diff --git a/textfiles.com/phreak/TRASHING/trash1.rdt b/textfiles.com/phreak/TRASHING/trash1.rdt new file mode 100644 index 00000000..7c45a0a3 --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trash1.rdt @@ -0,0 +1,351 @@ + + + *** Dumpster Insights *** + + Report #1 (NET/NYNEX) + + + by: ..oooOO Count Zero OOooo.. + + & + + Brian Oblivion + + + : -=Restricted -=Data -=Transmissions : + : : + : "Truth is cheap, but information costs." : + + (And *some* information you must DIG for...literally..) + + Welcome to issue #1 of _Dumpster Insights_, the magazine that prints TRASH. +Yes, we at -=RDT have been 'dumpster diving' lately, and have found some +interesting tidbits of information. We intend to share some of these +findings in this issue and subsequent releases of _Dumpster Insights_. Of +course, the contents of each issue of _Dumpster Insights_ will vary according +to the contents of the DUMPSTERS! We can only print what we dig up. + + Dumpster Diving is a thrill. Phrack #36 left out *one* important item in +the "REAL Cyberpunks" article: + + REAL Cyberpunks aren't afraid to get their hands dirty. + + Nuff said...here we go. + +*** FAX Trash *** + + Lots of faxes get tossed in NYNEX dumpsters. Currently, employee moral is +very low, with all the recent layoffs and employee/supervisor/union strife. +Around Christmas, we were delighted to find a number of faxes that illustrate +this nicely... + +FAX transmission: Dec '91------------------------------------------------------ + + 'TWAS A MONTH BEFORE CHRISTMAS + + 'Twas a month before Christmas and most managers agreed + What for Christmas this year we might get F M P'd! + The FMP forms were all carefully prepared, + In the hopes that, when time comes, our jobs would be spared. + There was Ranking and Rating and everyone was banded, + To make sure it was fair and not underhanded. + + When one day in the office there arose such a clatter, + I sprang from my desk to se what was the matter. + A green letter was spreading unfortunate news, + Giving contract details and company views. + The new contract was settled a year in advance, + With full medical benefits - a real kick in the pants. + + And they extented that sucker to nineteen ninety-five, + Which sent hopes for the future into a nosedive. + The atmosphere now was as cold as the snow, + And forget the morale - I've never seen it so low. + So we wait, and we work, but we're sad and angry, + That this "Family" company could treat us so badly. + + When the president said, in a televised speech, + To reduce through attrition was a goad within reach. + But if layoffs become real, he said not to sob, + 'Cause he'd set up a board that could get you a job. + Now he spoke with a tongue that was lively and quick, + And you knew in a moment that this man was a prick. + + That feeling you had in your gut since the strike, + Like the Dutch boy whose finger was stuck in a dike, + Now became real as the whole "dam" thing falls, + And you realize the company has you by the balls. + Yeah, they talk about Quality and how it should work, + But they must think we're stupid - they take us for jerks. + + For when push comes to shove, it's the union who's boss, + And they have the last to say, while we stand at a loss. + And I heard him exclaim as he turned off his mike, + Screw the management force, give union what they like. + +------------------------------------------------------------------------------- +FAX transmission: Dec '91------------------------------------------------------ + + THE NYNEX TWELVE DAYS OF CHRISTMAS + + ON THE TWELFTH DAY OF CHRISTMAS, NYNEX GAVE TO ME.... + twelve buyout rumors + eleven nervous breakdowns + ten axes falling + nine lawsuits pending + eight RMC's closing + seven hundred layoffs + six officers indicted + five plus five + four force adjustments + three regions combining + two reorganizations and + ** a head count that didn't include me! ** + +------------------------------------------------------------------------------- +FAX transmission: Jan '92------------------------------------------------------ + + New England Telephone EMPLOYEE SALE!! + + SAVE up to 46% + + That's right friends....you heard it here first. + We can't lay 'em off anymore, so we're SELLING 'em! + + ALL OF THEM! + + We have to downsize our new one-employee-per-business unit goal, + and you can help us do it. + + YOU SAY YOU WANT NEW?...We've got 'em..employees with low mileage, high + performance, and a lot of good years left. + + YOU SAY YOU WANT OLD RELIABLE?...We've got them, too. Their paint's a + little gray and they grumble a lot, but they've seen it all and keep + on working. + + We've been thinking of the layoff business for months, and losing ALL that + severence pay will take it's TOLL. Now help us make a little money on the + deal! + + So...come one, come all to the FIRST ANNUAL NEW ENGLAND TELEPHONE + EMPLOYEE SALE. + + Don't miss a bargain! + + SPECIAL - Buy TWO and get a FREE TOUCH TONE PHONE. + +------------------------------------------------------------------------------- + +Yes, those were GENUINE faxes...funny stuff, but it really gets across the +current state of employee morale..."We're the one for you New England, +New England Telephone...part of the NYNEX Family"...swell. + +Here's a little blurb culled from a NYNEX Signature Graphics Standards manual: + + "This manual describes the proper use of NYNEX signatures - the + building blocks of our corporate identity. It is designed to + assist both employees and suppliers alike who are responsible for + implementing our corporate identity in all of its visual manifestations. + As NYNEX people dedicated to projecting a positive image of NYNEX, + to both the public and our fellow employees, it is essential that we + apply these standards in a consistent and proper manner. + + The NYNEX corporate signature, consisting of *only* the name NYNEX, + is the keystone of our identification system. When shown in its + specially designed letterforms, it becomes more than just letters or + a name. It is a symbol with nuances built into it which allude to + the origins of our information company. *NY* represents New York, + *NE* signifies New England, and *X* stands for the excellence of our + people, our products and services, and our future. These components + joined together with lines extending from the E throught the X form a + unique signature which EVOKES THOUGHTS OF HIGH TECHNOLOGY, LINES OF + COMMUNICATION AND A SENSE OF UNITY, ORDER, AND STABILITY." + + Ahhh...inspiring...words to build an Empire... + + Here's a list of Public Service Center telephone numbers..these are +for New England Telephone/NYNEX in Massachusetts... + + PUBLIC SERVICE CENTER + TELEPHONE REFERENCE LIST + +PUBLIC SERVICE CENTER--------------------------------- +Semi-Public + Customer # 1-555-1717 + Manager 617-965-9030 + Intra/Expediting 617-965-9018 + Fax # 617-964-7012 + +Public + Customer # 800-446-7691 + Manager 617-965-9035 + Intra + 617/508 617-965-9040 + All others 800-446-7691 + PTACS 800-446-7691 + SOA's 617-965-9014 + Service Order Room 617-969-9726 + Fax # 617-969-9726 + +COCOT Service Center + Customer # 800-621-0033 + Manager 617-965-7468 + Intra # 800-621-0033 + Fax # 617-969-9249 + +Centralized Repair Bureau (CRSAB) + Business 1-555-1515 + Coin 1-555-1611 + Residence 1-555-1611 + +Customer Names & Addresses (CNA) + 617-787-2750 + +Customer Response Center (CRC) + 800-555-5000 + +Data Base Update Group (DBUG) + 508-762-1648 + +Directory Assist Data Base + 617-367-9952 + +Legal Department + Accident/Claims 617-743-2763 + Claims Information 617-743-2670 + All Other Inquiries 617-743-7773 + Final Bills/Bankruptcy 617-743-6773 + + + Ever want to call a NYNEX/NET garage? + + Garage Telephone Number + ------ ---------------- + Milton 802-863-8440 + Methuen 508-683-1942 + Conway 603-447-2754 + South Kingstown 401-789-1088 + Portland 207-774-4565 + Medford-West 617-391-9928 + Framingham 508-879-0775 + Springfield 413-734-9983 + Medford-East 617-391-9945 + Boston 617-451-8295 + Dedham 617-326-9901 + E Providence 401-438-9391 + Brockton 508-587-9912 + Shrewsbury 508-842-1818 + Manchester 603-645-2062 + Bangor 207-945-9996 + Weymouth 617-337-9969 + Northampton 413-586-1943 + Hyannis 508-775-0902 + + + Other interesting trash-prizes include issues of "Inside Operations," +a monthly newsletter for NET Operations employees. Here are excerpts from +December '91 and January '92: + + Operations Forum + (To provide a forum for employee thoughts and ideas...) + + "If you could change one thing about your job, what would it be?" + + Employee response: "I would implement a better system to fix NET's + circuit troubles. I've been told that unless our + own internal troubles are escalated, some trouble + tickets don't even get looked at. SCC circuits, for + example, impact our daily operation because they're + the CO's only link to the SCC for 24-hour alarm + service. Priority circuits should be identified + and noted in CIMAP/TIRKS." + + + ** Dial Tone Left at Home ** + + Installation and network employees in the Pawtucket/Providence, RI + area are involved in a six-month trial of the Left In Dial Tone (LIDT) + process. The trial, which began last November in Pawtucket and Buffalo, NY, + will evaluate the impacts of the LIDT process on more than 20 provisioning + systems. + LIDT is a key component of RediServ, a major corporate business plan + initiative to provide dial tone to a customer's location quickly, cost + effectively, and with minimal manual intervention. + LIDT leaves a restriced dial tone on a subscriber's line when service + is disconnected. When new occupants move into the LIDT location, they have + access to Emergency Services (911/E911) and their Residence Service Center. + All other callls from the restriced dial tone, including "0" operator calls, + are intercepted by a recording advising the customer of the dialing + capabilities of the line. + Since the process begins with a customer's disconnect order, Pawtucket + was selected for the trial because of its high customer turnover. About + 700 lines in the area are now working with restricted dial tone. + Mechanized Loop Assignment Center (MLAC) line assigners have matched + customer addresses between databases, and verified that cables and pairs + are wired from the CO to these locations. In addition, they manually assign + any LIDT orders that do not flow directly through the provisioning system. + In the Recent Change Memory Administration Center (RCMAC) [Oh GOD..please.. + ...make these acronyms from HELL go AWAY!... -c0] most translations on + LIDT orders are automatically completed. + For CO technicians the trial has meant more dedicated wiring on the + frame, but less rewire work on subsequent installations. And for splice + service technicians (SST) LIDT should mean fewer dispatches on installation + orders. However, as with any pilot program, problems occur. + Early in the trial SSTs were dispatched unnecessarily for installations + at restricted dial tone locations. A vendor-supported system had caused a + local coding problem for clerks in the posting of completions on LIDT orders. + The problem has since been corrected, and according to Manager Linda + Briggs, the "No Premise Visit" (NPV) rate in Pawtucket should drastically + improve to meet or exceed the 99.3 percent NPV rate in Buffalo, NY. + "Once the LIDT process is fully deployed, installation work for + technicians will become the exception rather than the rule. As a result, + technicians can spend more time on maintenance and outside plant + rehabilitation which will increase service reliability and decrease NET's + cost per access line," says Briggs. + Another issue involving unnecessary police dispatch to LIDT locations + briefly occurred. Rhode Island's Public Service Administration Board + mistakenly understood that 911 operators would be able to call back an LIDT + location if the customer hung up. To correct the situation new LIDT messages + were recorded, expedited through legal channels, and implemented in Pawtucket + on January 17. + "Access to emergency services has been a lifesaver for some Pawtucket + customers who dialed 911 from an LIDT location in a tru emergency and had + the appropriate authorities respond immediately," says Frank Lanza, staff + manager. + Yet another benefit for customers in the LIDT process is service + reliability. Throughout the night all central office lines, including the + LIDT lines, are scanned and tested by a computer [Hrmmmm...mebbe *monitored* + too?...hrmmm... -c0]. As a result, troubles are repaired by the maintenance + center often before customers are even aware that a problem existed. + "For customers Left In Dial Tone will make NET easy to do business + with and will positively position the company in the competitive marketplace," + says Briggs. + + + ** Of Note... ** + + More than 2.4 million (49.8 percent) of NET's residence and simple + business customer records have been verified using the NYNEX Data Validation + System (NDVS). The system compares critical information from five key + databases - CRIS, COSMOS, LFACS, LMOS, and PREMIS - and reports discrepancies + for follow up by Mechanized Loop Assignment Centers (MLACs), central offices, + and other work groups. + In association with RediServ, a major company initiative to allow + faster service installation, data management groups at NET and TRG are + coordinating the line-by-line record verification effort. Employees often + identify inaccurate records as a source of service problems and frustration. + + + + Well, that's it for now....nothing 'earth-shattering'....but interesting + and fun to read nevertheless....and since NET/NYNEX is so ANAL about giving + out information, the only way to get it is to *trash*... + + Look for the next issue of "DI" to come out next month or so...... + + Till then...don't stop exploring....and don't be afraid to get your hands + a bit dirty.... + + ..oooOO Count Zero OOooo.. *cDc* -=RDT + \ No newline at end of file diff --git a/textfiles.com/phreak/TRASHING/trash2.txt b/textfiles.com/phreak/TRASHING/trash2.txt new file mode 100644 index 00000000..7e3d2b0f --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trash2.txt @@ -0,0 +1,254 @@ + THE ........ULTIMATE..........GUIDE........ON...........TRASHING + + + ///\\\ IT's NOT FUN, IT's SCIENCE! ///\\\ + + DEFINITION: Trashing is the operation of recovering paper + documents, bills, checks etc. from the persons or companies garbage + cans(bags). Trashing is one of the the oldest and safest ways to get any + kind of information(if u know what r doing) + + SAFETY: This is very safe method, because usually it + doesn't involve any illegal actions, except trespassing when it's nececery, + it is virtually impossible to get into serious trouble for trashing. + Here's the tip, with it u are never gonna get in any kind of trouble, + REMEMBER u should never look like u are searching for paper documents or + any other kind of private information, which can easily be considered + illegal.(will be explained later) + + STRATEGY: Strategy is more important than most of u kids + think it is. Everybody should have his own strategy, but here are some + hints. It's very important to see three parts of the process which are + targeting, planning and action. Most of u clearly see the last part. + + Targeting or choosing the object for your next mission is very important, + u wouldn't like to trash some supermarket or store, and then find out that + they don't even accept credit cards or bank where they shred all the + fucking paper, however usually it's not so hard to choose the right object, + a little bit of research and common sense, basically thats all! + + Planning - the most important and probably the most difficult part, here + u should plan your mission considering everything: time, weather conditions, + location, security (surveillance and police patrolling), crime situation in + the area (in poor neighbourhoods, where robberies and usual crimes like + that are very frequent, police and people are very suspicious of every dude + walking around dressed in the black) , crowdness , "dress code" and of + course action itself. + + Action completely depends on your physical abilities + (jumping over the fence, sneaking in to the backyard,etc) and abilities of + your tools. Also u should know that trashing takes a lot of patience, + sometimes u have to go for weeks to the same place, until u find what u r + looking for, so it's not a good idea to mess the site up or burn the + garbage cans to the ground, even though that can be phun!:-0) + + TARGETING: There are two ways of targeting : RANDOM - when u + are basically guessing your future objects using your common sense, for + example most people know that banks throw out a lot of paper, so why + shouldn't i check one of them. Usually when u use that method u don't know + exactly what are u looking for, u r just browsing the paper, searching for + something that could interest u, like numbers, signatures, handwriting. + + POINTED - is the other, more sufisticated method of trashing, that involves + some research. Here, the goal is to get as much information as u can about + organization and its activity. The best example, is the trashing of + the private sector, everybody knows that most of the credit card companies + send their statements at the end of the month, so the good idea to trash it + around this time to get the best results. Following the recycling days also a + good example of pointed trashing. + + PLANNING: Remember the most important thing is to plan your + actions, so it will take u the least amount of time possible, without + getting a lot of attention. + + TIME: of course the best time to go trashing is from 2-5 am + (in the big cities), however from my own experience u should do this 4-5 am + when it's not dark anymore but there are still no people on the + streets and your local police units seem to be more relaxed, waiting for + the opening of Dunkin Donuts. Don't be too late, though, if in your area + garbage squad works on any kind of schedule(hehe), u don't wanna come over + and see all the garbage collected! The best night for trashing is the night + before collecting, which u can easily find out by the signs on the street + that say :NO PARKING on particular days, recycling days really can be + helpful since all the paper and cardboard should be wrapped and left in + front of the house, to find out recycling days in your area u should + contact your local department of sanitation (212-219-8090 for NYC + (sanitation action center)) recycling days usually go with interval of 2 + weeks (except holidays). By the way do not spend more than 10-15 minuts + trashing, 15 minutes should be more than enough! + + WEATHER: of course it doesn't really matter, but + if it's raining and weather is shitty itself chances are u'll be doing your + thing without major interruptions. It good to start right after the rain has + started, that way u won't find most of the paper documents damaged! + + LOCATION: Most of the backyards these days remind + concentration camps of the WWII, so u gonna need some skill to go through + those fancy fences. If don't have a lot of experience or u just don't + feel like breaking the law, choose target with an easy access so u won't + get a lot trouble getting in and out. + + DRESS CODE: Get your old dark clothes from the closet and u + are set! However u can't look different from the people in the + neighbourhood! And of course no need for army stuff like camouflage pants, + black gloves and hats, don't get extreme, people will figure some serial + killer they were expecting all their life finally came in their + neighbourhoods, and will call the cops, just for the regular check up! + + PEOPLE (amount): U should avoid usual hang outs + and places where a lot of people happen to like walking through in the + nighttime.In the daytime big crowds are you best allies, if u planning to + trash the cashier's garbage can, in your local WIZ or whatever, the best + hours are from 12 to 4 pm, when either the store is so crowded that you can + take the cashier machine with the papers or it's empty, and most of the + employees happened to take a lunch break or too lazy even to look around! + + SURVEILLANCE: Of course u know today most of the + companies, i don't even talk about banks, armed with the latest pieces of + surveillance equipment, cameras in the backyard of course are the worst and + most common enemies of the trasher, so before diving in, look around, + chances are, theres something that can see u, a lot of private houses have the + movement detectors, u know this really annoying thing that lights up when + someone's walking around, one of my stupid neighbours put one outside his + house, now it goes off, everytime someone walks by the the house, just + break the bulb, and that shouldn't be a big problem. + + ACTION: Ok, here we are ,everything is prepared, the date is + set, your new armani suit is waiting for you in the closet, u are ready to + go! U are gonna need some tools to help you finish everything faster and + safer, of course! What u have to know is that u cannot take anything that + will not be helpful or can reveal your identity if u loose it. + + BLADE - one of the most important tool for u! + Remember those old razors where u had to replace the blade, well thats the + blade u need! I know it's pretty hard to get one today, but u definitely + should check your local pharmacy for it! + + Utility knives : some people use them + because it's safer to carry on and u can use them for other things like + striping wires, but i don't like to use utility knives because they are + pretty big and it's pretty hard to get rid of when u have to, the other + thing is that it doesn't work for me that well! If u don't want + accidentally slash yourself u may consider put some iso-tape(electrical) + over it, and use it as a handle. + + Rubber(latex) GLOVE(s) - here's another tool, for people + like me, who don't really enjoy going through somebodies leftovers or + whatever is in there! I use one glove, the technique is: i carry blade in + one hand and on the other i put the glove, to go through the actual trash. + When u get used to this technique, the work goes amazingly fast. After the + job is done the good idea would be not to put the glove in the same + garbage can! + + FLASHLIGHT: I know it's a very important thing + to have with u, but here in New York i used it maybe twice going trashing, the + streets are so lighten up, i guess u can find a penny in the trash here + without using any portable source of light! + + BAG(s): First of all u are gonna need a + bag to put all you foundings in it, the second bag can be very useful (see + SLASHING) My advice do not carry the bag while going through the trash. Put + it in the can with the rest of the trash, and only after finishing take the + bag and leave fast, otherwise u will cause brain damage to the cop or guard + when he will be thinking why is the guy searching for his watches or cans + has a bag full of documentation and other paper, and we wouldn't want to do anything + like this! + + GOOD LINE (story): REMEMBER, really good line + that can explain your actions can save maybe not the life, but your ass for + sure, something like: I was today in this bank, and left my student ID on + the counter(wherever), and when i called them up they told me that someone + must have put it in the garbage, so i called the sanitation and they told + that today is the collecting night in that area and to search for the + wallet would cost me 70$, so i have decided to go and search for it by + myself! This is very good line, even security and cops have a heart, so + that can even explain trespassing, and shouldn't cause any problem at all, + maybe warning! Now here u want to keep in mind the situation u r in, if u + have a bag full of paper u should come up with explanation, which is not so + easy, to avoid this situation please refer to the paragraph on disguise! + + * DISGUISE: It's extremely important to + include this in your "action pack", what can be considered as disguise, is + something that can support your great story, remember this old disguise, i'm + sure most of u use, put a couple of cans in your bag, now u can bull shit + security about collecting the cans for some competition or just for + yourself, very nice! But here something i made up myself, and it seems to + be working for me with any line i use: U know, a lot of old people actually + collect all the plastic bags, why would they buy new ones, so if u are + gonna put about 5 plastic bags in your bag, u can easily get of the hook, + claiming that your old grandma asked you to pick up some plastic bags on + your way, since she knows that your going to go through the garbage! + (for whatever reason u told the cops) Usually they ask u to take out what + u have in the bag, u just look inside your bag and find your lifesaving + plastic bags, here u go sir, if the cop is really pain in the ass and finds + out that u have paper in the bag as well, just tell him that it must have + been in the plastic bags u 've found, and u didn't want to take it out here, + because it's kind of embarrassing u know, if some of your friends see u + diving in the garbage can! hehe Yeah right, i guess that sounds nice! As i + said before cop too has a heart and a little bit of brain so if your story + sounds LOGIC u shouldn't have a lot of shit on you! hehe Thats idiom! + + Another tip before u've started, don't hang around people's cars, + windows and other valuable stuff, u know people usually get pissed off + because of that! + + PRIVATE HOUSING: trashing here can be very complicated, if u + don't know how to do it right. Here u are gonna have to deal with bags. + (see SLASHING) First of all u should think before doing this on the + site: it will take u a lot of time, trash here is usually very dirty and if + u live in your own house or know some quite place outside, a good + idea would be to bring a couple trash bags in your back yard. If u live in + apartment like i do, here what u can do: DEPARTMENT OF SANITATION + in the big cities is very strict and always make up some shit like + recycling or just sorting the trash! Well i guess thats all u need, in NYC + city looking for the papers u should check all the GREEN garbage cans, + where all the paper should be. U can go further and use you social + engineering skills to call up people in the house, posing as an employee of + the department of sanitation, and tell them that last time, workers found + in the their trash checks, bills and statements, which is illegal + to put with the regular paper, because they contain some chemical + (dEnopEroXId......whatever)(i'm not Mendeleyev, neither have to be u) + which is none recycble, and can cause serious damage to the + atmosphere :). SO next time please put all your checks, bills + (whatever u want them to) in the pink bag, u can also ask them to mark it, + something like "RADIOACTIVE" or "BODY PARTS", even can + specify the date when they should take it out! hehe. So next time u'll be + around u can easily determine where is everything u need. This + method will work in the big cities where SANITATION is very powerful and + strict, once i put my paper in the bag, and got ticket just because i + didn't wrap it up. + + GOVERNMENT and COMPANIES structures: all the garbage they + usually keep in the back yards, however if u don't see any drive access to + the back yard they probably take it out on the garbage day(a lot of banks + in my neighbourhood do that, because of the limited space in the backyard, + or because they don't have a drive access to it, they have to take it out + anyway) Certainly this can be the easiest way to trash, just wait until the + garbage day, go there and here u go, in front of the bank or whatever, u + see 3 or 4 carefully tied bags. If u want to be there first, u should go + right after the closing, and don't worry to be late for it, no + selfrespectful sanitation department will pick up the garbage earlier than + the middle of the night. + + SLASHING: Slashing the bags is the fastest way to open them, + right!? If u gonna trash one of those big metal trash cans, u can dive in + and leave whatever mess u want, it doesn't really matter those big garbage + trucks will take the whole can, but when u trash private house it's very + important not to leave any mess after you. All the garbage from houses and + streets those garbage men will pick up with their hands, and i don't think + they will be happy to see slashed bags with all this mess around, the owner + will definitely get a ticket for that. The solution is to take another bag + where u can put all your mess, without getting hardworking men angry. U + gonna get used to slash the bags in the right places, so u won't get too + dirty and finish the damn thing faster. + + CAUTION : Right now, when u r reading this, someone can + easily be trashing you, so if u don't want to become victim of this + document, please do not throw away any papers that can reveal anything + from your personal data! + + + release date: 11/97 by : + + + ::::::::::::::::::::::::: GOLDEN DUST :::::::::::::::::::::::::: diff --git a/textfiles.com/phreak/TRASHING/trash3.phk b/textfiles.com/phreak/TRASHING/trash3.phk new file mode 100644 index 00000000..5676830b --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trash3.phk @@ -0,0 +1,110 @@ +>>>>> TRASHING TECHNIQUES <><<<<<<<<<< + + //////////////////////////////// + / MORDOR AE - 528-6467 ZANDAR / + / THE BASEMENT - 223-6404 / + //////////////////////////////// + +THE UNDERGROUND ALLIANCE RULES!!!!!!! + + Ok guys...first,there has to be a bell telephone station near you or someone +close to your heart...... + + The best type to look for is known as a "VAULT" if you have seen one you know +why it is called just that... it has four walls, no windows, and most likely a +digital combination lock. + + + NEEDED EQUIPMENT +====================================== + 1:Sneakers(in case of cops) + 2:Sheet of paper w/excuses if caught + 3:Clean garbage bag(several)the ones you find in the dumpster reek like all + hell + 4:One flashlight(good batteries) + 5:Dark(possibly camouflage)clothes + 6:A friend(trustworthy not a wimp) + 7:One bottle of j.d.(just for the hell of it) +====================================== + LIST OF EXCUSES +====================================== + + 1:I forgot murder was against the law + 2:I was lost.. + 3:I was hungry + 6:Needed a place to sleep + 5:Why not? + 6:Lost something in the garbage + 7:Needed wallpaper + 8:Fuck off and die + 9:Read me my rights first + 10:It's the new fad..garbage pursuit + +====================================== + BE PREPARED FOR... +====================================== + + 1:An immediate unforseen departure from the premises(w/the stuff!) + 2:Zandar's law...for every piece of inorganic garbage there is an + equal and substatially worse smelling piece of organic shit! + 3:Your friendly neighborhood cop + 4:A shower when ya get home + 5:A lot of garbage + 6:Potholes and ditches that you never knew existed + +====================================== + WHAT TO LOOK FOR +====================================== + + 1:Anything that looks dead... + 2:Anything that looks like a computer printout(or manual) + 3:Hardware(with a lot of luck) + 4:Police(look do not find!!) + 5:The garbage area + 6:An escape route + 7:An obscure and well hidden stash area as well as an obscure + approach + +======================================= + WHAT NOT TO DO +======================================= + + 1:Get caught + 2:Panic + 3:Leave any sign of your presence + 4:(clean the damn place up) + 5:Make noise + 6:Have more than two people + 7:Forget where you live + 8:Do not go to the near by restaurant or bar for a quickie + 9:Do not do it in the daytime + 10:Throw anything back just because you aren't sure what it is... + (chances are it is worth all the more 'cause only telco employees + can understand it) + +======================================= + We believe that if you follow these instructions you too can screw over BELL +w/a little luck and half a brain................ +======================================= + as a final note,find out when your local sanitation co. picks up the garbage +and go the night before.. also,if the bell place nearest you incinerates its +garbage forget it! +======================================= + written by: + + zandar zan + & + the boogyman +======================================= +u + insinerates its garbage forget it! + +======================================= + written by: + + zandar zan + & + the boogyman +======================================= +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/TRASHING/trashin2.txt b/textfiles.com/phreak/TRASHING/trashin2.txt new file mode 100644 index 00000000..62fd96c6 --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trashin2.txt @@ -0,0 +1,80 @@ + Advanced Trashing Techniques + -=-=-=-=-=-=-=-=-=-=-=-=-=-=- + + By: Jimmy'z + + + +Introduction: + + Trashing is the simple act of looking through other peoples +trash; to find interesting stuff. If you wonder why one would +ever want to consider doing such an act... Remember : One man's +garbage is another man's treasure. + + The whole reason for trashing is to find INFORMATION. You +could be interested in getting credit card numbers, computer +system passwords, industrial secrets, blackmail material, +ANYTHING. 99 times out of 100 it'll be in their trash. + + + +Trashing Techniques: + + The best time for trashing is in the broad daylight *Unless +the place locks their trash* Remember, if you act really +inconspicuously, nobody will bother you. If by chance someone +asks you what the h*ll you're doing, tell them you're looking for +aluminum cans or something equally as stupid. + + Remember to wear gloves, long sleeved shirts, and jeans of +some sort. I've jumped into a few dumpsters containing fiber +glass, nails, and even once : SHIT... It's a dirty business, BUT +IT CAN PAY OFF IF YOU DON'T GET DISCOURAGED. Last time I went, I +found over 500 TRW credit reports (Roughly 750 credit cards, plus +TRW accounts, and passwords.) + + +Best Places to Trash: + + When thinking of a place to go trashing, you must first take +into account WHAT you are trying to find. (You don't want to +trash behind McDonalds if you are looking for credit card +numbers. I highly suggest you NOT trash at a McDonalds - why +look through all that crap. If you are looking for cards, the +best places are malls. Malls are good because they receive by +far THE MOST credit card payments. Trashing really requires +thought on the part of the trasher, and with a little help from +me, you'll be on the right track. + + Flower shops are good places to trash. Most flower shops do +most or all of their business through credit (phone orders) And +besides, would you rather look through some smelly, shitty crap, +or dead flowers?! Another really cool place to trash is the +telephone company. If you have one of those big telephone +company buildings, you'd be surprised at the types of data they +throw away. Computer system's passwords, phone card numbers, the +list goes on. + + + +Closing: + + Trashing can prove to be very fun, interesting, AND +PROFITABLE! Just keep on doing it, and you'll stumble upon some +really interesting stuff. You never know when you'll find a +briefcase or something filled with cash, or drugs. Another +thing, when trashing - just jump right in there, leaning over one +of those dumpsters can start to hurt after a while! + + + + + +Disclaimer: + + This file is for informational use only. I am simply +reserving my right to free Speech! I love The USA! + + +----------------------------[ J I M M Y ' Z]--------------------- \ No newline at end of file diff --git a/textfiles.com/phreak/TRASHING/trashing.hac b/textfiles.com/phreak/TRASHING/trashing.hac new file mode 100644 index 00000000..371d5b8e --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trashing.hac @@ -0,0 +1,134 @@ + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + % % + % Better Homes and Trashing % + % % + % Written by..... The Saint % + %%%%%%%%%%%%% %%%%%%%%%%%%% + % Thanx to Ares for his help! % + % % + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +Intro: + + This file is intended for informational purposes only!!! + + The authors (The Saint and Ares) take no responsibility whatsoever for +any actions taken by anyone who reads the contents of this file. + + Primarily, this file will discuss the general idea behind trashing, the +risks involved, and some general tips to make your trashing venture +successful. + +Basics: + + The basic reasons for trashing can vary, but are generally: + + 1> To obtain credit cards and/or carbons of credit cards. + 2> To obtain any information that may be useful in the aid of phreaking. + + When choosing a place to go trashing, one must keep in mind the following: + + 1> Location of dumpster + 2> Security of property where dumpster is located + 3> Type of trash that may be found + + First, the location. You generally want to pick a place that is somewhat +isolated, where there will not be a lot (preferably none) of people. To +accomplish this, it is also best to do your trashing at night, as there +will not likely be any employees at the location, and it is easier to hide +and to not be seen by passers-by. + Second, the security. Places such as Telco buildings and large companies +often have security guards on duty 24 hours, and often keep their dumpsters +behind fences so as to discourage trespassing. Yes, you are trespassing when +you start looking in someone's garbage can!!! So it is a good idea to check +out the place you are going to trash for a day or so to get a feel for what +kind of security they have. This way, you can avoid walking in blindly to +some place and getting nabbed, or you can figure out where to park your car, +or where to hide, or how to avoid the security (rent-a-cops). + Places such as department stores and banks most likely will not have any +security for the outside of their buildings as they may not be able to +afford it or may not anticipate trashers. Also, they may not have anything +worth taking! So basically, check the place out before you just go and hit +it. + Case in point. One night, my friend and I casually pulled into the +parking lot of a Pacific Bell office, and before we knew what was +happening, a security guard had a giant spotlight glaring down on us. +We just casually made a u-turn as if we were just turning around to go the +other way. (More on what to do if you get caught later). + + Third, you must pick a place where you know there will be trash that is of +use to you. Don't go trashing at some little deli, all you'll get is a +bunch of rotten food! (Unless of course you know for a fact that the deli +deals alot with credit cards). In searching for cards, pick places such as +department stores or places that sell alot of expensive stuff. + + Also, the local telephone company is, of course the place to go to find +your basic phreaking info. + +These have been some of the basics to keep in mind before you hit aplace. +Now for some techniques to use to help increase the efficiency of your +trashing endeavors. + +Tips: + +First of all, don't be afraid to actually go into the trash can. This is +almost always necessary to reach the good stuff. Also, when you are ducking +down inside a big dumpster, you cannot be seen by passing police cars or +security guards who happen to waltz by. + +Second, always have a lookout somewhere to keep an eye out for cops or +employees who may be coming out to throw trash away. You may want to have +some kind if signal so that if you have advanced warning of security, you +can take evasive measures, like burying yourself in the trash. + +Try not to spend too long in a given trash can. The longer you stay, the +more you put yourself at risk of getting caught. This means that you cannot +be too picky about what trash you take. There is plenty of time for that +after you bail the scene with the goods. You may want to have a knife handy, +however, to cut open boxes or bags, and a small flashlight is a good idea, +although if possible, avoid using to much light or making too much noise, +anything that could potentially attract someone. + +A car is a good thing to have, if possible. This greatly increases the +range of places you can hit in one night. It is a good idea, if you are +accumulating alot of stuff, to stop somewhere secluded and well lit +(like a school or empty shopping center) and sort out the trash so you +can get rid of useless garbage like food, etc. Take all the useless +garbage and dump it into another dumpster. + +You may want to wear old clothes that can get messed up, and gloves are not a +bad idea either, both to keep your hands clean, and to keep prints off of +anything in case the place discovers what you have done. + +What to do if you get caught: + +This is perhaps the most important thing to keep in mind when trashing. +What to do if you happen to be caught be someone and they want to know what +you are doing. + +If you can, run like hell! Only do this if you have a clean getaway +and you think you can get away without too much problem. Keep in mind that +trying to escape may only make your situation worse. Only run if it looks +like they are gonna bust you. + + In most cases, the people may just tell you to get out. They will probably +ask you some dumb questions, like "What are you doing in the trash?" +In this case, make up a story, like "Oh, my friend here threw a ball +in here and I was looking for it." If the guard believes you, he will +probably just tell you to get out with a strong warning. + + If they are serious about nailing you, however, chances are you'll only +get charged with trespassing, which is not a major crime. In any case, +however, maintain an extremely high level of caution when trashing, and +always remain calm and collected. You can usually bullshit your way out +of just about anything if you play your cards right. + +Hope this has helped you to gain some insight into how to go about gaining +that valuable information you always wanted. + +Look for more informative files in the future from Better Homes and +Anarchy. And if you have any comments or anything to add, you can get hold +of me on the Electric Kingdom at (619) 484-5243. Please upload this to +many BBS's around the country to help your phellow phreakers! + +DOWNLOADED FROM P-80 SYSTEMS...... diff --git a/textfiles.com/phreak/TRASHING/trashing.phk b/textfiles.com/phreak/TRASHING/trashing.phk new file mode 100644 index 00000000..358399f3 --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trashing.phk @@ -0,0 +1,67 @@ +Uploaded By: PRIVATE PIRATE +--------------------------------------- + Bell Trashing + By: The Dragyn + The Police Station + 612-934-4880 + + + The Phone Co. will go to extreams on occasions. In fact, unless you really +know what to expect from them, they will suprise the heck out of you with their +"unpublished tarriffs". Recently, a situation was brought to my attention that +up till then I had been totaly unaware of, least to mention, had any concern +about. It involved gar- bage! The phone co. will go as far as to prosecute +anyone who rumages through their garbage and helps himself to some. + + Of course, they have their reasons for this, and no doubt benefit from such +action. But, why should they be so picky about garbage? The answer soon +became clear to me: those huge metal bins are filled up with more than waste +old food and refuse... Although it is Pacific Tele. policy to recycle paper +waste pro ducts, sometimes employees do overlook this sacred operation when sor +ting the garbage. Thus top-secret confidential Phone Co. records go to the +garbage bins instead of the paper shredders. Since it is constantly being +updated with "company memorandums, and supplied with extensive reference +material, the Phone co. must continualy dispose of the outdated materials. +Some phone companies are supplied each year with the complete "System +Practices" guide. This publication is an over 40 foot long library of +reference material about everything to do with telephones. As the new edition +arrives each year, the old version of "System Practices" must also be thrown +out. + + I very quickly figured out where some local phone phreaks were getting their +material. They crawl into the garbage bins and remove selected items that are +of particular i nterest to them and their fellow phreaks. One phone phreak in +the Los Angeles area has salvaged the complete 1972 edition of "Bell System +Practices". It is so large and was out of order (the binders had been removed) +that it took him over a year to sort it out and create enough shelving for it +in his garage. + + Much of this "Top Secret" information is so secret that most phone companies +have no idea what is in their files. They have their hands full simply +replacing everything each time a change in wording requires a new revision. It +seems they waste more paper than they can read! + + It took quite a while for Hollywood Cal traffic manager to figure out how all +of the local phone phreaks constantly discovered the switchroom test numbers. + + Whenever someone wanted to use the testboard, they found the local phone +phreaks on the lines talking to all points all over the world. It got to the +point where the local garbage buffs knew more about the office operations than +the employees themselves. One phreak went so far as to call in and tell a +switchman what his next daily assignment would be. This, however, proved to be +too much. The switchman traced the call and one phone phreak was denied the +tool of his trade. + + In another rather humorous incident, a fellow phreak was rumaging through the +trash bin when he heard someone approaching. He pressed up against the side of +the bin and silently waited for the goodies to come. You can imagine his +surprise when the garbage from the lunchroom landed on his head. Most people +find evenings best for checking out their local telco trash piles. The only +thing necessary is a flashlight and, in the case mentioned above, possibly a +rain coat. A word of warning though, before you rush out and dive into the +trash heap. It is probably illegal, but no matter where you live, you +certainly won't get the local policeman to hold your flashlight for you. + +--------------------------------------- +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/TRASHING/trashinguide.txt b/textfiles.com/phreak/TRASHING/trashinguide.txt new file mode 100644 index 00000000..5daca70e --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trashinguide.txt @@ -0,0 +1,170 @@ + \Anti-Social Magazine + \ Issue 12 31/03/99 + +------------------ + ===================== + Trashing - The Guide + By Crashd + ===================== + +Hey, Nice to be back again, This is my first interesting file in a long time, +And as far as I can tell (sorry if I'm wrong) this subject hasnt been covererd +at all (for the UK) Although I remeber some rather amusing incidents involving +trash :) Trashing, is basically just wading through bags of shit and rubbish, +looking for interesting things - documents, flopwarez, equipment etc.. + +This deal is split into 2 main areas, personal and business (just like the BT +phone book :) + +Ok, i'm gonna deal with personal first, as this is probably the easiest. + + +1.\ Personal Trashing +===================== + +Let's take target #1. He's maybe a businessman, you want his CC number, +mobile ESN, Girlfriends phone number, or just want to invade on the poor man's +private life. Well the best place to start, is find his home address, and +preferably the post code (if you cant find the latter, just knock at the few +houses around his, they will probably glady give you it, lie and say your new +to the neighbourhood) Now, phone the local council dude's, and ask when the +refuse collectors (garbage men :) pick up the trash/shit. Or just ask the +nice neighbours again. + +The Night before the trash pick-up, be prepared. For clothes, I recommend +something warm, this is my standard atire: + +* 1 heavy-duty flashlight +* 1 backpack lined with binbag +* 1 black beanie hat +* 1 pair of gardeners gloves +* 1 pair of latex gloves +* 1 Pair of lightweight bottoms +* 1 rain-coat, just in case + +Now, go for a stroll, probably the best time is about 10 or 11. Walk past the +person's house, and check to see if he/she has left out their groovy wheely +bin (most houses in the UK have these, a gift from the Labour Government). +If so, walk straight past, towards say a shop or phone box, or whatever. +About 10 minutes later, stroll past again, and accidently shunt into the bin, +pick it up off of the ground, and walk away with it, take it down a +back-street or whatever. Open it up, and get searching, dont forget the +flashlight, dont shine it into cars going past or whatever. If you see +anything worth stealing, pop it into your nice bag. +Common stuff for stealing is: + +* Phone Bill +* Receipts +* Business Cards +* Filo-Fax's +* Diary's (blackmail anyone?) + +Most people tend not to chuck out Tv's etc..but if you find any electronical +junk, take it and salvage for components :) When your finished with this bin, +walk past nice and calm, make the drop off, turn a corner and walk slowly +home, along with your sack of delights :) + + +2.\ Business Trashing +===================== + +Business Trashing is much more popular than the latter shit. Stuff you can +get from Companies include: + +* Big Lists of ESN's +* Manuals for Computers etc.. +* Journals (par example, the first Blue Box was derived from a technical + manual found in a bin in the US) [Correction, No it wasn't, it was built + using the tones published in a technical + journal, publically available though + not a well distributed one -Ed] +* Equipment no longer needed + +Hmm, the atire should basically remain the same, nice and conspicous and most +of all old - it will take a little more than vanish to get rid of that Bad +smell :) + +The only time to trash business's is at NIGHT. Make it a weekend (maybe friday +or saturday). Walk past Target company at about 10 to check out any security +measures that may harras you, such as watchmen, dog's or camera's. (A +favourite target of UK phreakers is BT's Exchanges/Offices. A lot of the MED +archives is supposedly found through trashing =) Pop back to your house and +pick up any decoy's or help you may need: + +Example: + +* Dog's - Mace (cruel) some fresh bloddy dripping meat (nice, but expensive + and short term) + OR + An Ultrasonice grenade (Schematic shown below..it works as + well...damn good. + +* Camera's - Spray paint (good), blakck paper or just wear a lot of black and + hope to hell they aint infra-red. + +* Watchmen - You will almost certainly need some friends to help, get them to + either phone the place in question, or create a decoy, ie: + harrasing him while you nip round the back. + +Also, bring the bag, in it put some chain cutters, and a crowbar. + +If there is chains, cut them. A door? Crowbars work wonders. +Once past the first obstacle, if there any of the above (dog, camera's etc..) +If it is a yard etc.. the bins are big green/grey plastic/metal effors, +probably chained, cut the chains and get rooting, try to have a look-out +keeping tabs for you. + +Obvious items of interest (from experience in BT places) are: +* Big Chunks Manuals +* Any Reams of form-feed paper (usually phone bills or quotes) +* ANY Equipment, electrical or otherwise + +Now, your trashing mission is complete, try and escape a different way to +your way of entry, and if you disturbed anything, for example the camera's, +leave them, Looks better in the long run. + +If you repeat trash a place You will probably get caught quickly, sorry but +that's the long and short of it, so go trashing maybe once every 2 months, +and make it a nice big thorough inspection as you aint coming back for a +while + +* Schematics For Ultrasonic grenade. +==================================== + +Ok, here's what you will need: + +* 1 Gutted Tennis Ball +* Circuit Board - Bread-Board will do for this. +* 1 Ultrasonic Transducer (sender, not receiver), (Maplin, rapid, about ú1) +* 1 555 Timer chip +* 2 resistors, preferably variable +* 2 capacitors - .1 Muf should do. +* 1 Mercury Tilt Switch +* 1 1 Normal SPDT switch + +Ok, first, if you Cant set up a monostable timing circuit, please please +please dont bother trying to build this. Go check the web or ask a +electronics lecturer. Ok, for the input of the timing circuit(Chip's pin 1), +we want the mercury tilt switch, these are bi-polar. Have the timing circuit +on it's own little PCB, and between then battery and the circuit, have the +normal SPDT switch, cut out a small hole for this on the tennis ball. Also +cut out another one, about 2cm's in diameter, for our transducer. Now wire +the ultrasonice transducer as the output (pin 3) of the timing circuit. Glue +the transducer into the tennis ball, and close it up with a bit of +araldite/black tape/whatever. + +Operation +========= + +When you want to use this, throw the SPDT switch, and lob it at a wall, make +sure that it spins, or at least rolls. No dog/cat/bat for a good few meter's +will be able to come near it and if they do, they will be in a little pain. + +IF you want the Proper PCB Schematics and FULL instructions for this (yes, +even how to build the fucking timer circuit) mail: crash_dave_1997@yahoo.com + +Ok, thanks for reading, and if you havent..you've missed it all :) +Werd +Mail me: +crash_dave_1997@yahoo.com +ICQ UIN: 7538027 +IRC: EFNET: #2600-uk, #phuk diff --git a/textfiles.com/phreak/TRASHING/trashis.phk b/textfiles.com/phreak/TRASHING/trashis.phk new file mode 100644 index 00000000..a49499dd --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trashis.phk @@ -0,0 +1,119 @@ +:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%: +:% %: +:% BASIC TRASHING MANUAL %: +:% Written by: %: +:% The Blue Buccaneer %: +:% %: +:% The Rebel Alliance MegCatLine : [615] - 942 - 6670 %: +:% %: +:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%: + + + This is an elementry manual on trashing. I don't think I am qualified to +do one on advanced trashing, so here are the basics: + +:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: + + Trashing is the act of sorting through trash captured from the garbage bins +and cans of your local MaBell office. The trash often contains many valuable +things which can range from office memos instructing an operator to carry out a +special task (trace someone's line..etc) to actual working phones! In addition +to those things, you are also very likely to pick up Bell manuals (they have +this habit of replacing them every time one word is revised) + + The following is a list of suggested instructions and tips to follow when or +if you go trashing. Trashing can be quite profitable and fun, provided you do +it right and don't get smelly, dirty, or busted. + +:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: + + +STEP #1: LOCATE YOUR TARGET + This involves deciding on where exactly the place is you want to + trash. The place you want to go trashing at is the Switching Office + since that's where everything happens. The easiest way to find the + S.O. is to look for a lot of microwave towers. (not too hard, eh?) + A good place for advanced trashing is your local COSMOS Office. To + find it, look for the place in your city which most resembles: + 1. A Castle or Fort + 2. A Bunker out of WWII. + 3. Your local Federal Prison. + 4. A Building with the slogan "The more you hear.." on it. + The security around these places is that of any of the 1, 2, or 3. + Other possible targets would include: + 1. Relay stations. + 1. Look for a medium to small size tower with a little shack. + 2. Look for a big-ass tower with a house with AT&T on the door. + The little shacks are usually good to break into because they + are left with some really good stuff and are usually out in the + middle (maybe a little to the west) or nowhere. + I've never been into the houses. You can easily spot them + because of the towers in the backyard and the odd fact that they + have only one door (the front) and no (0) windows. + +STEP #2: SCOUT THE TARGET AREA + One person should go out to the place you plan to trash and take a + good look around. He should look for: Doors, cameras, fences, dogs, + and the garbage bins. This is to minimize the amount of confusion + when you go trashing that night or whenever-the-hell you go. + The scout might want to make out a small map of the streets & stuff + in the area if the group is unfamiliar with it. You might also want + to use it for quick, safe escape routes. + +STEP #3: GATHER EQUIPMENT + Here is a brief list of equipment you might want to take along: + MAP : Streets, doors, security guards/cameras, garbage bins, etc... + CAR : Doors and trunk open (lights off) Liscence Plate Covered + While the car is not necessary, it is helpful in quick getaways and + is easier than biking or walking. + PEOPLE: More than one; Less than six. + Almost never go trashing alone. And never bring more than five guys + along with you. It's a little obvious when you have six or seven + teenage guys with sacks, dark clothing, and flashlights. + The recommended group is three, but a duty chart shows more or less: + Number of people: 1 2 3 4 5 6 + Number to search: 1 1 2 3 3 4 + Number to watch : 0 1 1 1 2 2 + --- BEST WAY ---: ^ + EQUIP : Sack (each - nylon recommended as is light & easily washed/hidden) + FlashLight (each - with handkerchief) + Use the handkerchief to cover the lmght at all times. + (Light looks really unusual comming out of a garbage bin at 3am) + Sneakers (ratty as possible - it is, afterall, garbage) + Dark Clothing (no bright orange or other florecent materials) + <+- ADVANCED EQUIPMENT -+> + Nitefinder goggles + Ski Mask + Gloves + Walkie Talkies / CB Radio + Lockpicks + A word on the lockpicks: + Lockpicks are very handy to have if the garbage is locked up. + BUT DO NOT bring them if you don't know for a fact that there + are locks -or- if you don't know how to use them correctly. + Should you get caught, you don't want to have attempted breaking + and entry and shit like that trying to be pinned on you. + Diversion Equipment: Smoke, Gas, Bang, or Flame bombs + Bring only that- no pipe bombs, soda can bombs, or harmful stuff + like that. If you get caught with that stuff, they get nasty. + It is also tempting to level the garbage bin just before you + leave, which is not too wise. + +:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: + + AND NOW, THE EVER PRESENT: DOs and DON'Ts + + + If you're going advanced trashing, bring along a voltage meter to test fences, +doors, and stuff that might be electrically wired or monitored. + + DO NOT go poking around anywhere other than the bins. There are probably +silent alarms on the doors and possibly hidden cameras watching those other +places you might feel tempted to go poking around. + + DO NOT make a lot of noise. Tipping over the cans and telling dead baby jokes +is generally unwise. + +// FILE ABRUPTLY ENDS // +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/TRASHING/trashng.phk b/textfiles.com/phreak/TRASHING/trashng.phk new file mode 100644 index 00000000..2aad3784 --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trashng.phk @@ -0,0 +1,138 @@ + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + % % + % Better Homes and Trashing % + % % + % Written by..... The Saint % + %%%%%%%%%%%%% %%%%%%%%%%%%% + % Thanx to Ares for his help! % + % % + % June 24, 1987 % + %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +Intro: + + This file is intended for informational purposes only!!! + + The authors (The Saint and Ares) take no responsibility whatsoever for any +actions taken by anyone who reads the contents of this file. + + Primarily, this file will discuss the general idea behind trashing, the risks +involved, and some general tips to make your trashing venture successful. + +Basics: + + The basic reasons for trashing can vary, but are generally: + + 1> To obtain credit cards and/or carbons of credit cards. + 2> To obtain any information that may be useful in the aid of phreaking. + + When choosing a place to go trashing, one must keep in mind the following: + + 1> Location of dumpster + 2> Security of property where dumpster is located + 3> Type of trash that may be found + + First, the location. You generally want to pick a place that is somewhat +isolated, where there will not be a lot (preferably none) of people. To +accomplish this, it is also best to do your trashing at night, as there will +not likely be any employees at the location, and it is easier to hide and to +not be seen by passers-by. + + Second, the security. Places such as Telco buildings and large companies +often have security guards on duty 24 hours, and often keep their dumpsters +behind fences so as to discourage trespassing. Yes, you are trespassing when +you start looking in someone's garbage can!!! So it is a good idea to check +out the place you are going to trash for a day or so to get a feel for what +kind of security they have. This way, you can avoid walking in blindly to some +place and getting nabbed, or you can figure out where to park your car, or +where to hide, or how to avoid the security (rent-a-cops). + + Places such as department stores and banks most likely will not have any +security for the outside of their buildings as they may not be able to afford +it or may not anticipate trashers. Also, they may not have anything worth +taking! So basically, check the place out before you just go and hit it. + + Case in point. One night, my friend and I casually pulled into the parking +lot of a Pacific Bell office, and before we knew what was happening, a security +guard had a giant spotlight glaring down on us. We just casually made a u-turn +as if we were just turning around to go the other way. (More on what to do if +you get caught later). + + Third, you must pick a place where you know there will be trash that is of +use to you. Don't go trashing at some little deli, all you'll get is a bunch +of rotten food! (Unless of course you know for a fact that the deli deals alot +with credit cards). In searching for cards, pick places such as department +stores or places that sell alot of expensive stuff. + + Also, the local telephone company is, of course the place to go to find your +basic phreaking info. + + These have been some of the basics to keep in mind before you hit aplace. +Now for some techniques to use to help increase the efficiency of your trashing +endeavors. + +Tips: + + First of all, don't be afraid to actually go into the trash can. This is +almost always necessary to reach the good stuff. Also, when you are ducking +down inside a big dumpster, you cannot be seen by passing police cars or +security guards who happen to waltz by. + + Second, always have a lookout somewhere to keep an eye out for cops or +employees who may be coming out to throw trash away. You may want to have some +kind if signal so that if you have advanced warning of security, you can take +evasive measures, like burying yourself in the trash. + + Try not to spend too long in a given trash can. The longer you stay, the +more you put yourself at risk of getting caught. This means that you cannot be +too picky about what trash you take. There is plenty of time for that after +you bail the scene with the goods. You may want to have a knife handy, +however, to cut open boxes or bags, and a small flashlight is a good idea, +although if possible, avoid using to much light or making too much noise, +anything that could potentially attract someone. + + A car is a good thing to have, if possible. This greatly increases the range +of places you can hit in one night. It is a good idea, if you are accumulating +alot of stuff, to stop somewhere secluded and well lit (like a school or empty +shopping center) and sort out the trash so you can get rid of useless garbage +like food, etc. Take all the useless garbage and dump it into another +dumpster. + + You may want to wear old clothes that can get messed up, and gloves are not a +bad idea either, both to keep your hands clean, and to keep prints off of +anything in case the place discovers what you have done. + + What to do if you get caught: + + This is perhaps the most important thing to keep in mind when trashing. What +to do if you happen to be caught be someone and they want to know what you are +doing. + + If you can, run like hell! Only do this if you have a clean getaway and you +think you can get away without too much problem. Keep in mind that trying to +escape may only make your situation worse. Only run if it looks like they are +gonna bust you. + + In most cases, the people may just tell you to get out. They will probably +ask you some dumb questions, like "What are you doing in the trash?" In this +case, make up a story, like "Oh, my friend here threw a ball in here and I was +looking for it." If the guard believes you, he will probably just tell you to +get out with a strong warning. + + If they are serious about nailing you, however, chances are you'll only get +charged with trespassing, which is not a major crime. In any case, however, +maintain an extremely high level of caution when trashing, and always remain +calm and collected. You can usually bullshit your way out of just about +anything if you play your cards right. + + Hope this has helped you to gain some insight into how to go about gaining +that valuable information you always wanted. + + Look for more informative files in the future from Better Homes and Anarchy. +And if you have any comments or anything to add, you can get hold of me on the +Electric Kingdom at (619) 484-5243. Please upload this to many BBS's around +the country to help your phellow phreakers! + +The Saint +Lunatic Labs (415) 278-7421 + \ No newline at end of file diff --git a/textfiles.com/phreak/TRASHING/trshdisk.ana b/textfiles.com/phreak/TRASHING/trshdisk.ana new file mode 100644 index 00000000..671fde92 --- /dev/null +++ b/textfiles.com/phreak/TRASHING/trshdisk.ana @@ -0,0 +1,58 @@ +************************************************* +* * +* BASICS OF TRASHING * +* PART I * +* * +* BY:THE GRIM TRASHER * +* * +************************************************* + + IN THIS ARTICLE I WILL COVER THE VERY FIRST STEPS OF TRASHING. THE TRASHING +METHOD IS VERY SIMPLE SO I DO IT ALL THE TIME. HERE ARE THE STEPS: + + STEP I:FIRST YOU TAKE A DISK YOU WANT TO TRASH AND BRING IT OVER TO THE +COMPUTER. THE DISK SHOULD HAVE SOMTHING VERY *IMPORTANT* ON IT (LIKE SOMTHING +YOU HAVE BEEN WORKING ON FOR 3 YEARS) OR A DISK THAT COST ABOUT $500. + + WHEN YOU BRING THE DISK TO TRASH OVER TO THE COMPUTER *BE SURE* TO HOLD IN THE +*DISK PART*! + + STEP II:THERE ARE A LOT OF WAYS TO TRASH A DISK BUT + + HERE ARE A FEW TO GET THING GOING: + + 1--PUT THE DISK IN THE DRIVE AND GET TO COMMAND LEVEL THEN TYPE 'INIT'. + 2--PUT A MAGNET TO THE *DISK PART*. + 3--SET ON TOP OF THE DRIVE OR MONITOR AND LEAVE THERE FOR 1 HOUR. + 4--TAKE SOMETHING SHARP LIKE A PENCIL ORKNIFE AND START TO SCRATCH THE SURFACE + OF THE DISK NICE AND HARD. + + NOTE:YOU CAN USE MANY OF THESE TRASHINw TECHNIQUES TO MAKE ONE *ULTIMATE +TRASH!!* + + CLASSIC TRASH--PUT THE DISK IN THE MICRO-WAVE!! + + + STEP III:WHEN YOU ARE ALL DONE WITH THE TRASHING PROCESS THEN LEAVE THE DISK +LAY IN A NICE DUST PILE AND BURY IT.COME BACK IN ABOUT 2 HOURS AND THE + + TRASHING PROCESS IS COMPLETE!! + + + IN MY NEXT ARTICLES I WILL COVER THE MORE ADVANCED METHODS OF TRASHING BUT FOR +NOW JUST: + + + ***K E E P O N T R A S H I N G*** + + + NOTE:IF YOU OR ANY ONE OF YOUR FRIENDS WANT TO KNOW MORE ON TRASHING CALL MY +HOT-LINE AT:50-MAD-TRASH OR:62-EL-TRASHO.<-LOCAL NUMBER + + + THE ONE AND ONLY, + + THE GRIM TRASHER + +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL.1 b/textfiles.com/phreak/VOICEMAIL.1 new file mode 100644 index 00000000..c9ec2f5f --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL.1 @@ -0,0 +1,44 @@ + +T E X T F I L E S + +

