 400-800+1200-7200 GOLD 2600
SEE OMEGA BOX HANDBOOK AND FUN/OMEGA BOXES 1-2
MACE(NICKNAME IF YOU KNOW THE REAL NAME TO THIS MACHINE, PLEASE GIVE IT TO US.)
6200 GOLD 6200
THIS DOESN'T ALWAYS WORK.
ADS MONITORING TEST.
ADS IS THE NEW TRACE/MONITORING TEST BEING USED BY AT&T, MCI, SOON SPRINT, AND MORE.
IT IS VERY FAST AND ACCURATE, BUT IT HAS MANY MANY FAULTS.
AFTER MUCH TESTING WE FOUND THAT IF YOU DO A 7200 AND ADS IS ON THE LINE, A VOLT METER
WILL GO GO CRAZY. A SIMPLE GOLD WILL MAKE A POP IF ADS IS ON THE LINE. FOR A LOT
MORE ON ADS SEE MAD!'S UPCOMING DETECTING LINE TRACES.
TAP TEST NUMBERS
LATELY MAD! HAS AS BEEN SEEING ALOT OF THOSE TAP TEST #'S. OUR FRIENDS AT THE PHONE COMPANY SAID THERE ARE SUCH #'S, BUT THEY WILL ONLY DETECT CERTAIN THINGS. HERES A
SMALL LIST. MAD! IS NOT SURE IF THEY WORK, AND DIDN'T HAVE TIME TO TEST THEM. WE
WILL PRINT THE RESULTS IN AN UPCOMING FILE. IF THEY DO, WE WILL PRINT ABOUT 25 OF
THEM.
THIS CAME FROM SOMEONE NAMED HACKER SMITH, BUT WERE NOT SURE WHAT SYSTEM. HERE IT IS...
I GOT A # TO SEE IF YOUR BEING TRACED. WHEN YOU CALL IT USING YOUR PHREAKING
SERVICE,YOU SHOULD HEAR A TONE THAT GOES UP IN FREQUENCY,THAT MEANS YOUR NOT BEING
TRACED. IF YOU HEAR A STEADY TONE, THEN YOUR BEING TRACED AN YOU'D BETTER HANG UP IN
LESS THAN 30 SECONDS OR YOU RUN THE RISK OF BEING TRACED...THE # IS 617-890-9900.
ENJOY,
HACKER SMITH
ALSO YOU SEE THE NUMBER POSTED AROUND 200-XXX-XXXX. THIS IS A ADS SYSTEM USED BY BELL
LINEMEN FROM PHONE BOXES (SEE THE MAD! FILE ON TEST PHONES FOR INFO ON PHONE BOXING.).
IT IS NOT A TRACE TEST AT ALL.
THERE MAY OR MAY NOT BE A DETECTING TAPS 3, DEPENDING ON HOW MUCH MORE INFO WE GET.
WATCH FOR DETECTING LINE TRACES COMING SOON TO A BBS NEAR YOU.
THIS FILE WAS WRITTEN BY THE MAD!
BULLPEN.
THE COMMODORE KID <CK> COMPLIER WRITER MR. C0SMOS <APPLE CAT> ELECTRONICS INFO WRITER
THE GREMLIN <THE NEXT PRESIDENT OF THE UNITED STATES> THE WORLDS GREATEST EXPERT ON
THE OMEGA BOX
MR. X <A BELL EMPLOYEE WHOS ONE OF US> TELEPHONE INFORMATION
AND THE MANY PEOPLE WHO HELP US OUT... DEATH-STALKER THE DEFENDER DEMON PHONE BANDIT
MR. Y 8-BALL AND MANY MANY MORE.
MAD! IS A GROUP DEVOTED TO G-FILES. TO CONTACT US CALL THE MAD! MAILBOX ON THE ? MAIN
BBS (313)-278-9629 OR PIRATES CORNER 1 (313)-386-4698.
9-9-85
CALL THE CIA 607-324-0197 FOR ALL
THE MAD FILES AND TELL THEM
RITZ CRACKER SENT YA'


View File

@@ -0,0 +1,316 @@
12/19/91 11:14pm
Basic Eavesdropping #1
The Electronic Ear
------------------
Written By The Freddy
In Association With The National Newtwork of Anarchists and Nihilists (NNAN)
Introduction
------------
This text file is the first in a series on the topic of eaves-
dropping. My trusty Webster's Compact Dictionary defines eavesdropping as
the art of listening secretly. This can be useful to the young anarchist
in many ways. Suppose that, as a beginning phreak, you are given the
undubious assignment of being the lookout. Well, you want to hear the
guard coming while being as far away as possible. Or you stake out your
mark's house to find out as much as you can before you get your revenge.
Well, again, you want to hear as much as possible without making yourself
known. To find out how to properly accomplish these and many other tasks,
read on.
Disclaimer
----------
This document was intended for informational purposes ONLY, the author and
the National Network of Anarchists and Nihilists do not endorse or support
any illegal action presented here or in any other documents which we
release. The only motivation for the writing of this document is purely
for educating the general public. The author and the National Network of
Anarchists and Nihilists will not be held responsible for any actions by
the reader of this document.
Description
-----------
The Electronic Ear is alot like those "high tech" Listenaiders
which boost sound. Think of the possibilities. With the Electronic Ear
you can hear whispers 500 feet away or a conversation half a block away.
You can listen in and record for all posterity the conversation on the tape
of your choise. Of course, it is illegal to listen in on and/or record a
conversation without the permission of the parties doing the conversing.
Two versions will be presented. One that uses a parabolic dish (like on
satellites); the other uses a highly directional shotgun microphone. Both
use the same easy to build superamplifier circuit.
