mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-06 15:26:54 +02:00
update
This commit is contained in:
351
textfiles.com/phreak/TRASHING/trash1.rdt
Normal file
351
textfiles.com/phreak/TRASHING/trash1.rdt
Normal file
@@ -0,0 +1,351 @@
|
||||
|
||||
|
||||
*** Dumpster Insights ***
|
||||
|
||||
Report #1 (NET/NYNEX)
|
||||
|
||||
|
||||
by: ..oooOO Count Zero OOooo..
|
||||
|
||||
&
|
||||
|
||||
Brian Oblivion
|
||||
|
||||
|
||||
: -=Restricted -=Data -=Transmissions :
|
||||
: :
|
||||
: "Truth is cheap, but information costs." :
|
||||
|
||||
(And *some* information you must DIG for...literally..)
|
||||
|
||||
Welcome to issue #1 of _Dumpster Insights_, the magazine that prints TRASH.
|
||||
Yes, we at -=RDT have been 'dumpster diving' lately, and have found some
|
||||
interesting tidbits of information. We intend to share some of these
|
||||
findings in this issue and subsequent releases of _Dumpster Insights_. Of
|
||||
course, the contents of each issue of _Dumpster Insights_ will vary according
|
||||
to the contents of the DUMPSTERS! We can only print what we dig up.
|
||||
|
||||
Dumpster Diving is a thrill. Phrack #36 left out *one* important item in
|
||||
the "REAL Cyberpunks" article:
|
||||
|
||||
REAL Cyberpunks aren't afraid to get their hands dirty.
|
||||
|
||||
Nuff said...here we go.
|
||||
|
||||
*** FAX Trash ***
|
||||
|
||||
Lots of faxes get tossed in NYNEX dumpsters. Currently, employee moral is
|
||||
very low, with all the recent layoffs and employee/supervisor/union strife.
|
||||
Around Christmas, we were delighted to find a number of faxes that illustrate
|
||||
this nicely...
|
||||
|
||||
FAX transmission: Dec '91------------------------------------------------------
|
||||
|
||||
'TWAS A MONTH BEFORE CHRISTMAS
|
||||
|
||||
'Twas a month before Christmas and most managers agreed
|
||||
What for Christmas this year we might get F M P'd!
|
||||
The FMP forms were all carefully prepared,
|
||||
In the hopes that, when time comes, our jobs would be spared.
|
||||
There was Ranking and Rating and everyone was banded,
|
||||
To make sure it was fair and not underhanded.
|
||||
|
||||
When one day in the office there arose such a clatter,
|
||||
I sprang from my desk to se what was the matter.
|
||||
A green letter was spreading unfortunate news,
|
||||
Giving contract details and company views.
|
||||
The new contract was settled a year in advance,
|
||||
With full medical benefits - a real kick in the pants.
|
||||
|
||||
And they extented that sucker to nineteen ninety-five,
|
||||
Which sent hopes for the future into a nosedive.
|
||||
The atmosphere now was as cold as the snow,
|
||||
And forget the morale - I've never seen it so low.
|
||||
So we wait, and we work, but we're sad and angry,
|
||||
That this "Family" company could treat us so badly.
|
||||
|
||||
When the president said, in a televised speech,
|
||||
To reduce through attrition was a goad within reach.
|
||||
But if layoffs become real, he said not to sob,
|
||||
'Cause he'd set up a board that could get you a job.
|
||||
Now he spoke with a tongue that was lively and quick,
|
||||
And you knew in a moment that this man was a prick.
|
||||
|
||||
That feeling you had in your gut since the strike,
|
||||
Like the Dutch boy whose finger was stuck in a dike,
|
||||
Now became real as the whole "dam" thing falls,
|
||||
And you realize the company has you by the balls.
|
||||
Yeah, they talk about Quality and how it should work,
|
||||
But they must think we're stupid - they take us for jerks.
|
||||
|
||||
For when push comes to shove, it's the union who's boss,
|
||||
And they have the last to say, while we stand at a loss.
|
||||
And I heard him exclaim as he turned off his mike,
|
||||
Screw the management force, give union what they like.
|
||||
|
||||
-------------------------------------------------------------------------------
|
||||
FAX transmission: Dec '91------------------------------------------------------
|
||||
|
||||
THE NYNEX TWELVE DAYS OF CHRISTMAS
|
||||
|
||||
ON THE TWELFTH DAY OF CHRISTMAS, NYNEX GAVE TO ME....
|
||||
twelve buyout rumors
|
||||
eleven nervous breakdowns
|
||||
ten axes falling
|
||||
nine lawsuits pending
|
||||
eight RMC's closing
|
||||
seven hundred layoffs
|
||||
six officers indicted
|
||||
five plus five
|
||||
four force adjustments
|
||||
three regions combining
|
||||
two reorganizations and
|
||||
** a head count that didn't include me! **
|
||||
|
||||
-------------------------------------------------------------------------------
|
||||
FAX transmission: Jan '92------------------------------------------------------
|
||||
|
||||
New England Telephone EMPLOYEE SALE!!
|
||||
|
||||
SAVE up to 46%
|
||||
|
||||
That's right friends....you heard it here first.
|
||||
We can't lay 'em off anymore, so we're SELLING 'em!
|
||||
|
||||
ALL OF THEM!
|
||||
|
||||
We have to downsize our new one-employee-per-business unit goal,
|
||||
and you can help us do it.
|
||||
|
||||
YOU SAY YOU WANT NEW?...We've got 'em..employees with low mileage, high
|
||||
performance, and a lot of good years left.
|
||||
|
||||
YOU SAY YOU WANT OLD RELIABLE?...We've got them, too. Their paint's a
|
||||
little gray and they grumble a lot, but they've seen it all and keep
|
||||
on working.
|
||||
|
||||
We've been thinking of the layoff business for months, and losing ALL that
|
||||
severence pay will take it's TOLL. Now help us make a little money on the
|
||||
deal!
|
||||
|
||||
So...come one, come all to the FIRST ANNUAL NEW ENGLAND TELEPHONE
|
||||
EMPLOYEE SALE.
|
||||
|
||||
Don't miss a bargain!
|
||||
|
||||
SPECIAL - Buy TWO and get a FREE TOUCH TONE PHONE.
|
||||
|
||||
-------------------------------------------------------------------------------
|
||||
|
||||
Yes, those were GENUINE faxes...funny stuff, but it really gets across the
|
||||
current state of employee morale..."We're the one for you New England,
|
||||
New England Telephone...part of the NYNEX Family"...swell.
|
||||
|
||||
Here's a little blurb culled from a NYNEX Signature Graphics Standards manual:
|
||||
|
||||
"This manual describes the proper use of NYNEX signatures - the
|
||||
building blocks of our corporate identity. It is designed to
|
||||
assist both employees and suppliers alike who are responsible for
|
||||
implementing our corporate identity in all of its visual manifestations.
|
||||
As NYNEX people dedicated to projecting a positive image of NYNEX,
|
||||
to both the public and our fellow employees, it is essential that we
|
||||
apply these standards in a consistent and proper manner.
|
||||
|
||||
The NYNEX corporate signature, consisting of *only* the name NYNEX,
|
||||
is the keystone of our identification system. When shown in its
|
||||
specially designed letterforms, it becomes more than just letters or
|
||||
a name. It is a symbol with nuances built into it which allude to
|
||||
the origins of our information company. *NY* represents New York,
|
||||
*NE* signifies New England, and *X* stands for the excellence of our
|
||||
people, our products and services, and our future. These components
|
||||
joined together with lines extending from the E throught the X form a
|
||||
unique signature which EVOKES THOUGHTS OF HIGH TECHNOLOGY, LINES OF
|
||||
COMMUNICATION AND A SENSE OF UNITY, ORDER, AND STABILITY."
|
||||
|
||||
Ahhh...inspiring...words to build an Empire...
|
||||
|
||||
Here's a list of Public Service Center telephone numbers..these are
|
||||
for New England Telephone/NYNEX in Massachusetts...
|
||||
|
||||
PUBLIC SERVICE CENTER
|
||||
TELEPHONE REFERENCE LIST
|
||||
|
||||
PUBLIC SERVICE CENTER---------------------------------
|
||||
Semi-Public
|
||||
Customer # 1-555-1717
|
||||
Manager 617-965-9030
|
||||
Intra/Expediting 617-965-9018
|
||||
Fax # 617-964-7012
|
||||
|
||||
Public
|
||||
Customer # 800-446-7691
|
||||
Manager 617-965-9035
|
||||
Intra
|
||||
617/508 617-965-9040
|
||||
All others 800-446-7691
|
||||
PTACS 800-446-7691
|
||||
SOA's 617-965-9014
|
||||
Service Order Room 617-969-9726
|
||||
Fax # 617-969-9726
|
||||
|
||||
COCOT Service Center
|
||||
Customer # 800-621-0033
|
||||
Manager 617-965-7468
|
||||
Intra # 800-621-0033
|
||||
Fax # 617-969-9249
|
||||
|
||||
Centralized Repair Bureau (CRSAB)
|
||||
Business 1-555-1515
|
||||
Coin 1-555-1611
|
||||
Residence 1-555-1611
|
||||
|
||||
Customer Names & Addresses (CNA)
|
||||
617-787-2750
|
||||
|
||||
Customer Response Center (CRC)
|
||||
800-555-5000
|
||||
|
||||
Data Base Update Group (DBUG)
|
||||
508-762-1648
|
||||
|
||||
Directory Assist Data Base
|
||||
617-367-9952
|
||||
|
||||
Legal Department
|
||||
Accident/Claims 617-743-2763
|
||||
Claims Information 617-743-2670
|
||||
All Other Inquiries 617-743-7773
|
||||
Final Bills/Bankruptcy 617-743-6773
|
||||
|
||||
|
||||
Ever want to call a NYNEX/NET garage?
|
||||
|
||||
Garage Telephone Number
|
||||
------ ----------------
|
||||
Milton 802-863-8440
|
||||
Methuen 508-683-1942
|
||||
Conway 603-447-2754
|
||||
South Kingstown 401-789-1088
|
||||
Portland 207-774-4565
|
||||
Medford-West 617-391-9928
|
||||
Framingham 508-879-0775
|
||||
Springfield 413-734-9983
|
||||
Medford-East 617-391-9945
|
||||
Boston 617-451-8295
|
||||
Dedham 617-326-9901
|
||||
E Providence 401-438-9391
|
||||
Brockton 508-587-9912
|
||||
Shrewsbury 508-842-1818
|
||||
Manchester 603-645-2062
|
||||
Bangor 207-945-9996
|
||||
Weymouth 617-337-9969
|
||||
Northampton 413-586-1943
|
||||
Hyannis 508-775-0902
|
||||
|
||||
|
||||
Other interesting trash-prizes include issues of "Inside Operations,"
|
||||
a monthly newsletter for NET Operations employees. Here are excerpts from
|
||||
December '91 and January '92:
|
||||
|
||||
Operations Forum
|
||||
(To provide a forum for employee thoughts and ideas...)
|
||||
|
||||
"If you could change one thing about your job, what would it be?"
|
||||
|
||||
Employee response: "I would implement a better system to fix NET's
|
||||
circuit troubles. I've been told that unless our
|
||||
own internal troubles are escalated, some trouble
|
||||
tickets don't even get looked at. SCC circuits, for
|
||||
example, impact our daily operation because they're
|
||||
the CO's only link to the SCC for 24-hour alarm
|
||||
service. Priority circuits should be identified
|
||||
and noted in CIMAP/TIRKS."
|
||||
|
||||
|
||||
** Dial Tone Left at Home **
|
||||
|
||||
Installation and network employees in the Pawtucket/Providence, RI
|
||||
area are involved in a six-month trial of the Left In Dial Tone (LIDT)
|
||||
process. The trial, which began last November in Pawtucket and Buffalo, NY,
|
||||
will evaluate the impacts of the LIDT process on more than 20 provisioning
|
||||
systems.
|
||||
LIDT is a key component of RediServ, a major corporate business plan
|
||||
initiative to provide dial tone to a customer's location quickly, cost
|
||||
effectively, and with minimal manual intervention.
|
||||
LIDT leaves a restriced dial tone on a subscriber's line when service
|
||||
is disconnected. When new occupants move into the LIDT location, they have
|
||||
access to Emergency Services (911/E911) and their Residence Service Center.
|
||||
All other callls from the restriced dial tone, including "0" operator calls,
|
||||
are intercepted by a recording advising the customer of the dialing
|
||||
capabilities of the line.
|
||||
Since the process begins with a customer's disconnect order, Pawtucket
|
||||
was selected for the trial because of its high customer turnover. About
|
||||
700 lines in the area are now working with restricted dial tone.
|
||||
Mechanized Loop Assignment Center (MLAC) line assigners have matched
|
||||
customer addresses between databases, and verified that cables and pairs
|
||||
are wired from the CO to these locations. In addition, they manually assign
|
||||
any LIDT orders that do not flow directly through the provisioning system.
|
||||
In the Recent Change Memory Administration Center (RCMAC) [Oh GOD..please..
|
||||
...make these acronyms from HELL go AWAY!... -c0] most translations on
|
||||
LIDT orders are automatically completed.
|
||||
For CO technicians the trial has meant more dedicated wiring on the
|
||||
frame, but less rewire work on subsequent installations. And for splice
|
||||
service technicians (SST) LIDT should mean fewer dispatches on installation
|
||||
orders. However, as with any pilot program, problems occur.
|
||||
Early in the trial SSTs were dispatched unnecessarily for installations
|
||||
at restricted dial tone locations. A vendor-supported system had caused a
|
||||
local coding problem for clerks in the posting of completions on LIDT orders.
|
||||
The problem has since been corrected, and according to Manager Linda
|
||||
Briggs, the "No Premise Visit" (NPV) rate in Pawtucket should drastically
|
||||
improve to meet or exceed the 99.3 percent NPV rate in Buffalo, NY.
|
||||
"Once the LIDT process is fully deployed, installation work for
|
||||
technicians will become the exception rather than the rule. As a result,
|
||||
technicians can spend more time on maintenance and outside plant
|
||||
rehabilitation which will increase service reliability and decrease NET's
|
||||
cost per access line," says Briggs.
|
||||
Another issue involving unnecessary police dispatch to LIDT locations
|
||||
briefly occurred. Rhode Island's Public Service Administration Board
|
||||
mistakenly understood that 911 operators would be able to call back an LIDT
|
||||
location if the customer hung up. To correct the situation new LIDT messages
|
||||
were recorded, expedited through legal channels, and implemented in Pawtucket
|
||||
on January 17.
|
||||
"Access to emergency services has been a lifesaver for some Pawtucket
|
||||
customers who dialed 911 from an LIDT location in a tru emergency and had
|
||||
the appropriate authorities respond immediately," says Frank Lanza, staff
|
||||
manager.
|
||||
Yet another benefit for customers in the LIDT process is service
|
||||
reliability. Throughout the night all central office lines, including the
|
||||
LIDT lines, are scanned and tested by a computer [Hrmmmm...mebbe *monitored*
|
||||
too?...hrmmm... -c0]. As a result, troubles are repaired by the maintenance
|
||||
center often before customers are even aware that a problem existed.
|
||||
"For customers Left In Dial Tone will make NET easy to do business
|
||||
with and will positively position the company in the competitive marketplace,"
|
||||
says Briggs.
|
||||
|
||||
|
||||
** Of Note... **
|
||||
|
||||
More than 2.4 million (49.8 percent) of NET's residence and simple
|
||||
business customer records have been verified using the NYNEX Data Validation
|
||||
System (NDVS). The system compares critical information from five key
|
||||
databases - CRIS, COSMOS, LFACS, LMOS, and PREMIS - and reports discrepancies
|
||||
for follow up by Mechanized Loop Assignment Centers (MLACs), central offices,
|
||||
and other work groups.
|
||||
In association with RediServ, a major company initiative to allow
|
||||
faster service installation, data management groups at NET and TRG are
|
||||
coordinating the line-by-line record verification effort. Employees often
|
||||
identify inaccurate records as a source of service problems and frustration.
|
||||
|
||||
|
||||
|
||||
Well, that's it for now....nothing 'earth-shattering'....but interesting
|
||||
and fun to read nevertheless....and since NET/NYNEX is so ANAL about giving
|
||||
out information, the only way to get it is to *trash*...
|
||||
|
||||
Look for the next issue of "DI" to come out next month or so......
|
||||
|
||||
Till then...don't stop exploring....and don't be afraid to get your hands
|
||||
a bit dirty....
|
||||
|
||||
..oooOO Count Zero OOooo.. *cDc* -=RDT
|
||||
|
254
textfiles.com/phreak/TRASHING/trash2.txt
Normal file
254
textfiles.com/phreak/TRASHING/trash2.txt
Normal file
@@ -0,0 +1,254 @@
|
||||
THE ........ULTIMATE..........GUIDE........ON...........TRASHING
|
||||
|
||||
|
||||
///\\\ IT's NOT FUN, IT's SCIENCE! ///\\\
|
||||
|
||||
DEFINITION: Trashing is the operation of recovering paper
|
||||
documents, bills, checks etc. from the persons or companies garbage
|
||||
cans(bags). Trashing is one of the the oldest and safest ways to get any
|
||||
kind of information(if u know what r doing)
|
||||
|
||||
SAFETY: This is very safe method, because usually it
|
||||
doesn't involve any illegal actions, except trespassing when it's nececery,
|
||||
it is virtually impossible to get into serious trouble for trashing.
|
||||
Here's the tip, with it u are never gonna get in any kind of trouble,
|
||||
REMEMBER u should never look like u are searching for paper documents or
|
||||
any other kind of private information, which can easily be considered
|
||||
illegal.(will be explained later)
|
||||
|
||||
STRATEGY: Strategy is more important than most of u kids
|
||||
think it is. Everybody should have his own strategy, but here are some
|
||||
hints. It's very important to see three parts of the process which are
|
||||
targeting, planning and action. Most of u clearly see the last part.
|
||||
|
||||
Targeting or choosing the object for your next mission is very important,
|
||||
u wouldn't like to trash some supermarket or store, and then find out that
|
||||
they don't even accept credit cards or bank where they shred all the
|
||||
fucking paper, however usually it's not so hard to choose the right object,
|
||||
a little bit of research and common sense, basically thats all!
|
||||
|
||||
Planning - the most important and probably the most difficult part, here
|
||||
u should plan your mission considering everything: time, weather conditions,
|
||||
location, security (surveillance and police patrolling), crime situation in
|
||||
the area (in poor neighbourhoods, where robberies and usual crimes like
|
||||
that are very frequent, police and people are very suspicious of every dude
|
||||
walking around dressed in the black) , crowdness , "dress code" and of
|
||||
course action itself.
|
||||
|
||||
Action completely depends on your physical abilities
|
||||
(jumping over the fence, sneaking in to the backyard,etc) and abilities of
|
||||
your tools. Also u should know that trashing takes a lot of patience,
|
||||
sometimes u have to go for weeks to the same place, until u find what u r
|
||||
looking for, so it's not a good idea to mess the site up or burn the
|
||||
garbage cans to the ground, even though that can be phun!:-0)
|
||||
|
||||
TARGETING: There are two ways of targeting : RANDOM - when u
|
||||
are basically guessing your future objects using your common sense, for
|
||||
example most people know that banks throw out a lot of paper, so why
|
||||
shouldn't i check one of them. Usually when u use that method u don't know
|
||||
exactly what are u looking for, u r just browsing the paper, searching for
|
||||
something that could interest u, like numbers, signatures, handwriting.
|
||||
|
||||
POINTED - is the other, more sufisticated method of trashing, that involves
|
||||
some research. Here, the goal is to get as much information as u can about
|
||||
organization and its activity. The best example, is the trashing of
|
||||
the private sector, everybody knows that most of the credit card companies
|
||||
send their statements at the end of the month, so the good idea to trash it
|
||||
around this time to get the best results. Following the recycling days also a
|
||||
good example of pointed trashing.
|
||||
|
||||
PLANNING: Remember the most important thing is to plan your
|
||||
actions, so it will take u the least amount of time possible, without
|
||||
getting a lot of attention.
|
||||
|
||||
TIME: of course the best time to go trashing is from 2-5 am
|
||||
(in the big cities), however from my own experience u should do this 4-5 am
|
||||
when it's not dark anymore but there are still no people on the
|
||||
streets and your local police units seem to be more relaxed, waiting for
|
||||
the opening of Dunkin Donuts. Don't be too late, though, if in your area
|
||||
garbage squad works on any kind of schedule(hehe), u don't wanna come over
|
||||
and see all the garbage collected! The best night for trashing is the night
|
||||
before collecting, which u can easily find out by the signs on the street
|
||||
that say :NO PARKING on particular days, recycling days really can be
|
||||
helpful since all the paper and cardboard should be wrapped and left in
|
||||
front of the house, to find out recycling days in your area u should
|
||||
contact your local department of sanitation (212-219-8090 for NYC
|
||||
(sanitation action center)) recycling days usually go with interval of 2
|
||||
weeks (except holidays). By the way do not spend more than 10-15 minuts
|
||||
trashing, 15 minutes should be more than enough!
|
||||
|
||||
WEATHER: of course it doesn't really matter, but
|
||||
if it's raining and weather is shitty itself chances are u'll be doing your
|
||||
thing without major interruptions. It good to start right after the rain has
|
||||
started, that way u won't find most of the paper documents damaged!
|
||||
|
||||
LOCATION: Most of the backyards these days remind
|
||||
concentration camps of the WWII, so u gonna need some skill to go through
|
||||
those fancy fences. If don't have a lot of experience or u just don't
|
||||
feel like breaking the law, choose target with an easy access so u won't
|
||||
get a lot trouble getting in and out.
|
||||
|
||||
DRESS CODE: Get your old dark clothes from the closet and u
|
||||
are set! However u can't look different from the people in the
|
||||
neighbourhood! And of course no need for army stuff like camouflage pants,
|
||||
black gloves and hats, don't get extreme, people will figure some serial
|
||||
killer they were expecting all their life finally came in their
|
||||
neighbourhoods, and will call the cops, just for the regular check up!
|
||||
|
||||
PEOPLE (amount): U should avoid usual hang outs
|
||||
and places where a lot of people happen to like walking through in the
|
||||
nighttime.In the daytime big crowds are you best allies, if u planning to
|
||||
trash the cashier's garbage can, in your local WIZ or whatever, the best
|
||||
hours are from 12 to 4 pm, when either the store is so crowded that you can
|
||||
take the cashier machine with the papers or it's empty, and most of the
|
||||
employees happened to take a lunch break or too lazy even to look around!
|
||||
|
||||
SURVEILLANCE: Of course u know today most of the
|
||||
companies, i don't even talk about banks, armed with the latest pieces of
|
||||
surveillance equipment, cameras in the backyard of course are the worst and
|
||||
most common enemies of the trasher, so before diving in, look around,
|
||||
chances are, theres something that can see u, a lot of private houses have the
|
||||
movement detectors, u know this really annoying thing that lights up when
|
||||
someone's walking around, one of my stupid neighbours put one outside his
|
||||
house, now it goes off, everytime someone walks by the the house, just
|
||||
break the bulb, and that shouldn't be a big problem.
|
||||
|
||||
ACTION: Ok, here we are ,everything is prepared, the date is
|
||||
set, your new armani suit is waiting for you in the closet, u are ready to
|
||||
go! U are gonna need some tools to help you finish everything faster and
|
||||
safer, of course! What u have to know is that u cannot take anything that
|
||||
will not be helpful or can reveal your identity if u loose it.
|
||||
|
||||
BLADE - one of the most important tool for u!
|
||||
Remember those old razors where u had to replace the blade, well thats the
|
||||
blade u need! I know it's pretty hard to get one today, but u definitely
|
||||
should check your local pharmacy for it!
|
||||
|
||||
Utility knives : some people use them
|
||||
because it's safer to carry on and u can use them for other things like
|
||||
striping wires, but i don't like to use utility knives because they are
|
||||
pretty big and it's pretty hard to get rid of when u have to, the other
|
||||
thing is that it doesn't work for me that well! If u don't want
|
||||
accidentally slash yourself u may consider put some iso-tape(electrical)
|
||||
over it, and use it as a handle.
|
||||
|
||||
Rubber(latex) GLOVE(s) - here's another tool, for people
|
||||
like me, who don't really enjoy going through somebodies leftovers or
|
||||
whatever is in there! I use one glove, the technique is: i carry blade in
|
||||
one hand and on the other i put the glove, to go through the actual trash.
|
||||
When u get used to this technique, the work goes amazingly fast. After the
|
||||
job is done the good idea would be not to put the glove in the same
|
||||
garbage can!
|
||||
|
||||
FLASHLIGHT: I know it's a very important thing
|
||||
to have with u, but here in New York i used it maybe twice going trashing, the
|
||||
streets are so lighten up, i guess u can find a penny in the trash here
|
||||
without using any portable source of light!
|
||||
|
||||
BAG(s): First of all u are gonna need a
|
||||
bag to put all you foundings in it, the second bag can be very useful (see
|
||||
SLASHING) My advice do not carry the bag while going through the trash. Put
|
||||
it in the can with the rest of the trash, and only after finishing take the
|
||||
bag and leave fast, otherwise u will cause brain damage to the cop or guard
|
||||
when he will be thinking why is the guy searching for his watches or cans
|
||||
has a bag full of documentation and other paper, and we wouldn't want to do anything
|
||||
like this!
|
||||
|
||||
GOOD LINE (story): REMEMBER, really good line
|
||||
that can explain your actions can save maybe not the life, but your ass for
|
||||
sure, something like: I was today in this bank, and left my student ID on
|
||||
the counter(wherever), and when i called them up they told me that someone
|
||||
must have put it in the garbage, so i called the sanitation and they told
|
||||
that today is the collecting night in that area and to search for the
|
||||
wallet would cost me 70$, so i have decided to go and search for it by
|
||||
myself! This is very good line, even security and cops have a heart, so
|
||||
that can even explain trespassing, and shouldn't cause any problem at all,
|
||||
maybe warning! Now here u want to keep in mind the situation u r in, if u
|
||||
have a bag full of paper u should come up with explanation, which is not so
|
||||
easy, to avoid this situation please refer to the paragraph on disguise!
|
||||
|
||||
* DISGUISE: It's extremely important to
|
||||
include this in your "action pack", what can be considered as disguise, is
|
||||
something that can support your great story, remember this old disguise, i'm
|
||||
sure most of u use, put a couple of cans in your bag, now u can bull shit
|
||||
security about collecting the cans for some competition or just for
|
||||
yourself, very nice! But here something i made up myself, and it seems to
|
||||
be working for me with any line i use: U know, a lot of old people actually
|
||||
collect all the plastic bags, why would they buy new ones, so if u are
|
||||
gonna put about 5 plastic bags in your bag, u can easily get of the hook,
|
||||
claiming that your old grandma asked you to pick up some plastic bags on
|
||||
your way, since she knows that your going to go through the garbage!
|
||||
(for whatever reason u told the cops) Usually they ask u to take out what
|
||||
u have in the bag, u just look inside your bag and find your lifesaving
|
||||
plastic bags, here u go sir, if the cop is really pain in the ass and finds
|
||||
out that u have paper in the bag as well, just tell him that it must have
|
||||
been in the plastic bags u 've found, and u didn't want to take it out here,
|
||||
because it's kind of embarrassing u know, if some of your friends see u
|
||||
diving in the garbage can! hehe Yeah right, i guess that sounds nice! As i
|
||||
said before cop too has a heart and a little bit of brain so if your story
|
||||
sounds LOGIC u shouldn't have a lot of shit on you! hehe Thats idiom!
|
||||
|
||||
Another tip before u've started, don't hang around people's cars,
|
||||
windows and other valuable stuff, u know people usually get pissed off
|
||||
because of that!
|
||||
|
||||
PRIVATE HOUSING: trashing here can be very complicated, if u
|
||||
don't know how to do it right. Here u are gonna have to deal with bags.
|
||||
(see SLASHING) First of all u should think before doing this on the
|
||||
site: it will take u a lot of time, trash here is usually very dirty and if
|
||||
u live in your own house or know some quite place outside, a good
|
||||
idea would be to bring a couple trash bags in your back yard. If u live in
|
||||
apartment like i do, here what u can do: DEPARTMENT OF SANITATION
|
||||
in the big cities is very strict and always make up some shit like
|
||||
recycling or just sorting the trash! Well i guess thats all u need, in NYC
|
||||
city looking for the papers u should check all the GREEN garbage cans,
|
||||
where all the paper should be. U can go further and use you social
|
||||
engineering skills to call up people in the house, posing as an employee of
|
||||
the department of sanitation, and tell them that last time, workers found
|
||||
in the their trash checks, bills and statements, which is illegal
|
||||
to put with the regular paper, because they contain some chemical
|
||||
(dEnopEroXId......whatever)(i'm not Mendeleyev, neither have to be u)
|
||||
which is none recycble, and can cause serious damage to the
|
||||
atmosphere :). SO next time please put all your checks, bills
|
||||
(whatever u want them to) in the pink bag, u can also ask them to mark it,
|
||||
something like "RADIOACTIVE" or "BODY PARTS", even can
|
||||
specify the date when they should take it out! hehe. So next time u'll be
|
||||
around u can easily determine where is everything u need. This
|
||||
method will work in the big cities where SANITATION is very powerful and
|
||||
strict, once i put my paper in the bag, and got ticket just because i
|
||||
didn't wrap it up.
|
||||
|
||||
GOVERNMENT and COMPANIES structures: all the garbage they
|
||||
usually keep in the back yards, however if u don't see any drive access to
|
||||
the back yard they probably take it out on the garbage day(a lot of banks
|
||||
in my neighbourhood do that, because of the limited space in the backyard,
|
||||
or because they don't have a drive access to it, they have to take it out
|
||||
anyway) Certainly this can be the easiest way to trash, just wait until the
|
||||
garbage day, go there and here u go, in front of the bank or whatever, u
|
||||
see 3 or 4 carefully tied bags. If u want to be there first, u should go
|
||||
right after the closing, and don't worry to be late for it, no
|
||||
selfrespectful sanitation department will pick up the garbage earlier than
|
||||
the middle of the night.
|
||||
|
||||
SLASHING: Slashing the bags is the fastest way to open them,
|
||||
right!? If u gonna trash one of those big metal trash cans, u can dive in
|
||||
and leave whatever mess u want, it doesn't really matter those big garbage
|
||||
trucks will take the whole can, but when u trash private house it's very
|
||||
important not to leave any mess after you. All the garbage from houses and
|
||||
streets those garbage men will pick up with their hands, and i don't think
|
||||
they will be happy to see slashed bags with all this mess around, the owner
|
||||
will definitely get a ticket for that. The solution is to take another bag
|
||||
where u can put all your mess, without getting hardworking men angry. U
|
||||
gonna get used to slash the bags in the right places, so u won't get too
|
||||
dirty and finish the damn thing faster.
|
||||
|
||||
CAUTION : Right now, when u r reading this, someone can
|
||||
easily be trashing you, so if u don't want to become victim of this
|
||||
document, please do not throw away any papers that can reveal anything
|
||||
from your personal data!
|
||||
|
||||
|
||||
release date: 11/97 by :
|
||||
|
||||
|
||||
::::::::::::::::::::::::: GOLDEN DUST ::::::::::::::::::::::::::
|
110
textfiles.com/phreak/TRASHING/trash3.phk
Normal file
110
textfiles.com/phreak/TRASHING/trash3.phk
Normal file
@@ -0,0 +1,110 @@
|
||||
>>>>> TRASHING TECHNIQUES <><<<<<<<<<<
|
||||
|
||||
////////////////////////////////
|
||||
/ MORDOR AE - 528-6467 ZANDAR /
|
||||
/ THE BASEMENT - 223-6404 /
|
||||
////////////////////////////////
|
||||
|
||||
THE UNDERGROUND ALLIANCE RULES!!!!!!!
|
||||
|
||||
Ok guys...first,there has to be a bell telephone station near you or someone
|
||||
close to your heart......
|
||||
|
||||
The best type to look for is known as a "VAULT" if you have seen one you know
|
||||
why it is called just that... it has four walls, no windows, and most likely a
|
||||
digital combination lock.
|
||||
|
||||
|
||||
NEEDED EQUIPMENT
|
||||
======================================
|
||||
1:Sneakers(in case of cops)
|
||||
2:Sheet of paper w/excuses if caught
|
||||
3:Clean garbage bag(several)the ones you find in the dumpster reek like all
|
||||
hell
|
||||
4:One flashlight(good batteries)
|
||||
5:Dark(possibly camouflage)clothes
|
||||
6:A friend(trustworthy not a wimp)
|
||||
7:One bottle of j.d.(just for the hell of it)
|
||||
======================================
|
||||
LIST OF EXCUSES
|
||||
======================================
|
||||
|
||||
1:I forgot murder was against the law
|
||||
2:I was lost..
|
||||
3:I was hungry
|
||||
6:Needed a place to sleep
|
||||
5:Why not?
|
||||
6:Lost something in the garbage
|
||||
7:Needed wallpaper
|
||||
8:Fuck off and die
|
||||
9:Read me my rights first
|
||||
10:It's the new fad..garbage pursuit
|
||||
|
||||
======================================
|
||||
BE PREPARED FOR...
|
||||
======================================
|
||||
|
||||
1:An immediate unforseen departure from the premises(w/the stuff!)
|
||||
2:Zandar's law...for every piece of inorganic garbage there is an
|
||||
equal and substatially worse smelling piece of organic shit!
|
||||
3:Your friendly neighborhood cop
|
||||
4:A shower when ya get home
|
||||
5:A lot of garbage
|
||||
6:Potholes and ditches that you never knew existed
|
||||
|
||||
======================================
|
||||
WHAT TO LOOK FOR
|
||||
======================================
|
||||
|
||||
1:Anything that looks dead...
|
||||
2:Anything that looks like a computer printout(or manual)
|
||||
3:Hardware(with a lot of luck)
|
||||
4:Police(look do not find!!)
|
||||
5:The garbage area
|
||||
6:An escape route
|
||||
7:An obscure and well hidden stash area as well as an obscure
|
||||
approach
|
||||
|
||||
=======================================
|
||||
WHAT NOT TO DO
|
||||
=======================================
|
||||
|
||||
1:Get caught
|
||||
2:Panic
|
||||
3:Leave any sign of your presence
|
||||
4:(clean the damn place up)
|
||||
5:Make noise
|
||||
6:Have more than two people
|
||||
7:Forget where you live
|
||||
8:Do not go to the near by restaurant or bar for a quickie
|
||||
9:Do not do it in the daytime
|
||||
10:Throw anything back just because you aren't sure what it is...
|
||||
(chances are it is worth all the more 'cause only telco employees
|
||||
can understand it)
|
||||
|
||||
=======================================
|
||||
We believe that if you follow these instructions you too can screw over BELL
|
||||
w/a little luck and half a brain................
|
||||
=======================================
|
||||
as a final note,find out when your local sanitation co. picks up the garbage
|
||||
and go the night before.. also,if the bell place nearest you incinerates its
|
||||
garbage forget it!
|
||||
=======================================
|
||||
written by:
|
||||
|
||||
zandar zan
|
||||
&
|
||||
the boogyman
|
||||
=======================================
|
||||
u
|
||||
insinerates its garbage forget it!
|
||||
|
||||
=======================================
|
||||
written by:
|
||||
|
||||
zandar zan
|
||||
&
|
||||
the boogyman
|
||||
=======================================
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
80
textfiles.com/phreak/TRASHING/trashin2.txt
Normal file
80
textfiles.com/phreak/TRASHING/trashin2.txt
Normal file
@@ -0,0 +1,80 @@
|
||||
Advanced Trashing Techniques
|
||||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||||
|
||||
By: Jimmy'z
|
||||
|
||||
|
||||
|
||||
Introduction:
|
||||
|
||||
Trashing is the simple act of looking through other peoples
|
||||
trash; to find interesting stuff. If you wonder why one would
|
||||
ever want to consider doing such an act... Remember : One man's
|
||||
garbage is another man's treasure.
|
||||
|
||||
The whole reason for trashing is to find INFORMATION. You
|
||||
could be interested in getting credit card numbers, computer
|
||||
system passwords, industrial secrets, blackmail material,
|
||||
ANYTHING. 99 times out of 100 it'll be in their trash.
|
||||
|
||||
|
||||
|
||||
Trashing Techniques:
|
||||
|
||||
The best time for trashing is in the broad daylight *Unless
|
||||
the place locks their trash* Remember, if you act really
|
||||
inconspicuously, nobody will bother you. If by chance someone
|
||||
asks you what the h*ll you're doing, tell them you're looking for
|
||||
aluminum cans or something equally as stupid.
|
||||
|
||||
Remember to wear gloves, long sleeved shirts, and jeans of
|
||||
some sort. I've jumped into a few dumpsters containing fiber
|
||||
glass, nails, and even once : SHIT... It's a dirty business, BUT
|
||||
IT CAN PAY OFF IF YOU DON'T GET DISCOURAGED. Last time I went, I
|
||||
found over 500 TRW credit reports (Roughly 750 credit cards, plus
|
||||
TRW accounts, and passwords.)
|
||||
|
||||
|
||||
Best Places to Trash:
|
||||
|
||||
When thinking of a place to go trashing, you must first take
|
||||
into account WHAT you are trying to find. (You don't want to
|
||||
trash behind McDonalds if you are looking for credit card
|
||||
numbers. I highly suggest you NOT trash at a McDonalds - why
|
||||
look through all that crap. If you are looking for cards, the
|
||||
best places are malls. Malls are good because they receive by
|
||||
far THE MOST credit card payments. Trashing really requires
|
||||
thought on the part of the trasher, and with a little help from
|
||||
me, you'll be on the right track.
|
||||
|
||||
Flower shops are good places to trash. Most flower shops do
|
||||
most or all of their business through credit (phone orders) And
|
||||
besides, would you rather look through some smelly, shitty crap,
|
||||
or dead flowers?! Another really cool place to trash is the
|
||||
telephone company. If you have one of those big telephone
|
||||
company buildings, you'd be surprised at the types of data they
|
||||
throw away. Computer system's passwords, phone card numbers, the
|
||||
list goes on.
|
||||
|
||||
|
||||
|
||||
Closing:
|
||||
|
||||
Trashing can prove to be very fun, interesting, AND
|
||||
PROFITABLE! Just keep on doing it, and you'll stumble upon some
|
||||
really interesting stuff. You never know when you'll find a
|
||||
briefcase or something filled with cash, or drugs. Another
|
||||
thing, when trashing - just jump right in there, leaning over one
|
||||
of those dumpsters can start to hurt after a while!
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
Disclaimer:
|
||||
|
||||
This file is for informational use only. I am simply
|
||||
reserving my right to free Speech! I love The USA!
|
||||
|
||||
|
||||
----------------------------[ J I M M Y ' Z]---------------------
|
134
textfiles.com/phreak/TRASHING/trashing.hac
Normal file
134
textfiles.com/phreak/TRASHING/trashing.hac
Normal file
@@ -0,0 +1,134 @@
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
% %
|
||||
% Better Homes and Trashing %
|
||||
% %
|
||||
% Written by..... The Saint %
|
||||
%%%%%%%%%%%%% %%%%%%%%%%%%%
|
||||
% Thanx to Ares for his help! %
|
||||
% %
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
|
||||
Intro:
|
||||
|
||||
This file is intended for informational purposes only!!!
|
||||
|
||||
The authors (The Saint and Ares) take no responsibility whatsoever for
|
||||
any actions taken by anyone who reads the contents of this file.
|
||||
|
||||
Primarily, this file will discuss the general idea behind trashing, the
|
||||
risks involved, and some general tips to make your trashing venture
|
||||
successful.
|
||||
|
||||
Basics:
|
||||
|
||||
The basic reasons for trashing can vary, but are generally:
|
||||
|
||||
1> To obtain credit cards and/or carbons of credit cards.
|
||||
2> To obtain any information that may be useful in the aid of phreaking.
|
||||
|
||||
When choosing a place to go trashing, one must keep in mind the following:
|
||||
|
||||
1> Location of dumpster
|
||||
2> Security of property where dumpster is located
|
||||
3> Type of trash that may be found
|
||||
|
||||
First, the location. You generally want to pick a place that is somewhat
|
||||
isolated, where there will not be a lot (preferably none) of people. To
|
||||
accomplish this, it is also best to do your trashing at night, as there
|
||||
will not likely be any employees at the location, and it is easier to hide
|
||||
and to not be seen by passers-by.
|
||||
Second, the security. Places such as Telco buildings and large companies
|
||||
often have security guards on duty 24 hours, and often keep their dumpsters
|
||||
behind fences so as to discourage trespassing. Yes, you are trespassing when
|
||||
you start looking in someone's garbage can!!! So it is a good idea to check
|
||||
out the place you are going to trash for a day or so to get a feel for what
|
||||
kind of security they have. This way, you can avoid walking in blindly to
|
||||
some place and getting nabbed, or you can figure out where to park your car,
|
||||
or where to hide, or how to avoid the security (rent-a-cops).
|
||||
Places such as department stores and banks most likely will not have any
|
||||
security for the outside of their buildings as they may not be able to
|
||||
afford it or may not anticipate trashers. Also, they may not have anything
|
||||
worth taking! So basically, check the place out before you just go and hit
|
||||
it.
|
||||
Case in point. One night, my friend and I casually pulled into the
|
||||
parking lot of a Pacific Bell office, and before we knew what was
|
||||
happening, a security guard had a giant spotlight glaring down on us.
|
||||
We just casually made a u-turn as if we were just turning around to go the
|
||||
other way. (More on what to do if you get caught later).
|
||||
|
||||
Third, you must pick a place where you know there will be trash that is of
|
||||
use to you. Don't go trashing at some little deli, all you'll get is a
|
||||
bunch of rotten food! (Unless of course you know for a fact that the deli
|
||||
deals alot with credit cards). In searching for cards, pick places such as
|
||||
department stores or places that sell alot of expensive stuff.
|
||||
|
||||
Also, the local telephone company is, of course the place to go to find
|
||||
your basic phreaking info.
|
||||
|
||||
These have been some of the basics to keep in mind before you hit aplace.
|
||||
Now for some techniques to use to help increase the efficiency of your
|
||||
trashing endeavors.
|
||||
|
||||
Tips:
|
||||
|
||||
First of all, don't be afraid to actually go into the trash can. This is
|
||||
almost always necessary to reach the good stuff. Also, when you are ducking
|
||||
down inside a big dumpster, you cannot be seen by passing police cars or
|
||||
security guards who happen to waltz by.
|
||||
|
||||
Second, always have a lookout somewhere to keep an eye out for cops or
|
||||
employees who may be coming out to throw trash away. You may want to have
|
||||
some kind if signal so that if you have advanced warning of security, you
|
||||
can take evasive measures, like burying yourself in the trash.
|
||||
|
||||
Try not to spend too long in a given trash can. The longer you stay, the
|
||||
more you put yourself at risk of getting caught. This means that you cannot
|
||||
be too picky about what trash you take. There is plenty of time for that
|
||||
after you bail the scene with the goods. You may want to have a knife handy,
|
||||
however, to cut open boxes or bags, and a small flashlight is a good idea,
|
||||
although if possible, avoid using to much light or making too much noise,
|
||||
anything that could potentially attract someone.
|
||||
|
||||
A car is a good thing to have, if possible. This greatly increases the
|
||||
range of places you can hit in one night. It is a good idea, if you are
|
||||
accumulating alot of stuff, to stop somewhere secluded and well lit
|
||||
(like a school or empty shopping center) and sort out the trash so you
|
||||
can get rid of useless garbage like food, etc. Take all the useless
|
||||
garbage and dump it into another dumpster.
|
||||
|
||||
You may want to wear old clothes that can get messed up, and gloves are not a
|
||||
bad idea either, both to keep your hands clean, and to keep prints off of
|
||||
anything in case the place discovers what you have done.
|
||||
|
||||
What to do if you get caught:
|
||||
|
||||
This is perhaps the most important thing to keep in mind when trashing.
|
||||
What to do if you happen to be caught be someone and they want to know what
|
||||
you are doing.
|
||||
|
||||
If you can, run like hell! Only do this if you have a clean getaway
|
||||
and you think you can get away without too much problem. Keep in mind that
|
||||
trying to escape may only make your situation worse. Only run if it looks
|
||||
like they are gonna bust you.
|
||||
|
||||
In most cases, the people may just tell you to get out. They will probably
|
||||
ask you some dumb questions, like "What are you doing in the trash?"
|
||||
In this case, make up a story, like "Oh, my friend here threw a ball
|
||||
in here and I was looking for it." If the guard believes you, he will
|
||||
probably just tell you to get out with a strong warning.
|
||||
|
||||
If they are serious about nailing you, however, chances are you'll only
|
||||
get charged with trespassing, which is not a major crime. In any case,
|
||||
however, maintain an extremely high level of caution when trashing, and
|
||||
always remain calm and collected. You can usually bullshit your way out
|
||||
of just about anything if you play your cards right.
|
||||
|
||||
Hope this has helped you to gain some insight into how to go about gaining
|
||||
that valuable information you always wanted.
|
||||
|
||||
Look for more informative files in the future from Better Homes and
|
||||
Anarchy. And if you have any comments or anything to add, you can get hold
|
||||
of me on the Electric Kingdom at (619) 484-5243. Please upload this to
|
||||
many BBS's around the country to help your phellow phreakers!
|
||||
|
||||
DOWNLOADED FROM P-80 SYSTEMS......
|
67
textfiles.com/phreak/TRASHING/trashing.phk
Normal file
67
textfiles.com/phreak/TRASHING/trashing.phk
Normal file
@@ -0,0 +1,67 @@
|
||||
Uploaded By: PRIVATE PIRATE
|
||||
---------------------------------------
|
||||
Bell Trashing
|
||||
By: The Dragyn
|
||||
The Police Station
|
||||
612-934-4880
|
||||
|
||||
|
||||
The Phone Co. will go to extreams on occasions. In fact, unless you really
|
||||
know what to expect from them, they will suprise the heck out of you with their
|
||||
"unpublished tarriffs". Recently, a situation was brought to my attention that
|
||||
up till then I had been totaly unaware of, least to mention, had any concern
|
||||
about. It involved gar- bage! The phone co. will go as far as to prosecute
|
||||
anyone who rumages through their garbage and helps himself to some.
|
||||
|
||||
Of course, they have their reasons for this, and no doubt benefit from such
|
||||
action. But, why should they be so picky about garbage? The answer soon
|
||||
became clear to me: those huge metal bins are filled up with more than waste
|
||||
old food and refuse... Although it is Pacific Tele. policy to recycle paper
|
||||
waste pro ducts, sometimes employees do overlook this sacred operation when sor
|
||||
ting the garbage. Thus top-secret confidential Phone Co. records go to the
|
||||
garbage bins instead of the paper shredders. Since it is constantly being
|
||||
updated with "company memorandums, and supplied with extensive reference
|
||||
material, the Phone co. must continualy dispose of the outdated materials.
|
||||
Some phone companies are supplied each year with the complete "System
|
||||
Practices" guide. This publication is an over 40 foot long library of
|
||||
reference material about everything to do with telephones. As the new edition
|
||||
arrives each year, the old version of "System Practices" must also be thrown
|
||||
out.
|
||||
|
||||
I very quickly figured out where some local phone phreaks were getting their
|
||||
material. They crawl into the garbage bins and remove selected items that are
|
||||
of particular i nterest to them and their fellow phreaks. One phone phreak in
|
||||
the Los Angeles area has salvaged the complete 1972 edition of "Bell System
|
||||
Practices". It is so large and was out of order (the binders had been removed)
|
||||
that it took him over a year to sort it out and create enough shelving for it
|
||||
in his garage.
|
||||
|
||||
Much of this "Top Secret" information is so secret that most phone companies
|
||||
have no idea what is in their files. They have their hands full simply
|
||||
replacing everything each time a change in wording requires a new revision. It
|
||||
seems they waste more paper than they can read!
|
||||
|
||||
It took quite a while for Hollywood Cal traffic manager to figure out how all
|
||||
of the local phone phreaks constantly discovered the switchroom test numbers.
|
||||
|
||||
Whenever someone wanted to use the testboard, they found the local phone
|
||||
phreaks on the lines talking to all points all over the world. It got to the
|
||||
point where the local garbage buffs knew more about the office operations than
|
||||
the employees themselves. One phreak went so far as to call in and tell a
|
||||
switchman what his next daily assignment would be. This, however, proved to be
|
||||
too much. The switchman traced the call and one phone phreak was denied the
|
||||
tool of his trade.
|
||||
|
||||
In another rather humorous incident, a fellow phreak was rumaging through the
|
||||
trash bin when he heard someone approaching. He pressed up against the side of
|
||||
the bin and silently waited for the goodies to come. You can imagine his
|
||||
surprise when the garbage from the lunchroom landed on his head. Most people
|
||||
find evenings best for checking out their local telco trash piles. The only
|
||||
thing necessary is a flashlight and, in the case mentioned above, possibly a
|
||||
rain coat. A word of warning though, before you rush out and dive into the
|
||||
trash heap. It is probably illegal, but no matter where you live, you
|
||||
certainly won't get the local policeman to hold your flashlight for you.
|
||||
|
||||
---------------------------------------
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
170
textfiles.com/phreak/TRASHING/trashinguide.txt
Normal file
170
textfiles.com/phreak/TRASHING/trashinguide.txt
Normal file
@@ -0,0 +1,170 @@
|
||||
\Anti-Social Magazine
|
||||
\ Issue 12 31/03/99
|
||||
+------------------
|
||||
=====================
|
||||
Trashing - The Guide
|
||||
By Crashd
|
||||
=====================
|
||||
|
||||
Hey, Nice to be back again, This is my first interesting file in a long time,
|
||||
And as far as I can tell (sorry if I'm wrong) this subject hasnt been covererd
|
||||
at all (for the UK) Although I remeber some rather amusing incidents involving
|
||||
trash :) Trashing, is basically just wading through bags of shit and rubbish,
|
||||
looking for interesting things - documents, flopwarez, equipment etc..
|
||||
|
||||
This deal is split into 2 main areas, personal and business (just like the BT
|
||||
phone book :)
|
||||
|
||||
Ok, i'm gonna deal with personal first, as this is probably the easiest.
|
||||
|
||||
|
||||
1.\ Personal Trashing
|
||||
=====================
|
||||
|
||||
Let's take target #1. He's maybe a businessman, you want his CC number,
|
||||
mobile ESN, Girlfriends phone number, or just want to invade on the poor man's
|
||||
private life. Well the best place to start, is find his home address, and
|
||||
preferably the post code (if you cant find the latter, just knock at the few
|
||||
houses around his, they will probably glady give you it, lie and say your new
|
||||
to the neighbourhood) Now, phone the local council dude's, and ask when the
|
||||
refuse collectors (garbage men :) pick up the trash/shit. Or just ask the
|
||||
nice neighbours again.
|
||||
|
||||
The Night before the trash pick-up, be prepared. For clothes, I recommend
|
||||
something warm, this is my standard atire:
|
||||
|
||||
* 1 heavy-duty flashlight
|
||||
* 1 backpack lined with binbag
|
||||
* 1 black beanie hat
|
||||
* 1 pair of gardeners gloves
|
||||
* 1 pair of latex gloves
|
||||
* 1 Pair of lightweight bottoms
|
||||
* 1 rain-coat, just in case
|
||||
|
||||
Now, go for a stroll, probably the best time is about 10 or 11. Walk past the
|
||||
person's house, and check to see if he/she has left out their groovy wheely
|
||||
bin (most houses in the UK have these, a gift from the Labour Government).
|
||||
If so, walk straight past, towards say a shop or phone box, or whatever.
|
||||
About 10 minutes later, stroll past again, and accidently shunt into the bin,
|
||||
pick it up off of the ground, and walk away with it, take it down a
|
||||
back-street or whatever. Open it up, and get searching, dont forget the
|
||||
flashlight, dont shine it into cars going past or whatever. If you see
|
||||
anything worth stealing, pop it into your nice bag.
|
||||
Common stuff for stealing is:
|
||||
|
||||
* Phone Bill
|
||||
* Receipts
|
||||
* Business Cards
|
||||
* Filo-Fax's
|
||||
* Diary's (blackmail anyone?)
|
||||
|
||||
Most people tend not to chuck out Tv's etc..but if you find any electronical
|
||||
junk, take it and salvage for components :) When your finished with this bin,
|
||||
walk past nice and calm, make the drop off, turn a corner and walk slowly
|
||||
home, along with your sack of delights :)
|
||||
|
||||
|
||||
2.\ Business Trashing
|
||||
=====================
|
||||
|
||||
Business Trashing is much more popular than the latter shit. Stuff you can
|
||||
get from Companies include:
|
||||
|
||||
* Big Lists of ESN's
|
||||
* Manuals for Computers etc..
|
||||
* Journals (par example, the first Blue Box was derived from a technical
|
||||
manual found in a bin in the US) [Correction, No it wasn't, it was built
|
||||
using the tones published in a technical
|
||||
journal, publically available though
|
||||
not a well distributed one -Ed]
|
||||
* Equipment no longer needed
|
||||
|
||||
Hmm, the atire should basically remain the same, nice and conspicous and most
|
||||
of all old - it will take a little more than vanish to get rid of that Bad
|
||||
smell :)
|
||||
|
||||
The only time to trash business's is at NIGHT. Make it a weekend (maybe friday
|
||||
or saturday). Walk past Target company at about 10 to check out any security
|
||||
measures that may harras you, such as watchmen, dog's or camera's. (A
|
||||
favourite target of UK phreakers is BT's Exchanges/Offices. A lot of the MED
|
||||
archives is supposedly found through trashing =) Pop back to your house and
|
||||
pick up any decoy's or help you may need:
|
||||
|
||||
Example:
|
||||
|
||||
* Dog's - Mace (cruel) some fresh bloddy dripping meat (nice, but expensive
|
||||
and short term)
|
||||
OR
|
||||
An Ultrasonice grenade (Schematic shown below..it works as
|
||||
well...damn good.
|
||||
|
||||
* Camera's - Spray paint (good), blakck paper or just wear a lot of black and
|
||||
hope to hell they aint infra-red.
|
||||
|
||||
* Watchmen - You will almost certainly need some friends to help, get them to
|
||||
either phone the place in question, or create a decoy, ie:
|
||||
harrasing him while you nip round the back.
|
||||
|
||||
Also, bring the bag, in it put some chain cutters, and a crowbar.
|
||||
|
||||
If there is chains, cut them. A door? Crowbars work wonders.
|
||||
Once past the first obstacle, if there any of the above (dog, camera's etc..)
|
||||
If it is a yard etc.. the bins are big green/grey plastic/metal effors,
|
||||
probably chained, cut the chains and get rooting, try to have a look-out
|
||||
keeping tabs for you.
|
||||
|
||||
Obvious items of interest (from experience in BT places) are:
|
||||
* Big Chunks Manuals
|
||||
* Any Reams of form-feed paper (usually phone bills or quotes)
|
||||
* ANY Equipment, electrical or otherwise
|
||||
|
||||
Now, your trashing mission is complete, try and escape a different way to
|
||||
your way of entry, and if you disturbed anything, for example the camera's,
|
||||
leave them, Looks better in the long run.
|
||||
|
||||
If you repeat trash a place You will probably get caught quickly, sorry but
|
||||
that's the long and short of it, so go trashing maybe once every 2 months,
|
||||
and make it a nice big thorough inspection as you aint coming back for a
|
||||
while
|
||||
|
||||
* Schematics For Ultrasonic grenade.