Phone Phreaking: Voice Mail

+

+ + + + + +
+
Filename
Size
Description of the Textfile
3rdpart1.txt 5385
3rd Party Fraud and Voicemail Systems +
800vms.txt 1020
1-800 Voice Mail Extenders +
amhack.txt 12372
Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS +
anmchhak.txt 1233
Hacking AT&T Answering Machines by old Buzzard (September 14, 1995) +
ans_exc.txt 2319
Answering Machine Stopper Gadger, by Jon Sreekanth +
ansmache.xcl 3653
Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993) +
aspentut.txt 8040
A Tutorial of Aspen Voice Mailbox Systems, by Slycath +
at&t.txt 1234
Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995) +
audexvp.txt 19656
Hacking Guide to the Audex Voice Power, by Crazybyte +
cinditut.txt 12608
The CINDI (Voicemail System) Tutorial +
hack6 5241
Hacking Voice Mail Systems +
hackam1990.txt 13065
Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS +
hackvmb.txt 10057
Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer +
lol12.txt 10698
Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer +
phonhack.txt 17674
Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm +
phreak8 5385
3rd Party Calling and Voicemail Information +
tollfree.txt 1314
A Collection of Toll-Free Answering Services +
unt-att1.txt 2610
Hacking AT&T Answering Machines by Aoflex of Karma Sutra +
vmb.rl 3505
Renegade Legion Presents: Voice Mailbox Hacking by The Knight +
vmb.txt 3296
Voice Mail Made Easy by Hagar of Phantom Networks +
vmb_smc.txt 15681
On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC +
vmbh-rl.txt 3508
Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991) +
vmbhack.hac 3918
Voice Mailbox Hacking, by the Knight of the Renegade Legion +
vmbhack.txt 2764
Zod's Voice Mailbox Hacker Doxs +
vmbhaq.txt 32929
Voice Mail Hacking by Road Kill (March/April, 1994) +
vmblol.txt 13996
Voice Mailbox Hacking by the Legions of Lucifer (1990) +
vmbrl.txt 3920
Voice Mailbox Hacking by The Knight of Renegade Legion +
vmbs1.txt 3071
Voice Mail Boxes +
vmbzan.hac 4774
How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991) +
vmx.txt 1101
Toll-Free Answering Services +
voicmail.txt 3753
Using Voice Mail on the Inner Sanctum by Jesters +
xvmecinf.txt 904
Xerox Voice Message Exchange Commands by The Lineman (August, 1986) +

There are 32 files for a total of 230,684 bytes.
\ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/.windex.html b/textfiles.com/phreak/VOICEMAIL/.windex.html new file mode 100644 index 00000000..e4920104 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/.windex.html @@ -0,0 +1,44 @@ + +T E X T F I L E S + +

Phone Phreaking: Voice Mail

+

+ + + + + +
+
Filename
Size
Description of the Textfile
3rdpart1.txt 5385
3rd Party Fraud and Voicemail Systems +
800vms.txt 1020
1-800 Voice Mail Extenders +
amhack.txt 12372
Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS +
anmchhak.txt 1233
Hacking AT&T Answering Machines by old Buzzard (September 14, 1995) +
ans_exc.txt 2319
Answering Machine Stopper Gadger, by Jon Sreekanth +
ansmache.xcl 3653
Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993) +
aspentut.txt 8040
A Tutorial of Aspen Voice Mailbox Systems, by Slycath +
at&t.txt 1234
Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995) +
audexvp.txt 19656
Hacking Guide to the Audex Voice Power, by Crazybyte +
cinditut.txt 12608
The CINDI (Voicemail System) Tutorial +
hack6 5241
Hacking Voice Mail Systems +
hackam1990.txt 13065
Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS +
hackvmb.txt 10057
Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer +
lol12.txt 10698
Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer +
phonhack.txt 17674
Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm +
phreak8 5385
3rd Party Calling and Voicemail Information +
tollfree.txt 1314
A Collection of Toll-Free Answering Services +
unt-att1.txt 2610
Hacking AT&T Answering Machines by Aoflex of Karma Sutra +
vmb.rl 3505
Renegade Legion Presents: Voice Mailbox Hacking by The Knight +
vmb.txt 3296
Voice Mail Made Easy by Hagar of Phantom Networks +
vmb_smc.txt 15681
On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC +
vmbh-rl.txt 3508
Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991) +
vmbhack.hac 3918
Voice Mailbox Hacking, by the Knight of the Renegade Legion +
vmbhack.txt 2764
Zod's Voice Mailbox Hacker Doxs +
vmbhaq.txt 32929
Voice Mail Hacking by Road Kill (March/April, 1994) +
vmblol.txt 13996
Voice Mailbox Hacking by the Legions of Lucifer (1990) +
vmbrl.txt 3920
Voice Mailbox Hacking by The Knight of Renegade Legion +
vmbs1.txt 3071
Voice Mail Boxes +
vmbzan.hac 4774
How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991) +
vmx.txt 1101
Toll-Free Answering Services +
voicmail.txt 3753
Using Voice Mail on the Inner Sanctum by Jesters +
xvmecinf.txt 904
Xerox Voice Message Exchange Commands by The Lineman (August, 1986) +