Parts List
----------
Amplifier Circuit
-----------------
R1 10 k-ohm resistor
R2 100 ohm resistor
R3 4.7 M-ohm resistor
R4,R6 3.3 k-ohm resistor
R5 220 ohm resistor
C1 220 pF disc
C2,C3,C5 0.47 <20>F disc
C4 1.0 <20>F polarized electrolytic
IC1 LM387 integrated amplifier IC
D1 1N34A
S1 SPST switch
Mike Electret condenser microphone
(1) Project box, 2 3/4 by 5 1/8 by 1 3/4
(1) 1/8 inch microphone input audio jack
(1) 1/8 inch sound output audio jack
All resistors are 5 to 10 percent tolerance, 1/4 watt.
All capacitors are 10 to 20 percent tolerance, rated at 35 volts or more.
LM387 amp is available in kit form from:
ALLEGRO ELECTRONICS SYSTEMS
3E MINE MOUNTAIN
CORNWALL BRIDGE, CT 06754
(203)672-0123
Mail order company. Catalog available.
Construction Of The Amplifier Circuit
-------------------------------------
The Amplifier Circuit is based on an LM387 dual preamp IC. In
layman's terms, the preamp first increases the amplification from the
microphone about 47,000 times, and then limits the audio signals of only 1
volt peak to peak or less to go to the output jack. This will save your
ears in case one of your less scrupulous friends shoots a cap gun in front
of the mike. Use a universal solder board for the circuit.
Construction is pretty straightforward. I have included both the
schematic and a picture of what the finished circuit should look like.
Schematic Of The Amplifier Circuit
----------------------------------
C6 220pF o To tape Power supply
----|(--ground | circuit decoupling/filtering
| C5 \./ or C2
| .47 <20>F --- headphone ---|(---
| | amp | .1<EFBFBD>F |
| ----o----------------o V+ o--o--|(--o--ground
| | | | C1
| D1 \/ | | 1000<30>F
| 1N34A - | |
| | | | Recorder interface
|___________o | | J1
| | | (o)------
R5 / / R6 | Tip| |
220 ohm \ \ 3.3 k-ohm |5 \/ |
/ / /\ ---/\/\/\/---o--ground
\ \ / \ | R1
| | / \ o 10 k-ohm
S1 ----o 6 / IC1b \ 3
o-o /o--o-------| -------/ LM387 \-------o-ground
/ | | /--------------------\ |
| | |7 |8 C4 1.0 <20>F|
| | | | + |
| |------------o |----o---|(---
| | |
| R4 / |
| 3.3 k-ohm \ |
| / |
| \ |
| | |
| \./ C3 |
| ---.47 <20>F |
| +| | Headphone amp
| | | J1
| ------------------o | (o)-------
| | 4| | Tip| |
| / /\ | | |
| \ R3 / \ | C2 \./ |
| / 4.7 M-ohm / \ | 4.7<EFBFBD>F --- |
| \ / IC1a \ | | C1 |
| | / LM387 \ | | .1<EFBFBD>F |
| | /-------------------\ | o--|(---o
| | 2| 1| | Q1 | |
| --------------o --------- 2N2222 | |
| | c e | R4 |
| R2 / V+ o------o----\ /--o-\/\/\-o-ground
| 100 ohm \ | \/ 1 k-ohm|
| / R2 / ---- \
| \ 22 k-ohm\ b| R3 /
| | / | 27 k-ohm\
| C2 \./ \ | /
| .47 <20>F --- C1 --------o-------------
| R1 | 220 pF \
|----\/\/\/\-----o----|(------- / R1
10 k-ohm | | \ 1 k-ohm
| ---------o---ground /
| | |
Mike o
Suggested Parts Layout
----------------------
Headphnone Mike Jack
Jack_____ _____
--| |-----| |------------------------------------------------
| | | | | -------- |
ON/OFF | --- --- _____|______|____ |
switch --- ______________________________________ | | |
O--| | | __________ | | | |
--- | -|__________|- _|_ _|_ | | | |
| | | | | | | | | |
| | ____/------------\____ | | | | | | | |
| | \------------/ | | | | | | Battery | |
| | | | | | | | | |
| | _|_ -|- -|- | | | |
| | | | _ _ _ _ | | | |
| | | | _|_|_|_|_|_|_|_|_ | | | |
| | | | | | | | | |
| | | | | | | | | |
| | -|- |_______________| | | | |
| | |_| |_| |_| |_| | | | |
| | Circuit board | | | |
| -------------------------------------- | | |
| ----------------- |
|_______________________________________________________________|
Notes
-----
If you cannot understand the schematic, then get a friend to make
it for you. You should be able to build the circuit with a minimal amount
of electrical experiance.
If you plan to connect the output to the line input of a tape
recorder, use a 10 k-ohm potentiometer as a level control and be sure to
use shielded cable to reduce unwanted hiss.
Test the circuit before building the rest of the Electronic Ear.
Connect a electret condenser mike to the input jack and a pair of
headphones to the output. Don't put the headphones directly over your
ears. I found this out the hard way. Turn the circuit on and listen for
the squealing sound of the oscillating circuit. If you don't hear it, go
to the next step. If there is an oscillation problem, increase the value
of C6 to 330 pF or 470 pF. Also try increasing R5 from 220 ohms to a
higher value that will reduce or eliminate oscillation, but it will also
decrease the gain of the circuit. If oscillation is still a problem, then
try replacing R3 with a 1.5 m-ohm resistor. This should decrease the
overall gain of the circuit.
The Parabolic Dish
------------------
Parts List
----------
1 Spun aluminum or plastic parabolic dish
1 10 inch length of 12 gauge wire
2 #12 crimp on connector
Dish available from:
EDMUND SCIENTIFIC CO
P.O. BOX 5408
SCOTTSDALE, AZ 85261
(609)573-6250
Mail order company. Catalog available.