|
||||
====================================
|
||||
|
||||
Ok, here's what you will need:
|
||||
|
||||
* 1 Gutted Tennis Ball
|
||||
* Circuit Board - Bread-Board will do for this.
|
||||
* 1 Ultrasonic Transducer (sender, not receiver), (Maplin, rapid, about <20>1)
|
||||
* 1 555 Timer chip
|
||||
* 2 resistors, preferably variable
|
||||
* 2 capacitors - .1 Muf should do.
|
||||
* 1 Mercury Tilt Switch
|
||||
* 1 1 Normal SPDT switch
|
||||
|
||||
Ok, first, if you Cant set up a monostable timing circuit, please please
|
||||
please dont bother trying to build this. Go check the web or ask a
|
||||
electronics lecturer. Ok, for the input of the timing circuit(Chip's pin 1),
|
||||
we want the mercury tilt switch, these are bi-polar. Have the timing circuit
|
||||
on it's own little PCB, and between then battery and the circuit, have the
|
||||
normal SPDT switch, cut out a small hole for this on the tennis ball. Also
|
||||
cut out another one, about 2cm's in diameter, for our transducer. Now wire
|
||||
the ultrasonice transducer as the output (pin 3) of the timing circuit. Glue
|
||||
the transducer into the tennis ball, and close it up with a bit of
|
||||
araldite/black tape/whatever.
|
||||
|
||||
Operation
|
||||
=========
|
||||
|
||||
When you want to use this, throw the SPDT switch, and lob it at a wall, make
|
||||
sure that it spins, or at least rolls. No dog/cat/bat for a good few meter's
|
||||
will be able to come near it and if they do, they will be in a little pain.
|
||||
|
||||
IF you want the Proper PCB Schematics and FULL instructions for this (yes,
|
||||
even how to build the fucking timer circuit) mail: crash_dave_1997@yahoo.com
|
||||
|
||||
Ok, thanks for reading, and if you havent..you've missed it all :)
|
||||
Werd
|
||||
Mail me:
|
||||
crash_dave_1997@yahoo.com
|
||||
ICQ UIN: 7538027
|
||||
IRC: EFNET: #2600-uk, #phuk
|
119
textfiles.com/phreak/TRASHING/trashis.phk
Normal file
119
textfiles.com/phreak/TRASHING/trashis.phk
Normal file
@@ -0,0 +1,119 @@
|
||||
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||||
:% %:
|
||||
:% BASIC TRASHING MANUAL %:
|
||||
:% Written by: %:
|
||||
:% The Blue Buccaneer %:
|
||||
:% %:
|
||||
:% The Rebel Alliance MegCatLine : [615] - 942 - 6670 %:
|
||||
:% %:
|
||||
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
|
||||
|
||||
|
||||
This is an elementry manual on trashing. I don't think I am qualified to
|
||||
do one on advanced trashing, so here are the basics:
|
||||
|
||||
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||
|
||||
Trashing is the act of sorting through trash captured from the garbage bins
|
||||
and cans of your local MaBell office. The trash often contains many valuable
|
||||
things which can range from office memos instructing an operator to carry out a
|
||||
special task (trace someone's line..etc) to actual working phones! In addition
|
||||
to those things, you are also very likely to pick up Bell manuals (they have
|
||||
this habit of replacing them every time one word is revised)
|
||||
|
||||
The following is a list of suggested instructions and tips to follow when or
|
||||
if you go trashing. Trashing can be quite profitable and fun, provided you do
|
||||
it right and don't get smelly, dirty, or busted.
|
||||
|
||||
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||
|
||||
|
||||
STEP #1: LOCATE YOUR TARGET
|
||||
This involves deciding on where exactly the place is you want to
|
||||
trash. The place you want to go trashing at is the Switching Office
|
||||
since that's where everything happens. The easiest way to find the
|
||||
S.O. is to look for a lot of microwave towers. (not too hard, eh?)
|
||||
A good place for advanced trashing is your local COSMOS Office. To
|
||||
find it, look for the place in your city which most resembles:
|
||||
1. A Castle or Fort
|
||||
2. A Bunker out of WWII.
|
||||
3. Your local Federal Prison.
|
||||
4. A Building with the slogan "The more you hear.." on it.
|
||||
The security around these places is that of any of the 1, 2, or 3.
|
||||
Other possible targets would include:
|
||||
1. Relay stations.
|
||||
1. Look for a medium to small size tower with a little shack.
|
||||
2. Look for a big-ass tower with a house with AT&T on the door.
|
||||
The little shacks are usually good to break into because they
|
||||
are left with some really good stuff and are usually out in the
|
||||
middle (maybe a little to the west) or nowhere.
|
||||
I've never been into the houses. You can easily spot them
|
||||
because of the towers in the backyard and the odd fact that they
|
||||
have only one door (the front) and no (0) windows.
|
||||
|
||||
STEP #2: SCOUT THE TARGET AREA
|
||||
One person should go out to the place you plan to trash and take a
|
||||
good look around. He should look for: Doors, cameras, fences, dogs,
|
||||
and the garbage bins. This is to minimize the amount of confusion
|
||||
when you go trashing that night or whenever-the-hell you go.
|
||||
The scout might want to make out a small map of the streets & stuff
|
||||
in the area if the group is unfamiliar with it. You might also want
|
||||
to use it for quick, safe escape routes.
|
||||
|
||||
STEP #3: GATHER EQUIPMENT
|
||||
Here is a brief list of equipment you might want to take along:
|
||||
MAP : Streets, doors, security guards/cameras, garbage bins, etc...
|
||||
CAR : Doors and trunk open (lights off) Liscence Plate Covered
|
||||
While the car is not necessary, it is helpful in quick getaways and
|
||||
is easier than biking or walking.
|
||||
PEOPLE: More than one; Less than six.
|
||||
Almost never go trashing alone. And never bring more than five guys
|
||||
along with you. It's a little obvious when you have six or seven
|
||||
teenage guys with sacks, dark clothing, and flashlights.
|
||||
The recommended group is three, but a duty chart shows more or less:
|
||||
Number of people: 1 2 3 4 5 6
|
||||
Number to search: 1 1 2 3 3 4
|
||||
Number to watch : 0 1 1 1 2 2
|
||||
--- BEST WAY ---: ^
|
||||
EQUIP : Sack (each - nylon recommended as is light & easily washed/hidden)
|
||||
FlashLight (each - with handkerchief)
|
||||
Use the handkerchief to cover the lmght at all times.
|
||||
(Light looks really unusual comming out of a garbage bin at 3am)
|
||||
Sneakers (ratty as possible - it is, afterall, garbage)
|
||||
Dark Clothing (no bright orange or other florecent materials)
|
||||
<+- ADVANCED EQUIPMENT -+>
|
||||
Nitefinder goggles
|
||||
Ski Mask
|
||||
Gloves
|
||||
Walkie Talkies / CB Radio
|
||||
Lockpicks
|
||||
A word on the lockpicks:
|
||||
Lockpicks are very handy to have if the garbage is locked up.
|
||||
BUT DO NOT bring them if you don't know for a fact that there
|
||||
are locks -or- if you don't know how to use them correctly.
|
||||
Should you get caught, you don't want to have attempted breaking
|
||||
and entry and shit like that trying to be pinned on you.
|
||||
Diversion Equipment: Smoke, Gas, Bang, or Flame bombs
|
||||
Bring only that- no pipe bombs, soda can bombs, or harmful stuff
|
||||
like that. If you get caught with that stuff, they get nasty.
|
||||
It is also tempting to level the garbage bin just before you
|
||||
leave, which is not too wise.
|
||||
|
||||
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
|
||||
|
||||
AND NOW, THE EVER PRESENT: DOs and DON'Ts
|
||||
|
||||
|
||||
If you're going advanced trashing, bring along a voltage meter to test fences,
|
||||
doors, and stuff that might be electrically wired or monitored.
|
||||
|
||||
DO NOT go poking around anywhere other than the bins. There are probably
|
||||
silent alarms on the doors and possibly hidden cameras watching those other
|
||||
places you might feel tempted to go poking around.
|
||||
|
||||
DO NOT make a lot of noise. Tipping over the cans and telling dead baby jokes
|
||||
is generally unwise.
|
||||
|
||||
// FILE ABRUPTLY ENDS //
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
138
textfiles.com/phreak/TRASHING/trashng.phk
Normal file
138
textfiles.com/phreak/TRASHING/trashng.phk
Normal file
@@ -0,0 +1,138 @@
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
% %
|
||||
% Better Homes and Trashing %
|
||||
% %
|
||||
% Written by..... The Saint %
|
||||
%%%%%%%%%%%%% %%%%%%%%%%%%%
|
||||
% Thanx to Ares for his help! %
|
||||
% %
|
||||
% June 24, 1987 %
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
|
||||
Intro:
|
||||
|
||||
This file is intended for informational purposes only!!!
|
||||
|
||||
The authors (The Saint and Ares) take no responsibility whatsoever for any
|
||||
actions taken by anyone who reads the contents of this file.
|
||||
|
||||
Primarily, this file will discuss the general idea behind trashing, the risks
|
||||
involved, and some general tips to make your trashing venture successful.
|
||||
|
||||
Basics:
|
||||
|
||||
The basic reasons for trashing can vary, but are generally:
|
||||
|
||||
1> To obtain credit cards and/or carbons of credit cards.
|
||||
2> To obtain any information that may be useful in the aid of phreaking.
|
||||
|
||||
When choosing a place to go trashing, one must keep in mind the following:
|
||||
|
||||
1> Location of dumpster
|
||||
2> Security of property where dumpster is located
|
||||
3> Type of trash that may be found
|
||||
|
||||
First, the location. You generally want to pick a place that is somewhat
|
||||
isolated, where there will not be a lot (preferably none) of people. To
|
||||
accomplish this, it is also best to do your trashing at night, as there will
|
||||
not likely be any employees at the location, and it is easier to hide and to
|
||||
not be seen by passers-by.
|
||||
|
||||
Second, the security. Places such as Telco buildings and large companies
|
||||
often have security guards on duty 24 hours, and often keep their dumpsters
|
||||
behind fences so as to discourage trespassing. Yes, you are trespassing when
|
||||
you start looking in someone's garbage can!!! So it is a good idea to check
|
||||
out the place you are going to trash for a day or so to get a feel for what
|
||||
kind of security they have. This way, you can avoid walking in blindly to some
|
||||
place and getting nabbed, or you can figure out where to park your car, or
|
||||
where to hide, or how to avoid the security (rent-a-cops).
|
||||
|
||||
Places such as department stores and banks most likely will not have any
|
||||
security for the outside of their buildings as they may not be able to afford
|
||||
it or may not anticipate trashers. Also, they may not have anything worth
|
||||
taking! So basically, check the place out before you just go and hit it.
|
||||
|
||||
Case in point. One night, my friend and I casually pulled into the parking
|
||||
lot of a Pacific Bell office, and before we knew what was happening, a security
|
||||
guard had a giant spotlight glaring down on us. We just casually made a u-turn
|
||||
as if we were just turning around to go the other way. (More on what to do if
|
||||
you get caught later).
|
||||
|
||||
Third, you must pick a place where you know there will be trash that is of
|
||||
use to you. Don't go trashing at some little deli, all you'll get is a bunch
|
||||
of rotten food! (Unless of course you know for a fact that the deli deals alot
|
||||
with credit cards). In searching for cards, pick places such as department
|
||||
stores or places that sell alot of expensive stuff.
|
||||
|
||||
Also, the local telephone company is, of course the place to go to find your
|
||||
basic phreaking info.
|
||||
|
||||
These have been some of the basics to keep in mind before you hit aplace.
|
||||
Now for some techniques to use to help increase the efficiency of your trashing
|
||||
endeavors.
|
||||
|
||||
Tips:
|
||||
|
||||
First of all, don't be afraid to actually go into the trash can. This is
|
||||
almost always necessary to reach the good stuff. Also, when you are ducking
|
||||
down inside a big dumpster, you cannot be seen by passing police cars or
|
||||
security guards who happen to waltz by.
|
||||
|
||||
Second, always have a lookout somewhere to keep an eye out for cops or
|
||||
employees who may be coming out to throw trash away. You may want to have some
|
||||
kind if signal so that if you have advanced warning of security, you can take
|
||||
evasive measures, like burying yourself in the trash.
|
||||
|
||||
Try not to spend too long in a given trash can. The longer you stay, the
|
||||
more you put yourself at risk of getting caught. This means that you cannot be
|
||||
too picky about what trash you take. There is plenty of time for that after
|
||||
you bail the scene with the goods. You may want to have a knife handy,
|
||||
however, to cut open boxes or bags, and a small flashlight is a good idea,
|
||||
although if possible, avoid using to much light or making too much noise,
|
||||
anything that could potentially attract someone.
|
||||
|
||||
A car is a good thing to have, if possible. This greatly increases the range
|
||||
of places you can hit in one night. It is a good idea, if you are accumulating
|
||||
alot of stuff, to stop somewhere secluded and well lit (like a school or empty
|
||||
shopping center) and sort out the trash so you can get rid of useless garbage
|
||||
like food, etc. Take all the useless garbage and dump it into another
|
||||
dumpster.
|
||||
|
||||
You may want to wear old clothes that can get messed up, and gloves are not a
|
||||
bad idea either, both to keep your hands clean, and to keep prints off of
|
||||
anything in case the place discovers what you have done.
|
||||
|
||||
What to do if you get caught:
|
||||
|
||||
This is perhaps the most important thing to keep in mind when trashing. What
|
||||
to do if you happen to be caught be someone and they want to know what you are
|
||||
doing.
|
||||
|
||||
If you can, run like hell! Only do this if you have a clean getaway and you
|
||||
think you can get away without too much problem. Keep in mind that trying to
|
||||
escape may only make your situation worse. Only run if it looks like they are
|
||||
gonna bust you.
|
||||
|
||||
In most cases, the people may just tell you to get out. They will probably
|
||||
ask you some dumb questions, like "What are you doing in the trash?" In this
|
||||
case, make up a story, like "Oh, my friend here threw a ball in here and I was
|
||||
looking for it." If the guard believes you, he will probably just tell you to
|
||||
get out with a strong warning.
|
||||
|
||||
If they are serious about nailing you, however, chances are you'll only get
|
||||
charged with trespassing, which is not a major crime. In any case, however,
|
||||
maintain an extremely high level of caution when trashing, and always remain
|
||||
calm and collected. You can usually bullshit your way out of just about
|
||||
anything if you play your cards right.
|
||||
|
||||
Hope this has helped you to gain some insight into how to go about gaining
|
||||
that valuable information you always wanted.
|
||||
|
||||
Look for more informative files in the future from Better Homes and Anarchy.
|
||||
And if you have any comments or anything to add, you can get hold of me on the
|
||||
Electric Kingdom at (619) 484-5243. Please upload this to many BBS's around
|
||||
the country to help your phellow phreakers!
|
||||
|
||||
The Saint
|
||||
Lunatic Labs (415) 278-7421
|
||||
|
58
textfiles.com/phreak/TRASHING/trshdisk.ana
Normal file
58
textfiles.com/phreak/TRASHING/trshdisk.ana
Normal file
@@ -0,0 +1,58 @@
|
||||
*************************************************
|
||||
* *
|
||||
* BASICS OF TRASHING *
|
||||
* PART I *
|
||||
* *
|
||||
* BY:THE GRIM TRASHER *
|
||||
* *
|
||||
*************************************************
|
||||
|
||||
IN THIS ARTICLE I WILL COVER THE VERY FIRST STEPS OF TRASHING. THE TRASHING
|
||||
METHOD IS VERY SIMPLE SO I DO IT ALL THE TIME. HERE ARE THE STEPS:
|
||||
|
||||
STEP I:FIRST YOU TAKE A DISK YOU WANT TO TRASH AND BRING IT OVER TO THE
|
||||
COMPUTER. THE DISK SHOULD HAVE SOMTHING VERY *IMPORTANT* ON IT (LIKE SOMTHING
|
||||
YOU HAVE BEEN WORKING ON FOR 3 YEARS) OR A DISK THAT COST ABOUT $500.
|
||||
|
||||
WHEN YOU BRING THE DISK TO TRASH OVER TO THE COMPUTER *BE SURE* TO HOLD IN THE
|
||||
*DISK PART*!
|
||||
|
||||
STEP II:THERE ARE A LOT OF WAYS TO TRASH A DISK BUT
|
||||
|
||||
HERE ARE A FEW TO GET THING GOING:
|
||||
|
||||
1--PUT THE DISK IN THE DRIVE AND GET TO COMMAND LEVEL THEN TYPE 'INIT'.
|
||||
2--PUT A MAGNET TO THE *DISK PART*.
|
||||
3--SET ON TOP OF THE DRIVE OR MONITOR AND LEAVE THERE FOR 1 HOUR.
|
||||
4--TAKE SOMETHING SHARP LIKE A PENCIL ORKNIFE AND START TO SCRATCH THE SURFACE
|
||||
OF THE DISK NICE AND HARD.
|
||||
|
||||
NOTE:YOU CAN USE MANY OF THESE TRASHINw TECHNIQUES TO MAKE ONE *ULTIMATE
|
||||
TRASH!!*
|
||||
|
||||
CLASSIC TRASH--PUT THE DISK IN THE MICRO-WAVE!!
|
||||
|
||||
|
||||
STEP III:WHEN YOU ARE ALL DONE WITH THE TRASHING PROCESS THEN LEAVE THE DISK
|
||||
LAY IN A NICE DUST PILE AND BURY IT.COME BACK IN ABOUT 2 HOURS AND THE
|
||||
|
||||
TRASHING PROCESS IS COMPLETE!!
|
||||
|
||||
|
||||
IN MY NEXT ARTICLES I WILL COVER THE MORE ADVANCED METHODS OF TRASHING BUT FOR
|
||||
NOW JUST:
|
||||
|
||||
|
||||
***K E E P O N T R A S H I N G***
|
||||
|
||||
|
||||
NOTE:IF YOU OR ANY ONE OF YOUR FRIENDS WANT TO KNOW MORE ON TRASHING CALL MY
|
||||
HOT-LINE AT:50-MAD-TRASH OR:62-EL-TRASHO.<-LOCAL NUMBER
|
||||
|
||||
|
||||
THE ONE AND ONLY,
|
||||
|
||||
THE GRIM TRASHER
|
||||
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
44
textfiles.com/phreak/VOICEMAIL.1
Normal file
44
textfiles.com/phreak/VOICEMAIL.1
Normal file
@@ -0,0 +1,44 @@
|
||||
<HTML>
|
||||
<TITLE>T E X T F I L E S</TITLE>
|
||||
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
|
||||
<H1>Phone Phreaking: Voice Mail</H1>
|
||||
<P>
|
||||
<TABLE WIDTH=100%>
|
||||
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
|
||||
|
||||
<tab indent=60 id=T><br>
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/3rdpart1.txt">3rdpart1.txt</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Fraud and Voicemail Systems
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/800vms.txt">800vms.txt</A> <tab to=T><TD> 1020<BR><TD> 1-800 Voice Mail Extenders
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/amhack.txt">amhack.txt</A> <tab to=T><TD> 12372<BR><TD> Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/anmchhak.txt">anmchhak.txt</A> <tab to=T><TD> 1233<BR><TD> Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/ans_exc.txt">ans_exc.txt</A> <tab to=T><TD> 2319<BR><TD> Answering Machine Stopper Gadger, by Jon Sreekanth
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/ansmache.xcl">ansmache.xcl</A> <tab to=T><TD> 3653<BR><TD> Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/aspentut.txt">aspentut.txt</A> <tab to=T><TD> 8040<BR><TD> A Tutorial of Aspen Voice Mailbox Systems, by Slycath
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/at&t.txt">at&t.txt</A> <tab to=T><TD> 1234<BR><TD> Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/audexvp.txt">audexvp.txt</A> <tab to=T><TD> 19656<BR><TD> Hacking Guide to the Audex Voice Power, by Crazybyte
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/cinditut.txt">cinditut.txt</A> <tab to=T><TD> 12608<BR><TD> The CINDI (Voicemail System) Tutorial
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hack6">hack6</A> <tab to=T><TD> 5241<BR><TD> Hacking Voice Mail Systems
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hackam1990.txt">hackam1990.txt</A> <tab to=T><TD> 13065<BR><TD> Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/hackvmb.txt">hackvmb.txt</A> <tab to=T><TD> 10057<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/lol12.txt">lol12.txt</A> <tab to=T><TD> 10698<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/phonhack.txt">phonhack.txt</A> <tab to=T><TD> 17674<BR><TD> Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/phreak8">phreak8</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Calling and Voicemail Information
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/tollfree.txt">tollfree.txt</A> <tab to=T><TD> 1314<BR><TD> A Collection of Toll-Free Answering Services
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/unt-att1.txt">unt-att1.txt</A> <tab to=T><TD> 2610<BR><TD> Hacking AT&T Answering Machines by Aoflex of Karma Sutra
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb.rl">vmb.rl</A> <tab to=T><TD> 3505<BR><TD> Renegade Legion Presents: Voice Mailbox Hacking by The Knight
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb.txt">vmb.txt</A> <tab to=T><TD> 3296<BR><TD> Voice Mail Made Easy by Hagar of Phantom Networks
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmb_smc.txt">vmb_smc.txt</A> <tab to=T><TD> 15681<BR><TD> On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbh-rl.txt">vmbh-rl.txt</A> <tab to=T><TD> 3508<BR><TD> Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhack.hac">vmbhack.hac</A> <tab to=T><TD> 3918<BR><TD> Voice Mailbox Hacking, by the Knight of the Renegade Legion
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 2764<BR><TD> Zod's Voice Mailbox Hacker Doxs
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbhaq.txt">vmbhaq.txt</A> <tab to=T><TD> 32929<BR><TD> Voice Mail Hacking by Road Kill (March/April, 1994)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmblol.txt">vmblol.txt</A> <tab to=T><TD> 13996<BR><TD> Voice Mailbox Hacking by the Legions of Lucifer (1990)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbrl.txt">vmbrl.txt</A> <tab to=T><TD> 3920<BR><TD> Voice Mailbox Hacking by The Knight of Renegade Legion
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbs1.txt">vmbs1.txt</A> <tab to=T><TD> 3071<BR><TD> Voice Mail Boxes
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmbzan.hac">vmbzan.hac</A> <tab to=T><TD> 4774<BR><TD> How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/vmx.txt">vmx.txt</A> <tab to=T><TD> 1101<BR><TD> Toll-Free Answering Services
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/voicmail.txt">voicmail.txt</A> <tab to=T><TD> 3753<BR><TD> Using Voice Mail on the Inner Sanctum by Jesters
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="VOICEMAIL/xvmecinf.txt">xvmecinf.txt</A> <tab to=T><TD> 904<BR><TD> Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
|
||||
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 32 files for a total of 230,684 bytes.</SMALL></TABLE>
|
44
textfiles.com/phreak/VOICEMAIL/.windex.html
Normal file
44
textfiles.com/phreak/VOICEMAIL/.windex.html
Normal file
@@ -0,0 +1,44 @@
|
||||
<HTML>
|
||||
<TITLE>T E X T F I L E S</TITLE>
|
||||
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
|
||||
<H1>Phone Phreaking: Voice Mail</H1>
|
||||
<P>
|
||||
<TABLE WIDTH=100%>
|
||||
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
|
||||
|
||||
<tab indent=60 id=T><br>
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="3rdpart1.txt">3rdpart1.txt</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Fraud and Voicemail Systems
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="800vms.txt">800vms.txt</A> <tab to=T><TD> 1020<BR><TD> 1-800 Voice Mail Extenders
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="amhack.txt">amhack.txt</A> <tab to=T><TD> 12372<BR><TD> Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="anmchhak.txt">anmchhak.txt</A> <tab to=T><TD> 1233<BR><TD> Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ans_exc.txt">ans_exc.txt</A> <tab to=T><TD> 2319<BR><TD> Answering Machine Stopper Gadger, by Jon Sreekanth
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ansmache.xcl">ansmache.xcl</A> <tab to=T><TD> 3653<BR><TD> Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="aspentut.txt">aspentut.txt</A> <tab to=T><TD> 8040<BR><TD> A Tutorial of Aspen Voice Mailbox Systems, by Slycath
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="at&t.txt">at&t.txt</A> <tab to=T><TD> 1234<BR><TD> Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="audexvp.txt">audexvp.txt</A> <tab to=T><TD> 19656<BR><TD> Hacking Guide to the Audex Voice Power, by Crazybyte
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cinditut.txt">cinditut.txt</A> <tab to=T><TD> 12608<BR><TD> The CINDI (Voicemail System) Tutorial
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hack6">hack6</A> <tab to=T><TD> 5241<BR><TD> Hacking Voice Mail Systems
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackam1990.txt">hackam1990.txt</A> <tab to=T><TD> 13065<BR><TD> Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="hackvmb.txt">hackvmb.txt</A> <tab to=T><TD> 10057<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lol12.txt">lol12.txt</A> <tab to=T><TD> 10698<BR><TD> Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonhack.txt">phonhack.txt</A> <tab to=T><TD> 17674<BR><TD> Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phreak8">phreak8</A> <tab to=T><TD> 5385<BR><TD> 3rd Party Calling and Voicemail Information
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tollfree.txt">tollfree.txt</A> <tab to=T><TD> 1314<BR><TD> A Collection of Toll-Free Answering Services
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="unt-att1.txt">unt-att1.txt</A> <tab to=T><TD> 2610<BR><TD> Hacking AT&T Answering Machines by Aoflex of Karma Sutra
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb.rl">vmb.rl</A> <tab to=T><TD> 3505<BR><TD> Renegade Legion Presents: Voice Mailbox Hacking by The Knight
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb.txt">vmb.txt</A> <tab to=T><TD> 3296<BR><TD> Voice Mail Made Easy by Hagar of Phantom Networks
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmb_smc.txt">vmb_smc.txt</A> <tab to=T><TD> 15681<BR><TD> On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbh-rl.txt">vmbh-rl.txt</A> <tab to=T><TD> 3508<BR><TD> Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhack.hac">vmbhack.hac</A> <tab to=T><TD> 3918<BR><TD> Voice Mailbox Hacking, by the Knight of the Renegade Legion
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhack.txt">vmbhack.txt</A> <tab to=T><TD> 2764<BR><TD> Zod's Voice Mailbox Hacker Doxs
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbhaq.txt">vmbhaq.txt</A> <tab to=T><TD> 32929<BR><TD> Voice Mail Hacking by Road Kill (March/April, 1994)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmblol.txt">vmblol.txt</A> <tab to=T><TD> 13996<BR><TD> Voice Mailbox Hacking by the Legions of Lucifer (1990)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbrl.txt">vmbrl.txt</A> <tab to=T><TD> 3920<BR><TD> Voice Mailbox Hacking by The Knight of Renegade Legion
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbs1.txt">vmbs1.txt</A> <tab to=T><TD> 3071<BR><TD> Voice Mail Boxes
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmbzan.hac">vmbzan.hac</A> <tab to=T><TD> 4774<BR><TD> How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="vmx.txt">vmx.txt</A> <tab to=T><TD> 1101<BR><TD> Toll-Free Answering Services
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="voicmail.txt">voicmail.txt</A> <tab to=T><TD> 3753<BR><TD> Using Voice Mail on the Inner Sanctum by Jesters
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="xvmecinf.txt">xvmecinf.txt</A> <tab to=T><TD> 904<BR><TD> Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
|
||||
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 32 files for a total of 230,684 bytes.</SMALL></TABLE>
|
103
textfiles.com/phreak/VOICEMAIL/3rdpart1.txt
Normal file
103
textfiles.com/phreak/VOICEMAIL/3rdpart1.txt
Normal file
@@ -0,0 +1,103 @@
|
||||
|
||||
3RD PARTY FRAUD & VOICE MAIL SYSTEMS
|
||||
============================================================================
|
||||
|
||||
3rd Party Dialing was first brought to my attention when it was listed
|
||||
on my telephone bill. I was billed by some person(s) without my authorization.
|
||||
This happened about 3 times on the same bill, and all of the times I got the
|
||||
charges dropped.
|
||||
|
||||
A few weeks later, after paging through the telephone book for downtown
|
||||
prefixes, I noticed information on 3rd Party Calling, which included:
|
||||
|
||||
HOW TO PLACE 0+ CALLS
|
||||
|
||||
Third-Number Calls
|
||||
|
||||
1. Dial "0" + Area Code (if needed) + telephone number.
|
||||
|
||||
2. If you hear a tone, ignore it, and a billing operator will come
|
||||
on the line.
|
||||
|
||||
3. Tell the operator you are placing a third number billed called.
|
||||
|
||||
4. Give the Area Code and telephone number you with the charges billed to.
|
||||
|
||||
5. The operator will call that number to verify acceptance of the charges
|
||||
on calls from coin pay phones. No verification on calls from
|
||||
non-coin pay phones.
|
||||
|
||||
The line that caught my eye was like #5. This line pointed out that calls
|
||||
from pay phones had to be verified, while non pay phones needed no
|
||||
verification.
|
||||
|
||||
With experience, I found out that sometimes there is nothing a person can do
|
||||
about unauthorized 3rd Party Calls billed to a another person's number. A lot
|
||||
of the times, the operator you call to complain to will simply tell you there's
|
||||
nothing they can do.
|
||||
|
||||
With this in mind, I realized that you could bill a call to anybody's number
|
||||
and get away with it, and no charges directed to you. Although, as many of you
|
||||
know by now...this not safe. For one, you are directing attention to yourself
|
||||
as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
|
||||
Party Call to...that person has your number and where you called. Bell can
|
||||
also use that information to take action if they feel it necessary.
|
||||
|
||||
One alternative would be to complete a 3rd Party Billed Call from a pay
|
||||
phone. This however brings up a question. Who is going to accept the charges
|
||||
if you don't want to pay for it in any way?
|
||||
|
||||
Here is what I came up with for 3rd Party Calling Fraud:
|
||||
|
||||
First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
|
||||
PhoneMail type VMS to handle the call. The reason you need these types of
|
||||
VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
|
||||
have to enter a process extension number such as 8509. These types of VMS's
|
||||
bring you directly to the box.
|
||||
|
||||
You don't know what Voice Mail Systems are? Look for a file. But, here's a
|
||||
layman's description of VMS's. You can say that VMS's are distance answering
|
||||
services. They are usually set up in other prefixes you can dial in/directly
|
||||
on to. They include instructions on how to use them, and have system
|
||||
passwords. In respect, they are electronic mail devices...only they use voice
|
||||
communications instead. You can find these by scanning, if you have one local.
|
||||
|
||||
Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
|
||||
Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
|
||||
In between the HELLO and YEAH SURE, the billing operator will say something
|
||||
like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
|
||||
|
||||
Now go to a pay phone and dial any number anywhere you want, in this
|
||||
format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
|
||||
and wait for an operator to come on. The operator will announce her/his-self
|
||||
as a billing operator and ask you how he/she can help you on billing the call.
|
||||
Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
|
||||
name if you wish, but it's not necessary. No real names of course also. The
|
||||
operator will call the VMS and he/she will hear the previous recording of you
|
||||
saying "HELLO" etc.
|
||||
|
||||
After the operator hears an affirmative from the VMS...the operator will say
|
||||
thank you, then put the call through. The only person that gets billed for
|
||||
the call is the business/person that owns the VMS that you used by hacking the
|
||||
default password.
|
||||
|
||||
I've found out that you can dial overseas, and anywhere in the United States
|
||||
this way, with no problems or bad connections. If you have a portable computer
|
||||
with an acoustic couple...you can go online. It would be suggested to do this
|
||||
in a car, so as not to draw attention during the day. I've tried to set up a
|
||||
conference by the 800 Conference Operator and requesting to set up a
|
||||
conference. You have to give her the person's numbers and names you want to
|
||||
conference with...and the number you want to conference billed to. The
|
||||
operator will verify this if you are at a pay phone. I have figured out what
|
||||
the Conference Operator asked the 3rd Party as of yet...to time the responses
|
||||
preset on the VMS, but if anyone can, it would prove to be very useful.
|
||||
|
||||
Another technique might be to bill 976's to your VMS if you into that.
|
||||
Again, you need to attempt to time the perfect responses to the operator's
|
||||
questions to the 3rd Party.
|
||||
|
||||
*A Word of Warning*: In most cases, the Operator you handle the 3rd party
|
||||
call with will stay on the line. So it's good to have a conversation with
|
||||
yourself on the VMS for about 30 seconds after connection if you are making a
|
||||
collect call to the VMS.
|
||||
|
31
textfiles.com/phreak/VOICEMAIL/800vms.txt
Normal file
31
textfiles.com/phreak/VOICEMAIL/800vms.txt
Normal file
@@ -0,0 +1,31 @@
|
||||
|
||||
1-800 Voice Mail Systems
|
||||
|
||||
|
||||
1-800-222-5275 VMS
|
||||
1-800-222-9825 VMS Box:[9]+3 DIGITS
|
||||
1-800-228-6423 VoiceBank Box:[4] *Another Dialup for 88-Voice*
|
||||
1-800-262-8477 UniSys Answering Service Box:[4]
|
||||
1-800-284-6245 Meridian Mail
|
||||
1-800-323-3433 VMS
|
||||
1-800-323-4555 Dexter Midland Box:[3]
|
||||
1-800-323-3938 VMS Box:[4]
|
||||
1-800-325-5554 VMS Box:[4]
|
||||
1-800-331-1763 INNOVATIVE SOFTWARE BOX:[4]
|
||||
1-800-333-6245 PHONE MAIL SYSTEM
|
||||
1-800-342-6245 PHONE MAIL SYSTEM
|
||||
1-800-346-5104 SECURITY LINK AND TELELINK BOX:[3]
|
||||
1-800-423-7574 VMBS BOX:[4]
|
||||
1-800-437-6100 PHONE MAIL SYSTEM
|
||||
1-800-445-6245 PHONE MAIL SYSTEM
|
||||
1-800-521-6245 VMBS
|
||||
1-800-541-0641 VMBS BOX:[2]
|
||||
1-800-545-6245 VMBS ID:[7], PASS:[8]
|
||||
1-800-631-1146 VMBS
|
||||
1-800-654-8692 SECURITY CN LIFE INSURANCE BOX:[4]
|
||||
1-800-662-6245 VOICE MESSAGE EXCHANGE
|
||||
1-800-678-6245 VMBS
|
||||
1-800-759-5000 INGRAM SWITCHBOARD BOX:[4]
|
||||
1-800-777-6245 MCI MAIL ID:[5], BOX:[7]
|
||||
1-800-847-6181 WESTERN DIGITAL BOX:[4]
|
||||
|
257
textfiles.com/phreak/VOICEMAIL/amhack.txt
Normal file
257
textfiles.com/phreak/VOICEMAIL/amhack.txt
Normal file
@@ -0,0 +1,257 @@
|
||||
|
||||
|
||||
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||
Hacking Answering Machines 1990
|
||||
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||
by: Predat0r of Blitzkrieg Bbs 502/499-8933
|
||||
|
||||
|
||||
AT&T reports that in the year 1990, 11 million people
|
||||
will buy an answering machine for their home use. In 1989, 10
|
||||
million machines were sold. Everyone has called up a person
|
||||
at one time or another and got the old "leave your name at
|
||||
the beep" message. With this increase in homes using these
|
||||
machines there is also a new form of hacking developing. One
|
||||
of hacking an answering machine.
|
||||
|
||||
Why would anyone even want to hack an answering machine
|
||||
and for what purpose? There are many reasons and things you
|
||||
can do once you have control of someone elses machine. If for
|
||||
some reason you need to spy on a business or person you can
|
||||
hack their machine and take control using the information for
|
||||
your own personal use. There is also the old "change the
|
||||
message" secret to make it say something to the effect of
|
||||
this line accepts all toll charges so you can bill third
|
||||
party calls to that number. You can also use an answering
|
||||
machine for your own personal use, as in making it your own
|
||||
voice mail type system for people to call. Only do this if
|
||||
you know someone is out of town. If they come home from
|
||||
shopping and find their machine changed it might cause
|
||||
problems. With these basic ideas in mind you can see hacking
|
||||
an answering machine could be very useful to certain
|
||||
individuals.
|
||||
|
||||
How can a person hack an answering machine? Well most
|
||||
answering machines built now have remote access features
|
||||
which allow the owner, or anyone to call in and press a
|
||||
security code to play their messages. This is where the fun
|
||||
begins. Some older models don't have remote access so you
|
||||
cannot do anything to them. Also if you know someone has a
|
||||
machine but you call and it doesn't answer, let the phone
|
||||
ring about 15 times. This will tell the machine to turn
|
||||
itself on, so you can hack it. The actual number varies
|
||||
between machines.
|
||||
|
||||
To practice hacking some machines i will show you how to
|
||||
get remote access on a few models. Just look and see what
|
||||
kind your friend has and hack it for starters.
|
||||
|
||||
Record a Call- Model 2120
|
||||
-------------------------
|
||||
Call in and during the message or after the beep tone to
|
||||
leave a message enter the 3 digit security code. Which you
|
||||
must find yourself. This will rewind the tape and play all
|
||||
new messages. Press 2 to backspace and repeat the last
|
||||
message. Press 3 to fast foward the tape.
|
||||
|
||||
Changing your message from remote. Call your phone and enter
|
||||
the secret code. After several rapid beeps enter your secret
|
||||
code again. After a short delay you will hear a long tone.
|
||||
After the tone ends begin speaking your message which may be
|
||||
17 seconds in length. When finished press the second digit of
|
||||
your secret code to end. The machine will then save your
|
||||
message and play it back. To turn the unit on from remote let
|
||||
it ring 11 times then hangup. Or stay on and it will answer
|
||||
so you can access the machine. For express calls or frequent
|
||||
calls hit the second digit for two seconds to skip the out
|
||||
going message announcement.
|
||||
|
||||
Goldstar- Models 6000/6100
|
||||
--------------------------
|
||||
Call and enter your 1 digit secret code after you hear the
|
||||
out going message announcement. The machine will then play
|
||||
back new messages. Hangup to save messages or after all
|
||||
messages have been played the machine will give a double
|
||||
beeptone, you may enter your code to erase all messages.
|
||||
You cannot change the out going message on this unit.
|
||||
|
||||
Cobra- Model AN-8521
|
||||
--------------------
|
||||
For this machine there are 2 codes. Both are one digit in
|
||||
length. The first one is the play code. The second is to
|
||||
erase messages from remote. After the outgoing message and
|
||||
beeptone press the play code for 2 seconds to play messages.
|
||||
After each message ends there will be a single beep. At the
|
||||
end of all message it will beep twice. You may then do the
|
||||
following. Replay by pressing the play code again. Erase
|
||||
messages by pressing the erase code. Hang-up and save
|
||||
messages and continue to take additional calls. To turn this
|
||||
unit on from remote you must let it ring 16 times before it
|
||||
will activate. If it rings 10 times then you hear 3 beeps it
|
||||
is full and messages need to be erased.
|
||||
|
||||
Uniden- Model AM 464
|
||||
--------------------
|
||||
This model is one of the more advanced when it comes to
|
||||
remote capabilities. The factory preset security code is 747.
|
||||
This can be changed to as many as five digits of your choice.
|
||||
To gain access from remote type your security code while the
|
||||
outgoing message is playing. Press 1 after hearing the tone
|
||||
and the machine will rewind and play your messages. To fast
|
||||
foward press 7, to resume normal playback press 8. To stop
|
||||
the messages from playing press 8 again. Press 8 to restart
|
||||
the messages or 1 to start from the beginning again. Press 9
|
||||
to rewind and 8 to resume playing. If you rewind all the way
|
||||
it will beep twice. You need to press 1 to play messages.To
|
||||
save messages press 4. To erase press 6. To turn the machine
|
||||
off from remote press 5 after all messages have been played
|
||||
and the machine beeps twice. To turn the machine on from
|
||||
remote let the phone ring 12 to 14 times. The machine will
|
||||
beep and then you enter your remote code. This will then turn
|
||||
your machine to answer mode. This machine also has room
|
||||
monitor options. This allows you to listen to what is going
|
||||
on in the room of the machine. To do this call the machine
|
||||
enter your security code after the beep press 0. The monitor
|
||||
stays on for 60 seconds. You will be warned with 2 beeps at
|
||||
45 seconds. To continue press 0 again.To change the outgoing
|
||||
message from remote erase all the messages. Then call back
|
||||
and enter your code after the tone press 3. It will beep
|
||||
again and you may then leave your new message. Press 3 when
|
||||
finished. To change the security code from remote after the
|
||||
beep press # then 1 after the next beep enter your new code
|
||||
followed by the # again. There is also a call break through
|
||||
where you enter 256 while the outgoing message is playing.
|
||||
This will alarm the persons in the house someone is calling
|
||||
with a series of loud beeps. Press the * key to stop.
|
||||
|
||||
Code-a-phone Model 930
|
||||
----------------------
|
||||
To access from remote call and enter your security code after
|
||||
the announcement and tone. Press your code for 3 full
|
||||
seconds. After the new messages have been played you will
|
||||
hear 2 tones. You may then save messages by pressing your
|
||||
code then hanging up. repeat by entering code wait for 4
|
||||
tones then enter code again. To erase message hangup when the
|
||||
tape is done playing. To turn the machine on from remote call
|
||||
and let ring ten times. When the system answers it will have
|
||||
a two second tone. Press your security code. You will hear
|
||||
three double tones to let you know the system is on.
|
||||
|
||||
Unisonic- Model 8720
|
||||
--------------------
|
||||
One digit code entered after the outgoing message and tone
|
||||
will allow you to hear messages. To change message wait till
|
||||
all new messages have been played 2 beep tones will be heard.
|
||||
Press code for four seconds. Two beeps will be heard then the
|
||||
tape will rewind and beep again. Now leave the new message.
|
||||
Press your code when finished to save new outgoing message.
|
||||
New message will play for you to hear.
|
||||
|
||||
Panasonic- Model KX-T2427
|
||||
-------------------------
|
||||
Call and enter the three digit code during the outgoing
|
||||
message. Machine will beep once, then beep amount of times
|
||||
equal to messages. Then rewind and play messages. There will
|
||||
be three beeps after the last message. Six beeps means the
|
||||
tape is full. Press 2 to foward. Press 1 to rewind. Press 3
|
||||
to reset machine and erase messages. To monitor the room
|
||||
press 5 after the beeps indicating the number of messages the
|
||||
machine has. Press 7 to change the outgoing message, it will
|
||||
beep a few quick times rewind then a long beep will be heard.
|
||||
Leave new message press 9 when finished. Press 0 right after
|
||||
the beep tones to shut the machine off. To turn the machine
|
||||
on let it ring 15 times then hangup after machine turns on.
|
||||
|
||||
Panasonic- Model KX-T2385d
|
||||
--------------------------
|
||||
During the outgoing message enter the 1 digit code. This will
|
||||
playback messages. Press the code again to rewind. After the
|
||||
messages have played the machine will beep three times. Press
|
||||
your code again and it will reset the machine. For remote
|
||||
turn on let phone ring 15 times. Then after the outgoing
|
||||
message hangup.
|
||||
|
||||
AT&T- Model 1504
|
||||
----------------
|
||||
Enter 2 digit code before or after announcement. System will
|
||||
beep after each message and five times when messages are
|
||||
done. Press the # key anytime to pause. Hanging up will save
|
||||
messages. Press 7 and it will rewind and play messages again.
|
||||
Press 5 to fast foward. Press 2 to rewind. Press 33 after all
|
||||
messages have been played to reset without saving messages.
|
||||
To record onto the tape press * after the system answers.
|
||||
This will then beep and you may leave a four minute message
|
||||
on the tape. Press # when done. This is not an outgoing
|
||||
message announcement, only a memo. To turn on from remote let
|
||||
ring ten times press 0 when system answers. To turn the
|
||||
system off dial and enter your code. Press 88 and it will
|
||||
shut the machine down.
|
||||
|
||||
Phonemate- Model 4050
|
||||
---------------------
|
||||
Enter your 3 digit code during the outgoing message. Pressing
|
||||
* or # will allow you to scan through the messages. When
|
||||
finished pressing 1 will replay the messages. Pressing 2 will
|
||||
erase them. To turn on from remote let ring for 15 times.
|
||||
Then proceed with remote operations.
|
||||
|
||||
Phonemate- Model 7200
|
||||
---------------------
|
||||
Enter 1 digit code during of after the outgoing message. A
|
||||
voice will tell you how many messages you have, then play
|
||||
them back for you. To rewind press your code and hold it for
|
||||
however long you want to rewind. Let go and it will resume
|
||||
playing. After the last message a voice will prompt you with
|
||||
a list of options. You have five seconds to respond or it
|
||||
will proceed to the next option. These are as follows. The
|
||||
first is hanging up to save messages. Next is enter code to
|
||||
replay messages. Next enter code to erase messages. Last is
|
||||
enter code to change greeting. Follow the voice and it will
|
||||
give you complete directions on exact steps to follow. To
|
||||
turn on from remote let ring ten times then hang up. If tape
|
||||
is full it will say sorry tape is full, enter code and erase
|
||||
messages.
|
||||
|
||||
Spectra Phone- Model ITD300
|
||||
---------------------------
|
||||
Enter your 1 digit code after the greeting. Messages will
|
||||
play back. Hanging up will save them. Or wait for four beeps
|
||||
and press your code to replay them. To erase press your code
|
||||
after 2 beeps. To turn the machine on from remote let it ring
|
||||
10 times.
|
||||
|
||||
Notes: Outgoing message and greeting is what you hear when
|
||||
you first call. Code is your personal security code.
|
||||
|
||||
Hacking answering machines can be very easy. It can also help
|
||||
you obtain valuable information. If you have a targeted
|
||||
machine you can try going to a store and saying you just
|
||||
bought one and it didn't have instructions in the box. They
|
||||
will usually give you a set or make copies for you. This
|
||||
basic guide is just to introduce you to answering machine
|
||||
hacking and changing the outgoing message and listening to
|
||||
messages left by callers. To keep your own machine safe
|
||||
purchase one with a changeable security code of 3 or more
|
||||
digits. Most home machines are of the 1 digit type and are
|
||||
easy to hack. I have no knwoledge of the laws concerning
|
||||
hacking into someones answering machine. I am sure once it
|
||||
becomes more common we will find out. Of course this article
|
||||
is for informational purposes only so you would never have to
|
||||
find out the actual laws.
|
||||
|
||||
Taken from TAP Magazine Issue #100
|
||||
|
||||
|
||||
|
||||
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|
||||
Another file downloaded from: NIRVANAnet(tm)
|
||||
|
||||
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
|
||||
Burn This Flag Zardoz 408-363-9766
|
||||
realitycheck Poindexter Fortran 510-527-1662
|
||||
My Dog Bit Jesus Suzanne d'Fault 510-658-8078
|
||||
New Dork Sublime Demented Pimiento 415-864-DORK
|
||||
The Shrine Tom Joseph 408-747-0778
|
||||
|
||||
"Raw Data for Raw Nerves"
|
||||
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|
33
textfiles.com/phreak/VOICEMAIL/anmchhak.txt
Normal file
33
textfiles.com/phreak/VOICEMAIL/anmchhak.txt
Normal file
@@ -0,0 +1,33 @@
|
||||
Hacking AT&T Answering Machines
|
||||
Quick and Dirty by oleBuzzard
|
||||
Written Today / 14-SEP-95
|
||||
(c) 1995 <k0p> Communications
|
||||
|
||||
|
||||
1. Dial telephone and wait for AT&T Answering Machine to answer.
|
||||
2. Quickly Enter the following string.
|
||||
|
||||
1234567898765432135792468642973147 (btw: this is the shortest
|
||||
4193366994488552277539596372582838 string for entering every
|
||||
491817161511026203040506070809001 possible 2-digit combo.)
|
||||
|
||||
3. You'll know you hit the code because the messages will start playing.
|
||||
4. Heres a list of TouchTone(c) Commands
|
||||
|
||||
|
||||
Listen to messages: 7
|
||||
Listen to new messages: 6
|
||||
Stop: #
|
||||
Rewind Tape: 2
|
||||
Advance Tape: 5
|
||||
Clear Messages: 3,3
|
||||
Record memo: *
|
||||
Record Announcement: 4,*
|
||||
Play Announcement: 4,1
|
||||
Turn System On: 0
|
||||
Turn System Off: 8,8
|
||||
|
||||
****************************************************************************
|
||||
*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
|
||||
** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
|
||||
****************************************************************************
|
62
textfiles.com/phreak/VOICEMAIL/ans_exc.txt
Normal file
62
textfiles.com/phreak/VOICEMAIL/ans_exc.txt
Normal file
@@ -0,0 +1,62 @@
|
||||
|
||||
This is the schematic I traced for an answering machine stopper
|
||||
gadget : it cuts off the answering machine in case any line is picked
|
||||
up. Some answering machines have this feature built-in; the older or
|
||||
inexpensive ones don't. The gadget is called Message Stopper (R), by
|
||||
Design Tech International Inc., Springfield, VA. Several other mfrs
|
||||
make this kind of gadget, so this is just one I happened to buy.
|
||||
Cost, roughly $10.
|
||||
|
||||
The gadget is in the same form factor as a wall-plug-in Y-splitter.
|
||||
That is, it plugs into the wall RJ11 outlet, and has two RJ11 outlets
|
||||
on it, one marked TEL, the other marked ANS. There are two LED's, the
|
||||
green one on top of the ANS outlet, the red one on top of the TEL outlet.
|
||||
|
||||
The two outer wires of the three RJ11's are wired in parallel. The
|
||||
schematic for the center two wires is :
|
||||
|
||||
|
||||
.-------------- phone
|
||||
.-----------------
|
||||
| |
|
||||
C1 ----|
|
||||
C2 -| |
|
||||
| |
|
||||
| |
|
||||
| '----------------- answering machine
|
||||
|
|
||||
+--|<--+--|<--->|----
|
||||
| | two zeners
|
||||
+-->|--+
|
||||
two leds
|
||||
|
||||
Top led is green, bottom is red.
|
||||
|
||||
It turns out the leds are basically idiot lights. The outside design
|
||||
makes it look like the green should light up when the ANS is offhook,
|
||||
and the red when TEL is offhook, but actually, depending on the line
|
||||
polarity, only one will glow, and only when the ANS outlet is offhook.
|
||||
If a load is connected on the ANS outlet, both leds will glow when
|
||||
ring voltage comes through.
|
||||
|
||||
I could not read the zener voltage off the diodes, but I measured 11V
|
||||
across one of them when operating.
|
||||
|
||||
The theory of operation is straightforward. All telephone extensions
|
||||
in the house are in parallel with each other, and with any device connected
|
||||
on the TEL outlet. If any of these devices is offhook, the phone line
|
||||
voltage is expected to drop below 12V or so, at which point the zeners
|
||||
isolate the ANS outlet from the line.
|
||||
|
||||
It's a fairly simplistic design, and will not work in all situations,
|
||||
but it mostly works.
|
||||
|
||||
----
|
||||
|
||||
Regards,
|
||||
|
||||
/ Jon Sreekanth
|
||||
|
||||
Assabet Valley Microsystems, Inc. | Fax and PC products
|
||||
5 Walden St #3, Cambridge, MA 02140 | (617) 876-8019
|
||||
jon_sree@world.std.com |
|
BIN
textfiles.com/phreak/VOICEMAIL/ansmache.xcl
Normal file
BIN
textfiles.com/phreak/VOICEMAIL/ansmache.xcl
Normal file
Binary file not shown.
275
textfiles.com/phreak/VOICEMAIL/aspentut.txt
Normal file
275
textfiles.com/phreak/VOICEMAIL/aspentut.txt
Normal file
@@ -0,0 +1,275 @@
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
* *
|
||||
* A Tutorial Of: ASPEN VOICE MAILBOX SYSTEMS *
|
||||
* *
|
||||
* Written by: SLYCATH *
|
||||
* *
|
||||
* Greetz to: Firefly, Adam, Sintax, Voltage and *
|
||||
* *
|
||||
* Everyone who knows me.... Happy Hacking.. *
|
||||
* *
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
|
||||
Intro:
|
||||
Well you may be thinking that, Oh! yes I've read tutorials
|
||||
before and they are about as helpful as a dead parrot.....
|
||||
I thought it was about time to write a little series of
|
||||
textfiles on how to use (and abuse) Mailbox systems.
|
||||
This series will NOT just cover Hacking and scanning of mail
|
||||
systems but also the facilities used on each................
|
||||
|
||||
Start:
|
||||
O.K. After recently coming across an ASPEN system which I
|
||||
successfully managed to hack a couple of mailboxes for my
|
||||
personal use, I didn't realise all the many facilities
|
||||
available to the (Ab)user. I have collated the following
|
||||
information myself I hope it will be of some help to U.
|
||||
|
||||
Assuming that you already have a mailbox on the system:
|
||||
|
||||
When Entering your mailbox number and passcode the system
|
||||
will tell you if you have any new (or saved) messages.
|
||||
Let's assume you have ONE new message.
|
||||
|
||||
You may select the following options:
|
||||
|
||||
Push:
|
||||
----- 1 - Recieve Messages
|
||||
2 - Send a message
|
||||
3 - Check Reciept
|
||||
4 - Personal Options
|
||||
|
||||
Option chosen:
|
||||
--------------
|
||||
|
||||
1:
|
||||
"" Whilst message is playing you have a sub-menu of options.
|
||||
|
||||
1: Rewind Message Ten Seconds
|
||||
11: Rewind To Start Of Message
|
||||
2: Pause Message (Press Again To Unpause)
|
||||
3: Fast Forward Message Ten seconds
|
||||
33: Fast Forward To End Of Message
|
||||
|
||||
4: Decrease Playing Speed (Slow Down)
|
||||
6: Increase Playing Speed (Speed Up)
|
||||
|
||||
8: Decrease Volume
|
||||
9: Increase Volume
|
||||
|
||||
After listening to the message you may select one of these.
|
||||
|
||||
4: Replay Message
|
||||
5: Envelope Message (Find Source Mailbox+Time+Date+Length)
|
||||
6: Send On Message To Another Subscriber - Record Intro Msg.
|
||||
7: ERASE Message
|
||||
8: Reply To Message
|
||||
9: Save Message In Archives (For Later Listening)
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
2:
|
||||
"" Send a Message will ask you to speak whilst it records you.
|
||||
|
||||
Press # to stop recording then enter Destination Mailbox.
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
3:
|
||||
"" Check reciept of messages sent.
|
||||
|
||||
This will allowyou to check if a message has been read and
|
||||
also if a message has been saved.
|
||||
There are other uses for this function (See L8ter)
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
4:
|
||||
"" Personal Options. Good fun can be had by all !!
|
||||
|
||||
1: Change Your Passwords
|
||||
------------------------
|
||||
|
||||
This Section Refers To Guest Box Control.
|
||||
If you are Strapped for boxes then you can assign
|
||||
Guest Boxes so you can send messages to each other even
|
||||
if One person doesn't have a mailbox.
|
||||
|
||||
1: Change Guest 1's Password
|
||||
|
||||
Guest Can Leave AND Recieve Messages
|
||||
|
||||
2: Change Guest 2's Password
|
||||
|
||||
Guest Can Leave AND Recieve Messages
|
||||
|
||||
3: Change Home Password
|
||||
|
||||
Guest Can Leave AND Recieve Messages
|
||||
|
||||
4: Change Secretary Password
|
||||
|
||||
Can Check How Many Messages You Have +
|
||||
Recieve Messages
|
||||
|
||||
5: Change Mailbox Password (MAIN)
|
||||
|
||||
This is your password. DON'T FORGET IT
|
||||
~~~~
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
2: Change Your Greetings
|
||||
------------------------
|
||||
|
||||
1: Change Your Name
|
||||
|
||||
This is the name which people hear when
|
||||
sending you messages from other boxes.
|
||||
i.e. "Your message will be sent to xxxxxx"
|
||||
|
||||
2: Change Your Greeting
|
||||
|
||||
This is what Non-Subscribers who are leaving
|
||||
you mail will hear.
|
||||
|
||||
3: Change Your Extended Abscence Greeting
|
||||
|
||||
This is the same as the ordinary greeting but
|
||||
people leaving messages will be alerted that
|
||||
you may not be back for some time.