There are 32 files for a total of 230,684 bytes.
diff --git a/textfiles.com/phreak/VOICEMAIL/3rdpart1.txt b/textfiles.com/phreak/VOICEMAIL/3rdpart1.txt new file mode 100644 index 00000000..234b8605 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/3rdpart1.txt @@ -0,0 +1,103 @@ + + 3RD PARTY FRAUD & VOICE MAIL SYSTEMS + ============================================================================ + + 3rd Party Dialing was first brought to my attention when it was listed +on my telephone bill. I was billed by some person(s) without my authorization. +This happened about 3 times on the same bill, and all of the times I got the +charges dropped. + + A few weeks later, after paging through the telephone book for downtown +prefixes, I noticed information on 3rd Party Calling, which included: + +HOW TO PLACE 0+ CALLS + +Third-Number Calls + +1. Dial "0" + Area Code (if needed) + telephone number. + +2. If you hear a tone, ignore it, and a billing operator will come + on the line. + +3. Tell the operator you are placing a third number billed called. + +4. Give the Area Code and telephone number you with the charges billed to. + +5. The operator will call that number to verify acceptance of the charges + on calls from coin pay phones. No verification on calls from + non-coin pay phones. + + The line that caught my eye was like #5. This line pointed out that calls +from pay phones had to be verified, while non pay phones needed no +verification. + + With experience, I found out that sometimes there is nothing a person can do +about unauthorized 3rd Party Calls billed to a another person's number. A lot +of the times, the operator you call to complain to will simply tell you there's +nothing they can do. + + With this in mind, I realized that you could bill a call to anybody's number +and get away with it, and no charges directed to you. Although, as many of you +know by now...this not safe. For one, you are directing attention to yourself +as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd +Party Call to...that person has your number and where you called. Bell can +also use that information to take action if they feel it necessary. + + One alternative would be to complete a 3rd Party Billed Call from a pay +phone. This however brings up a question. Who is going to accept the charges +if you don't want to pay for it in any way? + +Here is what I came up with for 3rd Party Calling Fraud: + + First, you need a (VMS) Voice Mail System/Box. You need a Centragram or +PhoneMail type VMS to handle the call. The reason you need these types of +VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't +have to enter a process extension number such as 8509. These types of VMS's +bring you directly to the box. + + You don't know what Voice Mail Systems are? Look for a file. But, here's a +layman's description of VMS's. You can say that VMS's are distance answering +services. They are usually set up in other prefixes you can dial in/directly +on to. They include instructions on how to use them, and have system +passwords. In respect, they are electronic mail devices...only they use voice +communications instead. You can find these by scanning, if you have one local. + + Anyways, having a VMS handy...reset your System Greeting to say: "HELLO" +Pause for approximately 5-6 seconds...then say casually, "YEAH SURE." +In between the HELLO and YEAH SURE, the billing operator will say something +like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?" + + Now go to a pay phone and dial any number anywhere you want, in this +format: 0+612+555+1212. Ignore the tone you hear for calling card holders, +and wait for an operator to come on. The operator will announce her/his-self +as a billing operator and ask you how he/she can help you on billing the call. +Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last +name if you wish, but it's not necessary. No real names of course also. The +operator will call the VMS and he/she will hear the previous recording of you +saying "HELLO" etc. + + After the operator hears an affirmative from the VMS...the operator will say +thank you, then put the call through. The only person that gets billed for +the call is the business/person that owns the VMS that you used by hacking the +default password. + + I've found out that you can dial overseas, and anywhere in the United States +this way, with no problems or bad connections. If you have a portable computer +with an acoustic couple...you can go online. It would be suggested to do this +in a car, so as not to draw attention during the day. I've tried to set up a +conference by the 800 Conference Operator and requesting to set up a +conference. You have to give her the person's numbers and names you want to +conference with...and the number you want to conference billed to. The +operator will verify this if you are at a pay phone. I have figured out what +the Conference Operator asked the 3rd Party as of yet...to time the responses +preset on the VMS, but if anyone can, it would prove to be very useful. + + Another technique might be to bill 976's to your VMS if you into that. +Again, you need to attempt to time the perfect responses to the operator's +questions to the 3rd Party. + + *A Word of Warning*: In most cases, the Operator you handle the 3rd party +call with will stay on the line. So it's good to have a conversation with +yourself on the VMS for about 30 seconds after connection if you are making a +collect call to the VMS. + diff --git a/textfiles.com/phreak/VOICEMAIL/800vms.txt b/textfiles.com/phreak/VOICEMAIL/800vms.txt new file mode 100644 index 00000000..3bdee599 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/800vms.txt @@ -0,0 +1,31 @@ + + 1-800 Voice Mail Systems + + +1-800-222-5275 VMS +1-800-222-9825 VMS Box:[9]+3 DIGITS +1-800-228-6423 VoiceBank Box:[4] *Another Dialup for 88-Voice* +1-800-262-8477 UniSys Answering Service Box:[4] +1-800-284-6245 Meridian Mail +1-800-323-3433 VMS +1-800-323-4555 Dexter Midland Box:[3] +1-800-323-3938 VMS Box:[4] +1-800-325-5554 VMS Box:[4] +1-800-331-1763 INNOVATIVE SOFTWARE BOX:[4] +1-800-333-6245 PHONE MAIL SYSTEM +1-800-342-6245 PHONE MAIL SYSTEM +1-800-346-5104 SECURITY LINK AND TELELINK BOX:[3] +1-800-423-7574 VMBS BOX:[4] +1-800-437-6100 PHONE MAIL SYSTEM +1-800-445-6245 PHONE MAIL SYSTEM +1-800-521-6245 VMBS +1-800-541-0641 VMBS BOX:[2] +1-800-545-6245 VMBS ID:[7], PASS:[8] +1-800-631-1146 VMBS +1-800-654-8692 SECURITY CN LIFE INSURANCE BOX:[4] +1-800-662-6245 VOICE MESSAGE EXCHANGE +1-800-678-6245 VMBS +1-800-759-5000 INGRAM SWITCHBOARD BOX:[4] +1-800-777-6245 MCI MAIL ID:[5], BOX:[7] +1-800-847-6181 WESTERN DIGITAL BOX:[4] + diff --git a/textfiles.com/phreak/VOICEMAIL/amhack.txt b/textfiles.com/phreak/VOICEMAIL/amhack.txt new file mode 100644 index 00000000..9a926ce3 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/amhack.txt @@ -0,0 +1,257 @@ + + + */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/* + Hacking Answering Machines 1990 + */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/* + by: Predat0r of Blitzkrieg Bbs 502/499-8933 + + + AT&T reports that in the year 1990, 11 million people +will buy an answering machine for their home use. In 1989, 10 +million machines were sold. Everyone has called up a person +at one time or another and got the old "leave your name at +the beep" message. With this increase in homes using these +machines there is also a new form of hacking developing. One +of hacking an answering machine. + + Why would anyone even want to hack an answering machine +and for what purpose? There are many reasons and things you +can do once you have control of someone elses machine. If for +some reason you need to spy on a business or person you can +hack their machine and take control using the information for +your own personal use. There is also the old "change the +message" secret to make it say something to the effect of +this line accepts all toll charges so you can bill third +party calls to that number. You can also use an answering +machine for your own personal use, as in making it your own +voice mail type system for people to call. Only do this if +you know someone is out of town. If they come home from +shopping and find their machine changed it might cause +problems. With these basic ideas in mind you can see hacking +an answering machine could be very useful to certain +individuals. + + How can a person hack an answering machine? Well most +answering machines built now have remote access features +which allow the owner, or anyone to call in and press a +security code to play their messages. This is where the fun +begins. Some older models don't have remote access so you +cannot do anything to them. Also if you know someone has a +machine but you call and it doesn't answer, let the phone +ring about 15 times. This will tell the machine to turn +itself on, so you can hack it. The actual number varies +between machines. + + To practice hacking some machines i will show you how to +get remote access on a few models. Just look and see what +kind your friend has and hack it for starters. + + Record a Call- Model 2120 + ------------------------- +Call in and during the message or after the beep tone to +leave a message enter the 3 digit security code. Which you +must find yourself. This will rewind the tape and play all +new messages. Press 2 to backspace and repeat the last +message. Press 3 to fast foward the tape. + +Changing your message from remote. Call your phone and enter +the secret code. After several rapid beeps enter your secret +code again. After a short delay you will hear a long tone. +After the tone ends begin speaking your message which may be +17 seconds in length. When finished press the second digit of +your secret code to end. The machine will then save your +message and play it back. To turn the unit on from remote let +it ring 11 times then hangup. Or stay on and it will answer +so you can access the machine. For express calls or frequent +calls hit the second digit for two seconds to skip the out +going message announcement. + +Goldstar- Models 6000/6100 +-------------------------- +Call and enter your 1 digit secret code after you hear the +out going message announcement. The machine will then play +back new messages. Hangup to save messages or after all +messages have been played the machine will give a double +beeptone, you may enter your code to erase all messages. +You cannot change the out going message on this unit. + +Cobra- Model AN-8521 +-------------------- +For this machine there are 2 codes. Both are one digit in +length. The first one is the play code. The second is to +erase messages from remote. After the outgoing message and +beeptone press the play code for 2 seconds to play messages. +After each message ends there will be a single beep. At the +end of all message it will beep twice. You may then do the +following. Replay by pressing the play code again. Erase +messages by pressing the erase code. Hang-up and save +messages and continue to take additional calls. To turn this +unit on from remote you must let it ring 16 times before it +will activate. If it rings 10 times then you hear 3 beeps it +is full and messages need to be erased. + +Uniden- Model AM 464 +-------------------- +This model is one of the more advanced when it comes to +remote capabilities. The factory preset security code is 747. +This can be changed to as many as five digits of your choice. +To gain access from remote type your security code while the +outgoing message is playing. Press 1 after hearing the tone +and the machine will rewind and play your messages. To fast +foward press 7, to resume normal playback press 8. To stop +the messages from playing press 8 again. Press 8 to restart +the messages or 1 to start from the beginning again. Press 9 +to rewind and 8 to resume playing. If you rewind all the way +it will beep twice. You need to press 1 to play messages.To +save messages press 4. To erase press 6. To turn the machine +off from remote press 5 after all messages have been played +and the machine beeps twice. To turn the machine on from +remote let the phone ring 12 to 14 times. The machine will +beep and then you enter your remote code. This will then turn +your machine to answer mode. This machine also has room +monitor options. This allows you to listen to what is going +on in the room of the machine. To do this call the machine +enter your security code after the beep press 0. The monitor +stays on for 60 seconds. You will be warned with 2 beeps at +45 seconds. To continue press 0 again.To change the outgoing +message from remote erase all the messages. Then call back +and enter your code after the tone press 3. It will beep +again and you may then leave your new message. Press 3 when +finished. To change the security code from remote after the +beep press # then 1 after the next beep enter your new code +followed by the # again. There is also a call break through +where you enter 256 while the outgoing message is playing. +This will alarm the persons in the house someone is calling +with a series of loud beeps. Press the * key to stop. + +Code-a-phone Model 930 +---------------------- +To access from remote call and enter your security code after +the announcement and tone. Press your code for 3 full +seconds. After the new messages have been played you will +hear 2 tones. You may then save messages by pressing your +code then hanging up. repeat by entering code wait for 4 +tones then enter code again. To erase message hangup when the +tape is done playing. To turn the machine on from remote call +and let ring ten times. When the system answers it will have +a two second tone. Press your security code. You will hear +three double tones to let you know the system is on. + +Unisonic- Model 8720 +-------------------- +One digit code entered after the outgoing message and tone +will allow you to hear messages. To change message wait till +all new messages have been played 2 beep tones will be heard. +Press code for four seconds. Two beeps will be heard then the +tape will rewind and beep again. Now leave the new message. +Press your code when finished to save new outgoing message. +New message will play for you to hear. + +Panasonic- Model KX-T2427 +------------------------- +Call and enter the three digit code during the outgoing +message. Machine will beep once, then beep amount of times +equal to messages. Then rewind and play messages. There will +be three beeps after the last message. Six beeps means the +tape is full. Press 2 to foward. Press 1 to rewind. Press 3 +to reset machine and erase messages. To monitor the room +press 5 after the beeps indicating the number of messages the +machine has. Press 7 to change the outgoing message, it will +beep a few quick times rewind then a long beep will be heard. +Leave new message press 9 when finished. Press 0 right after +the beep tones to shut the machine off. To turn the machine +on let it ring 15 times then hangup after machine turns on. + +Panasonic- Model KX-T2385d +-------------------------- +During the outgoing message enter the 1 digit code. This will +playback messages. Press the code again to rewind. After the +messages have played the machine will beep three times. Press +your code again and it will reset the machine. For remote +turn on let phone ring 15 times. Then after the outgoing +message hangup. + +AT&T- Model 1504 +---------------- +Enter 2 digit code before or after announcement. System will +beep after each message and five times when messages are +done. Press the # key anytime to pause. Hanging up will save +messages. Press 7 and it will rewind and play messages again. +Press 5 to fast foward. Press 2 to rewind. Press 33 after all +messages have been played to reset without saving messages. +To record onto the tape press * after the system answers. +This will then beep and you may leave a four minute message +on the tape. Press # when done. This is not an outgoing +message announcement, only a memo. To turn on from remote let +ring ten times press 0 when system answers. To turn the +system off dial and enter your code. Press 88 and it will +shut the machine down. + +Phonemate- Model 4050 +--------------------- +Enter your 3 digit code during the outgoing message. Pressing +* or # will allow you to scan through the messages. When +finished pressing 1 will replay the messages. Pressing 2 will +erase them. To turn on from remote let ring for 15 times. +Then proceed with remote operations. + +Phonemate- Model 7200 +--------------------- +Enter 1 digit code during of after the outgoing message. A +voice will tell you how many messages you have, then play +them back for you. To rewind press your code and hold it for +however long you want to rewind. Let go and it will resume +playing. After the last message a voice will prompt you with +a list of options. You have five seconds to respond or it +will proceed to the next option. These are as follows. The +first is hanging up to save messages. Next is enter code to +replay messages. Next enter code to erase messages. Last is +enter code to change greeting. Follow the voice and it will +give you complete directions on exact steps to follow. To +turn on from remote let ring ten times then hang up. If tape +is full it will say sorry tape is full, enter code and erase +messages. + +Spectra Phone- Model ITD300 +--------------------------- +Enter your 1 digit code after the greeting. Messages will +play back. Hanging up will save them. Or wait for four beeps +and press your code to replay them. To erase press your code +after 2 beeps. To turn the machine on from remote let it ring +10 times. + +Notes: Outgoing message and greeting is what you hear when +you first call. Code is your personal security code. + +Hacking answering machines can be very easy. It can also help +you obtain valuable information. If you have a targeted +machine you can try going to a store and saying you just +bought one and it didn't have instructions in the box. They +will usually give you a set or make copies for you. This +basic guide is just to introduce you to answering machine +hacking and changing the outgoing message and listening to +messages left by callers. To keep your own machine safe +purchase one with a changeable security code of 3 or more +digits. Most home machines are of the 1 digit type and are +easy to hack. I have no knwoledge of the laws concerning +hacking into someones answering machine. I am sure once it +becomes more common we will find out. Of course this article +is for informational purposes only so you would never have to +find out the actual laws. + +Taken from TAP Magazine Issue #100 + + + +X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X + Another file downloaded from: NIRVANAnet(tm) + + & the Temple of the Screaming Electron Jeff Hunter 510-935-5845 + Burn This Flag Zardoz 408-363-9766 + realitycheck Poindexter Fortran 510-527-1662 + My Dog Bit Jesus Suzanne d'Fault 510-658-8078 + New Dork Sublime Demented Pimiento 415-864-DORK + The Shrine Tom Joseph 408-747-0778 + + "Raw Data for Raw Nerves" +X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X diff --git a/textfiles.com/phreak/VOICEMAIL/anmchhak.txt b/textfiles.com/phreak/VOICEMAIL/anmchhak.txt new file mode 100644 index 00000000..d4084a08 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/anmchhak.txt @@ -0,0 +1,33 @@ +Hacking AT&T Answering Machines +Quick and Dirty by oleBuzzard +Written Today / 14-SEP-95 +(c) 1995 Communications + + +1. Dial telephone and wait for AT&T Answering Machine to answer. +2. Quickly Enter the following string. + + 1234567898765432135792468642973147 (btw: this is the shortest + 4193366994488552277539596372582838 string for entering every + 491817161511026203040506070809001 possible 2-digit combo.) + +3. You'll know you hit the code because the messages will start playing. +4. Heres a list of TouchTone(c) Commands + + + Listen to messages: 7 + Listen to new messages: 6 + Stop: # + Rewind Tape: 2 + Advance Tape: 5 + Clear Messages: 3,3 + Record memo: * + Record Announcement: 4,* + Play Announcement: 4,1 + Turn System On: 0 + Turn System Off: 8,8 + +**************************************************************************** +*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site ** +** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html *** +**************************************************************************** \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/ans_exc.txt b/textfiles.com/phreak/VOICEMAIL/ans_exc.txt new file mode 100644 index 00000000..ed25d561 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/ans_exc.txt @@ -0,0 +1,62 @@ + +This is the schematic I traced for an answering machine stopper +gadget : it cuts off the answering machine in case any line is picked +up. Some answering machines have this feature built-in; the older or +inexpensive ones don't. The gadget is called Message Stopper (R), by +Design Tech International Inc., Springfield, VA. Several other mfrs +make this kind of gadget, so this is just one I happened to buy. +Cost, roughly $10. + +The gadget is in the same form factor as a wall-plug-in Y-splitter. +That is, it plugs into the wall RJ11 outlet, and has two RJ11 outlets +on it, one marked TEL, the other marked ANS. There are two LED's, the +green one on top of the ANS outlet, the red one on top of the TEL outlet. + +The two outer wires of the three RJ11's are wired in parallel. The +schematic for the center two wires is : + + + .-------------- phone + .----------------- + | | +C1 ----| +C2 -| | + | | + | | + | '----------------- answering machine + | + +--|<--+--|<--->|---- + | | two zeners + +-->|--+ + two leds + + Top led is green, bottom is red. + +It turns out the leds are basically idiot lights. The outside design +makes it look like the green should light up when the ANS is offhook, +and the red when TEL is offhook, but actually, depending on the line +polarity, only one will glow, and only when the ANS outlet is offhook. +If a load is connected on the ANS outlet, both leds will glow when +ring voltage comes through. + +I could not read the zener voltage off the diodes, but I measured 11V +across one of them when operating. + +The theory of operation is straightforward. All telephone extensions +in the house are in parallel with each other, and with any device connected +on the TEL outlet. If any of these devices is offhook, the phone line +voltage is expected to drop below 12V or so, at which point the zeners +isolate the ANS outlet from the line. + +It's a fairly simplistic design, and will not work in all situations, +but it mostly works. + +---- + +Regards, + +/ Jon Sreekanth + +Assabet Valley Microsystems, Inc. | Fax and PC products +5 Walden St #3, Cambridge, MA 02140 | (617) 876-8019 +jon_sree@world.std.com | diff --git a/textfiles.com/phreak/VOICEMAIL/ansmache.xcl b/textfiles.com/phreak/VOICEMAIL/ansmache.xcl new file mode 100644 index 00000000..5c53b38e Binary files /dev/null and b/textfiles.com/phreak/VOICEMAIL/ansmache.xcl differ diff --git a/textfiles.com/phreak/VOICEMAIL/aspentut.txt b/textfiles.com/phreak/VOICEMAIL/aspentut.txt new file mode 100644 index 00000000..4a12524e --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/aspentut.txt @@ -0,0 +1,275 @@ + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + * * + * A Tutorial Of: ASPEN VOICE MAILBOX SYSTEMS * + * * + * Written by: SLYCATH * + * * + * Greetz to: Firefly, Adam, Sintax, Voltage and * + * * + * Everyone who knows me.... Happy Hacking.. * + * * + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + + +Intro: + Well you may be thinking that, Oh! yes I've read tutorials + before and they are about as helpful as a dead parrot..... + I thought it was about time to write a little series of + textfiles on how to use (and abuse) Mailbox systems. + This series will NOT just cover Hacking and scanning of mail + systems but also the facilities used on each................ + +Start: + O.K. After recently coming across an ASPEN system which I + successfully managed to hack a couple of mailboxes for my + personal use, I didn't realise all the many facilities + available to the (Ab)user. I have collated the following + information myself I hope it will be of some help to U. + + Assuming that you already have a mailbox on the system: + + When Entering your mailbox number and passcode the system + will tell you if you have any new (or saved) messages. + Let's assume you have ONE new message. + + You may select the following options: + + Push: + ----- 1 - Recieve Messages + 2 - Send a message + 3 - Check Reciept + 4 - Personal Options + +Option chosen: +-------------- + +1: +"" Whilst message is playing you have a sub-menu of options. + + 1: Rewind Message Ten Seconds + 11: Rewind To Start Of Message + 2: Pause Message (Press Again To Unpause) + 3: Fast Forward Message Ten seconds + 33: Fast Forward To End Of Message + + 4: Decrease Playing Speed (Slow Down) + 6: Increase Playing Speed (Speed Up) + + 8: Decrease Volume + 9: Increase Volume + + After listening to the message you may select one of these. + + 4: Replay Message + 5: Envelope Message (Find Source Mailbox+Time+Date+Length) + 6: Send On Message To Another Subscriber - Record Intro Msg. + 7: ERASE Message + 8: Reply To Message + 9: Save Message In Archives (For Later Listening) + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + +2: +"" Send a Message will ask you to speak whilst it records you. + + Press # to stop recording then enter Destination Mailbox. + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + +3: +"" Check reciept of messages sent. + + This will allowyou to check if a message has been read and + also if a message has been saved. + There are other uses for this function (See L8ter) + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + +4: +"" Personal Options. Good fun can be had by all !! + + 1: Change Your Passwords + ------------------------ + + This Section Refers To Guest Box Control. + If you are Strapped for boxes then you can assign + Guest Boxes so you can send messages to each other even + if One person doesn't have a mailbox. + + 1: Change Guest 1's Password + + Guest Can Leave AND Recieve Messages + + 2: Change Guest 2's Password + + Guest Can Leave AND Recieve Messages + + 3: Change Home Password + + Guest Can Leave AND Recieve Messages + + 4: Change Secretary Password + + Can Check How Many Messages You Have + + Recieve Messages + + 5: Change Mailbox Password (MAIN) + + This is your password. DON'T FORGET IT + ~~~~ + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + + 2: Change Your Greetings + ------------------------ + + 1: Change Your Name + + This is the name which people hear when + sending you messages from other boxes. + i.e. "Your message will be sent to xxxxxx" + + 2: Change Your Greeting + + This is what Non-Subscribers who are leaving + you mail will hear. + + 3: Change Your Extended Abscence Greeting + + This is the same as the ordinary greeting but + people leaving messages will be alerted that + you may not be back for some time. + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + + 3: Distribution Lists + --------------------- + + Distribution lists are so you can record a message and have + it automatically sent to all users on your list. + + i.e. Your list could contain EVERYONE'S number + Or All Your M8s On the system. + + 1: Create Distribution Lists + + 2: Edit Distribution Lists + + 3: Delete Distribution Lists + + 4: Find Names Of People On Lists + + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + + OK ENUFF OF THE OPTIONS NOW ONTO THE HACK STUFF. + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + + Passwords: + ~~~~~~~~~~ + + Defaults For ASPEN Are: + + (E.G. Box is 888) + + ------------------------------- + Passcode | Example + ------------------------------- + Box number - 888 + Box number + 1 - 889 + Box number & 1 - 8881 + 1 & Box number - 1888 + Box number + 0 - 8880 + 0 & Box number - 0888 + + ------------------------------- + Use Normal Hacking Techniques: + ------------------------------- + i.e. + 1111 + | + \|/ + 9999 + 1234 + 4321 + ------------------------------- + + + Scanning: + ~~~~~~~~~ + + Once you have found a NEW Mailbox, or even a used one. + + .-------------------------, + / DON'T CHANGE JACK SHIT / + `-------------------------' + + Press '3' from the main menu. + This Checks for Reciept of messages (See Previous) + + Enter Mailbox Number: xxxx + + When entered number the system will say one of the following: + + 1: The Mailbox Users Name + 2: "xxxx Is not a Valid Number" + 3: "xxxx" + + Start at 0000 then move up to 9999 making a note as follows: + + If you get : + + 1. Ignore and enter the next number. + 2. Ignore and enter the next number. + 3. Jump up and down and go WHOOOOPPPEEEEE , you may be in luck. + + When You Have finished you should have a list of POSSIBLE + Hackable Mailboxes. + ______ + / \ + / THEN: / + \ / + `----' + + 1. Hang Up And call back the system. + 2. Press '#' + 3. Enter One of Numbers on the list. + 4. If it says 'Enter Password' You can either try and hack it + but isn't gonna be a VIRGIN mailbox. + 5. If it says 'This is a voice messaging bollox.... blahh blahh.' + then it will come to a point where it says, + 'Please enter the temporary password assigned by your System + Manager'. + 6. Enter Default Passwords. + Defaults Are most likely to be the same for all the other VIRGIN + voice mail boxes if not, try the other ones. + 7. If It hangs up then GOTO 1. + 8. If it allows you access then play with the options (See Previous) + + + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + Thanx For Reading All Of This Text File. + I Hope That It Will Be Of Some Use To You. + + And See Ya All In + ---------------------------- + " The Guide To CINDI Systems " + ---------------------------- + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + Extra Greeting: Thanx To FIREFLY For Alerting Me To + Some Of The Extra Options Which I Hadn't Previously + Noticed When Playing Around With It. THANX M8. + *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* + / \ + *-+-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-+-* + | | + | I Expect The Next Bit Will Get Adverts Stuck To It! | + | | + `-----------------------------------------------------' + + + + diff --git a/textfiles.com/phreak/VOICEMAIL/at&t.txt b/textfiles.com/phreak/VOICEMAIL/at&t.txt new file mode 100644 index 00000000..db6515bf --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/at&t.txt @@ -0,0 +1,33 @@ +Hacking AT&T Answering Machines +Quick and Dirty by oleBuzzard +Written Today / 14-SEP-95 +(c) 1995 Communications + + +1. Dial telephone and wait for AT&T Answering Machine to answer. +2. Quickly Enter the following string. + + 1234567898765432135792468642973147 (btw: this is the shortest + 4193366994488552277539596372582838 string for entering every + 491817161511026203040506070809001 possible 2-digit combo.) + +3. You'll know you hit the code because the messages will start playing. +4. Heres a list of TouchTone(c) Commands + + + Listen to messages: 7 + Listen to new messages: 6 + Stop: # + Rewind Tape: 2 + Advance Tape: 5 + Clear Messages: 3,3 + Record memo: * + Record Announcement: 4,* + Play Announcement: 4,1 + Turn System On: 0 + Turn System Off: 8,8 + +**************************************************************************** +*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site ** +** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html *** +**************************************************************************** diff --git a/textfiles.com/phreak/VOICEMAIL/audexvp.txt b/textfiles.com/phreak/VOICEMAIL/audexvp.txt new file mode 100644 index 00000000..af607e76 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/audexvp.txt @@ -0,0 +1,432 @@ +AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE +UDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX +DEX- DEX- +EX-A HACKING GUIDE TO THE EX-A +X-AU X-AU +-AUD AUDEX VOICE POWER -AUD +AUDE AUDE +UDEX WRITTEN BY UDEX +DEX- DEX- +EX-A --==>> CRAZYBYTE <<==-- EX-A +X-AU X-AU +-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD +AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE +UDEX UDEX +DEX- CALL SIN CITY: +32-3-8252274 DEX- +EX-A EX-A +X-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AU +-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD + + + + +/\/--> DISCLAIMER <--\/\ +------------------------ +Ohooh... I'm scared as shit so I accept no responsibility for any actions +taken by readers... blahblah NOOOOOOO... +This text is written with the intention that readers of this text hack +Audex Voice Power vmb's, and I sure as hell hope that as from now on every +fucking Audex Voice Power in the galaxy gets abused by hackers. + + + + +/\/--> INTRODUCTION <--\/\ +-------------------------- +The Audex Voice Power is the predecessor of the Audex we all know just under +the name Audex today. There aren't that much of this older system around, +but the few I found were fucking easy to hack. And again: vmb's are fun to +have, you can trade them for xxx (fill this in), they lower your phone +bill,... (you've heard this shit before). +Anyway, lets get down to business... + + + + +/\/--> IDENTIFYING THE AUDEX VOICE POWER VMB <--\/\ +---------------------------------------------------- +Well, you can't recognize them from the first greeting, but the greeting +will probably contain the usual 'press the ext. of the person you want to +reach' and the (special for Audex Voice Power) 'if you want to transfer +using names instead, press the pound (#) key'. +To REALLY be sure it's an Audex Voice Power: press *7, if it responds with: +'Welcome to Audex Voice Power, please enter extension and # sign' you've +got yourself an easy-to-hack Audex Voice Power vmb. + + + + +/\/--> LOGGING IN <--\/\ +------------------------ +Press *7, you are asked to enter your box number, these are can be 3 or 4 +digits, but I haven't found a mixture of the two on one system so far. +After you've entered the box number, press #, enter your password and press +# again. If you entered and incorrect box number or password, it will say +'Login incorrect, please try again,...'. On the systems I found you could +try 4 times to login before you get disconnected. When you get disconnected +it will say: 'Contact administrator for help, please disconnect... goodbye'. + + + + +/\/--> FINDING A VALID BOX AND PASSWORD <--\/\ +---------------------------------------------- +The boxes are grouped, and they will usually be in 2XX or 2XXX. The default +password is the same as the box number, just like on allmost all other VMB +systems. + +There are two easy ways to find boxes (and one difficult, and another one +if you really want a box but had extremely bad luck): + +1. On the two systems I'm using right now, the attendant-extension (0) + has 0 as password, and on one of those two, the options at the login-menu + have also got the same password as their extension number (1 for xxx, 2 + for yyy,...). So first thing to do is trying 0 -> 9, if you can't get in + with these, read 2. + +2. So you couldn't get in by trying extensions 0 -> 9. + Most systems have a directory where you can transfer to people's + extensions by entering the first letters of their last name. + To find the directory, just listen to the first greeting you hear when + you call the VMB. (you know, 'welcome to xxx... if you need assistance + press 0, otherwise press the extension of...'). Usually you have to + press # at the login menu. Now, when you enter the directory option, + the system will respond with: 'Please enter the last name of the person + you want to reach'. Don't enter a complete name, just press 5 or somtehing + and the # sign. By the way: lots of VMB systems have some sort of + directory, and allmost every VMB system I found had users with last names + 'Smith' or 'Jones' (some popular names in the US, and characters from a + stupid TV series). Well, lets continue with Audex Voice Power. After you've + pressed #, the system will say 'to select blahblah press x' and will + start saying names. Now a lot of users also say their box number, so + a lot of these names will be like 'John Doe, extension xxxx'. Just + write these down. If you found how many digits the box numbers are, + and where they are grouped, hang up and call again. + Now start trying the box numbers you just found, you probably will get + in using the box number as password the 2nd or 3rd time you call, since + a lot of people don't use their VMB's, or don't know shit about it, so + haven't changed their password. + +3. Couldn't get in with one of the above methods ? Never happened to me, + but I guess it's possible. Here's what I would do in such a situation. + Don't use the login (*7) options to scan for boxes because then you don't + even know if it's a valid box. Just transfer to them from the main menu, + so you know how much digits the boxes are, and where they're located + (since they 'live' in groups). There's a 90% chance the boxes are located + in 2xx(x). If you entered an invalid box number, it will first try to + transfer you, and then it will say something like 'your transfer couldn't + be completed'. Since you don't have to press # after entering an extension + to transfer to, it's possible that f.e. after pressing only one digit you + will get transfered (read point 1 of this paragraph). When you've located + an area that contains lots of valid extensions, try to hack a box in that + area with the login (*7) option. + +4. Still didn't find a box ??? Well, the best thing you could do in this + case is bullshit to the operator. If you couldn't find the area that + contains the boxes, and there's no directory, ask her for the extension + of f.e. Smith and say you don't know anything else about this Smith. + If bullshitting the operator didn't work either, just try to transfer to + an extension, and ask the person that picks up the phone for their + password. You could say that you're from maintenance, and are installing + a new option in the boxes so that people are able to use outside lines + from within their boxes or something. + +5. You still couldn't get a box ? Well, give up on this system and scan for + another VMB system. I NEVER found a system I couldn't get a box after + about ten minutes using the method in points 1 and 2 so you are trying to + hack a system that has allready been badly abused by hackers or otherwise + you are EXTREMELY dumb. + + + + +/\/--> OK, YOU'RE IN A BOX, WHAT NOW ??? <--\/\ +------------------------------------------------ +Well, use press 2 to listen to the messages, but only listen to the dates they +were created. So press # every time to skip to the next message. +If it contains new messages from 3 months ago, then it means that the legit +user didn't use his box in 3 months. You can safely listen to the messages +and use this box without the risk of loosing it in 2 days. +If it contains no messages it could be possible that the user checks the VMB +regulary, or that it has never been used in which case you got yourself a +good box again. There's no quick way to find out if it's unused or often used +in this case, just use this box to scan for other ones (look below), or check +regulary if there are new messages and if they get deleted afterwards. + + + + +/\/--> SCANNING FOR OTHER BOXES <--\/\ +--------------------------------------- +There are different ways of scanning for other boxes, but the quickest is +the following: +First choose option 5 from the main menu, then press 1 to create a +distribution list. You will be asked for an ID for the list, just press 1 +or something followed by #. Now start entering box numbers, followed by #. +If the box is valid, the system will respond with the name of the owner, or +when you're lucky, the system will sa: 'Extension xxx', in which case you +should write the number down because you've got a 99% chance this is an +unused box. If the box is not valid, the system will say 'Extension xxx not +valid'. When you've collected some numbers, press *# and then *3 to delete +the list. Now hang up, call again and try what boxes have the same passwords +as their box numbers. + + + + +/\/--> OPTIONS AND COMMANDS <--\/\ +---------------------------------- +From the main menu you've got the following options: + +1. Record a message +2. Listen to messages +3. Administer name or greeting +5. Administer password and distribution lists +6. Change outcalling info (INTERESTING) +*8. Transfer to another extension + + + +1. RECORDING MESSAGES : + + You will hear a beep, record your message after the beep. When + finished recording, press 1. Now you've got the following options: + + 21: Re-record : Your message will be deleted and you can record + it again. + + 23: Playback : Just as it says: your just-recorded message will + be played back. + + *3: Delete : Your message will be deleted + + *#: Approve : Now enter the boxes you wish to send your message + to, followed by #. When finished type *#. To delete + the last entry (box), type *3. + + +2. LISTENING TO MESSAGES : + + When there are no messages, you will go back to the main menu. + Otherwise you will hear the date and time the actual message was + delivered, and the name (if specified) of the sender. + Options: + + 0 : Listen : Listen to actual message + While listening you can use these commands: + 2 : Rewind message. If you press it again you will go to + the previous message. + 3 : Pause. Press 3 again to continue playing. + 5 : Rewind and play + 6 : Goto end of message + + # : Skip : go to next message + + *3: Delete : actual message will be deleted + + 1 : Respond/forward message + 1 : Reply : Send an answer to the sender + 2 : Forward : Record a comment before the message and send + it to someone else. + 4 : Record new : Record a new message. This does exactly the + same as option 1 from the main menu. + + +3. ADMINISTERING OF NAME AND GREETING : + + This submenu will enable you to record name and greeting, and to + specify what greeting will be used. + Options: + + 1 : Greeting : The message that will be heard whenever someone + wants to leave a message in your box. + 1 : Record : Record after the beep the greeting that should + be played. Press 1 to end recording. + 2 : Listen : Listen to your greeting. + *#: Select which greeting should answer. + 9 : Personal greeting. + 6 : Standard system greeting. + + 2 : Name : The message that is heard when someone sends or + reveices messages to/from your box. + 0 : Listen : Listen to name. + 1 : Record : Record name. + + +5. CREATING DISTRIBUTION LISTS AND CHANGING YOUR PASSWORD : + + Distribution lists are used when you regulary need to send messages to + several people, and don't want to waste time with typing all their + boxes. + + 1 : Create : Creates a new distribution list. First you will be + asked for an ID for the list. Now enter f.e. 1 followed + by #. You can now enter a box number followed by #, + repeat this untill you inputed all the box numbers for + the distribution list. If you entered a wrong number, + just press *3 to delete the last entry. When finished + press *#. + + 2 : Scan : With this option all distribution lists ( If you got + any ) will be said, and after saying the ID of the + list, you've got the following options: + *3: Delete : Delete this distribution list. + # : Skip : Go to the next distribution list. + + 3 : Review : This option will allow you to change other users' or + your own distribution lists. First enter the box number + followed by #, or for your own box, just press #. + Now enter the ID of the distribution list followed + by #. The system will say how much entries there are in + the list, and name them one by one, giving you the + following options after naming each entry: + # : Skip : Go to the next box. + *3: Delete : Delete this box. + 1 : Add : Add a box. + *#: Quit : Stop review of the entries in the list. + + 4 : Change PW : Enter your new password followed by #. After + entering it, you have to enter it again followed + by # to check if you didn't enter it wrong the + first time. The password can be 1 till 9 digits. + If you just press # when you're asked to enter it, + no passwords will be assigned to your box. + + +6. CHANGE OUTCALLING INFORMATION : + + The outcalling option is quite fun. Not everyone is allowed to do it, + but if you find boxes allowing outcalling, you can use them to call + friends, boards or even alliance... I wouldn't suggest putting your + own number there, but it would be quite fun that when someone calls + you up using the VMB (on a tollfree number ???), and you don't answer, + he can leave a message and stuff... + + Options: + + 1 : Change : Enter the number your calls should be transfered to, + followed by #. To exit press *#. + + 3 : Info : Will give you instructions on how to enter the number + with option 1. If you want to insert a pause in the + dial string, use * to pause for 4 seconds. If your + number needs to be ended with a #, start your dialing + string with ##. Normally you can't end with a # + because if you do that, the system thinks that it's + the end of the dialing string. This is usefull for + pagers and other stuff (use your imagination). + + 6 : Disable : Turn outcalling off. + + 9 : Period : Specify the outcalling period. + 1 : Outcalling allowed during the system administration hours. + F.e.: Only between 8 AM and 6 PM. + 2 : Outcalling allowed 24 hours a day. + + + + +/\/--> GREETINGS <--\/\ +----------------------- +And last but not least some greetings to: +(A-Z to avoid 'why did ya put X before me ?') + + +Analog: Forget that I told you to kick off Flaming Chaos as a CO. + Making a new BBS proggy ? + +Apollo: Hope your exams are better than mine... nice talking to ya + over the VMB. + +A.R.U.P.: For having such a nice and virgin Audex Voice Power VMB. + +Cops (the): FUCK OFF !!! I EXTREMELY HATE ALL COPS... I WOULD KILL ALL + COPS IF I HAD THE CHANCE (same goes for all kind of security + personnel and the endless amount of lamers on this planet). + +Donald Duck: Where R you ? Is your girlfriend SO interesting ? We miss + your expertise... + +Einstein: You're lame and you know it. Hah, I puke on guys like you. + I'm not a violent guy, but I swear I'll smash your head when + I ever meet you. + +Flaming Chaos: Sorry I offended you dude, but I didn't know about that '|', + so I thought the message was specifically written for me. + +Invalid Media: Quite nice board... too bad you had to make it codefree. + +Jules: Your board is OK, but why is it down so much ? + +Larry: You're a lamer and your problem is that you won't admit it. + +Oink: Hmmm... so you agree that HP3000's are Boooring... Unixes are + 1000 times more phun... + +Ralph: Been fucking around on the nets lately ??? + +Sintax: Happy now that I put some greets in ? Don't you ever get bored + of CIS ? + +Slycath: Nice texts, continue your good work... + btw: I LUV Robbie Robot... (and his frog puppet) + +Predat0r: Your board is the living proof that a board doesn't need an + HST to be one of the best. + +Thor: How is army ? Why don't you do something usefull while you're + there and look for their computer dialups (if they're using + any (hehe)). + +Trap Zer0: Nice texts about the VMB's. Getting active again ? + +Vinny: You probably won't read this, hehe... your handle is with 'V' + so you're last... anyways, THANKS for everything you 'teached' + me, THANKS for the job you can get me, GOOD LUCK with the PC. + +???: To all guys who call me when I'm sleeping: FUCK OFF. + + +And... to all guys I forgot and also the few cool guys I know among all the +lamers in the lame Amiga scene. Only greets here to guys I know involved +in HPA, this will be the first and the last time I put up such a greetings +list... + + + + +/\/--> RECOMMENDED READING <--\/\ +--------------------------------- + - All texts about Night Ranger, he's the VMB expert. + - Texts about Aspen and Cindi systems written by Slycath. + - Texts about the IADS and Message Centers by Trap Zer0. + - Ofcourse all texts written by me (hehe). + + + + +/\/--> OTHER TEXTS WRITTEN BY ME <--\/\ +--------------------------------------- + - Unix command overview + - Hacking Meridian Mail + - HP3000 quick command reference + + + + +/\/--> TEXTS TO WATCH OUT FOR <--\/\ +------------------------------------- + - Maybe a text about the IADS coz I think it's the best VMB ever made. + - Text about Audex (the new Audex Voice Power system). + - Probably some texts about hacking Unix or the MPE XL or V OS on HP3000's. + + + + +L8R ALLIG8R + +User CRAZYBYTE ending interactive session at 17:02. + +NO CARRIER + + diff --git a/textfiles.com/phreak/VOICEMAIL/cinditut.txt b/textfiles.com/phreak/VOICEMAIL/cinditut.txt new file mode 100644 index 00000000..cb03f588 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/cinditut.txt @@ -0,0 +1,361 @@ + . + . . . + + ___/\ /\_/\_______________________/\________ + . /\__\/\/ /_________________________/ /________\ . + + . . / / __\ \/_________/\_____ _______/ /_________/ . + . \/ / /\ \/ // \ / \ / / /\ / / + . + . \ \ / /\ // /\// /\ \ / / / / / / . . + . ________________/\ / / / // / \/\/ // / / /__/ / . +. + /\_______________\/ \ \/ / \ \_/\ / // / / / / / . + \/_________________/ \ / \___/ / / \/ \/ / / . + . / \ . / / . . \/ . + . + . . . \/\/ . \/ + + + . IS PROUD TO PRESENT TO YOU: + . ___________________________ + /\_________________________/\ + / / \ \ + / / * CINDI SYSTEM TUTORIAL * \ \ + \/\___________________________/\/ + + YO GUYZ, I'M BACK AS PROMISED WITH ANOTHER TUTORIAL. + LEAVE ME MAIL IF YOU NEED HELP WITH SOMETHING. + YOU CAN CATCH ME ON: + + BORDERLINE: +61 (0) 4987-4875 + SIN CITY: +32 (0) 3825-2274 + CONSPIRACY: +44 (0) 633-894-490 + ULTIMATE DREAM: +44 (0) 222-495-919 + + MEGA GREETZ GO TO THESE GUYZ: + + .--------------------------------------. + | FIREFLY, TAS, SINTAX, OINK, VOLTAGE, | + | HYBRID, PUNISHER, CRAZYBYTE, GRAFFITI| + | AND OF COURSE EVERYONE WHO KNOWS ME, | + | AND ARE ALSO COOL HACKER - PHREAKERS | + `-.----------------------------------.-' + / CAN SOMEONE DO ME A COOL ANSI ? TA.\ + \____________________________________/ + + ARE YOU SITTING COMFORTABLY ? + ----------------------------- + + THEN I'LL BEGIN. + + ----------------------------------------- + 1. Identifying Voice Mail System As CINDI + ----------------------------------------- + + When you have connected to your System, upon pressing #, + You should get a voice saying : + + "Please enter the persons name using your touchtone keypad, last + name followed by first. To enter a Q or a Z push 1... etc etc.." + + Also when you get kicked off the message will be: + + "Thank You, Good-Day." + + One of the most common phrases you are likely to hear will be: + + "If you'd like to speak with someone press zero" + + This is contained in almost all instruction lists. + + ---------------------------------------------- + 2. Ok So It's CINDI... So How Do I Find A Box? + ---------------------------------------------- + + Mailboxes Are Going To Be Either 3 or 4 Digits. + + The CINDI Mailboxes Mostly come in Blocks... + + e.g. 860,861,862,865 etc + + So When You Find One Person You Can Find Lots Of Others. + + When Looking For Boxes The System Will Kick You Off If You Get A Box Number + Wrong After Three Tries. + + The Three Possibilities For Mailboxes Are: + + 1: Invalid Box "Mailbox XXX Does Not Exist !" + 2: The Greeting Of The Owner Will Play + 3: It Will Say "Mailbox XXX" + + Once You Have At Least One Valid Box Number Everything Is sooo EASY! + + Upon Second Failure (Of Invalid Mailbox Number)Press Hash To Enter + Another Box Number. Now Enter A Valid Box Number. + If You Don't Want That Box You Can Press '0' + Then Instead Of entering Password You Can Press '#' To Enter Another Box + Number, Now There Is No Fear Of Being Cut Off. + + Admin Boxes Are Found At Numbers Like 991, 900, 100, 101 although + Some Systems Require You To Press '0' As Soon As Connected....... + This Will Then Give You An 'Enter Passcode' Prompt. + + ---------------------------------------------------- + 3. Strategic Hacking Using The 'Fault' Of The System. + ---------------------------------------------------- + + The easiest method to hack a box is as follows: + + e.g. Mailbox you want to hack is 1000. + + a. When the system asks you to enter your mailbox number enter: 1000. + b. When the message starts playing you can press '0' to stop. + c. The system will then ask you for a password. + d. The Default Password on a CINDI system is (LAME) '0' + Most Users will have passwords of: + + Mailbox number. + '123 (4)' + 1, 2, 3, --> 9.. + + Passwords Are 3/4 Digits... + + Odds are at Least 1/8 Of users will have passwords like these.. + + e. If Password was wrong, then try another.. + f. Upon 2nd Failed Attempt press '#' - This causes the system to give you + an 'Enter Mailbox' Prompt... You can repeat this Over, and Over... + The System Doesn't Kick You Off and you can find Them Boxes... + + **** Nice Little Bug In The Software METHINKS!!!! **** + + --------------------------------------------------------- + 4. WOW! That Was Easy... What Can I Do With My New BOX ?? + --------------------------------------------------------- + + The Full Commands Available Are As Follows: + + Upon Entering Yor Box You Can Select: + + 0 - TRANSFER TO ATTENDANT + 1 - PLACE A CALL (To another mailbox) + 2 - RECIEVE MESSAGES + 3 - MESSAGE FORWARDING + 4 - CALL PLACEMENTS + 5 - GROUP MESSAGES + 6 - CERTIFIED MESSAGES + 7 - GUEST ACCOUNTS + 8 - PERSONALISE MAILBOX + * - VOLUME. Quiet, Medium OR Loud. + ==== + + ----------------------------------------------------------------------- + ___ + | | + | 0 | WILL ALMOST ALWAYS TAKE YOU TO THE ATTENDANT / OPERATOR + |___| + + Lots Of CINDI System Operators Are Quite Stupid... + Don't Ask Me Why But This Is Fact.... + Wind Them Up And Make Their Life Hell. + Or If Your Kind, Just Worm Info About Other Country Dialups Etc.. + Use Your Imagination. + + ----------------------------------------------------------------------- + ___ + | | + | 1 | PLACE A CALL + |___| + + This Will Prompt You To Enter A Mailbox Number... + Then You Just Start Recording Your Message. + The Point Of This Is So That You Can Reply To Messages.. + i.e. They Will Have Your Mailbox Number Recorded With Them + + ----------------------------------------------------------------------- + ___ + | | + | 2 | RECIEVE MESSAGES + |___| + + Yup, The Whole Point Of A VMB Is To Transfer Messages.. + So Lets Look At The Available Options. + + 1 - Keep Message + 2 - Repeat Message + 3 - -10 Seconds + 4 - +10 Seconds + 5 - Skip Message + 6 - Stop playback for 30secs. + 7 - Take Action + --------------------------------------- + PRESS: + + 1 - Copy Message With Comments + 2 - Copy Message Without Comments + 6 - Relay Info To Another Mailbox + 7 - Respond To Sender + 9 - Take NO Action + --------------------------------------- + 8 - Delete Message + 9 - End Recieving + + + ----------------------------------------------------------------------- + ___ + | | + | 3 | MESSAGE FORWARDING + |___| + + This Sends All New Messages To A Given Telephone Number. + Allows You To Enter Date, Time.. And How Often To Call. + + 1 - Enable Message Forwarding + 2 - Review Message Forwarding Status + 8 - Cancel Message Forwarding + 9 - Exit + + ----------------------------------------------------------------------- + ___ + | | + | 4 | CALL PLACEMENTS + |___| + + This Allows You To Send A Message To A Telephone Number. + The Format For Entering Number Will Allow You To Enter Pauses, + Stars, and '#'. This Enables You To Call A PBX Using A Long String Of + Commands, And Get The System To Give You A Wake Up Call At Home, + Even If You Are Not In USA..... + + One Thing To Remember Is, Once Call Has Been Made Or Not, Check Up + On The Status Of Messages And If A Call Couldn't Be Completed Then + Kill It As To Avoid Leaving Your Number On The System.. + + ( Note On Some Systems Call Placement May Be Off Or Only Available + On Specific Mailboxes. Find Admin. Box And Turn It ON !) + + 1 - Place A Call + + This Will Ask You To Enter The Telephone Number You Wish To Leave + A Message For.. The Systems I Have Found Only Call USA But This Is + Adequate Enough. You Can Enter Pauses ( ), '*' And '#' + + You Will Then Be Prompted To Enter A Password For The Message. + This Is So That When The Number You Are Calling Answers They Have + To Enter A Password To Allow Them To Hear The Message.. + If No Password Is Required Then Enter '0' As The Password. + + 2 - To Check Status Of Calls + 9 - Exit + + ----------------------------------------------------------------------- + ___ + | | + | 5 | GROUP MESSAGES + |___| + + Allows You To Send A Message To Lots Of People At Once. If You Have + A Group With Everyone Listed In It The Chances Are That When You Send + A Message The System Will Crash.. (Mention No Names: TAS) + + 1 - Record A Group Message + 3 - Add Members To A Group + 4 - List A Group + 8 - Delete A Group + + ----------------------------------------------------------------------- + ___ + | | + | 6 | CERTIFIED MESSAGES + |___| + + These Are Messages Which Once Read Will Cause The System To Send + The Sender A Message Which Says The Message Sent To:.. On ... + Has Been Recieved. + + 1 - Send A Certified Message + 2 - Check Delivery Status Of A Message + 8 - Cancel Notification Of A Message + This Stops The System From Sending A Message Once The Sent + Message Has Been Read. + + 9 - Exit + + ----------------------------------------------------------------------- + ___ + | | + | 7 | GUEST ACCOUNTS + |___| + + These Allow You To Record And Recieve Messages To And From Non + Subscribers (Heheh) To The System. + + 1 - Record A Guest Message + 2 - Check Status Of A Message + 3 - Open New Guest Account + 4 - List Your Guests + 8 - Delete A Guest + + ----------------------------------------------------------------------- + ___ + | | + | 8 | PERSONALISE MAILBOX + |___| + + 1 - Change Personal Greeting + 2 - Change Password + 3 - Change Name + 4 - Recover System Bulletin + This Will Recover System Defaults For The Box. + + 5 - Check Message Waiting Notification Status + This Will Tell You If You Have New Messages. + ----------------------------- + Press: + 1 - Change + 9 - Exit + + ----------------------------- + 6 - Change Call Management Level + This Will Allow Your Calls To Be Screened. + + ----------------------------- + Press: + 1 - Change + 9 - Exit + + ----------------------------- + 7 - Change Order Of Message Retrieval + ----------------------------- + Press: + 1 - Change + Last In First Out + + First In First Out + ----------------------------- + 9 - Exit. + ----------------------------------------------------------------------- + + CINDI Systems Are Fun.. Especially For OutDialling Messages.... + If You Are ALONE ! (awww!) You Can Get The System To Send All Messages + At A Specific Time To One Side Of A Loop.. Where You Will Be Waiting + On The Other Side... The Possibilities Are Endless... Wake Up Calls.. etc. + + + I Hope This Was As/More Helpful Than The ASPENTUT.TXT, If You + Don't Have That Then Download It NOW From One Of The Boards Listed + At the Top Of This TextFile... + + Good Luck And HAPPY HACKING !!!!!!!!!!!!!! + .. .. + \ / + /\/\/\/\ + | ## | + [| .. |] ROBBIE THE ROBOT SAY'S HELLLOOOOOOOOOOOO. + |________| + \|-|-|-|-/ + -------- + ___|--|___ .. + / \ {<>} < Do You Like His Frog Puppet ? > + / | /\/\ | \/ / + / / | \/\/ | \ / + ----------------------------------------------------------------------- + The Next Bit Is Where The TEXT ADDERS Do Their Worst: + ----------------------------------------------------------------------- + + + diff --git a/textfiles.com/phreak/VOICEMAIL/hack6 b/textfiles.com/phreak/VOICEMAIL/hack6 new file mode 100644 index 00000000..a4e41fa6 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/hack6 @@ -0,0 +1,87 @@ + Hacking Voice Mail Systems + +Voice Mail is a relatively new concept and not much has been said about it. +It is a very useful tool for the business person and the phreak. The way it +works is that somebody wishing to get in touch with you calls a number, +usually a 1-800, and punches in on his touch-pad your mailbox number and then +he is able to leave a message for you. Business experts report that this +almost totally eliminates telephone tag. When a person wishes to pick up his +message all he needs to do is call the number enter a certain code and he can +hear his messages, transfer them, and do other misc. mailbox utilities. + +Most VMSs are similar in the way they work. There are a few different ways +the VMSs store the voice. One way is that the voice is recorded digitally and +compressed and when heard it is reproduced back into the voice that recorded +it. Another method that is slower and uses more space, but costs less, stores +the voice on magnetic tape, the same type that is used to store data on a +computer, and then runs the tape at a slow speed. Using this method the voice +does not need to be reproduced in any way and will sound normal as long as the +tape is running at a constant speed. On some of the newer VMSs the voice is +digitally recorded and is transformed from the magnetic tape at about 2400 +bits per second. + +There are many different types and versions of voice mail systems. Some of +the best and easiest to get on will be discussed. + +Centagram +--------- +These are direct dial (you don't have to enter a box number). To get on one +of these, first have a number to any box on the system. All of the other +boxes will be on the same prefix; just start scanning them until you find one +that has a message saying that person you are calling is not available. This +usually means that the box has not been assigned to anybody yet. Before the +nice lady's voice tells you to leave the message, hit #. You will then be +prompted for your password. The password will usually be the same as the last +four digits of the box's number or a simple number like 1000, 2000, etc. Once +you get on, they are very user friendly and will prompt you with a menu of +options. If you can't find any empty boxes or want to do more, you can hack +but the system administrators box, which will usually be 9999 on the same +prefix as the other boxes, will allow you to hear anybody's messages and +create and delete boxes. + +Sperry Link +----------- +These systems are very nice. They will usually be found on an 800 number. +These are one of the hardest to get a box on because you must hack out a user +ID (different from the person's box number) and a password. When it answers, +if it says, "This is a Sperry Link voice station. Please enter your user ID," +you will have to start trying to find a valid user ID. On most Sperrys it +will be a five digit number. If it answers and says, "This is an X answering +service," you first have to hit *# to get the user number prompt. Once you +get a valid user number will have to guess the password on most systems, it +will be 4 digits. Once you get in, these are also very user friendly and have +many different options available. + +RSVP +---- +This is probably one of the worst VMSs but it is by far the easiest to get +yourself a box. When it answers you can hit * for a directory of the boxes on +it (it will only hold 23). If you hit # you will be given a menu of options +and when you choose an option you will then be prompted for your ID number. +The ID number on an RSVP system will just about always be the same as the +mailbox number, which are always only 2 digits. + +A.S.P.E.N. +---------- +The Aspen voice message systems made by Octel Telecommunications is in my +opinion the BEST VMS made. To get a box on an Aspen, you need to find an +empty box. To find an empty box, scan the box numbers and if one says, "You +entered XXXX. Please leave a message at the tone," then this is an empty box. +You next just press # and when prompted for your box number enter the number +of the empty box and friendly voice of the nice lady will guide you through +all of the steps of setting up your box. She first tells you what you can do +with the box and then will prompt you with, "Please enter the temporary +password assigned to you by your system manager." This password will usually +be 4 digits long and the same as the box number like 1000, etc. Once you get +on their are many things you can do. You can make a distribution list where +if you want to leave a certain message to more than one person, you can enter +the list number and all of the boxes on the list will get the message. You can +also have the system call you and notify you that you have new messages. These +systems also have what they call "Information center mailboxes" that are +listen only and can also have a password on them so the person calling has to +enter the password before he hears the greeting message. Aspen VMSs have a +system managers mailbox that will just about give you total control of the +whole system and let you listen to people's mail, create and delete boxes, and +many other things. + +  \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/hackam1990.txt b/textfiles.com/phreak/VOICEMAIL/hackam1990.txt new file mode 100644 index 00000000..1c35776c --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/hackam1990.txt @@ -0,0 +1,265 @@ + + */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/* + Hacking Answering Machines 1990 + */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/* + by: Predat0r of Blitzkrieg Bbs 502/499-8933 + + + AT&T reports that in the year 1990, 11 million people +will buy an answering machine for their home use. In 1989, 10 +million machines were sold. Everyone has called up a person +at one time or another and got the old "leave your name at +the beep" message. With this increase in homes using these +machines there is also a new form of hacking developing. One +of hacking an answering machine. + + Why would anyone even want to hack an answering machine +and for what purpose? There are many reasons and things you +can do once you have control of someone elses machine. If for +some reason you need to spy on a business or person you can +hack their machine and take control using the information for +your own personal use. There is also the old "change the +message" secret to make it say something to the effect of +this line accepts all toll charges so you can bill third +party calls to that number. You can also use an answering +machine for your own personal use, as in making it your own +voice mail type system for people to call. Only do this if +you know someone is out of town. If they come home from +shopping and find their machine changed it might cause +problems. With these basic ideas in mind you can see hacking +an answering machine could be very useful to certain +individuals. + + How can a person hack an answering machine? Well most +answering machines built now have remote access features +which allow the owner, or anyone to call in and press a +security code to play their messages. This is where the fun +begins. Some older models don't have remote access so you +cannot do anything to them. Also if you know someone has a +machine but you call and it doesn't answer, let the phone +ring about 15 times. This will tell the machine to turn +itself on, so you can hack it. The actual number varies +between machines. + + To practice hacking some machines i will show you how to +get remote access on a few models. Just look and see what +kind your friend has and hack it for starters. + + Record a Call- Model 2120 + ------------------------- +Call in and during the message or after the beep tone to +leave a message enter the 3 digit security code. Which you +must find yourself. This will rewind the tape and play all +new messages. Press 2 to backspace and repeat the last +message. Press 3 to fast foward the tape. + +Changing your message from remote. Call your phone and enter +the secret code. After several rapid beeps enter your secret +code again. After a short delay you will hear a long tone. +After the tone ends begin speaking your message which may be +17 seconds in length. When finished press the second digit of +your secret code to end. The machine will then save your +message and play it back. To turn the unit on from remote let +it ring 11 times then hangup. Or stay on and it will answer +so you can access the machine. For express calls or frequent +calls hit the second digit for two seconds to skip the out +going message announcement. + +Goldstar- Models 6000/6100 +-------------------------- +Call and enter your 1 digit secret code after you hear the +out going message announcement. The machine will then play +back new messages. Hangup to save messages or after all +messages have been played the machine will give a double +beeptone, you may enter your code to erase all messages. +You cannot change the out going message on this unit. + +Cobra- Model AN-8521 +-------------------- +For this machine there are 2 codes. Both are one digit in +length. The first one is the play code. The second is to +erase messages from remote. After the outgoing message and +beeptone press the play code for 2 seconds to play messages. +After each message ends there will be a single beep. At the +end of all message it will beep twice. You may then do the +following. Replay by pressing the play code again. Erase +messages by pressing the erase code. Hang-up and save +messages and continue to take additional calls. To turn this +unit on from remote you must let it ring 16 times before it +will activate. If it rings 10 times then you hear 3 beeps it +is full and messages need to be erased. + +Uniden- Model AM 464 +-------------------- +This model is one of the more advanced when it comes to +remote capabilities. The factory preset security code is 747. +This can be changed to as many as five digits of your choice. +To gain access from remote type your security code while the +outgoing message is playing. Press 1 after hearing the tone +and the machine will rewind and play your messages. To fast +foward press 7, to resume normal playback press 8. To stop +the messages from playing press 8 again. Press 8 to restart +the messages or 1 to start from the beginning again. Press 9 +to rewind and 8 to resume playing. If you rewind all the way +it will beep twice. You need to press 1 to play messages.To +save messages press 4. To erase press 6. To turn the machine +off from remote press 5 after all messages have been played +and the machine beeps twice. To turn the machine on from +remote let the phone ring 12 to 14 times. The machine will +beep and then you enter your remote code. This will then turn +your machine to answer mode. This machine also has room +monitor