Construction Of The Parabolic Dish
----------------------------------
The most effective way of tuning in on distant sounds is to use a
parabolic dish. I used an 18 inch diameter dish purchased surplus from
Edmund Scientific. Other dishes, both metal and plastic, will do.
The microphone must be positioned at the focal point of the dish.
You could use the complicated algebra method, but an easier way is to
position the dish in full sunlight and move small piece of paper in and
out of the center until you see a small, bright spot. Measure the distance
from the paper to the base of the dish and you have the focal point. If
the dish is not reflective, try covering it with aluminum foil.
You want to mount the microphone to a standoff. This can be made
from a coat hanger adjusted to fine tune the focal point. The microphone
should be physically insulated from the standoff using double sided tape.
The finished standoff and mike should look like this:
_________
/ \
| \
| |
| |-|
Coat | | | Crimp-on spade
hanger | | | connector (bend
bent | --|-| out tongue)
to |
shape |
|
|
|
|
|-|
| | Crimp-on spade
| | connector
|-|
|
Attach the amplifier to the side of the dish using some hardware or
double sided tape.
Paint the dish flat black so it does not glint in the sunlight.
Also, add a 1/4" 20 bolt and sleeve coupling to one side of the dish to
provide a meansto secure it to a tripod. This works quite well.
_
/
/ Parabolic
/ dish
Amplifier /
circuit /
|---/
| |
| |--\ o\
| | \-----/
|---\
\
\
\
/\\
/ \\_
\ /
|__|
/ \
/ \ Tripod
/ /\ \
The Shotgun Mike
----------------
Parts List
----------
1 40 inch lenght of 4 inch PVC or ABS plastic pipe
1 4 inch end cap to fit onto one end of pipe
1 3 inch round speaker (replaces Mike)
Construction Of The Shotgun Mike
--------------------------------
The Shotgun Mike is cheaper to build than the parabolic dish. It
does not collect as much sound, though, but it is more directional.
The speaker needs to be physically isolated from the tube to reduce
the effects of vibration. I have found that a pice of 2 inch thick foam
cut to 4 1/2 inches in diameter works well. Punch or cut out a small
circle in the center so it looks like a doughnut.
Solder an 8 inch length of shielded cable to the terminals of the
speaker. Press the magnet of the speaker through the small hole and slip
the foam and speaker into one end of the tube.
Solder the other end of the speaker wire to a 1 1/8 inch plug.
Drill a hole in the end cap for the speaker wire, mount the amplifier, and
you're set. The finished product should look like this:
Amplifer PVC pipe
circuit ---------------------------------------------------
##########||----| /
##########|| F | / Speaker
##########|| o |-|
##########|| a |-|
##########|| m | \
##########||----| \
--------------------------------------------------
Conclusion
----------
Now that you know how to build an Electronic Ear, you probably want
to know how to use it. That will be upcoming in a future installment.
Until then, build one yourself. I can be reached at The DeaTh BoX
BBS--(714)970-6710--which is the home of NNAN. Well, it's getting late so
until next time, adieu.
12/24/91 1:27am

View File

@@ -0,0 +1,429 @@
Electronic bug detection
''''''''''''''''''''''''
Electronic bug detection will probably be the most difficult aspect of this entire
field, as you will be working on your own, without the aid of much useful information
that can be gathered from the telephone company or other agencies. (Most telphone bu
gs, except the sophisticated ones, can be detected by an overload on the phone line
itself) A good tool for bugging detection is a normal AM-FM radio receiver, portable,
with a telescopic antenna. For application, extend the antenna in the room suspecte
d of being bugged and tune the receiver carefully from the bottom to the top, covering
all the FM frequencies, at the same time, talking to yourself continually. At one
point, if a bug is present, you will be able to hear your voice through the receiver,
although the voice may be indistishguishable, because of top volume feedback. This
feedback will always be a deafening continuous howl, scream, or high-pitched whistle.
To learn the exact location of the bug, cut the volume of the receiver, and slowly
move around the room. The feedback will increase in volume as you get closer to the
bug. When a bug is discovered, there is a moment of confusion and fear in reguards to
its elimination. In one sense, destroying a bug is an admission of guilt, and can
do nothing more than provoke the enemy to rebug in a more sophisticated manner. For
that reason, I would hesitate to remove a bug. Instead I would attempt to use it
against the bugger himself, by feeding him flase and misleading information.
In some cases the bugger may have taken precautions on this type of detection and,
by readjustment of his oscillating capacitor, he may be transmitting on a range below
the sensitivity of your radio. In this case employ your television set in the same
manner as you did the radio, using the ultrahigh frequency knob. As you move across
the range of frequencies, keep your eyes on the picture, until you have found a pattern
of dark wavy lines that move in relation to your own voice, coupled with top-volum
e feedback. The actual location of the bug is a little more difficult, unless your TV
set is battery operated, but by use of several extension cords and slow movement, this
can be accomplished.
The feedback technique can also be used when the bugging involves (citizens band)
walkie-talkie. One of the simplest methods of bugging is to tape down the transmitter
button on a cheap walkie-talkie, and plant it to where the conversation is to be hel
d. The process of detection is exactly the same as above, except that, instead of using
a radio ro TV set, one uses a tunable CB receiver to check for feedback.
Although the previous "feedback technique" can be effective, it is time-consuming and
not 100 percent efficient. For these reasons, electronic experst have invented an
marketed a small meter, which detects transmitters. The interesting problem that th
ese experts have overcome was, with all the high-powered radio and TV stations
transmitting, how would it be possible for an individual to detect a low-powered
transmitter, such as a microphone? This was overcome by simply reversing the gauge.