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
3: Distribution Lists
|
||||
---------------------
|
||||
|
||||
Distribution lists are so you can record a message and have
|
||||
it automatically sent to all users on your list.
|
||||
|
||||
i.e. Your list could contain EVERYONE'S number
|
||||
Or All Your M8s On the system.
|
||||
|
||||
1: Create Distribution Lists
|
||||
|
||||
2: Edit Distribution Lists
|
||||
|
||||
3: Delete Distribution Lists
|
||||
|
||||
4: Find Names Of People On Lists
|
||||
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
OK ENUFF OF THE OPTIONS NOW ONTO THE HACK STUFF.
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
|
||||
Passwords:
|
||||
~~~~~~~~~~
|
||||
|
||||
Defaults For ASPEN Are:
|
||||
|
||||
(E.G. Box is 888)
|
||||
|
||||
-------------------------------
|
||||
Passcode | Example
|
||||
-------------------------------
|
||||
Box number - 888
|
||||
Box number + 1 - 889
|
||||
Box number & 1 - 8881
|
||||
1 & Box number - 1888
|
||||
Box number + 0 - 8880
|
||||
0 & Box number - 0888
|
||||
|
||||
-------------------------------
|
||||
Use Normal Hacking Techniques:
|
||||
-------------------------------
|
||||
i.e.
|
||||
1111
|
||||
|
|
||||
\|/
|
||||
9999
|
||||
1234
|
||||
4321
|
||||
-------------------------------
|
||||
|
||||
|
||||
Scanning:
|
||||
~~~~~~~~~
|
||||
|
||||
Once you have found a NEW Mailbox, or even a used one.
|
||||
|
||||
.-------------------------,
|
||||
/ DON'T CHANGE JACK SHIT /
|
||||
`-------------------------'
|
||||
|
||||
Press '3' from the main menu.
|
||||
This Checks for Reciept of messages (See Previous)
|
||||
|
||||
Enter Mailbox Number: xxxx
|
||||
|
||||
When entered number the system will say one of the following:
|
||||
|
||||
1: The Mailbox Users Name
|
||||
2: "xxxx Is not a Valid Number"
|
||||
3: "xxxx"
|
||||
|
||||
Start at 0000 then move up to 9999 making a note as follows:
|
||||
|
||||
If you get :
|
||||
|
||||
1. Ignore and enter the next number.
|
||||
2. Ignore and enter the next number.
|
||||
3. Jump up and down and go WHOOOOPPPEEEEE , you may be in luck.
|
||||
|
||||
When You Have finished you should have a list of POSSIBLE
|
||||
Hackable Mailboxes.
|
||||
______
|
||||
/ \
|
||||
/ THEN: /
|
||||
\ /
|
||||
`----'
|
||||
|
||||
1. Hang Up And call back the system.
|
||||
2. Press '#'
|
||||
3. Enter One of Numbers on the list.
|
||||
4. If it says 'Enter Password' You can either try and hack it
|
||||
but isn't gonna be a VIRGIN mailbox.
|
||||
5. If it says 'This is a voice messaging bollox.... blahh blahh.'
|
||||
then it will come to a point where it says,
|
||||
'Please enter the temporary password assigned by your System
|
||||
Manager'.
|
||||
6. Enter Default Passwords.
|
||||
Defaults Are most likely to be the same for all the other VIRGIN
|
||||
voice mail boxes if not, try the other ones.
|
||||
7. If It hangs up then GOTO 1.
|
||||
8. If it allows you access then play with the options (See Previous)
|
||||
|
||||
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
Thanx For Reading All Of This Text File.
|
||||
I Hope That It Will Be Of Some Use To You.
|
||||
|
||||
And See Ya All In
|
||||
----------------------------
|
||||
" The Guide To CINDI Systems "
|
||||
----------------------------
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
Extra Greeting: Thanx To FIREFLY For Alerting Me To
|
||||
Some Of The Extra Options Which I Hadn't Previously
|
||||
Noticed When Playing Around With It. THANX M8.
|
||||
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
|
||||
/ \
|
||||
*-+-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-+-*
|
||||
| |
|
||||
| I Expect The Next Bit Will Get Adverts Stuck To It! |
|
||||
| |
|
||||
`-----------------------------------------------------'
|
||||
|
||||
|
||||
|
||||
|
33
textfiles.com/phreak/VOICEMAIL/at&t.txt
Normal file
33
textfiles.com/phreak/VOICEMAIL/at&t.txt
Normal file
@@ -0,0 +1,33 @@
|
||||
Hacking AT&T Answering Machines
|
||||
Quick and Dirty by oleBuzzard
|
||||
Written Today / 14-SEP-95
|
||||
(c) 1995 <k0p> Communications
|
||||
|
||||
|
||||
1. Dial telephone and wait for AT&T Answering Machine to answer.
|
||||
2. Quickly Enter the following string.
|
||||
|
||||
1234567898765432135792468642973147 (btw: this is the shortest
|
||||
4193366994488552277539596372582838 string for entering every
|
||||
491817161511026203040506070809001 possible 2-digit combo.)
|
||||
|
||||
3. You'll know you hit the code because the messages will start playing.
|
||||
4. Heres a list of TouchTone(c) Commands
|
||||
|
||||
|
||||
Listen to messages: 7
|
||||
Listen to new messages: 6
|
||||
Stop: #
|
||||
Rewind Tape: 2
|
||||
Advance Tape: 5
|
||||
Clear Messages: 3,3
|
||||
Record memo: *
|
||||
Record Announcement: 4,*
|
||||
Play Announcement: 4,1
|
||||
Turn System On: 0
|
||||
Turn System Off: 8,8
|
||||
|
||||
****************************************************************************
|
||||
*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
|
||||
** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
|
||||
****************************************************************************
|
432
textfiles.com/phreak/VOICEMAIL/audexvp.txt
Normal file
432
textfiles.com/phreak/VOICEMAIL/audexvp.txt
Normal file
@@ -0,0 +1,432 @@
|
||||
AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
|
||||
UDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX
|
||||
DEX- DEX-
|
||||
EX-A HACKING GUIDE TO THE EX-A
|
||||
X-AU X-AU
|
||||
-AUD AUDEX VOICE POWER -AUD
|
||||
AUDE AUDE
|
||||
UDEX WRITTEN BY UDEX
|
||||
DEX- DEX-
|
||||
EX-A --==>> CRAZYBYTE <<==-- EX-A
|
||||
X-AU X-AU
|
||||
-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
|
||||
AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
|
||||
UDEX UDEX
|
||||
DEX- CALL SIN CITY: +32-3-8252274 DEX-
|
||||
EX-A EX-A
|
||||
X-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AU
|
||||
-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> DISCLAIMER <--\/\
|
||||
------------------------
|
||||
Ohooh... I'm scared as shit so I accept no responsibility for any actions
|
||||
taken by readers... blahblah NOOOOOOO...
|
||||
This text is written with the intention that readers of this text hack
|
||||
Audex Voice Power vmb's, and I sure as hell hope that as from now on every
|
||||
fucking Audex Voice Power in the galaxy gets abused by hackers.
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> INTRODUCTION <--\/\
|
||||
--------------------------
|
||||
The Audex Voice Power is the predecessor of the Audex we all know just under
|
||||
the name Audex today. There aren't that much of this older system around,
|
||||
but the few I found were fucking easy to hack. And again: vmb's are fun to
|
||||
have, you can trade them for xxx (fill this in), they lower your phone
|
||||
bill,... (you've heard this shit before).
|
||||
Anyway, lets get down to business...
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> IDENTIFYING THE AUDEX VOICE POWER VMB <--\/\
|
||||
----------------------------------------------------
|
||||
Well, you can't recognize them from the first greeting, but the greeting
|
||||
will probably contain the usual 'press the ext. of the person you want to
|
||||
reach' and the (special for Audex Voice Power) 'if you want to transfer
|
||||
using names instead, press the pound (#) key'.
|
||||
To REALLY be sure it's an Audex Voice Power: press *7, if it responds with:
|
||||
'Welcome to Audex Voice Power, please enter extension and # sign' you've
|
||||
got yourself an easy-to-hack Audex Voice Power vmb.
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> LOGGING IN <--\/\
|
||||
------------------------
|
||||
Press *7, you are asked to enter your box number, these are can be 3 or 4
|
||||
digits, but I haven't found a mixture of the two on one system so far.
|
||||
After you've entered the box number, press #, enter your password and press
|
||||
# again. If you entered and incorrect box number or password, it will say
|
||||
'Login incorrect, please try again,...'. On the systems I found you could
|
||||
try 4 times to login before you get disconnected. When you get disconnected
|
||||
it will say: 'Contact administrator for help, please disconnect... goodbye'.
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> FINDING A VALID BOX AND PASSWORD <--\/\
|
||||
----------------------------------------------
|
||||
The boxes are grouped, and they will usually be in 2XX or 2XXX. The default
|
||||
password is the same as the box number, just like on allmost all other VMB
|
||||
systems.
|
||||
|
||||
There are two easy ways to find boxes (and one difficult, and another one
|
||||
if you really want a box but had extremely bad luck):
|
||||
|
||||
1. On the two systems I'm using right now, the attendant-extension (0)
|
||||
has 0 as password, and on one of those two, the options at the login-menu
|
||||
have also got the same password as their extension number (1 for xxx, 2
|
||||
for yyy,...). So first thing to do is trying 0 -> 9, if you can't get in
|
||||
with these, read 2.
|
||||
|
||||
2. So you couldn't get in by trying extensions 0 -> 9.
|
||||
Most systems have a directory where you can transfer to people's
|
||||
extensions by entering the first letters of their last name.
|
||||
To find the directory, just listen to the first greeting you hear when
|
||||
you call the VMB. (you know, 'welcome to xxx... if you need assistance
|
||||
press 0, otherwise press the extension of...'). Usually you have to
|
||||
press # at the login menu. Now, when you enter the directory option,
|
||||
the system will respond with: 'Please enter the last name of the person
|
||||
you want to reach'. Don't enter a complete name, just press 5 or somtehing
|
||||
and the # sign. By the way: lots of VMB systems have some sort of
|
||||
directory, and allmost every VMB system I found had users with last names
|
||||
'Smith' or 'Jones' (some popular names in the US, and characters from a
|
||||
stupid TV series). Well, lets continue with Audex Voice Power. After you've
|
||||
pressed #, the system will say 'to select blahblah press x' and will
|
||||
start saying names. Now a lot of users also say their box number, so
|
||||
a lot of these names will be like 'John Doe, extension xxxx'. Just
|
||||
write these down. If you found how many digits the box numbers are,
|
||||
and where they are grouped, hang up and call again.
|
||||
Now start trying the box numbers you just found, you probably will get
|
||||
in using the box number as password the 2nd or 3rd time you call, since
|
||||
a lot of people don't use their VMB's, or don't know shit about it, so
|
||||
haven't changed their password.
|
||||
|
||||
3. Couldn't get in with one of the above methods ? Never happened to me,
|
||||
but I guess it's possible. Here's what I would do in such a situation.
|
||||
Don't use the login (*7) options to scan for boxes because then you don't
|
||||
even know if it's a valid box. Just transfer to them from the main menu,
|
||||
so you know how much digits the boxes are, and where they're located
|
||||
(since they 'live' in groups). There's a 90% chance the boxes are located
|
||||
in 2xx(x). If you entered an invalid box number, it will first try to
|
||||
transfer you, and then it will say something like 'your transfer couldn't
|
||||
be completed'. Since you don't have to press # after entering an extension
|
||||
to transfer to, it's possible that f.e. after pressing only one digit you
|
||||
will get transfered (read point 1 of this paragraph). When you've located
|
||||
an area that contains lots of valid extensions, try to hack a box in that
|
||||
area with the login (*7) option.
|
||||
|
||||
4. Still didn't find a box ??? Well, the best thing you could do in this
|
||||
case is bullshit to the operator. If you couldn't find the area that
|
||||
contains the boxes, and there's no directory, ask her for the extension
|
||||
of f.e. Smith and say you don't know anything else about this Smith.
|
||||
If bullshitting the operator didn't work either, just try to transfer to
|
||||
an extension, and ask the person that picks up the phone for their
|
||||
password. You could say that you're from maintenance, and are installing
|
||||
a new option in the boxes so that people are able to use outside lines
|
||||
from within their boxes or something.
|
||||
|
||||
5. You still couldn't get a box ? Well, give up on this system and scan for
|
||||
another VMB system. I NEVER found a system I couldn't get a box after
|
||||
about ten minutes using the method in points 1 and 2 so you are trying to
|
||||
hack a system that has allready been badly abused by hackers or otherwise
|
||||
you are EXTREMELY dumb.
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> OK, YOU'RE IN A BOX, WHAT NOW ??? <--\/\
|
||||
------------------------------------------------
|
||||
Well, use press 2 to listen to the messages, but only listen to the dates they
|
||||
were created. So press # every time to skip to the next message.
|
||||
If it contains new messages from 3 months ago, then it means that the legit
|
||||
user didn't use his box in 3 months. You can safely listen to the messages
|
||||
and use this box without the risk of loosing it in 2 days.
|
||||
If it contains no messages it could be possible that the user checks the VMB
|
||||
regulary, or that it has never been used in which case you got yourself a
|
||||
good box again. There's no quick way to find out if it's unused or often used
|
||||
in this case, just use this box to scan for other ones (look below), or check
|
||||
regulary if there are new messages and if they get deleted afterwards.
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> SCANNING FOR OTHER BOXES <--\/\
|
||||
---------------------------------------
|
||||
There are different ways of scanning for other boxes, but the quickest is
|
||||
the following:
|
||||
First choose option 5 from the main menu, then press 1 to create a
|
||||
distribution list. You will be asked for an ID for the list, just press 1
|
||||
or something followed by #. Now start entering box numbers, followed by #.
|
||||
If the box is valid, the system will respond with the name of the owner, or
|
||||
when you're lucky, the system will sa: 'Extension xxx', in which case you
|
||||
should write the number down because you've got a 99% chance this is an
|
||||
unused box. If the box is not valid, the system will say 'Extension xxx not
|
||||
valid'. When you've collected some numbers, press *# and then *3 to delete
|
||||
the list. Now hang up, call again and try what boxes have the same passwords
|
||||
as their box numbers.
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> OPTIONS AND COMMANDS <--\/\
|
||||
----------------------------------
|
||||
From the main menu you've got the following options:
|
||||
|
||||
1. Record a message
|
||||
2. Listen to messages
|
||||
3. Administer name or greeting
|
||||
5. Administer password and distribution lists
|
||||
6. Change outcalling info (INTERESTING)
|
||||
*8. Transfer to another extension
|
||||
|
||||
|
||||
|
||||
1. RECORDING MESSAGES :
|
||||
|
||||
You will hear a beep, record your message after the beep. When
|
||||
finished recording, press 1. Now you've got the following options:
|
||||
|
||||
21: Re-record : Your message will be deleted and you can record
|
||||
it again.
|
||||
|
||||
23: Playback : Just as it says: your just-recorded message will
|
||||
be played back.
|
||||
|
||||
*3: Delete : Your message will be deleted
|
||||
|
||||
*#: Approve : Now enter the boxes you wish to send your message
|
||||
to, followed by #. When finished type *#. To delete
|
||||
the last entry (box), type *3.
|
||||
|
||||
|
||||
2. LISTENING TO MESSAGES :
|
||||
|
||||
When there are no messages, you will go back to the main menu.
|
||||
Otherwise you will hear the date and time the actual message was
|
||||
delivered, and the name (if specified) of the sender.
|
||||
Options:
|
||||
|
||||
0 : Listen : Listen to actual message
|
||||
While listening you can use these commands:
|
||||
2 : Rewind message. If you press it again you will go to
|
||||
the previous message.
|
||||
3 : Pause. Press 3 again to continue playing.
|
||||
5 : Rewind and play
|
||||
6 : Goto end of message
|
||||
|
||||
# : Skip : go to next message
|
||||
|
||||
*3: Delete : actual message will be deleted
|
||||
|
||||
1 : Respond/forward message
|
||||
1 : Reply : Send an answer to the sender
|
||||
2 : Forward : Record a comment before the message and send
|
||||
it to someone else.
|
||||
4 : Record new : Record a new message. This does exactly the
|
||||
same as option 1 from the main menu.
|
||||
|
||||
|
||||
3. ADMINISTERING OF NAME AND GREETING :
|
||||
|
||||
This submenu will enable you to record name and greeting, and to
|
||||
specify what greeting will be used.
|
||||
Options:
|
||||
|
||||
1 : Greeting : The message that will be heard whenever someone
|
||||
wants to leave a message in your box.
|
||||
1 : Record : Record after the beep the greeting that should
|
||||
be played. Press 1 to end recording.
|
||||
2 : Listen : Listen to your greeting.
|
||||
*#: Select which greeting should answer.
|
||||
9 : Personal greeting.
|
||||
6 : Standard system greeting.
|
||||
|
||||
2 : Name : The message that is heard when someone sends or
|
||||
reveices messages to/from your box.
|
||||
0 : Listen : Listen to name.
|
||||
1 : Record : Record name.
|
||||
|
||||
|
||||
5. CREATING DISTRIBUTION LISTS AND CHANGING YOUR PASSWORD :
|
||||
|
||||
Distribution lists are used when you regulary need to send messages to
|
||||
several people, and don't want to waste time with typing all their
|
||||
boxes.
|
||||
|
||||
1 : Create : Creates a new distribution list. First you will be
|
||||
asked for an ID for the list. Now enter f.e. 1 followed
|
||||
by #. You can now enter a box number followed by #,
|
||||
repeat this untill you inputed all the box numbers for
|
||||
the distribution list. If you entered a wrong number,
|
||||
just press *3 to delete the last entry. When finished
|
||||
press *#.
|
||||
|
||||
2 : Scan : With this option all distribution lists ( If you got
|
||||
any ) will be said, and after saying the ID of the
|
||||
list, you've got the following options:
|
||||
*3: Delete : Delete this distribution list.
|
||||
# : Skip : Go to the next distribution list.
|
||||
|
||||
3 : Review : This option will allow you to change other users' or
|
||||
your own distribution lists. First enter the box number
|
||||
followed by #, or for your own box, just press #.
|
||||
Now enter the ID of the distribution list followed
|
||||
by #. The system will say how much entries there are in
|
||||
the list, and name them one by one, giving you the
|
||||
following options after naming each entry:
|
||||
# : Skip : Go to the next box.
|
||||
*3: Delete : Delete this box.
|
||||
1 : Add : Add a box.
|
||||
*#: Quit : Stop review of the entries in the list.
|
||||
|
||||
4 : Change PW : Enter your new password followed by #. After
|
||||
entering it, you have to enter it again followed
|
||||
by # to check if you didn't enter it wrong the
|
||||
first time. The password can be 1 till 9 digits.
|
||||
If you just press # when you're asked to enter it,
|
||||
no passwords will be assigned to your box.
|
||||
|
||||
|
||||
6. CHANGE OUTCALLING INFORMATION :
|
||||
|
||||
The outcalling option is quite fun. Not everyone is allowed to do it,
|
||||
but if you find boxes allowing outcalling, you can use them to call
|
||||
friends, boards or even alliance... I wouldn't suggest putting your
|
||||
own number there, but it would be quite fun that when someone calls
|
||||
you up using the VMB (on a tollfree number ???), and you don't answer,
|
||||
he can leave a message and stuff...
|
||||
|
||||
Options:
|
||||
|
||||
1 : Change : Enter the number your calls should be transfered to,
|
||||
followed by #. To exit press *#.
|
||||
|
||||
3 : Info : Will give you instructions on how to enter the number
|
||||
with option 1. If you want to insert a pause in the
|
||||
dial string, use * to pause for 4 seconds. If your
|
||||
number needs to be ended with a #, start your dialing
|
||||
string with ##. Normally you can't end with a #
|
||||
because if you do that, the system thinks that it's
|
||||
the end of the dialing string. This is usefull for
|
||||
pagers and other stuff (use your imagination).
|
||||
|
||||
6 : Disable : Turn outcalling off.
|
||||
|
||||
9 : Period : Specify the outcalling period.
|
||||
1 : Outcalling allowed during the system administration hours.
|
||||
F.e.: Only between 8 AM and 6 PM.
|
||||
2 : Outcalling allowed 24 hours a day.
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> GREETINGS <--\/\
|
||||
-----------------------
|
||||
And last but not least some greetings to:
|
||||
(A-Z to avoid 'why did ya put X before me ?')
|
||||
|
||||
|
||||
Analog: Forget that I told you to kick off Flaming Chaos as a CO.
|
||||
Making a new BBS proggy ?
|
||||
|
||||
Apollo: Hope your exams are better than mine... nice talking to ya
|
||||
over the VMB.
|
||||
|
||||
A.R.U.P.: For having such a nice and virgin Audex Voice Power VMB.
|
||||
|
||||
Cops (the): FUCK OFF !!! I EXTREMELY HATE ALL COPS... I WOULD KILL ALL
|
||||
COPS IF I HAD THE CHANCE (same goes for all kind of security
|
||||
personnel and the endless amount of lamers on this planet).
|
||||
|
||||
Donald Duck: Where R you ? Is your girlfriend SO interesting ? We miss
|
||||
your expertise...
|
||||
|
||||
Einstein: You're lame and you know it. Hah, I puke on guys like you.
|
||||
I'm not a violent guy, but I swear I'll smash your head when
|
||||
I ever meet you.
|
||||
|
||||
Flaming Chaos: Sorry I offended you dude, but I didn't know about that '|',
|
||||
so I thought the message was specifically written for me.
|
||||
|
||||
Invalid Media: Quite nice board... too bad you had to make it codefree.
|
||||
|
||||
Jules: Your board is OK, but why is it down so much ?
|
||||
|
||||
Larry: You're a lamer and your problem is that you won't admit it.
|
||||
|
||||
Oink: Hmmm... so you agree that HP3000's are Boooring... Unixes are
|
||||
1000 times more phun...
|
||||
|
||||
Ralph: Been fucking around on the nets lately ???
|
||||
|
||||
Sintax: Happy now that I put some greets in ? Don't you ever get bored
|
||||
of CIS ?
|
||||
|
||||
Slycath: Nice texts, continue your good work...
|
||||
btw: I LUV Robbie Robot... (and his frog puppet)
|
||||
|
||||
Predat0r: Your board is the living proof that a board doesn't need an
|
||||
HST to be one of the best.
|
||||
|
||||
Thor: How is army ? Why don't you do something usefull while you're
|
||||
there and look for their computer dialups (if they're using
|
||||
any (hehe)).
|
||||
|
||||
Trap Zer0: Nice texts about the VMB's. Getting active again ?
|
||||
|
||||
Vinny: You probably won't read this, hehe... your handle is with 'V'
|
||||
so you're last... anyways, THANKS for everything you 'teached'
|
||||
me, THANKS for the job you can get me, GOOD LUCK with the PC.
|
||||
|
||||
???: To all guys who call me when I'm sleeping: FUCK OFF.
|
||||
|
||||
|
||||
And... to all guys I forgot and also the few cool guys I know among all the
|
||||
lamers in the lame Amiga scene. Only greets here to guys I know involved
|
||||
in HPA, this will be the first and the last time I put up such a greetings
|
||||
list...
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> RECOMMENDED READING <--\/\
|
||||
---------------------------------
|
||||
- All texts about Night Ranger, he's the VMB expert.
|
||||
- Texts about Aspen and Cindi systems written by Slycath.
|
||||
- Texts about the IADS and Message Centers by Trap Zer0.
|
||||
- Ofcourse all texts written by me (hehe).
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> OTHER TEXTS WRITTEN BY ME <--\/\
|
||||
---------------------------------------
|
||||
- Unix command overview
|
||||
- Hacking Meridian Mail
|
||||
- HP3000 quick command reference
|
||||
|
||||
|
||||
|
||||
|
||||
/\/--> TEXTS TO WATCH OUT FOR <--\/\
|
||||
-------------------------------------
|
||||
- Maybe a text about the IADS coz I think it's the best VMB ever made.
|
||||
- Text about Audex (the new Audex Voice Power system).
|
||||
- Probably some texts about hacking Unix or the MPE XL or V OS on HP3000's.
|
||||
|
||||
|
||||
|
||||
|
||||
L8R ALLIG8R
|
||||
|
||||
User CRAZYBYTE ending interactive session at 17:02.
|
||||
|
||||
NO CARRIER
|
||||
|
||||
|
361
textfiles.com/phreak/VOICEMAIL/cinditut.txt
Normal file
361
textfiles.com/phreak/VOICEMAIL/cinditut.txt
Normal file
@@ -0,0 +1,361 @@
|
||||
. + . . .
|
||||
+ ___/\ /\_/\_______________________/\________
|
||||
. /\__\/\/ /_________________________/ /________\ . +
|
||||
. . / / __\ \/_________/\_____ _______/ /_________/ .
|
||||
. \/ / /\ \/ // \ / \ / / /\ / /
|
||||
. + . \ \ / /\ // /\// /\ \ / / / / / / . .
|
||||
. ________________/\ / / / // / \/\/ // / / /__/ / . +.
|
||||
/\_______________\/ \ \/ / \ \_/\ / // / / / / / .
|
||||
\/_________________/ \ / \___/ / / \/ \/ / / .
|
||||
. / \ . / / . . \/ .
|
||||
. + . . . \/\/ . \/ +
|
||||
|
||||
. IS PROUD TO PRESENT TO YOU:
|
||||
. ___________________________
|
||||
/\_________________________/\
|
||||
/ / \ \
|
||||
/ / * CINDI SYSTEM TUTORIAL * \ \
|
||||
\/\___________________________/\/
|
||||
|
||||
YO GUYZ, I'M BACK AS PROMISED WITH ANOTHER TUTORIAL.
|
||||
LEAVE ME MAIL IF YOU NEED HELP WITH SOMETHING.
|
||||
YOU CAN CATCH ME ON:
|
||||
|
||||
BORDERLINE: +61 (0) 4987-4875
|
||||
SIN CITY: +32 (0) 3825-2274
|
||||
CONSPIRACY: +44 (0) 633-894-490
|
||||
ULTIMATE DREAM: +44 (0) 222-495-919
|
||||
|
||||
MEGA GREETZ GO TO THESE GUYZ:
|
||||
|
||||
.--------------------------------------.
|
||||
| FIREFLY, TAS, SINTAX, OINK, VOLTAGE, |
|
||||
| HYBRID, PUNISHER, CRAZYBYTE, GRAFFITI|
|
||||
| AND OF COURSE EVERYONE WHO KNOWS ME, |
|
||||
| AND ARE ALSO COOL HACKER - PHREAKERS |
|
||||
`-.----------------------------------.-'
|
||||
/ CAN SOMEONE DO ME A COOL ANSI ? TA.\
|
||||
\____________________________________/
|
||||
|
||||
ARE YOU SITTING COMFORTABLY ?
|
||||
-----------------------------
|
||||
|
||||
THEN I'LL BEGIN.
|
||||
|
||||
-----------------------------------------
|
||||
1. Identifying Voice Mail System As CINDI
|
||||
-----------------------------------------
|
||||
|
||||
When you have connected to your System, upon pressing #,
|
||||
You should get a voice saying :
|
||||
|
||||
"Please enter the persons name using your touchtone keypad, last
|
||||
name followed by first. To enter a Q or a Z push 1... etc etc.."
|
||||
|
||||
Also when you get kicked off the message will be:
|
||||
|
||||
"Thank You, Good-Day."
|
||||
|
||||
One of the most common phrases you are likely to hear will be:
|
||||
|
||||
"If you'd like to speak with someone press zero"
|
||||
|
||||
This is contained in almost all instruction lists.
|
||||
|
||||
----------------------------------------------
|
||||
2. Ok So It's CINDI... So How Do I Find A Box?
|
||||
----------------------------------------------
|
||||
|
||||
Mailboxes Are Going To Be Either 3 or 4 Digits.
|
||||
|
||||
The CINDI Mailboxes Mostly come in Blocks...
|
||||
|
||||
e.g. 860,861,862,865 etc
|
||||
|
||||
So When You Find One Person You Can Find Lots Of Others.
|
||||
|
||||
When Looking For Boxes The System Will Kick You Off If You Get A Box Number
|
||||
Wrong After Three Tries.
|
||||
|
||||
The Three Possibilities For Mailboxes Are:
|
||||
|
||||
1: Invalid Box "Mailbox XXX Does Not Exist !"
|
||||
2: The Greeting Of The Owner Will Play
|
||||
3: It Will Say "Mailbox XXX"
|
||||
|
||||
Once You Have At Least One Valid Box Number Everything Is sooo EASY!
|
||||
|
||||
Upon Second Failure (Of Invalid Mailbox Number)Press Hash To Enter
|
||||
Another Box Number. Now Enter A Valid Box Number.
|
||||
If You Don't Want That Box You Can Press '0'
|
||||
Then Instead Of entering Password You Can Press '#' To Enter Another Box
|
||||
Number, Now There Is No Fear Of Being Cut Off.
|
||||
|
||||
Admin Boxes Are Found At Numbers Like 991, 900, 100, 101 although
|
||||
Some Systems Require You To Press '0' As Soon As Connected.......
|
||||
This Will Then Give You An 'Enter Passcode' Prompt.
|
||||
|
||||
----------------------------------------------------
|
||||
3. Strategic Hacking Using The 'Fault' Of The System.
|
||||
----------------------------------------------------
|
||||
|
||||
The easiest method to hack a box is as follows:
|
||||
|
||||
e.g. Mailbox you want to hack is 1000.
|
||||
|
||||
a. When the system asks you to enter your mailbox number enter: 1000.
|
||||
b. When the message starts playing you can press '0' to stop.
|
||||
c. The system will then ask you for a password.
|
||||
d. The Default Password on a CINDI system is (LAME) '0'
|
||||
Most Users will have passwords of:
|
||||
|
||||
Mailbox number.
|
||||
'123 (4)'
|
||||
1, 2, 3, --> 9..
|
||||
|
||||
Passwords Are 3/4 Digits...
|
||||
|
||||
Odds are at Least 1/8 Of users will have passwords like these..
|
||||
|
||||
e. If Password was wrong, then try another..
|
||||
f. Upon 2nd Failed Attempt press '#' - This causes the system to give you
|
||||
an 'Enter Mailbox' Prompt... You can repeat this Over, and Over...
|
||||
The System Doesn't Kick You Off and you can find Them Boxes...
|
||||
|
||||
**** Nice Little Bug In The Software METHINKS!!!! ****
|
||||
|
||||
---------------------------------------------------------
|
||||
4. WOW! That Was Easy... What Can I Do With My New BOX ??
|
||||
---------------------------------------------------------
|
||||
|
||||
The Full Commands Available Are As Follows:
|
||||
|
||||
Upon Entering Yor Box You Can Select:
|
||||
|
||||
0 - TRANSFER TO ATTENDANT
|
||||
1 - PLACE A CALL (To another mailbox)
|
||||
2 - RECIEVE MESSAGES
|
||||
3 - MESSAGE FORWARDING
|
||||
4 - CALL PLACEMENTS
|
||||
5 - GROUP MESSAGES
|
||||
6 - CERTIFIED MESSAGES
|
||||
7 - GUEST ACCOUNTS
|
||||
8 - PERSONALISE MAILBOX
|
||||
* - VOLUME. Quiet, Medium OR Loud.
|
||||
====
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 0 | WILL ALMOST ALWAYS TAKE YOU TO THE ATTENDANT / OPERATOR
|
||||
|___|
|
||||
|
||||
Lots Of CINDI System Operators Are Quite Stupid...
|
||||
Don't Ask Me Why But This Is Fact....
|
||||
Wind Them Up And Make Their Life Hell.
|
||||
Or If Your Kind, Just Worm Info About Other Country Dialups Etc..
|
||||
Use Your Imagination.
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 1 | PLACE A CALL
|
||||
|___|
|
||||
|
||||
This Will Prompt You To Enter A Mailbox Number...
|
||||
Then You Just Start Recording Your Message.
|
||||
The Point Of This Is So That You Can Reply To Messages..
|
||||
i.e. They Will Have Your Mailbox Number Recorded With Them
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 2 | RECIEVE MESSAGES
|
||||
|___|
|
||||
|
||||
Yup, The Whole Point Of A VMB Is To Transfer Messages..
|
||||
So Lets Look At The Available Options.
|
||||
|
||||
1 - Keep Message
|
||||
2 - Repeat Message
|
||||
3 - -10 Seconds
|
||||
4 - +10 Seconds
|
||||
5 - Skip Message
|
||||
6 - Stop playback for 30secs.
|
||||
7 - Take Action
|
||||
---------------------------------------
|
||||
PRESS:
|
||||
|
||||
1 - Copy Message With Comments
|
||||
2 - Copy Message Without Comments
|
||||
6 - Relay Info To Another Mailbox
|
||||
7 - Respond To Sender
|
||||
9 - Take NO Action
|
||||
---------------------------------------
|
||||
8 - Delete Message
|
||||
9 - End Recieving
|
||||
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 3 | MESSAGE FORWARDING
|
||||
|___|
|
||||
|
||||
This Sends All New Messages To A Given Telephone Number.
|
||||
Allows You To Enter Date, Time.. And How Often To Call.
|
||||
|
||||
1 - Enable Message Forwarding
|
||||
2 - Review Message Forwarding Status
|
||||
8 - Cancel Message Forwarding
|
||||
9 - Exit
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 4 | CALL PLACEMENTS
|
||||
|___|
|
||||
|
||||
This Allows You To Send A Message To A Telephone Number.
|
||||
The Format For Entering Number Will Allow You To Enter Pauses,
|
||||
Stars, and '#'. This Enables You To Call A PBX Using A Long String Of
|
||||
Commands, And Get The System To Give You A Wake Up Call At Home,
|
||||
Even If You Are Not In USA.....
|
||||
|
||||
One Thing To Remember Is, Once Call Has Been Made Or Not, Check Up
|
||||
On The Status Of Messages And If A Call Couldn't Be Completed Then
|
||||
Kill It As To Avoid Leaving Your Number On The System..
|
||||
|
||||
( Note On Some Systems Call Placement May Be Off Or Only Available
|
||||
On Specific Mailboxes. Find Admin. Box And Turn It ON !)
|
||||
|
||||
1 - Place A Call
|
||||
|
||||
This Will Ask You To Enter The Telephone Number You Wish To Leave
|
||||
A Message For.. The Systems I Have Found Only Call USA But This Is
|
||||
Adequate Enough. You Can Enter Pauses ( ), '*' And '#'
|
||||
|
||||
You Will Then Be Prompted To Enter A Password For The Message.
|
||||
This Is So That When The Number You Are Calling Answers They Have
|
||||
To Enter A Password To Allow Them To Hear The Message..
|
||||
If No Password Is Required Then Enter '0' As The Password.
|
||||
|
||||
2 - To Check Status Of Calls
|
||||
9 - Exit
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 5 | GROUP MESSAGES
|
||||
|___|
|
||||
|
||||
Allows You To Send A Message To Lots Of People At Once. If You Have
|
||||
A Group With Everyone Listed In It The Chances Are That When You Send
|
||||
A Message The System Will Crash.. (Mention No Names: TAS)
|
||||
|
||||
1 - Record A Group Message
|
||||
3 - Add Members To A Group
|
||||
4 - List A Group
|
||||
8 - Delete A Group
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 6 | CERTIFIED MESSAGES
|
||||
|___|
|
||||
|
||||
These Are Messages Which Once Read Will Cause The System To Send
|
||||
The Sender A Message Which Says The Message Sent To:.. On ...
|
||||
Has Been Recieved.
|
||||
|
||||
1 - Send A Certified Message
|
||||
2 - Check Delivery Status Of A Message
|
||||
8 - Cancel Notification Of A Message
|
||||
This Stops The System From Sending A Message Once The Sent
|
||||
Message Has Been Read.
|
||||
|
||||
9 - Exit
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 7 | GUEST ACCOUNTS
|
||||
|___|
|
||||
|
||||
These Allow You To Record And Recieve Messages To And From Non
|
||||
Subscribers (Heheh) To The System.
|
||||
|
||||
1 - Record A Guest Message
|
||||
2 - Check Status Of A Message
|
||||
3 - Open New Guest Account
|
||||
4 - List Your Guests
|
||||
8 - Delete A Guest
|
||||
|
||||
-----------------------------------------------------------------------
|
||||
___
|
||||
| |
|
||||
| 8 | PERSONALISE MAILBOX
|
||||
|___|
|
||||
|
||||
1 - Change Personal Greeting
|
||||
2 - Change Password
|
||||
3 - Change Name
|
||||
4 - Recover System Bulletin
|
||||
This Will Recover System Defaults For The Box.
|
||||
|
||||
5 - Check Message Waiting Notification Status
|
||||
This Will Tell You If You Have New Messages.
|
||||
-----------------------------
|
||||
Press:
|
||||
1 - Change
|
||||
9 - Exit
|
||||
|
||||
-----------------------------
|
||||
6 - Change Call Management Level
|
||||
This Will Allow Your Calls To Be Screened.
|
||||
|
||||
-----------------------------
|
||||
Press:
|
||||
1 - Change
|
||||
9 - Exit
|
||||
|
||||
-----------------------------
|
||||
7 - Change Order Of Message Retrieval
|
||||
-----------------------------
|
||||
Press:
|
||||
1 - Change
|
||||
Last In First Out +
|
||||
First In First Out
|
||||
-----------------------------
|
||||
9 - Exit.
|
||||
-----------------------------------------------------------------------
|
||||
|
||||
CINDI Systems Are Fun.. Especially For OutDialling Messages....
|
||||
If You Are ALONE ! (awww!) You Can Get The System To Send All Messages
|
||||
At A Specific Time To One Side Of A Loop.. Where You Will Be Waiting
|
||||
On The Other Side... The Possibilities Are Endless... Wake Up Calls.. etc.
|
||||
|
||||
|
||||
I Hope This Was As/More Helpful Than The ASPENTUT.TXT, If You
|
||||
Don't Have That Then Download It NOW From One Of The Boards Listed
|
||||
At the Top Of This TextFile...
|
||||
|
||||
Good Luck And HAPPY HACKING !!!!!!!!!!!!!!
|
||||
.. ..
|
||||
\ /
|
||||
/\/\/\/\
|
||||
| ## |
|
||||
[| .. |] ROBBIE THE ROBOT SAY'S HELLLOOOOOOOOOOOO.
|
||||
|________|
|
||||
\|-|-|-|-/ <In A Monotone Sort Of Voice >
|
||||
--------
|
||||
___|--|___ ..
|
||||
/ \ {<>} < Do You Like His Frog Puppet ? >
|
||||
/ | /\/\ | \/ /
|
||||
/ / | \/\/ | \ /
|
||||
-----------------------------------------------------------------------
|
||||
The Next Bit Is Where The TEXT ADDERS Do Their Worst:
|
||||
-----------------------------------------------------------------------
|
||||
|
||||
|
||||
|
87
textfiles.com/phreak/VOICEMAIL/hack6
Normal file
87
textfiles.com/phreak/VOICEMAIL/hack6
Normal file
@@ -0,0 +1,87 @@
|
||||
Hacking Voice Mail Systems
|
||||
|
||||
Voice Mail is a relatively new concept and not much has been said about it.
|
||||
It is a very useful tool for the business person and the phreak. The way it
|
||||
works is that somebody wishing to get in touch with you calls a number,
|
||||
usually a 1-800, and punches in on his touch-pad your mailbox number and then
|
||||
he is able to leave a message for you. Business experts report that this
|
||||
almost totally eliminates telephone tag. When a person wishes to pick up his
|
||||
message all he needs to do is call the number enter a certain code and he can
|
||||
hear his messages, transfer them, and do other misc. mailbox utilities.
|
||||
|
||||
Most VMSs are similar in the way they work. There are a few different ways
|
||||
the VMSs store the voice. One way is that the voice is recorded digitally and
|
||||
compressed and when heard it is reproduced back into the voice that recorded
|
||||
it. Another method that is slower and uses more space, but costs less, stores
|
||||
the voice on magnetic tape, the same type that is used to store data on a
|
||||
computer, and then runs the tape at a slow speed. Using this method the voice
|
||||
does not need to be reproduced in any way and will sound normal as long as the
|
||||
tape is running at a constant speed. On some of the newer VMSs the voice is
|
||||
digitally recorded and is transformed from the magnetic tape at about 2400
|
||||
bits per second.
|
||||
|
||||
There are many different types and versions of voice mail systems. Some of
|
||||
the best and easiest to get on will be discussed.
|
||||
|
||||
Centagram
|
||||
---------
|
||||
These are direct dial (you don't have to enter a box number). To get on one
|
||||
of these, first have a number to any box on the system. All of the other
|
||||
boxes will be on the same prefix; just start scanning them until you find one
|
||||
that has a message saying that person you are calling is not available. This
|
||||
usually means that the box has not been assigned to anybody yet. Before the
|
||||
nice lady's voice tells you to leave the message, hit #. You will then be
|
||||
prompted for your password. The password will usually be the same as the last
|
||||
four digits of the box's number or a simple number like 1000, 2000, etc. Once
|
||||
you get on, they are very user friendly and will prompt you with a menu of
|
||||
options. If you can't find any empty boxes or want to do more, you can hack
|
||||
but the system administrators box, which will usually be 9999 on the same
|
||||
prefix as the other boxes, will allow you to hear anybody's messages and
|
||||
create and delete boxes.
|
||||
|
||||
Sperry Link
|
||||
-----------
|
||||
These systems are very nice. They will usually be found on an 800 number.
|
||||
These are one of the hardest to get a box on because you must hack out a user
|
||||
ID (different from the person's box number) and a password. When it answers,
|
||||
if it says, "This is a Sperry Link voice station. Please enter your user ID,"
|
||||
you will have to start trying to find a valid user ID. On most Sperrys it
|
||||
will be a five digit number. If it answers and says, "This is an X answering
|
||||
service," you first have to hit *# to get the user number prompt. Once you
|
||||
get a valid user number will have to guess the password on most systems, it
|
||||
will be 4 digits. Once you get in, these are also very user friendly and have
|
||||
many different options available.
|
||||
|
||||
RSVP
|
||||
----
|
||||
This is probably one of the worst VMSs but it is by far the easiest to get
|
||||
yourself a box. When it answers you can hit * for a directory of the boxes on
|
||||
it (it will only hold 23). If you hit # you will be given a menu of options
|
||||
and when you choose an option you will then be prompted for your ID number.
|
||||
The ID number on an RSVP system will just about always be the same as the
|
||||
mailbox number, which are always only 2 digits.
|
||||
|
||||
A.S.P.E.N.
|
||||
----------
|
||||
The Aspen voice message systems made by Octel Telecommunications is in my
|
||||
opinion the BEST VMS made. To get a box on an Aspen, you need to find an
|
||||
empty box. To find an empty box, scan the box numbers and if one says, "You
|
||||
entered XXXX. Please leave a message at the tone," then this is an empty box.
|
||||
You next just press # and when prompted for your box number enter the number
|
||||
of the empty box and friendly voice of the nice lady will guide you through
|
||||
all of the steps of setting up your box. She first tells you what you can do
|
||||
with the box and then will prompt you with, "Please enter the temporary
|
||||
password assigned to you by your system manager." This password will usually
|
||||
be 4 digits long and the same as the box number like 1000, etc. Once you get
|
||||
on their are many things you can do. You can make a distribution list where
|
||||
if you want to leave a certain message to more than one person, you can enter
|
||||
the list number and all of the boxes on the list will get the message. You can
|
||||
also have the system call you and notify you that you have new messages. These
|
||||
systems also have what they call "Information center mailboxes" that are
|
||||
listen only and can also have a password on them so the person calling has to
|
||||
enter the password before he hears the greeting message. Aspen VMSs have a
|
||||
system managers mailbox that will just about give you total control of the
|
||||
whole system and let you listen to people's mail, create and delete boxes, and
|
||||
many other things.
|
||||
|
||||
|
265
textfiles.com/phreak/VOICEMAIL/hackam1990.txt
Normal file
265
textfiles.com/phreak/VOICEMAIL/hackam1990.txt
Normal file
@@ -0,0 +1,265 @@
|
||||
|
||||
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||
Hacking Answering Machines 1990
|
||||
*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
|
||||
by: Predat0r of Blitzkrieg Bbs 502/499-8933
|
||||
|
||||
|
||||
AT&T reports that in the year 1990, 11 million people
|
||||
will buy an answering machine for their home use. In 1989, 10
|
||||
million machines were sold. Everyone has called up a person
|
||||
at one time or another and got the old "leave your name at
|
||||
the beep" message. With this increase in homes using these
|
||||
machines there is also a new form of hacking developing. One
|
||||
of hacking an answering machine.
|
||||
|
||||
Why would anyone even want to hack an answering machine
|
||||
and for what purpose? There are many reasons and things you
|
||||
can do once you have control of someone elses machine. If for
|
||||
some reason you need to spy on a business or person you can
|
||||
hack their machine and take control using the information for
|
||||
your own personal use. There is also the old "change the
|
||||
message" secret to make it say something to the effect of
|
||||
this line accepts all toll charges so you can bill third
|
||||
party calls to that number. You can also use an answering
|
||||
machine for your own personal use, as in making it your own
|
||||
voice mail type system for people to call. Only do this if
|
||||
you know someone is out of town. If they come home from
|
||||
shopping and find their machine changed it might cause
|
||||
problems. With these basic ideas in mind you can see hacking
|
||||
an answering machine could be very useful to certain
|
||||
individuals.
|
||||
|
||||
How can a person hack an answering machine? Well most
|
||||
answering machines built now have remote access features
|
||||
which allow the owner, or anyone to call in and press a
|
||||
security code to play their messages. This is where the fun
|
||||
begins. Some older models don't have remote access so you
|
||||
cannot do anything to them. Also if you know someone has a
|
||||
machine but you call and it doesn't answer, let the phone
|
||||
ring about 15 times. This will tell the machine to turn
|
||||
itself on, so you can hack it. The actual number varies
|
||||
between machines.
|
||||
|
||||
To practice hacking some machines i will show you how to
|
||||
get remote access on a few models. Just look and see what
|
||||
kind your friend has and hack it for starters.
|
||||
|
||||
Record a Call- Model 2120
|
||||
-------------------------
|
||||
Call in and during the message or after the beep tone to
|
||||
leave a message enter the 3 digit security code. Which you
|
||||
must find yourself. This will rewind the tape and play all
|
||||
new messages. Press 2 to backspace and repeat the last
|
||||
message. Press 3 to fast foward the tape.
|
||||
|
||||
Changing your message from remote. Call your phone and enter
|
||||
the secret code. After several rapid beeps enter your secret
|
||||
code again. After a short delay you will hear a long tone.
|
||||
After the tone ends begin speaking your message which may be
|
||||
17 seconds in length. When finished press the second digit of
|
||||
your secret code to end. The machine will then save your
|
||||
message and play it back. To turn the unit on from remote let
|
||||
it ring 11 times then hangup. Or stay on and it will answer
|
||||
so you can access the machine. For express calls or frequent
|
||||
calls hit the second digit for two seconds to skip the out
|
||||
going message announcement.
|
||||
|
||||
Goldstar- Models 6000/6100
|
||||
--------------------------
|
||||
Call and enter your 1 digit secret code after you hear the
|
||||
out going message announcement. The machine will then play
|
||||
back new messages. Hangup to save messages or after all
|
||||
messages have been played the machine will give a double
|
||||
beeptone, you may enter your code to erase all messages.
|
||||
You cannot change the out going message on this unit.
|
||||
|
||||
Cobra- Model AN-8521
|
||||
--------------------
|
||||
For this machine there are 2 codes. Both are one digit in
|
||||
length. The first one is the play code. The second is to
|
||||
erase messages from remote. After the outgoing message and
|
||||
beeptone press the play code for 2 seconds to play messages.
|
||||
After each message ends there will be a single beep. At the
|
||||
end of all message it will beep twice. You may then do the
|
||||
following. Replay by pressing the play code again. Erase
|
||||
messages by pressing the erase code. Hang-up and save
|
||||
messages and continue to take additional calls. To turn this
|
||||
unit on from remote you must let it ring 16 times before it
|
||||
will activate. If it rings 10 times then you hear 3 beeps it
|
||||
is full and messages need to be erased.
|
||||
|
||||
Uniden- Model AM 464
|
||||
--------------------
|
||||
This model is one of the more advanced when it comes to
|
||||
remote capabilities. The factory preset security code is 747.
|
||||
This can be changed to as many as five digits of your choice.
|
||||
To gain access from remote type your security code while the
|
||||
outgoing message is playing. Press 1 after hearing the tone
|
||||
and the machine will rewind and play your messages. To fast
|
||||
foward press 7, to resume normal playback press 8. To stop
|
||||
the messages from playing press 8 again. Press 8 to restart
|
||||
the messages or 1 to start from the beginning again. Press 9
|
||||
to rewind and 8 to resume playing. If you rewind all the way
|
||||
it will beep twice. You need to press 1 to play messages.To
|
||||
save messages press 4. To erase press 6. To turn the machine
|
||||
off from remote press 5 after all messages have been played
|
||||
and the machine beeps twice. To turn the machine on from
|
||||
remote let the phone ring 12 to 14 times. The machine will
|
||||
beep and then you enter your remote code. This will then turn
|
||||
your machine to answer mode. This machine also has room
|
||||
monitor options. This allows you to listen to what is going
|
||||
on in the room of the machine. To do this call the machine
|
||||
enter your security code after the beep press 0. The monitor
|
||||
stays on for 60 seconds. You will be warned with 2 beeps at
|
||||
45 seconds. To continue press 0 again.To change the outgoing
|
||||
message from remote erase all the messages. Then call back
|
||||
and enter your code after the tone press 3. It will beep
|
||||
again and you may then leave your new message. Press 3 when
|
||||
finished. To change the security code from remote after the
|
||||
beep press # then 1 after the next beep enter your new code
|
||||
followed by the # again. There is also a call break through
|
||||
where you enter 256 while the outgoing message is playing.
|
||||
This will alarm the persons in the house someone is calling
|
||||
with a series of loud beeps. Press the * key to stop.
|
||||
|
||||
Code-a-phone Model 930
|
||||
----------------------
|
||||
To access from remote call and enter your security code after
|
||||
the announcement and tone. Press your code for 3 full
|
||||
seconds. After the new messages have been played you will
|
||||
hear 2 tones. You may then save messages by pressing your
|
||||
code then hanging up. repeat by entering code wait for 4
|
||||
tones then enter code again. To erase message hangup when the
|
||||
tape is done playing. To turn the machine on from remote call
|
||||
and let ring ten times. When the system answers it will have
|
||||
a two second tone. Press your security code. You will hear
|
||||
three double tones to let you know the system is on.
|
||||
|
||||
Unisonic- Model 8720
|
||||
--------------------
|
||||
One digit code entered after the outgoing message and tone
|
||||
will allow you to hear messages. To change message wait till
|
||||
all new messages have been played 2 beep tones will be heard.
|
||||
Press code for four seconds. Two beeps will be heard then the
|
||||
tape will rewind and beep again. Now leave the new message.
|
||||
Press your code when finished to save new outgoing message.
|
||||
New message will play for you to hear.
|
||||
|
||||
Panasonic- Model KX-T2427
|
||||
-------------------------
|
||||
Call and enter the three digit code during the outgoing
|
||||
message. Machine will beep once, then beep amount of times
|
||||
equal to messages. Then rewind and play messages. There will
|
||||
be three beeps after the last message. Six beeps means the
|
||||
tape is full. Press 2 to foward. Press 1 to rewind. Press 3
|
||||
to reset machine and erase messages. To monitor the room
|
||||
press 5 after the beeps indicating the number of messages the
|
||||
machine has. Press 7 to change the outgoing message, it will
|
||||
beep a few quick times rewind then a long beep will be heard.
|
||||
Leave new message press 9 when finished. Press 0 right after
|
||||
the beep tones to shut the machine off. To turn the machine
|
||||
on let it ring 15 times then hangup after machine turns on.
|
||||
|
||||
Panasonic- Model KX-T2385d
|
||||
--------------------------
|
||||
During the outgoing message enter the 1 digit code. This will
|
||||
playback messages. Press the code again to rewind. After the
|
||||
messages have played the machine will beep three times. Press
|
||||
your code again and it will reset the machine. For remote
|
||||
turn on let phone ring 15 times. Then after the outgoing
|
||||
message hangup.
|
||||
|
||||
AT&T- Model 1504
|
||||
----------------
|
||||
Enter 2 digit code before or after announcement. System will
|
||||
beep after each message and five times when messages are
|
||||
done. Press the # key anytime to pause. Hanging up will save
|
||||
messages. Press 7 and it will rewind and play messages again.
|
||||
Press 5 to fast foward. Press 2 to rewind. Press 33 after all
|
||||
messages have been played to reset without saving messages.
|
||||
To record onto the tape press * after the system answers.
|
||||
This will then beep and you may leave a four minute message
|
||||
on the tape. Press # when done. This is not an outgoing
|
||||
message announcement, only a memo. To turn on from remote let
|
||||
ring ten times press 0 when system answers. To turn the
|
||||
system off dial and enter your code. Press 88 and it will
|
||||
shut the machine down.
|
||||
|
||||
Phonemate- Model 4050
|
||||
---------------------
|
||||
Enter your 3 digit code during the outgoing message. Pressing
|
||||
* or # will allow you to scan through the messages. When
|
||||
finished pressing 1 will replay the messages. Pressing 2 will
|
||||
erase them. To turn on from remote let ring for 15 times.
|
||||
Then proceed with remote operations.
|
||||
|
||||
Phonemate- Model 7200
|
||||
---------------------
|
||||
Enter 1 digit code during of after the outgoing message. A
|
||||
voice will tell you how many messages you have, then play
|
||||
them back for you. To rewind press your code and hold it for
|
||||
however long you want to rewind. Let go and it will resume
|
||||
playing. After the last message a voice will prompt you with
|
||||
a list of options. You have five seconds to respond or it
|
||||
will proceed to the next option. These are as follows. The
|
||||
first is hanging up to save messages. Next is enter code to
|
||||
replay messages. Next enter code to erase messages. Last is
|
||||
enter code to change greeting. Follow the voice and it will
|
||||
give you complete directions on exact steps to follow. To
|
||||
turn on from remote let ring ten times then hang up. If tape
|
||||
is full it will say sorry tape is full, enter code and erase
|
||||
messages.
|
||||
|
||||
Spectra Phone- Model ITD300
|
||||
---------------------------
|
||||
Enter your 1 digit code after the greeting. Messages will
|
||||
play back. Hanging up will save them. Or wait for four beeps
|
||||
and press your code to replay them. To erase press your code
|
||||
after 2 beeps. To turn the machine on from remote let it ring
|
||||
10 times.
|
||||
|
||||
Notes: Outgoing message and greeting is what you hear when
|
||||
you first call. Code is your personal security code.