options. This allows you to listen to what is going +on in the room of the machine. To do this call the machine +enter your security code after the beep press 0. The monitor +stays on for 60 seconds. You will be warned with 2 beeps at +45 seconds. To continue press 0 again.To change the outgoing +message from remote erase all the messages. Then call back +and enter your code after the tone press 3. It will beep +again and you may then leave your new message. Press 3 when +finished. To change the security code from remote after the +beep press # then 1 after the next beep enter your new code +followed by the # again. There is also a call break through +where you enter 256 while the outgoing message is playing. +This will alarm the persons in the house someone is calling +with a series of loud beeps. Press the * key to stop. + +Code-a-phone Model 930 +---------------------- +To access from remote call and enter your security code after +the announcement and tone. Press your code for 3 full +seconds. After the new messages have been played you will +hear 2 tones. You may then save messages by pressing your +code then hanging up. repeat by entering code wait for 4 +tones then enter code again. To erase message hangup when the +tape is done playing. To turn the machine on from remote call +and let ring ten times. When the system answers it will have +a two second tone. Press your security code. You will hear +three double tones to let you know the system is on. + +Unisonic- Model 8720 +-------------------- +One digit code entered after the outgoing message and tone +will allow you to hear messages. To change message wait till +all new messages have been played 2 beep tones will be heard. +Press code for four seconds. Two beeps will be heard then the +tape will rewind and beep again. Now leave the new message. +Press your code when finished to save new outgoing message. +New message will play for you to hear. + +Panasonic- Model KX-T2427 +------------------------- +Call and enter the three digit code during the outgoing +message. Machine will beep once, then beep amount of times +equal to messages. Then rewind and play messages. There will +be three beeps after the last message. Six beeps means the +tape is full. Press 2 to foward. Press 1 to rewind. Press 3 +to reset machine and erase messages. To monitor the room +press 5 after the beeps indicating the number of messages the +machine has. Press 7 to change the outgoing message, it will +beep a few quick times rewind then a long beep will be heard. +Leave new message press 9 when finished. Press 0 right after +the beep tones to shut the machine off. To turn the machine +on let it ring 15 times then hangup after machine turns on. + +Panasonic- Model KX-T2385d +-------------------------- +During the outgoing message enter the 1 digit code. This will +playback messages. Press the code again to rewind. After the +messages have played the machine will beep three times. Press +your code again and it will reset the machine. For remote +turn on let phone ring 15 times. Then after the outgoing +message hangup. + +AT&T- Model 1504 +---------------- +Enter 2 digit code before or after announcement. System will +beep after each message and five times when messages are +done. Press the # key anytime to pause. Hanging up will save +messages. Press 7 and it will rewind and play messages again. +Press 5 to fast foward. Press 2 to rewind. Press 33 after all +messages have been played to reset without saving messages. +To record onto the tape press * after the system answers. +This will then beep and you may leave a four minute message +on the tape. Press # when done. This is not an outgoing +message announcement, only a memo. To turn on from remote let +ring ten times press 0 when system answers. To turn the +system off dial and enter your code. Press 88 and it will +shut the machine down. + +Phonemate- Model 4050 +--------------------- +Enter your 3 digit code during the outgoing message. Pressing +* or # will allow you to scan through the messages. When +finished pressing 1 will replay the messages. Pressing 2 will +erase them. To turn on from remote let ring for 15 times. +Then proceed with remote operations. + +Phonemate- Model 7200 +--------------------- +Enter 1 digit code during of after the outgoing message. A +voice will tell you how many messages you have, then play +them back for you. To rewind press your code and hold it for +however long you want to rewind. Let go and it will resume +playing. After the last message a voice will prompt you with +a list of options. You have five seconds to respond or it +will proceed to the next option. These are as follows. The +first is hanging up to save messages. Next is enter code to +replay messages. Next enter code to erase messages. Last is +enter code to change greeting. Follow the voice and it will +give you complete directions on exact steps to follow. To +turn on from remote let ring ten times then hang up. If tape +is full it will say sorry tape is full, enter code and erase +messages. + +Spectra Phone- Model ITD300 +--------------------------- +Enter your 1 digit code after the greeting. Messages will +play back. Hanging up will save them. Or wait for four beeps +and press your code to replay them. To erase press your code +after 2 beeps. To turn the machine on from remote let it ring +10 times. + +Notes: Outgoing message and greeting is what you hear when +you first call. Code is your personal security code. + +Hacking answering machines can be very easy. It can also help +you obtain valuable information. If you have a targeted +machine you can try going to a store and saying you just +bought one and it didn't have instructions in the box. They +will usually give you a set or make copies for you. This +basic guide is just to introduce you to answering machine +hacking and changing the outgoing message and listening to +messages left by callers. To keep your own machine safe +purchase one with a changeable security code of 3 or more +digits. Most home machines are of the 1 digit type and are +easy to hack. I have no knwoledge of the laws concerning +hacking into someones answering machine. I am sure once it +becomes more common we will find out. Of course this article +is for informational purposes only so you would never have to +find out the actual laws. + +Taken from TAP Magazine Issue #100 + + + +X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X + + Another file downloaded from: NIRVANAnet(tm) + + & the Temple of the Screaming Electron Jeff Hunter 510-935-5845 + The Salted Slug Strange 408-454-9368 + Burn This Flag Zardoz 408-363-9766 + realitycheck Poindexter Fortran 510-527-1662 + Lies Unlimited Mick Freen 415-583-4102 + Tomorrow's 0rder of Magnitude Finger_Man 415-961-9315 + My Dog Bit Jesus Suzanne D'Fault 510-658-8078 + New Dork Sublime Demented Pimiento 415-566-0126 + + Specializing in conversations, obscure information, high explosives, + arcane knowledge, political extremism, diverse sexuality, + insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS. + + Full access for first-time callers. We don't want to know who you are, + where you live, or what your phone number is. We are not Big Brother. + + "Raw Data for Raw Nerves" diff --git a/textfiles.com/phreak/VOICEMAIL/hackvmb.txt b/textfiles.com/phreak/VOICEMAIL/hackvmb.txt new file mode 100644 index 00000000..85b6ec1b --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/hackvmb.txt @@ -0,0 +1,202 @@ + +Hacking & Scanning Voice Mail Boxes: The Tutorial + + +Hello again, and welcome to another Legions of Lucifer text phile! This +text file has to do with hacking and scanning VMBs. The reason I am writing +this phile is because I am very good at it, and have had years of experience. +Infact I have been called by MCI for screwing them over by attacking and +taking over a whole damn system with a few friends of mine. + +Anyways, hacking VMBs is very simple and basically safe, and not only that +but they are kewl to have around. You can give them to friends, you can +trade them for access on bulletin boards, or you can use it for yourself. +As for this 'Tutorial on Hacking VMBs', we will be talking about what systems +to hack, how you go about hacking them, default passwords, hints on better +scanning, and having your very own box. + + +Basics: + +VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is +like an answering machine. You can use it for all sorts of things. Most +VMB systems are dialed though 800 numbers. People call up the VMB system +that you have a box on, and dial in your box number and then leave you a +message. Whenever you want to check your box, you just call up, enter your +password and read your messages. Inside a VMB you can do whatever, you can +leave messages to others on the system, you can change your 'Out Going' +message, you can have guest boxes (Explained later), you can have the box +call your house when you get an Urgent message, you can do a lot of things. +Infact, on some systems you can even CALL OUT through them, so they can be +used as a code of sorts! They are cool to have. + + +What Type of System You Should Scan/Hack: + +You should scan/hack out Virgin Systems, this is another way of calling a +system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems +have the best boxes and the most options that VMB Systems can offer. I will +be talking about ASPEN System today since I know most about those. + + +Scanning Your 'Virgin ASPEN VMB System': + +Okay once you've found your Virgin VMB System, you start to scan. Just incase +you don't know what scanning is, that means you search for boxes that are +hackable (Explained later on). Now you dial up the system and when it picks +up and the bitch starts to talk, press the "#" key. It will then ask you for +your box number... now there are two different way the ASPEN System can be +configured: 1) a "3 Digit Box Number System" or 2) a "4 Digit Box Number +System". Now lets just say this system is a 3 Digit System. Okay, when it +asks for your Box Number, enter in 999, now it will say one of three things: +[These are known as 'Greeting Names'] +1. John Doe [Box owners name] +2. "Box Number 999 Is Not a Valid Box Number" +3. "Box Number 999" +Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc, +but if it says 3, then you are lucky, now it will ask you for your password, +now you are probably saying 'Shit this is where it gets difficult'... well +you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords: + +* We will use box number 666 as an example box # + [ BN = Box Number ] + +List of Default Password: Combination Result + + 1-BN 1666 + BN+1 667 + 0-BN 0666 + BN-0 6660 + Most Common BN 666 + +Now enter in a those defaults, try JUST the Box Number first, ASPENs usually +use that most. Now, if you try all those Defaults and still can not get into +that Voice Mail Box, then that means that the box has been already taken, but +the owner hasn't changed his 'Generic Message', if you don't get in, you +will just have to search until you get in. + + +Once You Get Into a Box: + +Okay, once you get your first box, *DO NOT* change anything!! That will come +later. Your first box is, as what is known as a 'Scanning Box'! What you do +with your Scanning Box is this: You enter "3" from the main commands menu, +and it will ask you for the box number. Now that command is the "Check for +Reciept" command, what it does it check Box #xxx for mail from you. This +command is very convienient for us VMB Hackers. To use that command to your +advantage, you enter in box a box number and it will say 1 of the three +'Greeting Names', like before, if it say #3, then you write down that Box +Number and hack it later. But if it says 1 or 2, then just keep scanning! +All boxes with the number 3 Greeting Name is known as a 'Hackable Box'. +Now you keep scanning until you have gone all the way down to Box number 000 +or whatever is the lowest box it supports. Now, once you have your list this +is when all the fun starts! Now you are ready to hack! + + +Hacking Out Your New Found 'Hackable' Boxes: + +Okay this is the easy part. After you spent most of your time by scanning +the system you should be used to the system and how it works, that should +make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you +should know what the default password was for your Scanning Box. Well if the +password for your Scanning Box was just the Box Number, then *EVERY* other +hackable box should have the SAME default password. VMB Systems have only +one default password, If one box has the BN for a Default PW, the all the +others will too. + +Okay, you call up the VMB System will the list of 'Hackable' boxes by your +side, and when the bitch is talking, press the "#" key. When it asks you for +your box number, enter in the first box number on your list. When it asks for +your password, enter in the Default Password Sequence. Now if you don't get +into that box, it's not a problem, just keep going down your list. You should +get into a few. But remember, just because a box is marked 'Hackable', it +doesn't mean you will definatly get into it. + +Okay, now you have a few dozen boxes. You can now use you Scanning Box to do +whatever you please. + + +ASPEN Guest Boxes: + +Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes +are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out +Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set +for him, and leave you messages, but not only that, you can leave messages +to HIM! Which means, if his is in New York, and you are in California, and +neither of you have codes to call eachother, then you can leave messages thru +your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes: + +0. Main Box - Your Voice Mail Box! +1. Guest Box #1 - Can Leave & Recieve Messagez +2. Guest Box #2 - Can Leave & Recieve Messagez +3. Home Box - Can Leave & Recieve Messagez +4. Secretary Box - Can Check How Many Messagez You + Have & Receive Messagez + + +Hints On Better Scanning: + +A lot of people say hacking and scanning for VMBs is too damn hard... well +that's because they are going at it all wrong, they probably read some lame +piece of shit text file on Hacking VMBs that was about 500 bytes long. Well, +here is a small list of hints on better scanning and hacking: + +1. Do not use a Voice Mail Box hacking/scanning program + (ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..) +2. Do not hack in random order (ei: B#999, 345, 810, etc) + Always hack in order: 999, 998, 997, 996, 995...000. +3. Try to find out if it's virgin. The newer the System, + the better. +4. If you have a phone with memory dial, change one entry + to the number of the VMB System. +5. Don't hack the System Managers box unless you really + want to. + + +Ideas of Things To Do With Your Extra Boxez: + +Well since you can have up to 500 extra Voice Mail Boxes, you might +not know what to do with them, here are a few ideas that can help you out: + +1. Give them to friends +2. Sell them to friends +3. Offer them to sysops for + for better access +4. Trade them for HSTs or + whatever +5. Use them as a Voice Verifing line (So you don't have to give out + your real voice number to BBSes when you apply!) + + +Well, that's it to the Legions of Lucifer Hacking & Scanning Voice Mail Box +Systems Tutorial! I hope it helped you and I, along with L.o.L wish you the +best of luck with your new found hobby! And remeber if you found this text +of any help, please spread it around to help others! Also, if you think you +are any good at writing H/P, please apply to be a Member! Call the L.o.L Home +at: + + Digital Hackers Network + Legions of Lucifer HeadQuarters/Home + No Warez! A truely serious Hack/Phreak board + Hack, Phreak, Scanning, Phraud, Crashing disscusions + Viral Research & Development Sections (500+ Virii!) + "Personalized ANSi Bombs" made by request + Running AfterShock v1.20 - 2400 Baud + PH: 213-274-1333 + Call these Legions of Lucifer support boards for information or application +inquiries: + +Digital Hackers Network 213/274+1333 L.o.L HeadQuaters/Home +Electric Eye ][ 313/776+8928 L.o.L Distribution Site #1 +Digital Information Exchange 612/356+2209 L.o.L Distribution Site #2 +Legions of Lucifer High Office Members: + +Prezident/Founder: Wave Runner! +Vice Prezident : Count_Zer0 + + This text file is (C)Copyrite 1990 L.o.L Inc. + L.o.L is a registered trademark of DHN, All rights reserved + Any modifications to this text file is a violation of copyrite. + Digital Hackers Network 213/274+1333 -=L.o.L Home=- + + diff --git a/textfiles.com/phreak/VOICEMAIL/lol12.txt b/textfiles.com/phreak/VOICEMAIL/lol12.txt new file mode 100644 index 00000000..e91ee61f --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/lol12.txt @@ -0,0 +1,210 @@ +The THC Hack/Phreak Archives: LOL12.TXT (205 lines) +Note: I did not write any of these textfiles. They are being posted from +the archive as a public service only - any copyrights belong to the +authors. See the footer for important information. +========================================================================== + +Hacking & Scanning Voice Mail Boxes: The Tutorial + +Hello again, and welcome to another œegions “f œucifer text phile! This +text file has to do with hacking and scanning VMBs. The reason I am writing +this phile is because I am very good at it, and have had years of experience. +Infact I have been called by MCI for screwing them over by attacking and +taking over a whole damn system with a few friends of mine. + +Anyways, hacking VMBs is very simple and basically safe, and not only that +but they are kewl to have around. You can give them to friends, you can +trade them for access on bulletin boards, or you can use it for yourself. +As for this 'Tutorial on Hacking VMBs', we will be talking about what systems +to hack, how you go about hacking them, default passwords, hints on better +scanning, and having your very own box. + + +Basics: +ÄÄÄÄÄÄ + +VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is +like an answering machine. You can use it for all sorts of things. Most +VMB systems are dialed though 800 numbers. People call up the VMB system +that you have a box on, and dial in your box number and then leave you a +message. Whenever you want to check your box, you just call up, enter your +password and read your messages. Inside a VMB you can do whatever, you can +leave messages to others on the system, you can change your 'Out Going' +message, you can have guest boxes (Explained later), you can have the box +call your house when you get an Urgent message, you can do a lot of things. +Infact, on some systems you can even CALL OUT through them, so they can be +used as a code of sorts! They are cool to have. + + +What Type of System You Should Scan/Hack: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +You should scan/hack out Virgin Systems, this is another way of calling a +system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems +have the best boxes and the most options that VMB Systems can offer. I will +be talking about ASPEN System today since I know most about those. + + +Scanning Your 'Virgin ASPEN VMB System': +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Okay once you've found your Virgin VMB System, you start to scan. Just incase +you don't know what scanning is, that means you search for boxes that are +hackable (Explained later on). Now you dial up the system and when it picks +up and the bitch starts to talk, press the "#" key. It will then ask you for +your box number... now there are two different way the ASPEN System can be +configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number +System". Now lets just say this system is a 3 Digit System. Okay, when it +asks for your Box Number, enter in 999, now it will say one of three things: +[These are known as 'Greeting Names'] +1. John Doe [Box owners name] +2. "Box Number 999 Is Not a Valid Box Number" +3. "Box Number 999" +Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc, +but if it says 3, then you are lucky, now it will ask you for your password, +now you are probably saying 'Shit this is where it gets difficult'... well +you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords: + +* We will use box number 666 as an example box # + [ BN = Box Number ] + +List of Default Password: Combination Result + + 1-BN 1666 + BN+1 667 + 0-BN 0666 + BN-0 6660 + Most Common Äį BN 666 + +Now enter in a those defaults, try JUST the Box Number first, ASPENs usually +use that most. Now, if you try all those Defaults and still can not get into +that Voice Mail Box, then that means that the box has been already taken, but +the owner hasn't changed his 'Generic Message', if you don't get in, you +will just have to search until you get in. + + +Once You Get Into a Box: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Okay, once you get your first box, *DO NOT* change anything!! That will come +later. Your first box is, as what is known as a 'Scanning Box'! What you do +with your Scanning Box is this: You enter "3" from the main commands menu, +and it will ask you for the box number. Now that command is the "Check for +Reciept" command, what it does it check Box #xxx for mail from you. This +command is very convienient for us VMB Hackers. To use that command to your +advantage, you enter in box a box number and it will say 1 of the three +'Greeting Names', like before, if it say #3, then you write down that Box +Number and hack it later. But if it says 1 or 2, then just keep scanning! +All boxes with the number 3 Greeting Name is known as a 'Hackable Box'. +Now you keep scanning until you have gone all the way down to Box number 000 +or whatever is the lowest box it supports. Now, once you have your list this +is when all the fun starts! Now you are ready to hack! + + +Hacking Out Your New Found 'Hackable' Boxes: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Okay this is the easy part. After you spent most of your time by scanning +the system you should be used to the system and how it works, that should +make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you +should know what the default password was for your Scanning Box. Well if the +password for your Scanning Box was just the Box Number, then *EVERY* other +hackable box should have the SAME default password. VMB Systems have only +one default password, If one box has the BN for a Default PW, the all the +others will too. + +Okay, you call up the VMB System will the list of 'Hackable' boxes by your +side, and when the bitch is talking, press the "#" key. When it asks you for +your box number, enter in the first box number on your list. When it asks for +your password, enter in the Default Password Sequence. Now if you don't get +into that box, it's not a problem, just keep going down your list. You should +get into a few. But remember, just because a box is marked 'Hackable', it +doesn't mean you will definatly get into it. + +Okay, now you have a few dosen boxes. You can now use you Scanning Box to do +whatever you please. + + +ASPEN Guest Boxes: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes +are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out +Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set +for him, and leave you messages, but not only that, you can leave messages +to HIM! Which means, if his is in New York, and you are in California, and +neither of you have codes to call eachother, then you can leave messages thru +your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes: + +0. Main Box - Your Voice Mail Box! +1. Guest Box #1 - Can Leave & Recieve Messagez +2. Guest Box #2 - Can Leave & Recieve Messagez +3. Home Box - Can Leave & Recieve Messagez +4. Secretary Box - Can Check How Many Messagez You + Have & Recieve Messagez + + +Hints On Better Scanning: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +A lot of people say hacking and scanning for VMBs is too damn hard... well +that's because they are going at it all wrong, they probably read some lame +piece of shit text file on Hacking VMBs that was about 500 bytes long. Well, +here is a small list of hints on better scanning and hacking: + +1. Do not use a Voice Mail Box hacking/scanning program + (ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..) +2. Do not hack in random order (ei: B#999, 345, 810, etc) + Always hack in order: 999, 998, 997, 996, 995...000. +3. Try to find out if it's virgin. The newer the System, + the better. +4. If you have a phone with memory dial, change one entry + to the number of the VMB System. +5. Don't hack the System Managers box unless you really + want to. + + +Ideas of Things To Do With Your Extra Boxez: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Well since you can have up to 500 extra Voice Mail Boxes, you might +not know what to do with them, here are a few ideas that can help you out: + +1. Give them to friends +2. Sell them to friends +3. Offer them to sysops for + for better access +4. Trade them for HSTs or + whatever +5. Use them as a Voice Verifing line (So you don't have to give out + your real voice number to BBSes when you apply!) + + +Well, that's it to the œegions “f œucifer Hacking & Scanning Voice Mail Box +Systems Tutorial! I hope it helped you and I, along with œ.“.œ wish you the +best of luck with your new found hobby! And remeber if you found this text +of any help, please spread it around to help others! Also, if you think you +are any good at writing H/P, please apply to be a Member! Call the œ.“.œ Home +at: + + Digital Hackers Network + œegions “f œucifer HeadQuarters/Home + No Warez! A truely serious Hack/Phreak board + Hack, Phreak, Scanning, Phraud, Crashing disscusions + Viral Research & Development Sections (500+ Virii!) + Running AfterShock v1.20 - 2400 Baud + PH: 213-274-1333 + +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Call these œegions “f œucifer support boards for information or application +inquiries: + +Digital Hackers Network 213/274+1333 œ.“.œ HeadQuaters/Home +Electric Eye ][ 313/776+8928 œ.“.œ Distribution Site #1 +Digital Information Exchange 612/356+2209 œ.“.œ Distribution Site #2 +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + This text file is (C)Copyrite 1990 œ.“.œ Inc. + œ.“.œ is a registered trademark of DHN, All rights reserved + Any modifications to this text file is a violation of copyrite. + Digital Hackers Network 213/274+1333 -=œ.“.œ Home=- +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ diff --git a/textfiles.com/phreak/VOICEMAIL/phonhack.txt b/textfiles.com/phreak/VOICEMAIL/phonhack.txt new file mode 100644 index 00000000..d5992b8c --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/phonhack.txt @@ -0,0 +1,330 @@ + Hacking Telephone Answering Machines + +by Doctor Pizz and Cybersperm + +****************************************************************************** +DISCLAIMER: The following is for informational purposes only. All information +provided is simply to point out how easy it is to access such a system. The +author accepts no responsibility for irresponsible use of this knowledge, and +it is provided solely so people can be aware of the low security of such +systems. (Now that I'm off the hook in case you do something stupid...). +****************************************************************************** + + + It seems that lately there is very little discussion of one of the most +simple but useful and rewarding forms of electronic information gathering, +hacking the telephone answering machine. Almost everyone has one of these +wonderful devices these days, to catch important messages while they are away +from their phones, or to screen important telephone calls. Nowadays, they +typically have the added advantage of being accessible from remote telephones, +so one needs to simply call his or her answering machine, enter their secret +code, and then either retrieve new messages, or listen to anything they had +previously recorded on the incoming messages tape, or perform any of a set of +additional functions determined by which key they press on their touch tone +phone. They also typically ignore the fact that virtually anyone else can +gain access to their messages by entering the appropriate code. Hence this is +a wonderful system to gather information from anyone without their knowledge, +especially if they are technologically illiterate. + + For the most part, there are two main types of "electronic password" +used by these systems. They are amazingly simple to crack, as they are +typically only 2-digit or even 1-digit numbers!!!!!! On some machines, the +code must be entered before the outgoing message is over, on others, it must +be entered after the outgoing message, and on more sophisticated models, it +can be entered at any time. + + +MODERN 2-DIGIT PASSCODE SYSTEMS: + + These are the most common systems in use today, typically made by +Panasonic, AT&T, etc. In these systems, the code can be entered before during +or after +the beep tone. For security reasons, we recommend BEFORE the beep tone, so +your intrusions are unnoticed... We will begin by discussing how to identify +the passcode. + + + Now, the question of how to hack their code. Well, this is so simple, +you don't even need a computer to do it. You can just enter all 2-digit +combinations until you get the right one (usually signalled by a series of +beeps on the other end). A relatively crude way was to enter each number in +sequence 01, 02, 03, 04,...,99. This works, but may take too long to enter +all numbers within the 20-30 second window we typically have before the beep +(The best time to play arounnd, as any tones entered after the beep will be +recorded on his incoming messages tape, and could let him know something is +up...). It is also important to stop as soon as you hit the right number, as +the additional entered numbers may be interpreted by the answering machine as +codes, and cause you to delete all their messages, or record a new greeting, +etc. That is really asking for trouble, and may cause them to try and change +their password (though it's usually only possible to choose from a range of +three consecutive numbers anyway...). Still, you need to be careful not to +let them catch on, eh? + + A more sophisticated and fast way to do this is to take advantage of the +fact that such machines typically do not read two numbers at a time, and +discard them, but just look for the correct sequence, reading one at a time. +In other words, you can enter all 100 possible codes with roughly 1/2 the +number of keystrokes. Just enter as follows: + +0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9,etc. + +By reading in one phase we get: + +0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1,1 2,1 3,1 4,1 5,1 6,1 7,1 8,1 9,etc. + +In the other phase we get: + + 0 1,0 2,0 3,0 4,0 5,0 6,0 7,0 8,0 9,1 1,2 1,3 1,4 1,5 1,6 1,7 1,8 1,etc. + +So by proceeding as follows we enter the following matrix sequentially, +encompassing all possible 2 digit numbers: + + +0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 + 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 + 2 2 3 2 4 2 5 2 6 2 7 2 8 2 9 + 3 3 4 3 5 3 6 3 7 3 8 3 9 + 4 4 5 4 6 4 7 4 8 4 9 + 5 5 6 5 7 5 8 5 9 + 6 6 7 6 8 6 9 + 7 7 8 7 9 + 8 8 9 + 9 0 + +The last zero is important, as it completes the cycle, and allows for the code +9 0, which is the only one not as yet allowed for. I must emphasize the +importance of quitting as soon as you get the correct code, and also do not +keep going after the beep, if you are on a modern 2-digit access code system. +This way, you can record the passcode for your future reference, and prevent +detection. + + Now, we shall get on to the question of how to use their system, once +you've broken in. In general, it is recommended to obtain a copy of the +owners' manual for various machines, but I have summarized some of the basics +below. + + PANASONIC + +Here are the codes for a Panasonic Easa-phone KX-T1450. The KX-T2420 is +identical without Room Monitor function In this case, strange things happen +when you enter 5: + +1 = Back Space (Rewind the OGM tape) +2 = Skip Forward (Fast forward the OGM tape) +3 = Reset (Go back to the beginning of the OGM tape. MAY CAUSE ERASURE!!!) +4 = Memory Playback (Listen to new messages) +5 = Room Monitor (!!!! Listen to what is going on in the room NOW !!!!) + (This is only available on some models... But, try it...) +7 = OGM-REC (Record a new greeting!!!) +9 = OGM-STOP (Stop recording the new greeting) +* = OGM Skip (Don't Listen to the OGM) +0 = Turn off the machine !!!!! + +To set to the answer mode remotely, + 1. Dial the phone number + 2. Wait 15 rings and hang up + +To turn off the unit remotely (!!), + 1. Dial the phone number + 2. Push the code number, wait for the beep, enter 0, and hang up. Panasonic answering machines also respond to the user with a series of +codes which I will now outline. If you hear something different, you may not +be on a Panasonic system. + +1 long beep : This is the "beep" after which people can leave their messages. + + Also, this is sounded when the correct passcode is entered from + + a remote telephone. (Same sound- Hint for software developpers) + It sounds when the tape has fully rewound, and after each + + message is played back in entirety. +3 short bps : This sounds after the last message has been played back. + +2 short bps : (10 seconds later) You are then being recorded - marker message + +6 short bps : End of the incoming message tpe + +6 short bps : (Quickly) Tape Broken (either incoming or outgoing) + +Also, after entering the correct code, and after the one long beep, you will +hear n additional short beeps, where n is the number of new messages since the +last time the messages were retrieved. Remember, you can listen to earlier +ones on the same tape, by additionally backspacing from the first new message. + +Anyway, that is a basic summary of the Panasonic answering machine system for +this machine. Many machines unfortunately do not have the Room monitor +function, so you can not see if you left your TV on, or anything like that... +Also, not all systems are identical, but on Panasonic machines, the numbers 1- +4 are the same, so this is the most important thing for you to remember +anyway... + + + + AT&T + +On AT&T machines, like the Answering System 1304, the passcode is again a 2- +digit number enterable before, during, or after the beep. Follow the same +guidelines as above. + +After you enter the correct code on these machines, the system will +automatically begin to play back new messages. This is one key way to +distinguish these machines from the Panasonic ones discussed above. + +To summarize the key functions for the AT&T system, look below: + +2 Rewind tape (tape rewinds for as long as this key is depressed) +3 3 Clear messages (reset the tape to the beginning.) +5 Fast Forward (tape ffwds for as long as this key is depressed) +7 Replay messages from the beginning +8 8 Turn off the answering machine +* Record a memo (After listening to messages) OR + Skip the greeting (w/o entering code) +0 Turn on the machine (after hearing two beeps) +# Pause (for 5-7 seconds) + +Basically this system is less sophisticated than the Panasonic. You cannot +change the OGM remotely (Damn!). As seen above, the codes are also quite +different, but fortunately they are easily distinguished by how they answer +after the security code is entered. The AT&T plays the messages, while the +Panasonic just beeps to tell you how many new messages are waiting. Here +also, the rewind and fast forward functions operate for the length of time you +depress the 2 and 5 keys respectively. On the Panasonic, they reewind or fast +forward for 15 seconds. Also, this system has a pause feature. By entering +the # sign, you can pause for a few seconds while listening to a message. One +extra safety (from your perspective...) feature is that on this system you +cannot erase messages until they have all played back, so you have less risk +of fucking up someone's system if it is an AT&T. You cannot change his +greeting, and it is difficult to accidentally erase his messages. If you wish +to do so, however, you must hit the 3 key twice after listening to the +messages in their entirety. To record a memo (why would you want to do +this???), you can press the * key after you hear 5 beeps (after listening to +the messages). Then begin to record. Also, the * key can be used before the +message is finished to skip listening to the OGM (useful for long distance +callers who are actually paying for the calls...) without the need for +entering a security code. To turn on the system from remote points, you need +to let it ring ten times, and after it answers with 2 "beeps", hit the 0 key. +It will subsequently be on. Similarly to turn it off, just enter 88. If the +machine answers the phone with no greeting, and just 2 beeps, it means the +tape is full. You can now enter the security code (without risk of them +recording the BEEPS!!!) and listen away for a long time!!! Basically, this +sums up the properties of the two most common systems I've encountered of the +2-digit passcode variety. SINGLE DIGIT PASSCODE MACHINES: + + On some old model Panasonic and Phone Mate systems, the secret entry +passcode is only a one digit number(!!!). On these primitive systems, one +merely enters the correct number, during the message, and playback begins. +The other codes are simple to derive, and just for the sake of making this +hobby a sport, I will not give details for these systems. It is easy enough +to figure them out, and on these systems, it is hard to screw things up, as +there is little you can do anyway. + +APPLICATIONS: + + This can be a rewarding adventure if you decide to follow those +instructions (though far be it from me to suggest you to do this...). I will +point out some of the potentially entertaining, useful, and/or informative +applications of this technology. + + As the true weirdos that we are, we shall begin with what we consider +the truly entertaining applications... If you have ever read the Village +Voice, Screw or other such newspaper, you will notice a large number of +advertisements for "unlicensed massage parlors", "Oriental relaxation spas", +"Escort services", etc. Call some of those numbers, preferrably at off-duty +hours (6-9 AM??) and try to hack their answering machine codes, listen to +their messages, and let the fun begin. You can hear lots of perverts, and +lowlifes making appointments for "services" about which they are sometimes +graphic. Also, they often leave telephone and credit card numbers (What +fun!!!). In case they are married, think of the blackmail potential... + + Further, these "adult entertainment companies" also often run help +wanted ads in the Village Voice, and other such publications. Call these, and +you will get a plethora of phone numbers for nubile young women who might +believe you are the proprietor of the establishment in question. You might be +able to con some "free samples" as a sort of "job interview"... (hehehe) +Especially given the illegal activity they desire to become involved in, they +will be in no position to complain when they find out you are not for real... +Also, this way, the girls are often not so jaded as the old pros... They will +be trying to impress you if you get my drift, so you'll "hire" them. + + Other similar companies can be hacked to get similar entertaining and +enjoyable results. In many cases, the outcomes can be QUITE LUCRATIVE in one +way or another... I do not advocate that you do these things, but I just want +to point out what COULD be done... + + Let us move on to the informative espionnage type of application of this +technology. One could very easily use this technology to listen to the +messages of friends, and see what they are up to. If you are trying to call +your buddy Evan, and he isn't home, perhaps you can find out where he is by +going through some of his old answering messages. Say, Eric called him a +couple of hours ago and suggested that Evan come over to his place for some +beers. Well, you could then call Eric and voila, you may connect with Evan. + + Now, let us assume you have a girlfriend, and you suspect she might be +cheating on you, yet you do not wish to confront her about it without any +evidence, or certainty of her cheating. Well, her new beau probably thinks +her answering machine is secure, and calls leaving messages about their +upcoming dates, or various discussions of their relationship. If you can hack +her machine {actually, you might even look at the bottom (where the passcode +is usually printed...) to save time and energy.} you will be afforded with a +plethora of potentially incriminating evidence. Hehehe. + + A similar application can be when you have a new love interest. Suppose +there is some woman you are interested in, but you aren't sure if she is +available. A little phone answering machine surveillance can provide all of +the answers, and then some... In case she asks her friends about you, you'll +know everything she does. Also, you will learn details about her life, and +schedule, the better to run into her "accidentally", or strike up a +conversation about "common" interests... + + Now, if you know someone in the same profession, say musicians, and you +call his answering machine, and hear someone offering him a gig. You could +call that person back, and accept the gig in your name, saying the originally +called musician was unavailable, but suggested that you call. Then be sure to +erase the original message on your buddy's machine. He'll never be the wiser, +and you'll get more work. Though he may wonder why he isn't getting much work +anymore... + + Millions of applications exist, and if you have any additional +suggestions, please leave them with us. We can be reached on several BBS'es, +in 212, 718, and 914 area codes. Thanks. Also, if you have information on +other answering machine systems, please pass it along... + + Again, in closing, we reiterate that the authors take no responsibility +for the misuse of this information. The ideas for applications were presented +for informational and entertainment purposes only, and we do not encourage you +to try any of the above suggestions. Remember, listening to the pass-code +protected messages of others constitutes an invasion of privacy, and may be in +violation of state and federal laws. + +****************************************************************************** + +ANOTHER FINE PIZZ-SPERM T-FILE... + +Please upload this file to other fine BBS'es, and give credit to the original +authors, Doctor Pizz and Cybersperm, of the TUBA crew. + +****************************************************************************** + + + *************************************************************** + * * + * Another Fine File From the libraries of the TUBA crew. * + * * + *************************************************************** + + ____ _______ * + / \ ___ ___ ____ ___ ___ / / ___ ___ + / // // / / // / /______/ / / / + / // // / / //-< / / / / + /_____//__//__ / /__// / / / /__ /__ + + -N- + + CCCC Y Y BBB EEEE RRR SSSS PPP EEEE RRR M M + C Y Y B B E R R S P P E R R MM MM + C Y BBB EEE RRR SSSS PPP EEE RRR M M M + C Y B B E R R S P E R R M M M + CCCC Y BBB EEEE R R SSSS P EEEE R R M M M + + + \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/phreak8 b/textfiles.com/phreak/VOICEMAIL/phreak8 new file mode 100644 index 00000000..b0965aa9 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/phreak8 @@ -0,0 +1,103 @@ + 3RD PARTY FRAUD & VOICE MAIL SYSTEMS + ============================================================================ + + 3rd Party Dialing was first brought to my attention when it was listed +on my telephone bill. I was billed by some person(s) without my authorization. +This happened about 3 times on the same bill, and all of the times I got the +charges dropped. + + A few weeks later, after paging through the telephone book for downtown +prefixes, I noticed information on 3rd Party Calling, which included: + +HOW TO PLACE 0+ CALLS + +Third-Number Calls + +1. Dial "0" + Area Code (if needed) + telephone number. + +2. If you hear a tone, ignore it, and a billing operator will come + on the line. + +3. Tell the operator you are placing a third number billed called. + +4. Give the Area Code and telephone number you with the charges billed to. + +5. The operator will call that number to verify acceptance of the charges + on calls from coin pay phones. No verification on calls from + non-coin pay phones. + + The line that caught my eye was like #5. This line pointed out that calls +from pay phones had to be verified, while non pay phones needed no +verification. + + With experience, I found out that sometimes there is nothing a person can do +about unauthorized 3rd Party Calls billed to a another person's number. A lot +of the times, the operator you call to complain to will simply tell you there's +nothing they can do. + + With this in mind, I realized that you could bill a call to anybody's number +and get away with it, and no charges directed to you. Although, as many of you +know by now...this not safe. For one, you are directing attention to yourself +as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd +Party Call to...that person has your number and where you called. Bell can +also use that information to take action if they feel it necessary. + + One alternative would be to complete a 3rd Party Billed Call from a pay +phone. This however brings up a question. Who is going to accept the charges +if you don't want to pay for it in any way? + +Here is what I came up with for 3rd Party Calling Fraud: + + First, you need a (VMS) Voice Mail System/Box. You need a Centragram or +PhoneMail type VMS to handle the call. The reason you need these types of +VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't +have to enter a process extension number such as 8509. These types of VMS's +bring you directly to the box. + + You don't know what Voice Mail Systems are? Look for a file. But, here's a +layman's description of VMS's. You can say that VMS's are distance answering +services. They are usually set up in other prefixes you can dial in/directly +on to. They include instructions on how to use them, and have system +passwords. In respect, they are electronic mail devices...only they use voice +communications instead. You can find these by scanning, if you have one local. + + Anyways, having a VMS handy...reset your System Greeting to say: "HELLO" +Pause for approximately 5-6 seconds...then say casually, "YEAH SURE." +In between the HELLO and YEAH SURE, the billing operator will say something +like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?" + + Now go to a pay phone and dial any number anywhere you want, in this +format: 0+612+555+1212. Ignore the tone you hear for calling card holders, +and wait for an operator to come on. The operator will announce her/his-self +as a billing operator and ask you how he/she can help you on billing the call. +Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last +name if you wish, but it's not necessary. No real names of course also. The +operator will call the VMS and he/she will hear the previous recording of you +saying "HELLO" etc. + + After the operator hears an affirmative from the VMS...the operator will say +thank you, then put the call through. The only person that gets billed for +the call is the business/person that owns the VMS that you used by hacking the +default password. + + I've found out that you can dial overseas, and anywhere in the United States +this way, with no problems or bad connections. If you have a portable computer +with an acoustic couple...you can go online. It would be suggested to do this +in a car, so as not to draw attention during the day. I've tried to set up a +conference by the 800 Conference Operator and requesting to set up a +conference. You have to give her the person's numbers and names you want to +conference with...and the number you want to conference billed to. The +operator will verify this if you are at a pay phone. I have figured out what +the Conference Operator asked the 3rd Party as of yet...to time the responses +preset on the VMS, but if anyone can, it would prove to be very useful. + + Another technique might be to bill 976's to your VMS if you into that. +Again, you need to attempt to time the perfect responses to the operator's +questions to the 3rd Party. + + *A Word of Warning*: In most cases, the Operator you handle the 3rd party +call with will stay on the line. So it's good to have a conversation with +yourself on the VMS for about 30 seconds after connection if you are making a +collect call to the VMS. + +  \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/tollfree.txt b/textfiles.com/phreak/VOICEMAIL/tollfree.txt new file mode 100644 index 00000000..b49a5a69 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/tollfree.txt @@ -0,0 +1,23 @@ + +Toll-Free Answering Services + + +Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888 +American Discount Dialing System 800-227-1617 (CA 800-852 7777)(CA800-772-3545) +Dialog Marketing 800-447-4700 (IL 800-322-4400) +Direct Marketing Services Inc. 800-223-1944 +Executive Locator 800-323-6556 +H Q Co 800-227-3004 (800-652-1848) +National Communications Center Inc. 800-824-5120 (CA 800-525-7711) +National Data Corperation 800-257-9611 +National Switchboard 800-528-6052 +Nice-National Instant Consumer Exchange 800-453-9000 +Operator 800 800-448-4511 (NY 800-962-1480) +Ring America 800-621-5199 +Share-a-Wats Inc. 800-854-2003 +Skycall 800-631-5488 (NJ 800-352-4951) +Team Telephone 800-228-5000 +Tel-Com Message Service 800-451-4453 (VT 800-622-4429) +Teletrak Response Center 800-328-5257 +USA 800 800-821-2280 (MO 800-892-7655) + diff --git a/textfiles.com/phreak/VOICEMAIL/unt-att1.txt b/textfiles.com/phreak/VOICEMAIL/unt-att1.txt new file mode 100644 index 00000000..7ec48471 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/unt-att1.txt @@ -0,0 +1,62 @@ +ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ +³UNTOUCHABLES! ßßßßßßÛÛßßßÛÛÛÛÛÛÛßß ³[File Name]: UNT-ATT1.ZIP ³ Difficulty ³ +³ ÜÜÜ ÜÜÜÜÜÜ ßßÛÛÛÝßß ³[Writer] : Aoflex ³ ³ +³ ßßßÛ ßßßßßÛÛÛ ÞÛÛÛ ³[Packager] : Karma Sutra ³ [ ] 0 ³ +³ ÛÛÛÝ Û ÞÛÛÛ ÞÜÜ ÜÜÛÝ ³ ³ [X] 1 ³ +³ ÞÛÜÜ ÛÛÜ ÜÜÜÝ ÛÛÛ ßÛÛÛ ³[Description]: Hacking ³ [ ] 2 ³ +³ ÛÛÛÝ ÜÛÛ ÞÛÛÛ ÞÛÛÝ ÛÛÛÝ ³At&t Answering Machines. ³ [ ] 3 ³ +³ÞÛÛÛ ÛÛ ÛßÛÝ ÛÛÛ ÞÛÛÛ ³ ³ [ ] 4 ³ +³ÛÛÛÜÜÜÛÛÛ ÞÛÛÛ ÞÛÛÝ ÛÛÛÝ 1996! ³[Date]: 06/18/96 ³ [ ] 5 ³ +ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄ-ÄÄÄÄÄ + + +1. Dial the telephone that is being answered by an AT&T Answering Machine. +2. When the machine answers, quickly enter the following: + + 1234567898765432135792468642973147 + 4193366994488552277539596372582838 + 491817161511026203040506070809001 + +3. The messages should start playing after this. +4. Here is a short list of common AT&T Answering Machine comands: + + +Message Commands: +----------------- + +Review Messages: 7 +Locate New Messages: 6 +Stop: # +Rewind Messages: 2 +Clear Messages: 3, 3 + +Announcement Commands: +--------------------- + +Record New Announcement: 4, * +Play Current Announcement: 4, 1 + +System Commands: +---------------- + +Turn System On: 0 +Turn System Off: 8, 8 + + + +Please Note: The easiest way to play the numbers to the answering + machine would be program them in your phone's memory dialing + setup. + ________ _ _ + /|/| | __ ____ _ _ ____ _ __ ___ _ ____/ ________ _ _ . . + /| | | |/ |/| _| \/| | |/ __\|| |/ \| \| || ___| |__ + || | | | | || | || | | /|| | | /| || __||__ | + || \| | | | || | | \| | \_|_|| | || | \| ||_ \____| | + |/\____|_|___||_|\__/\____|\____\|_|_||_|___/|____|_______| + \/___/_//__//_/\/_/\/___/\/____/_/_//_//__//____//__/___/ +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + ARRESTED DEVELOPMENT II - UNT WORLD HEADQUARTERS - 410-720-5305 + BLACK OPIUM - UNT CENTERAL HQ - 701-523-5909 +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + + diff --git a/textfiles.com/phreak/VOICEMAIL/vmb.rl b/textfiles.com/phreak/VOICEMAIL/vmb.rl new file mode 100644 index 00000000..24dfbd30 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmb.rl @@ -0,0 +1,124 @@ + R e n e g a d e L e g i o n + T e c h n i c a l R e p o r t s + + + Technical Report #3 + + .... + ........ + ......... + ... .... + ... .... + ..... + .... + .... + ... ... + ... ... + .. ... + ... + + February 1991 + + +RL HQ - 617.623.7151 + +VMB Hacking +----------- + +Written By: The Knight + + + +Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't +a great deal of 'hidden info' that isn't common sense. But, If you are out +there trying to hack a box and can't, follow through the VERY logical and +simple steps and make sure they are matching up. + + +Step 1: + +Finding a VMB System + +There are many ways you can find a VMB system, for instance, on a BBS when +someone says 'Here are some systems' usually thats what they're referring +to. Also, Try setting up your scanner and listening for 'Welcome to XX +company, Enter extension #' or something similar to that. Then you have +found a VMB system. + + +Step 2: + +Finding a Box + +This is the part where most IDIOTS fuck up. You can NOT just take ANY box. +You must make sure that no one is using it. There are several ways to do +this. One EASY way is when you hack it, check the date on the latest +messages, if they are OVER a month old, then I'd say your safe to use them. +Also, watch in case there is just like _2_ messages in there from the last +4 months that those messages could be messages sent to ALL the boxes, see if +they sound personal. If they DON'T, then grab the box. + +Let's say there's a box you REALLY want bad and someone's using it regularly, +try doing this: Go in twice a day (make SURE you DON'T change the greeting +etc.) and erase all the messages. He will complain and will eventually move +out of the box. Then there is a good chance of you having that box. It's +happned to me. + + +Step 3: + +Hacking the VMB + +This is the most SIMPLE part of all. MY general method is as follows: + +Find a box, let's say box 260. It's empty and I want it (obviously). +First, try passcode '000', if that doesn't work, try passcode '260', +just make very general guesses that's ALL. Some of the MOST Common passcodes +are: + +3 digit boxes: +000 +123 +111 +222 +333 +444 +555 +666 +777 +888 +999 +box # (say it's box 260, passcode: 260) +321 + +4 digit boxes: + +1234 +0000 +1111 +2222 +3333 +4444 +5555 +6666 +7777 +8888 +9999 +box # (Say its box 1200, try passcode: 1200) + + +The Key: REALLY try ALL of those. I knew one system with a passcode of + '5555' and NO ONE could hack it. And I did. So don't give up. + UNLESS you've exhausted all of those possibilities. Then forget + it. + +That's it really. The most simple thing to do. Just remember not to +give up before you should and also try 3 digit passcodes on 4 digit +boxes. Also, once you get in for added security, a lot of these boxes +allow more digits for passcodes, so make a 5 digit passcode. Or if you +thing its worth it, try like '00000' so that's really about all. + +Have fun and don't stop. + + + diff --git a/textfiles.com/phreak/VOICEMAIL/vmb.txt b/textfiles.com/phreak/VOICEMAIL/vmb.txt new file mode 100644 index 00000000..d7b6f183 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmb.txt @@ -0,0 +1,82 @@ + + + + _____ __ __ ____ _ _ ______ ____ __ __ +| __ \ | | | | / _ | | \ | | |__ __| / __ | \ / | +| | \ | ||___|| | / | | | \ | | || | / \ | | \ / | +| | | | | ___ | | | | | | \| | || || || | |\ \/ /| | +| |__/ | || || | \_| | | |\ | || | \__/ | | | \ / | | +| ___/ |__| |__| \____| |_| \__| |__| \____/ |_| \/ |_| +| | +| | N E T W O R K S P R O D U C T I O N +|_| + + + Voice Mail Made Easy + + by HAGAR + CoSysop and PHREAK Sigop, Phantom Networks + + +Voice Mail Boxes, yes, VMB's. They seem so trivial to the advanced phreak yet +most beginners find them very fascinating. They often make a habit of begging +other people for them. A real pain in the ass. + +I am not a studly VMB hacker. VMB's should not encompass your entire phreak +activities, as they really can be a waste of time. This article is just the +basiic guidelines for attaining a VMB. + +[1] Find a system. The easiest way to do this is to just find + a codeline. + +[2] Get in good with the codeline operator. If you continuously + post shit he will get to like you.. + +[3] Ask him where you can find empty boxes on the system. If he + readily complies ask if he might know the system default (more + on this later) + +[4] Scan for an empty box. You will know that you have hit + an empty when it says "Box XXXX, Please leave your message + after the tone.." You now have your empty box. + +[5] Hack the box. In order to do this you will need to find the + point where it says "Enter your password". On some systems you + will have to enter pound (#) as soon as you log in. It will + then ask for your box number (the empty one you just scanned) + and then your password. Try defaults (again, see below). Some + systems will require you to enter the box by calling up the + box in a regular manner, and during the greeting hit star (*). + You will then be asked for your password. + + +[Defaults] + +Some systems have a certain password that is used for all empty boxes. Many +times this password will be "1234" or the box number. Here is where you get +creative. The password COULD be up to 14 digits, but will usually only be +four. Once you find a password that works it will probably be applicable to +every empty box on the system.. + +Here is also some good news.. on some systems empty boxes will have NO +password. + + +This is just a basic overrview... a crash course. For more information check +out the Phrack World News article on this subject, you will get a bit of a +background on how these damn things work. + + +Produced February 8, 1990. Leave me comments on my Direct Dial VMB at + 714/665-5190 + +Special thanks to: + + Huntington Hangout BBS (Hobbes) + Blackened + Misfit + + +Go ahead and upload this file, just make sure that all of the original credits +are intact. + \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/vmb_smc.txt b/textfiles.com/phreak/VOICEMAIL/vmb_smc.txt new file mode 100644 index 00000000..74deae15 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmb_smc.txt @@ -0,0 +1,309 @@ + On the Essentials of Voice Mail Hacking + by the Kryptic Night + -S M C- + + This file will describe several simple ways for hacking out +your own voice mail box. It is by no means a comprehensive +document on the subject, but rather, is meant to help those +beginning in the field. I myself have several voice mail boxes, +and have hacked on various systems. I will describe several of +the methods I have used, and try to explain the format for them. + +An overview of several common commands: + # (Pound) - Used either to access the password prompt or a + dialing list. + * (Star) - This is either used to abort the current menu, or + to amplify the volume. + 0 (Duh) - Used either to access the password prompt, or to chat + with our friend, the operator. + 9 - This is occasionally used to hang up. + + + The First Step + Type of systems to look for + + First of all you need a system to hack at. Unless you are a +pre-teenage new kid fan, answering machines usually aren't that +exciting. + Try to look for an 800 voice mail system. I know I don't like +having to pull out codes every time I want to call a VMB, only to +find that their is nothing there worth my while, and I'm sure +other people feel the same. This will not only provide yourself +with a free method for calling your box, but will also allow you +to call it from a payphone, and you can call it anytime, rather +than when you just have a code handy. + Another great advantage is using a system that is up for all +24 hours. This isn't a necessity, but is a great convenience. For +instance, imagine that you just gave out your number to someone +who be beneficial to your VMB as a good source of codes or +general info, but he has better things to do at night than call +VMB systems, with an afterhours VMB, you cut him off, is that what +you want? I'd hope not. + + + + The Second Step + Finding out how many digits the boxes are + + Ok, so you now have a system to play with. Let's see if the +system is worth your time, and find out the basics of it. +Now you have to try to ascertain how many digits the box numbers +are, this may take a while if it requires you to press a '#' +(pound) sign after the box number, as these systems usually do not +tell you whether you entered the correct amount of digits or not. +For now, I'd recommend you just ignore these, as they would +require extra work. Try entering any 3 digits, you will in most +cases get an 'incorrect box number' message if the system is only +a 3 digit system. However, if it just hangs, does nothing, then +the odds are it's a four digit system. Try typing 4 digits now, +and if you still get no message, then it's either one of two +things. One, you may need to press a '#' (pound) sign after the +number, or in some cases, before it. Or two, the system is longer +than 4 digits, in which case you should ignore it for now. Some +systems contain a built-in time delay that will tell you a message +if you haven't entered the correct box in a given time, these +should also be avoided for now, as they will say something even if +you only type one digit, or if you type 100 digits. + + + The Third Step + Finding where the boxes are located + + Now comes a rather tedious chore, finding out where on the +system the boxes are located. Unless it is a professional voice +mail company, they will probably have under 100-200 mail boxes in +use at any one time. These boxes may be found on the system in any +of two forms, clumped or scattered. Clumped boxes are when their +are several boxes all in one area of the system. Usually this is +the only area on the system that boxes are located, but +occasionally some systems have scattered clumps all around the +system. Scattered boxes occur when the boxes seem to have no +apparent order for their location, these are more difficult to +find empty boxes on, but not impossible. + Now you need to start looking for the clumps (We will start +with these, as they are generally easier to locate). Start +searching from 100, for a three digit system, or 1000, for a 4 +digit system. Increment your searching by 25-50 for a three digit +system, and 100-500 on a four digit system. This will undoubtedly +be inaccurate, but it will allow you a better chance of finding +the clumps than random guessing. You may get several messages +while looking for these, anything from 'Boxes cannot start with +an x' to 'Incorrect box number' Generally these should be self- +explanatory, and you should be able to figure out how to respond +on your own. You are looking for any box with a message in it, any +message. When you find a used box, mark down the number, and scan +around that box in increments of 5 or so. If you find any more, +mark down that location as a clump. Remember however, that if you +get an incorrect box number message, that doesn't mean that that +area isn't a clump, just that that box is empty. This will provide +added inaccuracy to the job, but it's a fact that can't be +overcome by anything other than monotonous scanning by 1. +Try to make this fun, invite your friends over, have a phone +party....they can be fun and profitable if you know what you are +looking for. + As for scattered boxes, I don't have much to say, they aren't +the easiest systems to play with, as you can't tell with any +certainty where on the system a box will be, and if it's a four +digit system, that's 10,000 possible boxes...Not an encouraging +number. If you are on a system with scattered boxes, just ignore +this section and read how to find empty boxes next. + + + + The Fourth Step + The Miraculous Void + + Once you've found the system, your real job has just begun. +You now need to find an empty box. Although it is possible to hack +out used boxes, this is usually undesirable, since used boxes tend +to have people who use them (makes sense doesn't it...I thought so +too) When some complaining customer calls and gets a message such +as "To call cosmos and fuck up the entire region, dial...blah blah +blah...remember to slaughter a cat for Halloween...", they will +most likely be a bit suspicious and will call the business +bitching about how they are so unprofessional, and that their +employees really should clean up their mouths...blah blah, you +know, the usual line of bullshit. If that doesn't happen, then the +person who owns the box will check it out, and if that happens, +you can be assured that the box won't last. + Now is the time to pull out that list of clumps you made. +Start searching around these boxes in increments of 1, yes one, +this may take a while...but if you've come this far...you +obviously have too much free time. + What you are looking for is any box that asks you to leave a +message at the tone, and doesn't play a prerecorded message to you +before that. These are relatively easy to recognize, and you +shouldn't have any problems with it. Just look for the anomaly. + + + + The Fifth Step + On the Art of Hacking + + This is where the excitement begins, or the agony ends. By +now you should have found an empty box or two. If you haven't, +start over again with a different system. There are several ways +to access the password prompt. Usually most systems tell you right +up front at the main menu how to do it, but since some do not, +I'll explain the most common ways that I know of. + The magical pound sign is the most common way of accessing +the password prompt. From the main menu you should press the # +sign, and then the box number. It will then ask for your security +password, or some other such inane jargon. The other common way of +accessing the prompt is to dial the box number, and press 0 while +the message is playing, or sometime after you dial the box number. +You will then be asked to enter your security password, or +whatever they choose to call it. + A security password is usually, but not always, the same +length as the box number. The most common default password for +voice mail systems is a string of zero's, 000 for three digit +systems and 0000 for four digit systems. Other common passwords +are: The box number, IE - box 2045 would have a password of 2045, +box of 0981 (four digit system) would have a password of 0981, and +a three digit system might have something like 521 for a box +number of 521, a string of some common digits, such as 1111, +2222, 3333, ainsi du suite, the year, or 1234. By no means are +these the only default passwords, but these are the ones I've +seen, and have heard about. You should be able to catch a +significant number of empty boxes with these. + + + + The Sixth Step + You're in, now what + + So you think you're cool, right? You've found a box or two +that you can get into. Well, congrats, from here on out everything +is cake. This section and following sections won't tell you too +much that you shouldn't be able to figure out with +experimentation, but I'm trying to be thorough... + You've gotten past the password, and are at a prompt that +asks you to 'send a message to another box' 'read new mail', or +what not. If their are messages in the box, you should read them +and pay attention to the date stamp if it's there. If the message +is only a day or so old, then you might want to make sure you have +other boxes to fall back on. Besides that, just enjoy the thrill +of listening to other people's private mail...I once got a message +from some guy's mistress...Funnier than hell. All the commands for +these options should be readily apparent, and told to you when you +get in. + To configure your system with your message, name, and +password you will need to enter the 'Setup menu' or whatever it is +called. Sometimes this function won't be told to you, but that's +not really a problem, their are only 12 digits to try. Most +systems default to an 8 or a 3. I'll assume you can find it on +your own... + You've gotten into the config menu by now, and you are +confronted with a multitude of options. First you should ALWAYS +change your password to something that you feel is unhackable, +your phone number is not a good choice. Next you should enter your +own personal message. Try to figure out if the message is time +limited to 30 seconds or a minute, a lot of systems do that. These +systems are usually only good for personal message boxes, and not +code lines. Next, change your name if the system allows you to do +that...I don't think you want to be called Edwina Lipshitz when +someone tries to leave you a message. + Their may be other functions, such as message forwarding, +call placements, group messages, message waiting status, etc. +Generally these should be ignored, unless you're adventurous and +willing to risk your box with something like having the system +call you when you get a message. + So, you've done everything, and set up a cool box, eh? Great, +now just for fun, go back to the main system menu, and try to +enter your box as a user would. Type to box number and listen to +your message, if it's satasfactory...You've done it, you now have +a brand new box you can tell your friends. + + + + The Seventh Step + What to do with a VMB + + + Just for kicks, you might want to figure out what to do with +a VMB once you have it. I'll describe two of these options, their +are infinity more to the imaginative. + + Code lines: These are quite possibly the best thing you can +ever have if you are interested in the underground scene. If it is +well advertised, and you post all the info you get, you will have +a popular box. With a popular box, you'll get a vast amount of +information that you wouldn't find on most boards, such as cosmos +dialups, telenet accounts, codes, and other such info. These type +of boxes can get you into trouble quite quickly if the gestapo +finds out about it, as they are a bit more annoyed with someone +who posts all their private information, over someone who just +asks to leave a message at the prompt. But when you live the life +you need to, the risks are not a factor. + Personal boxes are also great for several reasons. You can +post your VMB to people who need to get in touch with you, even +when they don't have a code. You can also use them in the fine +art of carding. When the salesperson asks for your phone number, +tell 'em something like "It's being fixed, but you can call my +voice mail system at XXX-XXX-XXXX." This will make them a lot less +suspicious then if you give them a bad phone number. Of course you +would want to change the box message to that of the person whose +card you used, but that's obvious. + + + + The Eighth Step + How to keep your VMB safe and sound + + Once you've gone through all the trouble of hacking out a +VMB, the last thing you want is for it to go bad the next week, +their is little in this more infuriating then spending a lot of +time getting a box, to find it go dead the next day. + +Several ways to keep your box safe include... + NEVER hack out more than 1 or 2 boxes at ANY time. If you +need another VMB be kind to yourself, do it on another system. +Their have been too many busts of people who get greedy. + DON'T allow other people to hack on your system. Threats or +warnings will sometimes be effective, threaten them with things +such as ruining their credit ratings with TRW, sending a few +thousand dildo's to their mother, care of them, or whatever...be +imaginative. Or you can offer to hack out a box for them somewhere +else. This may seem like a bitch to do, but it's worth your time +if the person is an asshole. + DON'T post your VMB on lame systems, or on systems where +their are a large amount of people who dislike you. These idiots +usually have less of a life than you, and are not against spending +days trying to hack out your password. Since you probably can't +kill them upfront, just make sure they don't get your number. + + + + The Conclusion + The Usual Bullshit + + This file was researched are written by the Kryptic Night. It +was produced as the first in a series of quality SMC text files +released for the private public. In no way do I care whether you +get busted or not, and accept no responsibility for corrupting +your young minds. Thanx go out to the members of SMC, Scooter, and +everyone else who is interested in freedom of speech. + + Information is the most powerful weapon one can possess + against the masses. + + + + + | + | \ + | /\/\ / ³\ ÄÂÄ + | / \ / ³ \ A ³ A + | / |/| / / \ ³ / ³ / + |/ | < \ ³/ ³/ U L T + |\ RYPTIC / | \ \ / ³\ + | \ / | \ ³ \ + |\ | | \ + | \ | + | \|IGHT + / ` + + - Servants of the Mushroom Cloud - + + Data Kult, Kryptic Night, Lord Logics, Nacht Habicht, + Shadow Walker, the Scorpion diff --git a/textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt b/textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt new file mode 100644 index 00000000..65f63d3a --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt @@ -0,0 +1,126 @@ + + R e n e g a d e L e g i o n + T e c h n i c a l R e p o r t s + + + Technical Report #3 + + .... + ........ + ......... + ... .... + ... .... + ..... + .... + .... + ... ... + ... ... + .. ... + ... + + February 1991 + + +RL HQ - 617.oOo.oOOo + +VMB Hacking +----------- + +Written By: The Knight + + + +Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't +a great deal of 'hidden info' that isn't common sense. But, If you are out +there trying to hack a box and can't, follow through the VERY logical and +simple steps and make sure they are matching up. + + +Step 1: + +Finding a VMB System + +There are many ways you can find a VMB system, for instance, on a BBS when +someone says 'Here are some systems' usually thats what they're referring +to. Also, Try setting up your scanner and listening for 'Welcome to XX +company, Enter extension #' or something similar to that. Then you have +found a VMB system. + + +Step 2: + +Finding a Box + +This is the part where most IDIOTS fuck up. You can NOT just take ANY box. +You must make sure that no one is using it. There are several ways to do +this. One EASY way is when you hack it, check the date on the latest +messages, if they are OVER a month old, then I'd say your safe to use them. +Also, watch in case there is just like _2_ messages in there from the last +4 months that those messages could be messages sent to ALL the boxes, see if +they sound personal. If they DON'T, then grab the box. + +Let's say there's a box you REALLY want bad and someone's using it regularly, +try doing this: Go in twice a day (make SURE you DON'T change the greeting +etc.) and erase all the messages. He will complain and will eventually move +out of the box. Then there is a good chance of you having that box. It's +happned to me. + + +Step 3: + +Hacking the VMB + +This is the most SIMPLE part of all. MY general method is as follows: + +Find a box, let's say box 260. It's empty and I want it (obviously). +First, try passcode '000', if that doesn't work, try passcode '260', +just make very general guesses that's ALL. Some of the MOST Common passcodes +are: + +3 digit boxes: +000 +123 +111 +222 +333 +444 +555 +666 +777 +888 +999 +box # (say it's box 260, passcode: 260) +321 + +4 digit boxes: + +1234 +0000 +1111 +2222 +3333 +4444 +5555 +6666 +7777 +8888 +9999 +box # (Say its box 1200, try passcode: 1200) + + +The Key: REALLY try ALL of those. I knew one system with a passcode of + '5555' and NO ONE could hack it. And I did. So don't give up. + UNLESS you've exhausted all of those possibilities. Then forget + it. + +That's it really. The most simple thing to do. Just remember not to +give up before you should and also try 3 digit passcodes on 4 digit +boxes. Also, once you get in for added security, a lot of these boxes +allow more digits for passcodes, so make a 5 digit passcode. Or if you +thing its worth it, try like '00000' so that's really about all. + +Have fun and don't stop. + + + + \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/vmbhack.hac b/textfiles.com/phreak/VOICEMAIL/vmbhack.hac new file mode 100644 index 00000000..680398bc --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmbhack.hac @@ -0,0 +1,127 @@ + R e n e g a d e L e g i o n + * * T e c h n i c a l R e p o r t s * * + * R * * L * + * * + + Eastern Western + .... +Net Runner ........ Overdose +The Knight ......... Sirus +Kingpin ... .... Snuggle +Highlander ... .... +Nemesis ..... +Rogue .... Canadien +Zardoz .... +Cursor ... ... +The Gypsy ... ... Blackheart +Iceburg .. ... +White Knight ... + + Presents + + +Eastern RL HQ - 617-XXX-XXXX +Canadien HQ - 902-XXX-XXXX + + +VMB Hacking +----------- + +Written By: The Knight + + + +Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't +a great deal of 'hidden info' that isn't common sense. But, If you are out +there trying to hack a box and can't, follow through the VERY logical and +simple steps and make sure they are matching up. + + +Step 1: + +Finding a VMB System + +There are many ways you can find a VMB system, for instance, on a BBS when +someone says 'Here are some systems' usually thats what they're referring +to. Also, Try setting up your scanner and listening for 'Welcome to XX +company, Enter extension #' or something similar to that. Then you have +found a VMB system. + + +Step 2: + +Finding a Box + +This is the part where most IDIOTS fuck up. You can NOT just take ANY box. +You must make sure that no one is using it. There are several ways to do +this. One EASY way is when you hack it, check the date on the latest +messages, if they are OVER a month old, then I'd say your safe to use them. +Also, watch in case there is just like _2_ messages in there from the last +4 months that those messages could be messages sent to ALL the boxes, see if +they sound personal. If they DON'T, then grab the box. + +Let's say there's a box you REALLY want bad and someone's using it regularly, +try doing this: Go in twice a day (make SURE you DON'T change the greeting +etc.) and erase all the messages. He will complain and will eventually move +out of the box. Then there is a good chance of you having that box. It's +happned to me. + + +Step 3: + +Hacking the VMB + +This is the most SIMPLE part of all. MY general method is as follows: + +Find a box, let's say box 260. It's empty and I want it (obviously). +First, try passcode '000', if that doesn't work, try passcode '260', +just make very general guesses that's ALL. Some of the MOST Common passcodes +are: + +3 digit boxes: +000 +123 +111 +222 +333 +444 +555 +666 +777 +888 +999 +box # (say it's box 260, passcode: 260) +321 + +4 digit boxes: + +1234 +0000 +1111 +2222 +3333 +4444 +5555 +6666 +7777 +8888 +9999 +box # (Say its box 1200, try passcode: 1200) + + +The Key: REALLY try ALL of those. I knew one system with a passcode of + '5555' and NO ONE could hack it. And I did. So don't give up. + UNLESS you've exhausted all of those possibilities. Then forget + it. + +That's it really. The most simple thing to do. Just remember not to +give up before you should and also try 3 digit passcodes on 4 digit +boxes. Also, once you get in for added security, a lot of these boxes +allow more digits for passcodes, so make a 5 digit passcode. Or if you +thing its worth it, try like '00000' so that's really about all. + +Have fun and don't stop. + + -- The Knight, Sysop Eastern RL HQ BBS + + \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/vmbhack.txt b/textfiles.com/phreak/VOICEMAIL/vmbhack.txt new file mode 100644 index 00000000..a6a5ab91 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmbhack.txt @@ -0,0 +1,59 @@ + + + +------------------------+ + | A.C.E. Presents | + | | + | Zod's VMB Hacker Dox | + +------------------------+ + +Dox by Zod + + I wrote this program because of the amount of time and effort that is +needed to hack out a VMB by hand manually. This program is not totally auto- +mated because the computer has no way of knowing if it got the correct PW or +not, but it will certainly speed up the process of hacking out a VMB and make +it much easier. + +How To Use It +------------- + +Using VMB Hacker is very easy. Just load it up and answer all the questions. +First, (obviosly) enter the VMB's number. Then, enter the numbers and signs +that VMB Hacker should dial before it dials the security code (such as *, # +or box number, etc.) Next, enter the code that VMB Hacker should start hacking +at. VMB Hacker can either go down or up. Next, enter the PW length so it knows +how many 0's to add before the number (PW length can be 3, 4, 5, or 6... Maybe +next version will be able to do longer ones). Next, enter either 1 to hack up +or -1 to go down. In the next version, I may add random hacking, if and when +VMBs start tracing (who knows). Next, enter the comport that your modem is in. +Next, enter the amount of attempts that VMB Hacker should make before hanging +up, calling the VMB back and trying some more, or just 0 if the VMB lets u +keep trying. Next, is auto-hack. If you select Auto-Hack, VMB Hacker will keep +trying PWs until you press C for Correct PW. This is very useful cuz it lets +u just sit back and relax and listen, but it will only work well if your modem +has a nice loud speaker. If you select Auto-Hack, u must now tell it the amount +of seconds to wait for u tel press C before it tries the next code. Next, you +must tell VMB Hacker how many seconds to wait after dialing the VMB before it +starts hacking. + +Hope this program helps you out in hackout out your VMB's. If u have any +questions, u can call my board and ask me or contact me on any of the other +A.C.E. boards in New York. Also, I'd like to thank PO\/\/ER 1 and Outlaw for +for giving me the idea to write this program. + +L8r, d00dz... + + ---===< Zod >===--- + + + Call These Fine A.C.E. Boards: + + The Dead Of Night BBS + (212)979-0719 + Sysop - Zod + + HPCLand + (718)531-7846 + Sysop - PO\/\/ER 1 + + diff --git a/textfiles.com/phreak/VOICEMAIL/vmbhaq.txt b/textfiles.com/phreak/VOICEMAIL/vmbhaq.txt new file mode 100644 index 00000000..fcca3186 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmbhaq.txt @@ -0,0 +1,1654 @@ + + + Stripped Ink + + Issue 4, Volume 1 + + Presents + + + + + + ********************************* + + * * + + * Voice Mail Hacking * + + * * + + * By: ROADKILL * + + * * + + * March/April 1994 * + + * * + + ********************************* + + + + + + Contents: + + + + I. Introduction + + II. Voice Mail Hacking Basics + + III. AUDIX + + IV. Message Center + + V. Infostar VX Voice Processing System + + VI. Meridian Mail + + VII. ASPEN + + VIII. Phone Mail + + IX. Ready + + X. Sydney + + XI. Pac-Tel Meridian + + XII. System Manager Functions (TaKiNG C0NTR0L!) + + A. System Management Overview + + B. Message Center Administration + + C. Infostar VX Administration + + XIII. Hacking Unknown Systems + + XIV. Advanced VMB Hacking + + XV. Conclusion + + _________________________________________________________________ + + + + Introduction: + + + + OK, so you want to know how to hack VMB's. In case you + + don't know already, VMB is an acronym for Voice Mail Box. A VMB + + is basically a sophisticated answering machine run by computer. + + The computer is usually an IBM compatible with a large hard + + drive, and the necessary voice mail equipment. Some systems such + + as ROLM's Phone Mail store their data on magnetic tape, and the + + ASPEN, made by Octel, uses a modified Quantum hard drive. A + + typical voice mail system can have hundreds, sometimes thousands + + of voice mail boxes available. Most companies now use voice mail. + + A voice mail system can be of great convenience to a company. It + + can reduce the number of calls to a receptionist, therefore + + providing her/him with more time for other tasks. It also aids an + + employee by being able to record messages while he/she is out of + + the office or on another line. Some voice mail systems can even + + page a person when they receive a message, and most voice mail + + systems allow you to transfer messages to another user and other + + cool functions. + + "What the hell can I use a VMB for?" you ask? Well they + + are handy to have to trade with, or if your K-RaD enough, you + + could run an 3l33t code line (k0DeZ!). However, most people use + + them as an easy way to keep in touch with people. What I'm going + + to describe in this file is how to get a box on a system, and + + some other stuff I hope you find interesting. Well, enough of + + this; let's learn how to hack some VMB's! + + _________________________________________________________________ + + + + Voice Mail Hacking Basics: + + + + + + To hack VMB's, it's necessary to be able to know the + + following things: + + + + What kind of system it is, + + Some of the common defaults, + + How to transfer to the box itself, + + How to login to the box, + + The number of digits the boxes are, + + The range of the boxes (ex.2200 to 9999), + + How to access the names directory... + + + + + + If you know what kind of system you're trying to get a + + box on, it will be easier for you because you'll know how to + + exploit the weaknesses of a system. Read the individual system + + descriptions that are in this file. + + + + OK, as usual, people are often lazy and use a passcode + + that is easy to remember. The following is a list of the most + + common passcodes that people use: + + + + Box Number (ie. Box number:2225, Passcode:2225) + + + + 1234 12345 123456 + + 0000 00000 000000 + + 1111 11111 111111 + + 2222 22222 222222 + + 3333 33333 333333 + + 4444 44444 444444 + + 5555 55555 555555 + + 6666 66666 666666 + + 7777 77777 777777 + + 8888 88888 888888 + + 9999 99999 999999 + + + + Some systems have a default that is unique to that + + system. I'll cover these in the system descriptions below. + + + + Finding out how to transfer to the box should be pretty + + easy, the reason for this should be obvious. Finding out how to + + login to the box can sometimes be a little more difficult, but it + + shouldn't be that hard. + + + + Determining the number of digits and the range of the + + boxes is essential; you need to know this in order to find out + + where the boxes are. + + + + It is not necessary to use the names directory. However, it + + sure does make finding empty boxes, the number of digits in the + + box number, and the range a lot easier. + + _________________________________________________________________ + + + + AUDIX + + + + AUDIX (AUDio Information eXchange) is a voice mail system + + made by AT&T. It is easily identified by the command voice: + + "Entry not understood, please try again after the tone. [BEEP!]" + + You'll hear this message after you enter an invalid key or + + option. You can usually snag a box off an AUDIX system without + + much difficulty. First, press "*"+"T" (to transfer). Try this + + when you get the main greeting. It should say enter the X + + (number) digit extension. Remember the number of digits the + + extensions are. Now press "*"+"*"+"N" (for the names directory). + + Now, try a couple of common names to get an idea of the range of + + the boxes. After you got an idea of the range press "*"+"A" (to + + look up by extension). Now, just start scanning for boxes. Do + + this by entering the box number plus "#". You should get + + one of following responses: + + + + 1. The name of the box owner. + + 2. Extension XXXX, Not Valid. + + 3. Extension XXXX (This is what we're looking for). + + + + OK, keep track of all the extensions that give you + + response number three. After you're done scanning, press "*"+"#" + + to exit the directory. Now enter "*"+"R" (to login). Enter the + + number of one of the boxes you found while scanning, then press + + "#". You'll now be prompted for a password. The default password + + for AUDIX is the "#" sign (ie. Bx.1234, Pw.#). If you can't login + + using the "#" sign try the defaults listed above. + + + + Once you get into a box, if no one has used it before, it + + will give you a brief tutorial, and help you set the box up. + + DO NOT record a name for the box. Just leave silence. You don't + + want some one going through the directory and hearing: "For [your + + name] press 2222". So, just record silence. Sometimes you'll find + + an empty box that won't have the tutorial. These are cool to use + + too (as long as they are empty). Remember, anytime you need help + + on an AUDIX, press "*"+"H". + + + + AUDIX Commands: + + + + *R - login + + *H - help + + *T - transfer to extension + + **N - names directory (*A to look up by extension) + + 1 - send message to another user + + 2 - get messages + + 3 - personal greetings + + 4 - check outgoing messages + + 5 - personal options(see below) + + 6 - outcalling information(see below) + + 7 - autoscan incoming messages + + + + Personal Options: + + + + 1 - mailing lists + + 2 - personal directory + + 4 - password + + 5 - record mailbox name + + + + + + Outcalling Information: + + + + AUDIX can be set up to notify you when you receive an + + incoming message. From the outcalling menu, you enter the + + number that it will contact you at. It can also be used to + + call a pager. When you receive a message AUDIX will call you and + + say: "This is AUDIX". "[mailbox name], please enter your + + password." This is a neat feature, but I don't recommend that you + + use it, for obvious reasons. + + _________________________________________________________________ + + + + Message Center + + + + Message Center is another system that is widely used with + + companies today. A good way to tell if you've found a Message + + Center is to press "*" or "* + *" at the system greeting. If it's + + a Message Center it will say "Welcome to the Message Center". OK, + + find the range of the boxes by checking out the directory. If you + + come across an entry that just lists the box number, take note of + + it, it's probably a vacant box. Now, transfer to the box. While + + the greeting is playing press "*". One of two things will happen: + + + + 1. You'll be prompted for the passcode + + 2. You'll be let into the box + + + + There is no real default for the Message Center. If a box + + hasn't been assigned a passcode, pressing "*" during the greeting + + will let you into the mailbox. If it asks for a passcode you can + + try the regular defaults. You can also press "*" at the passcode + + prompt to transfer another extension. + + + + The Message Center uses a couple of tricks to discourage + + hacking. This can also be of use to us. The first trick is: When + + entering the passcode, it will stop you when you enter one digit + + more than the length of the passcode. The corollary is, that the + + passcode length is one digit less than the length of the passcode + + you entered before you were stopped. The second trick is: If your + + first passcode guess is wrong, but the second is correct, it will + + still give you an error. If you enter the correct passcode the + + third time it will let you in the mailbox. However, both the + + second and the third entry must have the correct passcode entry. + + + + Two more things, if your scanning through the directory, + + and happen to come across a box with the name System Manager or + + System Administrator, remember this; this is the System Manager + + mailbox. See the section on System Manager functions below. Also + + the Message Center will tell a mailbox subscriber when a + + suspicious amount of invalid passcodes have been entered. + + + + + + Message Center Commands: + + + + M(6) - Send a message to another user + + P(7) - Play messages + + U(8) - User options + + X(9) - Exit system + + + + + + User Options Menu: + + + + N(6) - Change mailbox name + + P(7) - Change passcode + + L(5) - Distribution list + + T(8) - Tutorial (not always implemented) + + X(9) - Exit user options + + _________________________________________________________________ + + + + Infostar VX Voice Processing System + + + + + + The Infostar VX is another common system. To login to a + + mailbox you press the "#" sign at the main greeting. You are then + + prompted to enter your mailbox number, then your password. To + + transfer to a box press "*" then the box number. The Infostar VX + + has no set default. When a mailbox is created it assigns a random + + passcode for the box. The system manager usually changes this to + + something easy to remember, so when you find an empty box try all + + the common defaults. + + + + A good way to find boxes on an Infostar is to go to the + + directory. It will tell you to enter the first couple of letters + + of a person's name. A cool trick here is that you can usually + + enter just one letter, and it will start spitting all the people + + whose name's begin with that letter. If you happen to transfer to + + a box that says "This is the Infostar VX Voice Processing + + System." "Dial the number of the person you're calling." "If you + + have a mailbox on the system press pound." Remember this is the + + administrator mailbox. See the section on system management + + below. + + + + + + Infostar VX Commands: + + + + Main Menu: + + + + 1 - To listen to messages + + 2 - Record and send a message + + 3 - Personal options + + 4 - Check delivery + + + + User Options: + + + + 1 - Greetings + + 2 - Access code + + 3 - Group list + + 4 - Message notification + + + + ----------------------------------------------------------------- + + + + Meridian Mail + + + + + + Meridian Mail is a very popular system. It's made by + + Northern Telecom. A good way to tell is, when you transfer to a + + box it will usually say "Meridian Mail, mailbox?". Another way to + + tell is pressing "81" during the mailbox greeting. If it says + + something like "mailbox?", you can be pretty sure it's a + + Meridian. "81" is the command to login to a box. You enter the + + box number and "#", followed by the passcode and "#". The default + + is usually the mailbox number. + + + + Meridian Mail Commands: + + + + * - Help + + 0* - OUTCALLING! (see below) + + 2 - Play message + + 4 - Goto previous message + + 6 - Goto next message + + 9 - Call the sender of a message + + 70 - Message options + + 71 - Reply to the message you just listened to. + + 72 - Play envelope + + 73 - Forward message to another mailbox + + 74 - Record one reply for all messages + + 75 - Record a message. Press "#" to stop recording. + + 76 -Delete message + + 79 - Send message + + 80 - Mailbox options + + 1 -Change operator assistance number + + 2 - Remote notification (depends on class of service) + + 81 - Login + + 82 - Change greeting + + 1 - Internal greeting + + 2 - External greeting + + 83 - Logout + + 84 - Change passcode + + 85 - Create distribution list + + + + ( This can be used to scan for other mailboxes. + + Press "5" to compose a new list. Now enter the + + box number plus "#". Take note of boxes that + + respond with "mailbox XXXX". Press "#+#" to + + stop, then 76 to delete the list. ) + + + + 86 - Goto message + + 89 - Personal verification + + 4 - Exit + + 5 - Record mailbox name + + + + Outcalling: + + + + Yes, you can dial out of a Meridian Mail mailbox. Press + + "0+*", it will then say something like: "This is a service that + + will connect you to the number that you specify." On some systems + + you can only connect to another extension. A lot of them usually + + dial local. However, there are a few that can dial LD and + + overseas. There are a few different formats that are used. + + + + Extension+# + + 9+Local number+# + + 9+0+Local number+# + + 9+1+Local number+# + + 8+Local number+# + + 8+0+Local number+# + + 8+1+Local number+# + + 9+Area code/number+# + + 9+1+Area code/number+# + + 8+Area code/number+# + + 8+1+Area code/number+# + + 9+011+Country code/city code/number+# (Very rare) + + + + + + A lot of companies are becoming aware of this little + + trick, so you might have to look for a while until you can find + + one that will outdial to anything other than another extension. + + However there are a lot out there that will still dial locally. + + _________________________________________________________________ + + + + ASPEN + + + + + + The ASPEN (Automated SPeech Exchange Network) is made + + by Octel. The is a good article on the hardware specifics of + + this system in Phrack #45. To hack a box start scanning through + + the boxes until you come across one that says: "You have reached + + mailbox number XXXX please record a message at the tone." Most + + likely that is an empty box. To login to an ASPEN press "#". + + You'll be prompted for your mailbox number and your passcode. If + + it is a new box after you enter the box number it will say: + + "Welcome to your new mailbox, please enter the temporary passcode + + assigned to you by your system manager". There is no set default + + for an ASPEN mailbox. Just try all the common ones until you get + + in. ASPEN's are full of features that make it appealing to + + people. + + + + ASPEN Commands: + + + + Main menu: + + + + 1 - Review messages + + 2 - Send message + + 3 - Check for a receipt (of a message sent) + + 4 - Personal options + + + + + + Review Messages menu: + + + + During message review: + + + + 1 - Rewind + + 2 - Pause or restart + + 3 - Forward + + 4 - Play slower + + 5 - Message envelope + + 6 - Play faster + + 7 - Quieter + + 8 - Normal volume + + + + After message review: + + + + 4 - Replay + + 5 - Message envelope + + 6 - Send copy + + 7 - Delete message + + 8 - Reply + + 9 - Save message + + + + Send Message menu: + + + + 1 - Private message + + 2 - Urgent message + + 3 - Message confirmation + + 1 - Confirm receipt + + 2 - Notify of non-receipt + + 4 - Future delivery + + + + Personal Options menu: + + + + 1 - Message notification on/off + + 2 - Administration + + 1 - Change password + + 2 - Distribution list + + 3 - Prompt levels + + 3 - Greetings + + 1 - Personal greeting + + 2 - Extended absence greeting + + 3 - Mailbox name + + 4 - Notification schedule + + 1 - First schedule + + 2 - Second schedule + + 3 - Temporary schedule + + _________________________________________________________________ + + + + Phone Mail + + + + + + Phone Mail is made by ROLM. It is one of the most + + challenging voice mail systems to hack. It is also one of the + + most rewarding. On some boxes you can have over a ten minute + + greeting (depends on class of service). The Phone Mail system can + + be configured in several different ways, one which is almost + + impossible to hack. Phone Mail can be set up to be a sort of + + information center. When it's set up for this there are usually + + no boxes on the system. You can usually tell if a system has been + + set up this way if it says something like "Press 1 for info. + + on "blah." Press 2 for info. on blah, etc." These are usually set + + up by companies for advertising, and it will not allow you to + + leave a message. + + When you do find a system, just start scanning through + + the directory. All Phone Mail systems have some sort of directory + + you can scan through. + + The hardest thing about Phone Mail is finding the + + access method. Some are set up where you have to dial an access + + number (try scanning around where you found the Phone Mail at). + + On these you dial the number and it says: "This is the Phone Mail + + system, you can either enter your extension or your name." + + Sometimes they set up a specific extension you have to dial + + before you can access your mailbox. Also sometimes they have it + + set up where you just press "#" to login to your mailbox. + + No matter what method they use, there's no reason to worry, + + because there's a simple way around this. + + Here's an example of how to use this: Transfer to an + + extension. Wait until you heard the greeting and the tone. Now + + press "*"+"6"+"#". It will now say something like: "Please enter + + the extension of the person you are calling, or press "#" to use + + the Phone Mail features". Now all you have to do is enter the + + extension + "#", then the passcode + "#". The default for + + Phone Mail seems to be "111" or "1111". I'm not positive about + + this, but it's what I've usually came across. + + + + One more thing: when you're in the directory try entering + + "Test" or "TestMailbox" for the person's name. Most systems + + usually have one of these boxes set up. It's usually empty (This + + also may work on some other voice mail systems also). Try using + + "111" or "1111" to get in the mailbox. + + + + + + Phone Mail Commands: + + + + 1 - Record message + + 3 - Listen to messages + + 8 - Answering options + + 9 - Mailbox options + + 70 - Transfer out of Phone Mail + + 76 - Disconnect from Phone Mail + + + + Answering Options menu: + + + + 1 - Greetings + + 2 - Answering mode + + 3 - Set referral extension + + 4 - Mailbox name + + # - Goto main menu + + + + Mailbox Options menu: + + + + 1 - Distribution lists + + 2 - Prompt level + + 3 - Password + + 4 - Outcalling schedule + + # - Goto main + + _________________________________________________________________ + + + + Ready Systems + + + + + + Ready systems are also known as Bix. Hacking this + + system is easy, but it can take a while. First you can do two + + things: the first is that you can scan through the directory + + until you find an empty box. Now go back to the main menu and + + login to the box by pressing "#". You'll then be prompted for you + + mailbox number then your passcode. If the box is new, you will + + not need a passcode. It will let you right in. Sometimes people + + assign a simple passcode for new boxes. If that is the case, try + + the defaults. The second way to hack a Ready system is after you + + find the range of the boxes, go back to the main menu and login + + (by pressing "#"). Now enter the number of the mailbox you want + + to start scanning from. If it prompts you for a passcode, press + + "*"+"0"+"#". Then try the next box. You can scan through the + + entire range to see if you can get into any boxes. + + + + What the "*"+"0"+"#" combination does is this: + + + + * - Aborts the passcode entering feature. + + 0 - Pages the operator (You should get a message, but + + if a human answers, hang up and try hacking the + + system after hours. When you page the operator + + this sets the error count to zero.) + + # - Command to login to a box. + + + + Ready Commands: + + + + 4 - Change greeting + + 5 - Listen to messages + + 6 - Record and send a message + + 9 - Exit + + 0 - Dial another box + + 9 - Exit system + + * - Continue using mailbox + + 1+8 - Change volume of prompts + + 1+6 - Administration options + + 1 - Message waiting + + 2 - Passcode + + # - Return to main + + 0+Command - Help description for command + + _________________________________________________________________ + + + + Sydney + + + + The Sydney system is from Australia, and can be easily + + identified by its unique logoff message of "Good day" (it also + + can be "Good morning" or "Good evening" -depends on the time of + + day). Another indication is that when you press "*" it will + + change the volume level. Sydney can be hacked pretty easy, + + however you'll get logged off if you enter three invalid + + mailboxes in a row. + + There is a simple trick to hacking Sydney. For example, + + let's say the boxes start at 100. You transfer to the box and + + during the greeting press "0" (This is the login command. You can + + also use this at the system greeting). Now it will prompt you for + + a passcode try "0". If it doesn't say "You have no messages.", + + then press "#"+"#". Repeat the process for mailbox 101 and so on. + + "0" is the default passcode for mailboxes that have just + + been set up. If you press "0" and it just sits there, it is + + actually waiting for you to enter three more digits (the maximum + + passcode length on a Sydney seems to be four digits) which is why + + you press "#"+"#". + + Sydney has a function called "Call Placement". Using this + + you can record a message, have Sydney dial a number and the + + person will hear the message, and their response will be saved in + + your mailbox. You can set it up so that Sydney will call the + + number every X number of minutes, and deliver the message. (This + + is great for pranking someone you dislike.) + + + + Sydney Commands: + + + + 1 - Record message + + 2 - Receive messages + + 3 - Message forwarding + + 4 - Call Placement + + 5 - Group messages + + 6 - Certified messages + + 7 - Guest accounts (Create an account for a buddy.) + + 8 - Personal Options + + 9 - End call + + + + Personal Options menu: + + + + 1 - Change greeting + + 2 - Change passcode + + 3 - Change mailbox name + + 4 - Listen to system bulletin + + 9 - Return to main menu + + _________________________________________________________________ + + + + Pac-Tel Meridian + + + + + + This is a great system. It's easy to use and you can + + have a long greeting. Sometimes you can identify one because it + + will play four tones when the system answers. Some systems have + + this disabled. The way to login is to press "#" at the system + + greeting. The default is "0000". A good way to find empty boxes + + is to go to the directory. When it asks you to press a letter + + just press one key. It will go through all the extensions that + + begin with the corresponding letters. When you come across + + something like "Mailbox XXXX", you've found a blank box. + + + + + + Pac-Tel Meridian Commands: + + + + 2 - Record and send a message + + 3 - Phone manager functions + + * - Quit + + # - help + + + + Phone Manager Functions: + + + + 1 - Personal Options + + 1 - Immediate message notification + + 2 - Daily message reminder + + 3 - Record greeting + + 4 - Change passcode + + 5 - Record mailbox name + + 6 - Record announcement for a mailbox you sponsor + + * - Exit personal options + + 2 - Voice Mail Options + + 1 - Check unacknowledged messages + + 2 - Record the name for a mailbox you sponsors + + 3 - Change distribution list + + * - Exit voice mail options + + 3 - Automated Attendant Options + + 1 - Call Screening + + 2 - Call processing + + 3 - Extension specific processing + + * - Exit automated attendant options + + _________________________________________________________________ + + + + System Manager Functions (TaKiNG C0NTR0L!) + + + + + + Overview: + + + + If you have come across a box with the name "System + + Manager" or "System Administrator" definitely try to access this + + box. This could be the Administrator Box! Once in this box you + + can create boxes, delete boxes, change class of service, send a + + broadcast message (sends the message to every box on the system), + + change passcodes and a lot of other stuff. In other words this is + + the God box. It is usually the last (most common) or first box on + + a system. Not all systems have administrator boxes. For example + + all Phone Mail administration is handled through a computer dial + + up. (There will be an article on this in a future issue of this + + publication). Basically, if you can get in the administrator box + + you control the system. Out of the systems I covered in this + + article, Infostar, ASPEN and the Message Center have + + administrator boxes. I'm going to cover Infostar and the Message + + Center here. Alas, I haven't been able to access an ASPEN + + administrator box yet, so I don't know the commands. If anyone + + reading this does please contact me. + + + + Message Center Administration Commands: + + (Once in the admin box press "*" from user options) + + + + A(2) - Add a mailbox + + D(3) - Delete a mailbox + + M(6) - Modify a mailbox + + P(7) - Change the passcode of a mailbox + + K(5) - Clock + + I(4) - Backup to floppy + + U(8) - Usage statistics + + * - Exit mailbox administration + + + + + + When you add a mailbox you need to enter a class of + + service, a limits class of service and a message waiting class. + + Here is a list of the ones to use: + + + + Normal Box Check In Check out Time Box + + Class: 01 04 05 09 + + Limits class: 03 05 05 05 + + Mess.waiting: 00 05 05 05 + + + + The Time Box tells the time when you transfer to the + + box. The Check In and Check Out boxes allow you to read mail and + + change the passcode on other boxes. + + + + Infostar VX Administration Commands: + + + + 1 - System greetings + + 2 - Broadcast message + + 3 - Mailbox administration + + 1 - Change passcode + + 2 - Add mailbox + + 3 - Delete mailbox + + 8 - Record mailbox greeting + + 9 - Reset message waiting indicator + + 4 - System group lists + + 5 - Time and date + + + + When you add a box on an Infostar system always use "100" for the + + class of service. The mailbox types are: + + + + 1 to 3-Regular box + + 10-Administrator box (You can have more than one on + + a system!) + + + + Also when you create a mailbox you'll be prompted for the + + following: + + + + Extension number + + Attendant extension number + + Department number + + Spell subscriber's name + + + + When you get these prompts,just hit "#" to skip them. The only + + things you need to enter are: The mailbox number, class of + + service and mailbox type. The system will add the box and assign + + a random four digit passcode. + + _________________________________________________________________ + + + + Hacking Unknown Systems + + + + There are a lot of systems out there that I haven't + + covered. A lot of companies also use proprietary systems. It can + + be just as easy (if not easier) to get a box on these systems as + + well. Start by finding out the main functions (See VMB Hacking + + Basics above). Go through the directory, and all that good stuff. + + Look for administrator boxes. Do it all. Just remember, most + + people aren't security conscious when it comes to voice mail, Oh + + well, their negligence can be to your benefit. + + _________________________________________________________________ + + + + Advanced VMB Hacking + + + + These are just some tips that I picked up over time. + + OK, first of all check out all of the extensions you can (this + + takes time), and see what you find. You may come across fax + + machines, carriers, PBX tones or a bridge. Sometimes these will + + be in the directory as an extension with no recorded name. + + Definitely check the box out. If you transfer to the box and + + don't get anything but a short beep, have a friend try to + + transfer to the same extension while you are on it to see if it + + is a bridge. I don't think I need to explain what is possible + + with a PBX tone. The carriers can be PBX dial-ups, company + + dial-ups, anything is possible. If you're nosy like myself you + + can login other peoples boxes and hear thief messages. Take care + + when doing this, because you don't want the company to know you + + are doing this. It's a good idea to reset the message pointer + + (if you can). The boxes I always try to listen messages are: + + Computer Room, MIS, System Administrator, Switch Room and + + Computer Operations. Well, you get the idea just try to get in + + any box that might have something that could be interesting. + + Another thing you may want to find is an after hoursorder line. + + If you can get into one of these you could have an abundant + + supply of credit cards (KeWL! KaRDZ F0R MY K0De LiNE!). + + Another thing is for those of you that want a 800 VMB, + + but can't get a box on it. Try to find a company in your area + + code that has an 800 number going to their voicemail system. Find + + the local number and go through the system and find the boxes you + + want. Now go load up your favorite code hacker. Now you can set + + it up to try to get into the box. You can do a couple of things: + + You can set it up to go in and change the passcode , or you can + + set it up to send a message after it has got into the box. Just + + find a box you can get into. It doesn't matter if someone is + + using it or not. Now have your code hacker programmed to dial the + + system, access the box, enter a passcode, and send a message to + + the box you can get in. For example we'll say that you have a + + Message Center that the box you want the passcode to is 999 and + + you can get into box 222. + + + + Now set your code hacker to dial the following string: + + + + atdt XXX-XXXX,,,999,,*,,YYYY,,6,,222,,,#,,,,,#,9 + + + + XXX-XXXX-The number of the voice mail system + + 999-Transfers to the box you want to hack + + *-to login + + YYYY-The passcode the for the code hacker to try + + 6-To send a message to another user + + 222-The box to send the message to. + + #-To start recording to message + + #-To stop recording + + 9-Send message + + + + Now all you have to do is check mailbox number 222, + + and see what time the message was delivered.Now look at your scan + + logs and see what number it dialed at the time your message was + + sent. Voila! You now have the passcode for box 999! + + If your can't set your code hacker to record all numbers + + dialed, just set it to scan sequentially. Every 30 minutes or so + + jot down what code it's trying. This way you can get a good idea + + of the area that the passcode is in. Another way: If you came + + across a carrier on the system. Set the code hacker to transfer + + to the extension of the carrier. When it connects to the carrier + + you'll have the passcode in your log. (This is the method I + + prefer.) + + _________________________________________________________________ + + + + Conclusion + + + + Well that's about it for this file. I hope some of out + + there found this file useful. If anyone has any questions, + + comments or complaints, you can email me at: + + + + roadkill@uss.lonestar.org + + + + + + Greetings to: + + Bane(314), Cjesus(313), Mr.Smith(615), + + Lucid Nightmare(214), Sirius(214), + + Dr.Strange(901), FuNKY G00DHeaRT(214) + + and to Jack the Ripper(214) for putting + + this in Stripped Ink. + + _________________________________________________________________ + diff --git a/textfiles.com/phreak/VOICEMAIL/vmblol.txt b/textfiles.com/phreak/VOICEMAIL/vmblol.txt new file mode 100644 index 00000000..548e39e1 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmblol.txt @@ -0,0 +1,248 @@ +ßÛÜÛÛÛß ÜÛßÛÛÛÜ ßÛÜÛÛÛßÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÛÛÛÛÛÄÄÄÄÛÛÛÛßÛÜÛÛÄÛÛÛÛÛÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÛÛÛÛÛÄÜÜÜÛÛÛÛÜÛßÛÛÄÛÛÛÛÛÄÜÜÜÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÜÛ +ßÛÛÛ ÛÄßÛÜÛÛÛßÄÜÛßÛÛÛ ÛÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄßßÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜßß úùú Cardin +g úùú Phreaking úùú Hacking úùú Anarchy úùú Phraud úùúWritten by: Wave Runner! +Date: 10/22/90Edited by : Count_ZER0œegions “f œuciferText # 12Part 1 out of 1ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ +Hacking & Scanning Voice Mail Boxes: The TutorialÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ + +Legions of Lucifer ('l‚jen ov l–cifŠr) n. 1. Any multitude of followers + of the chief evil spirit, Satan. 2. A group of Anarchists and Computer + Experts that work together as one to cause havok in the anarchy bound + society of this nation. + + +Hello again, and welcome to another œegions “f œucifer text phile! This +text file has to do with hacking and scanning VMBs. The reason I am writing +this phile is because I am very good at it, and have had years of experience. +Infact I have been called by MCI for screwing them over by attacking and +taking over a whole damn system with a few friends of mine. + +Anyways, hacking VMBs is very simple and basically safe, and not only that +but they are kewl to have around. You can give them to friends, you can +trade them for access on bulletin boards, or you can use it for yourself. +As for this 'Tutorial on Hacking VMBs', we will be talking about what systems +to hack, how you go about hacking them, default passwords, hints on better +scanning, and having your very own box. + + +Basics: +ÄÄÄÄÄÄ + +VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is +like an answering machine. You can use it for all sorts of things. Most +VMB systems are dialed though 800 numbers. People call up the VMB system +that you have a box on, and dial in your box number and then leave you a +message. Whenever you want to check your box, you just call up, enter your +password and read your messages. Inside a VMB you can do whatever, you can +leave messages to others on the system, you can change your 'Out Going' +message, you can have guest boxes (Explained later), you can have the box +call your house when you get an Urgent message, you can do a lot of things. +Infact, on some systems you can even CALL OUT through them, so they can be +used as a code of sorts! They are cool to have. + + +What Type of System You Should Scan/Hack: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +You should scan/hack out Virgin Systems, this is another way of calling a +system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems +have the best boxes and the most options that VMB Systems can offer. I will +be talking about ASPEN System today since I know most about those. + + +Scanning Your 'Virgin ASPEN VMB System': +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Okay once you've found your Virgin VMB System, you start to scan. Just incase +you don't know what scanning is, that means you search for boxes that are +hackable (Explained later on). Now you dial up the system and when it picks +up and the bitch starts to talk, press the "#" key. It will then ask you for +your box number... now there are two different way the ASPEN System can be +configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number +System". Now lets just say this system is a 3 Digit System. Okay, when it +asks for your Box Number, enter in 999, now it will say one of three things: +[These are known as 'Greeting Names'] +1. John Doe [Box owners name] +2. "Box Number 999 Is Not a Valid Box Number" +3. "Box Number 999" +Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc, +but if it says 3, then you are lucky, now it will ask you for your password, +now you are probably saying 'Shit this is where it gets difficult'... well +you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords: + +* We will use box number 666 as an example box # + [ BN = Box Number ] + +List of Default Password: Combination Result + + 1-BN 1666 + BN+1 667 + 0-BN 0666 + BN-0 6660 + Most Common Äį BN 666 + +Now enter in a those defaults, try JUST the Box Number first, ASPENs usually +use that most. Now, if you try all those Defaults and still can not get into +that Voice Mail Box, then that means that the box has been already taken, but +the owner hasn't changed his 'Generic Message', if you don't get in, you +will just have to search until you get in. + + +Once You Get Into a Box: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Okay, once you get your first box, *DO NOT* change anything!! That will come +later. Your first box is, as what is known as a 'Scanning Box'! What you do +with your Scanning Box is this: You enter "3" from the main commands menu, +and it will ask you for the box number. Now that command is the "Check for +Reciept" command, what it does it check Box #xxx for mail from you. This +command is very convienient for us VMB Hackers. To use that command to your +advantage, you enter in box a box number and it will say 1 of the three +'Greeting Names', like before, if it say #3, then you write down that Box +Number and hack it later. But if it says 1 or 2, then just keep scanning! +All boxes with the number 3 Greeting Name is known as a 'Hackable Box'. +Now you keep scanning until you have gone all the way down to Box number 000 +or whatever is the lowest box it supports. Now, once you have your list this +is when all the fun starts! Now you are ready to hack! + + +Hacking Out Your New Found 'Hackable' Boxes: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Okay this is the easy part. After you spent most of your time by scanning +the system you should be used to the system and how it works, that should +make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you +should know what the default password was for your Scanning Box. Well if the +password for your Scanning Box was just the Box Number, then *EVERY* other +hackable box should have the SAME default password. VMB Systems have only +one default password, If one box has the BN for a Default PW, the all the +others will too. + +Okay, you call up the VMB System will the list of 'Hackable' boxes by your +side, and when the bitch is talking, press the "#" key. When it asks you for +your box number, enter in the first box number on your list. When it asks for +your password, enter in the Default Password Sequence. Now if you don't get +into that box, it's not a problem, just keep going down your list. You should +get into a few. But remember, just because a box is marked 'Hackable', it +doesn't mean you will definatly get into it. + +Okay, now you have a few dosen boxes. You can now use you Scanning Box to do +whatever you please. + + +ASPEN Guest Boxes: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes +are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out +Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set +for him, and leave you messages, but not only that, you can leave messages +to HIM! Which means, if his is in New York, and you are in California, and +neither of you have codes to call eachother, then you can leave messages thru +your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes: + +0. Main Box - Your Voice Mail Box! +1. Guest Box #1 - Can Leave & Recieve Messagez +2. Guest Box #2 - Can Leave & Recieve Messagez +3. Home Box - Can Leave & Recieve Messagez +4. Secretary Box - Can Check How Many Messagez You + Have & Recieve Messagez + + +Hints On Better Scanning: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +A lot of people say hacking and scanning for VMBs is too damn hard... well +that's because they are going at it all wrong, they probably read some lame +piece of shit text file on Hacking VMBs that was about 500 bytes long. Well, +here is a small list of hints on better scanning and hacking: + +1. Do not use a Voice Mail Box hacking/scanning program + (ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..) +2. Do not hack in random order (ei: B#999, 345, 810, etc) + Always hack in order: 999, 998, 997, 996, 995...000. +3. Try to find out if it's virgin. The newer the System, + the better. +4. If you have a phone with memory dial, change one entry + to the number of the VMB System. +5. Don't hack the System Managers box unless you really + want to. + + +Ideas of Things To Do With Your Extra Boxez: +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + +Well since you can have up to 500 extra Voice Mail Boxes, you might +not know what to do with them, here are a few ideas that can help you out: + +1. Give them to friends +2. Sell them to friends +3. Offer them to sysops for + for better access +4. Trade them for HSTs or + whatever +5. Use them as a Voice Verifing line (So you don't have to give out + your real voice number to BBSes when you apply!) + + +Well, that's it to the œegions “f œucifer Hacking & Scanning Voice Mail Box +Systems Tutorial! I hope it helped you and I, along with œ.“.œ wish you the +best of luck with your new found hobby! And remeber if you found this text +of any help, please spread it around to help others! Also, if you think you +are any good at writing H/P, please apply to be a Member! Call the œ.“.œ Home +at: + + Digital Hackers Network + œegions “f œucifer HeadQuarters/Home + No Warez! A truely serious Hack/Phreak board + Hack, Phreak, Scanning, Phraud, Crashing disscusions + Viral Research & Development Sections (500+ Virii!) + "Personalized ANSi Bombs" made by request + Running AfterShock v1.20 - 2400 Baud + PH: 213-274-1333 + + +ÜÜÛÛÛÛÛÛÛÛÛÛÛÜÜ +ÜÜÛÛÛÛßß ÜÜ ßÛÛÛÛÜÜ +ÜÛÛÛÛßÜÛÛÛÛÜ ßßÛÛÛÜ +ÜÛÛÛÛßÛÛÛÛÛÛÛÛßÛÛÛÜ +ÜÛÛÛßÜÛÛÛÛßßÛÛÛÛÜßÛÛÛÜ +ÛÛÛÛßÛÛÛÛß ßÛÛÛÛßÛÛÜ +ÞÛÛÛÝÜÛÛÛÛßßÛÛÛÛÜÛÛÛÜ +ÛÛÛÛÛÛÛÛßßÛÛÛÛÛÛÛ Û +ÞÛÛÛÜÛÛÛÛßßÛÛÛÛÞÛÛÝÜÛß +ÜÜÜÜÜÜÜÜÜÜÜÜÛÛÛÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛß +ÛßßßÜÜÜßßßßÜÛÛÛÛßßßßßßßßßßßßßßÜÜÜÜßßßßßßÜÜÜß +ÜÛßÛÛÛ ÛÛÛÛßßÛÛÛÛÛÛÛ +ßßÛÛÛ ÜÛÛÛÛßßÛÛÛÛÜ ÛÛÛ +ÛÛÛÛÛÛÛßßÛÛÛÛ ÛÛÛÛ +ßÜßßßßßÛÛÛÛÛÛÛß +ßÛÛÛÜÜÜÜÛÛÛÛ +ßÛÛÛÛÜÜÜÜÜÛÛÛÛÛßÛÛÛÛÜ +ßßßÛÛÛÛÛÛÛÛÛÛÛÛßß ßÛÛÛÛ +ßßßß + + "Anarchy is the base of todays society, without it, we would be in chaos" +- Anarchist + +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ +Call these œegions “f œucifer support boards for information or application +inquiries: + +Digital Hackers Network 213/274+1333 œ.“.œ HeadQuaters/Home +Electric Eye ][ 313/776+8928 œ.“.œ Distribution Site #1 +Digital Information Exchange 612/356+2209 œ.“.œ Distribution Site #2 +ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ +œegions “f œucifer High Office Members: + +Prezident/Founder: Wave Runner! +Vice Prezident : Count_Zer0 +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + This text file is (C)Copyrite 1990 œ.“.œ Inc. + œ.“.œ is a registered trademark of DHN, All rights reserved + Any modifications to this text file is a violation of copyrite. + Digital Hackers Network 213/274+1333 -=œ.“.œ Home=- +ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ + \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/vmbrl.txt b/textfiles.com/phreak/VOICEMAIL/vmbrl.txt new file mode 100644 index 00000000..0c1f6540 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmbrl.txt @@ -0,0 +1,126 @@ + R e n e g a d e L e g i o n + * * T e c h n i c a l R e p o r t s * * + * R * * L * + * * + + Eastern Western + .... +Net Runner ........ Overdose +The Knight ......... Sirus +Kingpin ... .... Snuggle +Highlander ... .... +Nemesis ..... +Rogue .... Canadien +Zardoz .... +Cursor ... ... +The Gypsy ... ... Blackheart +Iceburg .. ... +White Knight ... + + Presents + + + Eastern RL HQ - 617-XXX-XXXX + Canadien HQ - 902-XXX-XXXX + + +VMB (Voice Mail Box) Hacking +---------------------------- + +Written By: The Knight + + + +Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't +a great deal of 'hidden info' that isn't common sense. But, If you are out +there trying to hack a box and can't, follow through the VERY logical and +simple steps and make sure they are matching up. + + +Step 1: + +Finding a VMB System + +There are many ways you can find a VMB system, for instance, on a BBS when +someone says 'Here are some systems' usually thats what they're referring +to. Also, Try setting up your scanner and listening for 'Welcome to XX +company, Enter extension #' or something similar to that. Then you have +found a VMB system. + + +Step 2: + +Finding a Box + +This is the part where most IDIOTS fuck up. You can NOT just take ANY box. +You must make sure that no one is using it. There are several ways to do +this. One EASY way is when you hack it, check the date on the latest +messages, if they are OVER a month old, then I'd say your safe to use them. +Also, watch in case there is just like _2_ messages in there from the last +4 months that those messages could be messages sent to ALL the boxes, see if +they sound personal. If they DON'T, then grab the box. + +Let's say there's a box you REALLY want bad and someone's using it regularly, +try doing this: Go in twice a day (make SURE you DON'T change the greeting +etc.) and erase all the messages. He will complain and will eventually move +out of the box. Then there is a good chance of you having that box. It's +happned to me. + + +Step 3: + +Hacking the VMB + +This is the most SIMPLE part of all. MY general method is as follows: + +Find a box, let's say box 260. It's empty and I want it (obviously). +First, try passcode '000', if that doesn't work, try passcode '260', +just make very general guesses that's ALL. Some of the MOST Common passcodes +are: + +3 digit boxes: +000 +123 +111 +222 +333 +444 +555 +666 +777 +888 +999 +box # (say it's box 260, passcode: 260) +321 + +4 digit boxes: + +1234 +0000 +1111 +2222 +3333 +4444 +5555 +6666 +7777 +8888 +9999 +box # (Say its box 1200, try passcode: 1200) + + +The Key: REALLY try ALL of those. I knew one system with a passcode of + '5555' and NO ONE could hack it. And I did. So don't give up. + UNLESS you've exhausted all of those possibilities. Then forget + it. + +That's it really. The most simple thing to do. Just remember not to +give up before you should and also try 3 digit passcodes on 4 digit +boxes. Also, once you get in for added security, a lot of these boxes +allow more digits for passcodes, so make a 5 digit passcode. Or if you +think it's worth it, try like '00000' so that's really about all. + +Have fun and don't stop. + + -- The Knight, Sysop Eastern RL HQ BBS + diff --git a/textfiles.com/phreak/VOICEMAIL/vmbs1.txt b/textfiles.com/phreak/VOICEMAIL/vmbs1.txt new file mode 100644 index 00000000..a4c94095 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmbs1.txt @@ -0,0 +1,52 @@ + VMB's (Voice Mail Box) | 1&2 = Both call same number + | 1 = One calls this number + Call : 213-598-7900 (Party Pirate Line) BRIDGE| 2 = the other calls this + Call : 317-265-4488 (Unused Bridge) | + VMB Number |EXTEN | Operator of VMB | Loops + _______________| SION|______________________ | _____________________ + N O L E E C H I N G | + 716-987-7439 : None : The Pirate | 1&2 @ 212-567-9938 + 716-987-7648 : None : AK 47 (Brother) | 1&2 @ 504-356-5619 + 716-987-7666 : None : Jack the RIPPER | 1 @ 202-678-8049 + 716-987-7623 : None : Romper | 2 @ " " 8048 + 716-987-7502 : None : DEATH (Not Master) | 1 @ 504-831-9099 + 213-856-2580 : None : Black Ball Mis ]I[! | 2 @ " " 9098 +1-800-333-5625 : 354 : The Flaw | +1-800-438-1061 : 135 : MW 8 |__________________________ + 312-410-7213 : : MC Docs | 1999 | 0488 | + 213-494-9700 : : Public Enemy |_________|________________| + 714-647-1958 : : Mr Music | | | + 213-202-4381 : : JDT | | | + 313-399-2596 : : The Stranger | | | +1-800-525-7243 :**8889: Pure Genius | | | + 619-492-8087 : : Trixder Ice |_________|________________| +1-800-632-6681 : 2614: Con Artist | 0266 | AT&T | +1-800-552-2440 : 5206: Console Cowboy | |80446713159980 | + 619-496-3393 : : The Saint | |60110804335933 | +1-800-289-2121 : 255: Gremlin | |71333331316212 | + 818-594-7049 :**7751: WhipLash | |70238697343418 | + 818-594-7049 :**7754: Ace / WhipLash | | | + 818-594-7049 :**7757: ChainSaw | | | + 818-594-7049 :**7759: Hercules | | | + 818-594-7049 :**7760: The Faker | | | + 714-987-5128 : : AlphaBits | | | + 213-856-8450 : : Iniolater | | | + : : | | | + : : | | | + : : | | | +____________________________________________________________________________ +-Don't Work for me. - + 950-0488 +0471041692102 +7261041692102 +1151041692102 +7411041692102 +0721041692102 +2591041692102 + 950-0266 Public Bridges: +5024180 312-630-9590;9592;9594;9596;9598 + 312-606-9214 + 312-606-0766 + 312-704-0724 + + diff --git a/textfiles.com/phreak/VOICEMAIL/vmbzan.hac b/textfiles.com/phreak/VOICEMAIL/vmbzan.hac new file mode 100644 index 00000000..24d116cf --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmbzan.hac @@ -0,0 +1,86 @@ +############################################################################### +## ÄÍðZhit Axis Nation presentsðÍÄ W () W ## +## How to have your own VMB \||/ ## +## || ## +## Written by: The Exorcist _/ \_ ## +## Dated: 7/24/91 ## +## Greet(s) to: Doc Logic, my teacher at school, and the godly CoP... ## +## ## +## Ying Yang BBS The Baron's Bistro FuNHouse BBS ## +## ZAN Promised Land ZAN Mosque#001 ZAN Mosque#002 ## +## SysOp: CoP SysOp: The Baron SysOp: Erasmus ## +############################################################################### +Here is another ultimately cool ZAN text file brought to you by the Exorcist. +Call 1-312-839-3850 and leave all the shit you want, codes and nos and shit.. + + +This file is only based upon the information gathered from VMB's with the +839 prefix. + +Ok here is a file from Z.A.N. so I wont be purged! What is a VMB? A VMB +is a Voice Mail Box.. or sometimes known as a Voice Mail System. Their +purpose is to record messages for people.. (id est OB/Gyn's and Pediatrists, +Drug Dealers, and a curious of other rich and filthy scum.) Lets say Joe +Supplier is out with his hoe.. Of course he can't get in touch with his +fiendish hommies so what does he do? No, he doesn't get a beeper cuz that +might tick of his hoe.. He get's a VMB where he has the caller has the option +to leave a phone no. or a voice message. + +Joe S. finishes with his hoe calls up his VMB listens to his pre-recorded +message for a little while " Yea Man, I ain't no home now, but you leave +message an I call you when I done with yo sis'" then presses "0" on his touch +tone phone. A nice little voice comes on saying "Please enter your access +code." He enters his code and hears " You have xx messages press 7 to play." +He presses 7 and hears his messages. + +So you get the point by now, and if you don't you shouldn't be reading this.. +So how do you get one, why you just look it up in the yellow pages and let +your fingers do the talking.. But everyone knows that the real way is to +HACK it.. Find out some pager prefixes, I know some in Illinois are 312-839 +and then theres 708-xxx. Then attempt to call every no. combination there is +unless you have a scanner or something that you can program to act upon +different messages.. To make your time go faster try little combinations +like 839-fuck or 839-hack. About 95% of the time you will simply here a few +beeps. This is for the conventional pager, the correct procedure is to type +in your phone no. and press the # button. By the way, if you really get +pissed at someone, you can type in their no. and then they will be getting +calls from people saying "John Doe from 1st National back returning your +call" or "Yeah man, dis be Tyrone, wha you be, G?" + +When you finally get one, either by taking someone elses - trying to hack +their passwords or believe this, some persons are to stupid to even have +passwords - or by finding an empty one. The second of the two being the +better and safer. Hacking someones VMB cant get you in any trouble.. Just +don't attemt to change the message right away.. But if you are the true +anarchist, you will change his/her message, Call back the next day, and find +the old message back with a new password.. Now is your time to have fun. +Keep saying "I got your VMB along with your address and shit, be expecting +a ton of manure on your front lawn Monday." I kept doing this along with +saying "I am going to kill your Grandmother" After awhile the guy changed +his message to say something like "Hey man stop leaving me messages, I'll +use ANI to bust you" What a looser! + +What exactly are the commands once you get in to your own little VMB? + +Pressing the "*" will give you the following options.. + +3 to delete +2 to play again +4 to skip forward in message +11 to update greeting +13 to forward message +17 to change access code + +I also found out some that they don't tell you once you press "*" + +8 will get you the time that the messages were left +5 will tell you what message you are at +6 sets you back to the beginning + + +If you do succeed, please post your VMBs so that the anarchistic public can +leave you mail. Who knows maybe you'll get some CC's or codes and shit.. + + + +Downloaded From P-80 International Information Systems 304-744-2253 diff --git a/textfiles.com/phreak/VOICEMAIL/vmx.txt b/textfiles.com/phreak/VOICEMAIL/vmx.txt new file mode 100644 index 00000000..b6f79b81 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/vmx.txt @@ -0,0 +1,52 @@ + + + ==)--- P TO PAUSE S TO STOP ---(== + +Toll-Free Answering Services + + +Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888 + +American Discount Dialing System 800-227-1617 (CA 800-852 7777) (CA 800-772-3545) + +Dialog Marketing 800-447-4700 (IL 800-322-4400) + +Direct Marketing Services Inc. 800-223-1944 + +Executive Locator 800-323-6556 + +H Q Co 800-227-3004 (800-652-1848) + +National Communications Center Inc. 800-824-5120 (CA 800-525-7711) + +National Data Corperation 800-257-9611 + +National Switchboard 800-528-6052 + +Nice-National Instant Consumer Exchange 800-453-9000 + +Operator 800 800-448-4511 (NY 800-962-1480) + +Ring America 800-621-5199 + +Share-a-Wats Inc. 800-854-2003 + +Skycall 800-631-5488 (NJ 800-352-4951) + +Team Telephone 800-228-5000 + +Tel-Com Message Service 800-451-4453 (VT 800-622-4429) + +Teletrak Response Center 800-328-5257 + +USA 800 800-821-2280 (MO 800-892-7655) + +DOWNLOADED FROM P-80 SYSTEMS +  + + +Archives #4 + + +<2>United Kingdom BBS'S +<3>Weers Group...... 02 238 9034                           \ No newline at end of file diff --git a/textfiles.com/phreak/VOICEMAIL/voicmail.txt b/textfiles.com/phreak/VOICEMAIL/voicmail.txt new file mode 100644 index 00000000..c86820a2 --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/voicmail.txt @@ -0,0 +1,84 @@ + ____________________________ _____ + \___ | ___/___/_ ___\___/ _ \/ ___/ + | | |/ /____| | | | | |\ )/____ + | | |>____ / | | |> | __/___ / + ___| | |____/ /| | | |__| |\ \_/ / + \____|____/__/ |_| |____/_| \_\_/ HL + ------------------------------------- + + THERE IS NOW A NEW FACILITY FOR COOL DUDES WHO WANTS IT.... + + IT'S TOTALLY FREE, BUT IS RESTRICTED TO THOSE WHO.... + + A) OWN A TONE PAD OR TONE DIALING PHONE. + B) WILL USE IT REGULARLY. + C) AREN'T LAME!! + + THE FACILITY IS A FREE-PHONE MESSAGE BOX SYSTEM FOR YOU TO CALL AND LEAVE + MESSAGES, GOSSIP, ETC TO OTHERS ON THE SYSTEM. EACH PERSON IS GIVEN + HIS/HER OWN PERSONAL MAIL BOX WITH ITS OWN PASSWORD (CHANGABLE!). THE + SYSTEM ALSO ALLOWS THOSE OF YOU UNABLE TO PHREAK TO HAVE CHATS USING MAIL. + + APPLYING FOR A MAIL BOX IS REALLY EASY. YOU CAN EITHER.... + + A) PHONE 0800 899224, LEAVE A MESSAGE CONTAINING YOUR NAME AND PHONE + NUMBER TO LORD FLIGHT/JESTERS AT MAIL BOX 510. THIS IS DONE BY DIALING + THE FREE=PHONE NUMBER, PRESSING THE `*' KEY AS SOON AS YOU HEAR THE + RECORDED VOICE, ENTERING `510', LEAVE YOUR DETAILS AFTER THE TONE, AND + HANGING UP WHEN YOU HAVE FINISHED! + + B) CALL A BBS AND MAIL YOUR DETAILS TO ANY OF THESE USERS, IF THEY ARE + MEMBERS OF THE BOARD :- + + SKITZ + HIGHLANDER + JESTERS + ZEBEDI + + C) MAIL YOUR DETAILS TO ANY OF THE ABOVE USERS AT THE JESTERS HQ... + + INNER SANCTUM ON 44 (0)229 430327. + + + IF YOUR APPLICATION IS ACCEPTED YOU'LL GET A CALL AND WILL BE TOLD YOUR + MAIL BOX NUMBER, YOUR PASSWORD (WHICH MUST BE CHANGED) AND A LIST OF + OTHER USERS ON THE SYSTEM. + + NB : AS SOON AS YOU READ THIS TEXT, GIVE IT A GO, CAUSE EVERYTHING IS + FREE. THIS NUMBER WILL NOT GO DOWN FOR A GOOD 2 MONTHS OR SO, BUT IT WILL + EVENTUALLY, AND WHEN IT DOES YOU WILL BE NOTIFIED OF A NEW NUMBER TO CALL + WITHIN A WEEK! + + CREDITS GO TO DEATH FOR FINDING THE ORIGINAL NUMBER... + + ALLOCATED MAIL BOXES THAT ARE ABUSED OR NOT USED WILL BE RE-ALLOCATED TO + MORE APPRECIATIVE USERS! + + NO TRICKS, NO CHARGES....WE DO THIS OUT OF THE GOODNESS OF OUR HEARTS!! + + BULK ORDERS CAN ALSO BE MADE FROM LARGE GROUPS! RESERVATIONS ONLY TAKE + A SECOND!!! + +/* LORD FLIGHT */ - YOUR SYSTEM ADMINISTRATOR + _ __ ______ __________________ + THE //\// \ // // \ // // ___// __ \ SYSOP: HIGHLANDER + // // \ // // \ // // /_ // /// / + // // /\ \/ // /\ \/ // __/// __/ COSYSOPS: RUTGER SOUND + // // / \\ // / \\ // / // /\ \ RISK + // // / \\_// / \\_// /__// / \\ \_________________________ + \\/\\_/ \\_/ \\____/\\_/ \\__________________________/ + ________ ________ __ ________________________ __ __ __ + // ___ \ // ____ \// \ // // __ \\____ ___// \ // \// \ // \ + // / \\_/// / // // \ // // / \\_/ // / // / // // \/ \ + \\ \___ // \_// // /\ \/ // / // / // / // // /\ /\ \ + __\\___ \// /\__ // / \\ // / __ // / // / // // / \/// / + // \__// // / // // / \\_// \// \ // / // \// // / // / + \\_______/\\/ \\_/\\_/ \\______/ \\_/ \\_______/\\_/ \\_/ + +68030 POWER * 200 MEG STORAGE * DUAL STANDARD 14.4K * SERIAL LOCKED AT 38.4K + JESTERS U.K HQ * 0-1 DAYS ONLY +«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«» +->->->->->->->->-> THE INNER SANCTUM +44 (0) 229 430327 <-<-<-<-<-<-<-<-<- +«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«» + + diff --git a/textfiles.com/phreak/VOICEMAIL/xvmecinf.txt b/textfiles.com/phreak/VOICEMAIL/xvmecinf.txt new file mode 100644 index 00000000..f3761faa --- /dev/null +++ b/textfiles.com/phreak/VOICEMAIL/xvmecinf.txt @@ -0,0 +1,36 @@ +======================================== += = += Xerox Voice Message Exchange Commands= += = += Written & Typed By:The Lineman = += = += Atlantis BBS 215/844-8836 (Private) = += = +======================================== + + Command List: + + 1 = Start/Stop Recording + 2 = Start/Stop Playing + 3 = Back Up + 33 = Back Up to Beginning + 4 = Skip Forward + 44 = Skip to End + 5 = Send/Erase + 55 = Notification of Non-Delivery + 7 = Save/Scan + 8 = Future Delivery + 0 = End of Address + * = End of Address + + Special Commands: + + 011 = New Message Queues + 012 = Saved Message Queues + 021 = Redirect + 022 = Reply + +Any questions? Dial 1-800-TEAM-XRX (1-800-832-5979) + +8/86 + diff --git a/textfiles.com/phreak/WIRETAPPING.1 b/textfiles.com/phreak/WIRETAPPING.1 new file mode 100644 index 00000000..0c3002a9 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING.1 @@ -0,0 +1,80 @@ + +T E X T F I L E S + +