In other
words, when the meter was "wide open,"no signal was present. However, the closer the
meter was taken to the transmitting device, the less of the reading the meter registers.
These fie~- meters are available from most large electronic companies and range
in price from about $10 to $200, depending on quality and strength.
A device similar to the "strength meter," which a Texas company has marketed, utilizes
a small bulb, which blinks only in the presence of a bug. The true value of this device
is that it is capable of seperating normal radio wave (which do not affect it
) from the dangerous radio signals emitted from a bug. It is available from Dee
Company, Houston, Texas for about $200.
If your not electronically minded, or just not equiped to find the tap on your phone,
Continental Telephone has a device that allows you, through the use of its meter, to
determineif the wire is tapped, and, if so, where it is located. Unfortunately th
is device (called "the Private Sentry) costs $250.
Electronic jamming
''''''''''''''''''
Most of the devices written about so far in this chapter are legal, with regulations
placed on their application, but the very possession of certain jamming devices is
illegal. These jamming devices basically destroy the effectiveness of a bug rather t
han locate it. The reason the FCC has put strict regulations on these is the effect
they have on other means of communications, such as completely destroying AM radio
reception, rendering TV sets useless, making communications on police band radios impos
sible, and even to some degree interfering with aircraft communications. To be truly
effective as any-bugging devices they must cover the whole spectrum of radio
frequencies, which in turn will cause interference to other outside receivers and
transmitte
rs. For this reason control is of the essence. When determining what exactly you wish
to jam, you must also determine the frequency to be used, so as not to interfere with
other signals. If you decide to use a jamming device for an illegal purpose, you
must at all cost maintain mobility. (Jamming from the back of a moving truck has been
prooven effective) Mobility is necessary, because the FCC also employs detecting and
locating devices for use against underground radio stations and unregulated jammin
g devices.
There are basically two types of jamming devices, the first of which is not
manufactured commercially and would have to be built by the individual. This type is
called "spa~-gap device," and is more powerful than the other, covering greater
distance.
The second type is refered to as "the white noise device," and is manufactured by
Continental Telephone, Dectron Industries, Inc., and Telsec, with a price range from
about $150 to $350, depending on strength.
Electronic scramblers
'''''''''''''''''''''
Electronic scramblers are devices that simply act as an an~-bug mechanisms by
transforming normal speech patterns into unintelligable sounds. The most primative
method, outdated today, is recording a message on a tape recorder, and then transmitting
it
, either by playing it backward or at a different speed. Although this method may
momentarily frustrate the bugger, if he has half a brain, it won't take him long to
decode your message. The basic principle of scramblers, or any coding device, is to
ren
der the message useless to anyone except the desired recipient in cont
There are several types of electronic scramblers, all effective but all sharing the
same disadvantage - price. The most inexpensive one I found in any catalogue ran about
$500, but then anyone with the slight knowledge of burglary will not be put off by
this obstacle. The most popular type is manufactured by Dectron, and is used as an
extension to the telephone. The spech is garbled before it enters the mouthpiece of
the phone, and decoded after it has left the receiver. A pair of these run just over
$500, but the real disadvantages to these devices is that the individual code your
devices are working with is retained in a vault by the company, so that anyone with
access to that vault can break down your security.
The second device used for scrambling is manufactured by an English company, and it
works on the principle of inverting the normal speech patterns. In other words, it
makes low notes high, and high notes low. This offers the individual a little bit mo
re security, as each person's speech frequency is as differnt as his fingerprints.
Their major disadvantage is price. It sells for between $1,000 and $1,500.
The third type of scrambler is used only for radio transmission. This device can also
be purchased through Dectron, for about the same price as mentioned before. The radio
scrambler works on basically the same principle as all other scrambling devices
, in that it inverts or disorders the frequency and pitch of the speech pattern while
it is being transmitted, and then reverses the garble to render it understandable to
the receiver.
Mail order & retail electronic outlets
''''''''''''''''''''''''''''''''''''''
I have listed below some of the major electronic mail order and retail outlets. Many
companies that sell this type of equipment do so only to police officers, and require
the purchaser to prove his relationship with some law enforcement agency. For th
at reason they have not been included. These companies listed are all involved in the
manufacturing and/or sales of eavesdropping and surveillance equipment.
S.A.C. Electronics,
4818 West Jefferson Blvd.,
Los Angeles 18, California
Baker Electronics Co.,
R.R. 3,
Greencastle, Indiana
(mail-order plans and kits only)
Dehart Electronics,
P.O. Box 5232,
Sarasota, Florida
Continental Telephone Supply Co.,
17 West 46th Street
New York, N.Y.
(fantastic catalog)
Martel Electronics Sales, Inc.,
2356 S. Cotner Ave.,
Los Angeles, California
R & S Research, Inc.,
2049 Richmond Ave.,
Houston, Texas
Mittleman Manny,
136 Liberty Street,
New York, N.Y.
(only custom devices $400 )
Clifton,
11500 N.W. 7th Ave.
Miami, Florida
Consolidated Acoustics,
1302 Washington Street,
Hoboken, N.J.
{only listening devices)
Ekkottonics Co.,
P.O. Box 5334,
Milwaukee, Wisconsin
{(che})
Dectron Industries, Inc.,
13901 Saticoy Street
Van Nuys, California
(only an~-bugging equipment)
Dee Co.,
Box 7263,
Houston, Texas 77008
T~-Tron of Dallas,
330 Casa Linda Plaza,
Dallas, Texas
{(discount bugging equipme})
Security Electronics,
11 East 43rd Street,
New York, N.Y.