|
||||
|
||||
Hacking answering machines can be very easy. It can also help
|
||||
you obtain valuable information. If you have a targeted
|
||||
machine you can try going to a store and saying you just
|
||||
bought one and it didn't have instructions in the box. They
|
||||
will usually give you a set or make copies for you. This
|
||||
basic guide is just to introduce you to answering machine
|
||||
hacking and changing the outgoing message and listening to
|
||||
messages left by callers. To keep your own machine safe
|
||||
purchase one with a changeable security code of 3 or more
|
||||
digits. Most home machines are of the 1 digit type and are
|
||||
easy to hack. I have no knwoledge of the laws concerning
|
||||
hacking into someones answering machine. I am sure once it
|
||||
becomes more common we will find out. Of course this article
|
||||
is for informational purposes only so you would never have to
|
||||
find out the actual laws.
|
||||
|
||||
Taken from TAP Magazine Issue #100
|
||||
|
||||
|
||||
|
||||
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
|
||||
|
||||
Another file downloaded from: NIRVANAnet(tm)
|
||||
|
||||
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
|
||||
The Salted Slug Strange 408-454-9368
|
||||
Burn This Flag Zardoz 408-363-9766
|
||||
realitycheck Poindexter Fortran 510-527-1662
|
||||
Lies Unlimited Mick Freen 415-583-4102
|
||||
Tomorrow's 0rder of Magnitude Finger_Man 415-961-9315
|
||||
My Dog Bit Jesus Suzanne D'Fault 510-658-8078
|
||||
New Dork Sublime Demented Pimiento 415-566-0126
|
||||
|
||||
Specializing in conversations, obscure information, high explosives,
|
||||
arcane knowledge, political extremism, diverse sexuality,
|
||||
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
|
||||
|
||||
Full access for first-time callers. We don't want to know who you are,
|
||||
where you live, or what your phone number is. We are not Big Brother.
|
||||
|
||||
"Raw Data for Raw Nerves"
|
202
textfiles.com/phreak/VOICEMAIL/hackvmb.txt
Normal file
202
textfiles.com/phreak/VOICEMAIL/hackvmb.txt
Normal file
@@ -0,0 +1,202 @@
|
||||
|
||||
Hacking & Scanning Voice Mail Boxes: The Tutorial
|
||||
|
||||
|
||||
Hello again, and welcome to another Legions of Lucifer text phile! This
|
||||
text file has to do with hacking and scanning VMBs. The reason I am writing
|
||||
this phile is because I am very good at it, and have had years of experience.
|
||||
Infact I have been called by MCI for screwing them over by attacking and
|
||||
taking over a whole damn system with a few friends of mine.
|
||||
|
||||
Anyways, hacking VMBs is very simple and basically safe, and not only that
|
||||
but they are kewl to have around. You can give them to friends, you can
|
||||
trade them for access on bulletin boards, or you can use it for yourself.
|
||||
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
|
||||
to hack, how you go about hacking them, default passwords, hints on better
|
||||
scanning, and having your very own box.
|
||||
|
||||
|
||||
Basics:
|
||||
|
||||
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
|
||||
like an answering machine. You can use it for all sorts of things. Most
|
||||
VMB systems are dialed though 800 numbers. People call up the VMB system
|
||||
that you have a box on, and dial in your box number and then leave you a
|
||||
message. Whenever you want to check your box, you just call up, enter your
|
||||
password and read your messages. Inside a VMB you can do whatever, you can
|
||||
leave messages to others on the system, you can change your 'Out Going'
|
||||
message, you can have guest boxes (Explained later), you can have the box
|
||||
call your house when you get an Urgent message, you can do a lot of things.
|
||||
Infact, on some systems you can even CALL OUT through them, so they can be
|
||||
used as a code of sorts! They are cool to have.
|
||||
|
||||
|
||||
What Type of System You Should Scan/Hack:
|
||||
|
||||
You should scan/hack out Virgin Systems, this is another way of calling a
|
||||
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
|
||||
have the best boxes and the most options that VMB Systems can offer. I will
|
||||
be talking about ASPEN System today since I know most about those.
|
||||
|
||||
|
||||
Scanning Your 'Virgin ASPEN VMB System':
|
||||
|
||||
Okay once you've found your Virgin VMB System, you start to scan. Just incase
|
||||
you don't know what scanning is, that means you search for boxes that are
|
||||
hackable (Explained later on). Now you dial up the system and when it picks
|
||||
up and the bitch starts to talk, press the "#" key. It will then ask you for
|
||||
your box number... now there are two different way the ASPEN System can be
|
||||
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digit Box Number
|
||||
System". Now lets just say this system is a 3 Digit System. Okay, when it
|
||||
asks for your Box Number, enter in 999, now it will say one of three things:
|
||||
[These are known as 'Greeting Names']
|
||||
1. John Doe [Box owners name]
|
||||
2. "Box Number 999 Is Not a Valid Box Number"
|
||||
3. "Box Number 999"
|
||||
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
|
||||
but if it says 3, then you are lucky, now it will ask you for your password,
|
||||
now you are probably saying 'Shit this is where it gets difficult'... well
|
||||
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
|
||||
|
||||
* We will use box number 666 as an example box #
|
||||
[ BN = Box Number ]
|
||||
|
||||
List of Default Password: Combination Result
|
||||
|
||||
1-BN 1666
|
||||
BN+1 667
|
||||
0-BN 0666
|
||||
BN-0 6660
|
||||
Most Common BN 666
|
||||
|
||||
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
|
||||
use that most. Now, if you try all those Defaults and still can not get into
|
||||
that Voice Mail Box, then that means that the box has been already taken, but
|
||||
the owner hasn't changed his 'Generic Message', if you don't get in, you
|
||||
will just have to search until you get in.
|
||||
|
||||
|
||||
Once You Get Into a Box:
|
||||
|
||||
Okay, once you get your first box, *DO NOT* change anything!! That will come
|
||||
later. Your first box is, as what is known as a 'Scanning Box'! What you do
|
||||
with your Scanning Box is this: You enter "3" from the main commands menu,
|
||||
and it will ask you for the box number. Now that command is the "Check for
|
||||
Reciept" command, what it does it check Box #xxx for mail from you. This
|
||||
command is very convienient for us VMB Hackers. To use that command to your
|
||||
advantage, you enter in box a box number and it will say 1 of the three
|
||||
'Greeting Names', like before, if it say #3, then you write down that Box
|
||||
Number and hack it later. But if it says 1 or 2, then just keep scanning!
|
||||
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
|
||||
Now you keep scanning until you have gone all the way down to Box number 000
|
||||
or whatever is the lowest box it supports. Now, once you have your list this
|
||||
is when all the fun starts! Now you are ready to hack!
|
||||
|
||||
|
||||
Hacking Out Your New Found 'Hackable' Boxes:
|
||||
|
||||
Okay this is the easy part. After you spent most of your time by scanning
|
||||
the system you should be used to the system and how it works, that should
|
||||
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
|
||||
should know what the default password was for your Scanning Box. Well if the
|
||||
password for your Scanning Box was just the Box Number, then *EVERY* other
|
||||
hackable box should have the SAME default password. VMB Systems have only
|
||||
one default password, If one box has the BN for a Default PW, the all the
|
||||
others will too.
|
||||
|
||||
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
|
||||
side, and when the bitch is talking, press the "#" key. When it asks you for
|
||||
your box number, enter in the first box number on your list. When it asks for
|
||||
your password, enter in the Default Password Sequence. Now if you don't get
|
||||
into that box, it's not a problem, just keep going down your list. You should
|
||||
get into a few. But remember, just because a box is marked 'Hackable', it
|
||||
doesn't mean you will definatly get into it.
|
||||
|
||||
Okay, now you have a few dozen boxes. You can now use you Scanning Box to do
|
||||
whatever you please.
|
||||
|
||||
|
||||
ASPEN Guest Boxes:
|
||||
|
||||
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
|
||||
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
|
||||
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
|
||||
for him, and leave you messages, but not only that, you can leave messages
|
||||
to HIM! Which means, if his is in New York, and you are in California, and
|
||||
neither of you have codes to call eachother, then you can leave messages thru
|
||||
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
|
||||
|
||||
0. Main Box - Your Voice Mail Box!
|
||||
1. Guest Box #1 - Can Leave & Recieve Messagez
|
||||
2. Guest Box #2 - Can Leave & Recieve Messagez
|
||||
3. Home Box - Can Leave & Recieve Messagez
|
||||
4. Secretary Box - Can Check How Many Messagez You
|
||||
Have & Receive Messagez
|
||||
|
||||
|
||||
Hints On Better Scanning:
|
||||
|
||||
A lot of people say hacking and scanning for VMBs is too damn hard... well
|
||||
that's because they are going at it all wrong, they probably read some lame
|
||||
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
|
||||
here is a small list of hints on better scanning and hacking:
|
||||
|
||||
1. Do not use a Voice Mail Box hacking/scanning program
|
||||
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
|
||||
2. Do not hack in random order (ei: B#999, 345, 810, etc)
|
||||
Always hack in order: 999, 998, 997, 996, 995...000.
|
||||
3. Try to find out if it's virgin. The newer the System,
|
||||
the better.
|
||||
4. If you have a phone with memory dial, change one entry
|
||||
to the number of the VMB System.
|
||||
5. Don't hack the System Managers box unless you really
|
||||
want to.
|
||||
|
||||
|
||||
Ideas of Things To Do With Your Extra Boxez:
|
||||
|
||||
Well since you can have up to 500 extra Voice Mail Boxes, you might
|
||||
not know what to do with them, here are a few ideas that can help you out:
|
||||
|
||||
1. Give them to friends
|
||||
2. Sell them to friends
|
||||
3. Offer them to sysops for
|
||||
for better access
|
||||
4. Trade them for HSTs or
|
||||
whatever
|
||||
5. Use them as a Voice Verifing line (So you don't have to give out
|
||||
your real voice number to BBSes when you apply!)
|
||||
|
||||
|
||||
Well, that's it to the Legions of Lucifer Hacking & Scanning Voice Mail Box
|
||||
Systems Tutorial! I hope it helped you and I, along with L.o.L wish you the
|
||||
best of luck with your new found hobby! And remeber if you found this text
|
||||
of any help, please spread it around to help others! Also, if you think you
|
||||
are any good at writing H/P, please apply to be a Member! Call the L.o.L Home
|
||||
at:
|
||||
|
||||
Digital Hackers Network
|
||||
Legions of Lucifer HeadQuarters/Home
|
||||
No Warez! A truely serious Hack/Phreak board
|
||||
Hack, Phreak, Scanning, Phraud, Crashing disscusions
|
||||
Viral Research & Development Sections (500+ Virii!)
|
||||
"Personalized ANSi Bombs" made by request
|
||||
Running AfterShock v1.20 - 2400 Baud
|
||||
PH: 213-274-1333
|
||||
|
||||
Call these Legions of Lucifer support boards for information or application
|
||||
inquiries:
|
||||
|
||||
Digital Hackers Network 213/274+1333 L.o.L HeadQuaters/Home
|
||||
Electric Eye ][ 313/776+8928 L.o.L Distribution Site #1
|
||||
Digital Information Exchange 612/356+2209 L.o.L Distribution Site #2
|
||||
Legions of Lucifer High Office Members:
|
||||
|
||||
Prezident/Founder: Wave Runner!
|
||||
Vice Prezident : Count_Zer0
|
||||
|
||||
This text file is (C)Copyrite 1990 L.o.L Inc.
|
||||
L.o.L is a registered trademark of DHN, All rights reserved
|
||||
Any modifications to this text file is a violation of copyrite.
|
||||
Digital Hackers Network 213/274+1333 -=L.o.L Home=-
|
||||
|
210
textfiles.com/phreak/VOICEMAIL/lol12.txt
Normal file
210
textfiles.com/phreak/VOICEMAIL/lol12.txt
Normal file
@@ -0,0 +1,210 @@
|
||||
The THC Hack/Phreak Archives: LOL12.TXT (205 lines)
|
||||
Note: I did not write any of these textfiles. They are being posted from
|
||||
the archive as a public service only - any copyrights belong to the
|
||||
authors. See the footer for important information.
|
||||
==========================================================================
|
||||
|
||||
Hacking & Scanning Voice Mail Boxes: The Tutorial
|
||||
|
||||
Hello again, and welcome to another <20>egions <20>f <20>ucifer text phile! This
|
||||
text file has to do with hacking and scanning VMBs. The reason I am writing
|
||||
this phile is because I am very good at it, and have had years of experience.
|
||||
Infact I have been called by MCI for screwing them over by attacking and
|
||||
taking over a whole damn system with a few friends of mine.
|
||||
|
||||
Anyways, hacking VMBs is very simple and basically safe, and not only that
|
||||
but they are kewl to have around. You can give them to friends, you can
|
||||
trade them for access on bulletin boards, or you can use it for yourself.
|
||||
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
|
||||
to hack, how you go about hacking them, default passwords, hints on better
|
||||
scanning, and having your very own box.
|
||||
|
||||
|
||||
Basics:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
|
||||
like an answering machine. You can use it for all sorts of things. Most
|
||||
VMB systems are dialed though 800 numbers. People call up the VMB system
|
||||
that you have a box on, and dial in your box number and then leave you a
|
||||
message. Whenever you want to check your box, you just call up, enter your
|
||||
password and read your messages. Inside a VMB you can do whatever, you can
|
||||
leave messages to others on the system, you can change your 'Out Going'
|
||||
message, you can have guest boxes (Explained later), you can have the box
|
||||
call your house when you get an Urgent message, you can do a lot of things.
|
||||
Infact, on some systems you can even CALL OUT through them, so they can be
|
||||
used as a code of sorts! They are cool to have.
|
||||
|
||||
|
||||
What Type of System You Should Scan/Hack:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
You should scan/hack out Virgin Systems, this is another way of calling a
|
||||
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
|
||||
have the best boxes and the most options that VMB Systems can offer. I will
|
||||
be talking about ASPEN System today since I know most about those.
|
||||
|
||||
|
||||
Scanning Your 'Virgin ASPEN VMB System':
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Okay once you've found your Virgin VMB System, you start to scan. Just incase
|
||||
you don't know what scanning is, that means you search for boxes that are
|
||||
hackable (Explained later on). Now you dial up the system and when it picks
|
||||
up and the bitch starts to talk, press the "#" key. It will then ask you for
|
||||
your box number... now there are two different way the ASPEN System can be
|
||||
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
|
||||
System". Now lets just say this system is a 3 Digit System. Okay, when it
|
||||
asks for your Box Number, enter in 999, now it will say one of three things:
|
||||
[These are known as 'Greeting Names']
|
||||
1. John Doe [Box owners name]
|
||||
2. "Box Number 999 Is Not a Valid Box Number"
|
||||
3. "Box Number 999"
|
||||
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
|
||||
but if it says 3, then you are lucky, now it will ask you for your password,
|
||||
now you are probably saying 'Shit this is where it gets difficult'... well
|
||||
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
|
||||
|
||||
* We will use box number 666 as an example box #
|
||||
[ BN = Box Number ]
|
||||
|
||||
List of Default Password: Combination Result
|
||||
|
||||
1-BN 1666
|
||||
BN+1 667
|
||||
0-BN 0666
|
||||
BN-0 6660
|
||||
Most Common <20>į BN 666
|
||||
|
||||
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
|
||||
use that most. Now, if you try all those Defaults and still can not get into
|
||||
that Voice Mail Box, then that means that the box has been already taken, but
|
||||
the owner hasn't changed his 'Generic Message', if you don't get in, you
|
||||
will just have to search until you get in.
|
||||
|
||||
|
||||
Once You Get Into a Box:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Okay, once you get your first box, *DO NOT* change anything!! That will come
|
||||
later. Your first box is, as what is known as a 'Scanning Box'! What you do
|
||||
with your Scanning Box is this: You enter "3" from the main commands menu,
|
||||
and it will ask you for the box number. Now that command is the "Check for
|
||||
Reciept" command, what it does it check Box #xxx for mail from you. This
|
||||
command is very convienient for us VMB Hackers. To use that command to your
|
||||
advantage, you enter in box a box number and it will say 1 of the three
|
||||
'Greeting Names', like before, if it say #3, then you write down that Box
|
||||
Number and hack it later. But if it says 1 or 2, then just keep scanning!
|
||||
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
|
||||
Now you keep scanning until you have gone all the way down to Box number 000
|
||||
or whatever is the lowest box it supports. Now, once you have your list this
|
||||
is when all the fun starts! Now you are ready to hack!
|
||||
|
||||
|
||||
Hacking Out Your New Found 'Hackable' Boxes:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Okay this is the easy part. After you spent most of your time by scanning
|
||||
the system you should be used to the system and how it works, that should
|
||||
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
|
||||
should know what the default password was for your Scanning Box. Well if the
|
||||
password for your Scanning Box was just the Box Number, then *EVERY* other
|
||||
hackable box should have the SAME default password. VMB Systems have only
|
||||
one default password, If one box has the BN for a Default PW, the all the
|
||||
others will too.
|
||||
|
||||
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
|
||||
side, and when the bitch is talking, press the "#" key. When it asks you for
|
||||
your box number, enter in the first box number on your list. When it asks for
|
||||
your password, enter in the Default Password Sequence. Now if you don't get
|
||||
into that box, it's not a problem, just keep going down your list. You should
|
||||
get into a few. But remember, just because a box is marked 'Hackable', it
|
||||
doesn't mean you will definatly get into it.
|
||||
|
||||
Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
|
||||
whatever you please.
|
||||
|
||||
|
||||
ASPEN Guest Boxes:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
|
||||
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
|
||||
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
|
||||
for him, and leave you messages, but not only that, you can leave messages
|
||||
to HIM! Which means, if his is in New York, and you are in California, and
|
||||
neither of you have codes to call eachother, then you can leave messages thru
|
||||
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
|
||||
|
||||
0. Main Box - Your Voice Mail Box!
|
||||
1. Guest Box #1 - Can Leave & Recieve Messagez
|
||||
2. Guest Box #2 - Can Leave & Recieve Messagez
|
||||
3. Home Box - Can Leave & Recieve Messagez
|
||||
4. Secretary Box - Can Check How Many Messagez You
|
||||
Have & Recieve Messagez
|
||||
|
||||
|
||||
Hints On Better Scanning:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
A lot of people say hacking and scanning for VMBs is too damn hard... well
|
||||
that's because they are going at it all wrong, they probably read some lame
|
||||
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
|
||||
here is a small list of hints on better scanning and hacking:
|
||||
|
||||
1. Do not use a Voice Mail Box hacking/scanning program
|
||||
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
|
||||
2. Do not hack in random order (ei: B#999, 345, 810, etc)
|
||||
Always hack in order: 999, 998, 997, 996, 995...000.
|
||||
3. Try to find out if it's virgin. The newer the System,
|
||||
the better.
|
||||
4. If you have a phone with memory dial, change one entry
|
||||
to the number of the VMB System.
|
||||
5. Don't hack the System Managers box unless you really
|
||||
want to.
|
||||
|
||||
|
||||
Ideas of Things To Do With Your Extra Boxez:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Well since you can have up to 500 extra Voice Mail Boxes, you might
|
||||
not know what to do with them, here are a few ideas that can help you out:
|
||||
|
||||
1. Give them to friends
|
||||
2. Sell them to friends
|
||||
3. Offer them to sysops for
|
||||
for better access
|
||||
4. Trade them for HSTs or
|
||||
whatever
|
||||
5. Use them as a Voice Verifing line (So you don't have to give out
|
||||
your real voice number to BBSes when you apply!)
|
||||
|
||||
|
||||
Well, that's it to the <20>egions <20>f <20>ucifer Hacking & Scanning Voice Mail Box
|
||||
Systems Tutorial! I hope it helped you and I, along with <20>.<2E>.<2E> wish you the
|
||||
best of luck with your new found hobby! And remeber if you found this text
|
||||
of any help, please spread it around to help others! Also, if you think you
|
||||
are any good at writing H/P, please apply to be a Member! Call the <20>.<2E>.<2E> Home
|
||||
at:
|
||||
|
||||
Digital Hackers Network
|
||||
<20>egions <20>f <20>ucifer HeadQuarters/Home
|
||||
No Warez! A truely serious Hack/Phreak board
|
||||
Hack, Phreak, Scanning, Phraud, Crashing disscusions
|
||||
Viral Research & Development Sections (500+ Virii!)
|
||||
Running AfterShock v1.20 - 2400 Baud
|
||||
PH: 213-274-1333
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
Call these <20>egions <20>f <20>ucifer support boards for information or application
|
||||
inquiries:
|
||||
|
||||
Digital Hackers Network 213/274+1333 <20>.<2E>.<2E> HeadQuaters/Home
|
||||
Electric Eye ][ 313/776+8928 <20>.<2E>.<2E> Distribution Site #1
|
||||
Digital Information Exchange 612/356+2209 <20>.<2E>.<2E> Distribution Site #2
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
This text file is (C)Copyrite 1990 <20>.<2E>.<2E> Inc.
|
||||
<20>.<2E>.<2E> is a registered trademark of DHN, All rights reserved
|
||||
Any modifications to this text file is a violation of copyrite.
|
||||
Digital Hackers Network 213/274+1333 -=<3D>.<2E>.<2E> Home=-
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
330
textfiles.com/phreak/VOICEMAIL/phonhack.txt
Normal file
330
textfiles.com/phreak/VOICEMAIL/phonhack.txt
Normal file
@@ -0,0 +1,330 @@
|
||||
Hacking Telephone Answering Machines
|
||||
|
||||
by Doctor Pizz and Cybersperm
|
||||
|
||||
******************************************************************************
|
||||
DISCLAIMER: The following is for informational purposes only. All information
|
||||
provided is simply to point out how easy it is to access such a system. The
|
||||
author accepts no responsibility for irresponsible use of this knowledge, and
|
||||
it is provided solely so people can be aware of the low security of such
|
||||
systems. (Now that I'm off the hook in case you do something stupid...).
|
||||
******************************************************************************
|
||||
|
||||
|
||||
It seems that lately there is very little discussion of one of the most
|
||||
simple but useful and rewarding forms of electronic information gathering,
|
||||
hacking the telephone answering machine. Almost everyone has one of these
|
||||
wonderful devices these days, to catch important messages while they are away
|
||||
from their phones, or to screen important telephone calls. Nowadays, they
|
||||
typically have the added advantage of being accessible from remote telephones,
|
||||
so one needs to simply call his or her answering machine, enter their secret
|
||||
code, and then either retrieve new messages, or listen to anything they had
|
||||
previously recorded on the incoming messages tape, or perform any of a set of
|
||||
additional functions determined by which key they press on their touch tone
|
||||
phone. They also typically ignore the fact that virtually anyone else can
|
||||
gain access to their messages by entering the appropriate code. Hence this is
|
||||
a wonderful system to gather information from anyone without their knowledge,
|
||||
especially if they are technologically illiterate.
|
||||
|
||||
For the most part, there are two main types of "electronic password"
|
||||
used by these systems. They are amazingly simple to crack, as they are
|
||||
typically only 2-digit or even 1-digit numbers!!!!!! On some machines, the
|
||||
code must be entered before the outgoing message is over, on others, it must
|
||||
be entered after the outgoing message, and on more sophisticated models, it
|
||||
can be entered at any time.
|
||||
|
||||
|
||||
MODERN 2-DIGIT PASSCODE SYSTEMS:
|
||||
|
||||
These are the most common systems in use today, typically made by
|
||||
Panasonic, AT&T, etc. In these systems, the code can be entered before during
|
||||
or after
|
||||
the beep tone. For security reasons, we recommend BEFORE the beep tone, so
|
||||
your intrusions are unnoticed... We will begin by discussing how to identify
|
||||
the passcode.
|
||||
|
||||
|
||||
Now, the question of how to hack their code. Well, this is so simple,
|
||||
you don't even need a computer to do it. You can just enter all 2-digit
|
||||
combinations until you get the right one (usually signalled by a series of
|
||||
beeps on the other end). A relatively crude way was to enter each number in
|
||||
sequence 01, 02, 03, 04,...,99. This works, but may take too long to enter
|
||||
all numbers within the 20-30 second window we typically have before the beep
|
||||
(The best time to play arounnd, as any tones entered after the beep will be
|
||||
recorded on his incoming messages tape, and could let him know something is
|
||||
up...). It is also important to stop as soon as you hit the right number, as
|
||||
the additional entered numbers may be interpreted by the answering machine as
|
||||
codes, and cause you to delete all their messages, or record a new greeting,
|
||||
etc. That is really asking for trouble, and may cause them to try and change
|
||||
their password (though it's usually only possible to choose from a range of
|
||||
three consecutive numbers anyway...). Still, you need to be careful not to
|
||||
let them catch on, eh?
|
||||
|
||||
A more sophisticated and fast way to do this is to take advantage of the
|
||||
fact that such machines typically do not read two numbers at a time, and
|
||||
discard them, but just look for the correct sequence, reading one at a time.
|
||||
In other words, you can enter all 100 possible codes with roughly 1/2 the
|
||||
number of keystrokes. Just enter as follows:
|
||||
|
||||
0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9,etc.
|
||||
|
||||
By reading in one phase we get:
|
||||
|
||||
0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1,1 2,1 3,1 4,1 5,1 6,1 7,1 8,1 9,etc.
|
||||
|
||||
In the other phase we get:
|
||||
|
||||
0 1,0 2,0 3,0 4,0 5,0 6,0 7,0 8,0 9,1 1,2 1,3 1,4 1,5 1,6 1,7 1,8 1,etc.
|
||||
|
||||
So by proceeding as follows we enter the following matrix sequentially,
|
||||
encompassing all possible 2 digit numbers:
|
||||
|
||||
|
||||
0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9
|
||||
1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9
|
||||
2 2 3 2 4 2 5 2 6 2 7 2 8 2 9
|
||||
3 3 4 3 5 3 6 3 7 3 8 3 9
|
||||
4 4 5 4 6 4 7 4 8 4 9
|
||||
5 5 6 5 7 5 8 5 9
|
||||
6 6 7 6 8 6 9
|
||||
7 7 8 7 9
|
||||
8 8 9
|
||||
9 0
|
||||
|
||||
The last zero is important, as it completes the cycle, and allows for the code
|
||||
9 0, which is the only one not as yet allowed for. I must emphasize the
|
||||
importance of quitting as soon as you get the correct code, and also do not
|
||||
keep going after the beep, if you are on a modern 2-digit access code system.
|
||||
This way, you can record the passcode for your future reference, and prevent
|
||||
detection.
|
||||
|
||||
Now, we shall get on to the question of how to use their system, once
|
||||
you've broken in. In general, it is recommended to obtain a copy of the
|
||||
owners' manual for various machines, but I have summarized some of the basics
|
||||
below.
|
||||
|
||||
PANASONIC
|
||||
|
||||
Here are the codes for a Panasonic Easa-phone KX-T1450. The KX-T2420 is
|
||||
identical without Room Monitor function In this case, strange things happen
|
||||
when you enter 5:
|
||||
|
||||
1 = Back Space (Rewind the OGM tape)
|
||||
2 = Skip Forward (Fast forward the OGM tape)
|
||||
3 = Reset (Go back to the beginning of the OGM tape. MAY CAUSE ERASURE!!!)
|
||||
4 = Memory Playback (Listen to new messages)
|
||||
5 = Room Monitor (!!!! Listen to what is going on in the room NOW !!!!)
|
||||
(This is only available on some models... But, try it...)
|
||||
7 = OGM-REC (Record a new greeting!!!)
|
||||
9 = OGM-STOP (Stop recording the new greeting)
|
||||
* = OGM Skip (Don't Listen to the OGM)
|
||||
0 = Turn off the machine !!!!!
|
||||
|
||||
To set to the answer mode remotely,
|
||||
1. Dial the phone number
|
||||
2. Wait 15 rings and hang up
|
||||
|
||||
To turn off the unit remotely (!!),
|
||||
1. Dial the phone number
|
||||
2. Push the code number, wait for the beep, enter 0, and hang up. Panasonic answering machines also respond to the user with a series of
|
||||
codes which I will now outline. If you hear something different, you may not
|
||||
be on a Panasonic system.
|
||||
|
||||
1 long beep : This is the "beep" after which people can leave their messages.
|
||||
|
||||
Also, this is sounded when the correct passcode is entered from
|
||||
|
||||
a remote telephone. (Same sound- Hint for software developpers)
|
||||
It sounds when the tape has fully rewound, and after each
|
||||
|
||||
message is played back in entirety.
|
||||
3 short bps : This sounds after the last message has been played back.
|
||||
|
||||
2 short bps : (10 seconds later) You are then being recorded - marker message
|
||||
|
||||
6 short bps : End of the incoming message tpe
|
||||
|
||||
6 short bps : (Quickly) Tape Broken (either incoming or outgoing)
|
||||
|
||||
Also, after entering the correct code, and after the one long beep, you will
|
||||
hear n additional short beeps, where n is the number of new messages since the
|
||||
last time the messages were retrieved. Remember, you can listen to earlier
|
||||
ones on the same tape, by additionally backspacing from the first new message.
|
||||
|
||||
Anyway, that is a basic summary of the Panasonic answering machine system for
|
||||
this machine. Many machines unfortunately do not have the Room monitor
|
||||
function, so you can not see if you left your TV on, or anything like that...
|
||||
Also, not all systems are identical, but on Panasonic machines, the numbers 1-
|
||||
4 are the same, so this is the most important thing for you to remember
|
||||
anyway...
|
||||
|
||||
|
||||
|
||||
AT&T
|
||||
|
||||
On AT&T machines, like the Answering System 1304, the passcode is again a 2-
|
||||
digit number enterable before, during, or after the beep. Follow the same
|
||||
guidelines as above.
|
||||
|
||||
After you enter the correct code on these machines, the system will
|
||||
automatically begin to play back new messages. This is one key way to
|
||||
distinguish these machines from the Panasonic ones discussed above.
|
||||
|
||||
To summarize the key functions for the AT&T system, look below:
|
||||
|
||||
2 Rewind tape (tape rewinds for as long as this key is depressed)
|
||||
3 3 Clear messages (reset the tape to the beginning.)
|
||||
5 Fast Forward (tape ffwds for as long as this key is depressed)
|
||||
7 Replay messages from the beginning
|
||||
8 8 Turn off the answering machine
|
||||
* Record a memo (After listening to messages) OR
|
||||
Skip the greeting (w/o entering code)
|
||||
0 Turn on the machine (after hearing two beeps)
|
||||
# Pause (for 5-7 seconds)
|
||||
|
||||
Basically this system is less sophisticated than the Panasonic. You cannot
|
||||
change the OGM remotely (Damn!). As seen above, the codes are also quite
|
||||
different, but fortunately they are easily distinguished by how they answer
|
||||
after the security code is entered. The AT&T plays the messages, while the
|
||||
Panasonic just beeps to tell you how many new messages are waiting. Here
|
||||
also, the rewind and fast forward functions operate for the length of time you
|
||||
depress the 2 and 5 keys respectively. On the Panasonic, they reewind or fast
|
||||
forward for 15 seconds. Also, this system has a pause feature. By entering
|
||||
the # sign, you can pause for a few seconds while listening to a message. One
|
||||
extra safety (from your perspective...) feature is that on this system you
|
||||
cannot erase messages until they have all played back, so you have less risk
|
||||
of fucking up someone's system if it is an AT&T. You cannot change his
|
||||
greeting, and it is difficult to accidentally erase his messages. If you wish
|
||||
to do so, however, you must hit the 3 key twice after listening to the
|
||||
messages in their entirety. To record a memo (why would you want to do
|
||||
this???), you can press the * key after you hear 5 beeps (after listening to
|
||||
the messages). Then begin to record. Also, the * key can be used before the
|
||||
message is finished to skip listening to the OGM (useful for long distance
|
||||
callers who are actually paying for the calls...) without the need for
|
||||
entering a security code. To turn on the system from remote points, you need
|
||||
to let it ring ten times, and after it answers with 2 "beeps", hit the 0 key.
|
||||
It will subsequently be on. Similarly to turn it off, just enter 88. If the
|
||||
machine answers the phone with no greeting, and just 2 beeps, it means the
|
||||
tape is full. You can now enter the security code (without risk of them
|
||||
recording the BEEPS!!!) and listen away for a long time!!! Basically, this
|
||||
sums up the properties of the two most common systems I've encountered of the
|
||||
2-digit passcode variety.SINGLE DIGIT PASSCODE MACHINES:
|
||||
|
||||
On some old model Panasonic and Phone Mate systems, the secret entry
|
||||
passcode is only a one digit number(!!!). On these primitive systems, one
|
||||
merely enters the correct number, during the message, and playback begins.
|
||||
The other codes are simple to derive, and just for the sake of making this
|
||||
hobby a sport, I will not give details for these systems. It is easy enough
|
||||
to figure them out, and on these systems, it is hard to screw things up, as
|
||||
there is little you can do anyway.
|
||||
|
||||
APPLICATIONS:
|
||||
|
||||
This can be a rewarding adventure if you decide to follow those
|
||||
instructions (though far be it from me to suggest you to do this...). I will
|
||||
point out some of the potentially entertaining, useful, and/or informative
|
||||
applications of this technology.
|
||||
|
||||
As the true weirdos that we are, we shall begin with what we consider
|
||||
the truly entertaining applications... If you have ever read the Village
|
||||
Voice, Screw or other such newspaper, you will notice a large number of
|
||||
advertisements for "unlicensed massage parlors", "Oriental relaxation spas",
|
||||
"Escort services", etc. Call some of those numbers, preferrably at off-duty
|
||||
hours (6-9 AM??) and try to hack their answering machine codes, listen to
|
||||
their messages, and let the fun begin. You can hear lots of perverts, and
|
||||
lowlifes making appointments for "services" about which they are sometimes
|
||||
graphic. Also, they often leave telephone and credit card numbers (What
|
||||
fun!!!). In case they are married, think of the blackmail potential...
|
||||
|
||||
Further, these "adult entertainment companies" also often run help
|
||||
wanted ads in the Village Voice, and other such publications. Call these, and
|
||||
you will get a plethora of phone numbers for nubile young women who might
|
||||
believe you are the proprietor of the establishment in question. You might be
|
||||
able to con some "free samples" as a sort of "job interview"... (hehehe)
|
||||
Especially given the illegal activity they desire to become involved in, they
|
||||
will be in no position to complain when they find out you are not for real...
|
||||
Also, this way, the girls are often not so jaded as the old pros... They will
|
||||
be trying to impress you if you get my drift, so you'll "hire" them.
|
||||
|
||||
Other similar companies can be hacked to get similar entertaining and
|
||||
enjoyable results. In many cases, the outcomes can be QUITE LUCRATIVE in one
|
||||
way or another... I do not advocate that you do these things, but I just want
|
||||
to point out what COULD be done...
|
||||
|
||||
Let us move on to the informative espionnage type of application of this
|
||||
technology. One could very easily use this technology to listen to the
|
||||
messages of friends, and see what they are up to. If you are trying to call
|
||||
your buddy Evan, and he isn't home, perhaps you can find out where he is by
|
||||
going through some of his old answering messages. Say, Eric called him a
|
||||
couple of hours ago and suggested that Evan come over to his place for some
|
||||
beers. Well, you could then call Eric and voila, you may connect with Evan.
|
||||
|
||||
Now, let us assume you have a girlfriend, and you suspect she might be
|
||||
cheating on you, yet you do not wish to confront her about it without any
|
||||
evidence, or certainty of her cheating. Well, her new beau probably thinks
|
||||
her answering machine is secure, and calls leaving messages about their
|
||||
upcoming dates, or various discussions of their relationship. If you can hack
|
||||
her machine {actually, you might even look at the bottom (where the passcode
|
||||
is usually printed...) to save time and energy.} you will be afforded with a
|
||||
plethora of potentially incriminating evidence. Hehehe.
|
||||
|
||||
A similar application can be when you have a new love interest. Suppose
|
||||
there is some woman you are interested in, but you aren't sure if she is
|
||||
available. A little phone answering machine surveillance can provide all of
|
||||
the answers, and then some... In case she asks her friends about you, you'll
|
||||
know everything she does. Also, you will learn details about her life, and
|
||||
schedule, the better to run into her "accidentally", or strike up a
|
||||
conversation about "common" interests...
|
||||
|
||||
Now, if you know someone in the same profession, say musicians, and you
|
||||
call his answering machine, and hear someone offering him a gig. You could
|
||||
call that person back, and accept the gig in your name, saying the originally
|
||||
called musician was unavailable, but suggested that you call. Then be sure to
|
||||
erase the original message on your buddy's machine. He'll never be the wiser,
|
||||
and you'll get more work. Though he may wonder why he isn't getting much work
|
||||
anymore...
|
||||
|
||||
Millions of applications exist, and if you have any additional
|
||||
suggestions, please leave them with us. We can be reached on several BBS'es,
|
||||
in 212, 718, and 914 area codes. Thanks. Also, if you have information on
|
||||
other answering machine systems, please pass it along...
|
||||
|
||||
Again, in closing, we reiterate that the authors take no responsibility
|
||||
for the misuse of this information. The ideas for applications were presented
|
||||
for informational and entertainment purposes only, and we do not encourage you
|
||||
to try any of the above suggestions. Remember, listening to the pass-code
|
||||
protected messages of others constitutes an invasion of privacy, and may be in
|
||||
violation of state and federal laws.
|
||||
|
||||
******************************************************************************
|
||||
|
||||
ANOTHER FINE PIZZ-SPERM T-FILE...
|
||||
|
||||
Please upload this file to other fine BBS'es, and give credit to the original
|
||||
authors, Doctor Pizz and Cybersperm, of the TUBA crew.
|
||||
|
||||
******************************************************************************
|
||||
|
||||
|
||||
***************************************************************
|
||||
* *
|
||||
* Another Fine File From the libraries of the TUBA crew. *
|
||||
* *
|
||||
***************************************************************
|
||||
|
||||
____ _______ *
|
||||
/ \ ___ ___ ____ ___ ___ / / ___ ___
|
||||
/ // // / / // / /______/ / / /
|
||||
/ // // / / //-< / / / /
|
||||
/_____//__//__ / /__// / / / /__ /__
|
||||
|
||||
-N-
|
||||
|
||||
CCCC Y Y BBB EEEE RRR SSSS PPP EEEE RRR M M
|
||||
C Y Y B B E R R S P P E R R MM MM
|
||||
C Y BBB EEE RRR SSSS PPP EEE RRR M M M
|
||||
C Y B B E R R S P E R R M M M
|
||||
CCCC Y BBB EEEE R R SSSS P EEEE R R M M M
|
||||
|
||||
|
||||
|
103
textfiles.com/phreak/VOICEMAIL/phreak8
Normal file
103
textfiles.com/phreak/VOICEMAIL/phreak8
Normal file
@@ -0,0 +1,103 @@
|
||||
3RD PARTY FRAUD & VOICE MAIL SYSTEMS
|
||||
============================================================================
|
||||
|
||||
3rd Party Dialing was first brought to my attention when it was listed
|
||||
on my telephone bill. I was billed by some person(s) without my authorization.
|
||||
This happened about 3 times on the same bill, and all of the times I got the
|
||||
charges dropped.
|
||||
|
||||
A few weeks later, after paging through the telephone book for downtown
|
||||
prefixes, I noticed information on 3rd Party Calling, which included:
|
||||
|
||||
HOW TO PLACE 0+ CALLS
|
||||
|
||||
Third-Number Calls
|
||||
|
||||
1. Dial "0" + Area Code (if needed) + telephone number.
|
||||
|
||||
2. If you hear a tone, ignore it, and a billing operator will come
|
||||
on the line.
|
||||
|
||||
3. Tell the operator you are placing a third number billed called.
|
||||
|
||||
4. Give the Area Code and telephone number you with the charges billed to.
|
||||
|
||||
5. The operator will call that number to verify acceptance of the charges
|
||||
on calls from coin pay phones. No verification on calls from
|
||||
non-coin pay phones.
|
||||
|
||||
The line that caught my eye was like #5. This line pointed out that calls
|
||||
from pay phones had to be verified, while non pay phones needed no
|
||||
verification.
|
||||
|
||||
With experience, I found out that sometimes there is nothing a person can do
|
||||
about unauthorized 3rd Party Calls billed to a another person's number. A lot
|
||||
of the times, the operator you call to complain to will simply tell you there's
|
||||
nothing they can do.
|
||||
|
||||
With this in mind, I realized that you could bill a call to anybody's number
|
||||
and get away with it, and no charges directed to you. Although, as many of you
|
||||
know by now...this not safe. For one, you are directing attention to yourself
|
||||
as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
|
||||
Party Call to...that person has your number and where you called. Bell can
|
||||
also use that information to take action if they feel it necessary.
|
||||
|
||||
One alternative would be to complete a 3rd Party Billed Call from a pay
|
||||
phone. This however brings up a question. Who is going to accept the charges
|
||||
if you don't want to pay for it in any way?
|
||||
|
||||
Here is what I came up with for 3rd Party Calling Fraud:
|
||||
|
||||
First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
|
||||
PhoneMail type VMS to handle the call. The reason you need these types of
|
||||
VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
|
||||
have to enter a process extension number such as 8509. These types of VMS's
|
||||
bring you directly to the box.
|
||||
|
||||
You don't know what Voice Mail Systems are? Look for a file. But, here's a
|
||||
layman's description of VMS's. You can say that VMS's are distance answering
|
||||
services. They are usually set up in other prefixes you can dial in/directly
|
||||
on to. They include instructions on how to use them, and have system
|
||||
passwords. In respect, they are electronic mail devices...only they use voice
|
||||
communications instead. You can find these by scanning, if you have one local.
|
||||
|
||||
Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
|
||||
Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
|
||||
In between the HELLO and YEAH SURE, the billing operator will say something
|
||||
like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
|
||||
|
||||
Now go to a pay phone and dial any number anywhere you want, in this
|
||||
format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
|
||||
and wait for an operator to come on. The operator will announce her/his-self
|
||||
as a billing operator and ask you how he/she can help you on billing the call.
|
||||
Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
|
||||
name if you wish, but it's not necessary. No real names of course also. The
|
||||
operator will call the VMS and he/she will hear the previous recording of you
|
||||
saying "HELLO" etc.
|
||||
|
||||
After the operator hears an affirmative from the VMS...the operator will say
|
||||
thank you, then put the call through. The only person that gets billed for
|
||||
the call is the business/person that owns the VMS that you used by hacking the
|
||||
default password.
|
||||
|
||||
I've found out that you can dial overseas, and anywhere in the United States
|
||||
this way, with no problems or bad connections. If you have a portable computer
|
||||
with an acoustic couple...you can go online. It would be suggested to do this
|
||||
in a car, so as not to draw attention during the day. I've tried to set up a
|
||||
conference by the 800 Conference Operator and requesting to set up a
|
||||
conference. You have to give her the person's numbers and names you want to
|
||||
conference with...and the number you want to conference billed to. The
|
||||
operator will verify this if you are at a pay phone. I have figured out what
|
||||
the Conference Operator asked the 3rd Party as of yet...to time the responses
|
||||
preset on the VMS, but if anyone can, it would prove to be very useful.
|
||||
|
||||
Another technique might be to bill 976's to your VMS if you into that.
|
||||
Again, you need to attempt to time the perfect responses to the operator's
|
||||
questions to the 3rd Party.
|
||||
|
||||
*A Word of Warning*: In most cases, the Operator you handle the 3rd party
|
||||
call with will stay on the line. So it's good to have a conversation with
|
||||
yourself on the VMS for about 30 seconds after connection if you are making a
|
||||
collect call to the VMS.
|
||||
|
||||
|
23
textfiles.com/phreak/VOICEMAIL/tollfree.txt
Normal file
23
textfiles.com/phreak/VOICEMAIL/tollfree.txt
Normal file
@@ -0,0 +1,23 @@
|
||||
|
||||
Toll-Free Answering Services
|
||||
|
||||
|
||||
Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
|
||||
American Discount Dialing System 800-227-1617 (CA 800-852 7777)(CA800-772-3545)
|
||||
Dialog Marketing 800-447-4700 (IL 800-322-4400)
|
||||
Direct Marketing Services Inc. 800-223-1944
|
||||
Executive Locator 800-323-6556
|
||||
H Q Co 800-227-3004 (800-652-1848)
|
||||
National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
|
||||
National Data Corperation 800-257-9611
|
||||
National Switchboard 800-528-6052
|
||||
Nice-National Instant Consumer Exchange 800-453-9000
|
||||
Operator 800 800-448-4511 (NY 800-962-1480)
|
||||
Ring America 800-621-5199
|
||||
Share-a-Wats Inc. 800-854-2003
|
||||
Skycall 800-631-5488 (NJ 800-352-4951)
|
||||
Team Telephone 800-228-5000
|
||||
Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
|
||||
Teletrak Response Center 800-328-5257
|
||||
USA 800 800-821-2280 (MO 800-892-7655)
|
||||
|
62
textfiles.com/phreak/VOICEMAIL/unt-att1.txt
Normal file
62
textfiles.com/phreak/VOICEMAIL/unt-att1.txt
Normal file
@@ -0,0 +1,62 @@
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
|
||||
<EFBFBD>UNTOUCHABLES! <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>[File Name]: UNT-ATT1.ZIP <20> Difficulty <20>
|
||||
<EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>[Writer] : Aoflex <20> <20>
|
||||
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>[Packager] : Karma Sutra <20> [ ] 0 <20>
|
||||
<EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20> [X] 1 <20>
|
||||
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20>[Description]: Hacking <20> [ ] 2 <20>
|
||||
<EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>At&t Answering Machines. <20> [ ] 3 <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20> <20> [ ] 4 <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> 1996! <20>[Date]: 06/18/96 <20> [ ] 5 <20>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ij<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>-<2D><><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
|
||||
1. Dial the telephone that is being answered by an AT&T Answering Machine.
|
||||
2. When the machine answers, quickly enter the following:
|
||||
|
||||
1234567898765432135792468642973147
|
||||
4193366994488552277539596372582838
|
||||
491817161511026203040506070809001
|
||||
|
||||
3. The messages should start playing after this.
|
||||
4. Here is a short list of common AT&T Answering Machine comands:
|
||||
|
||||
|
||||
Message Commands:
|
||||
-----------------
|
||||
|
||||
Review Messages: 7
|
||||
Locate New Messages: 6
|
||||
Stop: #
|
||||
Rewind Messages: 2
|
||||
Clear Messages: 3, 3
|
||||
|
||||
Announcement Commands:
|
||||
---------------------
|
||||
|
||||
Record New Announcement: 4, *
|
||||
Play Current Announcement: 4, 1
|
||||
|
||||
System Commands:
|
||||
----------------
|
||||
|
||||
Turn System On: 0
|
||||
Turn System Off: 8, 8
|
||||
|
||||
|
||||
|
||||
Please Note: The easiest way to play the numbers to the answering
|
||||
machine would be program them in your phone's memory dialing
|
||||
setup.
|
||||
________ _ _
|
||||
/|/| | __ ____ _ _ ____ _ __ ___ _ ____/ ________ _ _ . .
|
||||
/| | | |/ |/| _| \/| | |/ __\|| |/ \| \| || ___| |__
|
||||
|| | | | | || | || | | /|| | | /| || __||__ |
|
||||
|| \| | | | || | | \| | \_|_|| | || | \| ||_ \____| |
|
||||
|/\____|_|___||_|\__/\____|\____\|_|_||_|___/|____|_______|
|
||||
\/___/_//__//_/\/_/\/___/\/____/_/_//_//__//____//__/___/
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
ARRESTED DEVELOPMENT II - UNT WORLD HEADQUARTERS - 410-720-5305
|
||||
BLACK OPIUM - UNT CENTERAL HQ - 701-523-5909
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
|
||||
|
124
textfiles.com/phreak/VOICEMAIL/vmb.rl
Normal file
124
textfiles.com/phreak/VOICEMAIL/vmb.rl
Normal file
@@ -0,0 +1,124 @@
|
||||
R e n e g a d e L e g i o n
|
||||
T e c h n i c a l R e p o r t s
|
||||
|
||||
|
||||
|
||||
Technical Report #3
|
||||
|
||||
....
|
||||
........
|
||||
.........
|
||||
... ....
|
||||
... ....
|
||||
.....
|
||||
....
|
||||
....
|
||||
... ...
|
||||
... ...
|
||||
.. ...
|
||||
...
|
||||
|
||||
February 1991
|
||||
|
||||
|
||||
RL HQ - 617.623.7151
|
||||
|
||||
VMB Hacking
|
||||
-----------
|
||||
|
||||
Written By: The Knight
|
||||
|
||||
|
||||
|
||||
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||
there trying to hack a box and can't, follow through the VERY logical and
|
||||
simple steps and make sure they are matching up.
|
||||
|
||||
|
||||
Step 1:
|
||||
|
||||
Finding a VMB System
|
||||
|
||||
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||
someone says 'Here are some systems' usually thats what they're referring
|
||||
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||
company, Enter extension #' or something similar to that. Then you have
|
||||
found a VMB system.
|
||||
|
||||
|
||||
Step 2:
|
||||
|
||||
Finding a Box
|
||||
|
||||
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||
You must make sure that no one is using it. There are several ways to do
|
||||
this. One EASY way is when you hack it, check the date on the latest
|
||||
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||
Also, watch in case there is just like _2_ messages in there from the last
|
||||
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||
they sound personal. If they DON'T, then grab the box.
|
||||
|
||||
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||
etc.) and erase all the messages. He will complain and will eventually move
|
||||
out of the box. Then there is a good chance of you having that box. It's
|
||||
happned to me.
|
||||
|
||||
|
||||
Step 3:
|
||||
|
||||
Hacking the VMB
|
||||
|
||||
This is the most SIMPLE part of all. MY general method is as follows:
|
||||
|
||||
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||
are:
|
||||
|
||||
3 digit boxes:
|
||||
000
|
||||
123
|
||||
111
|
||||
222
|
||||
333
|
||||
444
|
||||
555
|
||||
666
|
||||
777
|
||||
888
|
||||
999
|
||||
box # (say it's box 260, passcode: 260)
|
||||
321
|
||||
|
||||
4 digit boxes:
|
||||
|
||||
1234
|
||||
0000
|
||||
1111
|
||||
2222
|
||||
3333
|
||||
4444
|
||||
5555
|
||||
6666
|
||||
7777
|
||||
8888
|
||||
9999
|
||||
box # (Say its box 1200, try passcode: 1200)
|
||||
|
||||
|
||||
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||
UNLESS you've exhausted all of those possibilities. Then forget
|
||||
it.
|
||||
|
||||
That's it really. The most simple thing to do. Just remember not to
|
||||
give up before you should and also try 3 digit passcodes on 4 digit
|
||||
boxes. Also, once you get in for added security, a lot of these boxes
|
||||
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||
thing its worth it, try like '00000' so that's really about all.
|
||||
|
||||
Have fun and don't stop.
|
||||
|
||||
|
82
textfiles.com/phreak/VOICEMAIL/vmb.txt
Normal file
82
textfiles.com/phreak/VOICEMAIL/vmb.txt
Normal file
@@ -0,0 +1,82 @@
|
||||
|
||||
|
||||
|
||||
_____ __ __ ____ _ _ ______ ____ __ __
|
||||
| __ \ | | | | / _ | | \ | | |__ __| / __ | \ / |
|
||||
| | \ | ||___|| | / | | | \ | | || | / \ | | \ / |
|
||||
| | | | | ___ | | | | | | \| | || || || | |\ \/ /| |
|
||||
| |__/ | || || | \_| | | |\ | || | \__/ | | | \ / | |
|
||||
| ___/ |__| |__| \____| |_| \__| |__| \____/ |_| \/ |_|
|
||||
| |
|
||||
| | N E T W O R K S P R O D U C T I O N
|
||||
|_|
|
||||
|
||||
|
||||
Voice Mail Made Easy
|
||||
|
||||
by HAGAR
|
||||
CoSysop and PHREAK Sigop, Phantom Networks
|
||||
|
||||
|
||||
Voice Mail Boxes, yes, VMB's. They seem so trivial to the advanced phreak yet
|
||||
most beginners find them very fascinating. They often make a habit of begging
|
||||
other people for them. A real pain in the ass.
|
||||
|
||||
I am not a studly VMB hacker. VMB's should not encompass your entire phreak
|
||||
activities, as they really can be a waste of time. This article is just the
|
||||
basiic guidelines for attaining a VMB.
|
||||
|
||||
[1] Find a system. The easiest way to do this is to just find
|
||||
a codeline.
|
||||
|
||||
[2] Get in good with the codeline operator. If you continuously
|
||||
post shit he will get to like you..
|
||||
|
||||
[3] Ask him where you can find empty boxes on the system. If he
|
||||
readily complies ask if he might know the system default (more
|
||||
on this later)
|
||||
|
||||
[4] Scan for an empty box. You will know that you have hit
|
||||
an empty when it says "Box XXXX, Please leave your message
|
||||
after the tone.." You now have your empty box.
|
||||
|
||||
[5] Hack the box. In order to do this you will need to find the
|
||||
point where it says "Enter your password". On some systems you
|
||||
will have to enter pound (#) as soon as you log in. It will
|
||||
then ask for your box number (the empty one you just scanned)
|
||||
and then your password. Try defaults (again, see below). Some
|
||||
systems will require you to enter the box by calling up the
|
||||
box in a regular manner, and during the greeting hit star (*).
|
||||
You will then be asked for your password.
|
||||
|
||||
|
||||
[Defaults]
|
||||
|
||||
Some systems have a certain password that is used for all empty boxes. Many
|
||||
times this password will be "1234" or the box number. Here is where you get
|
||||
creative. The password COULD be up to 14 digits, but will usually only be
|
||||
four. Once you find a password that works it will probably be applicable to
|
||||
every empty box on the system..
|
||||
|
||||
Here is also some good news.. on some systems empty boxes will have NO
|
||||
password.
|
||||
|
||||
|
||||
This is just a basic overrview... a crash course. For more information check
|
||||
out the Phrack World News article on this subject, you will get a bit of a
|
||||
background on how these damn things work.
|
||||
|
||||
|
||||
Produced February 8, 1990. Leave me comments on my Direct Dial VMB at
|
||||
714/665-5190
|
||||
|
||||
Special thanks to:
|
||||
|
||||
Huntington Hangout BBS (Hobbes)
|
||||
Blackened
|
||||
Misfit
|
||||
|
||||
|
||||
Go ahead and upload this file, just make sure that all of the original credits
|
||||
are intact.
|
||||
|
309
textfiles.com/phreak/VOICEMAIL/vmb_smc.txt
Normal file
309
textfiles.com/phreak/VOICEMAIL/vmb_smc.txt
Normal file
@@ -0,0 +1,309 @@
|
||||
On the Essentials of Voice Mail Hacking
|
||||
by the Kryptic Night
|
||||
-S M C-
|
||||
|
||||
This file will describe several simple ways for hacking out
|
||||
your own voice mail box. It is by no means a comprehensive
|
||||
document on the subject, but rather, is meant to help those
|
||||
beginning in the field. I myself have several voice mail boxes,
|
||||
and have hacked on various systems. I will describe several of
|
||||
the methods I have used, and try to explain the format for them.
|
||||
|
||||
An overview of several common commands:
|
||||
# (Pound) - Used either to access the password prompt or a
|
||||
dialing list.
|
||||
* (Star) - This is either used to abort the current menu, or
|
||||
to amplify the volume.
|
||||
0 (Duh) - Used either to access the password prompt, or to chat
|
||||
with our friend, the operator.
|
||||
9 - This is occasionally used to hang up.
|
||||
|
||||
|
||||
The First Step
|
||||
Type of systems to look for
|
||||
|
||||
First of all you need a system to hack at. Unless you are a
|
||||
pre-teenage new kid fan, answering machines usually aren't that
|
||||
exciting.