Phone Phreaking: Wiretapping and Bugs

+

+The Great Fear of people who use telephones to conduct their business (private +or professional) is that someone is listening in, taking notes, recording. +It's a concern that has allowed some very rough laws to be put into place, and +it's a central theme of these files. They tell you how to bug telephones or +rooms, get in the way of electronic transmissions, and they even touch on +some of the politics behind this method of information gathering. +

+Of course, it should be noted that not everyone out there wiretapping is a +private citizen. +

+ + + + + +
+
Filename
Size
Description of the Textfile
bellinfo.txt 10630
Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984) +
bug.txt 9176
Automatic Phone Recorder by Atomic Punk (May 1, 1989) +
bugdetct.phk 1893
Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim +
bugging.guide 7040
Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates +
bugging.phk 7201
Bugs on a Budget, Inexpensive Surveillance, 8-85 +
buggy.phk 1579
A little history about the Infinity Transmitter +
bugphone.phk 4640
An Automatic Phone Recorder, by Atomic Punk +
bugstaps.txt 1891
Bugs and How to Tap Someone's Room by Fireball +
buildbug.phk 3852
How to Build a Bug Detector by The Gremlin +
caller 6623
Notes on Recording Caller ID Signals and Voice Notes +
callwai.txt 2878
The Call Waiting Tap, by The Byte +
cordless.phk 6713
How to listen into cordless phone conversations, by Beowulf +
datatap.hac 3968
Tapping Computer Data is Easy! By Rick Blackmon +
detectbug.phk 2912
Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim +
dltp1.txt 4738
Detecting Line Taps of C-Net Compatibles +
dltp2.txt 3585
Detecting Line Taps Part type by C-Net Compatibile +
eaves1.txt 14460
Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN +
es.txt 25505
Electronic Bug Detection +
faxint.phk 14663
Fax Machine Interception, from Full Disclosure #23 +
fmbug.hac 4736
How to Make an FM Wireless Bug, by Johnny Rotten +
fmphone.bug 2340
Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul +
fonebugs.hac 2199
Bug Detection on Home Phones +
fonepole.txt 4097
Climbing Phone Poles- Tips and techniques by The Mad Phone-man +
foneptch.phk 29642
Building and Using Phone Patches, by Julian Macassey +
fonesci.phk 18900
The Science of Telephone Surveilance, by Eric The Red +
intercpt.txt 22529
Pager, Fax, and Data Intercept Techniques +
lbt-alt1.txt 3651
Info on Automatic Line Testers (APR) by RiPMax of Liberty +
lbt-alt2.txt 3796
Automatic Line Testers (SALT) by RiPMaX of Liberty +
lineman.phk 6645
Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow +
listenin.txt 4520
How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989) +
lmos.phk 4286
How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique +
mism32.hac 5248
Wiretape Loophole Concerns by Geoffrey S. Goodfellow +
mism36.hac 12928
Private Audience (The Art of Listening In) by The Overlord +
mism37.hac 7040
Wiretapping, Bugs on lines, and Listening in, by Forest Ranger +
mobfone.phk 9745
How to Get Into the AT&T Network by Building Your Own Mobile Phone +
nightl.txt 21788
Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992) +
phone.tap 4243
How Many Different Phone Taps Work +
phonetap.phk 2896
Bug Detection on Home Phones, by Mr. Jimmy +
phonetap.txt 3767
Phone Tapping, by Lord Jaxom +
phontap.phk 2913
The Call Waiting Tap, by The Byte +
precord.phk 5878
Automatic Phone Recorder by Atomic Punk, May 1, 1989 +
ptapping.phk 14476
Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990) +
swtchbrd.phk 7031
Building Your Own Switchboard by Autopsy Saw +
tapfones.hac 11956
Private Audience: A Basic Guide to the Art of Listening In +
taphones.phk 3105
How to Tap Into Your Neighbor's Phones, by Lord Jaxon +
tapownline.phk 4533
How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord +
tapphon.txt 8303
How to Listen in to Cordless Phone Conversaitons by Beowulf +
tapping.phk 1644
Bugs and How to Tap Someone's Room, by Fireball +
tapping.txt 2468
The Call Waiitng Tap by The Byte and Road Agent +
taps2.txt 4550
Some Information on Phone Taps +
tempest.txt 46237
Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and +
wait.tap 2683
The Call Waiting Tap by The Byte, Distributed by RAM Kracker +
wiretap.ana 3896
General Wiretap Information +
wiretap.txt 13663
Wiretapping Abuse Report on the FBI in 1991 +
wiretapp 6479
Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse +
wiretaps.txt 23758
Can Wiretaps Remain Cost-Effective? By Robin Hanson +

There are 56 files for a total of 472,516 bytes.
+ + diff --git a/textfiles.com/phreak/WIRETAPPING/.windex.html b/textfiles.com/phreak/WIRETAPPING/.windex.html new file mode 100644 index 00000000..a750ca90 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/.windex.html @@ -0,0 +1,80 @@ + +T E X T F I L E S + +

Phone Phreaking: Wiretapping and Bugs

+

+The Great Fear of people who use telephones to conduct their business (private +or professional) is that someone is listening in, taking notes, recording. +It's a concern that has allowed some very rough laws to be put into place, and +it's a central theme of these files. They tell you how to bug telephones or +rooms, get in the way of electronic transmissions, and they even touch on +some of the politics behind this method of information gathering. +

+Of course, it should be noted that not everyone out there wiretapping is a +private citizen. +

+ + + + + +
+
Filename
Size
Description of the Textfile
bellinfo.txt 10630
Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984) +
bug.txt 9176
Automatic Phone Recorder by Atomic Punk (May 1, 1989) +
bugdetct.phk 1893
Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim +
bugging.guide 7040
Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates +
bugging.phk 7201
Bugs on a Budget, Inexpensive Surveillance, 8-85 +
buggy.phk 1579
A little history about the Infinity Transmitter +
bugphone.phk 4640
An Automatic Phone Recorder, by Atomic Punk +
bugstaps.txt 1891
Bugs and How to Tap Someone's Room by Fireball +
buildbug.phk 3852
How to Build a Bug Detector by The Gremlin +
caller 6623
Notes on Recording Caller ID Signals and Voice Notes +
callwai.txt 2878
The Call Waiting Tap, by The Byte +
cordless.phk 6713
How to listen into cordless phone conversations, by Beowulf +
datatap.hac 3968
Tapping Computer Data is Easy! By Rick Blackmon +
detectbug.phk 2912
Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim +
dltp1.txt 4738
Detecting Line Taps of C-Net Compatibles +
dltp2.txt 3585
Detecting Line Taps Part type by C-Net Compatibile +
eaves1.txt 14460
Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN +
es.txt 25505
Electronic Bug Detection +
faxint.phk 14663
Fax Machine Interception, from Full Disclosure #23 +
fmbug.hac 4736
How to Make an FM Wireless Bug, by Johnny Rotten +
fmphone.bug 2340
Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul +
fonebugs.hac 2199
Bug Detection on Home Phones +
fonepole.txt 4097
Climbing Phone Poles- Tips and techniques by The Mad Phone-man +
foneptch.phk 29642
Building and Using Phone Patches, by Julian Macassey +
fonesci.phk 18900
The Science of Telephone Surveilance, by Eric The Red +
intercpt.txt 22529
Pager, Fax, and Data Intercept Techniques +
lbt-alt1.txt 3651
Info on Automatic Line Testers (APR) by RiPMax of Liberty +
lbt-alt2.txt 3796
Automatic Line Testers (SALT) by RiPMaX of Liberty +
lineman.phk 6645
Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow +
listenin.txt 4520
How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989) +
lmos.phk 4286
How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique +
mism32.hac 5248
Wiretape Loophole Concerns by Geoffrey S. Goodfellow +
mism36.hac 12928
Private Audience (The Art of Listening In) by The Overlord +
mism37.hac 7040
Wiretapping, Bugs on lines, and Listening in, by Forest Ranger +
mobfone.phk 9745
How to Get Into the AT&T Network by Building Your Own Mobile Phone +
nightl.txt 21788
Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992) +
phone.tap 4243
How Many Different Phone Taps Work +
phonetap.phk 2896
Bug Detection on Home Phones, by Mr. Jimmy +
phonetap.txt 3767
Phone Tapping, by Lord Jaxom +
phontap.phk 2913
The Call Waiting Tap, by The Byte +
precord.phk 5878
Automatic Phone Recorder by Atomic Punk, May 1, 1989 +
ptapping.phk 14476
Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990) +
swtchbrd.phk 7031
Building Your Own Switchboard by Autopsy Saw +
tapfones.hac 11956
Private Audience: A Basic Guide to the Art of Listening In +
taphones.phk 3105
How to Tap Into Your Neighbor's Phones, by Lord Jaxon +
tapownline.phk 4533
How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord +
tapphon.txt 8303
How to Listen in to Cordless Phone Conversaitons by Beowulf +
tapping.phk 1644
Bugs and How to Tap Someone's Room, by Fireball +
tapping.txt 2468
The Call Waiitng Tap by The Byte and Road Agent +
taps2.txt 4550
Some Information on Phone Taps +
tempest.txt 46237
Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and +
wait.tap 2683
The Call Waiting Tap by The Byte, Distributed by RAM Kracker +
wiretap.ana 3896
General Wiretap Information +
wiretap.txt 13663
Wiretapping Abuse Report on the FBI in 1991 +
wiretapp 6479
Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse +
wiretaps.txt 23758
Can Wiretaps Remain Cost-Effective? By Robin Hanson +