Telephone Dynamics Corp.,
1333 Newbridge Road,
North Bellmore, N.Y.
{(only miniture microphon})
Simlar Electronics, Inc.,
3476 N.W. 7th Street,
Miami, Florida
Tracer Systems,
256 Worth Ave.,
Plam Beach, Florida
The federal Communications Commission and the Supreme Court have been uptight about
wiretapping and eavesdropping for some time. They have both passed laws and made
regulations concerning electronic surveillance. For these reasons, I would emphasize
t
he utmost care and knowledge in the application of these devices. What is intersting
is the actual wording of the law, where any interstate wireta{(interstate does not mean
interstate, it applies to all tapping through some strange log}) except in a matt
er of security is against the FCC's regulations and is punishable by a fine of no more
than $10,000 or five years in jail. The neat little exception made for security gives
all of government agencies, particularly the FBI and the CIA, and all local polic
e departments, free license to practice all and any forms fo surveillance without any
restrictions. Although certain cases have been dismissed in court cases because of
"tainted" methods of collecting evidence, in reality if the government feels an indiv
idual is a security ris{(for any reas}) it can produce tapes in court that have been
gathered by wiretapping, supposedly not as evidence, but the defendant goes to jail
anyway.
America, at this point, is operating on a li~-size Monopoly Board. Everyone who isn't
in jail or going dirrectly to jail is buying and selling thousands of pieces of paper,
with absolute seriousness of purpose, unable to realize that there will be only
one winner, and when he gets out of jail, he's going to kick all their asses.
Broadcasting free radio
'''''''''''''''''''''''
In any underground, throughout history, a prime concern has been communications or
propaganda. Propaganda, as a word, has ugly connotations, but in reality it means
nothing more than the distribution of information. This country has begun to develop
a
n underground network of communications, in the many small newspapers which has cropped
up all over the country. Although there is a spark, there is also a monstrous lack of
communications, once you get outside any of the large metropolitan areas. In pr
eparation of writing this book, I had to do a great deal of reference work. In this
reading encompassed almost all extremities of the political spectrum, from far left to
far right. These extremities are so alike, and could be so powerful if they ever g
ot over their preconceived impressions of each other and started to communicate. This
is the reason I feel the underground has to take propaganda one step further, from the
printed page, to the radio broadcast.
The radio is a factor of ext~-
ordinary importance. At moments
when war fever is more or less
palpitating in every one region
or a country, the inspiring,
burning word increases this fever
and communicates it to every one
of the future combatants. It ~-
plains, teaches, fires, and f~-
es the future positions of both
friends and enemies. However,
the radio should be ruled by the
fundamental principle of popular
propaganda, which is truth; it
is preferable to tell the truth,
small in its dimensions, then a
large lie artfully embellished.
~-Che Guevara
Guerrilla warfare
Kwame Nkrumah, in his HANDBOOK OF REVOLUTIONARY WARFARE, also stresses the use of
radio propagnda. He breaks it down into two basic forms: The first and most important
is the same as Che was writing about in the above quotation, this being to communic
ate truth to people of the country about the struggle. Nkrumah takes this idea one step
futher, and says that really to communicate the underground must speak on many different
levels, and this is a key point. How can an anarchist who has a rig~-wing ba
ckground understand or relate to a le~-wing anarchist, who uses Marxist terminology?
This forces the underground to communicate with many different frames of reference.
This hasn't happened in this country: Everyone from far left to far right is hung up
with dogmatic ideals, over used terminology, and is absolutely blind to practicality.
Nkrumah's second concept of propaganda is for the purpose of subverting the enemy.
An indispensable primarily to
battle is to attack the mind of
the enemy, to undermine the will
to fight so that th result of
the battle is decided before the
fighting begins. The revoluti~-
ary army attacks an irresolute
and demoralized army.
~-Nkrumah
Handbook of
Revolutionary
Warfare
This use of propaganda to discourage the enemy has also a great place in the struggle
that is going on in this country today. It has been used to a small degree, with
fantastic success, around military bases. There was a regiment of the National Gaurd
that refussed to go to Chicago during the National Democratic Convention. Underground
newspapers and handbills have encouraged G.I.'s to dissent and desert, and have shown
them that it is possible. The effectiveness demonstrated by this demoralizing fo
rm of propagnda depicts nothing more than the real turmoil that exists. The successful
effect of this communication has resulted from one aspect of its natu~--that being its
passionate reguard for truth.
Printing a revolutionary newspaper is a great deal easier than forming a underground
radio station. Althought the government has strict restrictions on printed material,
it is nothing like the regulations it places on radios and television broadcasting
. The FCC runs the radio networks with an iron hand, wih the ever present threat of
revoking a license. For this reason, any radio station which is striving to be
absolutely free must make the ultimate break with the FCC. This can be accomplished
in tw
o ways. The first and most dangerous, but at the same time the most effective, is by
using high powered equipment, jamming out other stations, from a mobile base of
operations. The FCC has incredibly sophisticated equipment, and can locate any pirate
r
adio station in a matter of minutes. For this reason, mobility is essential.
Transmitting from the back of a disguised truck has been used successfully, although
the movement of the truck while broadcasting must be constant, never repeating the same
pat
tern, but at the same time keeping within the broadcast power area. This means of
transmission is especially effective at gathering, such as demonstrations and riots to
keep people informed as to the movement of the enemy. The best method of obtaining e
quipment is building your own, as to buy a large transmitter requires the individual
to be licensed. Not only that, it's expensive. You can build your own from plans and
equpiment purchased through mail order, from most of the companies listed earlier i
n the text file.