|
||||
Try to look for an 800 voice mail system. I know I don't like
|
||||
having to pull out codes every time I want to call a VMB, only to
|
||||
find that their is nothing there worth my while, and I'm sure
|
||||
other people feel the same. This will not only provide yourself
|
||||
with a free method for calling your box, but will also allow you
|
||||
to call it from a payphone, and you can call it anytime, rather
|
||||
than when you just have a code handy.
|
||||
Another great advantage is using a system that is up for all
|
||||
24 hours. This isn't a necessity, but is a great convenience. For
|
||||
instance, imagine that you just gave out your number to someone
|
||||
who be beneficial to your VMB as a good source of codes or
|
||||
general info, but he has better things to do at night than call
|
||||
VMB systems, with an afterhours VMB, you cut him off, is that what
|
||||
you want? I'd hope not.
|
||||
|
||||
|
||||
|
||||
The Second Step
|
||||
Finding out how many digits the boxes are
|
||||
|
||||
Ok, so you now have a system to play with. Let's see if the
|
||||
system is worth your time, and find out the basics of it.
|
||||
Now you have to try to ascertain how many digits the box numbers
|
||||
are, this may take a while if it requires you to press a '#'
|
||||
(pound) sign after the box number, as these systems usually do not
|
||||
tell you whether you entered the correct amount of digits or not.
|
||||
For now, I'd recommend you just ignore these, as they would
|
||||
require extra work. Try entering any 3 digits, you will in most
|
||||
cases get an 'incorrect box number' message if the system is only
|
||||
a 3 digit system. However, if it just hangs, does nothing, then
|
||||
the odds are it's a four digit system. Try typing 4 digits now,
|
||||
and if you still get no message, then it's either one of two
|
||||
things. One, you may need to press a '#' (pound) sign after the
|
||||
number, or in some cases, before it. Or two, the system is longer
|
||||
than 4 digits, in which case you should ignore it for now. Some
|
||||
systems contain a built-in time delay that will tell you a message
|
||||
if you haven't entered the correct box in a given time, these
|
||||
should also be avoided for now, as they will say something even if
|
||||
you only type one digit, or if you type 100 digits.
|
||||
|
||||
|
||||
The Third Step
|
||||
Finding where the boxes are located
|
||||
|
||||
Now comes a rather tedious chore, finding out where on the
|
||||
system the boxes are located. Unless it is a professional voice
|
||||
mail company, they will probably have under 100-200 mail boxes in
|
||||
use at any one time. These boxes may be found on the system in any
|
||||
of two forms, clumped or scattered. Clumped boxes are when their
|
||||
are several boxes all in one area of the system. Usually this is
|
||||
the only area on the system that boxes are located, but
|
||||
occasionally some systems have scattered clumps all around the
|
||||
system. Scattered boxes occur when the boxes seem to have no
|
||||
apparent order for their location, these are more difficult to
|
||||
find empty boxes on, but not impossible.
|
||||
Now you need to start looking for the clumps (We will start
|
||||
with these, as they are generally easier to locate). Start
|
||||
searching from 100, for a three digit system, or 1000, for a 4
|
||||
digit system. Increment your searching by 25-50 for a three digit
|
||||
system, and 100-500 on a four digit system. This will undoubtedly
|
||||
be inaccurate, but it will allow you a better chance of finding
|
||||
the clumps than random guessing. You may get several messages
|
||||
while looking for these, anything from 'Boxes cannot start with
|
||||
an x' to 'Incorrect box number' Generally these should be self-
|
||||
explanatory, and you should be able to figure out how to respond
|
||||
on your own. You are looking for any box with a message in it, any
|
||||
message. When you find a used box, mark down the number, and scan
|
||||
around that box in increments of 5 or so. If you find any more,
|
||||
mark down that location as a clump. Remember however, that if you
|
||||
get an incorrect box number message, that doesn't mean that that
|
||||
area isn't a clump, just that that box is empty. This will provide
|
||||
added inaccuracy to the job, but it's a fact that can't be
|
||||
overcome by anything other than monotonous scanning by 1.
|
||||
Try to make this fun, invite your friends over, have a phone
|
||||
party....they can be fun and profitable if you know what you are
|
||||
looking for.
|
||||
As for scattered boxes, I don't have much to say, they aren't
|
||||
the easiest systems to play with, as you can't tell with any
|
||||
certainty where on the system a box will be, and if it's a four
|
||||
digit system, that's 10,000 possible boxes...Not an encouraging
|
||||
number. If you are on a system with scattered boxes, just ignore
|
||||
this section and read how to find empty boxes next.
|
||||
|
||||
|
||||
|
||||
The Fourth Step
|
||||
The Miraculous Void
|
||||
|
||||
Once you've found the system, your real job has just begun.
|
||||
You now need to find an empty box. Although it is possible to hack
|
||||
out used boxes, this is usually undesirable, since used boxes tend
|
||||
to have people who use them (makes sense doesn't it...I thought so
|
||||
too) When some complaining customer calls and gets a message such
|
||||
as "To call cosmos and fuck up the entire region, dial...blah blah
|
||||
blah...remember to slaughter a cat for Halloween...", they will
|
||||
most likely be a bit suspicious and will call the business
|
||||
bitching about how they are so unprofessional, and that their
|
||||
employees really should clean up their mouths...blah blah, you
|
||||
know, the usual line of bullshit. If that doesn't happen, then the
|
||||
person who owns the box will check it out, and if that happens,
|
||||
you can be assured that the box won't last.
|
||||
Now is the time to pull out that list of clumps you made.
|
||||
Start searching around these boxes in increments of 1, yes one,
|
||||
this may take a while...but if you've come this far...you
|
||||
obviously have too much free time.
|
||||
What you are looking for is any box that asks you to leave a
|
||||
message at the tone, and doesn't play a prerecorded message to you
|
||||
before that. These are relatively easy to recognize, and you
|
||||
shouldn't have any problems with it. Just look for the anomaly.
|
||||
|
||||
|
||||
|
||||
The Fifth Step
|
||||
On the Art of Hacking
|
||||
|
||||
This is where the excitement begins, or the agony ends. By
|
||||
now you should have found an empty box or two. If you haven't,
|
||||
start over again with a different system. There are several ways
|
||||
to access the password prompt. Usually most systems tell you right
|
||||
up front at the main menu how to do it, but since some do not,
|
||||
I'll explain the most common ways that I know of.
|
||||
The magical pound sign is the most common way of accessing
|
||||
the password prompt. From the main menu you should press the #
|
||||
sign, and then the box number. It will then ask for your security
|
||||
password, or some other such inane jargon. The other common way of
|
||||
accessing the prompt is to dial the box number, and press 0 while
|
||||
the message is playing, or sometime after you dial the box number.
|
||||
You will then be asked to enter your security password, or
|
||||
whatever they choose to call it.
|
||||
A security password is usually, but not always, the same
|
||||
length as the box number. The most common default password for
|
||||
voice mail systems is a string of zero's, 000 for three digit
|
||||
systems and 0000 for four digit systems. Other common passwords
|
||||
are: The box number, IE - box 2045 would have a password of 2045,
|
||||
box of 0981 (four digit system) would have a password of 0981, and
|
||||
a three digit system might have something like 521 for a box
|
||||
number of 521, a string of some common digits, such as 1111,
|
||||
2222, 3333, ainsi du suite, the year, or 1234. By no means are
|
||||
these the only default passwords, but these are the ones I've
|
||||
seen, and have heard about. You should be able to catch a
|
||||
significant number of empty boxes with these.
|
||||
|
||||
|
||||
|
||||
The Sixth Step
|
||||
You're in, now what
|
||||
|
||||
So you think you're cool, right? You've found a box or two
|
||||
that you can get into. Well, congrats, from here on out everything
|
||||
is cake. This section and following sections won't tell you too
|
||||
much that you shouldn't be able to figure out with
|
||||
experimentation, but I'm trying to be thorough...
|
||||
You've gotten past the password, and are at a prompt that
|
||||
asks you to 'send a message to another box' 'read new mail', or
|
||||
what not. If their are messages in the box, you should read them
|
||||
and pay attention to the date stamp if it's there. If the message
|
||||
is only a day or so old, then you might want to make sure you have
|
||||
other boxes to fall back on. Besides that, just enjoy the thrill
|
||||
of listening to other people's private mail...I once got a message
|
||||
from some guy's mistress...Funnier than hell. All the commands for
|
||||
these options should be readily apparent, and told to you when you
|
||||
get in.
|
||||
To configure your system with your message, name, and
|
||||
password you will need to enter the 'Setup menu' or whatever it is
|
||||
called. Sometimes this function won't be told to you, but that's
|
||||
not really a problem, their are only 12 digits to try. Most
|
||||
systems default to an 8 or a 3. I'll assume you can find it on
|
||||
your own...
|
||||
You've gotten into the config menu by now, and you are
|
||||
confronted with a multitude of options. First you should ALWAYS
|
||||
change your password to something that you feel is unhackable,
|
||||
your phone number is not a good choice. Next you should enter your
|
||||
own personal message. Try to figure out if the message is time
|
||||
limited to 30 seconds or a minute, a lot of systems do that. These
|
||||
systems are usually only good for personal message boxes, and not
|
||||
code lines. Next, change your name if the system allows you to do
|
||||
that...I don't think you want to be called Edwina Lipshitz when
|
||||
someone tries to leave you a message.
|
||||
Their may be other functions, such as message forwarding,
|
||||
call placements, group messages, message waiting status, etc.
|
||||
Generally these should be ignored, unless you're adventurous and
|
||||
willing to risk your box with something like having the system
|
||||
call you when you get a message.
|
||||
So, you've done everything, and set up a cool box, eh? Great,
|
||||
now just for fun, go back to the main system menu, and try to
|
||||
enter your box as a user would. Type to box number and listen to
|
||||
your message, if it's satasfactory...You've done it, you now have
|
||||
a brand new box you can tell your friends.
|
||||
|
||||
|
||||
|
||||
The Seventh Step
|
||||
What to do with a VMB
|
||||
|
||||
|
||||
Just for kicks, you might want to figure out what to do with
|
||||
a VMB once you have it. I'll describe two of these options, their
|
||||
are infinity more to the imaginative.
|
||||
|
||||
Code lines: These are quite possibly the best thing you can
|
||||
ever have if you are interested in the underground scene. If it is
|
||||
well advertised, and you post all the info you get, you will have
|
||||
a popular box. With a popular box, you'll get a vast amount of
|
||||
information that you wouldn't find on most boards, such as cosmos
|
||||
dialups, telenet accounts, codes, and other such info. These type
|
||||
of boxes can get you into trouble quite quickly if the gestapo
|
||||
finds out about it, as they are a bit more annoyed with someone
|
||||
who posts all their private information, over someone who just
|
||||
asks to leave a message at the prompt. But when you live the life
|
||||
you need to, the risks are not a factor.
|
||||
Personal boxes are also great for several reasons. You can
|
||||
post your VMB to people who need to get in touch with you, even
|
||||
when they don't have a code. You can also use them in the fine
|
||||
art of carding. When the salesperson asks for your phone number,
|
||||
tell 'em something like "It's being fixed, but you can call my
|
||||
voice mail system at XXX-XXX-XXXX." This will make them a lot less
|
||||
suspicious then if you give them a bad phone number. Of course you
|
||||
would want to change the box message to that of the person whose
|
||||
card you used, but that's obvious.
|
||||
|
||||
|
||||
|
||||
The Eighth Step
|
||||
How to keep your VMB safe and sound
|
||||
|
||||
Once you've gone through all the trouble of hacking out a
|
||||
VMB, the last thing you want is for it to go bad the next week,
|
||||
their is little in this more infuriating then spending a lot of
|
||||
time getting a box, to find it go dead the next day.
|
||||
|
||||
Several ways to keep your box safe include...
|
||||
NEVER hack out more than 1 or 2 boxes at ANY time. If you
|
||||
need another VMB be kind to yourself, do it on another system.
|
||||
Their have been too many busts of people who get greedy.
|
||||
DON'T allow other people to hack on your system. Threats or
|
||||
warnings will sometimes be effective, threaten them with things
|
||||
such as ruining their credit ratings with TRW, sending a few
|
||||
thousand dildo's to their mother, care of them, or whatever...be
|
||||
imaginative. Or you can offer to hack out a box for them somewhere
|
||||
else. This may seem like a bitch to do, but it's worth your time
|
||||
if the person is an asshole.
|
||||
DON'T post your VMB on lame systems, or on systems where
|
||||
their are a large amount of people who dislike you. These idiots
|
||||
usually have less of a life than you, and are not against spending
|
||||
days trying to hack out your password. Since you probably can't
|
||||
kill them upfront, just make sure they don't get your number.
|
||||
|
||||
|
||||
|
||||
The Conclusion
|
||||
The Usual Bullshit
|
||||
|
||||
This file was researched are written by the Kryptic Night. It
|
||||
was produced as the first in a series of quality SMC text files
|
||||
released for the private public. In no way do I care whether you
|
||||
get busted or not, and accept no responsibility for corrupting
|
||||
your young minds. Thanx go out to the members of SMC, Scooter, and
|
||||
everyone else who is interested in freedom of speech.
|
||||
|
||||
Information is the most powerful weapon one can possess
|
||||
against the masses.
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
||||
| \
|
||||
| /\/\ / <20>\ <20><><EFBFBD>
|
||||
| / \ / <20> \ A <20> A
|
||||
| / |/| / / \ <20> / <20> /
|
||||
|/ | < \ <20>/ <20>/ U L T
|
||||
|\ RYPTIC / | \ \ / <20>\
|
||||
| \ / | \ <20> \
|
||||
|\ | | \
|
||||
| \ |
|
||||
| \|IGHT
|
||||
/ `
|
||||
|
||||
- Servants of the Mushroom Cloud -
|
||||
|
||||
Data Kult, Kryptic Night, Lord Logics, Nacht Habicht,
|
||||
Shadow Walker, the Scorpion
|
126
textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt
Normal file
126
textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt
Normal file
@@ -0,0 +1,126 @@
|
||||
|
||||
R e n e g a d e L e g i o n
|
||||
T e c h n i c a l R e p o r t s
|
||||
|
||||
|
||||
|
||||
Technical Report #3
|
||||
|
||||
....
|
||||
........
|
||||
.........
|
||||
... ....
|
||||
... ....
|
||||
.....
|
||||
....
|
||||
....
|
||||
... ...
|
||||
... ...
|
||||
.. ...
|
||||
...
|
||||
|
||||
February 1991
|
||||
|
||||
|
||||
RL HQ - 617.oOo.oOOo
|
||||
|
||||
VMB Hacking
|
||||
-----------
|
||||
|
||||
Written By: The Knight
|
||||
|
||||
|
||||
|
||||
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||
there trying to hack a box and can't, follow through the VERY logical and
|
||||
simple steps and make sure they are matching up.
|
||||
|
||||
|
||||
Step 1:
|
||||
|
||||
Finding a VMB System
|
||||
|
||||
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||
someone says 'Here are some systems' usually thats what they're referring
|
||||
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||
company, Enter extension #' or something similar to that. Then you have
|
||||
found a VMB system.
|
||||
|
||||
|
||||
Step 2:
|
||||
|
||||
Finding a Box
|
||||
|
||||
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||
You must make sure that no one is using it. There are several ways to do
|
||||
this. One EASY way is when you hack it, check the date on the latest
|
||||
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||
Also, watch in case there is just like _2_ messages in there from the last
|
||||
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||
they sound personal. If they DON'T, then grab the box.
|
||||
|
||||
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||
etc.) and erase all the messages. He will complain and will eventually move
|
||||
out of the box. Then there is a good chance of you having that box. It's
|
||||
happned to me.
|
||||
|
||||
|
||||
Step 3:
|
||||
|
||||
Hacking the VMB
|
||||
|
||||
This is the most SIMPLE part of all. MY general method is as follows:
|
||||
|
||||
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||
are:
|
||||
|
||||
3 digit boxes:
|
||||
000
|
||||
123
|
||||
111
|
||||
222
|
||||
333
|
||||
444
|
||||
555
|
||||
666
|
||||
777
|
||||
888
|
||||
999
|
||||
box # (say it's box 260, passcode: 260)
|
||||
321
|
||||
|
||||
4 digit boxes:
|
||||
|
||||
1234
|
||||
0000
|
||||
1111
|
||||
2222
|
||||
3333
|
||||
4444
|
||||
5555
|
||||
6666
|
||||
7777
|
||||
8888
|
||||
9999
|
||||
box # (Say its box 1200, try passcode: 1200)
|
||||
|
||||
|
||||
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||
UNLESS you've exhausted all of those possibilities. Then forget
|
||||
it.
|
||||
|
||||
That's it really. The most simple thing to do. Just remember not to
|
||||
give up before you should and also try 3 digit passcodes on 4 digit
|
||||
boxes. Also, once you get in for added security, a lot of these boxes
|
||||
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||
thing its worth it, try like '00000' so that's really about all.
|
||||
|
||||
Have fun and don't stop.
|
||||
|
||||
|
||||
|
127
textfiles.com/phreak/VOICEMAIL/vmbhack.hac
Normal file
127
textfiles.com/phreak/VOICEMAIL/vmbhack.hac
Normal file
@@ -0,0 +1,127 @@
|
||||
R e n e g a d e L e g i o n
|
||||
* * T e c h n i c a l R e p o r t s * *
|
||||
* R * * L *
|
||||
* *
|
||||
|
||||
Eastern Western
|
||||
....
|
||||
Net Runner ........ Overdose
|
||||
The Knight ......... Sirus
|
||||
Kingpin ... .... Snuggle
|
||||
Highlander ... ....
|
||||
Nemesis .....
|
||||
Rogue .... Canadien
|
||||
Zardoz ....
|
||||
Cursor ... ...
|
||||
The Gypsy ... ... Blackheart
|
||||
Iceburg .. ...
|
||||
White Knight ...
|
||||
|
||||
Presents
|
||||
|
||||
|
||||
Eastern RL HQ - 617-XXX-XXXX
|
||||
Canadien HQ - 902-XXX-XXXX
|
||||
|
||||
|
||||
VMB Hacking
|
||||
-----------
|
||||
|
||||
Written By: The Knight
|
||||
|
||||
|
||||
|
||||
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||
there trying to hack a box and can't, follow through the VERY logical and
|
||||
simple steps and make sure they are matching up.
|
||||
|
||||
|
||||
Step 1:
|
||||
|
||||
Finding a VMB System
|
||||
|
||||
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||
someone says 'Here are some systems' usually thats what they're referring
|
||||
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||
company, Enter extension #' or something similar to that. Then you have
|
||||
found a VMB system.
|
||||
|
||||
|
||||
Step 2:
|
||||
|
||||
Finding a Box
|
||||
|
||||
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||
You must make sure that no one is using it. There are several ways to do
|
||||
this. One EASY way is when you hack it, check the date on the latest
|
||||
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||
Also, watch in case there is just like _2_ messages in there from the last
|
||||
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||
they sound personal. If they DON'T, then grab the box.
|
||||
|
||||
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||
etc.) and erase all the messages. He will complain and will eventually move
|
||||
out of the box. Then there is a good chance of you having that box. It's
|
||||
happned to me.
|
||||
|
||||
|
||||
Step 3:
|
||||
|
||||
Hacking the VMB
|
||||
|
||||
This is the most SIMPLE part of all. MY general method is as follows:
|
||||
|
||||
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||
are:
|
||||
|
||||
3 digit boxes:
|
||||
000
|
||||
123
|
||||
111
|
||||
222
|
||||
333
|
||||
444
|
||||
555
|
||||
666
|
||||
777
|
||||
888
|
||||
999
|
||||
box # (say it's box 260, passcode: 260)
|
||||
321
|
||||
|
||||
4 digit boxes:
|
||||
|
||||
1234
|
||||
0000
|
||||
1111
|
||||
2222
|
||||
3333
|
||||
4444
|
||||
5555
|
||||
6666
|
||||
7777
|
||||
8888
|
||||
9999
|
||||
box # (Say its box 1200, try passcode: 1200)
|
||||
|
||||
|
||||
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||
UNLESS you've exhausted all of those possibilities. Then forget
|
||||
it.
|
||||
|
||||
That's it really. The most simple thing to do. Just remember not to
|
||||
give up before you should and also try 3 digit passcodes on 4 digit
|
||||
boxes. Also, once you get in for added security, a lot of these boxes
|
||||
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||
thing its worth it, try like '00000' so that's really about all.
|
||||
|
||||
Have fun and don't stop.
|
||||
|
||||
-- The Knight, Sysop Eastern RL HQ BBS
|
||||
|
||||
|
59
textfiles.com/phreak/VOICEMAIL/vmbhack.txt
Normal file
59
textfiles.com/phreak/VOICEMAIL/vmbhack.txt
Normal file
@@ -0,0 +1,59 @@
|
||||
[0m
|
||||
|
||||
+------------------------+
|
||||
| A.C.E. Presents |
|
||||
| |
|
||||
| Zod's VMB Hacker Dox |
|
||||
+------------------------+
|
||||
|
||||
Dox by Zod
|
||||
|
||||
I wrote this program because of the amount of time and effort that is
|
||||
needed to hack out a VMB by hand manually. This program is not totally auto-
|
||||
mated because the computer has no way of knowing if it got the correct PW or
|
||||
not, but it will certainly speed up the process of hacking out a VMB and make
|
||||
it much easier.
|
||||
|
||||
How To Use It
|
||||
-------------
|
||||
|
||||
Using VMB Hacker is very easy. Just load it up and answer all the questions.
|
||||
First, (obviosly) enter the VMB's number. Then, enter the numbers and signs
|
||||
that VMB Hacker should dial before it dials the security code (such as *, #
|
||||
or box number, etc.) Next, enter the code that VMB Hacker should start hacking
|
||||
at. VMB Hacker can either go down or up. Next, enter the PW length so it knows
|
||||
how many 0's to add before the number (PW length can be 3, 4, 5, or 6... Maybe
|
||||
next version will be able to do longer ones). Next, enter either 1 to hack up
|
||||
or -1 to go down. In the next version, I may add random hacking, if and when
|
||||
VMBs start tracing (who knows). Next, enter the comport that your modem is in.
|
||||
Next, enter the amount of attempts that VMB Hacker should make before hanging
|
||||
up, calling the VMB back and trying some more, or just 0 if the VMB lets u
|
||||
keep trying. Next, is auto-hack. If you select Auto-Hack, VMB Hacker will keep
|
||||
trying PWs until you press C for Correct PW. This is very useful cuz it lets
|
||||
u just sit back and relax and listen, but it will only work well if your modem
|
||||
has a nice loud speaker. If you select Auto-Hack, u must now tell it the amount
|
||||
of seconds to wait for u tel press C before it tries the next code. Next, you
|
||||
must tell VMB Hacker how many seconds to wait after dialing the VMB before it
|
||||
starts hacking.
|
||||
|
||||
Hope this program helps you out in hackout out your VMB's. If u have any
|
||||
questions, u can call my board and ask me or contact me on any of the other
|
||||
A.C.E. boards in New York. Also, I'd like to thank PO\/\/ER 1 and Outlaw for
|
||||
for giving me the idea to write this program.
|
||||
|
||||
L8r, d00dz...
|
||||
|
||||
[1;36m---===[1;33m< [1;35mZod [1;33m>[1;36m===---[0m
|
||||
|
||||
|
||||
Call These Fine A.C.E. Boards:
|
||||
|
||||
The Dead Of Night BBS
|
||||
(212)979-0719
|
||||
Sysop - Zod
|
||||
|
||||
HPCLand
|
||||
(718)531-7846
|
||||
Sysop - PO\/\/ER 1
|
||||
|
||||
|
1654
textfiles.com/phreak/VOICEMAIL/vmbhaq.txt
Normal file
1654
textfiles.com/phreak/VOICEMAIL/vmbhaq.txt
Normal file
File diff suppressed because it is too large
Load Diff
248
textfiles.com/phreak/VOICEMAIL/vmblol.txt
Normal file
248
textfiles.com/phreak/VOICEMAIL/vmblol.txt
Normal file
@@ -0,0 +1,248 @@
|
||||
[40m[2J[2H[24C[0;1;31m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD> [1m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD> [1m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD>[3H[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;31m<31><6D>[0;31m<31><6D><EFBFBD>[34m<34><6D><EFBFBD><EFBFBD>[1;31m<31><6D>[0;31m<31><6D><EFBFBD>[1m<31>[41m<31>[0;31m<31><6D>[34m<34>[1;31m<31><6D>[0;31m<31><6D><EFBFBD>[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[s
|
||||
[u<><75><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[4H[1m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[31m<31><6D>[0;31m<31><6D><EFBFBD>[1;34m<34>[31m<31><6D>[0;31m<31>[1m<31><6D>[0;31m<31><6D><EFBFBD>[1m<31>[41m<31>[0;31m<31><6D>[1;34m<34>[31m<31><6D>[0;31m<31><6D><EFBFBD>[1;34m<34>[31m<31><6D>[0;31m<31>[1;34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[5H[0;34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;31m<31><6D>[s
|
||||
[u[41m<31>[0;31m<31><6D><EFBFBD>[41m [40m<30>[34m<34>[1;31m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD><EFBFBD>[34m<34>[1;31m<31><6D>[41m<31>[0;31m<31><6D><EFBFBD>[41m [40m<30>[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[6H[24C[1;37;47m<37><6D>[30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[7H[24C[40m<30><6D>[8H [0;35m<35>[1m<31>[0;35m<35> [37mCardin[s
|
||||
[ug [35m<35>[1;31m<31>[0;35m<35> [37mPhreaking [35m<35>[1;32m<32>[0;35m<35> [37mHacking [35m<35>[1;36m<36>[0;35m<35> [37mAnarchy [35m<35>[1;33m<33>[0;35m<35> [37mPhraud [35m<35>[1;37m<37>[0;35m<35>[9H[10H[1;31mWritten by: [36mW[34mave [37mR[0munner![35C[1;31m[s
|
||||
[uDate: [36m10/22/90[11H[31mEdited by : [36mC[0;36mount[34m_[1mZER0[8C[36m<36>[0;36megions [1m<31>[0;36mf [1m<31>[0;36mucifer[12H[30C[32mText # [1;37m12[13H[30C[0;32mPart [1m1 [0;32mout of [1m1[14H[15H[0;34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[s
|
||||
[u<><75><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[16H[1m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[17H[36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[18H[19H[13C[s
|
||||
[u[32mHacking & Scanning Voice Mail Boxes: The Tutorial[20H[21H[36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[22H[34m<34><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[23H[0;34m[A
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[0m
|
||||
|
||||
Legions of Lucifer ('l<>jen ov l<>cif<69>r) n. 1. Any multitude of followers
|
||||
of the chief evil spirit, Satan. 2. A group of Anarchists and Computer
|
||||
Experts that work together as one to cause havok in the anarchy bound
|
||||
society of this nation.
|
||||
|
||||
|
||||
Hello again, and welcome to another <20>egions <20>f <20>ucifer text phile! This
|
||||
text file has to do with hacking and scanning VMBs. The reason I am writing
|
||||
this phile is because I am very good at it, and have had years of experience.
|
||||
Infact I have been called by MCI for screwing them over by attacking and
|
||||
taking over a whole damn system with a few friends of mine.
|
||||
|
||||
Anyways, hacking VMBs is very simple and basically safe, and not only that
|
||||
but they are kewl to have around. You can give them to friends, you can
|
||||
trade them for access on bulletin boards, or you can use it for yourself.
|
||||
As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
|
||||
to hack, how you go about hacking them, default passwords, hints on better
|
||||
scanning, and having your very own box.
|
||||
|
||||
|
||||
Basics:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
|
||||
like an answering machine. You can use it for all sorts of things. Most
|
||||
VMB systems are dialed though 800 numbers. People call up the VMB system
|
||||
that you have a box on, and dial in your box number and then leave you a
|
||||
message. Whenever you want to check your box, you just call up, enter your
|
||||
password and read your messages. Inside a VMB you can do whatever, you can
|
||||
leave messages to others on the system, you can change your 'Out Going'
|
||||
message, you can have guest boxes (Explained later), you can have the box
|
||||
call your house when you get an Urgent message, you can do a lot of things.
|
||||
Infact, on some systems you can even CALL OUT through them, so they can be
|
||||
used as a code of sorts! They are cool to have.
|
||||
|
||||
|
||||
What Type of System You Should Scan/Hack:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
You should scan/hack out Virgin Systems, this is another way of calling a
|
||||
system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
|
||||
have the best boxes and the most options that VMB Systems can offer. I will
|
||||
be talking about ASPEN System today since I know most about those.
|
||||
|
||||
|
||||
Scanning Your 'Virgin ASPEN VMB System':
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Okay once you've found your Virgin VMB System, you start to scan. Just incase
|
||||
you don't know what scanning is, that means you search for boxes that are
|
||||
hackable (Explained later on). Now you dial up the system and when it picks
|
||||
up and the bitch starts to talk, press the "#" key. It will then ask you for
|
||||
your box number... now there are two different way the ASPEN System can be
|
||||
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
|
||||
System". Now lets just say this system is a 3 Digit System. Okay, when it
|
||||
asks for your Box Number, enter in 999, now it will say one of three things:
|
||||
[These are known as 'Greeting Names']
|
||||
1. John Doe [Box owners name]
|
||||
2. "Box Number 999 Is Not a Valid Box Number"
|
||||
3. "Box Number 999"
|
||||
Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
|
||||
but if it says 3, then you are lucky, now it will ask you for your password,
|
||||
now you are probably saying 'Shit this is where it gets difficult'... well
|
||||
you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
|
||||
|
||||
* We will use box number 666 as an example box #
|
||||
[ BN = Box Number ]
|
||||
|
||||
List of Default Password: Combination Result
|
||||
|
||||
1-BN 1666
|
||||
BN+1 667
|
||||
0-BN 0666
|
||||
BN-0 6660
|
||||
Most Common <20>į BN 666
|
||||
|
||||
Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
|
||||
use that most. Now, if you try all those Defaults and still can not get into
|
||||
that Voice Mail Box, then that means that the box has been already taken, but
|
||||
the owner hasn't changed his 'Generic Message', if you don't get in, you
|
||||
will just have to search until you get in.
|
||||
|
||||
|
||||
Once You Get Into a Box:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Okay, once you get your first box, *DO NOT* change anything!! That will come
|
||||
later. Your first box is, as what is known as a 'Scanning Box'! What you do
|
||||
with your Scanning Box is this: You enter "3" from the main commands menu,
|
||||
and it will ask you for the box number. Now that command is the "Check for
|
||||
Reciept" command, what it does it check Box #xxx for mail from you. This
|
||||
command is very convienient for us VMB Hackers. To use that command to your
|
||||
advantage, you enter in box a box number and it will say 1 of the three
|
||||
'Greeting Names', like before, if it say #3, then you write down that Box
|
||||
Number and hack it later. But if it says 1 or 2, then just keep scanning!
|
||||
All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
|
||||
Now you keep scanning until you have gone all the way down to Box number 000
|
||||
or whatever is the lowest box it supports. Now, once you have your list this
|
||||
is when all the fun starts! Now you are ready to hack!
|
||||
|
||||
|
||||
Hacking Out Your New Found 'Hackable' Boxes:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Okay this is the easy part. After you spent most of your time by scanning
|
||||
the system you should be used to the system and how it works, that should
|
||||
make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
|
||||
should know what the default password was for your Scanning Box. Well if the
|
||||
password for your Scanning Box was just the Box Number, then *EVERY* other
|
||||
hackable box should have the SAME default password. VMB Systems have only
|
||||
one default password, If one box has the BN for a Default PW, the all the
|
||||
others will too.
|
||||
|
||||
Okay, you call up the VMB System will the list of 'Hackable' boxes by your
|
||||
side, and when the bitch is talking, press the "#" key. When it asks you for
|
||||
your box number, enter in the first box number on your list. When it asks for
|
||||
your password, enter in the Default Password Sequence. Now if you don't get
|
||||
into that box, it's not a problem, just keep going down your list. You should
|
||||
get into a few. But remember, just because a box is marked 'Hackable', it
|
||||
doesn't mean you will definatly get into it.
|
||||
|
||||
Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
|
||||
whatever you please.
|
||||
|
||||
|
||||
ASPEN Guest Boxes:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
|
||||
are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
|
||||
Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
|
||||
for him, and leave you messages, but not only that, you can leave messages
|
||||
to HIM! Which means, if his is in New York, and you are in California, and
|
||||
neither of you have codes to call eachother, then you can leave messages thru
|
||||
your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
|
||||
|
||||
0. Main Box - Your Voice Mail Box!
|
||||
1. Guest Box #1 - Can Leave & Recieve Messagez
|
||||
2. Guest Box #2 - Can Leave & Recieve Messagez
|
||||
3. Home Box - Can Leave & Recieve Messagez
|
||||
4. Secretary Box - Can Check How Many Messagez You
|
||||
Have & Recieve Messagez
|
||||
|
||||
|
||||
Hints On Better Scanning:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
A lot of people say hacking and scanning for VMBs is too damn hard... well
|
||||
that's because they are going at it all wrong, they probably read some lame
|
||||
piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
|
||||
here is a small list of hints on better scanning and hacking:
|
||||
|
||||
1. Do not use a Voice Mail Box hacking/scanning program
|
||||
(ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
|
||||
2. Do not hack in random order (ei: B#999, 345, 810, etc)
|
||||
Always hack in order: 999, 998, 997, 996, 995...000.
|
||||
3. Try to find out if it's virgin. The newer the System,
|
||||
the better.
|
||||
4. If you have a phone with memory dial, change one entry
|
||||
to the number of the VMB System.
|
||||
5. Don't hack the System Managers box unless you really
|
||||
want to.
|
||||
|
||||
|
||||
Ideas of Things To Do With Your Extra Boxez:
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
Well since you can have up to 500 extra Voice Mail Boxes, you might
|
||||
not know what to do with them, here are a few ideas that can help you out:
|
||||
|
||||
1. Give them to friends
|
||||
2. Sell them to friends
|
||||
3. Offer them to sysops for
|
||||
for better access
|
||||
4. Trade them for HSTs or
|
||||
whatever
|
||||
5. Use them as a Voice Verifing line (So you don't have to give out
|
||||
your real voice number to BBSes when you apply!)
|
||||
|
||||
|
||||
Well, that's it to the <20>egions <20>f <20>ucifer Hacking & Scanning Voice Mail Box
|
||||
Systems Tutorial! I hope it helped you and I, along with <20>.<2E>.<2E> wish you the
|
||||
best of luck with your new found hobby! And remeber if you found this text
|
||||
of any help, please spread it around to help others! Also, if you think you
|
||||
are any good at writing H/P, please apply to be a Member! Call the <20>.<2E>.<2E> Home
|
||||
at:
|
||||
|
||||
Digital Hackers Network
|
||||
<20>egions <20>f <20>ucifer HeadQuarters/Home
|
||||
No Warez! A truely serious Hack/Phreak board
|
||||
Hack, Phreak, Scanning, Phraud, Crashing disscusions
|
||||
Viral Research & Development Sections (500+ Virii!)
|
||||
"Personalized ANSi Bombs" made by request
|
||||
Running AfterShock v1.20 - 2400 Baud
|
||||
PH: 213-274-1333
|
||||
|
||||
[40m
|
||||
[39m[29C[0;1;30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
[25C<35><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> [31m<31><6D> [30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
[23C<33><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[5C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD> [30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
[21C<31><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[6C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD>
|
||||
[20C<30><43><EFBFBD><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[0;31m<31><6D>[1m<31><6D><EFBFBD><EFBFBD><EFBFBD>[6C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD>
|
||||
[19C<39><43><EFBFBD><EFBFBD><EFBFBD>[7C[31m<31><6D><EFBFBD><EFBFBD>[0;31m<31> <20>[1m<31><6D><EFBFBD><EFBFBD>[8C[30m<30><6D><EFBFBD><EFBFBD>
|
||||
[18C<38><43><EFBFBD><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[41m<31>[4C<34>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD>[7C[30m<30><6D><EFBFBD><EFBFBD>
|
||||
[18C<38><43><EFBFBD><EFBFBD>[7C[31m<31><6D><EFBFBD><EFBFBD>[0;31m<31>[6C<36>[1m<31><6D><EFBFBD><EFBFBD>[8C[30m<30><6D><EFBFBD> [36m<36>
|
||||
[17C[30m<30><6D><EFBFBD><EFBFBD>[6C[31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[41m<31>[8C<38>[40m<30><6D><EFBFBD><EFBFBD>[7C[30m<30><6D><EFBFBD><EFBFBD>[36m<36><6D>[46m<36>[40m
|
||||
[46m[15C[40m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[31m<31><6D><EFBFBD><EFBFBD>[36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[41m<31><6D><EFBFBD><EFBFBD><EFBFBD>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[0;36m<36>
|
||||
[14C[1m<31>[46m<36><6D>[0;36m<36>[1;30;46m<36><6D><EFBFBD>[0;36m<36><6D><EFBFBD><EFBFBD>[1;31;46m<36>[40m<30><6D><EFBFBD><EFBFBD>[41m<31>[0;36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;31;46m<36><6D><EFBFBD><EFBFBD>[0;36m<36><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[1;30;46m<36><6D><EFBFBD>[0;36m<36>
|
||||
[12C[1m<31><6D>[46m<36>[3C[30;40m<30><6D><EFBFBD> [31m<31><6D><EFBFBD><EFBFBD>[0;31m<31>[14C<34>[1m<31><6D><EFBFBD><EFBFBD>[5C[30m<30><6D><EFBFBD>
|
||||
[12C[36;46m<36>[0;36m<36>[5C[1;30m<30><6D><EFBFBD> [31m<31><6D><EFBFBD><EFBFBD><EFBFBD>[41m<31>[16C<36>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD> [30m<30><6D><EFBFBD>
|
||||
[20C<30><43>[31;47m<37>[40m<30><6D><EFBFBD><EFBFBD>[0;31m<31>[18C<38>[1m<31><6D><EFBFBD><EFBFBD> [0;30m<30>[1m<31><6D><EFBFBD>
|
||||
[21C<31>[41m<31>[31m<31><6D><EFBFBD>[0;31m<31>[20C[1;41m<31>[40m<30><6D><EFBFBD><EFBFBD>[0;30m<30><6D>[1m<31><6D>
|
||||
[23C<33><43><EFBFBD><EFBFBD><EFBFBD>[18C<38><43>[41m<31>[31;40m<30><6D><EFBFBD><EFBFBD>
|
||||
[25C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[9C<39><43><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>[31;41m<31>[40m<30><6D><EFBFBD><EFBFBD><EFBFBD>
|
||||
[29C[30m<30><6D><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> [0;31m<31>[1m<31><6D><EFBFBD><EFBFBD>
|
||||
[51C[0;31m<31>[1;41m<31><6D>[0;31m<31>
|
||||
|
||||
[1;36m"[0;36mAnarchy is the base of todays society, without it, we would be in chaos[1m"
|
||||
[40C- Anarchist[0m
|
||||
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
Call these <20>egions <20>f <20>ucifer support boards for information or application
|
||||
inquiries:
|
||||
|
||||
Digital Hackers Network 213/274+1333 <20>.<2E>.<2E> HeadQuaters/Home
|
||||
Electric Eye ][ 313/776+8928 <20>.<2E>.<2E> Distribution Site #1
|
||||
Digital Information Exchange 612/356+2209 <20>.<2E>.<2E> Distribution Site #2
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<EFBFBD>egions <20>f <20>ucifer High Office Members:
|
||||
|
||||
Prezident/Founder: Wave Runner!
|
||||
Vice Prezident : Count_Zer0
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
This text file is (C)Copyrite 1990 <20>.<2E>.<2E> Inc.
|
||||
<20>.<2E>.<2E> is a registered trademark of DHN, All rights reserved
|
||||
Any modifications to this text file is a violation of copyrite.
|
||||
Digital Hackers Network 213/274+1333 -=<3D>.<2E>.<2E> Home=-
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
126
textfiles.com/phreak/VOICEMAIL/vmbrl.txt
Normal file
126
textfiles.com/phreak/VOICEMAIL/vmbrl.txt
Normal file
@@ -0,0 +1,126 @@
|
||||
R e n e g a d e L e g i o n
|
||||
* * T e c h n i c a l R e p o r t s * *
|
||||
* R * * L *
|
||||
* *
|
||||
|
||||
Eastern Western
|
||||
....
|
||||
Net Runner ........ Overdose
|
||||
The Knight ......... Sirus
|
||||
Kingpin ... .... Snuggle
|
||||
Highlander ... ....
|
||||
Nemesis .....
|
||||
Rogue .... Canadien
|
||||
Zardoz ....
|
||||
Cursor ... ...
|
||||
The Gypsy ... ... Blackheart
|
||||
Iceburg .. ...
|
||||
White Knight ...
|
||||
|
||||
Presents
|
||||
|
||||
|
||||
Eastern RL HQ - 617-XXX-XXXX
|
||||
Canadien HQ - 902-XXX-XXXX
|
||||
|
||||
|
||||
VMB (Voice Mail Box) Hacking
|
||||
----------------------------
|
||||
|
||||
Written By: The Knight
|
||||
|
||||
|
||||
|
||||
Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
|
||||
a great deal of 'hidden info' that isn't common sense. But, If you are out
|
||||
there trying to hack a box and can't, follow through the VERY logical and
|
||||
simple steps and make sure they are matching up.
|
||||
|
||||
|
||||
Step 1:
|
||||
|
||||
Finding a VMB System
|
||||
|
||||
There are many ways you can find a VMB system, for instance, on a BBS when
|
||||
someone says 'Here are some systems' usually thats what they're referring
|
||||
to. Also, Try setting up your scanner and listening for 'Welcome to XX
|
||||
company, Enter extension #' or something similar to that. Then you have
|
||||
found a VMB system.
|
||||
|
||||
|
||||
Step 2:
|
||||
|
||||
Finding a Box
|
||||
|
||||
This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
|
||||
You must make sure that no one is using it. There are several ways to do
|
||||
this. One EASY way is when you hack it, check the date on the latest
|
||||
messages, if they are OVER a month old, then I'd say your safe to use them.
|
||||
Also, watch in case there is just like _2_ messages in there from the last
|
||||
4 months that those messages could be messages sent to ALL the boxes, see if
|
||||
they sound personal. If they DON'T, then grab the box.
|
||||
|
||||
Let's say there's a box you REALLY want bad and someone's using it regularly,
|
||||
try doing this: Go in twice a day (make SURE you DON'T change the greeting
|
||||
etc.) and erase all the messages. He will complain and will eventually move
|
||||
out of the box. Then there is a good chance of you having that box. It's
|
||||
happned to me.
|
||||
|
||||
|
||||
Step 3:
|
||||
|
||||
Hacking the VMB
|
||||
|
||||
This is the most SIMPLE part of all. MY general method is as follows:
|
||||
|
||||
Find a box, let's say box 260. It's empty and I want it (obviously).
|
||||
First, try passcode '000', if that doesn't work, try passcode '260',
|
||||
just make very general guesses that's ALL. Some of the MOST Common passcodes
|
||||
are:
|
||||
|
||||
3 digit boxes:
|
||||
000
|
||||
123
|
||||
111
|
||||
222
|
||||
333
|
||||
444
|
||||
555
|
||||
666
|
||||
777
|
||||
888
|
||||
999
|
||||
box # (say it's box 260, passcode: 260)
|
||||
321
|
||||
|
||||
4 digit boxes:
|
||||
|
||||
1234
|
||||
0000
|
||||
1111
|
||||
2222
|
||||
3333
|
||||
4444
|
||||
5555
|
||||
6666
|
||||
7777
|
||||
8888
|
||||
9999
|
||||
box # (Say its box 1200, try passcode: 1200)
|
||||
|
||||
|
||||
The Key: REALLY try ALL of those. I knew one system with a passcode of
|
||||
'5555' and NO ONE could hack it. And I did. So don't give up.
|
||||
UNLESS you've exhausted all of those possibilities. Then forget
|
||||
it.
|
||||
|
||||
That's it really. The most simple thing to do. Just remember not to
|
||||
give up before you should and also try 3 digit passcodes on 4 digit
|
||||
boxes. Also, once you get in for added security, a lot of these boxes
|
||||
allow more digits for passcodes, so make a 5 digit passcode. Or if you
|
||||
think it's worth it, try like '00000' so that's really about all.
|
||||
|
||||
Have fun and don't stop.
|
||||
|
||||
-- The Knight, Sysop Eastern RL HQ BBS
|
||||
|
52
textfiles.com/phreak/VOICEMAIL/vmbs1.txt
Normal file
52
textfiles.com/phreak/VOICEMAIL/vmbs1.txt
Normal file
@@ -0,0 +1,52 @@
|
||||
VMB's (Voice Mail Box) | 1&2 = Both call same number
|
||||
| 1 = One calls this number
|
||||
Call : 213-598-7900 (Party Pirate Line) BRIDGE| 2 = the other calls this
|
||||
Call : 317-265-4488 (Unused Bridge) |
|
||||
VMB Number |EXTEN | Operator of VMB | Loops
|
||||
_______________| SION|______________________ | _____________________
|
||||
N O L E E C H I N G |
|
||||
716-987-7439 : None : The Pirate | 1&2 @ 212-567-9938
|
||||
716-987-7648 : None : AK 47 (Brother) | 1&2 @ 504-356-5619
|
||||
716-987-7666 : None : Jack the RIPPER | 1 @ 202-678-8049
|
||||
716-987-7623 : None : Romper | 2 @ " " 8048
|
||||
716-987-7502 : None : DEATH (Not Master) | 1 @ 504-831-9099
|
||||
213-856-2580 : None : Black Ball Mis ]I[! | 2 @ " " 9098
|
||||
1-800-333-5625 : 354 : The Flaw |
|
||||
1-800-438-1061 : 135 : MW 8 |__________________________
|
||||
312-410-7213 : : MC Docs | 1999 | 0488 |
|
||||
213-494-9700 : : Public Enemy |_________|________________|
|
||||
714-647-1958 : : Mr Music | | |
|
||||
213-202-4381 : : JDT | | |
|
||||
313-399-2596 : : The Stranger | | |
|
||||
1-800-525-7243 :**8889: Pure Genius | | |
|
||||
619-492-8087 : : Trixder Ice |_________|________________|
|
||||
1-800-632-6681 : 2614: Con Artist | 0266 | AT&T |
|
||||
1-800-552-2440 : 5206: Console Cowboy | |80446713159980 |
|
||||
619-496-3393 : : The Saint | |60110804335933 |
|
||||
1-800-289-2121 : 255: Gremlin | |71333331316212 |
|
||||
818-594-7049 :**7751: WhipLash | |70238697343418 |
|
||||
818-594-7049 :**7754: Ace / WhipLash | | |
|
||||
818-594-7049 :**7757: ChainSaw | | |
|
||||
818-594-7049 :**7759: Hercules | | |
|
||||
818-594-7049 :**7760: The Faker | | |
|
||||
714-987-5128 : : AlphaBits | | |
|
||||
213-856-8450 : : Iniolater | | |
|
||||
: : | | |
|
||||
: : | | |
|
||||
: : | | |
|
||||
____________________________________________________________________________
|
||||
-Don't Work for me. -
|
||||
950-0488
|
||||
0471041692102
|
||||
7261041692102
|
||||
1151041692102
|
||||
7411041692102
|
||||
0721041692102
|
||||
2591041692102
|
||||
950-0266 Public Bridges:
|
||||
5024180 312-630-9590;9592;9594;9596;9598
|
||||
312-606-9214
|
||||
312-606-0766
|
||||
312-704-0724
|
||||
|
||||
|
86
textfiles.com/phreak/VOICEMAIL/vmbzan.hac
Normal file
86
textfiles.com/phreak/VOICEMAIL/vmbzan.hac
Normal file
@@ -0,0 +1,86 @@
|
||||
###############################################################################
|
||||
## <20><><EFBFBD>Zhit Axis Nation presents<74><73><EFBFBD> W () W ##
|
||||
## How to have your own VMB \||/ ##
|
||||
## || ##
|
||||
## Written by: The Exorcist _/ \_ ##
|
||||
## Dated: 7/24/91 ##
|
||||
## Greet(s) to: Doc Logic, my teacher at school, and the godly CoP... ##
|
||||
## ##
|
||||
## Ying Yang BBS The Baron's Bistro FuNHouse BBS ##
|
||||
## ZAN Promised Land ZAN Mosque#001 ZAN Mosque#002 ##
|
||||
## SysOp: CoP SysOp: The Baron SysOp: Erasmus ##
|
||||
###############################################################################
|
||||
Here is another ultimately cool ZAN text file brought to you by the Exorcist.
|
||||
Call 1-312-839-3850 and leave all the shit you want, codes and nos and shit..
|
||||
|
||||
|
||||
This file is only based upon the information gathered from VMB's with the
|
||||
839 prefix.
|
||||
|
||||
Ok here is a file from Z.A.N. so I wont be purged! What is a VMB? A VMB
|
||||
is a Voice Mail Box.. or sometimes known as a Voice Mail System. Their
|
||||
purpose is to record messages for people.. (id est OB/Gyn's and Pediatrists,
|
||||
Drug Dealers, and a curious of other rich and filthy scum.) Lets say Joe
|
||||
Supplier is out with his hoe.. Of course he can't get in touch with his
|
||||
fiendish hommies so what does he do? No, he doesn't get a beeper cuz that
|
||||
might tick of his hoe.. He get's a VMB where he has the caller has the option
|
||||
to leave a phone no. or a voice message.
|
||||
|
||||
Joe S. finishes with his hoe calls up his VMB listens to his pre-recorded
|
||||
message for a little while " Yea Man, I ain't no home now, but you leave
|
||||
message an I call you when I done with yo sis'" then presses "0" on his touch
|
||||
tone phone. A nice little voice comes on saying "Please enter your access
|
||||
code." He enters his code and hears " You have xx messages press 7 to play."
|
||||
He presses 7 and hears his messages.
|
||||
|
||||
So you get the point by now, and if you don't you shouldn't be reading this..
|
||||
So how do you get one, why you just look it up in the yellow pages and let
|
||||
your fingers do the talking.. But everyone knows that the real way is to
|
||||
HACK it.. Find out some pager prefixes, I know some in Illinois are 312-839
|
||||
and then theres 708-xxx. Then attempt to call every no. combination there is
|
||||
unless you have a scanner or something that you can program to act upon
|
||||
different messages.. To make your time go faster try little combinations
|
||||
like 839-fuck or 839-hack. About 95% of the time you will simply here a few
|
||||
beeps. This is for the conventional pager, the correct procedure is to type
|
||||
in your phone no. and press the # button. By the way, if you really get
|
||||
pissed at someone, you can type in their no. and then they will be getting
|
||||
calls from people saying "John Doe from 1st National back returning your
|
||||
call" or "Yeah man, dis be Tyrone, wha you be, G?"
|
||||
|
||||
When you finally get one, either by taking someone elses - trying to hack
|
||||
their passwords or believe this, some persons are to stupid to even have
|
||||
passwords - or by finding an empty one. The second of the two being the
|
||||
better and safer. Hacking someones VMB cant get you in any trouble.. Just
|
||||
don't attemt to change the message right away.. But if you are the true
|
||||
anarchist, you will change his/her message, Call back the next day, and find
|
||||
the old message back with a new password.. Now is your time to have fun.
|
||||
Keep saying "I got your VMB along with your address and shit, be expecting
|
||||
a ton of manure on your front lawn Monday." I kept doing this along with
|
||||
saying "I am going to kill your Grandmother" After awhile the guy changed
|
||||
his message to say something like "Hey man stop leaving me messages, I'll
|
||||
use ANI to bust you" What a looser!
|
||||
|
||||
What exactly are the commands once you get in to your own little VMB?
|
||||
|
||||
Pressing the "*" will give you the following options..
|
||||
|
||||
3 to delete
|
||||
2 to play again
|
||||
4 to skip forward in message
|
||||
11 to update greeting
|
||||
13 to forward message
|
||||
17 to change access code
|
||||
|
||||
I also found out some that they don't tell you once you press "*"
|
||||
|
||||
8 will get you the time that the messages were left
|
||||
5 will tell you what message you are at
|
||||
6 sets you back to the beginning
|
||||
|
||||
|
||||
If you do succeed, please post your VMBs so that the anarchistic public can
|
||||
leave you mail. Who knows maybe you'll get some CC's or codes and shit..
|
||||
|
||||
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
52
textfiles.com/phreak/VOICEMAIL/vmx.txt
Normal file
52
textfiles.com/phreak/VOICEMAIL/vmx.txt
Normal file
@@ -0,0 +1,52 @@
|
||||
|
||||
|
||||
==)--- P TO PAUSE S TO STOP ---(==
|
||||
|
||||
Toll-Free Answering Services
|
||||
|
||||
|
||||
Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
|
||||
|
||||
American Discount Dialing System 800-227-1617 (CA 800-852 7777) (CA 800-772-3545)
|
||||
|
||||
Dialog Marketing 800-447-4700 (IL 800-322-4400)
|
||||
|
||||
Direct Marketing Services Inc. 800-223-1944
|
||||
|
||||
Executive Locator 800-323-6556
|
||||
|
||||
H Q Co 800-227-3004 (800-652-1848)
|
||||
|
||||
National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
|
||||
|
||||
National Data Corperation 800-257-9611
|
||||
|
||||
National Switchboard 800-528-6052
|
||||
|
||||
Nice-National Instant Consumer Exchange 800-453-9000
|
||||
|
||||
Operator 800 800-448-4511 (NY 800-962-1480)
|
||||
|
||||
Ring America 800-621-5199
|
||||
|
||||
Share-a-Wats Inc. 800-854-2003
|
||||
|
||||
Skycall 800-631-5488 (NJ 800-352-4951)
|
||||
|
||||
Team Telephone 800-228-5000
|
||||
|
||||
Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
|
||||
|
||||
Teletrak Response Center 800-328-5257
|
||||
|
||||
USA 800 800-821-2280 (MO 800-892-7655)
|
||||
|
||||
DOWNLOADED FROM P-80 SYSTEMS
|
||||
|
||||
|
||||
|
||||
Archives #4
|
||||
|
||||
|
||||
<2>United Kingdom BBS'S
|
||||
<3>Weers Group...... 02 238 9034
|
84
textfiles.com/phreak/VOICEMAIL/voicmail.txt
Normal file
84
textfiles.com/phreak/VOICEMAIL/voicmail.txt
Normal file
@@ -0,0 +1,84 @@
|
||||
____________________________ _____
|
||||
\___ | ___/___/_ ___\___/ _ \/ ___/
|
||||
| | |/ /____| | | | | |\ )/____
|
||||
| | |>____ / | | |> | __/___ /
|
||||
___| | |____/ /| | | |__| |\ \_/ /
|
||||
\____|____/__/ |_| |____/_| \_\_/ HL
|
||||
-------------------------------------
|
||||
|
||||
THERE IS NOW A NEW FACILITY FOR COOL DUDES WHO WANTS IT....
|
||||
|
||||
IT'S TOTALLY FREE, BUT IS RESTRICTED TO THOSE WHO....
|
||||
|
||||
A) OWN A TONE PAD OR TONE DIALING PHONE.
|
||||
B) WILL USE IT REGULARLY.
|
||||
C) AREN'T LAME!!
|
||||
|
||||
THE FACILITY IS A FREE-PHONE MESSAGE BOX SYSTEM FOR YOU TO CALL AND LEAVE
|
||||
MESSAGES, GOSSIP, ETC TO OTHERS ON THE SYSTEM. EACH PERSON IS GIVEN
|
||||
HIS/HER OWN PERSONAL MAIL BOX WITH ITS OWN PASSWORD (CHANGABLE!). THE
|
||||
SYSTEM ALSO ALLOWS THOSE OF YOU UNABLE TO PHREAK TO HAVE CHATS USING MAIL.