There are 56 files for a total of 472,516 bytes.
+ + diff --git a/textfiles.com/phreak/WIRETAPPING/bellinfo.txt b/textfiles.com/phreak/WIRETAPPING/bellinfo.txt new file mode 100644 index 00000000..f49c7713 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/bellinfo.txt @@ -0,0 +1,201 @@ + +/-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\ +! Bell Telephone Info ! +\-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/ + + +****************************************************************************** + + BRIDGING HEADS, RESIDENTIAL AND BUSINESS MULTILINE DISTRIBUTION BOXES, LINE +AND TRUNK SPLITTERS, AND OTHER BELL SYSTEM WIRE TERMINATIONS. + + - HOW TO USE, AND/OR ABUSE THEM - + +(INCLUDING A TUTORIAL ON BASIC TELEPHONE EAVESDROPPING TECHNIQUES.) + +****************************************************************************** + +WRITTEN BY : PHUCKED + AGENT 07/29/84 + 04 + +REVISED FOR LOD! 10/84 +CURRENTLY REVISION II + +**************************************************************************** + + IN THIS ARTICLE, I WILL FIRST BESCRIBE THE TERMINATION, WIRING, AND +TERMINAL HARDWARE MOST COMMONLY USED IN THE BELL SYSTEM, AND I WILL INCLUDE +A SECTION ON METHODS OF USING THEM. + +***************************************************************************** + +------------- +LOCAL NETWORK +------------- + + THE LOCAL TELEPHONE NETWORK BETWEEN THE CENTRAL OFFICE/EXCHANGE AND +THE TELEPHONE SUBSCRIBERS CAN BE BREIFLY DESCRIBED AS FOLLOWS: + FROM THE CENTRAL OFFICE (OR LOCAL EXCHANGE) OF A CERTAIN PREFIX(ES), +UNDERGROUND AREA FEEDER TRUNKS GO TO EACH AREA THAT HAS THAT PREFIX. (USUALLY +MORE THAN ONE PREFIX PER AREA) AT EVERY FEW STREETS OR TRACT AREAS, THE +UNDERGROUND CABLES SURFACE. THEY THEN GO TO THE SECONDARY TERMINATION, (THE +AERIAL TELEPHONE FEEDER CABLE) (OR BACK UNDERGROUND, DEPENDING ON THE AREA) AND +THEN TO THE SUBSRIBERS HOUSE (OR IN THE CASE OF AN APARTMENT BUILDING OR +MUTLILINE BUSINESS, TO A SPLITTER OR DISTRIBUTION BOX/PANEL). + +NOW THAT WE HAVE THE BASICS, I'LL TRY AND GO IN-DEPTH ON THE SUBJECT. + +------------------ +UNDERGROUND CABLES +------------------ + + THESE ARE SOMETIMES INTEROFFICE TRUNKS, BUT USUALLY IN A RESIDENTIAL AREA +THEY ARE FEEDER GROUPS THAT GO OTO BRIDGING HEADS OR DISTRIBUTION CASES. THE + CABLES ARE ABOUT 2-3 INCHES THICK (VARIES), AND ARE EITHER IN A METAL OR +PVC-TYPE PIPE (OR SIMILAR). RARELY (MAYBE NOT IN SOME REMOTE RURAL AREAS) ARE +THE CABLES JUST 'ALONE' IN THE GROUND. INSTEAD, THEY ARE USUALLY IN AN +UNDERGROUND CEMENT TUNNEL (RESEMBLES A SMALL SEWER OR STORMDRAIN). THE MANHOLES +ARE >HEAVY< AND WILL SAY 'BELL SYSTEM' ON THEM. THEY CAN BE OPEN ED WITH A 1/2 +INCH WIDE CROWBAR (HOOK SIDE) INSERTED IN THE TOP RECTANGULAR HOLE. IF YOU GET +IT OPEN, GO INSIDE!! THERE ARE LADDER RUNGS TO HELP YOU CLIMB DOWN. YOU WILL +SEE THE CABLE PIPES ON THE WALL, WITH THE BLUE AND WHITE STRIPED ONE BEING THE +INTEROFFICE TRUNK GRP (AT LEAST IN MY AREA). THE OTHERS ARE LOCAL LINES, AND +ARE USUALLY MARKED OR COLOR CODED. THERE IS ALMOST ALWAYS A POSTED COLOR CODE +CHART ON THE WALL, NOT TO MENTION TELCO MANUALS DESCRIBING THE CABLES AND +TERMINALS, SO I NEED NOT GET INTO DETAIL. AGAIN: >IF YOU CAN GET INTO A +BELL MANHOLE, DO IT!, IT WILL PAY OFF<. ALSO, THERE IS USUALLY SOME KIND OF +TEST EQUIPMENT, AND OFTEN BELL TEST SETS ARE LEFT IN THERE. SO GET YOUR +CROWBARS! + +-------------- +BRIDGING HEADS - (WE MS2'S) +-------------- + + THE INNOCENT-LOOKING GRAYISH-GREEN BOXES. WHEN IN GROUPS OF TWO OR THREE, +THEY ARE FOR SECONDAY/TERTIARY TERMINATION AND ACCESS POINTS (BRIDGED ACCESS). +THESE ARE THE WESTERN ELECTRIC SAI 55 OR 22/E TERMINAL CASES. THEY HOLD ON THE +ORDER OF 900-1200 CABLE PAIRS. THIS IS USUALLY THE SECOND TERM. POSITION ON THE +LOCAL LOOP (AFTER THE MTF FRAME AT THE CO/ OR THE UNDERGROUND 'FTP' POSITION). +THESE CAN BE EITHER TRUNK BRIDGES OR BRIDGING FOR RESIDENCES. THE AREA FEEDER +BRIDGING HEADS ARE USUALLY LARGER, AND THEY HAVE THE 'WESTERN ELECTRIC' LOGO AT +THE BOTTOM, WHEREAS THE NORMAL BRIDGING HEADS (WHICH MAY BE DIFFERENT IN SOME +AREAS DEPENDING ON THE COMPANY YOU ARE SERVED BY. GTE B.H'S LOOK SLIGHTLY +DIFFERENT. ALSO, DO NOT BE FOOLED BY SPRINKLER BOXES!) CAN BE FOUND IN JUST +ABOUT EVERY CITY. + TO OPEN A BRIDGING HEAD: IF IT IS LOCKED (AND YOU'RE FEELING DESTRUCTIVE), +PUT A HAMMER OR CROWBAR (THE SAME ONE YOU USED ON THE MANHOLE) IN THE SLOT +ABOVE THE TOP HINGE OF THE RIGHT DOOR. PULL HARD, AND THE DOOR WILL RIP OFF. +VERY EFFECTIVE! + IF IT ISN'T LOCKED (AS USUAL), TAKE A 7/16 INCH HEX SOCKET AND WITH IT, TURN +THE BOLT ABOUT 1/8 OF A TURN TO THE LEFT (YOU SHOULD HEAR A SPRING RELEASE +INSIDE). HOLDING THE BOLT, TURN THE HANDLE ALL THE WAY TO THE RIGHT AND PULL +OUT. + NOW INSIDE, FIRST CHECK FOR A TEST-SET (WHICH ARE OFTEN LEFT BY BELL +EMPLOYEES). THERE SHOULD BE A PANEL OF CABLE PAIRS + SCREW TERMINALS (TYPE +45/47IB REGULAR BINDERS) . PUSH THE PANEL BACK ABOUT AN INCH OR SO, AND ROTATE +THE TOP LATCH (ROUND WITH A FLAT SECTION) DOWNWARD. RELEASE THE PANEL AND IT +WILL FALL ALL THE WAY FORWARD. THERE IS USUALLY A LARGE AMOUNT OF WIRE AND +EXTRA TERMINALS. THE TEST-SETS ARE OFTEN HIDDEN HERE, SO DONT OVERLOOK IT (400 +FOOT ROLLS OF #22 SOLID WIRE ARE OFTEN NEAR THE TOP IN THE BACK OF THE BOX. +'BORROW THEM'). ON THE RIGHT DOOR IS A METAL BOX OF INSULATORS, BINDERS, CLIPS, +ETC. TAKE A FEW (COMPLIMENTS OF BELL...). ON EACH DOOR IS A USEFUL ROUND METAL +DEVICE. (SAYS 'INSERT GENTLY' OR 'CLAMP GENTLY - DO NOT OVERTIGHTEN' ETC..) ON +THE FRONT OF THE DISC, YOU SHOULD FIND TWO TERMINALS. THESE ARE FOR YOUR TEST +SET. (IF YOU DONT HAVE ONE, DONT DEPAIR -I'LL SHOW YOU WAYS TO MAKE BASIC TEST +SETS LATER IN THIS ARTICLE). HOOKING THE RING (-) WIRE TO THE 'R' TERMINAL; AND +THE TIP (+) WIRE TO THE OTHER. (BY THE WAY, AN EASY WAY TO DETERMINE THE +CORRECT POLARITY IS WITH A 1.5V LED. TAP IT TO THE TERM. PAIR, IF IT DOESNT + LIGHT, SWITCH THE POLES UNTIL IT DOES. WHEN IT LIGHTS, FIND THE LONGER OF THE +TWO LED POLES. THIS ONE WILL BE ON THE TIP WIRE (+)) BEHIND THE DISC IS A +COILED UP CORD. THIS SHOULD HAVE A SPECIALIZED CONNECTOR. ITS VERY USEFUL, +BECAUSE YOU DONT HAVE TO KEEP CONNECTING AND DISCONNECTING THE FONE (TEST SET) +ITSELF, AND THE CLIP IS DESIGNED TO AID IN LOCATING THE PAIR AND ASSURING THE +CORRECT POLARITY. + ON THE TERMINAL BOARD, THERE SHOULD BE ABOUT 20 PAIRS (RED/WHITE) PER ROW +PER SIDE. HOOK THE CLIP TO ANY TERMINAL PAIR, AND YOU'RE SET! DIAL OUT IF YOU +WANT, OR JUST LISTEN (IF SOMEONE'S ON THE LINE). LATER, I'LL SHOW YOU A WAY TO +SET UP A TRUE 'TAP' THAT YOU CAN SETUP, AND WILL LET THE PERSON DIAL OUT ON HIS +LINE AND RECEIVE CALLS AS NORMAL, AND YOU CAN LISTEN IN THE WHOLE TIME. MORE +ABOUT THIS LATER... + ON MAJOR PREFIX-AREA BRIDGING HEADS ('SAI' FOR AREA C.O. FEEDER CABLE) YOU +CAN SEE TEMPORARY 'LOCAL LOOPS', WHICH ARE TWO CABLE PAIRS (CABLE PAIR =RING + +TIP, A FONE LINE) THAT ARE DIRECTLY CONNECTED TO EACH OTHER ON THE TERMINAL +BOARD. THESE 'CHEAP LOOPS' AS THEY ARE CALLED, DO NOT WORK NEARLY AS WELL AS +THE EXISTING ONES SET UP IN THE SWITCHING HARDWARE AT THE EXCHANGE OFFICE. (TRY +SCANNING YOUR PREFIXES' 00XX OR 99XX #'S. THE TONE SIDES WILL ANNOUNCE +THEMSELVES WITH THE 1000 HZ LOOP TONE, AND THE HANG SIDE WILL GIVE NO RESPONSE. +THE FIRST PERSON SHOULD DIAL THE 'HANG' SIDE, AND THE OTHER PERSON DIAL THE, +TONE SIDE, AND THE TONE SHOULD STOP IF YOU HAVE GOT THE RIGHT LOOP). THE LOOPS +ARE USED IN FRAME TERMINATION AND IN SONIC/600 OHM TERM. TESTING AND +LINE/CABLE/FEEDER LOCATION. + IF YOU WANT TO FIND THE NUMBER OF THE LINE THAT YOU'RE ON, YOU CAN EITHER +TRY TO DECIPHER THE 'BRIDGING LOG' (OR WHATEVER), WHICH IS ON THE LEFT DOOR. IF +THAT DOESNT WORK, YOU CAN USE THE FOLLWING: + +--- +ANI # (AUTOMATIC NUMBER INDENTICATION) +--- + THIS IS A TELCO TEST NUMBER THAT REPORTS TO YOU THE NUMBER THAT YOU'RE +CALLING FROM (IT'S THE SAME, CHOPPY 'BELL BITCH' VOICE THAT YOU GET WHEN YOU +REACH A DISCONNECTED #) (PIP OR ONE OF THE 11X SERIES ANNOUNCE MENT FRAME +MACHINES.) + +FOR THE 213 NPA - DIAL 1223 + 213 NPA - (GTE AREAS) DIAL 114 + 408 NPA - DIAL 760 + 914 NPA - DIAL 990 + +THESE ARE EXTREMELY USEFUL WHEN MESSING WITH ANY KIND OF LINE TERMINALS, +FEEDER BOXES, ETC. + + WHEN FINISHED, BE SURE TO CUT OFF THE CONNECTOR AND TAKE IT WITH YOU (THEY +ARE VERY HANDY), AND CLOSE/LATCH THE BOX TO AVOID SUSPICION. + + +"CANS" - AERIAL-MOUNTED (TELEPHONE POLE TERMINAL) BRANCH FEEDER CABLE +SPLITTER. + ---- + +BASICALLY, TWO TYPES: + +1> MS3A SERVICE AREA INTERFACE. (LARGE, RECTANGULAR SILVER BOX AT THE END OF + EACH STREET.) + +2> SERIES 600 LOADING COIL, INCLUDES THE MSX AERIAL DROP SPLITTER. (BLACK, + ROUND OR RECTANGULAR THING AT EVERY TELEPHONE POLE.) + + +TYPE 1 - THIS IS THE CASE THAT TAKES THE UNDERGROUND CABLE FROM THE BRIDGER +AND RUNS IT TO THE AERIAL BRANCH FEEDER CABLE (THE LOWEST, LARGEST WIRE ON THE +TELEPHONE POLE). THE BOX IS ALWAYS ON THE POLE NEAREST THE BRIGING HEAD, WHERE +THE LINE COMES UP. LOOK FOR THE 'CALL BEFORE YOU DIG - UNDERGROUND CABLE' +STICKERS.. + THE CASE BOX IS HINGED, SO IF YOU WANT TO CLIMB THE POLE, YOU CAN OPEN IT +WITH NO PROBLEMS. THESE USUALLY HAVE 2 ROWS OF TERMINAL SETS. (TOTAL APPROX. +200-600 PAIRS, DEPENDING ON THE AREA.) THESE ARE ALL THE CABLE PAIRS FOR YOUR +STREET. (ITS SIMILAR TO A MINIATURE BRIDGING HEAD). USE/ABUSE IT IN THE SAME +MANNER AS WE DID BEFORE. (NOTE: ALL THE ACTIVE LINES CARRY FROM 15 TO 48 VDC, +AND EVEN 90VAC (WHEN RINGING), SO BE CAREFUL - IT'S NOT GOING TO HURT YOU, +BUT IT CAN SURPRISE YOU (AND IF YOU'RE HANGING BY ONE HAND FROM A TEL. POLE, IT +>CAN< BE HARMFUL!)) + OH, BY THE WAY, IF YOU USE ANI ON EVERY PAIR AND YOU FIND ONE THAT ISNT IN +USE ON YOUR STREET, YOU CAN HOOK IT UP FOR YOURSELF (ALMOST). ALSO, YOU HAVE TO +BE ABLE TO IMPERSONATE A TELCO TECHNICIAN AND REPORT THE NUMBER AS 'NEW ACTIVE' +(GIVING A FAKE NAME AND FAKE REPORT, ETC) I DONT RECOMMEND THIS AND IT PROBABLY +WONT (ALMOST POSITIVELY WONT) WORK, BUT THIS IS BASICALLY WHAT TELCO LINEMEN +DO).* + + * THE USE OF THE 'TEST BOARD' (A 7D# FOR LINEMEN TESTS, OFTEN FOUND +NXX-0003 OR NXX-0004) IS BEYOND THE SCOPE OF THIS ARTICLE, BUT WILL BE COVERED +IN A FUTURE ARTICLE. + + +TYPE 2 - THIS IS THE SPLITTER BOX FOR THE AERIAL DROP WIRES FOR THE GROUP OF +HOUSES AROUND THE POLE. (USUALLY 4 OR 5 HOUSES). USE IT LIKE I MENTIONED +BEFORE. THE TERMINALS (20 OR SO) WILL BE IN 2 HORIZONTAL ROWS OF SETS. THE +EXTRA WIRES THAT ARE JUST 'HANGING THERE' ARE PROVISIONS FOR EXTRA LINES TO +RESIDENCES (1 EXTRA LINE PER HOUSE, THATS WHY THE INSANE CHARGE FOR LINE #3). +IF ITS THE BOX FOR YOUR HOUSE ALSO, HAVE FUN AND SWAP LINES WITH YOUR NEIGHBOR! +'PIGGYBACK' THEM OR USE A CHEESEBOX FOR A LOOP-AROUND, ETC. AGAIN, I DONT +RECOMMEND THIS, AND ITS DIFFICULT TO DO IT CORRECTLY. (ALTHOUGH USEFUL) diff --git a/textfiles.com/phreak/WIRETAPPING/bug.txt b/textfiles.com/phreak/WIRETAPPING/bug.txt new file mode 100644 index 00000000..699d5287 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/bug.txt @@ -0,0 +1,208 @@ + + Automatic Phone Recorder + + by + + Atomic Punk + + May 1, 1989 + +This device will allow any standard cassette tape recorder the +ability to automatically record phone conversations. The device +will start the tape recorder when the phone handset is lifted and +stop the recorder when the handset is returned to the cradle. + +The device is a DC switch that is normally on via the forward +biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by +biasing its complement well into a saturated state via R4. The +DC switch is turned off via a negative voltage above that of the +Zener (D1). This voltage is usually about 48 volts and is the on +hook value of the phone line. This negative voltage over rides +the effect of R3 and keeps the circuit off. When the phone is +off the hook, the 48 volts drops to 10 volts, which is below the +[more] + +zener voltage of D1, and R3 now turns the circuit on. Audio +signal is via attenuator resistor R1 and DC isolating capacitors +C1 and C2. + +This device is really only a high impedance switch that isolates +the recording controlled device from the phone line via some +simple electronic circuitry. It requires no battery and obtains +power for operating from the remote jack that in most recorders +is a source of 6 volts. When the remote jack is grounded, +recorder operation starts, and when the grounding condition is +removed, recorder operation stops. + +Parts list: Here's all you need: + +Name Qty Description +R4 1 220 ohm 1/4 watt resistor +R3 1 39k ohm 1/4 watt resistor +R1 & R2 2 100k ohm 1/4 watt resistor +C1 & C2 2 0.01 mfd/ 50V disc cap. +Q2 1 PN2222 NPN Silicon +Q1 1 PN2907 NPN Silicon +[more] + +Z1 1 15 volt Zener diode +P1 1 Sub-mini plug 2.5mm dia. +CL1 & CL2 2 Alligator clips +P2 1 Mini-Plug 3.5mm dia. +Enclosure 1 Suitable enclosure for device +PB1 1 1.25x1.67 perfboard +WR4 (18") #24 hook-up black wire +WR3 (18") #24 hook-up red wire +Casto Castolite or paraffin wax + +[more] + +Circuit Diagram + + +Red wire +----------|---------Z1--------|--------------------|--------|---------- + | | | | +Green | | | | +-----| | | | | + | | | | | + | | | e | + | | | | | + | | R3 |-----R4---b-Q2 |---P1 + | | *No connection* | | | |To remote + | | | c c |of + | *|* | | | |recorder + |--- | ------------------|-----b-Q1 | | + | | | | | + | | e | | + | | |------------|--------| + | | + | | C1 +[more] + + | |----------------------------3 3-----------------| + | | + | |---P2 + | C2 |To Aux + |--------------R1-----------------3 3-----------------|on + Recorder + +** Green and Red wires go to corresponding color of telephone wires. +** Make sure to connect Q1 and Q2 properly -- follow label c,b,e + with the wires facing toward you and flat side up. + - c is the located on the upper right hand side + - b is the next wire left of c + - e is the next wire left of b + +Anyway that concludes this circuit. Now you'll be able to +monitor your phone line, and hear what goes on while you not +around. + +**** Coming soon ****** +How to safely build waterproof M-80s. + +(> +(> +(> + + Automatic Phone Recorder + + by + + Atomic Punk + + May 1, 1989 + +This device will allow any standard cassette tape recorder the +ability to automatically record phone conversations. The device +will start the tape recorder when the phone handset is lifted and +stop the recorder when the handset is returned to the cradle. + +The device is a DC switch that is normally on via the forward +biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by +biasing its complement well into a saturated state via R4. The +DC switch is turned off via a negative voltage above that of the +Zener (D1). This voltage is usually about 48 volts and is the on +hook value of the phone line. This negative voltage over rides +the effect of R3 and keeps the circuit off. When the phone is +off the hook, the 48 volts drops to 10 volts, which is below the +[more] + +zener voltage of D1, and R3 now turns the circuit on. Audio +signal is via attenuator resistor R1 and DC isolating capacitors +C1 and C2. + +This device is really only a high impedance switch that isolates +the recording controlled device from the phone line via some +simple electronic circuitry. It requires no battery and obtains +power for operating from the remote jack that in most recorders +is a source of 6 volts. When the remote jack is grounded, +recorder operation starts, and when the grounding condition is +removed, recorder operation stops. + +Parts list: Here's all you need: + +Name Qty Description +R4 1 220 ohm 1/4 watt resistor +R3 1 39k ohm 1/4 watt resistor +R1 & R2 2 100k ohm 1/4 watt resistor +C1 & C2 2 0.01 mfd/ 50V disc cap. +Q2 1 PN2222 NPN Silicon +Q1 1 PN2907 NPN Silicon +[more] + +Z1 1 15 volt Zener diode +P1 1 Sub-mini plug 2.5mm dia. +CL1 & CL2 2 Alligator clips +P2 1 Mini-Plug 3.5mm dia. +Enclosure 1 Suitable enclosure for device +PB1 1 1.25x1.67 perfboard +WR4 (18") #24 hook-up black wire +WR3 (18") #24 hook-up red wire +Casto Castolite or paraffin wax + +[more] + +Circuit Diagram + + +Red wire +----------|---------Z1--------|--------------------|--------|---------- + | | | | +Green | | | | +-----| | | | | + | | | | | + | | | e | + | | | | | + | | R3 |-----R4---b-Q2 |---P1 + | | *No connection* | | | |To remote + | | | c c |of + | *|* | | | |recorder + |--- | ------------------|-----b-Q1 | | + | | | | | + | | e | | + | | |------------|--------| + | | + | | C1 +[more] + + | |----------------------------3 3-----------------| + | | + | |---P2 + | C2 |To Aux + |--------------R1-----------------3 3-----------------|on + Recorder + +** Green and Red wires go to corresponding color of telephone wires. +** Make sure to connect Q1 and Q2 properly -- follow label c,b,e + with the wires facing toward you and flat side up. + - c is the located on the upper right hand side + - b is the next wire left of c + - e is the next wire left of b + +Anyway that concludes this circuit. Now you'll be able to +monitor your phone line, and hear what goes on while you not +around. + +**** Coming soon ****** +How to safely build waterproof M-80s. diff --git a/textfiles.com/phreak/WIRETAPPING/bugdetct.phk b/textfiles.com/phreak/WIRETAPPING/bugdetct.phk new file mode 100644 index 00000000..f193a031 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/bugdetct.phk @@ -0,0 +1,40 @@ + + +File: BUG DETECTION AT HOME + Read 24 times + + Bug Detection on Home phones + (COURTESY OF DR JIMMY AND MR JIM) + +First of all to test for bugs, you need a VOM (Multimeter) the higher the +impedance the better (a Digital with FET circuitry or a Vacuum Tube Volt Meter +is the best). + +First disconnect the phone line(s) AT BOTH ENDS. Undo the phone instrument and +hook it up to the entry point of the phone line from the outside world (Ma Bell +does not like you cut her off completely.) The scheme is the physically +isolate your house, apartment, etc from the outside world. But before you do +this measure the line voltage (It should be approximately 48 Volts). + +Now with the wires disconnected at both ee set your resistance scale to a high +reading and measure the resistance of the phone line, it should be very high on +the order of million ohms or more, this is the normal condition, since you +are measuring the resistance of an open circuit. If it is much less, say +50-100Kohms then you a device on the line that does not belong there, probably +a parallel bug. + +Now twist the end of the disconnected wire and go to the other end and measure +the resistance of this. This resistance should be about one ohm or two at the +most in a big house with a lot of phones. If it is more, then you probably +have a series bug. + +If in the first case, taking parallel measurements using a meter (not LED/LCD) +and you notice a "kick" in the needle, you probably have a line tap + +Now if you also make a measurement with the wire end twisted together and you +notice the resistance reads about 1-2kohms, then you may have a drop-out relay. + A drop-out relay is a relay that senses a phone going off hook, and signals a +tape recorder to start recording. + +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/WIRETAPPING/bugging.guide b/textfiles.com/phreak/WIRETAPPING/bugging.guide new file mode 100644 index 00000000..526fb760 Binary files /dev/null and b/textfiles.com/phreak/WIRETAPPING/bugging.guide differ diff --git a/textfiles.com/phreak/WIRETAPPING/bugging.phk b/textfiles.com/phreak/WIRETAPPING/bugging.phk new file mode 100644 index 00000000..c1cd12f0 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/bugging.phk @@ -0,0 +1,121 @@ + Bugs on a Budget + Inexpensive surveillance + Data Line 8-85. + +Post this phile as you will, but leave my name on it. + + Gordon Liddy dreamt up an elaborate scheme for bugging the Democratic National +Headquarters. Included were such things as a type of UHF bug that required an +O-scope for the listeners to find, and other bugs that got power thru paint-on +electrical connectors. He was also financed out of a slush fund controlled by +the most powerful men in the nation. + + I'm not that lucky. My money comes from a "Blue" collar job, so spending $5k +on a bug is laughable. Still, not getting the information I need because I +couldn't find any appropriate devices is just as silly. With a small bit of +skill, you can build a reliable intelligence collecting system for about $250. + + + 1. FOR LIVE SETUPS. If it's important or your targets are just paranoid, +forget about phone taps. They may set up a meeting place on the line and that +is about it. Besides, you can do a huge amount of random eavesdropping with a +live collection system. You'll need a good cardioid mike element, amplifier, +and set of headphones. The most efficient way to go is to purchase a Hunter's +or Bionic Ear (See the Sources section at the end for locations). They run from +$50 to $90. Everything is included in a package that looks a lot like a metal +police flashlight. But to narror the collection angle, a parabolic dish is +essential. Don't get the one available with the Ear, it's small and you'll look +dumb using it. Instead, but ETCO's 18" dish for about $35. Bend 3 heavy wires +(e.g. welding rods) to grip the dish edge and syspend the Ear in the center. I +used a hose clamp to secure it. Rubber bands link he support rods at te rear of +the dish. Note: the focus is at a point intersected by the plane of the dish +and a line extending out from the plastic "pip" in te center. Since the dish is +transparent and the amp faces the target, the setup isn't too conspicuous from a +distance. The regular commercial reflector is black and quite obvious when in +use. + + How good is the system? My hearing is below par and I was able to understand +whispers at 30m. The range you get may differ. In summer, crickets will drown +out a lot. Traffic and overhead jets can also do nasty things. Oh yes, there's +an automatic cutoff so if the target coughs, you won't have to pick up your +eardrums from the ground. + + + + 2. VISUAL SURVEILLANCE. Sometimes this is all you need, but mostly it +complements the audio. Forget the 17x80 monster binoculars you saw in Soldier +of Fortune. If a gnat on your arm farts, the scene will jump. Instead save a +lot of money and get one or two more suitable pieces of equipment. One is a +good pair of 7x50 binoculars. Buy from a wholesale place in Shotgun News and +save big. These can be used well at night because of their large objective +size. Some like a zoom feature, but I find it raises price and at these powers +isn't needed. + + Personally, I like to get further away and stay stationary for as long as +possible. Of course the parabolic setup is no good for audio at such a range +(100 to 300m). Oddly, I've never felt handicapped by not being able to hear the +action. You'd be surprised what lipreading and nonverbal cues you can pick up +with a little practice. I use a 20-60x60mm. spotting scope. It comes mounted +on a tripod for flat surface use, but I find a photographers C-clamp tripod is +handier for using on car windows. In daylight nothing can come close to this +system. It's less than 1/2m long and at 60x it's actually easy to reas +newspaper headlines at 1Km or so. After all, these things were meant to spor +bullet holes in targets at up to 500m and the cheapest low power spotter will do +that with no problem. Just how much is 60x ? Well, most rifle scopes are 4x, +binoculars are typically 7x, and the classic sniper scopes (Unertl and +Leatherwood) are only 10x. Just look through one at a sporting goods store and +you'll see what a deal these are. Astronomy-type telescopes usually are too +big, show an upside-down image, and have too much magnification for their +objective size, making the view too dark. + + In fact, at night the spotter is a bit dim even at only 20x. Nothing's +perfect. + + + + 3. WIRELESS. Here's the area most people immediately go for and sometimes +get suckered real bad. Worst are "Law Enforcement Supply" places. Some sell to +anyone with a letterhead. For the money they charge, it actually makes no +difference who you are; besides it's YOU who will get nailed for impersonating a +cop if THEY decide to turn you in. One of these joints advertises in Soldier of +Fortune and chagres $10 for their catalog. Its full of neat shit, all at least +5x over what anyone else could even think of charging. ETCO, on the other hand, +sells lots of transmitters for "wireless mikes". They also sell cheap mike +elements. Hmmm. For $25 you can build a workable unit. Nothing Harry Call +would be caught using, but usable nonetheless. Those little wireless mikes you +see in the backs of magazines shown next to a paper clip are really quite good, +but make sure they use the Mercury batteries. Even Alkalines will crap out +after a few hours of constant transmitting. + + Those and most inexpensive transmitters work in the Commercial FM Band. The +good news is that you don't need a VHF receiver to pick them up, a regular FM +set does fine. Unfortunately, the same goes for the target. The best way out +is to find a station at either end of the band (88 or 108) that the target isn't +likely to listen to. In St. Louis it's KMJM at 107.7, an all Black station +(assuming the target is a WASPish businessman or a rocker) . Set your bug to +transmit on top of the station, and get in REAL CLOSE with your receiver. Since +it's at the end of tha dial, he/she isn't likely to tune past it and get a jolt +of audio feedback. + + Finally, a bit of common sense. Wireless equipment should not take up a large +portion of your budget. It's hard to place, risky to maintain, and will be +destroyed if found. Also, the cops sort of look down on this sort of thing to +the tune of Federal time. Watergate did a lot to influence that. Don't be a +putz and try to break in a place to recover a $40 transmitter. Consider them +disposable and you may stay free. + + + 4.GETTING IT DOWN. Buy a Voice-activated (VOX) microcassette. It'll free you +up for more important stuff than listening to silence or irrelevant bullshit. +Especially with transmitters, a lot of time is just wasted. Live monitoring is +fun... for fifteen minutes. A good unit is the Panasonic RN 109A at about $50. +It'll record 1 hour per side at low speed. With the VOX on, that's an hour of +solid sound. Use one on the parabolic dish, too. Replay through your stereo +and use the equalizer or tone controls to sharpen up the stuff you may have +missed the first time. + + Stay tuned to this BBS for more philes from Data Line, the Old Man who taught +Donald Segretti how to rig his first election in college. + +MCI Telex # 650-240-6356. + \ No newline at end of file diff --git a/textfiles.com/phreak/WIRETAPPING/buggy.phk b/textfiles.com/phreak/WIRETAPPING/buggy.phk new file mode 100644 index 00000000..b517d578 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/buggy.phk @@ -0,0 +1,30 @@ + + IN ANSWER TO ALL THOSE WHO DON'T KNOW WHAT AN INFINITY TRANSMITTER IS, HERE +IS A LITTLE HISTORY: + + A GUY BY THE NAME OF MANNY MITTLEMAN RAN A COMPANY CALLED THE WIRELESS GUITAR +COMPANY LOCATED ON LIBERTY ST. IN NY. ASIDE FROM WIRELESS GUITARS, MANNY ALSO +BUILT ALL SORTS OF ELECTRONIC WIRELESS "BUGS". ONE ITEM, THE INFINITY +TRANSMITTER WAS A DEVICE THAT WAS PLACED INSIDE AN UNSUSPECTING PERSONS +TELEPHONE. WHEN THE PHONE NUMBER OF THAT TELEPHONE WAS DIALED AND A CERTAIN +NOTE WAS BLOWN INTO THE PHONE FROM A HOHNER, KEY-OF-C, HARMONICA, THE BUGGED +PHONE DID NOT RING, AND WHAT'S MORE, ENABLED THE CALLER TO THEN HEAR EVERYTHING +SAID IN THE ROOM THAT THE PHONE WAS LOCATED IN. AS LONG AS THE CALLER WANTED +TO STAY ON THE PHONE, ALL WAS OPEN TO HIM OR HER. IF THE PHONE WAS LIFTED OFF +THE HOOK, THE TRANSMITTER WAS DISCONECTED AND THE "BUGGED" PARTY RECEIVED A +DIAL TONE AS IF NOTHING WAS WRONG WITH THE LINE. + + REMEMBER, ALL THIS WAS CONSTRUCTED IN THE 1960x'S WHEN IC'S WERE NOT AS +COMMONPLACE AS THEY ARE TODAY. ALSO BEAR IN MIND THAT DURING THAT PERIOD IN +TIME, EVEN THE TELEPHONE COMPANY WAS NOT QUITE SURE ON HOW WELL OR HOW PORTABLE +TONE DECODING WAS. + + MY HAT IS STILL OFF TO TO MANNY MITTLEMAN, THE GREATEST DEVELOPER OF +TELEPHONE GIMMICKERY AND BUGGER OF HOTEL ROOMS IN DIVORCE CASES. + + IF THERE IS ANY INTEREST ON BUGGING, I'LL BE GLAD TO LET YOU KNOW SOME MORE +OF MANNY'S STUFF. + +PS. MANY GOVERNMENT AGENCY'S WERE SOME OF MANNY'S BEST CUSTOMERS. +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/WIRETAPPING/bugphone.phk b/textfiles.com/phreak/WIRETAPPING/bugphone.phk new file mode 100644 index 00000000..0daf4733 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/bugphone.phk @@ -0,0 +1,96 @@ +bugoph   phone.txt + Automatic Phone Recorder + + by + + Atomic Punk + + May 1, 1989 + +This device will allow any standard cassette tape recorder the +ability to automatically record phone conversations. The device +will start the tape recorder when the phone handset is lifted and +stop the recorder when the handset is returned to the cradle. + +The device is a DC switch that is normally on via the forward +biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by +biasing its complement well into a saturated state via R4. The +DC switch is turned off via a negative voltage above that of the +Zener (D1). This voltage is usually about 48 volts and is the on +hook value of the phone line. This negative voltage over rides +the effect of R3 and keeps the circuit off. When the phone is +off the hook, the 48 volts drops to 10 volts, which is below the +[more] zener voltage of D1, and R3 now turns the circuit on. Audio +signal is via attenuator resistor R1 and DC isolating capacitors +C1 and C2. + +This device is really only a high impedance switch that isolates +the recording controlled device from the phone line via some +simple electronic circuitry. It requires no battery and obtains +power for operating from the remote jack that in most recorders +is a source of 6 volts. When the remote jack is grounded, +recorder operation starts, and when the grounding condition is +removed, recorder operation stops. + +Parts list: Here's all you need: + +Name Qty Description +R4 1 220 ohm 1/4 watt resistor +R3 1 39k ohm 1/4 watt resistor +R1 & R2 2 100k ohm 1/4 watt resistor +C1 & C2 2 0.01 mfd/ 50V disc cap. +Q2 1 PN2222 NPN Silicon +Q1 1 PN2907 NPN Silicon +[more] Z1 1 15 volt Zener diode +P1 1 Sub-mini plug 2.5mm dia. +CL1 & CL2 2 Alligator clips +P2 1 Mini-Plug 3.5mm dia. +Enclosure 1 Suitable enclosure for device +PB1 1 1.25x1.67 perfboard +WR4 (18") #24 hook-up black wire +WR3 (18") #24 hook-up red wire +Casto Castolite or paraffin wax + +[more] Circuit Diagram + + +Red wire +----------|---------Z1--------|--------------------|--------|---------- + | | | | +Green | | | | +-----| | | | | + | | | | | + | | | e | + | | | | | + | | R3 |-----R4---b-Q2 |---P1 + | | *No connection* | | | |To remote + | | | c c |of + | *|* | | | |recorder + |--- | ------------------|-----b-Q1 | | + | | | | | + | | e | | + | | |------------|--------| + | | + | | C1 +[more] | |----------------------------³ ³-----------------| + | | + | |---P2 + | C2 |To Aux + |--------------R1-----------------³ ³-----------------|on + Recorder + +** Green and Red wires go to corresponding color of telephone wires. +** Make sure to connect Q1 and Q2 properly -- follow label c,b,e + with the wires facing toward you and flat side up. + - c is the located on the upper right hand side + - b is the next wire left of c + - e is the next wire left of b + +Anyway that concludes this circuit. Now you'll be able to +monitor your phone line, and hear what goes on while you not +around. + +**** Coming soon ****** +How to safely build waterproof M-80s. + +(> \ No newline at end of file diff --git a/textfiles.com/phreak/WIRETAPPING/bugstaps.txt b/textfiles.com/phreak/WIRETAPPING/bugstaps.txt new file mode 100644 index 00000000..bd59c2be --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/bugstaps.txt @@ -0,0 +1,48 @@ +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +% BUGS & % +% HOW TO TAP SOMEONES ROOM % +% % +% BY ---> *$> FIREBALL <$* % +% % +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +HAVE YOU EVER HAD A STRONG DESIRE TO KNOW WHAT BOY YOUR OLDER SISTER LIKES +OR HOW YOUR PARENTS SEX LIFE IS GOING, WELL NOW YOU CAN KNOW ALL BY +BUGGING THERE ROOMS! + +THE FIRST THING YOU CAN USE IS THE WIRELESS MICROPHONE FROM RADIO SHACK- +$6.99. IT IS DESIGNED TO PUT VOICES ON TO AN FM RADIO BUT NO ONE SAYS YOU +CAN'T HIDE IT AND LET IT PICK UP UNSUSPECTING PEOPLE....FIRST TUNE THE +MICROPHONE WITH ANY BLANKSPOT ON YOUR FM RADIO (DON'T WORRY IT WILL +EXPLAIN HOW TO TUNE IT ON THE BACK OF THE PACKAGE.) ....THEN HIDE IT WHEN +NO ONE IS AROUND (WHEN HIDING THE MICRO- PHONE TALK INTO IT AS YOU'RE +WALKING TO MAKE SURE YOU HAVEN'T WALKED OUT OF IT'S RANGE.) + +THERE ARE, HOWEVER, 2 DISADVANTAGES TO USING ONE OF THESE MICROPHONES: + + 1) YOU CAN ONLY PUT IT IN A ROOM THAT +IS RIGHT NEXT TO YOUR ROOM AND ONLY +ONE WALL CAN SEPERATE THEM. + + 2) THE MIKE IS 8 INCHES LONG AND THE +ONLY DECENT HIDING PLACES FOR SOMETHING +THAT BIG IS UNDER A BED OR IN A CLOSET. +(YOU MAY WANT TO TAKE IT APART TO MAKE +IT SMALLER BUT I DONT RECCOMMEND DOING +THIS.) + +ANOTHER THING YOU CAN USE IS THE CLIP ON WIRELESS MIKE BY RADIO SHACK FOR +ABOUT $18. IT WORKS IN BASICLY THE SAME WAY EXCEPT IT IS VERY SMALL AND IT +WILL WORK THE DISTANCE OF YOUR HOUSE AND POSSIBLY EVEN YOUR NEIGHBORS +HOUSE. + + HAVE PHUN...I SURE DID!! + STORE MANAGER. + CALL THE UNDERGROUND AT: + 201-223-64 CALL THE BASEMENT:HEAD UNDERGROUND +BBS AT......201-223-6404.... + +Downloaded from Just Say Yes. 2 lines, More than 500 files online! + Full access on first call. 415-922-2008 CASFA + + diff --git a/textfiles.com/phreak/WIRETAPPING/buildbug.phk b/textfiles.com/phreak/WIRETAPPING/buildbug.phk new file mode 100644 index 00000000..b97894a7 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/buildbug.phk @@ -0,0 +1,118 @@ + This file Presented by METRONET system (301)-944-3023 The bug's that this +device detects are Infinity transmitters, read the Infinity transmitter +bulletin for more info. + + :::::::::::::::::::::::::::::::::::::: + : : + : How to build a Bug Detector : + : : + : by : + : : + : The Gremlin : + : : + :::::::::::::::::::::::::::::::::::::: + + + +Warning: This formatted for 80 column and upper/lower case capabilities... + +][][][ +Basic theory +][][][ + +Because most bugs are triggered through certain frequencies, it is very simple +to build a small sweeping device that will trigger any bug present. The two +IC's are what create the oscillating tone. The IC1 operates at .8 Hz where the +IC2 runs at about 10 Hz. Frequency is determined by this formula: + +f=1.44/(R1+2R2)C) + +f measured in Hertz, R in megohms, and C in microfarads + +The oscillation can be varied by the voltage placed upon pin #5. This is how +we create the wave sound. When voltage goes up, so does the frequency, and +vice-versa. + +Normally, the output pin 3 is a square wave. Since we need varying wave at pin +#5, we need a triangular wave. We get this through integrating the square wave +created at pin #3 of IC1. It is acheived by D1, D2, R3, R4 and C2. + +This varying output is fed into the phone line by transformer T1 which has an 8 +ohm winding going to pin #3 of IC2 and the 500 end to a 0.1 microfarad capaci- +tator at the phone line. + +Enuf talk..let's get movin! + + +][][][ +Schematic Design +][][][ + + + +9v + + __________|_____________________________ +| _|__|_ _|__|_ | +R1 | 4 8 | _||R2__R4__| | | | | +R2 | ic1 | | | ic2 | R6 D3 +| +-+6 | ___| | 6+-+ | V +| | | | | | | | | - ++---+-+7 | | +--+3 7+-+-----+----+ +| |___1__| | | |___1__| | +| | | | | C4 +| | | | | ^ +C1 | C2 T1 _|_._C3|(_. | +^ | ^ 8--500<_|_. | +|_________|______________|__|______|__________| + | + -G- + + +][][][ +Parts List +][][][ + + C1 10-uF electrolytic capacitator 25 WDVC + C2 300-uF electrolytic capacitator 25 WDVC + C3 0.1-uF capacitator + C4 0.068-uF capacitator + D1-D3 1N914 + IC1,IC2 555 timers + R1, R4-R6 1-kilohm resistors + R2 91-kilohm resistor + R3 22 kilohm resistor + T1 500-to-8 ohm audio output transformer + +][][][ +Construction +------------ + +When building this unit, it is very useful to use a breadboard or vector board. +I suggest that leads being connected to phone line (T1, C3) end in a jack or a +modular connector to make the hookup easier. To test it, hook it to the phone +line (not the suspected line) and call the line you suspect is being bugged. +The party you are calling should not answer the phone. Now, the unit is +activated. 3 times, every 4 seconds, the oscillator will go up to 10 kHz and +back down again..like a bell curve..If there is a frequency sensitive bug on +the line, the phone will stop ringing, and you will be able to hear everything +said in the room. If the phone keeps ringing, chances are that all is +fine..unless the bug requires a multi-frequency trigger..but these are very +rare.. + +So, we can see that 415-BUG-1111 really does work! It creates the tone..any +click heard is the Phone Co's (or whoever is bugging) speaker/tape recorder +picking up! + + +Have phun, and hope it helped! + +The Gremlin + +...call the Gremlin's Lair..201-536-7794..today!... + +[Thanks again Metronet!] +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/WIRETAPPING/caller b/textfiles.com/phreak/WIRETAPPING/caller new file mode 100644 index 00000000..5b94eb1c --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/caller @@ -0,0 +1,133 @@ + +NOTES ON RECORDING CALLER ID signals ....(AND VOICE NOTES) + +There have been a number of people who have complained that caller +id is not working perfectly in their area. I have been working +with ZyXEL to try to get it and distinctive ring working perfectly. +It now does work in most of Canada and the US. +Caller id works great combined +with distinctive ring. +I enjoy such features as, if the modem encounters a busy bbs, it +sets distinctive ring to answer a CALL return (another feature +from the phone company), then answers in originate mode. Thus you +can make contact with the bbs at the first opportunity after the +line clears, and not have your modem be disturbed by other calls. + +For those (hopefully few) people who still have problems with +caller-id, here is a simple way to get information to allow +these problems to be resolved more quickly. In the past I circulated +a circuit to do this. + +However, thanks to the new voice features, there is an easier way. +The idea is to record the ring/callerid signalling on a voice file +which can then be listened to, and uploaded to the engineers +if necessary. This also allows the cadence of the distinctive ring +to be measured if necessary. + +It is REALLY simple to do also and is fun because you can even +listen to the signal and get a bit of an idea what might be wrong, +even without sending in the file. It is also instructive to +write a little voice display program to become more familiar with +this format-- since the signals are predictable, monotonic, and +thus relatively easy to analyse with a simple program. + +One of the problems is that some exchanges do not seem to follow +the Bellcore specs for callerid. The way it is supposed to work, +is that after the first complete ring (or distinctive ring) +stops, there is a 500 ms +pause, then a 250 ms section of "continuous" +U characters sent (called a channel seizure signal), then a 150 ms +section of mark sent, then the data. A simple number will take +about 200 ms further. Then silence reigns until the next ring. + +Now the tones used are 1200 hz for the mark or 1 bit, and +2200 for the space or 0 bit. Data is sent at 1200 baud in +an asychronous mode. (this is called bell 202 standard). + +Now the The U character is interesting in that it is 1 bit on , +one bit off. +Thus when it is being sent in a continuous mode, it also looks +like 250 ms of the frequency shift keying signal shaped as +a 600 hz square wave. What does this mean?? it means that +it sounds like a quarter second of 600 hz tone. + +So you should hear a ring, a 1/2 second of silence, a 1/4 second +of 600 hz (fundamental) tone, and then a quarter second +of 1200 hz tone-- followed by a short blast of a higher note. + +What can go wrong?? 1st, one problem is that some switches don;t +have a proper pause. you might get the U's not sent continuously +which might sound like a lower note. Third the mark might not +be long enough. next the frequencies may not be correct. +The data can come slowly--with up to 2 characters of mark +signals between data. (according to the spec). Thus you can +give ZyXEL some information without sending the file. Your local +exchange sends all these notes (they are not sent from long distance), +so they are not attenuated very much. +Please also try to find out what kind of switch the exchange has. This +information can often be obtained from 611 repair service from a +nice teckie. Another interesting thing is some of these switches have +more than one way caller id can be sent. They may just be set to +do it the non compliant way!! perhaps the technical people do not +know they have a choice. + +Once you have the voice file, +Another crude way of timing, is to use a hex editor, and lop off pieces +from the end of the file (checking for the shielded code--and +preserving shielded data--make sure the file is properly terminated). +this way you can listen do some timing +by looking a t the size of the lopped off file. You can even look +at the raw data, and get the idea which area you are in. (espec +in 2 bit mode). +A less crude way, is to write a little program-- hey and what better +way for all you folks wanting to write a voice mail system to +force yourself to get started!. You can convert the voice file +into one readable by some of the standard voice/oscilloscope +sound blaster type programs. so you can see it on your screen. + +The idea is to find out what went wrong, tell ZyXEL and provide +a backup recording. + +Now-- you may ask,, how do I get started. WELLL,, there is +a little trick. You need to read the signals without actually +answering the line. The best way to do this is to fool the +phone company into thinking you have not answered the line. +One very easy way to do this is to get a capacitor and put it +in series with the line. I found a .68 microfarad 400 volt +non polarized (ie no + on one of the terminals) +capacitor (eg from radio shack).