The second method for getting around the strict FCC regulations is legal. Under the
FCC's l~-pow~-transmission regulations, one can legally broadcast below 100 milowatts
at any empty space on the AM or FM dial, without registering or being licensed. T
he disadvantages are obvious: One can be only broadcast up to one mile. Even within
that mile, interference from the hi~-power commercial stations is present. And if
enough people get into this form of broadcasting the FCC is going to make some sort of
regulation against it. This method is not just theoretical, it has been inplemented
on the Lower East Side, by John Giorno and his Guerrilla Radio. He broadcast from the
top of the St. Mar~-~-t~-Bowerie's belltower at 1400 on the AM dial, and calims he
did everything the FCC said he couldn't. I am sorry to say I did not hear the
broadcast, as I was out of the o~-mile area at the time.
Telephone and communications sabotage
'''''''''''''''''''''''''''''''''''''
Telephone sabotage can be applied on many levels. First I am going to explain what
I am not going to write about. I feel there is no need for me to explain how to make
free phone calls by telling the operator that you dialed the wrong number, just as
I am not going to get into explaining how to use a number 14 washer with scotch take
in a pay phone, or cheating on credit card calls, or spitting on a penny. These are
all explained in FUCK THE SYSTEM, a pamphlet on living freely in New York City. The
interst I have in telephone sabotage is purely communicational and commercial.
Commercial inn the sense, that over the past few years my absolute hatred of vending
machines and pay phones has led me to break into almost every kind I could find.
Parking meters are the easiest by far: All you need is a hammer and chisel or a larg
e money wrench. Soda machines are almost as easy, but real delight comes from ripping
a Kotex machine off the wall of a womans restroom, or sticking an explosive charge in
the coin slot of a pay toilet. I have never been able to break into a pay teleph
o~--smash them, yes, put them out of order, but never able to open them up and remove
the coins. This is for several reasons: One is the time element, as most public phones
are easily seen, and the other is that all public phones are installed with amaz
ing locks, which have completely baffled me.
To get back to the purpose of this section, I must emphasize the importance of
breaking down the enemie's communications. This in turn results in confusion and chaos.
Imagine, for a moment, a squad car without menas of communicating with its precinct,
or an enemy aircraft with its radio jammed. This act of breaking down the enemy's
lines of communications is not and end in itself, rather it is a tact~--a small, but
extremely important, part of a total operation.
When considering communications, it is best to start from primative base and work up
to more sophisticated tactics. The first and simplest method for rendering a telephone
inoperative is only temporary. It entails calling the phone company that a cert
ain number be disconnected. This will work for individuals, but not for agencies or
law enforcement organizations. An important factor in any form of telephone sabotage
is the time aspect of verificati~--in other words, the amount of time it takes the
phone company to trace a call. The phone company can tell right away if you are calling
from a pay phone, so this should be avoided. Call from a private phone which you can
not be connected with, and limit your conversation to under ninety seconds. IMP
ORTANT: Most law enforcement organizations, companies, corporations, and businesses
have more than one phone line, and in most cases one or more will be unlisted.
A common misconception is that a person can render a phone useless by dialing a number
and, before the party answers, leave the phone off the hook. This si not true, and
doesn't work. Even if the caller does not hang up the phone, the receiver can get
a dial tone by hanging up himself and holding the hook down for a little over thirty
seconds. Although this method does not work in the cit{(I know because I have
experimented with }), I have heard reports that it has been used in rurla areas with
varyi
ng degrees of sucess. I would suggest trying it out with a friend, to see if it is
effective in your area.
The other truly effective method is the most dangerous. It entails the actual cutting
of the phone wires. This is much easier in a rural area where the phone lines are above
the ground, and there are not so many of them. It should be noted that compl
ete telephone communications with a small town or village can be broken in less than
ten minutes. Probably the most important thing here is having a complete understanding
of what you are doing, and using the correct tools. Phone lines do carry electric
al charges and, without the complete knowledge of what you are doing and without the
correct tools, it would be very easy to electrocute yourself. In rural areas, the basic
tools should be: rubb~-soled shoe{(sneake}); pliers with rubber grips; large heav
~-duty wire or tin cutters, also with rubber grips; a pair of surgical rubber gloves;
a small flashligh{(operate at nig}); and a body strap to allow you free movement of your
hands once at the top of the pole. IMPORTANT, before attempting any telephone w
ire cutting, get hold of a copy of telephone repairman's manual, and read it.
This same operation can be preformed in urban areas, although the process is much more
involved. In most urban areas the phone lines run beneath the street level, and they
are`usually`)
to the phone lines in the sewers, there are also all the hi~-voltage electric lines.
If you cut into one of these, I don't care how well insulated you are, you'll fry. An
urband saboteur should either be in possession of a detailed map of the phone lin
es, available at any municipal library, or carry a small electric line locator, so that
he can find the right line to cut. The urban guerrilla, on this sort of mission, should
carry all the tools the rural guerrilla would have, except he should exchange
the body strap for a rubb~-insulated hack saw, also add a crowbar. The hack saw is for
the mtal encasement that surrounds all phone and electric wires in the sewers. Access
to the sewers is pretty easy, as most manholes will take you into an amazing com
plex of all differe~-sized tunnels, where you can get thoroghly lost, unless you have
had the foresight to study a map of the sewers, also available from any municiple
library. Know exactly where you are going, know all the obstacles that you may come
in
contact with, and have several routes of escape planned, in case of an emergency.
Needless to say, if you decide to go into the sewers, dress accordingly. It's cold,
damp infested with rodents, and dark, and many tunnels are partially full of water.
A word of caution about using explosives to sever phone lines: In the sewers, don't.