|
||||
|
||||
APPLYING FOR A MAIL BOX IS REALLY EASY. YOU CAN EITHER....
|
||||
|
||||
A) PHONE 0800 899224, LEAVE A MESSAGE CONTAINING YOUR NAME AND PHONE
|
||||
NUMBER TO LORD FLIGHT/JESTERS AT MAIL BOX 510. THIS IS DONE BY DIALING
|
||||
THE FREE=PHONE NUMBER, PRESSING THE `*' KEY AS SOON AS YOU HEAR THE
|
||||
RECORDED VOICE, ENTERING `510', LEAVE YOUR DETAILS AFTER THE TONE, AND
|
||||
HANGING UP WHEN YOU HAVE FINISHED!
|
||||
|
||||
B) CALL A BBS AND MAIL YOUR DETAILS TO ANY OF THESE USERS, IF THEY ARE
|
||||
MEMBERS OF THE BOARD :-
|
||||
|
||||
SKITZ
|
||||
HIGHLANDER
|
||||
JESTERS
|
||||
ZEBEDI
|
||||
|
||||
C) MAIL YOUR DETAILS TO ANY OF THE ABOVE USERS AT THE JESTERS HQ...
|
||||
|
||||
INNER SANCTUM ON 44 (0)229 430327.
|
||||
|
||||
|
||||
IF YOUR APPLICATION IS ACCEPTED YOU'LL GET A CALL AND WILL BE TOLD YOUR
|
||||
MAIL BOX NUMBER, YOUR PASSWORD (WHICH MUST BE CHANGED) AND A LIST OF
|
||||
OTHER USERS ON THE SYSTEM.
|
||||
|
||||
NB : AS SOON AS YOU READ THIS TEXT, GIVE IT A GO, CAUSE EVERYTHING IS
|
||||
FREE. THIS NUMBER WILL NOT GO DOWN FOR A GOOD 2 MONTHS OR SO, BUT IT WILL
|
||||
EVENTUALLY, AND WHEN IT DOES YOU WILL BE NOTIFIED OF A NEW NUMBER TO CALL
|
||||
WITHIN A WEEK!
|
||||
|
||||
CREDITS GO TO DEATH FOR FINDING THE ORIGINAL NUMBER...
|
||||
|
||||
ALLOCATED MAIL BOXES THAT ARE ABUSED OR NOT USED WILL BE RE-ALLOCATED TO
|
||||
MORE APPRECIATIVE USERS!
|
||||
|
||||
NO TRICKS, NO CHARGES....WE DO THIS OUT OF THE GOODNESS OF OUR HEARTS!!
|
||||
|
||||
BULK ORDERS CAN ALSO BE MADE FROM LARGE GROUPS! RESERVATIONS ONLY TAKE
|
||||
A SECOND!!!
|
||||
|
||||
/* LORD FLIGHT */ - YOUR SYSTEM ADMINISTRATOR
|
||||
_ __ ______ __________________
|
||||
THE //\// \ // // \ // // ___// __ \ SYSOP: HIGHLANDER
|
||||
// // \ // // \ // // /_ // /// /
|
||||
// // /\ \/ // /\ \/ // __/// __/ COSYSOPS: RUTGER SOUND
|
||||
// // / \\ // / \\ // / // /\ \ RISK
|
||||
// // / \\_// / \\_// /__// / \\ \_________________________
|
||||
\\/\\_/ \\_/ \\____/\\_/ \\__________________________/
|
||||
________ ________ __ ________________________ __ __ __
|
||||
// ___ \ // ____ \// \ // // __ \\____ ___// \ // \// \ // \
|
||||
// / \\_/// / // // \ // // / \\_/ // / // / // // \/ \
|
||||
\\ \___ // \_// // /\ \/ // / // / // / // // /\ /\ \
|
||||
__\\___ \// /\__ // / \\ // / __ // / // / // // / \/// /
|
||||
// \__// // / // // / \\_// \// \ // / // \// // / // /
|
||||
\\_______/\\/ \\_/\\_/ \\______/ \\_/ \\_______/\\_/ \\_/
|
||||
|
||||
68030 POWER * 200 MEG STORAGE * DUAL STANDARD 14.4K * SERIAL LOCKED AT 38.4K
|
||||
JESTERS U.K HQ * 0-1 DAYS ONLY
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
->->->->->->->->-> THE INNER SANCTUM +44 (0) 229 430327 <-<-<-<-<-<-<-<-<-
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
|
||||
|
36
textfiles.com/phreak/VOICEMAIL/xvmecinf.txt
Normal file
36
textfiles.com/phreak/VOICEMAIL/xvmecinf.txt
Normal file
@@ -0,0 +1,36 @@
|
||||
========================================
|
||||
= =
|
||||
= Xerox Voice Message Exchange Commands=
|
||||
= =
|
||||
= Written & Typed By:The Lineman =
|
||||
= =
|
||||
= Atlantis BBS 215/844-8836 (Private) =
|
||||
= =
|
||||
========================================
|
||||
|
||||
Command List:
|
||||
|
||||
1 = Start/Stop Recording
|
||||
2 = Start/Stop Playing
|
||||
3 = Back Up
|
||||
33 = Back Up to Beginning
|
||||
4 = Skip Forward
|
||||
44 = Skip to End
|
||||
5 = Send/Erase
|
||||
55 = Notification of Non-Delivery
|
||||
7 = Save/Scan
|
||||
8 = Future Delivery
|
||||
0 = End of Address
|
||||
* = End of Address
|
||||
|
||||
Special Commands:
|
||||
|
||||
011 = New Message Queues
|
||||
012 = Saved Message Queues
|
||||
021 = Redirect
|
||||
022 = Reply
|
||||
|
||||
Any questions? Dial 1-800-TEAM-XRX (1-800-832-5979)
|
||||
|
||||
8/86
|
||||
|
80
textfiles.com/phreak/WIRETAPPING.1
Normal file
80
textfiles.com/phreak/WIRETAPPING.1
Normal file
@@ -0,0 +1,80 @@
|
||||
<HTML>
|
||||
<TITLE>T E X T F I L E S</TITLE>
|
||||
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
|
||||
<H1>Phone Phreaking: Wiretapping and Bugs</H1>
|
||||
<P>
|
||||
The Great Fear of people who use telephones to conduct their business (private
|
||||
or professional) is that someone is listening in, taking notes, recording.
|
||||
It's a concern that has allowed some very rough laws to be put into place, and
|
||||
it's a central theme of these files. They tell you how to bug telephones or
|
||||
rooms, get in the way of electronic transmissions, and they even touch on
|
||||
some of the politics behind this method of information gathering.
|
||||
<P>
|
||||
Of course, it should be noted that not everyone out there wiretapping is a
|
||||
private citizen.
|
||||
<P>
|
||||
<TABLE WIDTH=100%>
|
||||
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
|
||||
|
||||
<tab indent=60 id=T><br>
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bellinfo.txt">bellinfo.txt</A> <tab to=T><TD> 10630<BR><TD> Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bug.txt">bug.txt</A> <tab to=T><TD> 9176<BR><TD> Automatic Phone Recorder by Atomic Punk (May 1, 1989)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugdetct.phk">bugdetct.phk</A> <tab to=T><TD> 1893<BR><TD> Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugging.guide">bugging.guide</A> <tab to=T><TD> 7040<BR><TD> Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugging.phk">bugging.phk</A> <tab to=T><TD> 7201<BR><TD> Bugs on a Budget, Inexpensive Surveillance, 8-85
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/buggy.phk">buggy.phk</A> <tab to=T><TD> 1579<BR><TD> A little history about the Infinity Transmitter
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugphone.phk">bugphone.phk</A> <tab to=T><TD> 4640<BR><TD> An Automatic Phone Recorder, by Atomic Punk
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/bugstaps.txt">bugstaps.txt</A> <tab to=T><TD> 1891<BR><TD> Bugs and How to Tap Someone's Room by Fireball
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/buildbug.phk">buildbug.phk</A> <tab to=T><TD> 3852<BR><TD> How to Build a Bug Detector by The Gremlin
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/caller">caller</A> <tab to=T><TD> 6623<BR><TD> Notes on Recording Caller ID Signals and Voice Notes
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/callwai.txt">callwai.txt</A> <tab to=T><TD> 2878<BR><TD> The Call Waiting Tap, by The Byte
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/cordless.phk">cordless.phk</A> <tab to=T><TD> 6713<BR><TD> How to listen into cordless phone conversations, by Beowulf
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/datatap.hac">datatap.hac</A> <tab to=T><TD> 3968<BR><TD> Tapping Computer Data is Easy! By Rick Blackmon
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/detectbug.phk">detectbug.phk</A> <tab to=T><TD> 2912<BR><TD> Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/dltp1.txt">dltp1.txt</A> <tab to=T><TD> 4738<BR><TD> Detecting Line Taps of C-Net Compatibles
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/dltp2.txt">dltp2.txt</A> <tab to=T><TD> 3585<BR><TD> Detecting Line Taps Part type by C-Net Compatibile
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/eaves1.txt">eaves1.txt</A> <tab to=T><TD> 14460<BR><TD> Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/es.txt">es.txt</A> <tab to=T><TD> 25505<BR><TD> Electronic Bug Detection
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/faxint.phk">faxint.phk</A> <tab to=T><TD> 14663<BR><TD> Fax Machine Interception, from Full Disclosure #23
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fmbug.hac">fmbug.hac</A> <tab to=T><TD> 4736<BR><TD> How to Make an FM Wireless Bug, by Johnny Rotten
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fmphone.bug">fmphone.bug</A> <tab to=T><TD> 2340<BR><TD> Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonebugs.hac">fonebugs.hac</A> <tab to=T><TD> 2199<BR><TD> Bug Detection on Home Phones
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonepole.txt">fonepole.txt</A> <tab to=T><TD> 4097<BR><TD> Climbing Phone Poles- Tips and techniques by The Mad Phone-man
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/foneptch.phk">foneptch.phk</A> <tab to=T><TD> 29642<BR><TD> Building and Using Phone Patches, by Julian Macassey
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/fonesci.phk">fonesci.phk</A> <tab to=T><TD> 18900<BR><TD> The Science of Telephone Surveilance, by Eric The Red
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/intercpt.txt">intercpt.txt</A> <tab to=T><TD> 22529<BR><TD> Pager, Fax, and Data Intercept Techniques
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lbt-alt1.txt">lbt-alt1.txt</A> <tab to=T><TD> 3651<BR><TD> Info on Automatic Line Testers (APR) by RiPMax of Liberty
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lbt-alt2.txt">lbt-alt2.txt</A> <tab to=T><TD> 3796<BR><TD> Automatic Line Testers (SALT) by RiPMaX of Liberty
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lineman.phk">lineman.phk</A> <tab to=T><TD> 6645<BR><TD> Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/listenin.txt">listenin.txt</A> <tab to=T><TD> 4520<BR><TD> How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/lmos.phk">lmos.phk</A> <tab to=T><TD> 4286<BR><TD> How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism32.hac">mism32.hac</A> <tab to=T><TD> 5248<BR><TD> Wiretape Loophole Concerns by Geoffrey S. Goodfellow
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism36.hac">mism36.hac</A> <tab to=T><TD> 12928<BR><TD> Private Audience (The Art of Listening In) by The Overlord
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mism37.hac">mism37.hac</A> <tab to=T><TD> 7040<BR><TD> Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/mobfone.phk">mobfone.phk</A> <tab to=T><TD> 9745<BR><TD> How to Get Into the AT&T Network by Building Your Own Mobile Phone
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/nightl.txt">nightl.txt</A> <tab to=T><TD> 21788<BR><TD> Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phone.tap">phone.tap</A> <tab to=T><TD> 4243<BR><TD> How Many Different Phone Taps Work
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phonetap.phk">phonetap.phk</A> <tab to=T><TD> 2896<BR><TD> Bug Detection on Home Phones, by Mr. Jimmy
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phonetap.txt">phonetap.txt</A> <tab to=T><TD> 3767<BR><TD> Phone Tapping, by Lord Jaxom
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/phontap.phk">phontap.phk</A> <tab to=T><TD> 2913<BR><TD> The Call Waiting Tap, by The Byte
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/precord.phk">precord.phk</A> <tab to=T><TD> 5878<BR><TD> Automatic Phone Recorder by Atomic Punk, May 1, 1989
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/ptapping.phk">ptapping.phk</A> <tab to=T><TD> 14476<BR><TD> Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/swtchbrd.phk">swtchbrd.phk</A> <tab to=T><TD> 7031<BR><TD> Building Your Own Switchboard by Autopsy Saw
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapfones.hac">tapfones.hac</A> <tab to=T><TD> 11956<BR><TD> Private Audience: A Basic Guide to the Art of Listening In
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/taphones.phk">taphones.phk</A> <tab to=T><TD> 3105<BR><TD> How to Tap Into Your Neighbor's Phones, by Lord Jaxon
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapownline.phk">tapownline.phk</A> <tab to=T><TD> 4533<BR><TD> How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapphon.txt">tapphon.txt</A> <tab to=T><TD> 8303<BR><TD> How to Listen in to Cordless Phone Conversaitons by Beowulf
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapping.phk">tapping.phk</A> <tab to=T><TD> 1644<BR><TD> Bugs and How to Tap Someone's Room, by Fireball
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tapping.txt">tapping.txt</A> <tab to=T><TD> 2468<BR><TD> The Call Waiitng Tap by The Byte and Road Agent
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/taps2.txt">taps2.txt</A> <tab to=T><TD> 4550<BR><TD> Some Information on Phone Taps
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/tempest.txt">tempest.txt</A> <tab to=T><TD> 46237<BR><TD> Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wait.tap">wait.tap</A> <tab to=T><TD> 2683<BR><TD> The Call Waiting Tap by The Byte, Distributed by RAM Kracker
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretap.ana">wiretap.ana</A> <tab to=T><TD> 3896<BR><TD> General Wiretap Information
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretap.txt">wiretap.txt</A> <tab to=T><TD> 13663<BR><TD> Wiretapping Abuse Report on the FBI in 1991
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretapp">wiretapp</A> <tab to=T><TD> 6479<BR><TD> Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="WIRETAPPING/wiretaps.txt">wiretaps.txt</A> <tab to=T><TD> 23758<BR><TD> Can Wiretaps Remain Cost-Effective? By Robin Hanson
|
||||
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 56 files for a total of 472,516 bytes.</SMALL></TABLE>
|
||||
</BODY>
|
||||
</HTML>
|
80
textfiles.com/phreak/WIRETAPPING/.windex.html
Normal file
80
textfiles.com/phreak/WIRETAPPING/.windex.html
Normal file
@@ -0,0 +1,80 @@
|
||||
<HTML>
|
||||
<TITLE>T E X T F I L E S</TITLE>
|
||||
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#000000" ALINK="#004400" VLINK="#004400">
|
||||
<H1>Phone Phreaking: Wiretapping and Bugs</H1>
|
||||
<P>
|
||||
The Great Fear of people who use telephones to conduct their business (private
|
||||
or professional) is that someone is listening in, taking notes, recording.
|
||||
It's a concern that has allowed some very rough laws to be put into place, and
|
||||
it's a central theme of these files. They tell you how to bug telephones or
|
||||
rooms, get in the way of electronic transmissions, and they even touch on
|
||||
some of the politics behind this method of information gathering.
|
||||
<P>
|
||||
Of course, it should be noted that not everyone out there wiretapping is a
|
||||
private citizen.
|
||||
<P>
|
||||
<TABLE WIDTH=100%>
|
||||
<TD BGCOLOR=#000000><FONT COLOR=#FFFFFF><B>Filename</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#002200><FONT COLOR=#FFFFFF><B>Size</B><BR></FONT></TD>
|
||||
<TD BGCOLOR=#004400><FONT COLOR=#FFFFFF><B>Description of the Textfile</B><BR></TD></TR>
|
||||
|
||||
<tab indent=60 id=T><br>
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bellinfo.txt">bellinfo.txt</A> <tab to=T><TD> 10630<BR><TD> Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bug.txt">bug.txt</A> <tab to=T><TD> 9176<BR><TD> Automatic Phone Recorder by Atomic Punk (May 1, 1989)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugdetct.phk">bugdetct.phk</A> <tab to=T><TD> 1893<BR><TD> Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugging.guide">bugging.guide</A> <tab to=T><TD> 7040<BR><TD> Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugging.phk">bugging.phk</A> <tab to=T><TD> 7201<BR><TD> Bugs on a Budget, Inexpensive Surveillance, 8-85
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="buggy.phk">buggy.phk</A> <tab to=T><TD> 1579<BR><TD> A little history about the Infinity Transmitter
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugphone.phk">bugphone.phk</A> <tab to=T><TD> 4640<BR><TD> An Automatic Phone Recorder, by Atomic Punk
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="bugstaps.txt">bugstaps.txt</A> <tab to=T><TD> 1891<BR><TD> Bugs and How to Tap Someone's Room by Fireball
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="buildbug.phk">buildbug.phk</A> <tab to=T><TD> 3852<BR><TD> How to Build a Bug Detector by The Gremlin
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="caller">caller</A> <tab to=T><TD> 6623<BR><TD> Notes on Recording Caller ID Signals and Voice Notes
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="callwai.txt">callwai.txt</A> <tab to=T><TD> 2878<BR><TD> The Call Waiting Tap, by The Byte
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="cordless.phk">cordless.phk</A> <tab to=T><TD> 6713<BR><TD> How to listen into cordless phone conversations, by Beowulf
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="datatap.hac">datatap.hac</A> <tab to=T><TD> 3968<BR><TD> Tapping Computer Data is Easy! By Rick Blackmon
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="detectbug.phk">detectbug.phk</A> <tab to=T><TD> 2912<BR><TD> Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dltp1.txt">dltp1.txt</A> <tab to=T><TD> 4738<BR><TD> Detecting Line Taps of C-Net Compatibles
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="dltp2.txt">dltp2.txt</A> <tab to=T><TD> 3585<BR><TD> Detecting Line Taps Part type by C-Net Compatibile
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="eaves1.txt">eaves1.txt</A> <tab to=T><TD> 14460<BR><TD> Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="es.txt">es.txt</A> <tab to=T><TD> 25505<BR><TD> Electronic Bug Detection
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="faxint.phk">faxint.phk</A> <tab to=T><TD> 14663<BR><TD> Fax Machine Interception, from Full Disclosure #23
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fmbug.hac">fmbug.hac</A> <tab to=T><TD> 4736<BR><TD> How to Make an FM Wireless Bug, by Johnny Rotten
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fmphone.bug">fmphone.bug</A> <tab to=T><TD> 2340<BR><TD> Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonebugs.hac">fonebugs.hac</A> <tab to=T><TD> 2199<BR><TD> Bug Detection on Home Phones
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonepole.txt">fonepole.txt</A> <tab to=T><TD> 4097<BR><TD> Climbing Phone Poles- Tips and techniques by The Mad Phone-man
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="foneptch.phk">foneptch.phk</A> <tab to=T><TD> 29642<BR><TD> Building and Using Phone Patches, by Julian Macassey
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="fonesci.phk">fonesci.phk</A> <tab to=T><TD> 18900<BR><TD> The Science of Telephone Surveilance, by Eric The Red
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="intercpt.txt">intercpt.txt</A> <tab to=T><TD> 22529<BR><TD> Pager, Fax, and Data Intercept Techniques
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lbt-alt1.txt">lbt-alt1.txt</A> <tab to=T><TD> 3651<BR><TD> Info on Automatic Line Testers (APR) by RiPMax of Liberty
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lbt-alt2.txt">lbt-alt2.txt</A> <tab to=T><TD> 3796<BR><TD> Automatic Line Testers (SALT) by RiPMaX of Liberty
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lineman.phk">lineman.phk</A> <tab to=T><TD> 6645<BR><TD> Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="listenin.txt">listenin.txt</A> <tab to=T><TD> 4520<BR><TD> How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="lmos.phk">lmos.phk</A> <tab to=T><TD> 4286<BR><TD> How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism32.hac">mism32.hac</A> <tab to=T><TD> 5248<BR><TD> Wiretape Loophole Concerns by Geoffrey S. Goodfellow
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism36.hac">mism36.hac</A> <tab to=T><TD> 12928<BR><TD> Private Audience (The Art of Listening In) by The Overlord
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mism37.hac">mism37.hac</A> <tab to=T><TD> 7040<BR><TD> Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="mobfone.phk">mobfone.phk</A> <tab to=T><TD> 9745<BR><TD> How to Get Into the AT&T Network by Building Your Own Mobile Phone
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="nightl.txt">nightl.txt</A> <tab to=T><TD> 21788<BR><TD> Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phone.tap">phone.tap</A> <tab to=T><TD> 4243<BR><TD> How Many Different Phone Taps Work
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonetap.phk">phonetap.phk</A> <tab to=T><TD> 2896<BR><TD> Bug Detection on Home Phones, by Mr. Jimmy
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phonetap.txt">phonetap.txt</A> <tab to=T><TD> 3767<BR><TD> Phone Tapping, by Lord Jaxom
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="phontap.phk">phontap.phk</A> <tab to=T><TD> 2913<BR><TD> The Call Waiting Tap, by The Byte
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="precord.phk">precord.phk</A> <tab to=T><TD> 5878<BR><TD> Automatic Phone Recorder by Atomic Punk, May 1, 1989
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="ptapping.phk">ptapping.phk</A> <tab to=T><TD> 14476<BR><TD> Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="swtchbrd.phk">swtchbrd.phk</A> <tab to=T><TD> 7031<BR><TD> Building Your Own Switchboard by Autopsy Saw
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapfones.hac">tapfones.hac</A> <tab to=T><TD> 11956<BR><TD> Private Audience: A Basic Guide to the Art of Listening In
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taphones.phk">taphones.phk</A> <tab to=T><TD> 3105<BR><TD> How to Tap Into Your Neighbor's Phones, by Lord Jaxon
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapownline.phk">tapownline.phk</A> <tab to=T><TD> 4533<BR><TD> How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapphon.txt">tapphon.txt</A> <tab to=T><TD> 8303<BR><TD> How to Listen in to Cordless Phone Conversaitons by Beowulf
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapping.phk">tapping.phk</A> <tab to=T><TD> 1644<BR><TD> Bugs and How to Tap Someone's Room, by Fireball
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tapping.txt">tapping.txt</A> <tab to=T><TD> 2468<BR><TD> The Call Waiitng Tap by The Byte and Road Agent
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="taps2.txt">taps2.txt</A> <tab to=T><TD> 4550<BR><TD> Some Information on Phone Taps
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="tempest.txt">tempest.txt</A> <tab to=T><TD> 46237<BR><TD> Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wait.tap">wait.tap</A> <tab to=T><TD> 2683<BR><TD> The Call Waiting Tap by The Byte, Distributed by RAM Kracker
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretap.ana">wiretap.ana</A> <tab to=T><TD> 3896<BR><TD> General Wiretap Information
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretap.txt">wiretap.txt</A> <tab to=T><TD> 13663<BR><TD> Wiretapping Abuse Report on the FBI in 1991
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretapp">wiretapp</A> <tab to=T><TD> 6479<BR><TD> Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
|
||||
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="wiretaps.txt">wiretaps.txt</A> <tab to=T><TD> 23758<BR><TD> Can Wiretaps Remain Cost-Effective? By Robin Hanson
|
||||
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 56 files for a total of 472,516 bytes.</SMALL></TABLE>
|
||||
</BODY>
|
||||
</HTML>
|
201
textfiles.com/phreak/WIRETAPPING/bellinfo.txt
Normal file
201
textfiles.com/phreak/WIRETAPPING/bellinfo.txt
Normal file
@@ -0,0 +1,201 @@
|
||||
|
||||
/-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\
|
||||
! Bell Telephone Info !
|
||||
\-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/
|
||||
|
||||
|
||||
******************************************************************************
|
||||
|
||||
BRIDGING HEADS, RESIDENTIAL AND BUSINESS MULTILINE DISTRIBUTION BOXES, LINE
|
||||
AND TRUNK SPLITTERS, AND OTHER BELL SYSTEM WIRE TERMINATIONS.
|
||||
|
||||
- HOW TO USE, AND/OR ABUSE THEM -
|
||||
|
||||
(INCLUDING A TUTORIAL ON BASIC TELEPHONE EAVESDROPPING TECHNIQUES.)
|
||||
|
||||
******************************************************************************
|
||||
|
||||
WRITTEN BY : PHUCKED
|
||||
AGENT 07/29/84
|
||||
04
|
||||
|
||||
REVISED FOR LOD! 10/84
|
||||
CURRENTLY REVISION II
|
||||
|
||||
****************************************************************************
|
||||
|
||||
IN THIS ARTICLE, I WILL FIRST BESCRIBE THE TERMINATION, WIRING, AND
|
||||
TERMINAL HARDWARE MOST COMMONLY USED IN THE BELL SYSTEM, AND I WILL INCLUDE
|
||||
A SECTION ON METHODS OF USING THEM.
|
||||
|
||||
*****************************************************************************
|
||||
|
||||
-------------
|
||||
LOCAL NETWORK
|
||||
-------------
|
||||
|
||||
THE LOCAL TELEPHONE NETWORK BETWEEN THE CENTRAL OFFICE/EXCHANGE AND
|
||||
THE TELEPHONE SUBSCRIBERS CAN BE BREIFLY DESCRIBED AS FOLLOWS:
|
||||
FROM THE CENTRAL OFFICE (OR LOCAL EXCHANGE) OF A CERTAIN PREFIX(ES),
|
||||
UNDERGROUND AREA FEEDER TRUNKS GO TO EACH AREA THAT HAS THAT PREFIX. (USUALLY
|
||||
MORE THAN ONE PREFIX PER AREA) AT EVERY FEW STREETS OR TRACT AREAS, THE
|
||||
UNDERGROUND CABLES SURFACE. THEY THEN GO TO THE SECONDARY TERMINATION, (THE
|
||||
AERIAL TELEPHONE FEEDER CABLE) (OR BACK UNDERGROUND, DEPENDING ON THE AREA) AND
|
||||
THEN TO THE SUBSRIBERS HOUSE (OR IN THE CASE OF AN APARTMENT BUILDING OR
|
||||
MUTLILINE BUSINESS, TO A SPLITTER OR DISTRIBUTION BOX/PANEL).
|
||||
|
||||
NOW THAT WE HAVE THE BASICS, I'LL TRY AND GO IN-DEPTH ON THE SUBJECT.
|
||||
|
||||
------------------
|
||||
UNDERGROUND CABLES
|
||||
------------------
|
||||
|
||||
THESE ARE SOMETIMES INTEROFFICE TRUNKS, BUT USUALLY IN A RESIDENTIAL AREA
|
||||
THEY ARE FEEDER GROUPS THAT GO OTO BRIDGING HEADS OR DISTRIBUTION CASES. THE
|
||||
CABLES ARE ABOUT 2-3 INCHES THICK (VARIES), AND ARE EITHER IN A METAL OR
|
||||
PVC-TYPE PIPE (OR SIMILAR). RARELY (MAYBE NOT IN SOME REMOTE RURAL AREAS) ARE
|
||||
THE CABLES JUST 'ALONE' IN THE GROUND. INSTEAD, THEY ARE USUALLY IN AN
|
||||
UNDERGROUND CEMENT TUNNEL (RESEMBLES A SMALL SEWER OR STORMDRAIN). THE MANHOLES
|
||||
ARE >HEAVY< AND WILL SAY 'BELL SYSTEM' ON THEM. THEY CAN BE OPEN ED WITH A 1/2
|
||||
INCH WIDE CROWBAR (HOOK SIDE) INSERTED IN THE TOP RECTANGULAR HOLE. IF YOU GET
|
||||
IT OPEN, GO INSIDE!! THERE ARE LADDER RUNGS TO HELP YOU CLIMB DOWN. YOU WILL
|
||||
SEE THE CABLE PIPES ON THE WALL, WITH THE BLUE AND WHITE STRIPED ONE BEING THE
|
||||
INTEROFFICE TRUNK GRP (AT LEAST IN MY AREA). THE OTHERS ARE LOCAL LINES, AND
|
||||
ARE USUALLY MARKED OR COLOR CODED. THERE IS ALMOST ALWAYS A POSTED COLOR CODE
|
||||
CHART ON THE WALL, NOT TO MENTION TELCO MANUALS DESCRIBING THE CABLES AND
|
||||
TERMINALS, SO I NEED NOT GET INTO DETAIL. AGAIN: >IF YOU CAN GET INTO A
|
||||
BELL MANHOLE, DO IT!, IT WILL PAY OFF<. ALSO, THERE IS USUALLY SOME KIND OF
|
||||
TEST EQUIPMENT, AND OFTEN BELL TEST SETS ARE LEFT IN THERE. SO GET YOUR
|
||||
CROWBARS!
|
||||
|
||||
--------------
|
||||
BRIDGING HEADS - (WE MS2'S)
|
||||
--------------
|
||||
|
||||
THE INNOCENT-LOOKING GRAYISH-GREEN BOXES. WHEN IN GROUPS OF TWO OR THREE,
|
||||
THEY ARE FOR SECONDAY/TERTIARY TERMINATION AND ACCESS POINTS (BRIDGED ACCESS).
|
||||
THESE ARE THE WESTERN ELECTRIC SAI 55 OR 22/E TERMINAL CASES. THEY HOLD ON THE
|
||||
ORDER OF 900-1200 CABLE PAIRS. THIS IS USUALLY THE SECOND TERM. POSITION ON THE
|
||||
LOCAL LOOP (AFTER THE MTF FRAME AT THE CO/ OR THE UNDERGROUND 'FTP' POSITION).
|
||||
THESE CAN BE EITHER TRUNK BRIDGES OR BRIDGING FOR RESIDENCES. THE AREA FEEDER
|
||||
BRIDGING HEADS ARE USUALLY LARGER, AND THEY HAVE THE 'WESTERN ELECTRIC' LOGO AT
|
||||
THE BOTTOM, WHEREAS THE NORMAL BRIDGING HEADS (WHICH MAY BE DIFFERENT IN SOME
|
||||
AREAS DEPENDING ON THE COMPANY YOU ARE SERVED BY. GTE B.H'S LOOK SLIGHTLY
|
||||
DIFFERENT. ALSO, DO NOT BE FOOLED BY SPRINKLER BOXES!) CAN BE FOUND IN JUST
|
||||
ABOUT EVERY CITY.
|
||||
TO OPEN A BRIDGING HEAD: IF IT IS LOCKED (AND YOU'RE FEELING DESTRUCTIVE),
|
||||
PUT A HAMMER OR CROWBAR (THE SAME ONE YOU USED ON THE MANHOLE) IN THE SLOT
|
||||
ABOVE THE TOP HINGE OF THE RIGHT DOOR. PULL HARD, AND THE DOOR WILL RIP OFF.
|
||||
VERY EFFECTIVE!
|
||||
IF IT ISN'T LOCKED (AS USUAL), TAKE A 7/16 INCH HEX SOCKET AND WITH IT, TURN
|
||||
THE BOLT ABOUT 1/8 OF A TURN TO THE LEFT (YOU SHOULD HEAR A SPRING RELEASE
|
||||
INSIDE). HOLDING THE BOLT, TURN THE HANDLE ALL THE WAY TO THE RIGHT AND PULL
|
||||
OUT.
|
||||
NOW INSIDE, FIRST CHECK FOR A TEST-SET (WHICH ARE OFTEN LEFT BY BELL
|
||||
EMPLOYEES). THERE SHOULD BE A PANEL OF CABLE PAIRS + SCREW TERMINALS (TYPE
|
||||
45/47IB REGULAR BINDERS) . PUSH THE PANEL BACK ABOUT AN INCH OR SO, AND ROTATE
|
||||
THE TOP LATCH (ROUND WITH A FLAT SECTION) DOWNWARD. RELEASE THE PANEL AND IT
|
||||
WILL FALL ALL THE WAY FORWARD. THERE IS USUALLY A LARGE AMOUNT OF WIRE AND
|
||||
EXTRA TERMINALS. THE TEST-SETS ARE OFTEN HIDDEN HERE, SO DONT OVERLOOK IT (400
|
||||
FOOT ROLLS OF #22 SOLID WIRE ARE OFTEN NEAR THE TOP IN THE BACK OF THE BOX.
|
||||
'BORROW THEM'). ON THE RIGHT DOOR IS A METAL BOX OF INSULATORS, BINDERS, CLIPS,
|
||||
ETC. TAKE A FEW (COMPLIMENTS OF BELL...). ON EACH DOOR IS A USEFUL ROUND METAL
|
||||
DEVICE. (SAYS 'INSERT GENTLY' OR 'CLAMP GENTLY - DO NOT OVERTIGHTEN' ETC..) ON
|
||||
THE FRONT OF THE DISC, YOU SHOULD FIND TWO TERMINALS. THESE ARE FOR YOUR TEST
|
||||
SET. (IF YOU DONT HAVE ONE, DONT DEPAIR -I'LL SHOW YOU WAYS TO MAKE BASIC TEST
|
||||
SETS LATER IN THIS ARTICLE). HOOKING THE RING (-) WIRE TO THE 'R' TERMINAL; AND
|
||||
THE TIP (+) WIRE TO THE OTHER. (BY THE WAY, AN EASY WAY TO DETERMINE THE
|
||||
CORRECT POLARITY IS WITH A 1.5V LED. TAP IT TO THE TERM. PAIR, IF IT DOESNT
|
||||
LIGHT, SWITCH THE POLES UNTIL IT DOES. WHEN IT LIGHTS, FIND THE LONGER OF THE
|
||||
TWO LED POLES. THIS ONE WILL BE ON THE TIP WIRE (+)) BEHIND THE DISC IS A
|
||||
COILED UP CORD. THIS SHOULD HAVE A SPECIALIZED CONNECTOR. ITS VERY USEFUL,
|
||||
BECAUSE YOU DONT HAVE TO KEEP CONNECTING AND DISCONNECTING THE FONE (TEST SET)
|
||||
ITSELF, AND THE CLIP IS DESIGNED TO AID IN LOCATING THE PAIR AND ASSURING THE
|
||||
CORRECT POLARITY.
|
||||
ON THE TERMINAL BOARD, THERE SHOULD BE ABOUT 20 PAIRS (RED/WHITE) PER ROW
|
||||
PER SIDE. HOOK THE CLIP TO ANY TERMINAL PAIR, AND YOU'RE SET! DIAL OUT IF YOU
|
||||
WANT, OR JUST LISTEN (IF SOMEONE'S ON THE LINE). LATER, I'LL SHOW YOU A WAY TO
|
||||
SET UP A TRUE 'TAP' THAT YOU CAN SETUP, AND WILL LET THE PERSON DIAL OUT ON HIS
|
||||
LINE AND RECEIVE CALLS AS NORMAL, AND YOU CAN LISTEN IN THE WHOLE TIME. MORE
|
||||
ABOUT THIS LATER...
|
||||
ON MAJOR PREFIX-AREA BRIDGING HEADS ('SAI' FOR AREA C.O. FEEDER CABLE) YOU
|
||||
CAN SEE TEMPORARY 'LOCAL LOOPS', WHICH ARE TWO CABLE PAIRS (CABLE PAIR =RING +
|
||||
TIP, A FONE LINE) THAT ARE DIRECTLY CONNECTED TO EACH OTHER ON THE TERMINAL
|
||||
BOARD. THESE 'CHEAP LOOPS' AS THEY ARE CALLED, DO NOT WORK NEARLY AS WELL AS
|
||||
THE EXISTING ONES SET UP IN THE SWITCHING HARDWARE AT THE EXCHANGE OFFICE. (TRY
|
||||
SCANNING YOUR PREFIXES' 00XX OR 99XX #'S. THE TONE SIDES WILL ANNOUNCE
|
||||
THEMSELVES WITH THE 1000 HZ LOOP TONE, AND THE HANG SIDE WILL GIVE NO RESPONSE.
|
||||
THE FIRST PERSON SHOULD DIAL THE 'HANG' SIDE, AND THE OTHER PERSON DIAL THE,
|
||||
TONE SIDE, AND THE TONE SHOULD STOP IF YOU HAVE GOT THE RIGHT LOOP). THE LOOPS
|
||||
ARE USED IN FRAME TERMINATION AND IN SONIC/600 OHM TERM. TESTING AND
|
||||
LINE/CABLE/FEEDER LOCATION.
|
||||
IF YOU WANT TO FIND THE NUMBER OF THE LINE THAT YOU'RE ON, YOU CAN EITHER
|
||||
TRY TO DECIPHER THE 'BRIDGING LOG' (OR WHATEVER), WHICH IS ON THE LEFT DOOR. IF
|
||||
THAT DOESNT WORK, YOU CAN USE THE FOLLWING:
|
||||
|
||||
---
|
||||
ANI # (AUTOMATIC NUMBER INDENTICATION)
|
||||
---
|
||||
THIS IS A TELCO TEST NUMBER THAT REPORTS TO YOU THE NUMBER THAT YOU'RE
|
||||
CALLING FROM (IT'S THE SAME, CHOPPY 'BELL BITCH' VOICE THAT YOU GET WHEN YOU
|
||||
REACH A DISCONNECTED #) (PIP OR ONE OF THE 11X SERIES ANNOUNCE MENT FRAME
|
||||
MACHINES.)
|
||||
|
||||
FOR THE 213 NPA - DIAL 1223
|
||||
213 NPA - (GTE AREAS) DIAL 114
|
||||
408 NPA - DIAL 760
|
||||
914 NPA - DIAL 990
|
||||
|
||||
THESE ARE EXTREMELY USEFUL WHEN MESSING WITH ANY KIND OF LINE TERMINALS,
|
||||
FEEDER BOXES, ETC.
|
||||
|
||||
WHEN FINISHED, BE SURE TO CUT OFF THE CONNECTOR AND TAKE IT WITH YOU (THEY
|
||||
ARE VERY HANDY), AND CLOSE/LATCH THE BOX TO AVOID SUSPICION.
|
||||
|
||||
|
||||
"CANS" - AERIAL-MOUNTED (TELEPHONE POLE TERMINAL) BRANCH FEEDER CABLE
|
||||
SPLITTER.
|
||||
----
|
||||
|
||||
BASICALLY, TWO TYPES:
|
||||
|
||||
1> MS3A SERVICE AREA INTERFACE. (LARGE, RECTANGULAR SILVER BOX AT THE END OF
|
||||
EACH STREET.)
|
||||
|
||||
2> SERIES 600 LOADING COIL, INCLUDES THE MSX AERIAL DROP SPLITTER. (BLACK,
|
||||
ROUND OR RECTANGULAR THING AT EVERY TELEPHONE POLE.)
|
||||
|
||||
|
||||
TYPE 1 - THIS IS THE CASE THAT TAKES THE UNDERGROUND CABLE FROM THE BRIDGER
|
||||
AND RUNS IT TO THE AERIAL BRANCH FEEDER CABLE (THE LOWEST, LARGEST WIRE ON THE
|
||||
TELEPHONE POLE). THE BOX IS ALWAYS ON THE POLE NEAREST THE BRIGING HEAD, WHERE
|
||||
THE LINE COMES UP. LOOK FOR THE 'CALL BEFORE YOU DIG - UNDERGROUND CABLE'
|
||||
STICKERS..
|
||||
THE CASE BOX IS HINGED, SO IF YOU WANT TO CLIMB THE POLE, YOU CAN OPEN IT
|
||||
WITH NO PROBLEMS. THESE USUALLY HAVE 2 ROWS OF TERMINAL SETS. (TOTAL APPROX.
|
||||
200-600 PAIRS, DEPENDING ON THE AREA.) THESE ARE ALL THE CABLE PAIRS FOR YOUR
|
||||
STREET. (ITS SIMILAR TO A MINIATURE BRIDGING HEAD). USE/ABUSE IT IN THE SAME
|
||||
MANNER AS WE DID BEFORE. (NOTE: ALL THE ACTIVE LINES CARRY FROM 15 TO 48 VDC,
|
||||
AND EVEN 90VAC (WHEN RINGING), SO BE CAREFUL - IT'S NOT GOING TO HURT YOU,
|
||||
BUT IT CAN SURPRISE YOU (AND IF YOU'RE HANGING BY ONE HAND FROM A TEL. POLE, IT
|
||||
>CAN< BE HARMFUL!))
|
||||
OH, BY THE WAY, IF YOU USE ANI ON EVERY PAIR AND YOU FIND ONE THAT ISNT IN
|
||||
USE ON YOUR STREET, YOU CAN HOOK IT UP FOR YOURSELF (ALMOST). ALSO, YOU HAVE TO
|
||||
BE ABLE TO IMPERSONATE A TELCO TECHNICIAN AND REPORT THE NUMBER AS 'NEW ACTIVE'
|
||||
(GIVING A FAKE NAME AND FAKE REPORT, ETC) I DONT RECOMMEND THIS AND IT PROBABLY
|
||||
WONT (ALMOST POSITIVELY WONT) WORK, BUT THIS IS BASICALLY WHAT TELCO LINEMEN
|
||||
DO).*
|
||||
|
||||
* THE USE OF THE 'TEST BOARD' (A 7D# FOR LINEMEN TESTS, OFTEN FOUND
|
||||
NXX-0003 OR NXX-0004) IS BEYOND THE SCOPE OF THIS ARTICLE, BUT WILL BE COVERED
|
||||
IN A FUTURE ARTICLE.
|
||||
|
||||
|
||||
TYPE 2 - THIS IS THE SPLITTER BOX FOR THE AERIAL DROP WIRES FOR THE GROUP OF
|
||||
HOUSES AROUND THE POLE. (USUALLY 4 OR 5 HOUSES). USE IT LIKE I MENTIONED
|
||||
BEFORE. THE TERMINALS (20 OR SO) WILL BE IN 2 HORIZONTAL ROWS OF SETS. THE
|
||||
EXTRA WIRES THAT ARE JUST 'HANGING THERE' ARE PROVISIONS FOR EXTRA LINES TO
|
||||
RESIDENCES (1 EXTRA LINE PER HOUSE, THATS WHY THE INSANE CHARGE FOR LINE #3).
|
||||
IF ITS THE BOX FOR YOUR HOUSE ALSO, HAVE FUN AND SWAP LINES WITH YOUR NEIGHBOR!
|
||||
'PIGGYBACK' THEM OR USE A CHEESEBOX FOR A LOOP-AROUND, ETC. AGAIN, I DONT
|
||||
RECOMMEND THIS, AND ITS DIFFICULT TO DO IT CORRECTLY. (ALTHOUGH USEFUL)
|
208
textfiles.com/phreak/WIRETAPPING/bug.txt
Normal file
208
textfiles.com/phreak/WIRETAPPING/bug.txt
Normal file
@@ -0,0 +1,208 @@
|
||||
|
||||
Automatic Phone Recorder
|
||||
|
||||
by
|
||||
|
||||
Atomic Punk
|
||||
|
||||
May 1, 1989
|
||||
|
||||
This device will allow any standard cassette tape recorder the
|
||||
ability to automatically record phone conversations. The device
|
||||
will start the tape recorder when the phone handset is lifted and
|
||||
stop the recorder when the handset is returned to the cradle.
|
||||
|
||||
The device is a DC switch that is normally on via the forward
|
||||
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
|
||||
biasing its complement well into a saturated state via R4. The
|
||||
DC switch is turned off via a negative voltage above that of the
|
||||
Zener (D1). This voltage is usually about 48 volts and is the on
|
||||
hook value of the phone line. This negative voltage over rides
|
||||
the effect of R3 and keeps the circuit off. When the phone is
|
||||
off the hook, the 48 volts drops to 10 volts, which is below the
|
||||
[more]
|
||||
|
||||
zener voltage of D1, and R3 now turns the circuit on. Audio
|
||||
signal is via attenuator resistor R1 and DC isolating capacitors
|
||||
C1 and C2.
|
||||
|
||||
This device is really only a high impedance switch that isolates
|
||||
the recording controlled device from the phone line via some
|
||||
simple electronic circuitry. It requires no battery and obtains
|
||||
power for operating from the remote jack that in most recorders
|
||||
is a source of 6 volts. When the remote jack is grounded,
|
||||
recorder operation starts, and when the grounding condition is
|
||||
removed, recorder operation stops.
|
||||
|
||||
Parts list: Here's all you need:
|
||||
|
||||
Name Qty Description
|
||||
R4 1 220 ohm 1/4 watt resistor
|
||||
R3 1 39k ohm 1/4 watt resistor
|
||||
R1 & R2 2 100k ohm 1/4 watt resistor
|
||||
C1 & C2 2 0.01 mfd/ 50V disc cap.
|
||||
Q2 1 PN2222 NPN Silicon
|
||||
Q1 1 PN2907 NPN Silicon
|
||||
[more]
|
||||
|
||||
Z1 1 15 volt Zener diode
|
||||
P1 1 Sub-mini plug 2.5mm dia.
|
||||
CL1 & CL2 2 Alligator clips
|
||||
P2 1 Mini-Plug 3.5mm dia.
|
||||
Enclosure 1 Suitable enclosure for device
|
||||
PB1 1 1.25x1.67 perfboard
|
||||
WR4 (18") #24 hook-up black wire
|
||||
WR3 (18") #24 hook-up red wire
|
||||
Casto Castolite or paraffin wax
|
||||
|
||||
[more]
|
||||
|
||||
Circuit Diagram
|
||||
|
||||
|
||||
Red wire
|
||||
----------|---------Z1--------|--------------------|--------|----------
|
||||
| | | |
|
||||
Green | | | |
|
||||
-----| | | | |
|
||||
| | | | |
|
||||
| | | e |
|
||||
| | | | |
|
||||
| | R3 |-----R4---b-Q2 |---P1
|
||||
| | *No connection* | | | |To remote
|
||||
| | | c c |of
|
||||
| *|* | | | |recorder
|
||||
|--- | ------------------|-----b-Q1 | |
|
||||
| | | | |
|
||||
| | e | |
|
||||
| | |------------|--------|
|
||||
| |
|
||||
| | C1
|
||||
[more]
|
||||
|
||||
| |----------------------------3 3-----------------|
|
||||
| |
|
||||
| |---P2
|
||||
| C2 |To Aux
|
||||
|--------------R1-----------------3 3-----------------|on
|
||||
Recorder
|
||||
|
||||
** Green and Red wires go to corresponding color of telephone wires.
|
||||
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
|
||||
with the wires facing toward you and flat side up.
|
||||
- c is the located on the upper right hand side
|
||||
- b is the next wire left of c
|
||||
- e is the next wire left of b
|
||||
|
||||
Anyway that concludes this circuit. Now you'll be able to
|
||||
monitor your phone line, and hear what goes on while you not
|
||||
around.
|
||||
|
||||
**** Coming soon ******
|
||||
How to safely build waterproof M-80s.
|
||||
|
||||
(>
|
||||
(>
|
||||
(>
|
||||
|
||||
Automatic Phone Recorder
|
||||
|
||||
by
|
||||
|
||||
Atomic Punk
|
||||
|
||||
May 1, 1989
|
||||
|
||||
This device will allow any standard cassette tape recorder the
|
||||
ability to automatically record phone conversations. The device
|
||||
will start the tape recorder when the phone handset is lifted and
|
||||
stop the recorder when the handset is returned to the cradle.
|
||||
|
||||
The device is a DC switch that is normally on via the forward
|
||||
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
|
||||
biasing its complement well into a saturated state via R4. The
|
||||
DC switch is turned off via a negative voltage above that of the
|
||||
Zener (D1). This voltage is usually about 48 volts and is the on
|
||||
hook value of the phone line. This negative voltage over rides
|
||||
the effect of R3 and keeps the circuit off. When the phone is
|
||||
off the hook, the 48 volts drops to 10 volts, which is below the
|
||||
[more]
|
||||
|
||||
zener voltage of D1, and R3 now turns the circuit on. Audio
|
||||
signal is via attenuator resistor R1 and DC isolating capacitors
|
||||
C1 and C2.
|
||||
|
||||
This device is really only a high impedance switch that isolates
|
||||
the recording controlled device from the phone line via some
|
||||
simple electronic circuitry. It requires no battery and obtains
|
||||
power for operating from the remote jack that in most recorders
|
||||
is a source of 6 volts. When the remote jack is grounded,
|
||||
recorder operation starts, and when the grounding condition is
|
||||
removed, recorder operation stops.
|
||||
|
||||
Parts list: Here's all you need:
|
||||
|
||||
Name Qty Description
|
||||
R4 1 220 ohm 1/4 watt resistor
|
||||
R3 1 39k ohm 1/4 watt resistor
|
||||
R1 & R2 2 100k ohm 1/4 watt resistor
|
||||
C1 & C2 2 0.01 mfd/ 50V disc cap.
|
||||
Q2 1 PN2222 NPN Silicon
|
||||
Q1 1 PN2907 NPN Silicon
|
||||
[more]
|
||||
|
||||
Z1 1 15 volt Zener diode
|
||||
P1 1 Sub-mini plug 2.5mm dia.
|
||||
CL1 & CL2 2 Alligator clips
|
||||
P2 1 Mini-Plug 3.5mm dia.
|
||||
Enclosure 1 Suitable enclosure for device
|
||||
PB1 1 1.25x1.67 perfboard
|
||||
WR4 (18") #24 hook-up black wire
|
||||
WR3 (18") #24 hook-up red wire
|
||||
Casto Castolite or paraffin wax
|
||||
|
||||
[more]
|
||||
|
||||
Circuit Diagram
|
||||
|
||||
|
||||
Red wire
|
||||
----------|---------Z1--------|--------------------|--------|----------
|
||||
| | | |
|
||||
Green | | | |
|
||||
-----| | | | |
|
||||
| | | | |
|
||||
| | | e |
|
||||
| | | | |
|
||||
| | R3 |-----R4---b-Q2 |---P1
|
||||
| | *No connection* | | | |To remote
|
||||
| | | c c |of
|
||||
| *|* | | | |recorder
|
||||
|--- | ------------------|-----b-Q1 | |
|
||||
| | | | |
|
||||
| | e | |
|
||||
| | |------------|--------|
|
||||
| |
|
||||
| | C1
|
||||
[more]
|
||||
|
||||
| |----------------------------3 3-----------------|
|
||||
| |
|
||||
| |---P2
|
||||
| C2 |To Aux
|
||||
|--------------R1-----------------3 3-----------------|on
|
||||
Recorder
|
||||
|
||||
** Green and Red wires go to corresponding color of telephone wires.
|
||||
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
|
||||
with the wires facing toward you and flat side up.
|
||||
- c is the located on the upper right hand side
|
||||
- b is the next wire left of c
|
||||
- e is the next wire left of b
|
||||
|
||||
Anyway that concludes this circuit. Now you'll be able to
|
||||
monitor your phone line, and hear what goes on while you not
|
||||
around.
|
||||
|
||||
**** Coming soon ******
|
||||
How to safely build waterproof M-80s.
|
40
textfiles.com/phreak/WIRETAPPING/bugdetct.phk
Normal file
40
textfiles.com/phreak/WIRETAPPING/bugdetct.phk
Normal file
@@ -0,0 +1,40 @@
|
||||
|
||||
|
||||
File: BUG DETECTION AT HOME
|
||||
Read 24 times
|
||||
|
||||
Bug Detection on Home phones
|
||||
(COURTESY OF DR JIMMY AND MR JIM)
|
||||
|
||||
First of all to test for bugs, you need a VOM (Multimeter) the higher the
|
||||
impedance the better (a Digital with FET circuitry or a Vacuum Tube Volt Meter
|
||||
is the best).
|
||||
|
||||
First disconnect the phone line(s) AT BOTH ENDS. Undo the phone instrument and
|
||||
hook it up to the entry point of the phone line from the outside world (Ma Bell
|
||||
does not like you cut her off completely.) The scheme is the physically
|
||||
isolate your house, apartment, etc from the outside world. But before you do
|
||||
this measure the line voltage (It should be approximately 48 Volts).
|
||||
|
||||
Now with the wires disconnected at both ee set your resistance scale to a high
|
||||
reading and measure the resistance of the phone line, it should be very high on
|
||||
the order of million ohms or more, this is the normal condition, since you
|
||||
are measuring the resistance of an open circuit. If it is much less, say
|
||||
50-100Kohms then you a device on the line that does not belong there, probably
|
||||
a parallel bug.
|
||||
|
||||
Now twist the end of the disconnected wire and go to the other end and measure
|
||||
the resistance of this. This resistance should be about one ohm or two at the
|
||||
most in a big house with a lot of phones. If it is more, then you probably
|
||||
have a series bug.
|
||||
|
||||
If in the first case, taking parallel measurements using a meter (not LED/LCD)
|
||||
and you notice a "kick" in the needle, you probably have a line tap
|
||||
|
||||
Now if you also make a measurement with the wire end twisted together and you
|
||||
notice the resistance reads about 1-2kohms, then you may have a drop-out relay.
|
||||
A drop-out relay is a relay that senses a phone going off hook, and signals a
|
||||
tape recorder to start recording.
|
||||
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
BIN
textfiles.com/phreak/WIRETAPPING/bugging.guide
Normal file
BIN
textfiles.com/phreak/WIRETAPPING/bugging.guide
Normal file
Binary file not shown.
121
textfiles.com/phreak/WIRETAPPING/bugging.phk
Normal file
121
textfiles.com/phreak/WIRETAPPING/bugging.phk
Normal file
@@ -0,0 +1,121 @@
|
||||
Bugs on a Budget
|
||||
Inexpensive surveillance
|
||||
Data Line 8-85.
|
||||
|
||||
Post this phile as you will, but leave my name on it.
|
||||
|
||||
Gordon Liddy dreamt up an elaborate scheme for bugging the Democratic National
|
||||
Headquarters. Included were such things as a type of UHF bug that required an
|
||||
O-scope for the listeners to find, and other bugs that got power thru paint-on
|
||||
electrical connectors. He was also financed out of a slush fund controlled by
|
||||
the most powerful men in the nation.
|
||||
|
||||
I'm not that lucky. My money comes from a "Blue" collar job, so spending $5k
|
||||
on a bug is laughable. Still, not getting the information I need because I
|
||||
couldn't find any appropriate devices is just as silly. With a small bit of
|
||||
skill, you can build a reliable intelligence collecting system for about $250.
|
||||
|
||||
|
||||
1. FOR LIVE SETUPS. If it's important or your targets are just paranoid,
|
||||
forget about phone taps. They may set up a meeting place on the line and that
|
||||
is about it. Besides, you can do a huge amount of random eavesdropping with a
|
||||
live collection system. You'll need a good cardioid mike element, amplifier,
|
||||
and set of headphones. The most efficient way to go is to purchase a Hunter's
|
||||
or Bionic Ear (See the Sources section at the end for locations). They run from
|
||||
$50 to $90. Everything is included in a package that looks a lot like a metal
|
||||
police flashlight. But to narror the collection angle, a parabolic dish is
|
||||
essential. Don't get the one available with the Ear, it's small and you'll look
|
||||
dumb using it. Instead, but ETCO's 18" dish for about $35. Bend 3 heavy wires
|
||||
(e.g. welding rods) to grip the dish edge and syspend the Ear in the center. I
|
||||
used a hose clamp to secure it. Rubber bands link he support rods at te rear of
|
||||
the dish. Note: the focus is at a point intersected by the plane of the dish
|
||||
and a line extending out from the plastic "pip" in te center. Since the dish is
|
||||
transparent and the amp faces the target, the setup isn't too conspicuous from a
|
||||
distance. The regular commercial reflector is black and quite obvious when in
|
||||
use.
|
||||
|
||||
How good is the system? My hearing is below par and I was able to understand
|
||||
whispers at 30m. The range you get may differ. In summer, crickets will drown
|
||||
out a lot. Traffic and overhead jets can also do nasty things. Oh yes, there's
|
||||
an automatic cutoff so if the target coughs, you won't have to pick up your
|
||||
eardrums from the ground.
|
||||
|
||||
|
||||
|
||||
2. VISUAL SURVEILLANCE. Sometimes this is all you need, but mostly it
|
||||
complements the audio. Forget the 17x80 monster binoculars you saw in Soldier
|
||||
of Fortune. If a gnat on your arm farts, the scene will jump. Instead save a
|
||||
lot of money and get one or two more suitable pieces of equipment. One is a
|
||||
good pair of 7x50 binoculars. Buy from a wholesale place in Shotgun News and
|
||||
save big. These can be used well at night because of their large objective
|
||||
size. Some like a zoom feature, but I find it raises price and at these powers
|
||||
isn't needed.
|
||||
|
||||
Personally, I like to get further away and stay stationary for as long as
|
||||
possible. Of course the parabolic setup is no good for audio at such a range
|
||||
(100 to 300m). Oddly, I've never felt handicapped by not being able to hear the
|
||||
action. You'd be surprised what lipreading and nonverbal cues you can pick up
|
||||
with a little practice. I use a 20-60x60mm. spotting scope. It comes mounted
|
||||
on a tripod for flat surface use, but I find a photographers C-clamp tripod is
|
||||
handier for using on car windows. In daylight nothing can come close to this
|
||||
system. It's less than 1/2m long and at 60x it's actually easy to reas
|
||||
newspaper headlines at 1Km or so. After all, these things were meant to spor
|
||||
bullet holes in targets at up to 500m and the cheapest low power spotter will do
|
||||
that with no problem. Just how much is 60x ? Well, most rifle scopes are 4x,
|
||||
binoculars are typically 7x, and the classic sniper scopes (Unertl and
|
||||
Leatherwood) are only 10x. Just look through one at a sporting goods store and
|
||||
you'll see what a deal these are. Astronomy-type telescopes usually are too
|
||||
big, show an upside-down image, and have too much magnification for their
|
||||
objective size, making the view too dark.
|
||||
|
||||
In fact, at night the spotter is a bit dim even at only 20x. Nothing's
|
||||
perfect.
|
||||
|
||||
|
||||
|
||||
3. WIRELESS. Here's the area most people immediately go for and sometimes
|
||||
get suckered real bad. Worst are "Law Enforcement Supply" places. Some sell to
|
||||
anyone with a letterhead. For the money they charge, it actually makes no
|
||||
difference who you are; besides it's YOU who will get nailed for impersonating a
|
||||
cop if THEY decide to turn you in. One of these joints advertises in Soldier of
|
||||
Fortune and chagres $10 for their catalog. Its full of neat shit, all at least
|
||||
5x over what anyone else could even think of charging. ETCO, on the other hand,
|
||||
sells lots of transmitters for "wireless mikes". They also sell cheap mike
|
||||
elements. Hmmm. For $25 you can build a workable unit. Nothing Harry Call
|
||||
would be caught using, but usable nonetheless. Those little wireless mikes you
|
||||
see in the backs of magazines shown next to a paper clip are really quite good,
|
||||
but make sure they use the Mercury batteries. Even Alkalines will crap out
|
||||
after a few hours of constant transmitting.
|
||||
|
||||
Those and most inexpensive transmitters work in the Commercial FM Band. The
|
||||
good news is that you don't need a VHF receiver to pick them up, a regular FM
|
||||
set does fine. Unfortunately, the same goes for the target. The best way out
|
||||
is to find a station at either end of the band (88 or 108) that the target isn't
|
||||
likely to listen to. In St. Louis it's KMJM at 107.7, an all Black station
|
||||
(assuming the target is a WASPish businessman or a rocker) . Set your bug to
|
||||
transmit on top of the station, and get in REAL CLOSE with your receiver. Since
|
||||
it's at the end of tha dial, he/she isn't likely to tune past it and get a jolt
|
||||
of audio feedback.
|
||||
|
||||
Finally, a bit of common sense. Wireless equipment should not take up a large
|
||||
portion of your budget. It's hard to place, risky to maintain, and will be
|
||||
destroyed if found. Also, the cops sort of look down on this sort of thing to
|
||||
the tune of Federal time. Watergate did a lot to influence that. Don't be a
|
||||
putz and try to break in a place to recover a $40 transmitter. Consider them
|
||||
disposable and you may stay free.
|
||||
|
||||
|
||||
4.GETTING IT DOWN. Buy a Voice-activated (VOX) microcassette. It'll free you
|
||||
up for more important stuff than listening to silence or irrelevant bullshit.
|
||||
Especially with transmitters, a lot of time is just wasted. Live monitoring is
|
||||
fun... for fifteen minutes. A good unit is the Panasonic RN 109A at about $50.
|
||||
It'll record 1 hour per side at low speed. With the VOX on, that's an hour of
|
||||
solid sound. Use one on the parabolic dish, too. Replay through your stereo
|
||||
and use the equalizer or tone controls to sharpen up the stuff you may have
|
||||
missed the first time.
|
||||
|
||||
Stay tuned to this BBS for more philes from Data Line, the Old Man who taught
|
||||
Donald Segretti how to rig his first election in college.
|
||||
|
||||
MCI Telex # 650-240-6356.
|
||||
|
30
textfiles.com/phreak/WIRETAPPING/buggy.phk
Normal file
30
textfiles.com/phreak/WIRETAPPING/buggy.phk
Normal file
@@ -0,0 +1,30 @@
|
||||
|
||||
IN ANSWER TO ALL THOSE WHO DON'T KNOW WHAT AN INFINITY TRANSMITTER IS, HERE
|
||||
IS A LITTLE HISTORY:
|
||||
|
||||
A GUY BY THE NAME OF MANNY MITTLEMAN RAN A COMPANY CALLED THE WIRELESS GUITAR
|
||||
COMPANY LOCATED ON LIBERTY ST. IN NY. ASIDE FROM WIRELESS GUITARS, MANNY ALSO
|
||||
BUILT ALL SORTS OF ELECTRONIC WIRELESS "BUGS". ONE ITEM, THE INFINITY
|
||||
TRANSMITTER WAS A DEVICE THAT WAS PLACED INSIDE AN UNSUSPECTING PERSONS
|
||||
TELEPHONE. WHEN THE PHONE NUMBER OF THAT TELEPHONE WAS DIALED AND A CERTAIN
|
||||
NOTE WAS BLOWN INTO THE PHONE FROM A HOHNER, KEY-OF-C, HARMONICA, THE BUGGED
|
||||
PHONE DID NOT RING, AND WHAT'S MORE, ENABLED THE CALLER TO THEN HEAR EVERYTHING
|
||||
SAID IN THE ROOM THAT THE PHONE WAS LOCATED IN. AS LONG AS THE CALLER WANTED
|
||||
TO STAY ON THE PHONE, ALL WAS OPEN TO HIM OR HER. IF THE PHONE WAS LIFTED OFF
|
||||
THE HOOK, THE TRANSMITTER WAS DISCONECTED AND THE "BUGGED" PARTY RECEIVED A
|
||||
DIAL TONE AS IF NOTHING WAS WRONG WITH THE LINE.
|
||||
|
||||
REMEMBER, ALL THIS WAS CONSTRUCTED IN THE 1960x'S WHEN IC'S WERE NOT AS
|
||||
COMMONPLACE AS THEY ARE TODAY. ALSO BEAR IN MIND THAT DURING THAT PERIOD IN
|
||||
TIME, EVEN THE TELEPHONE COMPANY WAS NOT QUITE SURE ON HOW WELL OR HOW PORTABLE
|
||||
TONE DECODING WAS.
|
||||
|
||||
MY HAT IS STILL OFF TO TO MANNY MITTLEMAN, THE GREATEST DEVELOPER OF
|
||||
TELEPHONE GIMMICKERY AND BUGGER OF HOTEL ROOMS IN DIVORCE CASES.
|
||||
|
||||
IF THERE IS ANY INTEREST ON BUGGING, I'LL BE GLAD TO LET YOU KNOW SOME MORE
|
||||
OF MANNY'S STUFF.
|
||||
|
||||
PS. MANY GOVERNMENT AGENCY'S WERE SOME OF MANNY'S BEST CUSTOMERS.
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
96
textfiles.com/phreak/WIRETAPPING/bugphone.phk
Normal file
96
textfiles.com/phreak/WIRETAPPING/bugphone.phk
Normal file
@@ -0,0 +1,96 @@
|
||||
bugoph phone.txt
|
||||
Automatic Phone Recorder
|
||||
|
||||
by
|
||||
|
||||
Atomic Punk
|
||||
|
||||
May 1, 1989
|
||||
|
||||
This device will allow any standard cassette tape recorder the
|
||||
ability to automatically record phone conversations. The device
|
||||
will start the tape recorder when the phone handset is lifted and
|
||||
stop the recorder when the handset is returned to the cradle.
|
||||
|
||||
The device is a DC switch that is normally on via the forward
|
||||
biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
|
||||
biasing its complement well into a saturated state via R4. The
|
||||
DC switch is turned off via a negative voltage above that of the
|
||||
Zener (D1). This voltage is usually about 48 volts and is the on
|
||||
hook value of the phone line. This negative voltage over rides
|
||||
the effect of R3 and keeps the circuit off. When the phone is
|
||||
off the hook, the 48 volts drops to 10 volts, which is below the
|
||||
[more] zener voltage of D1, and R3 now turns the circuit on. Audio
|
||||
signal is via attenuator resistor R1 and DC isolating capacitors
|
||||
C1 and C2.
|
||||
|
||||
This device is really only a high impedance switch that isolates
|
||||
the recording controlled device from the phone line via some
|
||||
simple electronic circuitry. It requires no battery and obtains
|
||||
power for operating from the remote jack that in most recorders
|
||||
is a source of 6 volts. When the remote jack is grounded,
|
||||
recorder operation starts, and when the grounding condition is
|
||||
removed, recorder operation stops.
|
||||
|
||||
Parts list: Here's all you need:
|
||||
|
||||
Name Qty Description
|
||||
R4 1 220 ohm 1/4 watt resistor
|
||||
R3 1 39k ohm 1/4 watt resistor
|
||||
R1 & R2 2 100k ohm 1/4 watt resistor
|
||||
C1 & C2 2 0.01 mfd/ 50V disc cap.
|
||||
Q2 1 PN2222 NPN Silicon
|
||||
Q1 1 PN2907 NPN Silicon
|
||||
[more] Z1 1 15 volt Zener diode
|
||||
P1 1 Sub-mini plug 2.5mm dia.
|
||||
CL1 & CL2 2 Alligator clips
|
||||
P2 1 Mini-Plug 3.5mm dia.
|
||||
Enclosure 1 Suitable enclosure for device
|
||||
PB1 1 1.25x1.67 perfboard
|
||||
WR4 (18") #24 hook-up black wire
|
||||
WR3 (18") #24 hook-up red wire
|
||||
Casto Castolite or paraffin wax
|
||||
|
||||
[more] Circuit Diagram
|
||||
|
||||
|
||||
Red wire
|
||||
----------|---------Z1--------|--------------------|--------|----------
|
||||
| | | |
|
||||
Green | | | |
|
||||
-----| | | | |
|
||||
| | | | |
|
||||
| | | e |
|
||||
| | | | |
|
||||
| | R3 |-----R4---b-Q2 |---P1
|
||||
| | *No connection* | | | |To remote
|
||||
| | | c c |of
|
||||
| *|* | | | |recorder
|
||||
|--- | ------------------|-----b-Q1 | |
|
||||
| | | | |
|
||||
| | e | |
|
||||
| | |------------|--------|
|
||||
| |
|
||||
| | C1
|
||||
[more] | |----------------------------<2D> <20>-----------------|
|
||||
| |
|
||||
| |---P2
|
||||
| C2 |To Aux
|
||||
|--------------R1-----------------<2D> <20>-----------------|on
|
||||
Recorder
|
||||
|
||||
** Green and Red wires go to corresponding color of telephone wires.
|
||||
** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
|
||||
with the wires facing toward you and flat side up.
|
||||
- c is the located on the upper right hand side
|
||||
- b is the next wire left of c
|
||||
- e is the next wire left of b
|
||||
|
||||
Anyway that concludes this circuit. Now you'll be able to
|
||||
monitor your phone line, and hear what goes on while you not
|
||||
around.
|
||||
|
||||
**** Coming soon ******
|
||||
How to safely build waterproof M-80s.
|
||||
|
||||
(>
|
48
textfiles.com/phreak/WIRETAPPING/bugstaps.txt
Normal file
48
textfiles.com/phreak/WIRETAPPING/bugstaps.txt
Normal file
@@ -0,0 +1,48 @@
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
% BUGS & %
|
||||
% HOW TO TAP SOMEONES ROOM %
|
||||
% %
|
||||
% BY ---> *$> FIREBALL <$* %
|
||||
% %
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
|
||||
HAVE YOU EVER HAD A STRONG DESIRE TO KNOW WHAT BOY YOUR OLDER SISTER LIKES
|
||||
OR HOW YOUR PARENTS SEX LIFE IS GOING, WELL NOW YOU CAN KNOW ALL BY
|
||||
BUGGING THERE ROOMS!
|
||||
|
||||
THE FIRST THING YOU CAN USE IS THE WIRELESS MICROPHONE FROM RADIO SHACK-
|
||||
$6.99. IT IS DESIGNED TO PUT VOICES ON TO AN FM RADIO BUT NO ONE SAYS YOU
|
||||
CAN'T HIDE IT AND LET IT PICK UP UNSUSPECTING PEOPLE....FIRST TUNE THE
|
||||
MICROPHONE WITH ANY BLANKSPOT ON YOUR FM RADIO (DON'T WORRY IT WILL
|
||||
EXPLAIN HOW TO TUNE IT ON THE BACK OF THE PACKAGE.) ....THEN HIDE IT WHEN
|
||||
NO ONE IS AROUND (WHEN HIDING THE MICRO- PHONE TALK INTO IT AS YOU'RE
|
||||
WALKING TO MAKE SURE YOU HAVEN'T WALKED OUT OF IT'S RANGE.)
|
||||
|
||||
THERE ARE, HOWEVER, 2 DISADVANTAGES TO USING ONE OF THESE MICROPHONES:
|
||||
|
||||
1) YOU CAN ONLY PUT IT IN A ROOM THAT
|
||||
IS RIGHT NEXT TO YOUR ROOM AND ONLY
|
||||
ONE WALL CAN SEPERATE THEM.
|
||||
|
||||
2) THE MIKE IS 8 INCHES LONG AND THE
|
||||
ONLY DECENT HIDING PLACES FOR SOMETHING
|
||||
THAT BIG IS UNDER A BED OR IN A CLOSET.
|
||||
(YOU MAY WANT TO TAKE IT APART TO MAKE
|
||||
IT SMALLER BUT I DONT RECCOMMEND DOING
|
||||
THIS.)
|
||||
|
||||
ANOTHER THING YOU CAN USE IS THE CLIP ON WIRELESS MIKE BY RADIO SHACK FOR
|
||||
ABOUT $18. IT WORKS IN BASICLY THE SAME WAY EXCEPT IT IS VERY SMALL AND IT
|
||||
WILL WORK THE DISTANCE OF YOUR HOUSE AND POSSIBLY EVEN YOUR NEIGHBORS
|
||||
HOUSE.
|
||||
|
||||
HAVE PHUN...I SURE DID!!
|
||||
STORE MANAGER.
|
||||
CALL THE UNDERGROUND AT:
|
||||
201-223-64 CALL THE BASEMENT:HEAD UNDERGROUND
|
||||
BBS AT......201-223-6404....
|
||||
|
||||
Downloaded from Just Say Yes. 2 lines, More than 500 files online!
|
||||
Full access on first call. 415-922-2008 CASFA
|
||||
|
||||
|
118
textfiles.com/phreak/WIRETAPPING/buildbug.phk
Normal file
118
textfiles.com/phreak/WIRETAPPING/buildbug.phk
Normal file
@@ -0,0 +1,118 @@
|
||||
This file Presented by METRONET system (301)-944-3023 The bug's that this
|
||||
device detects are Infinity transmitters, read the Infinity transmitter
|
||||
bulletin for more info.
|
||||
|
||||
::::::::::::::::::::::::::::::::::::::
|
||||
: :
|
||||
: How to build a Bug Detector :
|
||||
: :
|
||||
: by :
|
||||
: :
|
||||
: The Gremlin :
|
||||
: :
|
||||
::::::::::::::::::::::::::::::::::::::
|
||||
|
||||
|
||||
|
||||
Warning: This formatted for 80 column and upper/lower case capabilities...
|
||||
|
||||
][][][
|
||||
Basic theory
|
||||
][][][
|
||||
|
||||
Because most bugs are triggered through certain frequencies, it is very simple
|
||||
to build a small sweeping device that will trigger any bug present. The two
|
||||
IC's are what create the oscillating tone. The IC1 operates at .8 Hz where the
|
||||
IC2 runs at about 10 Hz. Frequency is determined by this formula:
|
||||
|
||||
f=1.44/(R1+2R2)C)
|
||||
|
||||
f measured in Hertz, R in megohms, and C in microfarads
|
||||
|
||||
The oscillation can be varied by the voltage placed upon pin #5. This is how
|
||||
we create the wave sound. When voltage goes up, so does the frequency, and
|
||||
vice-versa.
|
||||
|
||||
Normally, the output pin 3 is a square wave. Since we need varying wave at pin
|
||||
#5, we need a triangular wave. We get this through integrating the square wave
|
||||
created at pin #3 of IC1. It is acheived by D1, D2, R3, R4 and C2.
|
||||
|
||||
This varying output is fed into the phone line by transformer T1 which has an 8
|
||||
ohm winding going to pin #3 of IC2 and the 500 end to a 0.1 microfarad capaci-
|
||||
tator at the phone line.
|
||||
|
||||
Enuf talk..let's get movin!
|
||||
|
||||
|
||||
][][][
|
||||
Schematic Design
|
||||
][][][
|
||||
|
||||
|
||||
+9v
|
||||
|
||||
__________|_____________________________
|
||||
| _|__|_ _|__|_ |
|
||||
R1 | 4 8 | _|<D1__R3__ | 4 8 | R5
|
||||
| | | | | | | |
|
||||
+-----+2 3+---+ +-+5 2|--+----+----+
|
||||
| | | |_>|R2__R4__| | | | |
|
||||
R2 | ic1 | | | ic2 | R6 D3
|
||||
| +-+6 | ___| | 6+-+ | V
|
||||
| | | | | | | | | -
|
||||
+---+-+7 | | +--+3 7+-+-----+----+
|
||||
| |___1__| | | |___1__| |
|
||||
| | | | | C4
|
||||
| | | | | ^
|
||||
C1 | C2 T1 _|_._C3|(_. |
|
||||
^ | ^ 8--500<_|_. |
|
||||
|_________|______________|__|______|__________|
|
||||
|
|
||||
-G-
|
||||
|
||||
|
||||
][][][
|
||||
Parts List
|
||||
][][][
|
||||
|
||||
C1 10-uF electrolytic capacitator 25 WDVC
|
||||
C2 300-uF electrolytic capacitator 25 WDVC
|
||||
C3 0.1-uF capacitator
|
||||
C4 0.068-uF capacitator
|
||||
D1-D3 1N914
|
||||
IC1,IC2 555 timers
|
||||
R1, R4-R6 1-kilohm resistors
|
||||
R2 91-kilohm resistor
|
||||
R3 22 kilohm resistor
|
||||
T1 500-to-8 ohm audio output transformer
|
||||
|
||||
][][][
|
||||
Construction
|
||||
------------
|
||||
|
||||
When building this unit, it is very useful to use a breadboard or vector board.
|
||||
I suggest that leads being connected to phone line (T1, C3) end in a jack or a
|
||||
modular connector to make the hookup easier. To test it, hook it to the phone
|
||||
line (not the suspected line) and call the line you suspect is being bugged.
|
||||
The party you are calling should not answer the phone. Now, the unit is
|
||||
activated. 3 times, every 4 seconds, the oscillator will go up to 10 kHz and
|
||||
back down again..like a bell curve..If there is a frequency sensitive bug on
|
||||
the line, the phone will stop ringing, and you will be able to hear everything
|
||||
said in the room. If the phone keeps ringing, chances are that all is
|
||||
fine..unless the bug requires a multi-frequency trigger..but these are very
|
||||
rare..
|
||||
|
||||
So, we can see that 415-BUG-1111 really does work! It creates the tone..any
|
||||
click heard is the Phone Co's (or whoever is bugging) speaker/tape recorder
|
||||
picking up!
|
||||
|
||||
|
||||
Have phun, and hope it helped!
|
||||
|
||||
The Gremlin
|
||||
|
||||
...call the Gremlin's Lair..201-536-7794..today!...
|
||||
|
||||
[Thanks again Metronet!]
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
133
textfiles.com/phreak/WIRETAPPING/caller
Normal file
133
textfiles.com/phreak/WIRETAPPING/caller
Normal file
@@ -0,0 +1,133 @@
|
||||
|
||||
NOTES ON RECORDING CALLER ID signals ....(AND VOICE NOTES)
|
||||
|
||||
There have been a number of people who have complained that caller
|
||||
id is not working perfectly in their area. I have been working
|
||||
with ZyXEL to try to get it and distinctive ring working perfectly.
|
||||
It now does work in most of Canada and the US.
|
||||
Caller id works great combined
|
||||
with distinctive ring.
|
||||
I enjoy such features as, if the modem encounters a busy bbs, it
|
||||
sets distinctive ring to answer a CALL return (another feature
|
||||
from the phone company), then answers in originate mode. Thus you
|
||||
can make contact with the bbs at the first opportunity after the
|
||||
line clears, and not have your modem be disturbed by other calls.
|
||||
|
||||
For those (hopefully few) people who still have problems with
|
||||
caller-id, here is a simple way to get information to allow
|
||||
these problems to be resolved more quickly. In the past I circulated
|
||||
a circuit to do this.
|
||||
|
||||
However, thanks to the new voice features, there is an easier way.
|
||||
The idea is to record the ring/callerid signalling on a voice file
|
||||
which can then be listened to, and uploaded to the engineers
|
||||
if necessary. This also allows the cadence of the distinctive ring
|
||||
to be measured if necessary.
|
||||
|
||||
It is REALLY simple to do also and is fun because you can even
|
||||
listen to the signal and get a bit of an idea what might be wrong,
|
||||
even without sending in the file. It is also instructive to
|
||||
write a little voice display program to become more familiar with
|
||||
this format-- since the signals are predictable, monotonic, and
|
||||
thus relatively easy to analyse with a simple program.
|
||||
|
||||
One of the problems is that some exchanges do not seem to follow
|
||||
the Bellcore specs for callerid. The way it is supposed to work,
|
||||
is that after the first complete ring (or distinctive ring)
|
||||
stops, there is a 500 ms
|
||||
pause, then a 250 ms section of "continuous"
|
||||
U characters sent (called a channel seizure signal), then a 150 ms
|
||||
section of mark sent, then the data. A simple number will take
|
||||
about 200 ms further. Then silence reigns until the next ring.
|
||||
|
||||
Now the tones used are 1200 hz for the mark or 1 bit, and
|
||||
2200 for the space or 0 bit. Data is sent at 1200 baud in
|
||||
an asychronous mode. (this is called bell 202 standard).
|
||||
|
||||
Now the The U character is interesting in that it is 1 bit on ,
|
||||
one bit off.
|
||||
Thus when it is being sent in a continuous mode, it also looks
|
||||
like 250 ms of the frequency shift keying signal shaped as
|
||||
a 600 hz square wave. What does this mean?? it means that
|
||||
it sounds like a quarter second of 600 hz tone.
|
||||
|
||||
So you should hear a ring, a 1/2 second of silence, a 1/4 second
|
||||
of 600 hz (fundamental) tone, and then a quarter second
|
||||
of 1200 hz tone-- followed by a short blast of a higher note.
|
||||
|
||||
What can go wrong?? 1st, one problem is that some switches don;t
|
||||
have a proper pause. you might get the U's not sent continuously
|
||||
which might sound like a lower note. Third the mark might not
|
||||
be long enough. next the frequencies may not be correct.
|
||||
The data can come slowly--with up to 2 characters of mark
|
||||
signals between data. (according to the spec). Thus you can
|
||||
give ZyXEL some information without sending the file. Your local
|
||||
exchange sends all these notes (they are not sent from long distance),
|
||||
so they are not attenuated very much.
|
||||
Please also try to find out what kind of switch the exchange has. This
|
||||
information can often be obtained from 611 repair service from a
|
||||
nice teckie. Another interesting thing is some of these switches have
|
||||
more than one way caller id can be sent. They may just be set to
|
||||
do it the non compliant way!! perhaps the technical people do not
|
||||
know they have a choice.
|
||||
|
||||
Once you have the voice file,
|
||||
Another crude way of timing, is to use a hex editor, and lop off pieces
|
||||
from the end of the file (checking for the shielded code--and
|
||||
preserving shielded data--make sure the file is properly terminated).
|
||||
this way you can listen do some timing
|
||||
by looking a t the size of the lopped off file. You can even look
|
||||
at the raw data, and get the idea which area you are in. (espec
|
||||
in 2 bit mode).
|
||||
A less crude way, is to write a little program-- hey and what better
|
||||
way for all you folks wanting to write a voice mail system to
|
||||
force yourself to get started!. You can convert the voice file
|
||||
into one readable by some of the standard voice/oscilloscope
|
||||
sound blaster type programs. so you can see it on your screen.
|
||||
|
||||
The idea is to find out what went wrong, tell ZyXEL and provide
|
||||
a backup recording.
|
||||
|
||||
Now-- you may ask,, how do I get started. WELLL,, there is
|
||||
a little trick. You need to read the signals without actually
|
||||
answering the line. The best way to do this is to fool the
|
||||
phone company into thinking you have not answered the line.
|
||||
One very easy way to do this is to get a capacitor and put it
|
||||
in series with the line. I found a .68 microfarad 400 volt
|
||||
non polarized (ie no + on one of the terminals)
|
||||
capacitor (eg from radio shack).--just a cheap
|
||||
mylar capacitor (could even be 200 volts). (but
|
||||
.22 - 4 microfarad also seemed to work). and put it
|
||||
in series with the line. ONe easy way to do this is to modify
|
||||
your wall plug (which has screws ). Unscrew one red wire,
|
||||
and put a capacitor in series with it and the other red wire
|
||||
formerly going to the same terminal. You may want to leave
|
||||
an extension phone plugged in on another outlet so you can
|
||||
hear the ring (and answer any calls you get while playing).
|
||||
|
||||
Now bring up your zfax and select the voice utilties. pick
|
||||
record voice and select the telco line. then before starting
|
||||
the recording by pushing enter on the OK message,
|
||||
have someone dial your phone. press enter about the time they
|
||||
have finished dialing your phone. This will creat a nice short
|
||||
voice file. PUSH ESCAPE as the second ring starts. This
|
||||
should create a nice 30k file or so with all the info on it.
|
||||
Then play back the voice and start analysing. You should be
|
||||
able to hear it as well as a regular call on your internal
|
||||
modem speaker. The ring will sound like a blast of sound--but
|
||||
not too loud and you should hear a beat of nothing (.5 sec) then
|
||||
beeep(600hz,1/4 sec) beep (1200hz 1/8 sec) bep (1800-2400hz 1/16 sec).
|
||||
|
||||
I am interested in any voice software people do also. Please
|
||||
send me a note if you have some success. I would also love to
|
||||
supply you with a ZyXEL modem, esp if you are in Canada.
|
||||
(I can provide extra callerid software also)
|
||||
|
||||
George Vande Bunte PENG
|
||||
OCOMP
|
||||
416 5341508 gvb@telly.on.ca
|
||||
238 Davenport Rd. Toronto m5r1j6
|
||||
|
||||
Please keep whole file together.
|
||||
|
||||
|
67
textfiles.com/phreak/WIRETAPPING/callwai.txt
Normal file
67
textfiles.com/phreak/WIRETAPPING/callwai.txt
Normal file
@@ -0,0 +1,67 @@
|
||||
|
||||
|
||||
==)--- P TO PAUSE S TO STOP ---(==
|
||||
|
||||
|
||||
+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
|
||||
* *
|
||||
+ THE CALL WAITING TAP +
|
||||
* *
|
||||
+ WRITTEN BY: The Byte +
|
||||
* *
|
||||
+ DISTRIBUTED BY: Marauder +
|
||||
*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*
|
||||
|
||||
So, you have an enemy who talks behind your back, eh? Or, maybe you just
|
||||
would like to "listen" in on your friend's conversations? Well, if you have
|
||||
2 phone lines and call waiting on one of them, you are in luck. (Only one
|
||||
prob|em: your friend must also have call waiting!)
|
||||
|
||||
Procedure:
|
||||
|
||||
[1] Call up your friend with the phone you want to listen with. When he
|
||||
answers call waiting (he's already on the phone, and you are the 2nd
|
||||
caller), then you either sit there or say: sorry, I have the wrong #.
|
||||
|
||||
[2] Next, you wait until he goes back to the other line (puts you on hold).
|
||||
|
||||
[3] Then, pick up your other line and call ->YOUR<- call waiting.
|
||||
|
||||
[4] Answer call waiting
|
||||
|
||||
[5] Then go back to him. (Answer, and then click back.. Click ->2<- times
|
||||
Answer, and go back..)
|
||||
|
||||
[6] Hang up your second line
|
||||
|
||||
[7] You are now on the line!
|
||||
|
||||
[8] Listen and be Q U I E T ! He can hear you!
|
||||
|
||||
Techniques I use to prevent noise or confusion:
|
||||
|
||||
If you have call forwarding, turn it on and forward calls somewhere
|
||||
before you start listening. If a call comes through on your call waiting
|
||||
circuit, the people talking (your buddie and his pal) will not hear
|
||||
anything, but after you answer call waiting and come back, they will
|
||||
hear the other call hang up (two clicks). If you don't have call forwarding,
|
||||
I suggest you get it if you are going to make a habit of this, because it
|
||||
will become a major pain in the ass. When your call waiting rings, you are
|
||||
removed from the "listening" conversation and placed back on his hold
|
||||
circuit. In order to get back on, you must answer the phone and wait for
|
||||
your party (when you answer the phone, tell the guy you are in a hurry and
|
||||
you have to go or you'll call him back later or something) to hang up. When
|
||||
he or she hangs up, you will be back on the conversation. Then, one of your
|
||||
pals will say: What was that? (because of the clicks).. So, try to use call
|
||||
forwarding if you can. Remember: Have fun, and don't abuse it. I am not sure
|
||||
about it, because I just discovered it. It is illegal (what isn't these days)
|
||||
because it is "invading privacy". I don't know if the phone company just did
|
||||
not realize there was a flaw in it, or that was planned for line testing, I
|
||||
am not sure. Have fun!
|
||||
-THE BYTE
|
||||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||||
[ Be careful and remember in no way ]
|
||||
[ am I responsible for your actions ]
|
||||
Uploaded to P-80 by John Tynes
|
||||
|
||||
'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS
|
117
textfiles.com/phreak/WIRETAPPING/cordless.phk
Normal file
117
textfiles.com/phreak/WIRETAPPING/cordless.phk
Normal file
@@ -0,0 +1,117 @@
|
||||
<The Restaurant at the End of the Universe 609/921-1994 10Meg/BBS/AE/Catfur>
|
||||
|
||||
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||
)( How To Listen In On Cordless Telephone Conversations )(
|
||||
)( )(
|
||||
)( An Original 'Phile' By: Beowulf )(
|
||||
)( )(
|
||||
)( Call The Outhouse BBS 201-756-9575 )(
|
||||
)( )(
|
||||
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||
|
||||
Have you ever wanted to know what your brother/sister/parents/ friends/enemies
|
||||
were saying as they hid somewhere, cordless phone in hand? With this phile, now
|
||||
you can! Just follow the simple instructions outlined inside.
|
||||
|
||||
First some information about cordless telephones:
|
||||
|
||||
The original cordless telephones (1978-about late 1983) were made to be used
|
||||
on the 1.6 to 1.8 MHz band. If you will notice, 1.6 MHz is also the top end of
|
||||
the AM broadcast band. These phones operate on AM (just like the radio
|
||||
stations) and use the wiring in your house for an antenna. The power of these
|
||||
phones is 1/10 of a watt in most cases, or about 1/50th of the power that your
|
||||
average CB radio will put out. So, not having a lot of power, it is tough to
|
||||
hear these phones. You know how they say '500 foot range'? Sure, that's the
|
||||
range of the handset to the base, but not of the signals emitted by the base!
|
||||
Which means that on good nights you can hear them for many miles (I live in NJ
|
||||
an have heard telephones VERY loudly from NY City, 35 MILES away!).
|
||||
|
||||
The newer phones, however, are not as easy to hear. They operate on FM on the
|
||||
49 MHz band, which is the same frequency which your little walkie-talkies that
|
||||
you loved as a ten year old operate on. These phones require a little bit more
|
||||
effort to be heard than do the old ones (and a little $$$). Never fear,
|
||||
however, because about 1 out of 10 phones is the old style, and they are still
|
||||
being made and sold today.
|
||||
|
||||
How To Do It:
|
||||
|
||||
For the old style phones, you will need to get a pocket size AM transistor
|
||||
radio. The one I used was an AM/FM Realistic (bought for $9 at Radio Shack).
|
||||
There should be a small plastic box inside the radio. This little 'box' is the
|
||||
VFO (Variable Frequency Oscillator) which controlls the frequency of the radio.
|
||||
Now of course, you aren't going to have a digital frequency counter (they only
|
||||
cost $400, so everyone should have at least two of them) so before you do
|
||||
anything, turn on the radio and tune to the top of the band and find the station
|
||||
which is closest to the top of the broadcast band. Write down the frequency so
|
||||
you have something to compare to later.
|
||||
|
||||
Now, turn off the radio, get a small size screwdriver, and adjust the small
|
||||
screw(s) on the back of the little plastic box. Don't turn them more than a
|
||||
quarter turn at a time. Now, when you have done your first 'tweak' of the
|
||||
screws, turn on the radio and see where that station at the top of the band is
|
||||
now on the frequency dial. When you have gotten the station 150-200 kHz down
|
||||
from where it was, (like if the frequency was 1600, get it down between 1400 and
|
||||
1450), you are all set to recieve cordless telephones at the top end of the
|
||||
radio! Note: this little 'trick' may not work as well on all radios, but it is
|
||||
worth a try. If worse comes to worse, you can turn them back.
|
||||
|
||||
The ideal distance is a close to the base as you can get, but this sucker
|
||||
should pull in signals from up to 500 feet away with no problem. Simply go near
|
||||
someones house with this, and then have fun!
|
||||
|
||||
|
||||
Another way: Another way to do this, if the VFO adjustment trick doesn't
|
||||
work, is to adjust the small metal boxes that have little colored screws in
|
||||
them. These are the tuning coils for the reciever circuit, and they affect the
|
||||
frequency also. Another possibility is a combination of turning the VFO screws
|
||||
and the coils to try to get the desired effect. Good Luck!
|
||||
|
||||
Now for the tough ones, the new phones. The new phones work on the 49 MHz
|
||||
band. You are going to need one of the 'new' walkie talkies that operate on 49
|
||||
MHz ===- FM -=== (the cheap shit ones are AM). If you decide to invest in one
|
||||
at Radio Shack or similar store, make damn sure you get FM walkie talkies. If
|
||||
you get AM, you're screwed, unless you have a friend who is killer into
|
||||
electronics or ham radio who has the knowledge to convert AM to FM. (Yes, it
|
||||
can be done. I have done it with CB's, and it is great for CB because no one
|
||||
can understand what you are saying unless they have a FM-converted
|
||||
CB.....Hmm.....that may be my next text phile...look for it!!) Anyway.....when
|
||||
you get your FM walkie talkie, you can do one of two things:
|
||||
|
||||
A) You can play the adjust the coils trick as mentioned in the last article
|
||||
(there is no VFO because walkie talkies are crystal controlled).
|
||||
|
||||
B) You can change the crystal. Popular frequencies for cordless phones are
|
||||
49.830, 49.860 and 49.890 MHz. These crystals can be obtained from electronic
|
||||
supply houses (like ones that sell chips for your Apple) for about $2 or less
|
||||
each.
|
||||
|
||||
And that just about concludes this phile. There are two other shortcut
|
||||
methods that can be used to bypass this mess and get you listening in right
|
||||
away.
|
||||
|
||||
1) Get a general coverage receiver. They cover all frequencies from 100 kHz
|
||||
to 30 MHz, and will provide you with 'armchair' reception because you can hook
|
||||
up a monster antenna. (I have a 1964 vintage model that I got for $10 sitting
|
||||
on my desk with a 600 foot long piece of wire for an antenna....boy, I know
|
||||
everything in my neighborhood before the ladies start gossiping!)
|
||||
|
||||
2) If you play guitar or bass, and have a 'wireless' system for your guitar
|
||||
like the Nagy 49R, you can hook up a 12 volt lantern battery and go prowling
|
||||
around listening for the phones. (Bass rules!)
|
||||
|
||||
Method 1 only works on the old phones because of the frequency limitations of
|
||||
the reciever, and method 2 is for new phones only because the 'wireless' systems
|
||||
only work on 49 MHz FM.
|
||||
|
||||
Have phun with your new knowledge, and look for more philes from me in the
|
||||
future (that CB FM is a good idea.....hmmmm...)
|
||||
|
||||
|
||||
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||
)( This has been on original phile by: Beowulf )(
|
||||
)( Copyright June 1985 This file is for use on AE, Catsend, and )(
|
||||
)( AE/BBS's only. )(
|
||||
)( Call The Outhouse BBS 201-756-9575 24 hours a day! )(
|
||||
)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
|
||||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||||
|
BIN
textfiles.com/phreak/WIRETAPPING/datatap.hac
Normal file
BIN
textfiles.com/phreak/WIRETAPPING/datatap.hac
Normal file
Binary file not shown.
61
textfiles.com/phreak/WIRETAPPING/detectbug.phk
Normal file
61
textfiles.com/phreak/WIRETAPPING/detectbug.phk
Normal file
@@ -0,0 +1,61 @@
|
||||
Title: Bugging, detecting bugs
|
||||
|
||||
|
||||
|
||||
[ Detecting Bugs on Home Phones ]
|
||||
[ By: Dr. Jimmy and Mr. Jim ]
|
||||
|
||||
|
||||
FIRST OF ALL TO TEST FOR BUGS, YOU NEED A VOM (MULTIMETER) THE HIGHER
|
||||
THE IMPEDANCE THE BETTER (A DIGITAL WITH FET CIRCUITRY OR A VACUUM TUBE
|
||||
VOLT METER IS THE BEST).
|
||||
|
||||
FIRST DISCONNECT THE PHONE LINE(S) AT BOTH ENDS. UNDO THE PHONE INSTRUMENT
|
||||
AND HOOK IT UP TO THE ENTRY POINT OF THE PHONE LINE FROM THE OUTSIDE WORLD
|
||||
(MA BELL DOES NOT LIKE YOU CUT HER OFF COMPLETELY.) THE SCHEME IS THE PHYSI-
|
||||
CALLY ISOLATE YOUR HOUSE, APARTMENT, FROM THE OUTSIDE WORLD. BUT BEFORE YOU
|
||||
DO THIS MEASURE THE LINE VOLTAGE (IT SHOULD BE APPROXIMATELY 48 VOLTS).
|
||||
|
||||
NOW WITH THE WIRES DISCONNECTED AT BOTH ENDS SET YOUR RESISTANCE SCALE TO A
|
||||
HIGH READING AND MEASURE THE RESISTANCE OF THE PHONE LINE, IT SHOULD BE VERY
|
||||
HIGH ON THE ORDER OF MILLION OHMS OR MORE, THIS IS THE NORMAL CONDITION,
|
||||
SINCE YOU ARE MEASURING THE RESISTANCE OF AN OPEN CIRCUIT. IF IT IS MUCH LESS,
|
||||
SAY 50-100KOHMS THEN YOU HAVE A DEVICE ON THE LINE THAT DOES NOT BELONG THERE,
|
||||
PROBABLY A PARALLEL BUG.
|
||||
|
||||
NOW TWIST THE END OF THE DISCONNECTED WIRE AND GO TO THE OTHER END AND
|
||||
MEASURE THE RESISTANCE OF THIS. THIS RESISTANCE SHOULD BE ABOUT ONE OHM OR
|
||||
TWO AT THE MOST IN A BIG HOUSE WITH A LOT OF PHONES. IF IT IS MORE, THEN
|
||||
YOU PROBABLY HAVE A SERIES BUG.
|
||||
|
||||
IF IN THE FIRST CASE, TAKING PARALLEL MEASUREMENTS USING A METER (NOT LED/
|
||||
LCD) AND YOU NOTICE A "KICK" IN THE NEEDLE, YOU PROBABLY HAVE A LINE TAP
|
||||
|
||||
NOW IF YOU ALSO MAKE A MEASUREMENT WITH THE WIRE END TWISTED TOGETHER AND YOU
|
||||
NOTICE THE RESISTANCE READS ABOUT 1-2KOHMS, THEN YOU MAY HAVE A DROP-OUT
|
||||
RELAY. A DROP-OUT RELAY IS A RELAY THAT SENSES A PHONE GOING OFF HOOK, AND
|
||||
SIGNALS A TAPE RECORDER TO START RECORDING.
|
||||
|
||||
ANOTHER TEST TO DO WITH THE PHONES STIL HOOKED UP TO THE OUTSIDE WORLD, ON HOOK
|
||||
VOLTAGE IS ABOUT 48 VOLTS AND OFF HOOK IS ABOUT 6-10 VOLTS. ANY OTHER CON-
|
||||
DITIONS MAY MEAN TELEPHONE SURVEILLANCE
|
||||
|
||||
IF YOU USE A WIDE RANGE AUDIO FREQUENCY GENERATOR AND CALL YOU HOUSE, APARTMENT
|
||||
ETC. FROM ANOTHER PHONE AND SWEEP UP AN DOWN TE SPECTRUM, AND YOU NOTICE THE
|
||||
PHONE ANSWERS ITSELF SOMEWHERE IN THE SWEEP YOU PROBABLY HAVE AN INFINITY
|
||||
TRANSMITTER ON YOUR LINE.
|
||||
|
||||
THE ABOVE INFORMATION TELLS NOTHING BUT TELCO TAPS AT THE CENTRAL OFFICE,
|
||||
OR ANYWHERE ELSE ALONG THE LINE, BUT THIS INFORMATION MAY TELL YOU THAT YOUR
|
||||
WIFE, GIRLFRIEND(BOYFRIEND), OR BUSINES ASSOCIATE MAY BE MONITORING YOUR PHONE
|
||||
ACTIVITIES.
|
||||
|
||||
AN INFINITY TRANSMITTER,IS A NEAT DEVICE IT ALLOWS YOU TO CALL THE BUGGED PLACE
|
||||
AND IT SHUTS OFF THE RINGER AND DEFEATS THE SWITCHHOOK, SO THE MOUTHPIECE NOW
|
||||
BECOMES A ROOM BUG. IT WAS ORGINALLY SOLD FROM THE TRAVELLING BUSINESS MAN
|
||||
TO MAKE SURE HIS WIFE WAS SAFE AT HOME NOT BEING ATTAKCED...
|
||||
|
||||
[ DETECTING PHONE BUGS - DR. JIMMY & MR. JIM ]
|
||||
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
95
textfiles.com/phreak/WIRETAPPING/dltp1.txt
Normal file
95
textfiles.com/phreak/WIRETAPPING/dltp1.txt
Normal file
@@ -0,0 +1,95 @@
|
||||
|
||||
|
||||
MAD! PRESENTS...
|
||||
|
||||
A C-NET COMPATABLE MAD! FILE.
|
||||
|
||||
DETECTING LINE TAPS
|
||||
PART #1
|
||||
|
||||
THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
|
||||
IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
|
||||
RESPONSIBILITY FOR ANY OF ITS CONTENTS.
|
||||
|
||||
|
||||
INTRODUCTION BY THE COMMODORE KID.
|
||||
|
||||
WITH THE FBI WATCHING US ALL THE TIME, YOU CAN NEVER BE SURE IF ITS SAFE TO SAY
|
||||
SOMETHING. EVEN IF YOUR NOT INTO GOOD STUFF, ITS STILL NICE TO KNOW THAT YOUR THE ONLY
|
||||
ONE ON THE PHONE. YOU DON'T WANT YOUR SISTER LISTENING IN ON YOU. IT IS ALSO WELL
|
||||
KNOWN THAT ALOT OF THE MAJOR BBS'S ARE BEING MONITORED BY THE FEDS. WELL, WE HOPE
|
||||
THAT THE INFORMATION PRESENTED HERE WILL ALLOW YOU TO FEEL SAFER ON YOUR TELEPHONE.
|
||||
|
||||
|
||||
|
||||
MOST TELEPHONE SURVEILLANCE DEVICES USED ON HACKERS NUMBERS ARE VERY SIMPLE. THEY
|
||||
USUALLY SAVE THE GOOD STUFF FOR SPYS AND PEOPLE LIKE THAT. IT IS IMPOSSIBLE TO TELL
|
||||
IF THE GOOD STUFF IS ON, BUT WE HAVE LISTED WAYS TO DETECT SOME OF THE CHEAPER MACHINES,
|
||||
AND IN SOME CASES HOW TO SHUT THEM OFF OR SCREW THEM UP.
|
||||
|
||||
THE MLT-2. THIS DEVICE IS ONE OF THE MAINSTAYS OF BS (BELL SECURITY). ITS MAIN
|
||||
WEAKNESS IS IN THAT GIVE TONES TO DO ITS OPERATION. A FRIEND OF MAD!'S IS CURRENTLY
|
||||
WORKING ON A DEVICE HE PLANS TO CALL A PURPLE BOX THAT WILL DETECT THESE TONES. YOU
|
||||
WILL JUST BE ABLE TO KEEP IT ON, AND IT WILL REPORT ON ANY SUCH TONES. WE WILL KEEP
|
||||
YOU UPDATED IN FUTURE FILES. OK, IF THE MLT-2 IS IN MON (MONITOR) MODE, YOU CAN DO THE
|
||||
FOLLOWING: A GOOD OLD LOUD 2600HZ WILL USUALLY SWITCH IT TO LOOP MODE. SOME TIMES A
|
||||
7200 WILL EXECUTE A TT (DIAL MODE). THESE WILL GET THEM OFF YOUR BACK FOR A WHILE.
|
||||
IF YOU OWN A MLT-2 ALSO, YOU CAN DAMAGE THE OTHER MLT-2. FIRST GET THE OTHER MLT-2 INTO
|
||||
LOOP MODE. NOW WAIT TILL IT GETS TO LIN (TEST THE INSIDE PART OF THE LOOP). NOW DO
|
||||
A K2. THIS WILL PUT THE MLT-2 INTO A STATE OF LIMBO. NOW TO FINISH UP, DO A MLT SOAK
|
||||
TEST. THIS WILL PUT THE OFFENDING MACHINE OUT OF COMMISSION FOR A LITTLE WHILE. IF
|
||||
YOU HAVE AN OMEGA BOX (NICE LITTLE THINGS), A FLAT TONE WILL PUT THE MLT-2 INTO A LRM
|
||||
(FAST LOOP MEASUREMENT), THUS GETTING IT OFF YOUR LINE).
|
||||
|
||||
|
||||
CONDUCTER TAGGER AND ANALYZER TEST.
|
||||
|
||||
THIS WILL SHOW YOU APPROXAMATLY HOW MANY PEOPLE ARE ON A LINE. FIRST YOU NEED TO HOOK
|
||||
A VOLT/OHMS METER UP TO THE PHONE BOX IN YOUR WALL. HOOK THE LINE AND THE GROUND UP
|
||||
TO THE RED AND GREEN WIRES. YOU CAN USE ONE MADE FOR IT, OR YOU CAN MODITY THE KIND
|
||||
YOU USE TO CHECK BATTERYS BY PUTTING ALIGATOR CLIPS ON IT. NOW THE VOLT METER WILL RISE
|
||||
AN FALL DEPENDING ON HOW MANY PEOPLE PICK UP THE PHONE, AND HOW GOOD THE CONNECTION IS.
|
||||
IF YOUR SISTER PICKS UP THE PHONE, IT WILL FALL. IT PICKS UP OPERATORS, AND WHATEVER.
|
||||
MOST OF THE CHEAPER TAPPING MACHINES WILL BE DETECTABLE. TAPE RECORDERS CAN ALSO BE
|
||||
DETECTED. EVEN A PERSON ON A TEST PHONE WILL SHOW UP. ITS A GREAT TOOL. TRY USINGIT ON CONFERENCES SOME TIME.
|
||||
|
||||
IF YOU HAVE FRIENDS (OR ENEMYS) THAT LIKE TO LISTEN TO THEIR PHONE CONVERSATION OUT
|
||||
A PHONE BOXES WITH TEST PHONE THERES SOMETHING YOU CAN DO ABOUT IT. THE FOLLOWING
|
||||
INFORMATION COMES FROM ABBIE HOFFMAN AND GEORGE HAYDUKE IN THE CLASSIC BOOK 'GETTING
|
||||
EVEN' THE COMPLETE BOOK OF DIRTY TRICKS.
|
||||
|
||||
CUT THE FEMALE END OFF AN ORDINARY EXTENSION CORD. UNSCREW THE MOUTHPIECE ON THE
|
||||
TELEPHONE. YOU WILL SEE A TERMINAL FOR A RED WIRE AND ONE FOR A BLACK. ATTACH ONE OF
|
||||
THE WIRES FROM THE EXTENSION CORD TO THE RED, AND ONE TO THE BLACK. NOW PLUG THE
|
||||
EXTENSION CORD INTO A POWER SOCKET. ACCORDING TO HOFFMAN YOU ARE SENDING 20 VOLTS OF
|
||||
ELECTRICITY BACK THROUGH EQUIPMENT MADE FOR 6 VOLTS. FIZZ.
|
||||
|
||||
|
||||
NOTE! MAD! SUGGESTS YOU DO NOT TRY THIS. IT IS NOT RESPONSIBLY FOR ANY DAMAGE DONE TO
|
||||
PHONE EQUIPMENT, OR TO YOU. ACTUALLY YOU WOULD BE SENDING 110 VOLTS THROUGH EQUIPMENT
|
||||
MADE FOR 48. IF YOU ARE REALLY SERIOUS ABOUT DOING THIS, WE SUGGEST YOU GET A
|
||||
TRANSFORMER TO STEP THE VOLTAGE LEVEL DOWN.
|
||||
|
||||
|
||||
|
||||
ANY INFOMATION THAT IS PASSED OVER PHONE LINE CAN BE INTERCEPTED BY THE PHONE COMPANY.
|
||||
THIS INCLUDES MODEM SIGNALS. REMEMBER, THEY INVENTED ALL THAT STUFF. IN PART TWO WE
|
||||
WILL EXAMINE WAYS TO STOP THEM FROM MONITORING BBS'S AND EXAMINE OTHER EQUIPMENT.
|
||||
|
||||
|
||||
THIS FILE WAS WRITTEN BY THE TRIO.
|
||||
THE COMMODORE KID
|
||||
DEATH-STALKER
|
||||
MR. C0SMOS
|
||||
|
||||
GUEST WRITERS THIS WEEK WERE M, QVI, PHONE BANDIT, THE GREMLIN, AND EXORCIST.
|
||||
|
||||
MAD! IS A GROUP DEVOTED TO G-FILES. IF YOU HAVE ANY QUESTIONS, OR THERE IS ANYTHING
|
||||
YOU WANT US TO WRITE ABOUT, CONTACT US AT MAD! WORLD HEADQUARTERS- PC MAIN (313)
|
||||
386-4698
|
||||
|
||||
8/20/85
|
||||
|
||||
CALL THE CIA FOR ALL MAD FILES
|
||||
607-324-0197 TELL'EM MAD SENT YA'
|
||||
|
98
textfiles.com/phreak/WIRETAPPING/dltp2.txt
Normal file
98
textfiles.com/phreak/WIRETAPPING/dltp2.txt
Normal file
@@ -0,0 +1,98 @@
|
||||
|
||||
MAD! PRESENTS...
|
||||
|
||||
A C-NET COMPATABLE MAD! FILE.
|
||||
|
||||
DETECTING LINE TAPS PART 2
|
||||
|
||||
|
||||
THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
|
||||
IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
|
||||
RESPONSIBILITY FOR ANY OF ITS CONTENTS.
|
||||
|
||||
|
||||
THANKS TO MR. X OF A BELL COMPANY WE HAVE LEARNED HOW TO DEFEAT MOST SURVEILLANCE
|
||||
DEVICES USING BLUE/OMEGA BOXES. THE BLUES RANGE IS VERY LIMITED, BUT THE OMEGA BOXES
|
||||
COVERS MOST OF THEM. SEE MAD!'S NEW OMEGA BOX HANDBOOK FOR MORE INFO.
|
||||
|
||||
DEVICE NAME RANGE TONE
|
||||
NOTES.
|
||||
|
||||
MLT-2 1400-7200 4800
|
||||
SEE DETECTING TAPS #1
|
||||
|
||||
MLT-1 1400-6400 1200
|
||||
|
||||
AT&T SCANCAT 900-1200 2600
|
||||
SEE SCANNER BY CAN-AM PIRATING
|
||||
NETWORK
|
||||
|
||||
SCANCAT 2 1200-2600 2600
|
||||
|
||||
ADS SCANNING SYSTEM 2600-4800 12000
|
||||
|
||||
BELL 1021 7200 12000
|
||||
|
||||
BELL 1100 400-800+1200-7200 GOLD 2600
|
||||
SEE OMEGA BOX HANDBOOK AND FUN/OMEGA BOXES 1-2
|
||||
|
||||
MACE(NICKNAME IF YOU KNOW THE REAL NAME TO THIS MACHINE, PLEASE GIVE IT TO US.)
|
||||
6200 GOLD 6200
|
||||
THIS DOESN'T ALWAYS WORK.
|
||||
|
||||
ADS MONITORING TEST.
|
||||
|
||||
ADS IS THE NEW TRACE/MONITORING TEST BEING USED BY AT&T, MCI, SOON SPRINT, AND MORE.
|
||||
IT IS VERY FAST AND ACCURATE, BUT IT HAS MANY MANY FAULTS.
|
||||
|
||||
AFTER MUCH TESTING WE FOUND THAT IF YOU DO A 7200 AND ADS IS ON THE LINE, A VOLT METER
|
||||
WILL GO GO CRAZY. A SIMPLE GOLD WILL MAKE A POP IF ADS IS ON THE LINE. FOR A LOT
|
||||
MORE ON ADS SEE MAD!'S UPCOMING DETECTING LINE TRACES.
|
||||
|
||||
TAP TEST NUMBERS
|
||||
|
||||
LATELY MAD! HAS AS BEEN SEEING ALOT OF THOSE TAP TEST #'S. OUR FRIENDS AT THE PHONECOMPANY SAID THERE ARE SUCH #'S, BUT THEY WILL ONLY DETECT CERTAIN THINGS. HERES A
|
||||
SMALL LIST. MAD! IS NOT SURE IF THEY WORK, AND DIDN'T HAVE TIME TO TEST THEM. WE
|
||||
WILL PRINT THE RESULTS IN AN UPCOMING FILE. IF THEY DO, WE WILL PRINT ABOUT 25 OF
|
||||
THEM.