In Paris in 1945, the French resistance decided that to aid the oncoming Allied troops,
they would cut all lines of communication from the Nazi headquarters and Berli
n. This proved insuccessful, for many reasons, but the important fact was that they
did attempt to use explosives in the sewer system. A small charge was placed right
on the phone lines, and denoted from a good distance away. The phone line was cut, b
ut unknown to the resistance, so was a gas main, right next to lines. The result:
phone lines cut, a large number of civilians dead, and a block and a half completely
leveled. Not only was the area totally destroyed, it was flooded by the bursting of
t
he water mains which also shared the sewers with the phone wires.
One can use small explosive charges in rural areas, as the lines are above the ground.
DOWNLOADED FROM P-80 SYSTEMS 304-744-2253

View File

@@ -0,0 +1,254 @@
FAX INTERCEPTION
This article is reprinted from Full Disclosure #23. Copyright (c) 1991 Full
Disclosure. Permission granted by publisher to reprint when subscription
information provided: Full Disclosure, Box 903-R, Libertyville, Illinois
60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll
free: (800) 786-6184. Subscriptions: $18 for 12 issues.
As with the introduction of all new communications technologies, there is a
time lag between the availability of the technology and commercial
development of interception devices. Accompanying the use of both are
unanticipated risks and the potential for misuse and misunderstandings.
False Sense of Security
With the widespread proliferation of fax machines came increased use. In
general, a document transferred has been given the same sort of validity as
one sent or received by U.S. Mail. In general, such communications were
originally secure. Now that interception equipment is available, the sense of
security has become false.
For all practical purposes, fax is a remote photocopying machine. The process
begins with the sending unit converting the image on the page into a
digitized image (numbers in an electronic format) and transmitting it as a
noise sounding signal over a phone line. The receiving fax converts the
signal into dots and prints it.
Since the image is transmitted over standard phone lines, the communication
is subject to interception. However, rather than tapping the line with a tape
recorder or simply listening to the oral communications, an interception
device that makes sense of the specialized signal is necessary. Sometimes
this is done by recording the transmission and later converting the recording
of the modem signal to a computer image, sometimes it is done 'on the fly' as
the signal is being intercepted.
Simple Fax Intercepts
Why not just use a standard fax machine for interception? The signal
sequences and handshaking at the time machines first connect complicates the
possibility. During startup, the machines automatically select one of several
built in protocols depending on line conditions. That is why on really noisy
connections, the transmission of a page can take much longer. Directly
connecting a 3rd fax machine to the line may confuse this process. Both the
receiving unit and the intercepting machine would be sending signals about
line conditions and protocol. However, if a 3rd fax machine did manage to get
properly synchronized to the signal in use without interfering with the
initial handshake, it would print an image identical to the one received by
the intended recipient. We had mixed results when we tried this in our lab.
Sometimes we managed to get all three machines synchronized. Using unmodified
fax machines to attempt intercepts didn't provide sufficient reliability to
be considered a viable approach. Indeed, continued attempts of this approach
would likely put both sender and recipient(s) on notice that something was
wrong as connections would be repeatedly lost.
This doesn't mean that it is really complicated to intercept faxes. The
Philadelphia Inquirer reported in September 1990 that Japanese hackers have
been stealing valuable information from corporations by using fax
interception. The article claimed it could be done by anyone with a little
knowledge of electronics. We agree, we have intercepted faxes in our lab.
(See front cover for one such example.)
Doing It Right
The latest commercially available fax interception devices generally use fax
boards in IBM PC or compatible computers. The actual hardware used for fax
interception is often the same as used by normal computer-fax systems. The
software is more sophisticated. Rather than attempting to synchronize with
the sending unit by sending protocol information, it adjusts to whatever
protocol the two main players have established and stores the signal
information.
After interception, the electronic information is stored in the computer and
is available for review, to be printed, altered or discarded. Such equipment
can be left unattended for long periods if necessary, or monitored for the
instant use of information in cases where law enforcement is standing by
waiting for some specific bit evidence.
Cellular Fax Interception
Cellular phone based fax machines provide ripe opportunity for `hacker'
intercepts, since the signal is available via low cost police scanners. No
physical connection to a common carrier network is necessary. There is
absolutely no risk of being detected.
Commercial fax interception equipment gets more complicated, though. Since
fax messages might be on the same phone lines as voice or other computer
modem communications, some of the interception devices automatically route
different types of communications to different interception devices. This
provides the interceptor with a separate recordings of voice phone calls,
faxes, and other computer communications.
Such fax interceptions are based upon the interceptor having a specific
target. Distributing the sorts of information received for analysis isn't
much different from an ordinary, now old fashioned, wiretap.
Broadband Interception
Presorting of signals and voice communications as described above makes
broadband scanning for fax messages easy. The interception of satellite or
microwave links has become possibile. Cooperation by a common carrier with
the government has happened in the past, and strikes a chord of dangerous
reality today. But it really takes little by way of home fabricated equipment
to monitor much of the satellite link traffic. Commercial equipment is also
available. One commercial fax interception unit can decode up to 150
simultaneous fax transmissions from a 6,000 phone line satellite link.
Such broadband interception can also be done on oral calls, however, the task
of listening to all the conversations for the important ones is much, much
greater compared to scanning faxes. First, faxes are usually much more direct
and to the point than normal phone conversations (not so much about Sunday's
game). Additionally, optical character recognition (OCR) process can be used
to convert much of the text to standard computer data and then be
mechanistically selected for closer scrutiny by an automated search of
keywords of interest. Encryption of a fax could also be noted, perhaps
triggering further attention.
The risks resulting from broadband interceptions are henious. Your fax could
be intercepted not because you were a selected target of law enforcement,
industrial spies or miscreant hackers, but because of the route your fax
travelled through the common carrier networks. Broadband interceptions become
a modern day version of general warrants. Satellite signals don't respect
borders. Interception in nations with no privacy concerns for radio signals
of what we, as users, understand to be Constitutionally protected
communications has become a real threat. There are areas contained within our
national frontiers where the United States Constitution does not apply.