|
||||
|
||||
THIS CAME FROM SOMEONE NAMED HACKER SMITH, BUT WERE NOT SURE WHAT SYSTEM. HERE IT IS...
|
||||
|
||||
|
||||
I GOT A # TO SEE IF YOUR BEING TRACED. WHEN YOU CALL IT USING YOUR PHREAKING
|
||||
SERVICE,YOU SHOULD HEAR A TONE THAT GOES UP IN FREQUENCY,THAT MEANS YOUR NOT BEING
|
||||
TRACED. IF YOU HEAR A STEADY TONE, THEN YOUR BEING TRACED AN YOU'D BETTER HANG UP IN
|
||||
LESS THAN 30 SECONDS OR YOU RUN THE RISK OF BEING TRACED...THE # IS 617-890-9900.
|
||||
ENJOY,
|
||||
HACKER SMITH
|
||||
|
||||
ALSO YOU SEE THE NUMBER POSTED AROUND 200-XXX-XXXX. THIS IS A ADS SYSTEM USED BY BELL
|
||||
LINEMEN FROM PHONE BOXES (SEE THE MAD! FILE ON TEST PHONES FOR INFO ON PHONE BOXING.).
|
||||
IT IS NOT A TRACE TEST AT ALL.
|
||||
|
||||
THERE MAY OR MAY NOT BE A DETECTING TAPS 3, DEPENDING ON HOW MUCH MORE INFO WE GET.
|
||||
WATCH FOR DETECTING LINE TRACES COMING SOON TO A BBS NEAR YOU.
|
||||
|
||||
THIS FILE WAS WRITTEN BY THE MAD!
|
||||
BULLPEN.
|
||||
|
||||
THE COMMODORE KID <CK> COMPLIER WRITER MR. C0SMOS <APPLE CAT> ELECTRONICS INFO WRITER
|
||||
|
||||
THE GREMLIN <THE NEXT PRESIDENT OF THE UNITED STATES> THE WORLDS GREATEST EXPERT ON
|
||||
THE OMEGA BOX
|
||||
MR. X <A BELL EMPLOYEE WHOS ONE OF US> TELEPHONE INFORMATION
|
||||
|
||||
AND THE MANY PEOPLE WHO HELP US OUT... DEATH-STALKER THE DEFENDER DEMON PHONE BANDIT
|
||||
MR. Y 8-BALL AND MANY MANY MORE.
|
||||
|
||||
MAD! IS A GROUP DEVOTED TO G-FILES. TO CONTACT US CALL THE MAD! MAILBOX ON THE ? MAIN
|
||||
BBS (313)-278-9629 OR PIRATES CORNER 1 (313)-386-4698.
|
||||
|
||||
9-9-85
|
||||
|
||||
CALL THE CIA 607-324-0197 FOR ALL
|
||||
THE MAD FILES AND TELL THEM
|
||||
RITZ CRACKER SENT YA'
|
||||
|
||||
|
||||
|
316
textfiles.com/phreak/WIRETAPPING/eaves1.txt
Normal file
316
textfiles.com/phreak/WIRETAPPING/eaves1.txt
Normal file
@@ -0,0 +1,316 @@
|
||||
12/19/91 11:14pm
|
||||
|
||||
Basic Eavesdropping #1
|
||||
The Electronic Ear
|
||||
------------------
|
||||
Written By The Freddy
|
||||
In Association With The National Newtwork of Anarchists and Nihilists (NNAN)
|
||||
|
||||
Introduction
|
||||
------------
|
||||
This text file is the first in a series on the topic of eaves-
|
||||
dropping. My trusty Webster's Compact Dictionary defines eavesdropping as
|
||||
the art of listening secretly. This can be useful to the young anarchist
|
||||
in many ways. Suppose that, as a beginning phreak, you are given the
|
||||
undubious assignment of being the lookout. Well, you want to hear the
|
||||
guard coming while being as far away as possible. Or you stake out your
|
||||
mark's house to find out as much as you can before you get your revenge.
|
||||
Well, again, you want to hear as much as possible without making yourself
|
||||
known. To find out how to properly accomplish these and many other tasks,
|
||||
read on.
|
||||
|
||||
Disclaimer
|
||||
----------
|
||||
This document was intended for informational purposes ONLY, the author and
|
||||
the National Network of Anarchists and Nihilists do not endorse or support
|
||||
any illegal action presented here or in any other documents which we
|
||||
release. The only motivation for the writing of this document is purely
|
||||
for educating the general public. The author and the National Network of
|
||||
Anarchists and Nihilists will not be held responsible for any actions by
|
||||
the reader of this document.
|
||||
|
||||
Description
|
||||
-----------
|
||||
The Electronic Ear is alot like those "high tech" Listenaiders
|
||||
which boost sound. Think of the possibilities. With the Electronic Ear
|
||||
you can hear whispers 500 feet away or a conversation half a block away.
|
||||
You can listen in and record for all posterity the conversation on the tape
|
||||
of your choise. Of course, it is illegal to listen in on and/or record a
|
||||
conversation without the permission of the parties doing the conversing.
|
||||
Two versions will be presented. One that uses a parabolic dish (like on
|
||||
satellites); the other uses a highly directional shotgun microphone. Both
|
||||
use the same easy to build superamplifier circuit.
|
||||
|
||||
Parts List
|
||||
----------
|
||||
Amplifier Circuit
|
||||
-----------------
|
||||
R1 10 k-ohm resistor
|
||||
R2 100 ohm resistor
|
||||
R3 4.7 M-ohm resistor
|
||||
R4,R6 3.3 k-ohm resistor
|
||||
R5 220 ohm resistor
|
||||
C1 220 pF disc
|
||||
C2,C3,C5 0.47 <20>F disc
|
||||
C4 1.0 <20>F polarized electrolytic
|
||||
IC1 LM387 integrated amplifier IC
|
||||
D1 1N34A
|
||||
S1 SPST switch
|
||||
Mike Electret condenser microphone
|
||||
(1) Project box, 2 3/4 by 5 1/8 by 1 3/4
|
||||
(1) 1/8 inch microphone input audio jack
|
||||
(1) 1/8 inch sound output audio jack
|
||||
|
||||
All resistors are 5 to 10 percent tolerance, 1/4 watt.
|
||||
All capacitors are 10 to 20 percent tolerance, rated at 35 volts or more.
|
||||
LM387 amp is available in kit form from:
|
||||
|
||||
ALLEGRO ELECTRONICS SYSTEMS
|
||||
3E MINE MOUNTAIN
|
||||
CORNWALL BRIDGE, CT 06754
|
||||
(203)672-0123
|
||||
|
||||
Mail order company. Catalog available.
|
||||
|
||||
Construction Of The Amplifier Circuit
|
||||
-------------------------------------
|
||||
The Amplifier Circuit is based on an LM387 dual preamp IC. In
|
||||
layman's terms, the preamp first increases the amplification from the
|
||||
microphone about 47,000 times, and then limits the audio signals of only 1
|
||||
volt peak to peak or less to go to the output jack. This will save your
|
||||
ears in case one of your less scrupulous friends shoots a cap gun in front
|
||||
of the mike. Use a universal solder board for the circuit.
|
||||
Construction is pretty straightforward. I have included both the
|
||||
schematic and a picture of what the finished circuit should look like.
|
||||
|
||||
Schematic Of The Amplifier Circuit
|
||||
----------------------------------
|
||||
|
||||
C6 220pF o To tape Power supply
|
||||
----|(--ground | circuit decoupling/filtering
|
||||
| C5 \./ or C2
|
||||
| .47 <20>F --- headphone ---|(---
|
||||
| | amp | .1<EFBFBD>F |
|
||||
| ----o----------------o V+ o--o--|(--o--ground
|
||||
| | | | C1
|
||||
| D1 \/ | | 1000<30>F
|
||||
| 1N34A - | |
|
||||
| | | | Recorder interface
|
||||
|___________o | | J1
|
||||
| | | (o)------
|
||||
R5 / / R6 | Tip| |
|
||||
220 ohm \ \ 3.3 k-ohm |5 \/ |
|
||||
/ / /\ ---/\/\/\/---o--ground
|
||||
\ \ / \ | R1
|
||||
| | / \ o 10 k-ohm
|
||||
S1 ----o 6 / IC1b \ 3
|
||||
o-o /o--o-------| -------/ LM387 \-------o-ground
|
||||
/ | | /--------------------\ |
|
||||
| | |7 |8 C4 1.0 <20>F|
|
||||
| | | | + |
|
||||
| |------------o |----o---|(---
|
||||
| | |
|
||||
| R4 / |
|
||||
| 3.3 k-ohm \ |
|
||||
| / |
|
||||
| \ |
|
||||
| | |
|
||||
| \./ C3 |
|
||||
| ---.47 <20>F |
|
||||
| +| | Headphone amp
|
||||
| | | J1
|
||||
| ------------------o | (o)-------
|
||||
| | 4| | Tip| |
|
||||
| / /\ | | |
|
||||
| \ R3 / \ | C2 \./ |
|
||||
| / 4.7 M-ohm / \ | 4.7<EFBFBD>F --- |
|
||||
| \ / IC1a \ | | C1 |
|
||||
| | / LM387 \ | | .1<EFBFBD>F |
|
||||
| | /-------------------\ | o--|(---o
|
||||
| | 2| 1| | Q1 | |
|
||||
| --------------o --------- 2N2222 | |
|
||||
| | c e | R4 |
|
||||
| R2 / V+ o------o----\ /--o-\/\/\-o-ground
|
||||
| 100 ohm \ | \/ 1 k-ohm|
|
||||
| / R2 / ---- \
|
||||
| \ 22 k-ohm\ b| R3 /
|
||||
| | / | 27 k-ohm\
|
||||
| C2 \./ \ | /
|
||||
| .47 <20>F --- C1 --------o-------------
|
||||
| R1 | 220 pF \
|
||||
|----\/\/\/\-----o----|(------- / R1
|
||||
10 k-ohm | | \ 1 k-ohm
|
||||
| ---------o---ground /
|
||||
| | |
|
||||
Mike o
|
||||
|
||||
Suggested Parts Layout
|
||||
----------------------
|
||||
Headphnone Mike Jack
|
||||
Jack_____ _____
|
||||
--| |-----| |------------------------------------------------
|
||||
| | | | | -------- |
|
||||
ON/OFF | --- --- _____|______|____ |
|
||||
switch --- ______________________________________ | | |
|
||||
O--| | | __________ | | | |
|
||||
--- | -|__________|- _|_ _|_ | | | |
|
||||
| | | | | | | | | |
|
||||
| | ____/------------\____ | | | | | | | |
|
||||
| | \------------/ | | | | | | Battery | |
|
||||
| | | | | | | | | |
|
||||
| | _|_ -|- -|- | | | |
|
||||
| | | | _ _ _ _ | | | |
|
||||
| | | | _|_|_|_|_|_|_|_|_ | | | |
|
||||
| | | | | | | | | |
|
||||
| | | | | | | | | |
|
||||
| | -|- |_______________| | | | |
|
||||
| | |_| |_| |_| |_| | | | |
|
||||
| | Circuit board | | | |
|
||||
| -------------------------------------- | | |
|
||||
| ----------------- |
|
||||
|_______________________________________________________________|
|
||||
|
||||
|
||||
Notes
|
||||
-----
|
||||
If you cannot understand the schematic, then get a friend to make
|
||||
it for you. You should be able to build the circuit with a minimal amount
|
||||
of electrical experiance.
|
||||
If you plan to connect the output to the line input of a tape
|
||||
recorder, use a 10 k-ohm potentiometer as a level control and be sure to
|
||||
use shielded cable to reduce unwanted hiss.
|
||||
Test the circuit before building the rest of the Electronic Ear.
|
||||
Connect a electret condenser mike to the input jack and a pair of
|
||||
headphones to the output. Don't put the headphones directly over your
|
||||
ears. I found this out the hard way. Turn the circuit on and listen for
|
||||
the squealing sound of the oscillating circuit. If you don't hear it, go
|
||||
to the next step. If there is an oscillation problem, increase the value
|
||||
of C6 to 330 pF or 470 pF. Also try increasing R5 from 220 ohms to a
|
||||
higher value that will reduce or eliminate oscillation, but it will also
|
||||
decrease the gain of the circuit. If oscillation is still a problem, then
|
||||
try replacing R3 with a 1.5 m-ohm resistor. This should decrease the
|
||||
overall gain of the circuit.
|
||||
|
||||
The Parabolic Dish
|
||||
------------------
|
||||
Parts List
|
||||
----------
|
||||
1 Spun aluminum or plastic parabolic dish
|
||||
1 10 inch length of 12 gauge wire
|
||||
2 #12 crimp on connector
|
||||
|
||||
Dish available from:
|
||||
|
||||
EDMUND SCIENTIFIC CO
|
||||
P.O. BOX 5408
|
||||
SCOTTSDALE, AZ 85261
|
||||
(609)573-6250
|
||||
|
||||
Mail order company. Catalog available.
|
||||
|
||||
Construction Of The Parabolic Dish
|
||||
----------------------------------
|
||||
The most effective way of tuning in on distant sounds is to use a
|
||||
parabolic dish. I used an 18 inch diameter dish purchased surplus from
|
||||
Edmund Scientific. Other dishes, both metal and plastic, will do.
|
||||
The microphone must be positioned at the focal point of the dish.
|
||||
You could use the complicated algebra method, but an easier way is to
|
||||
position the dish in full sunlight and move small piece of paper in and
|
||||
out of the center until you see a small, bright spot. Measure the distance
|
||||
from the paper to the base of the dish and you have the focal point. If
|
||||
the dish is not reflective, try covering it with aluminum foil.
|
||||
You want to mount the microphone to a standoff. This can be made
|
||||
from a coat hanger adjusted to fine tune the focal point. The microphone
|
||||
should be physically insulated from the standoff using double sided tape.
|
||||
The finished standoff and mike should look like this:
|
||||
|
||||
_________
|
||||
/ \
|
||||
| \
|
||||
| |
|
||||
| |-|
|
||||
Coat | | | Crimp-on spade
|
||||
hanger | | | connector (bend
|
||||
bent | --|-| out tongue)
|
||||
to |
|
||||
shape |
|
||||
|
|
||||
|
|
||||
|
|
||||
|
|
||||
|-|
|
||||
| | Crimp-on spade
|
||||
| | connector
|
||||
|-|
|
||||
|
|
||||
|
||||
Attach the amplifier to the side of the dish using some hardware or
|
||||
double sided tape.
|
||||
Paint the dish flat black so it does not glint in the sunlight.
|
||||
Also, add a 1/4" 20 bolt and sleeve coupling to one side of the dish to
|
||||
provide a meansto secure it to a tripod. This works quite well.
|
||||
|
||||
_
|
||||
/
|
||||
/ Parabolic
|
||||
/ dish
|
||||
Amplifier /
|
||||
circuit /
|
||||
|---/
|
||||
| |
|
||||
| |--\ o\
|
||||
| | \-----/
|
||||
|---\
|
||||
\
|
||||
\
|
||||
\
|
||||
/\\
|
||||
/ \\_
|
||||
\ /
|
||||
|__|
|
||||
/ \
|
||||
/ \ Tripod
|
||||
/ /\ \
|
||||
|
||||
The Shotgun Mike
|
||||
----------------
|
||||
Parts List
|
||||
----------
|
||||
1 40 inch lenght of 4 inch PVC or ABS plastic pipe
|
||||
1 4 inch end cap to fit onto one end of pipe
|
||||
1 3 inch round speaker (replaces Mike)
|
||||
|
||||
Construction Of The Shotgun Mike
|
||||
--------------------------------
|
||||
The Shotgun Mike is cheaper to build than the parabolic dish. It
|
||||
does not collect as much sound, though, but it is more directional.
|
||||
The speaker needs to be physically isolated from the tube to reduce
|
||||
the effects of vibration. I have found that a pice of 2 inch thick foam
|
||||
cut to 4 1/2 inches in diameter works well. Punch or cut out a small
|
||||
circle in the center so it looks like a doughnut.
|
||||
Solder an 8 inch length of shielded cable to the terminals of the
|
||||
speaker. Press the magnet of the speaker through the small hole and slip
|
||||
the foam and speaker into one end of the tube.
|
||||
Solder the other end of the speaker wire to a 1 1/8 inch plug.
|
||||
Drill a hole in the end cap for the speaker wire, mount the amplifier, and
|
||||
you're set. The finished product should look like this:
|
||||
|
||||
Amplifer PVC pipe
|
||||
circuit ---------------------------------------------------
|
||||
##########||----| /
|
||||
##########|| F | / Speaker
|
||||
##########|| o |-|
|
||||
##########|| a |-|
|
||||
##########|| m | \
|
||||
##########||----| \
|
||||
--------------------------------------------------
|
||||
|
||||
Conclusion
|
||||
----------
|
||||
Now that you know how to build an Electronic Ear, you probably want
|
||||
to know how to use it. That will be upcoming in a future installment.
|
||||
Until then, build one yourself. I can be reached at The DeaTh BoX
|
||||
BBS--(714)970-6710--which is the home of NNAN. Well, it's getting late so
|
||||
until next time, adieu.
|
||||
|
||||
12/24/91 1:27am
|
429
textfiles.com/phreak/WIRETAPPING/es.txt
Normal file
429
textfiles.com/phreak/WIRETAPPING/es.txt
Normal file
@@ -0,0 +1,429 @@
|
||||
Electronic bug detection
|
||||
''''''''''''''''''''''''
|
||||
|
||||
Electronic bug detection will probably be the most difficult aspect of this entire
|
||||
field, as you will be working on your own, without the aid of much useful information
|
||||
that can be gathered from the telephone company or other agencies. (Most telphone bu
|
||||
gs, except the sophisticated ones, can be detected by an overload on the phone line
|
||||
itself) A good tool for bugging detection is a normal AM-FM radio receiver, portable,
|
||||
with a telescopic antenna. For application, extend the antenna in the room suspecte
|
||||
d of being bugged and tune the receiver carefully from the bottom to the top, covering
|
||||
all the FM frequencies, at the same time, talking to yourself continually. At one
|
||||
point, if a bug is present, you will be able to hear your voice through the receiver,
|
||||
although the voice may be indistishguishable, because of top volume feedback. This
|
||||
feedback will always be a deafening continuous howl, scream, or high-pitched whistle.
|
||||
To learn the exact location of the bug, cut the volume of the receiver, and slowly
|
||||
move around the room. The feedback will increase in volume as you get closer to the
|
||||
bug. When a bug is discovered, there is a moment of confusion and fear in reguards to
|
||||
its elimination. In one sense, destroying a bug is an admission of guilt, and can
|
||||
do nothing more than provoke the enemy to rebug in a more sophisticated manner. For
|
||||
that reason, I would hesitate to remove a bug. Instead I would attempt to use it
|
||||
against the bugger himself, by feeding him flase and misleading information.
|
||||
In some cases the bugger may have taken precautions on this type of detection and,
|
||||
by readjustment of his oscillating capacitor, he may be transmitting on a range below
|
||||
the sensitivity of your radio. In this case employ your television set in the same
|
||||
manner as you did the radio, using the ultrahigh frequency knob. As you move across
|
||||
the range of frequencies, keep your eyes on the picture, until you have found a pattern
|
||||
of dark wavy lines that move in relation to your own voice, coupled with top-volum
|
||||
e feedback. The actual location of the bug is a little more difficult, unless your TV
|
||||
set is battery operated, but by use of several extension cords and slow movement, this
|
||||
can be accomplished.
|
||||
The feedback technique can also be used when the bugging involves (citizens band)
|
||||
walkie-talkie. One of the simplest methods of bugging is to tape down the transmitter
|
||||
button on a cheap walkie-talkie, and plant it to where the conversation is to be hel
|
||||
d. The process of detection is exactly the same as above, except that, instead of using
|
||||
a radio ro TV set, one uses a tunable CB receiver to check for feedback.
|
||||
Although the previous "feedback technique" can be effective, it is time-consuming and
|
||||
not 100 percent efficient. For these reasons, electronic experst have invented an
|
||||
marketed a small meter, which detects transmitters. The interesting problem that th
|
||||
ese experts have overcome was, with all the high-powered radio and TV stations
|
||||
transmitting, how would it be possible for an individual to detect a low-powered
|
||||
transmitter, such as a microphone? This was overcome by simply reversing the gauge.
|
||||
In other
|
||||
words, when the meter was "wide open,"no signal was present. However, the closer the
|
||||
meter was taken to the transmitting device, the less of the reading the meter registers.
|
||||
These fie~- meters are available from most large electronic companies and range
|
||||
in price from about $10 to $200, depending on quality and strength.
|
||||
A device similar to the "strength meter," which a Texas company has marketed, utilizes
|
||||
a small bulb, which blinks only in the presence of a bug. The true value of this device
|
||||
is that it is capable of seperating normal radio wave (which do not affect it
|
||||
) from the dangerous radio signals emitted from a bug. It is available from Dee
|
||||
Company, Houston, Texas for about $200.
|
||||
If your not electronically minded, or just not equiped to find the tap on your phone,
|
||||
Continental Telephone has a device that allows you, through the use of its meter, to
|
||||
determineif the wire is tapped, and, if so, where it is located. Unfortunately th
|
||||
is device (called "the Private Sentry) costs $250.
|
||||
|
||||
|
||||
Electronic jamming
|
||||
''''''''''''''''''
|
||||
|
||||
Most of the devices written about so far in this chapter are legal, with regulations
|
||||
placed on their application, but the very possession of certain jamming devices is
|
||||
illegal. These jamming devices basically destroy the effectiveness of a bug rather t
|
||||
han locate it. The reason the FCC has put strict regulations on these is the effect
|
||||
they have on other means of communications, such as completely destroying AM radio
|
||||
reception, rendering TV sets useless, making communications on police band radios impos
|
||||
sible, and even to some degree interfering with aircraft communications. To be truly
|
||||
effective as any-bugging devices they must cover the whole spectrum of radio
|
||||
frequencies, which in turn will cause interference to other outside receivers and
|
||||
transmitte
|
||||
rs. For this reason control is of the essence. When determining what exactly you wish
|
||||
to jam, you must also determine the frequency to be used, so as not to interfere with
|
||||
other signals. If you decide to use a jamming device for an illegal purpose, you
|
||||
must at all cost maintain mobility. (Jamming from the back of a moving truck has been
|
||||
prooven effective) Mobility is necessary, because the FCC also employs detecting and
|
||||
locating devices for use against underground radio stations and unregulated jammin
|
||||
g devices.
|
||||
There are basically two types of jamming devices, the first of which is not
|
||||
manufactured commercially and would have to be built by the individual. This type is
|
||||
called "spa~-gap device," and is more powerful than the other, covering greater
|
||||
distance.
|
||||
The second type is refered to as "the white noise device," and is manufactured by
|
||||
Continental Telephone, Dectron Industries, Inc., and Telsec, with a price range from
|
||||
about $150 to $350, depending on strength.
|
||||
|
||||
|
||||
Electronic scramblers
|
||||
'''''''''''''''''''''
|
||||
|
||||
Electronic scramblers are devices that simply act as an an~-bug mechanisms by
|
||||
transforming normal speech patterns into unintelligable sounds. The most primative
|
||||
method, outdated today, is recording a message on a tape recorder, and then transmitting
|
||||
it
|
||||
, either by playing it backward or at a different speed. Although this method may
|
||||
momentarily frustrate the bugger, if he has half a brain, it won't take him long to
|
||||
decode your message. The basic principle of scramblers, or any coding device, is to
|
||||
ren
|
||||
der the message useless to anyone except the desired recipient in cont
|
||||
|
||||
There are several types of electronic scramblers, all effective but all sharing the
|
||||
same disadvantage - price. The most inexpensive one I found in any catalogue ran about
|
||||
$500, but then anyone with the slight knowledge of burglary will not be put off by
|
||||
this obstacle. The most popular type is manufactured by Dectron, and is used as an
|
||||
extension to the telephone. The spech is garbled before it enters the mouthpiece of
|
||||
the phone, and decoded after it has left the receiver. A pair of these run just over
|
||||
$500, but the real disadvantages to these devices is that the individual code your
|
||||
devices are working with is retained in a vault by the company, so that anyone with
|
||||
access to that vault can break down your security.
|
||||
The second device used for scrambling is manufactured by an English company, and it
|
||||
works on the principle of inverting the normal speech patterns. In other words, it
|
||||
makes low notes high, and high notes low. This offers the individual a little bit mo
|
||||
re security, as each person's speech frequency is as differnt as his fingerprints.
|
||||
Their major disadvantage is price. It sells for between $1,000 and $1,500.
|
||||
The third type of scrambler is used only for radio transmission. This device can also
|
||||
be purchased through Dectron, for about the same price as mentioned before. The radio
|
||||
scrambler works on basically the same principle as all other scrambling devices
|
||||
, in that it inverts or disorders the frequency and pitch of the speech pattern while
|
||||
it is being transmitted, and then reverses the garble to render it understandable to
|
||||
the receiver.
|
||||
|
||||
|
||||
Mail order & retail electronic outlets
|
||||
''''''''''''''''''''''''''''''''''''''
|
||||
|
||||
I have listed below some of the major electronic mail order and retail outlets. Many
|
||||
companies that sell this type of equipment do so only to police officers, and require
|
||||
the purchaser to prove his relationship with some law enforcement agency. For th
|
||||
at reason they have not been included. These companies listed are all involved in the
|
||||
manufacturing and/or sales of eavesdropping and surveillance equipment.
|
||||
|
||||
S.A.C. Electronics,
|
||||
4818 West Jefferson Blvd.,
|
||||
Los Angeles 18, California
|
||||
|
||||
Baker Electronics Co.,
|
||||
R.R. 3,
|
||||
Greencastle, Indiana
|
||||
(mail-order plans and kits only)
|
||||
|
||||
Dehart Electronics,
|
||||
P.O. Box 5232,
|
||||
Sarasota, Florida
|
||||
|
||||
Continental Telephone Supply Co.,
|
||||
17 West 46th Street
|
||||
New York, N.Y.
|
||||
(fantastic catalog)
|
||||
|
||||
Martel Electronics Sales, Inc.,
|
||||
2356 S. Cotner Ave.,
|
||||
Los Angeles, California
|
||||
|
||||
R & S Research, Inc.,
|
||||
2049 Richmond Ave.,
|
||||
Houston, Texas
|
||||
|
||||
Mittleman Manny,
|
||||
136 Liberty Street,
|
||||
New York, N.Y.
|
||||
(only custom devices $400 )
|
||||
|
||||
Clifton,
|
||||
11500 N.W. 7th Ave.
|
||||
Miami, Florida
|
||||
|
||||
Consolidated Acoustics,
|
||||
1302 Washington Street,
|
||||
Hoboken, N.J.
|
||||
{only listening devices)
|
||||
|
||||
Ekkottonics Co.,
|
||||
P.O. Box 5334,
|
||||
Milwaukee, Wisconsin
|
||||
{(che})
|
||||
|
||||
Dectron Industries, Inc.,
|
||||
13901 Saticoy Street
|
||||
Van Nuys, California
|
||||
(only an~-bugging equipment)
|
||||
|
||||
Dee Co.,
|
||||
Box 7263,
|
||||
Houston, Texas 77008
|
||||
|
||||
T~-Tron of Dallas,
|
||||
330 Casa Linda Plaza,
|
||||
Dallas, Texas
|
||||
{(discount bugging equipme})
|
||||
|
||||
Security Electronics,
|
||||
11 East 43rd Street,
|
||||
New York, N.Y.
|
||||
|
||||
Telephone Dynamics Corp.,
|
||||
1333 Newbridge Road,
|
||||
North Bellmore, N.Y.
|
||||
{(only miniture microphon})
|
||||
|
||||
Simlar Electronics, Inc.,
|
||||
3476 N.W. 7th Street,
|
||||
Miami, Florida
|
||||
|
||||
Tracer Systems,
|
||||
256 Worth Ave.,
|
||||
Plam Beach, Florida
|
||||
|
||||
The federal Communications Commission and the Supreme Court have been uptight about
|
||||
wiretapping and eavesdropping for some time. They have both passed laws and made
|
||||
regulations concerning electronic surveillance. For these reasons, I would emphasize
|
||||
t
|
||||
he utmost care and knowledge in the application of these devices. What is intersting
|
||||
is the actual wording of the law, where any interstate wireta{(interstate does not mean
|
||||
interstate, it applies to all tapping through some strange log}) except in a matt
|
||||
er of security is against the FCC's regulations and is punishable by a fine of no more
|
||||
than $10,000 or five years in jail. The neat little exception made for security gives
|
||||
all of government agencies, particularly the FBI and the CIA, and all local polic
|
||||
e departments, free license to practice all and any forms fo surveillance without any
|
||||
restrictions. Although certain cases have been dismissed in court cases because of
|
||||
"tainted" methods of collecting evidence, in reality if the government feels an indiv
|
||||
idual is a security ris{(for any reas}) it can produce tapes in court that have been
|
||||
gathered by wiretapping, supposedly not as evidence, but the defendant goes to jail
|
||||
anyway.
|
||||
America, at this point, is operating on a li~-size Monopoly Board. Everyone who isn't
|
||||
in jail or going dirrectly to jail is buying and selling thousands of pieces of paper,
|
||||
with absolute seriousness of purpose, unable to realize that there will be only
|
||||
one winner, and when he gets out of jail, he's going to kick all their asses.
|
||||
|
||||
|
||||
Broadcasting free radio
|
||||
'''''''''''''''''''''''
|
||||
|
||||
In any underground, throughout history, a prime concern has been communications or
|
||||
propaganda. Propaganda, as a word, has ugly connotations, but in reality it means
|
||||
nothing more than the distribution of information. This country has begun to develop
|
||||
a
|
||||
n underground network of communications, in the many small newspapers which has cropped
|
||||
up all over the country. Although there is a spark, there is also a monstrous lack of
|
||||
communications, once you get outside any of the large metropolitan areas. In pr
|
||||
eparation of writing this book, I had to do a great deal of reference work. In this
|
||||
reading encompassed almost all extremities of the political spectrum, from far left to
|
||||
far right. These extremities are so alike, and could be so powerful if they ever g
|
||||
ot over their preconceived impressions of each other and started to communicate. This
|
||||
is the reason I feel the underground has to take propaganda one step further, from the
|
||||
printed page, to the radio broadcast.
|
||||
|
||||
The radio is a factor of ext~-
|
||||
ordinary importance. At moments
|
||||
when war fever is more or less
|
||||
palpitating in every one region
|
||||
or a country, the inspiring,
|
||||
burning word increases this fever
|
||||
and communicates it to every one
|
||||
of the future combatants. It ~-
|
||||
plains, teaches, fires, and f~-
|
||||
es the future positions of both
|
||||
friends and enemies. However,
|
||||
the radio should be ruled by the
|
||||
fundamental principle of popular
|
||||
propaganda, which is truth; it
|
||||
is preferable to tell the truth,
|
||||
small in its dimensions, then a
|
||||
large lie artfully embellished.
|
||||
~-Che Guevara
|
||||
Guerrilla warfare
|
||||
|
||||
Kwame Nkrumah, in his HANDBOOK OF REVOLUTIONARY WARFARE, also stresses the use of
|
||||
radio propagnda. He breaks it down into two basic forms: The first and most important
|
||||
is the same as Che was writing about in the above quotation, this being to communic
|
||||
ate truth to people of the country about the struggle. Nkrumah takes this idea one step
|
||||
futher, and says that really to communicate the underground must speak on many different
|
||||
levels, and this is a key point. How can an anarchist who has a rig~-wing ba
|
||||
ckground understand or relate to a le~-wing anarchist, who uses Marxist terminology?
|
||||
This forces the underground to communicate with many different frames of reference.
|
||||
This hasn't happened in this country: Everyone from far left to far right is hung up
|
||||
with dogmatic ideals, over used terminology, and is absolutely blind to practicality.
|
||||
Nkrumah's second concept of propaganda is for the purpose of subverting the enemy.
|
||||
|
||||
An indispensable primarily to
|
||||
battle is to attack the mind of
|
||||
the enemy, to undermine the will
|
||||
to fight so that th result of
|
||||
the battle is decided before the
|
||||
fighting begins. The revoluti~-
|
||||
ary army attacks an irresolute
|
||||
and demoralized army.
|
||||
~-Nkrumah
|
||||
Handbook of
|
||||
Revolutionary
|
||||
Warfare
|
||||
|
||||
This use of propaganda to discourage the enemy has also a great place in the struggle
|
||||
that is going on in this country today. It has been used to a small degree, with
|
||||
fantastic success, around military bases. There was a regiment of the National Gaurd
|
||||
that refussed to go to Chicago during the National Democratic Convention. Underground
|
||||
newspapers and handbills have encouraged G.I.'s to dissent and desert, and have shown
|
||||
them that it is possible. The effectiveness demonstrated by this demoralizing fo
|
||||
rm of propagnda depicts nothing more than the real turmoil that exists. The successful
|
||||
effect of this communication has resulted from one aspect of its natu~--that being its
|
||||
passionate reguard for truth.
|
||||
Printing a revolutionary newspaper is a great deal easier than forming a underground
|
||||
radio station. Althought the government has strict restrictions on printed material,
|
||||
it is nothing like the regulations it places on radios and television broadcasting
|
||||
. The FCC runs the radio networks with an iron hand, wih the ever present threat of
|
||||
revoking a license. For this reason, any radio station which is striving to be
|
||||
absolutely free must make the ultimate break with the FCC. This can be accomplished
|
||||
in tw
|
||||
o ways. The first and most dangerous, but at the same time the most effective, is by
|
||||
using high powered equipment, jamming out other stations, from a mobile base of
|
||||
operations. The FCC has incredibly sophisticated equipment, and can locate any pirate
|
||||
r
|
||||
adio station in a matter of minutes. For this reason, mobility is essential.
|
||||
Transmitting from the back of a disguised truck has been used successfully, although
|
||||
the movement of the truck while broadcasting must be constant, never repeating the same
|
||||
pat
|
||||
tern, but at the same time keeping within the broadcast power area. This means of
|
||||
transmission is especially effective at gathering, such as demonstrations and riots to
|
||||
keep people informed as to the movement of the enemy. The best method of obtaining e
|
||||
quipment is building your own, as to buy a large transmitter requires the individual
|
||||
to be licensed. Not only that, it's expensive. You can build your own from plans and
|
||||
equpiment purchased through mail order, from most of the companies listed earlier i
|
||||
n the text file.
|
||||
The second method for getting around the strict FCC regulations is legal. Under the
|
||||
FCC's l~-pow~-transmission regulations, one can legally broadcast below 100 milowatts
|
||||
at any empty space on the AM or FM dial, without registering or being licensed. T
|
||||
he disadvantages are obvious: One can be only broadcast up to one mile. Even within
|
||||
that mile, interference from the hi~-power commercial stations is present. And if
|
||||
enough people get into this form of broadcasting the FCC is going to make some sort of
|
||||
regulation against it. This method is not just theoretical, it has been inplemented
|
||||
on the Lower East Side, by John Giorno and his Guerrilla Radio. He broadcast from the
|
||||
top of the St. Mar~-~-t~-Bowerie's belltower at 1400 on the AM dial, and calims he
|
||||
did everything the FCC said he couldn't. I am sorry to say I did not hear the
|
||||
broadcast, as I was out of the o~-mile area at the time.
|
||||
|
||||
|
||||
Telephone and communications sabotage
|
||||
'''''''''''''''''''''''''''''''''''''
|
||||
|
||||
Telephone sabotage can be applied on many levels. First I am going to explain what
|
||||
I am not going to write about. I feel there is no need for me to explain how to make
|
||||
free phone calls by telling the operator that you dialed the wrong number, just as
|
||||
I am not going to get into explaining how to use a number 14 washer with scotch take
|
||||
in a pay phone, or cheating on credit card calls, or spitting on a penny. These are
|
||||
all explained in FUCK THE SYSTEM, a pamphlet on living freely in New York City. The
|
||||
interst I have in telephone sabotage is purely communicational and commercial.
|
||||
Commercial inn the sense, that over the past few years my absolute hatred of vending
|
||||
machines and pay phones has led me to break into almost every kind I could find.
|
||||
Parking meters are the easiest by far: All you need is a hammer and chisel or a larg
|
||||
e money wrench. Soda machines are almost as easy, but real delight comes from ripping
|
||||
a Kotex machine off the wall of a womans restroom, or sticking an explosive charge in
|
||||
the coin slot of a pay toilet. I have never been able to break into a pay teleph
|
||||
o~--smash them, yes, put them out of order, but never able to open them up and remove
|
||||
the coins. This is for several reasons: One is the time element, as most public phones
|
||||
are easily seen, and the other is that all public phones are installed with amaz
|
||||
ing locks, which have completely baffled me.
|
||||
To get back to the purpose of this section, I must emphasize the importance of
|
||||
breaking down the enemie's communications. This in turn results in confusion and chaos.
|
||||
Imagine, for a moment, a squad car without menas of communicating with its precinct,
|
||||
or an enemy aircraft with its radio jammed. This act of breaking down the enemy's
|
||||
lines of communications is not and end in itself, rather it is a tact~--a small, but
|
||||
extremely important, part of a total operation.
|
||||
When considering communications, it is best to start from primative base and work up
|
||||
to more sophisticated tactics. The first and simplest method for rendering a telephone
|
||||
inoperative is only temporary. It entails calling the phone company that a cert
|
||||
ain number be disconnected. This will work for individuals, but not for agencies or
|
||||
law enforcement organizations. An important factor in any form of telephone sabotage
|
||||
is the time aspect of verificati~--in other words, the amount of time it takes the
|
||||
phone company to trace a call. The phone company can tell right away if you are calling
|
||||
from a pay phone, so this should be avoided. Call from a private phone which you can
|
||||
not be connected with, and limit your conversation to under ninety seconds. IMP
|
||||
ORTANT: Most law enforcement organizations, companies, corporations, and businesses
|
||||
have more than one phone line, and in most cases one or more will be unlisted.
|
||||
A common misconception is that a person can render a phone useless by dialing a number
|
||||
and, before the party answers, leave the phone off the hook. This si not true, and
|
||||
doesn't work. Even if the caller does not hang up the phone, the receiver can get
|
||||
a dial tone by hanging up himself and holding the hook down for a little over thirty
|
||||
seconds. Although this method does not work in the cit{(I know because I have
|
||||
experimented with }), I have heard reports that it has been used in rurla areas with
|
||||
varyi
|
||||
ng degrees of sucess. I would suggest trying it out with a friend, to see if it is
|
||||
effective in your area.
|
||||
The other truly effective method is the most dangerous. It entails the actual cutting
|
||||
of the phone wires. This is much easier in a rural area where the phone lines are above
|
||||
the ground, and there are not so many of them. It should be noted that compl
|
||||
ete telephone communications with a small town or village can be broken in less than
|
||||
ten minutes. Probably the most important thing here is having a complete understanding
|
||||
of what you are doing, and using the correct tools. Phone lines do carry electric
|
||||
al charges and, without the complete knowledge of what you are doing and without the
|
||||
correct tools, it would be very easy to electrocute yourself. In rural areas, the basic
|
||||
tools should be: rubb~-soled shoe{(sneake}); pliers with rubber grips; large heav
|
||||
~-duty wire or tin cutters, also with rubber grips; a pair of surgical rubber gloves;
|
||||
a small flashligh{(operate at nig}); and a body strap to allow you free movement of your
|
||||
hands once at the top of the pole. IMPORTANT, before attempting any telephone w
|
||||
ire cutting, get hold of a copy of telephone repairman's manual, and read it.
|
||||
This same operation can be preformed in urban areas, although the process is much more
|
||||
involved. In most urban areas the phone lines run beneath the street level, and they
|
||||
are`usually`)
|
||||
|
||||
to the phone lines in the sewers, there are also all the hi~-voltage electric lines.
|
||||
If you cut into one of these, I don't care how well insulated you are, you'll fry. An
|
||||
urband saboteur should either be in possession of a detailed map of the phone lin
|
||||
es, available at any municipal library, or carry a small electric line locator, so that
|
||||
he can find the right line to cut. The urban guerrilla, on this sort of mission, should
|
||||
carry all the tools the rural guerrilla would have, except he should exchange
|
||||
the body strap for a rubb~-insulated hack saw, also add a crowbar. The hack saw is for
|
||||
the mtal encasement that surrounds all phone and electric wires in the sewers. Access
|
||||
to the sewers is pretty easy, as most manholes will take you into an amazing com
|
||||
plex of all differe~-sized tunnels, where you can get thoroghly lost, unless you have
|
||||
had the foresight to study a map of the sewers, also available from any municiple
|
||||
library. Know exactly where you are going, know all the obstacles that you may come
|
||||
in
|
||||
contact with, and have several routes of escape planned, in case of an emergency.
|
||||
Needless to say, if you decide to go into the sewers, dress accordingly. It's cold,
|
||||
damp infested with rodents, and dark, and many tunnels are partially full of water.
|
||||
A word of caution about using explosives to sever phone lines: In the sewers, don't.
|
||||
In Paris in 1945, the French resistance decided that to aid the oncoming Allied troops,
|
||||
they would cut all lines of communication from the Nazi headquarters and Berli
|
||||
n. This proved insuccessful, for many reasons, but the important fact was that they
|
||||
did attempt to use explosives in the sewer system. A small charge was placed right
|
||||
on the phone lines, and denoted from a good distance away. The phone line was cut, b
|
||||
ut unknown to the resistance, so was a gas main, right next to lines. The result:
|
||||
phone lines cut, a large number of civilians dead, and a block and a half completely
|
||||
leveled. Not only was the area totally destroyed, it was flooded by the bursting of
|
||||
t
|
||||
he water mains which also shared the sewers with the phone wires.
|
||||
One can use small explosive charges in rural areas, as the lines are above the ground.
|
||||
|
||||
|
||||
DOWNLOADED FROM P-80 SYSTEMS 304-744-2253
|
||||
|
254
textfiles.com/phreak/WIRETAPPING/faxint.phk
Normal file
254
textfiles.com/phreak/WIRETAPPING/faxint.phk
Normal file
@@ -0,0 +1,254 @@
|
||||
FAX INTERCEPTION
|
||||
|
||||
This article is reprinted from Full Disclosure #23. Copyright (c) 1991 Full
|
||||
Disclosure. Permission granted by publisher to reprint when subscription
|
||||
information provided: Full Disclosure, Box 903-R, Libertyville, Illinois
|
||||
60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll
|
||||
free: (800) 786-6184. Subscriptions: $18 for 12 issues.
|
||||
|
||||
As with the introduction of all new communications technologies, there is a
|
||||
time lag between the availability of the technology and commercial
|
||||
development of interception devices. Accompanying the use of both are
|
||||
unanticipated risks and the potential for misuse and misunderstandings.
|
||||
|
||||
False Sense of Security
|
||||
|
||||
With the widespread proliferation of fax machines came increased use. In
|
||||
general, a document transferred has been given the same sort of validity as
|
||||
one sent or received by U.S. Mail. In general, such communications were
|
||||
originally secure. Now that interception equipment is available, the sense of
|
||||
security has become false.
|
||||
|
||||
For all practical purposes, fax is a remote photocopying machine. The process
|
||||
begins with the sending unit converting the image on the page into a
|
||||
digitized image (numbers in an electronic format) and transmitting it as a
|
||||
noise sounding signal over a phone line. The receiving fax converts the
|
||||
signal into dots and prints it.
|
||||
|
||||
Since the image is transmitted over standard phone lines, the communication
|
||||
is subject to interception. However, rather than tapping the line with a tape
|
||||
recorder or simply listening to the oral communications, an interception
|
||||
device that makes sense of the specialized signal is necessary. Sometimes
|
||||
this is done by recording the transmission and later converting the recording
|
||||
of the modem signal to a computer image, sometimes it is done 'on the fly' as
|
||||
the signal is being intercepted.
|
||||
|
||||
Simple Fax Intercepts
|
||||
|
||||
Why not just use a standard fax machine for interception? The signal
|
||||
sequences and handshaking at the time machines first connect complicates the
|
||||
possibility. During startup, the machines automatically select one of several
|
||||
built in protocols depending on line conditions. That is why on really noisy
|
||||
connections, the transmission of a page can take much longer. Directly
|
||||
connecting a 3rd fax machine to the line may confuse this process. Both the
|
||||
receiving unit and the intercepting machine would be sending signals about
|
||||
line conditions and protocol. However, if a 3rd fax machine did manage to get
|
||||
properly synchronized to the signal in use without interfering with the
|
||||
initial handshake, it would print an image identical to the one received by
|
||||
the intended recipient. We had mixed results when we tried this in our lab.
|
||||
Sometimes we managed to get all three machines synchronized. Using unmodified
|
||||
fax machines to attempt intercepts didn't provide sufficient reliability to
|
||||
be considered a viable approach. Indeed, continued attempts of this approach
|
||||
would likely put both sender and recipient(s) on notice that something was
|
||||
wrong as connections would be repeatedly lost.
|
||||
|
||||
This doesn't mean that it is really complicated to intercept faxes. The
|
||||
Philadelphia Inquirer reported in September 1990 that Japanese hackers have
|
||||
been stealing valuable information from corporations by using fax
|
||||
interception. The article claimed it could be done by anyone with a little
|
||||
knowledge of electronics. We agree, we have intercepted faxes in our lab.
|
||||
(See front cover for one such example.)
|
||||
|
||||
Doing It Right
|
||||
|
||||
The latest commercially available fax interception devices generally use fax
|
||||
boards in IBM PC or compatible computers. The actual hardware used for fax
|
||||
interception is often the same as used by normal computer-fax systems. The
|
||||
software is more sophisticated. Rather than attempting to synchronize with
|
||||
the sending unit by sending protocol information, it adjusts to whatever
|
||||
protocol the two main players have established and stores the signal
|
||||
information.
|
||||
|
||||
After interception, the electronic information is stored in the computer and
|
||||
is available for review, to be printed, altered or discarded. Such equipment
|
||||
can be left unattended for long periods if necessary, or monitored for the
|
||||
instant use of information in cases where law enforcement is standing by
|
||||
waiting for some specific bit evidence.
|
||||
|
||||
Cellular Fax Interception
|
||||
|
||||
Cellular phone based fax machines provide ripe opportunity for `hacker'
|
||||
intercepts, since the signal is available via low cost police scanners. No
|
||||
physical connection to a common carrier network is necessary. There is
|
||||
absolutely no risk of being detected.
|
||||
|
||||
Commercial fax interception equipment gets more complicated, though. Since
|
||||
fax messages might be on the same phone lines as voice or other computer
|
||||
modem communications, some of the interception devices automatically route
|
||||
different types of communications to different interception devices. This
|
||||
provides the interceptor with a separate recordings of voice phone calls,
|
||||
faxes, and other computer communications.
|
||||
|
||||
Such fax interceptions are based upon the interceptor having a specific
|
||||
target. Distributing the sorts of information received for analysis isn't
|
||||
much different from an ordinary, now old fashioned, wiretap.
|
||||
|
||||
Broadband Interception
|
||||
|
||||
Presorting of signals and voice communications as described above makes
|
||||
broadband scanning for fax messages easy. The interception of satellite or
|
||||
microwave links has become possibile. Cooperation by a common carrier with
|
||||
the government has happened in the past, and strikes a chord of dangerous
|
||||
reality today. But it really takes little by way of home fabricated equipment
|
||||
to monitor much of the satellite link traffic. Commercial equipment is also
|
||||
available. One commercial fax interception unit can decode up to 150
|
||||
simultaneous fax transmissions from a 6,000 phone line satellite link.
|
||||
|
||||
Such broadband interception can also be done on oral calls, however, the task
|
||||
of listening to all the conversations for the important ones is much, much
|
||||
greater compared to scanning faxes. First, faxes are usually much more direct
|
||||
and to the point than normal phone conversations (not so much about Sunday's
|
||||
game). Additionally, optical character recognition (OCR) process can be used
|
||||
to convert much of the text to standard computer data and then be
|
||||
mechanistically selected for closer scrutiny by an automated search of
|
||||
keywords of interest. Encryption of a fax could also be noted, perhaps
|
||||
triggering further attention.
|
||||
|
||||
The risks resulting from broadband interceptions are henious. Your fax could
|
||||
be intercepted not because you were a selected target of law enforcement,
|
||||
industrial spies or miscreant hackers, but because of the route your fax
|
||||
travelled through the common carrier networks. Broadband interceptions become
|
||||
a modern day version of general warrants. Satellite signals don't respect
|
||||
borders. Interception in nations with no privacy concerns for radio signals
|
||||
of what we, as users, understand to be Constitutionally protected
|
||||
communications has become a real threat. There are areas contained within our
|
||||
national frontiers where the United States Constitution does not apply.
|
||||
Foreign embassies present one such clearcut example. The status on Indian
|
||||
Reservations is not cleancut.
|
||||
|
||||
Dangers of Fax
|
||||
|
||||
The February 13, 1990 issue of the American Bankers' Association publication
|
||||
``Bankers Weekly'' reported that ``In one incident, a bank suffered a $1.2
|
||||
million loss through fraudulent funds transfer requests which were
|
||||
accomplished using nothing more than business letterhead, tape and sissors.''
|
||||
A fax machine made such simple tools effective. Inordinate reliance on
|
||||
technology permitted the loss to actually happen.
|
||||
|
||||
The journal continues that there is a need for legislation (changes to the
|
||||
Uniform Commercial Code) to put a stop to the problem. Unfortunately,
|
||||
legislative efforts alone cannot correct the problem. The first step, is an
|
||||
understanding of the technology.
|
||||
|
||||
Once the technology is understood, administrative procedures can be
|
||||
implemented by users of fax machines to protect themselves. That protection
|
||||
cannot be successful without understanding the limitations of the machinery.
|
||||
Taking any communications device for granted is a high risk path.
|
||||
|
||||
New Techniques For Fraud
|
||||
|
||||
The advent of fax technology has opened the door to new methods of fraud.
|
||||
Those intent on committing fraud have always devised methods of bypassing
|
||||
normal authentication systems in order to steal. As technology evolves, these
|
||||
methods also evolve. Protective measures must follow suit.
|
||||
|
||||
Faxes represent a multiple whammy. People who send faxes have some geographic
|
||||
distance between them. Because of past reliance on semi-automated
|
||||
communications, formal verification proceedures are bypassed, substituting
|
||||
the mysterious nature of modern communications. There was a time, even
|
||||
recently, that tellers at banks asked for positive identification even in the
|
||||
case of small cash transactions inside a bank. Yet today we witness orders
|
||||
for large sums being processed simply because ``it came by fax.'' This is
|
||||
truly a conspiracy of laxness and misinformation.
|
||||
|
||||
A written purchase order from a company is likely to have a particular form,
|
||||
and include a signature. One attempting to issue a fraudulent purchase order
|
||||
would need to forge both the form and the signature. Additionally, envelopes
|
||||
and possibly a postage meter imprint from the issuing company would also be
|
||||
needed. Elsewhere in this issue we reprint a letter from the Federal
|
||||
Communications Commission. The letterhead was, for reasons we have been
|
||||
unable to determine, typed instead of printed. Some of the recipients we've
|
||||
talked to have placed calls to verify the authenticity of the letter. As it
|
||||
turns out, the letter was authentic and official.
|
||||
|
||||
A purchase order sent by fax on the other hand, can be created by cutting,
|
||||
pasting and xeroxing together parts of other orders from the company. When
|
||||
received by fax, the fake would appear legitimate.
|
||||
|
||||
PC's & Fax: The Miscreants Gun
|
||||
|
||||
The advent of PC based fax boards exaggerates these problem. A fax that
|
||||
originates, is received by, or intercepted by a personal computer (PC) fax
|
||||
board really opens the door for miscreants.
|
||||
|
||||
A fax, when stored on a PC is easily modified using ordinary commercial
|
||||
software intended for preparation of graphics. An image of the fax can be
|
||||
brought up on the screen and parts of it altered or cut and pasted
|
||||
electronically. For example, a purchase order could have a shipping address
|
||||
altered. A signature could be removed from one document and placed on
|
||||
another. All such operations can be done on a computer screen in moments.
|
||||
Document changes that could take a professional forger hours to accomplish
|
||||
could be done in minutes by an amateur, even an underage one.
|
||||
|
||||
Bogus faxes can be created to be sent to another fax, or incoming faxes could
|
||||
be altered by an employee and printed as authentic. Detection is difficult to
|
||||
impossible, depending on verification techniques used at audit.
|
||||
|
||||
The difficulty of intercepting standard U.S. Mail or voice phone calls and
|
||||
altering the content by a third party is enormous compared to fax messages.
|
||||
Before a fax message is printed, it is just a series of electrical signals.
|
||||
Any alternations result in changes without a trace of the alteration.
|
||||
|
||||
The receipt of a fax is <B>not<D> a confirmation of its content, unless other
|
||||
corroborative authentication validates the information.
|
||||
|
||||
Someone with access to a phone closet can route incoming fax line to a PC.
|
||||
The fax can then be connected to a different phone line. All incoming faxes
|
||||
would be first received by the PC and the operator could alter, erase, or
|
||||
forward without change those faxes to the standard fax machine. A pre-review
|
||||
and alteration if desired scheme can be effected. The same can not easily be
|
||||
accomplished with normal voice phone calls, or the U.S. Mail.
|
||||
|
||||
With the advent of the Caller-ID services, this information should soon be
|
||||
incorporated into fax machines, so the true number of the caller will be
|
||||
placed on the fax. This will still do nothing to prevent transmission of
|
||||
bogus faxes over that phone line.
|
||||
|
||||
Protect Yourself
|
||||
|
||||
The best rule for protecting one's interests when using faxes is to use them
|
||||
only with other confirmation or as confirmation of other communications. They
|
||||
should never be used for final copies of contracts, purchase orders or other
|
||||
important documents that could have a significant impact if altered, or
|
||||
entirely fabricated. Where would we be if our WW2 treaties terminating
|
||||
hostilities were faxed documents. Additionally, information that would not be
|
||||
given out over a standard phone conversation, subject to a wiretap, or other
|
||||
listeners (via a speakerphone, extension, etc), should not be sent by fax.
|
||||
There is no way to tell who may pick up a received fax and read it. In fact,
|
||||
it is more likely an unintended party will read a fax than pick up an
|
||||
extension phone and eavesdrop on a voice call (intentionally or not).
|
||||
|
||||
It should be kept in mind that any errant employees or others that could get
|
||||
access to the fax phone line(s) could intercept all faxes sent or received
|
||||
and make use of the fax images for whatever purpose they desired.
|
||||
|
||||
The intercepted faxes can be used to collect or create incriminating
|
||||
evidence, industrial espionage, or as the base of documents to be used in
|
||||
forgery. There's a whole new meaning to autograph collection.
|
||||
|
||||
Conclusion
|
||||
|
||||
Fax technology in its current form provides a useful service for business and
|
||||
others. However, the risks must be examined so the use doesn't go beyond that
|
||||
which is appropriate given its current functionality / risk ratio.
|
||||
|
||||
In conclusion, the convenience of a fax must be weighed against its risks and
|
||||
procedures implemented to authenticate incoming and outgoing faxes as well as
|
||||
what information is communicated by fax. As with all technologies, it must be
|
||||
understood so that it can be used for purposes that are appropriate for the
|
||||
needs of the technology and the user. A lack of understanding can leave the
|
||||
user exposed to unnecessary danger, liability and loss. When used with an
|
||||
understanding of the benefits as well as the pitfalls, a fax machine can
|
||||
greatly enhance productivity.
|
||||
|
||||
Downloaded From P-80 International Information Systems 304-744-2253
|
Reference in New Issue
Block a user