Foreign embassies present one such clearcut example. The status on Indian
Reservations is not cleancut.
Dangers of Fax
The February 13, 1990 issue of the American Bankers' Association publication
``Bankers Weekly'' reported that ``In one incident, a bank suffered a $1.2
million loss through fraudulent funds transfer requests which were
accomplished using nothing more than business letterhead, tape and sissors.''
A fax machine made such simple tools effective. Inordinate reliance on
technology permitted the loss to actually happen.
The journal continues that there is a need for legislation (changes to the
Uniform Commercial Code) to put a stop to the problem. Unfortunately,
legislative efforts alone cannot correct the problem. The first step, is an
understanding of the technology.
Once the technology is understood, administrative procedures can be
implemented by users of fax machines to protect themselves. That protection
cannot be successful without understanding the limitations of the machinery.
Taking any communications device for granted is a high risk path.
New Techniques For Fraud
The advent of fax technology has opened the door to new methods of fraud.
Those intent on committing fraud have always devised methods of bypassing
normal authentication systems in order to steal. As technology evolves, these
methods also evolve. Protective measures must follow suit.
Faxes represent a multiple whammy. People who send faxes have some geographic
distance between them. Because of past reliance on semi-automated
communications, formal verification proceedures are bypassed, substituting
the mysterious nature of modern communications. There was a time, even
recently, that tellers at banks asked for positive identification even in the
case of small cash transactions inside a bank. Yet today we witness orders
for large sums being processed simply because ``it came by fax.'' This is
truly a conspiracy of laxness and misinformation.
A written purchase order from a company is likely to have a particular form,
and include a signature. One attempting to issue a fraudulent purchase order
would need to forge both the form and the signature. Additionally, envelopes
and possibly a postage meter imprint from the issuing company would also be
needed. Elsewhere in this issue we reprint a letter from the Federal
Communications Commission. The letterhead was, for reasons we have been
unable to determine, typed instead of printed. Some of the recipients we've
talked to have placed calls to verify the authenticity of the letter. As it
turns out, the letter was authentic and official.
A purchase order sent by fax on the other hand, can be created by cutting,
pasting and xeroxing together parts of other orders from the company. When
received by fax, the fake would appear legitimate.
PC's & Fax: The Miscreants Gun
The advent of PC based fax boards exaggerates these problem. A fax that
originates, is received by, or intercepted by a personal computer (PC) fax
board really opens the door for miscreants.
A fax, when stored on a PC is easily modified using ordinary commercial
software intended for preparation of graphics. An image of the fax can be
brought up on the screen and parts of it altered or cut and pasted
electronically. For example, a purchase order could have a shipping address
altered. A signature could be removed from one document and placed on
another. All such operations can be done on a computer screen in moments.
Document changes that could take a professional forger hours to accomplish
could be done in minutes by an amateur, even an underage one.
Bogus faxes can be created to be sent to another fax, or incoming faxes could
be altered by an employee and printed as authentic. Detection is difficult to
impossible, depending on verification techniques used at audit.
The difficulty of intercepting standard U.S. Mail or voice phone calls and
altering the content by a third party is enormous compared to fax messages.
Before a fax message is printed, it is just a series of electrical signals.
Any alternations result in changes without a trace of the alteration.
The receipt of a fax is <B>not<D> a confirmation of its content, unless other
corroborative authentication validates the information.
Someone with access to a phone closet can route incoming fax line to a PC.
The fax can then be connected to a different phone line. All incoming faxes
would be first received by the PC and the operator could alter, erase, or
forward without change those faxes to the standard fax machine. A pre-review
and alteration if desired scheme can be effected. The same can not easily be
accomplished with normal voice phone calls, or the U.S. Mail.
With the advent of the Caller-ID services, this information should soon be
incorporated into fax machines, so the true number of the caller will be
placed on the fax. This will still do nothing to prevent transmission of
bogus faxes over that phone line.
Protect Yourself
The best rule for protecting one's interests when using faxes is to use them
only with other confirmation or as confirmation of other communications. They
should never be used for final copies of contracts, purchase orders or other
important documents that could have a significant impact if altered, or
entirely fabricated. Where would we be if our WW2 treaties terminating
hostilities were faxed documents. Additionally, information that would not be
given out over a standard phone conversation, subject to a wiretap, or other
listeners (via a speakerphone, extension, etc), should not be sent by fax.
There is no way to tell who may pick up a received fax and read it. In fact,
it is more likely an unintended party will read a fax than pick up an
extension phone and eavesdrop on a voice call (intentionally or not).
It should be kept in mind that any errant employees or others that could get
access to the fax phone line(s) could intercept all faxes sent or received
and make use of the fax images for whatever purpose they desired.
The intercepted faxes can be used to collect or create incriminating
evidence, industrial espionage, or as the base of documents to be used in
forgery. There's a whole new meaning to autograph collection.
Conclusion
Fax technology in its current form provides a useful service for business and
others. However, the risks must be examined so the use doesn't go beyond that
which is appropriate given its current functionality / risk ratio.
In conclusion, the convenience of a fax must be weighed against its risks and
procedures implemented to authenticate incoming and outgoing faxes as well as
what information is communicated by fax. As with all technologies, it must be
understood so that it can be used for purposes that are appropriate for the
needs of the technology and the user. A lack of understanding can leave the
user exposed to unnecessary danger, liability and loss. When used with an
understanding of the benefits as well as the pitfalls, a fax machine can
greatly enhance productivity.

Downloaded From P-80 International Information Systems 304-744-2253