--just a cheap +mylar capacitor (could even be 200 volts). (but +.22 - 4 microfarad also seemed to work). and put it +in series with the line. ONe easy way to do this is to modify +your wall plug (which has screws ). Unscrew one red wire, +and put a capacitor in series with it and the other red wire +formerly going to the same terminal. You may want to leave +an extension phone plugged in on another outlet so you can +hear the ring (and answer any calls you get while playing). + +Now bring up your zfax and select the voice utilties. pick +record voice and select the telco line. then before starting +the recording by pushing enter on the OK message, + have someone dial your phone. press enter about the time they +have finished dialing your phone. This will creat a nice short +voice file. PUSH ESCAPE as the second ring starts. This +should create a nice 30k file or so with all the info on it. +Then play back the voice and start analysing. You should be +able to hear it as well as a regular call on your internal +modem speaker. The ring will sound like a blast of sound--but +not too loud and you should hear a beat of nothing (.5 sec) then +beeep(600hz,1/4 sec) beep (1200hz 1/8 sec) bep (1800-2400hz 1/16 sec). + + I am interested in any voice software people do also. Please +send me a note if you have some success. I would also love to +supply you with a ZyXEL modem, esp if you are in Canada. +(I can provide extra callerid software also) + +George Vande Bunte PENG +OCOMP +416 5341508 gvb@telly.on.ca +238 Davenport Rd. Toronto m5r1j6 + +Please keep whole file together. + + diff --git a/textfiles.com/phreak/WIRETAPPING/callwai.txt b/textfiles.com/phreak/WIRETAPPING/callwai.txt new file mode 100644 index 00000000..1cf3ede8 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/callwai.txt @@ -0,0 +1,67 @@ + + + ==)--- P TO PAUSE S TO STOP ---(== + + ++*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+ +* * ++ THE CALL WAITING TAP + +* * ++ WRITTEN BY: The Byte + +* * ++ DISTRIBUTED BY: Marauder + +*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+* + + So, you have an enemy who talks behind your back, eh? Or, maybe you just +would like to "listen" in on your friend's conversations? Well, if you have +2 phone lines and call waiting on one of them, you are in luck. (Only one +prob|em: your friend must also have call waiting!) + +Procedure: + +[1] Call up your friend with the phone you want to listen with. When he + answers call waiting (he's already on the phone, and you are the 2nd + caller), then you either sit there or say: sorry, I have the wrong #. + +[2] Next, you wait until he goes back to the other line (puts you on hold). + +[3] Then, pick up your other line and call ->YOUR<- call waiting. + +[4] Answer call waiting + +[5] Then go back to him. (Answer, and then click back.. Click ->2<- times + Answer, and go back..) + +[6] Hang up your second line + +[7] You are now on the line! + +[8] Listen and be Q U I E T ! He can hear you! + +Techniques I use to prevent noise or confusion: + +If you have call forwarding, turn it on and forward calls somewhere +before you start listening. If a call comes through on your call waiting +circuit, the people talking (your buddie and his pal) will not hear +anything, but after you answer call waiting and come back, they will +hear the other call hang up (two clicks). If you don't have call forwarding, +I suggest you get it if you are going to make a habit of this, because it +will become a major pain in the ass. When your call waiting rings, you are +removed from the "listening" conversation and placed back on his hold +circuit. In order to get back on, you must answer the phone and wait for +your party (when you answer the phone, tell the guy you are in a hurry and +you have to go or you'll call him back later or something) to hang up. When +he or she hangs up, you will be back on the conversation. Then, one of your +pals will say: What was that? (because of the clicks).. So, try to use call +forwarding if you can. Remember: Have fun, and don't abuse it. I am not sure +about it, because I just discovered it. It is illegal (what isn't these days) +because it is "invading privacy". I don't know if the phone company just did +not realize there was a flaw in it, or that was planned for line testing, I +am not sure. Have fun! +-THE BYTE +=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= +[ Be careful and remember in no way ] +[ am I responsible for your actions ] +Uploaded to P-80 by John Tynes + +   'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS \ No newline at end of file diff --git a/textfiles.com/phreak/WIRETAPPING/cordless.phk b/textfiles.com/phreak/WIRETAPPING/cordless.phk new file mode 100644 index 00000000..0e94f1be --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/cordless.phk @@ -0,0 +1,117 @@ + + +)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()( +)( How To Listen In On Cordless Telephone Conversations )( +)( )( +)( An Original 'Phile' By: Beowulf )( +)( )( +)( Call The Outhouse BBS 201-756-9575 )( +)( )( +)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()( + + Have you ever wanted to know what your brother/sister/parents/ friends/enemies +were saying as they hid somewhere, cordless phone in hand? With this phile, now +you can! Just follow the simple instructions outlined inside. + + First some information about cordless telephones: + + The original cordless telephones (1978-about late 1983) were made to be used +on the 1.6 to 1.8 MHz band. If you will notice, 1.6 MHz is also the top end of +the AM broadcast band. These phones operate on AM (just like the radio +stations) and use the wiring in your house for an antenna. The power of these +phones is 1/10 of a watt in most cases, or about 1/50th of the power that your +average CB radio will put out. So, not having a lot of power, it is tough to +hear these phones. You know how they say '500 foot range'? Sure, that's the +range of the handset to the base, but not of the signals emitted by the base! +Which means that on good nights you can hear them for many miles (I live in NJ +an have heard telephones VERY loudly from NY City, 35 MILES away!). + + The newer phones, however, are not as easy to hear. They operate on FM on the +49 MHz band, which is the same frequency which your little walkie-talkies that +you loved as a ten year old operate on. These phones require a little bit more +effort to be heard than do the old ones (and a little $$$). Never fear, +however, because about 1 out of 10 phones is the old style, and they are still +being made and sold today. + + How To Do It: + + For the old style phones, you will need to get a pocket size AM transistor +radio. The one I used was an AM/FM Realistic (bought for $9 at Radio Shack). +There should be a small plastic box inside the radio. This little 'box' is the +VFO (Variable Frequency Oscillator) which controlls the frequency of the radio. +Now of course, you aren't going to have a digital frequency counter (they only +cost $400, so everyone should have at least two of them) so before you do +anything, turn on the radio and tune to the top of the band and find the station +which is closest to the top of the broadcast band. Write down the frequency so +you have something to compare to later. + + Now, turn off the radio, get a small size screwdriver, and adjust the small +screw(s) on the back of the little plastic box. Don't turn them more than a +quarter turn at a time. Now, when you have done your first 'tweak' of the +screws, turn on the radio and see where that station at the top of the band is +now on the frequency dial. When you have gotten the station 150-200 kHz down +from where it was, (like if the frequency was 1600, get it down between 1400 and +1450), you are all set to recieve cordless telephones at the top end of the +radio! Note: this little 'trick' may not work as well on all radios, but it is +worth a try. If worse comes to worse, you can turn them back. + + The ideal distance is a close to the base as you can get, but this sucker +should pull in signals from up to 500 feet away with no problem. Simply go near +someones house with this, and then have fun! + + + Another way: Another way to do this, if the VFO adjustment trick doesn't +work, is to adjust the small metal boxes that have little colored screws in +them. These are the tuning coils for the reciever circuit, and they affect the +frequency also. Another possibility is a combination of turning the VFO screws +and the coils to try to get the desired effect. Good Luck! + + Now for the tough ones, the new phones. The new phones work on the 49 MHz +band. You are going to need one of the 'new' walkie talkies that operate on 49 +MHz ===- FM -=== (the cheap shit ones are AM). If you decide to invest in one +at Radio Shack or similar store, make damn sure you get FM walkie talkies. If +you get AM, you're screwed, unless you have a friend who is killer into +electronics or ham radio who has the knowledge to convert AM to FM. (Yes, it +can be done. I have done it with CB's, and it is great for CB because no one +can understand what you are saying unless they have a FM-converted +CB.....Hmm.....that may be my next text phile...look for it!!) Anyway.....when +you get your FM walkie talkie, you can do one of two things: + + A) You can play the adjust the coils trick as mentioned in the last article +(there is no VFO because walkie talkies are crystal controlled). + + B) You can change the crystal. Popular frequencies for cordless phones are +49.830, 49.860 and 49.890 MHz. These crystals can be obtained from electronic +supply houses (like ones that sell chips for your Apple) for about $2 or less +each. + + And that just about concludes this phile. There are two other shortcut +methods that can be used to bypass this mess and get you listening in right +away. + + 1) Get a general coverage receiver. They cover all frequencies from 100 kHz +to 30 MHz, and will provide you with 'armchair' reception because you can hook +up a monster antenna. (I have a 1964 vintage model that I got for $10 sitting +on my desk with a 600 foot long piece of wire for an antenna....boy, I know +everything in my neighborhood before the ladies start gossiping!) + + 2) If you play guitar or bass, and have a 'wireless' system for your guitar +like the Nagy 49R, you can hook up a 12 volt lantern battery and go prowling +around listening for the phones. (Bass rules!) + + Method 1 only works on the old phones because of the frequency limitations of +the reciever, and method 2 is for new phones only because the 'wireless' systems +only work on 49 MHz FM. + + Have phun with your new knowledge, and look for more philes from me in the +future (that CB FM is a good idea.....hmmmm...) + + +)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()( +)( This has been on original phile by: Beowulf )( +)( Copyright June 1985 This file is for use on AE, Catsend, and )( +)( AE/BBS's only. )( +)( Call The Outhouse BBS 201-756-9575 24 hours a day! )( +)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()( +Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open + \ No newline at end of file diff --git a/textfiles.com/phreak/WIRETAPPING/datatap.hac b/textfiles.com/phreak/WIRETAPPING/datatap.hac new file mode 100644 index 00000000..e010aa8f Binary files /dev/null and b/textfiles.com/phreak/WIRETAPPING/datatap.hac differ diff --git a/textfiles.com/phreak/WIRETAPPING/detectbug.phk b/textfiles.com/phreak/WIRETAPPING/detectbug.phk new file mode 100644 index 00000000..2bea5f1b --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/detectbug.phk @@ -0,0 +1,61 @@ +Title: Bugging, detecting bugs + + + + [ Detecting Bugs on Home Phones ] + [ By: Dr. Jimmy and Mr. Jim ] + + +FIRST OF ALL TO TEST FOR BUGS, YOU NEED A VOM (MULTIMETER) THE HIGHER +THE IMPEDANCE THE BETTER (A DIGITAL WITH FET CIRCUITRY OR A VACUUM TUBE +VOLT METER IS THE BEST). + +FIRST DISCONNECT THE PHONE LINE(S) AT BOTH ENDS. UNDO THE PHONE INSTRUMENT +AND HOOK IT UP TO THE ENTRY POINT OF THE PHONE LINE FROM THE OUTSIDE WORLD +(MA BELL DOES NOT LIKE YOU CUT HER OFF COMPLETELY.) THE SCHEME IS THE PHYSI- +CALLY ISOLATE YOUR HOUSE, APARTMENT, FROM THE OUTSIDE WORLD. BUT BEFORE YOU +DO THIS MEASURE THE LINE VOLTAGE (IT SHOULD BE APPROXIMATELY 48 VOLTS). + +NOW WITH THE WIRES DISCONNECTED AT BOTH ENDS SET YOUR RESISTANCE SCALE TO A +HIGH READING AND MEASURE THE RESISTANCE OF THE PHONE LINE, IT SHOULD BE VERY +HIGH ON THE ORDER OF MILLION OHMS OR MORE, THIS IS THE NORMAL CONDITION, +SINCE YOU ARE MEASURING THE RESISTANCE OF AN OPEN CIRCUIT. IF IT IS MUCH LESS, +SAY 50-100KOHMS THEN YOU HAVE A DEVICE ON THE LINE THAT DOES NOT BELONG THERE, +PROBABLY A PARALLEL BUG. + +NOW TWIST THE END OF THE DISCONNECTED WIRE AND GO TO THE OTHER END AND +MEASURE THE RESISTANCE OF THIS. THIS RESISTANCE SHOULD BE ABOUT ONE OHM OR +TWO AT THE MOST IN A BIG HOUSE WITH A LOT OF PHONES. IF IT IS MORE, THEN +YOU PROBABLY HAVE A SERIES BUG. + +IF IN THE FIRST CASE, TAKING PARALLEL MEASUREMENTS USING A METER (NOT LED/ +LCD) AND YOU NOTICE A "KICK" IN THE NEEDLE, YOU PROBABLY HAVE A LINE TAP + +NOW IF YOU ALSO MAKE A MEASUREMENT WITH THE WIRE END TWISTED TOGETHER AND YOU +NOTICE THE RESISTANCE READS ABOUT 1-2KOHMS, THEN YOU MAY HAVE A DROP-OUT +RELAY. A DROP-OUT RELAY IS A RELAY THAT SENSES A PHONE GOING OFF HOOK, AND +SIGNALS A TAPE RECORDER TO START RECORDING. + +ANOTHER TEST TO DO WITH THE PHONES STIL HOOKED UP TO THE OUTSIDE WORLD, ON HOOK +VOLTAGE IS ABOUT 48 VOLTS AND OFF HOOK IS ABOUT 6-10 VOLTS. ANY OTHER CON- +DITIONS MAY MEAN TELEPHONE SURVEILLANCE + +IF YOU USE A WIDE RANGE AUDIO FREQUENCY GENERATOR AND CALL YOU HOUSE, APARTMENT +ETC. FROM ANOTHER PHONE AND SWEEP UP AN DOWN TE SPECTRUM, AND YOU NOTICE THE +PHONE ANSWERS ITSELF SOMEWHERE IN THE SWEEP YOU PROBABLY HAVE AN INFINITY +TRANSMITTER ON YOUR LINE. + +THE ABOVE INFORMATION TELLS NOTHING BUT TELCO TAPS AT THE CENTRAL OFFICE, +OR ANYWHERE ELSE ALONG THE LINE, BUT THIS INFORMATION MAY TELL YOU THAT YOUR +WIFE, GIRLFRIEND(BOYFRIEND), OR BUSINES ASSOCIATE MAY BE MONITORING YOUR PHONE +ACTIVITIES. + +AN INFINITY TRANSMITTER,IS A NEAT DEVICE IT ALLOWS YOU TO CALL THE BUGGED PLACE +AND IT SHUTS OFF THE RINGER AND DEFEATS THE SWITCHHOOK, SO THE MOUTHPIECE NOW +BECOMES A ROOM BUG. IT WAS ORGINALLY SOLD FROM THE TRAVELLING BUSINESS MAN +TO MAKE SURE HIS WIFE WAS SAFE AT HOME NOT BEING ATTAKCED... + +[ DETECTING PHONE BUGS - DR. JIMMY & MR. JIM ] + + +Downloaded From P-80 International Information Systems 304-744-2253 diff --git a/textfiles.com/phreak/WIRETAPPING/dltp1.txt b/textfiles.com/phreak/WIRETAPPING/dltp1.txt new file mode 100644 index 00000000..a7353471 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/dltp1.txt @@ -0,0 +1,95 @@ + + + MAD! PRESENTS... + +A C-NET COMPATABLE MAD! FILE. + +DETECTING LINE TAPS +PART #1 + +THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY. +IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO +RESPONSIBILITY FOR ANY OF ITS CONTENTS. + + +INTRODUCTION BY THE COMMODORE KID. + +WITH THE FBI WATCHING US ALL THE TIME, YOU CAN NEVER BE SURE IF ITS SAFE TO SAY +SOMETHING. EVEN IF YOUR NOT INTO GOOD STUFF, ITS STILL NICE TO KNOW THAT YOUR THE ONLY +ONE ON THE PHONE. YOU DON'T WANT YOUR SISTER LISTENING IN ON YOU. IT IS ALSO WELL +KNOWN THAT ALOT OF THE MAJOR BBS'S ARE BEING MONITORED BY THE FEDS. WELL, WE HOPE +THAT THE INFORMATION PRESENTED HERE WILL ALLOW YOU TO FEEL SAFER ON YOUR TELEPHONE. + + + +MOST TELEPHONE SURVEILLANCE DEVICES USED ON HACKERS NUMBERS ARE VERY SIMPLE. THEY +USUALLY SAVE THE GOOD STUFF FOR SPYS AND PEOPLE LIKE THAT. IT IS IMPOSSIBLE TO TELL +IF THE GOOD STUFF IS ON, BUT WE HAVE LISTED WAYS TO DETECT SOME OF THE CHEAPER MACHINES, +AND IN SOME CASES HOW TO SHUT THEM OFF OR SCREW THEM UP. + +THE MLT-2. THIS DEVICE IS ONE OF THE MAINSTAYS OF BS (BELL SECURITY). ITS MAIN +WEAKNESS IS IN THAT GIVE TONES TO DO ITS OPERATION. A FRIEND OF MAD!'S IS CURRENTLY +WORKING ON A DEVICE HE PLANS TO CALL A PURPLE BOX THAT WILL DETECT THESE TONES. YOU +WILL JUST BE ABLE TO KEEP IT ON, AND IT WILL REPORT ON ANY SUCH TONES. WE WILL KEEP +YOU UPDATED IN FUTURE FILES. OK, IF THE MLT-2 IS IN MON (MONITOR) MODE, YOU CAN DO THE +FOLLOWING: A GOOD OLD LOUD 2600HZ WILL USUALLY SWITCH IT TO LOOP MODE. SOME TIMES A +7200 WILL EXECUTE A TT (DIAL MODE). THESE WILL GET THEM OFF YOUR BACK FOR A WHILE. +IF YOU OWN A MLT-2 ALSO, YOU CAN DAMAGE THE OTHER MLT-2. FIRST GET THE OTHER MLT-2 INTO +LOOP MODE. NOW WAIT TILL IT GETS TO LIN (TEST THE INSIDE PART OF THE LOOP). NOW DO +A K2. THIS WILL PUT THE MLT-2 INTO A STATE OF LIMBO. NOW TO FINISH UP, DO A MLT SOAK +TEST. THIS WILL PUT THE OFFENDING MACHINE OUT OF COMMISSION FOR A LITTLE WHILE. IF +YOU HAVE AN OMEGA BOX (NICE LITTLE THINGS), A FLAT TONE WILL PUT THE MLT-2 INTO A LRM +(FAST LOOP MEASUREMENT), THUS GETTING IT OFF YOUR LINE). + + +CONDUCTER TAGGER AND ANALYZER TEST. + +THIS WILL SHOW YOU APPROXAMATLY HOW MANY PEOPLE ARE ON A LINE. FIRST YOU NEED TO HOOK +A VOLT/OHMS METER UP TO THE PHONE BOX IN YOUR WALL. HOOK THE LINE AND THE GROUND UP +TO THE RED AND GREEN WIRES. YOU CAN USE ONE MADE FOR IT, OR YOU CAN MODITY THE KIND +YOU USE TO CHECK BATTERYS BY PUTTING ALIGATOR CLIPS ON IT. NOW THE VOLT METER WILL RISE +AN FALL DEPENDING ON HOW MANY PEOPLE PICK UP THE PHONE, AND HOW GOOD THE CONNECTION IS. +IF YOUR SISTER PICKS UP THE PHONE, IT WILL FALL. IT PICKS UP OPERATORS, AND WHATEVER. +MOST OF THE CHEAPER TAPPING MACHINES WILL BE DETECTABLE. TAPE RECORDERS CAN ALSO BE +DETECTED. EVEN A PERSON ON A TEST PHONE WILL SHOW UP. ITS A GREAT TOOL. TRY USING IT ON CONFERENCES SOME TIME. + +IF YOU HAVE FRIENDS (OR ENEMYS) THAT LIKE TO LISTEN TO THEIR PHONE CONVERSATION OUT +A PHONE BOXES WITH TEST PHONE THERES SOMETHING YOU CAN DO ABOUT IT. THE FOLLOWING +INFORMATION COMES FROM ABBIE HOFFMAN AND GEORGE HAYDUKE IN THE CLASSIC BOOK 'GETTING +EVEN' THE COMPLETE BOOK OF DIRTY TRICKS. + +CUT THE FEMALE END OFF AN ORDINARY EXTENSION CORD. UNSCREW THE MOUTHPIECE ON THE +TELEPHONE. YOU WILL SEE A TERMINAL FOR A RED WIRE AND ONE FOR A BLACK. ATTACH ONE OF +THE WIRES FROM THE EXTENSION CORD TO THE RED, AND ONE TO THE BLACK. NOW PLUG THE +EXTENSION CORD INTO A POWER SOCKET. ACCORDING TO HOFFMAN YOU ARE SENDING 20 VOLTS OF +ELECTRICITY BACK THROUGH EQUIPMENT MADE FOR 6 VOLTS. FIZZ. + + +NOTE! MAD! SUGGESTS YOU DO NOT TRY THIS. IT IS NOT RESPONSIBLY FOR ANY DAMAGE DONE TO +PHONE EQUIPMENT, OR TO YOU. ACTUALLY YOU WOULD BE SENDING 110 VOLTS THROUGH EQUIPMENT +MADE FOR 48. IF YOU ARE REALLY SERIOUS ABOUT DOING THIS, WE SUGGEST YOU GET A +TRANSFORMER TO STEP THE VOLTAGE LEVEL DOWN. + + + +ANY INFOMATION THAT IS PASSED OVER PHONE LINE CAN BE INTERCEPTED BY THE PHONE COMPANY. +THIS INCLUDES MODEM SIGNALS. REMEMBER, THEY INVENTED ALL THAT STUFF. IN PART TWO WE +WILL EXAMINE WAYS TO STOP THEM FROM MONITORING BBS'S AND EXAMINE OTHER EQUIPMENT. + + +THIS FILE WAS WRITTEN BY THE TRIO. +THE COMMODORE KID + DEATH-STALKER + MR. C0SMOS + +GUEST WRITERS THIS WEEK WERE M, QVI, PHONE BANDIT, THE GREMLIN, AND EXORCIST. + +MAD! IS A GROUP DEVOTED TO G-FILES. IF YOU HAVE ANY QUESTIONS, OR THERE IS ANYTHING +YOU WANT US TO WRITE ABOUT, CONTACT US AT MAD! WORLD HEADQUARTERS- PC MAIN (313) +386-4698 + +8/20/85 + +CALL THE CIA FOR ALL MAD FILES + 607-324-0197 TELL'EM MAD SENT YA' + diff --git a/textfiles.com/phreak/WIRETAPPING/dltp2.txt b/textfiles.com/phreak/WIRETAPPING/dltp2.txt new file mode 100644 index 00000000..e2824059 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/dltp2.txt @@ -0,0 +1,98 @@ + + MAD! PRESENTS... + +A C-NET COMPATABLE MAD! FILE. + +DETECTING LINE TAPS PART 2 + + +THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY. +IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO +RESPONSIBILITY FOR ANY OF ITS CONTENTS. + + +THANKS TO MR. X OF A BELL COMPANY WE HAVE LEARNED HOW TO DEFEAT MOST SURVEILLANCE +DEVICES USING BLUE/OMEGA BOXES. THE BLUES RANGE IS VERY LIMITED, BUT THE OMEGA BOXES +COVERS MOST OF THEM. SEE MAD!'S NEW OMEGA BOX HANDBOOK FOR MORE INFO. + +DEVICE NAME RANGE TONE + NOTES. + +MLT-2 1400-7200 4800 + SEE DETECTING TAPS #1 + +MLT-1 1400-6400 1200 + +AT&T SCANCAT 900-1200 2600 + SEE SCANNER BY CAN-AM PIRATING + NETWORK + +SCANCAT 2 1200-2600 2600 + +ADS SCANNING SYSTEM 2600-4800 12000 + +BELL 1021 7200 12000 + +BELL 1100 400-800+1200-7200 GOLD 2600 + SEE OMEGA BOX HANDBOOK AND FUN/OMEGA BOXES 1-2 + +MACE(NICKNAME IF YOU KNOW THE REAL NAME TO THIS MACHINE, PLEASE GIVE IT TO US.) + 6200 GOLD 6200 + THIS DOESN'T ALWAYS WORK. + +ADS MONITORING TEST. + +ADS IS THE NEW TRACE/MONITORING TEST BEING USED BY AT&T, MCI, SOON SPRINT, AND MORE. +IT IS VERY FAST AND ACCURATE, BUT IT HAS MANY MANY FAULTS. + +AFTER MUCH TESTING WE FOUND THAT IF YOU DO A 7200 AND ADS IS ON THE LINE, A VOLT METER +WILL GO GO CRAZY. A SIMPLE GOLD WILL MAKE A POP IF ADS IS ON THE LINE. FOR A LOT +MORE ON ADS SEE MAD!'S UPCOMING DETECTING LINE TRACES. + +TAP TEST NUMBERS + +LATELY MAD! HAS AS BEEN SEEING ALOT OF THOSE TAP TEST #'S. OUR FRIENDS AT THE PHONE COMPANY SAID THERE ARE SUCH #'S, BUT THEY WILL ONLY DETECT CERTAIN THINGS. HERES A +SMALL LIST. MAD! IS NOT SURE IF THEY WORK, AND DIDN'T HAVE TIME TO TEST THEM. WE +WILL PRINT THE RESULTS IN AN UPCOMING FILE. IF THEY DO, WE WILL PRINT ABOUT 25 OF +THEM. + +THIS CAME FROM SOMEONE NAMED HACKER SMITH, BUT WERE NOT SURE WHAT SYSTEM. HERE IT IS... + + +I GOT A # TO SEE IF YOUR BEING TRACED. WHEN YOU CALL IT USING YOUR PHREAKING +SERVICE,YOU SHOULD HEAR A TONE THAT GOES UP IN FREQUENCY,THAT MEANS YOUR NOT BEING +TRACED. IF YOU HEAR A STEADY TONE, THEN YOUR BEING TRACED AN YOU'D BETTER HANG UP IN +LESS THAN 30 SECONDS OR YOU RUN THE RISK OF BEING TRACED...THE # IS 617-890-9900. + ENJOY, + HACKER SMITH + +ALSO YOU SEE THE NUMBER POSTED AROUND 200-XXX-XXXX. THIS IS A ADS SYSTEM USED BY BELL +LINEMEN FROM PHONE BOXES (SEE THE MAD! FILE ON TEST PHONES FOR INFO ON PHONE BOXING.). +IT IS NOT A TRACE TEST AT ALL. + +THERE MAY OR MAY NOT BE A DETECTING TAPS 3, DEPENDING ON HOW MUCH MORE INFO WE GET. +WATCH FOR DETECTING LINE TRACES COMING SOON TO A BBS NEAR YOU. + +THIS FILE WAS WRITTEN BY THE MAD! + BULLPEN. + +THE COMMODORE KID COMPLIER WRITER MR. C0SMOS ELECTRONICS INFO WRITER + +THE GREMLIN THE WORLDS GREATEST EXPERT ON +THE OMEGA BOX +MR. X TELEPHONE INFORMATION + +AND THE MANY PEOPLE WHO HELP US OUT... DEATH-STALKER THE DEFENDER DEMON PHONE BANDIT +MR. Y 8-BALL AND MANY MANY MORE. + +MAD! IS A GROUP DEVOTED TO G-FILES. TO CONTACT US CALL THE MAD! MAILBOX ON THE ? MAIN +BBS (313)-278-9629 OR PIRATES CORNER 1 (313)-386-4698. + +9-9-85 + + CALL THE CIA 607-324-0197 FOR ALL + THE MAD FILES AND TELL THEM + RITZ CRACKER SENT YA' + + + diff --git a/textfiles.com/phreak/WIRETAPPING/eaves1.txt b/textfiles.com/phreak/WIRETAPPING/eaves1.txt new file mode 100644 index 00000000..7401f117 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/eaves1.txt @@ -0,0 +1,316 @@ +12/19/91 11:14pm + +Basic Eavesdropping #1 +The Electronic Ear +------------------ +Written By The Freddy +In Association With The National Newtwork of Anarchists and Nihilists (NNAN) + +Introduction +------------ + This text file is the first in a series on the topic of eaves- +dropping. My trusty Webster's Compact Dictionary defines eavesdropping as +the art of listening secretly. This can be useful to the young anarchist +in many ways. Suppose that, as a beginning phreak, you are given the +undubious assignment of being the lookout. Well, you want to hear the +guard coming while being as far away as possible. Or you stake out your +mark's house to find out as much as you can before you get your revenge. +Well, again, you want to hear as much as possible without making yourself +known. To find out how to properly accomplish these and many other tasks, +read on. + +Disclaimer +---------- +This document was intended for informational purposes ONLY, the author and +the National Network of Anarchists and Nihilists do not endorse or support +any illegal action presented here or in any other documents which we +release. The only motivation for the writing of this document is purely +for educating the general public. The author and the National Network of +Anarchists and Nihilists will not be held responsible for any actions by +the reader of this document. + +Description +----------- + The Electronic Ear is alot like those "high tech" Listenaiders +which boost sound. Think of the possibilities. With the Electronic Ear +you can hear whispers 500 feet away or a conversation half a block away. +You can listen in and record for all posterity the conversation on the tape +of your choise. Of course, it is illegal to listen in on and/or record a +conversation without the permission of the parties doing the conversing. +Two versions will be presented. One that uses a parabolic dish (like on +satellites); the other uses a highly directional shotgun microphone. Both +use the same easy to build superamplifier circuit. + +Parts List +---------- +Amplifier Circuit +----------------- +R1 10 k-ohm resistor +R2 100 ohm resistor +R3 4.7 M-ohm resistor +R4,R6 3.3 k-ohm resistor +R5 220 ohm resistor +C1 220 pF disc +C2,C3,C5 0.47 æF disc +C4 1.0 æF polarized electrolytic +IC1 LM387 integrated amplifier IC +D1 1N34A +S1 SPST switch +Mike Electret condenser microphone +(1) Project box, 2 3/4 by 5 1/8 by 1 3/4 +(1) 1/8 inch microphone input audio jack +(1) 1/8 inch sound output audio jack + +All resistors are 5 to 10 percent tolerance, 1/4 watt. +All capacitors are 10 to 20 percent tolerance, rated at 35 volts or more. +LM387 amp is available in kit form from: + + ALLEGRO ELECTRONICS SYSTEMS + 3E MINE MOUNTAIN + CORNWALL BRIDGE, CT 06754 + (203)672-0123 + +Mail order company. Catalog available. + +Construction Of The Amplifier Circuit +------------------------------------- + The Amplifier Circuit is based on an LM387 dual preamp IC. In +layman's terms, the preamp first increases the amplification from the +microphone about 47,000 times, and then limits the audio signals of only 1 +volt peak to peak or less to go to the output jack. This will save your +ears in case one of your less scrupulous friends shoots a cap gun in front +of the mike. Use a universal solder board for the circuit. + Construction is pretty straightforward. I have included both the +schematic and a picture of what the finished circuit should look like. + +Schematic Of The Amplifier Circuit +---------------------------------- + + C6 220pF o To tape Power supply + ----|(--ground | circuit decoupling/filtering + | C5 \./ or C2 + | .47 æF --- headphone ---|(--- + | | amp | .1æF | + | ----o----------------o V+ o--o--|(--o--ground + | | | | C1 + | D1 \/ | | 1000æF + | 1N34A - | | + | | | | Recorder interface + |___________o | | J1 + | | | (o)------ + R5 / / R6 | Tip| | + 220 ohm \ \ 3.3 k-ohm |5 \/ | + / / /\ ---/\/\/\/---o--ground + \ \ / \ | R1 + | | / \ o 10 k-ohm + S1 ----o 6 / IC1b \ 3 + o-o /o--o-------| -------/ LM387 \-------o-ground + / | | /--------------------\ | + | | |7 |8 C4 1.0 æF| + | | | | + | + | |------------o |----o---|(--- + | | | + | R4 / | + | 3.3 k-ohm \ | + | / | + | \ | + | | | + | \./ C3 | + | ---.47 æF | + | +| | Headphone amp + | | | J1 + | ------------------o | (o)------- + | | 4| | Tip| | + | / /\ | | | + | \ R3 / \ | C2 \./ | + | / 4.7 M-ohm / \ | 4.7æF --- | + | \ / IC1a \ | | C1 | + | | / LM387 \ | | .1æF | + | | /-------------------\ | o--|(---o + | | 2| 1| | Q1 | | + | --------------o --------- 2N2222 | | + | | c e | R4 | + | R2 / V+ o------o----\ /--o-\/\/\-o-ground + | 100 ohm \ | \/ 1 k-ohm| + | / R2 / ---- \ + | \ 22 k-ohm\ b| R3 / + | | / | 27 k-ohm\ + | C2 \./ \ | / + | .47 æF --- C1 --------o------------- + | R1 | 220 pF \ + |----\/\/\/\-----o----|(------- / R1 + 10 k-ohm | | \ 1 k-ohm + | ---------o---ground / + | | | + Mike o + +Suggested Parts Layout +---------------------- + Headphnone Mike Jack + Jack_____ _____ + --| |-----| |------------------------------------------------ + | | | | | -------- | + ON/OFF | --- --- _____|______|____ | + switch --- ______________________________________ | | | + O--| | | __________ | | | | + --- | -|__________|- _|_ _|_ | | | | + | | | | | | | | | | + | | ____/------------\____ | | | | | | | | + | | \------------/ | | | | | | Battery | | + | | | | | | | | | | + | | _|_ -|- -|- | | | | + | | | | _ _ _ _ | | | | + | | | | _|_|_|_|_|_|_|_|_ | | | | + | | | | | | | | | | + | | | | | | | | | | + | | -|- |_______________| | | | | + | | |_| |_| |_| |_| | | | | + | | Circuit board | | | | + | -------------------------------------- | | | + | ----------------- | + |_______________________________________________________________| + + +Notes +----- + If you cannot understand the schematic, then get a friend to make +it for you. You should be able to build the circuit with a minimal amount +of electrical experiance. + If you plan to connect the output to the line input of a tape +recorder, use a 10 k-ohm potentiometer as a level control and be sure to +use shielded cable to reduce unwanted hiss. + Test the circuit before building the rest of the Electronic Ear. +Connect a electret condenser mike to the input jack and a pair of +headphones to the output. Don't put the headphones directly over your +ears. I found this out the hard way. Turn the circuit on and listen for +the squealing sound of the oscillating circuit. If you don't hear it, go +to the next step. If there is an oscillation problem, increase the value +of C6 to 330 pF or 470 pF. Also try increasing R5 from 220 ohms to a +higher value that will reduce or eliminate oscillation, but it will also +decrease the gain of the circuit. If oscillation is still a problem, then +try replacing R3 with a 1.5 m-ohm resistor. This should decrease the +overall gain of the circuit. + +The Parabolic Dish +------------------ +Parts List +---------- +1 Spun aluminum or plastic parabolic dish +1 10 inch length of 12 gauge wire +2 #12 crimp on connector + +Dish available from: + + EDMUND SCIENTIFIC CO + P.O. BOX 5408 + SCOTTSDALE, AZ 85261 + (609)573-6250 + +Mail order company. Catalog available. + +Construction Of The Parabolic Dish +---------------------------------- + The most effective way of tuning in on distant sounds is to use a +parabolic dish. I used an 18 inch diameter dish purchased surplus from +Edmund Scientific. Other dishes, both metal and plastic, will do. + The microphone must be positioned at the focal point of the dish. +You could use the complicated algebra method, but an easier way is to +position the dish in full sunlight and move small piece of paper in and +out of the center until you see a small, bright spot. Measure the distance +from the paper to the base of the dish and you have the focal point. If +the dish is not reflective, try covering it with aluminum foil. + You want to mount the microphone to a standoff. This can be made +from a coat hanger adjusted to fine tune the focal point. The microphone +should be physically insulated from the standoff using double sided tape. +The finished standoff and mike should look like this: + + _________ + / \ + | \ + | | + | |-| + Coat | | | Crimp-on spade + hanger | | | connector (bend + bent | --|-| out tongue) + to | + shape | + | + | + | + | + |-| + | | Crimp-on spade + | | connector + |-| + | + + Attach the amplifier to the side of the dish using some hardware or +double sided tape. + Paint the dish flat black so it does not glint in the sunlight. +Also, add a 1/4" 20 bolt and sleeve coupling to one side of the dish to +provide a meansto secure it to a tripod. This works quite well. + + _ + / + / Parabolic + / dish + Amplifier / + circuit / + |---/ + | | + | |--\ o\ + | | \-----/ + |---\ + \ + \ + \ + /\\ + / \\_ + \ / + |__| + / \ + / \ Tripod + / /\ \ + +The Shotgun Mike +---------------- +Parts List +---------- +1 40 inch lenght of 4 inch PVC or ABS plastic pipe +1 4 inch end cap to fit onto one end of pipe +1 3 inch round speaker (replaces Mike) + +Construction Of The Shotgun Mike +-------------------------------- + The Shotgun Mike is cheaper to build than the parabolic dish. It +does not collect as much sound, though, but it is more directional. + The speaker needs to be physically isolated from the tube to reduce +the effects of vibration. I have found that a pice of 2 inch thick foam +cut to 4 1/2 inches in diameter works well. Punch or cut out a small +circle in the center so it looks like a doughnut. + Solder an 8 inch length of shielded cable to the terminals of the +speaker. Press the magnet of the speaker through the small hole and slip +the foam and speaker into one end of the tube. + Solder the other end of the speaker wire to a 1 1/8 inch plug. +Drill a hole in the end cap for the speaker wire, mount the amplifier, and +you're set. The finished product should look like this: + + Amplifer PVC pipe + circuit --------------------------------------------------- + ##########||----| / + ##########|| F | / Speaker + ##########|| o |-| + ##########|| a |-| + ##########|| m | \ + ##########||----| \ + -------------------------------------------------- + +Conclusion +---------- + Now that you know how to build an Electronic Ear, you probably want +to know how to use it. That will be upcoming in a future installment. +Until then, build one yourself. I can be reached at The DeaTh BoX +BBS--(714)970-6710--which is the home of NNAN. Well, it's getting late so +until next time, adieu. + +12/24/91 1:27am diff --git a/textfiles.com/phreak/WIRETAPPING/es.txt b/textfiles.com/phreak/WIRETAPPING/es.txt new file mode 100644 index 00000000..59b8e887 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/es.txt @@ -0,0 +1,429 @@ +Electronic bug detection +'''''''''''''''''''''''' + + Electronic bug detection will probably be the most difficult aspect of this entire +field, as you will be working on your own, without the aid of much useful information +that can be gathered from the telephone company or other agencies. (Most telphone bu +gs, except the sophisticated ones, can be detected by an overload on the phone line +itself) A good tool for bugging detection is a normal AM-FM radio receiver, portable, +with a telescopic antenna. For application, extend the antenna in the room suspecte +d of being bugged and tune the receiver carefully from the bottom to the top, covering +all the FM frequencies, at the same time, talking to yourself continually. At one +point, if a bug is present, you will be able to hear your voice through the receiver, + although the voice may be indistishguishable, because of top volume feedback. This +feedback will always be a deafening continuous howl, scream, or high-pitched whistle. +To learn the exact location of the bug, cut the volume of the receiver, and slowly +move around the room. The feedback will increase in volume as you get closer to the +bug. When a bug is discovered, there is a moment of confusion and fear in reguards to +its elimination. In one sense, destroying a bug is an admission of guilt, and can +do nothing more than provoke the enemy to rebug in a more sophisticated manner. For +that reason, I would hesitate to remove a bug. Instead I would attempt to use it +against the bugger himself, by feeding him flase and misleading information. + In some cases the bugger may have taken precautions on this type of detection and, +by readjustment of his oscillating capacitor, he may be transmitting on a range below +the sensitivity of your radio. In this case employ your television set in the same +manner as you did the radio, using the ultrahigh frequency knob. As you move across +the range of frequencies, keep your eyes on the picture, until you have found a pattern +of dark wavy lines that move in relation to your own voice, coupled with top-volum +e feedback. The actual location of the bug is a little more difficult, unless your TV +set is battery operated, but by use of several extension cords and slow movement, this +can be accomplished. + The feedback technique can also be used when the bugging involves (citizens band) +walkie-talkie. One of the simplest methods of bugging is to tape down the transmitter +button on a cheap walkie-talkie, and plant it to where the conversation is to be hel +d. The process of detection is exactly the same as above, except that, instead of using +a radio ro TV set, one uses a tunable CB receiver to check for feedback. + Although the previous "feedback technique" can be effective, it is time-consuming and +not 100 percent efficient. For these reasons, electronic experst have invented an +marketed a small meter, which detects transmitters. The interesting problem that th +ese experts have overcome was, with all the high-powered radio and TV stations +transmitting, how would it be possible for an individual to detect a low-powered +transmitter, such as a microphone? This was overcome by simply reversing the gauge. +In other +words, when the meter was "wide open,"no signal was present. However, the closer the +meter was taken to the transmitting device, the less of the reading the meter registers. +These fie~- meters are available from most large electronic companies and range + in price from about $10 to $200, depending on quality and strength. + A device similar to the "strength meter," which a Texas company has marketed, utilizes +a small bulb, which blinks only in the presence of a bug. The true value of this device +is that it is capable of seperating normal radio wave (which do not affect it +) from the dangerous radio signals emitted from a bug. It is available from Dee +Company, Houston, Texas for about $200. + If your not electronically minded, or just not equiped to find the tap on your phone, +Continental Telephone has a device that allows you, through the use of its meter, to +determineif the wire is tapped, and, if so, where it is located. Unfortunately th +is device (called "the Private Sentry) costs $250. + + +Electronic jamming +'''''''''''''''''' + + Most of the devices written about so far in this chapter are legal, with regulations +placed on their application, but the very possession of certain jamming devices is +illegal. These jamming devices basically destroy the effectiveness of a bug rather t +han locate it. The reason the FCC has put strict regulations on these is the effect +they have on other means of communications, such as completely destroying AM radio +reception, rendering TV sets useless, making communications on police band radios impos +sible, and even to some degree interfering with aircraft communications. To be truly +effective as any-bugging devices they must cover the whole spectrum of radio +frequencies, which in turn will cause interference to other outside receivers and +transmitte +rs. For this reason control is of the essence. When determining what exactly you wish +to jam, you must also determine the frequency to be used, so as not to interfere with +other signals. If you decide to use a jamming device for an illegal purpose, you + must at all cost maintain mobility. (Jamming from the back of a moving truck has been +prooven effective) Mobility is necessary, because the FCC also employs detecting and +locating devices for use against underground radio stations and unregulated jammin +g devices. + There are basically two types of jamming devices, the first of which is not +manufactured commercially and would have to be built by the individual. This type is +called "spa~-gap device," and is more powerful than the other, covering greater +distance. +The second type is refered to as "the white noise device," and is manufactured by +Continental Telephone, Dectron Industries, Inc., and Telsec, with a price range from +about $150 to $350, depending on strength. + + +Electronic scramblers +''''''''''''''''''''' + + Electronic scramblers are devices that simply act as an an~-bug mechanisms by +transforming normal speech patterns into unintelligable sounds. The most primative +method, outdated today, is recording a message on a tape recorder, and then transmitting +it +, either by playing it backward or at a different speed. Although this method may +momentarily frustrate the bugger, if he has half a brain, it won't take him long to +decode your message. The basic principle of scramblers, or any coding device, is to +ren +der the message useless to anyone except the desired recipient in cont + + There are several types of electronic scramblers, all effective but all sharing the +same disadvantage - price. The most inexpensive one I found in any catalogue ran about +$500, but then anyone with the slight knowledge of burglary will not be put off by + this obstacle. The most popular type is manufactured by Dectron, and is used as an +extension to the telephone. The spech is garbled before it enters the mouthpiece of +the phone, and decoded after it has left the receiver. A pair of these run just over + $500, but the real disadvantages to these devices is that the individual code your +devices are working with is retained in a vault by the company, so that anyone with +access to that vault can break down your security. + The second device used for scrambling is manufactured by an English company, and it +works on the principle of inverting the normal speech patterns. In other words, it +makes low notes high, and high notes low. This offers the individual a little bit mo +re security, as each person's speech frequency is as differnt as his fingerprints. +Their major disadvantage is price. It sells for between $1,000 and $1,500. + The third type of scrambler is used only for radio transmission. This device can also +be purchased through Dectron, for about the same price as mentioned before. The radio +scrambler works on basically the same principle as all other scrambling devices +, in that it inverts or disorders the frequency and pitch of the speech pattern while +it is being transmitted, and then reverses the garble to render it understandable to +the receiver. + + +Mail order & retail electronic outlets +'''''''''''''''''''''''''''''''''''''' + + I have listed below some of the major electronic mail order and retail outlets. Many +companies that sell this type of equipment do so only to police officers, and require +the purchaser to prove his relationship with some law enforcement agency. For th +at reason they have not been included. These companies listed are all involved in the +manufacturing and/or sales of eavesdropping and surveillance equipment. + + S.A.C. Electronics, + 4818 West Jefferson Blvd., + Los Angeles 18, California + + Baker Electronics Co., + R.R. 3, + Greencastle, Indiana + (mail-order plans and kits only) + + Dehart Electronics, + P.O. Box 5232, + Sarasota, Florida + + Continental Telephone Supply Co., + 17 West 46th Street + New York, N.Y. + (fantastic catalog) + + Martel Electronics Sales, Inc., + 2356 S. Cotner Ave., + Los Angeles, California + + R & S Research, Inc., + 2049 Richmond Ave., + Houston, Texas + + Mittleman Manny, + 136 Liberty Street, + New York, N.Y. + (only custom devices $400 ) + + Clifton, + 11500 N.W. 7th Ave. + Miami, Florida + + Consolidated Acoustics, + 1302 Washington Street, + Hoboken, N.J. + {only listening devices) + + Ekkottonics Co., + P.O. Box 5334, + Milwaukee, Wisconsin + {(che}) + + Dectron Industries, Inc., + 13901 Saticoy Street + Van Nuys, California + (only an~-bugging equipment) + + Dee Co., + Box 7263, + Houston, Texas 77008 + + T~-Tron of Dallas, + 330 Casa Linda Plaza, + Dallas, Texas + {(discount bugging equipme}) + + Security Electronics, + 11 East 43rd Street, + New York, N.Y. + + Telephone Dynamics Corp., + 1333 Newbridge Road, + North Bellmore, N.Y. + {(only miniture microphon}) + + Simlar Electronics, Inc., + 3476 N.W. 7th Street, + Miami, Florida + + Tracer Systems, + 256 Worth Ave., + Plam Beach, Florida + + The federal Communications Commission and the Supreme Court have been uptight about +wiretapping and eavesdropping for some time. They have both passed laws and made +regulations concerning electronic surveillance. For these reasons, I would emphasize +t +he utmost care and knowledge in the application of these devices. What is intersting +is the actual wording of the law, where any interstate wireta{(interstate does not mean +interstate, it applies to all tapping through some strange log}) except in a matt +er of security is against the FCC's regulations and is punishable by a fine of no more +than $10,000 or five years in jail. The neat little exception made for security gives +all of government agencies, particularly the FBI and the CIA, and all local polic +e departments, free license to practice all and any forms fo surveillance without any +restrictions. Although certain cases have been dismissed in court cases because of +"tainted" methods of collecting evidence, in reality if the government feels an indiv +idual is a security ris{(for any reas}) it can produce tapes in court that have been +gathered by wiretapping, supposedly not as evidence, but the defendant goes to jail +anyway. + America, at this point, is operating on a li~-size Monopoly Board. Everyone who isn't +in jail or going dirrectly to jail is buying and selling thousands of pieces of paper, +with absolute seriousness of purpose, unable to realize that there will be only + one winner, and when he gets out of jail, he's going to kick all their asses. + + +Broadcasting free radio +''''''''''''''''''''''' + + In any underground, throughout history, a prime concern has been communications or +propaganda. Propaganda, as a word, has ugly connotations, but in reality it means +nothing more than the distribution of information. This country has begun to develop +a +n underground network of communications, in the many small newspapers which has cropped +up all over the country. Although there is a spark, there is also a monstrous lack of +communications, once you get outside any of the large metropolitan areas. In pr +eparation of writing this book, I had to do a great deal of reference work. In this +reading encompassed almost all extremities of the political spectrum, from far left to +far right. These extremities are so alike, and could be so powerful if they ever g +ot over their preconceived impressions of each other and started to communicate. This +is the reason I feel the underground has to take propaganda one step further, from the +printed page, to the radio broadcast. + + The radio is a factor of ext~- + ordinary importance. At moments + when war fever is more or less + palpitating in every one region + or a country, the inspiring, + burning word increases this fever + and communicates it to every one + of the future combatants. It ~- + plains, teaches, fires, and f~- + es the future positions of both + friends and enemies. However, + the radio should be ruled by the + fundamental principle of popular + propaganda, which is truth; it + is preferable to tell the truth, + small in its dimensions, then a + large lie artfully embellished. + ~-Che Guevara + Guerrilla warfare + + Kwame Nkrumah, in his HANDBOOK OF REVOLUTIONARY WARFARE, also stresses the use of +radio propagnda. He breaks it down into two basic forms: The first and most important +is the same as Che was writing about in the above quotation, this being to communic +ate truth to people of the country about the struggle. Nkrumah takes this idea one step +futher, and says that really to communicate the underground must speak on many different +levels, and this is a key point. How can an anarchist who has a rig~-wing ba +ckground understand or relate to a le~-wing anarchist, who uses Marxist terminology? +This forces the underground to communicate with many different frames of reference. +This hasn't happened in this country: Everyone from far left to far right is hung up + with dogmatic ideals, over used terminology, and is absolutely blind to practicality. + Nkrumah's second concept of propaganda is for the purpose of subverting the enemy. + + An indispensable primarily to + battle is to attack the mind of + the enemy, to undermine the will + to fight so that th result of + the battle is decided before the + fighting begins. The revoluti~- + ary army attacks an irresolute + and demoralized army. + ~-Nkrumah + Handbook of + Revolutionary + Warfare + + This use of propaganda to discourage the enemy has also a great place in the struggle +that is going on in this country today. It has been used to a small degree, with +fantastic success, around military bases. There was a regiment of the National Gaurd + that refussed to go to Chicago during the National Democratic Convention. Underground +newspapers and handbills have encouraged G.I.'s to dissent and desert, and have shown +them that it is possible. The effectiveness demonstrated by this demoralizing fo +rm of propagnda depicts nothing more than the real turmoil that exists. The successful +effect of this communication has resulted from one aspect of its natu~--that being its +passionate reguard for truth. + Printing a revolutionary newspaper is a great deal easier than forming a underground +radio station. Althought the government has strict restrictions on printed material, +it is nothing like the regulations it places on radios and television broadcasting +. The FCC runs the radio networks with an iron hand, wih the ever present threat of +revoking a license. For this reason, any radio station which is striving to be +absolutely free must make the ultimate break with the FCC. This can be accomplished +in tw +o ways. The first and most dangerous, but at the same time the most effective, is by +using high powered equipment, jamming out other stations, from a mobile base of +operations. The FCC has incredibly sophisticated equipment, and can locate any pirate +r +adio station in a matter of minutes. For this reason, mobility is essential. +Transmitting from the back of a disguised truck has been used successfully, although +the movement of the truck while broadcasting must be constant, never repeating the same +pat +tern, but at the same time keeping within the broadcast power area. This means of +transmission is especially effective at gathering, such as demonstrations and riots to +keep people informed as to the movement of the enemy. The best method of obtaining e +quipment is building your own, as to buy a large transmitter requires the individual +to be licensed. Not only that, it's expensive. You can build your own from plans and +equpiment purchased through mail order, from most of the companies listed earlier i +n the text file. + The second method for getting around the strict FCC regulations is legal. Under the +FCC's l~-pow~-transmission regulations, one can legally broadcast below 100 milowatts +at any empty space on the AM or FM dial, without registering or being licensed. T +he disadvantages are obvious: One can be only broadcast up to one mile. Even within +that mile, interference from the hi~-power commercial stations is present. And if +enough people get into this form of broadcasting the FCC is going to make some sort of + regulation against it. This method is not just theoretical, it has been inplemented +on the Lower East Side, by John Giorno and his Guerrilla Radio. He broadcast from the +top of the St. Mar~-~-t~-Bowerie's belltower at 1400 on the AM dial, and calims he + did everything the FCC said he couldn't. I am sorry to say I did not hear the +broadcast, as I was out of the o~-mile area at the time. + + +Telephone and communications sabotage +''''''''''''''''''''''''''''''''''''' + + Telephone sabotage can be applied on many levels. First I am going to explain what +I am not going to write about. I feel there is no need for me to explain how to make +free phone calls by telling the operator that you dialed the wrong number, just as +I am not going to get into explaining how to use a number 14 washer with scotch take +in a pay phone, or cheating on credit card calls, or spitting on a penny. These are +all explained in FUCK THE SYSTEM, a pamphlet on living freely in New York City. The +interst I have in telephone sabotage is purely communicational and commercial. + Commercial inn the sense, that over the past few years my absolute hatred of vending +machines and pay phones has led me to break into almost every kind I could find. +Parking meters are the easiest by far: All you need is a hammer and chisel or a larg +e money wrench. Soda machines are almost as easy, but real delight comes from ripping +a Kotex machine off the wall of a womans restroom, or sticking an explosive charge in +the coin slot of a pay toilet. I have never been able to break into a pay teleph +o~--smash them, yes, put them out of order, but never able to open them up and remove +the coins. This is for several reasons: One is the time element, as most public phones +are easily seen, and the other is that all public phones are installed with amaz +ing locks, which have completely baffled me. + To get back to the purpose of this section, I must emphasize the importance of +breaking down the enemie's communications. This in turn results in confusion and chaos. +Imagine, for a moment, a squad car without menas of communicating with its precinct, + or an enemy aircraft with its radio jammed. This act of breaking down the enemy's +lines of communications is not and end in itself, rather it is a tact~--a small, but +extremely important, part of a total operation. + When considering communications, it is best to start from primative base and work up +to more sophisticated tactics. The first and simplest method for rendering a telephone +inoperative is only temporary. It entails calling the phone company that a cert +ain number be disconnected. This will work for individuals, but not for agencies or +law enforcement organizations. An important factor in any form of telephone sabotage +is the time aspect of verificati~--in other words, the amount of time it takes the +phone company to trace a call. The phone company can tell right away if you are calling +from a pay phone, so this should be avoided. Call from a private phone which you can +not be connected with, and limit your conversation to under ninety seconds. IMP +ORTANT: Most law enforcement organizations, companies, corporations, and businesses +have more than one phone line, and in most cases one or more will be unlisted. + A common misconception is that a person can render a phone useless by dialing a number +and, before the party answers, leave the phone off the hook. This si not true, and +doesn't work. Even if the caller does not hang up the phone, the receiver can get + a dial tone by hanging up himself and holding the hook down for a little over thirty +seconds. Although this method does not work in the cit{(I know because I have +experimented with }), I have heard reports that it has been used in rurla areas with +varyi +ng degrees of sucess. I would suggest trying it out with a friend, to see if it is +effective in your area. + The other truly effective method is the most dangerous. It entails the actual cutting +of the phone wires. This is much easier in a rural area where the phone lines are above +the ground, and there are not so many of them. It should be noted that compl +ete telephone communications with a small town or village can be broken in less than +ten minutes. Probably the most important thing here is having a complete understanding +of what you are doing, and using the correct tools. Phone lines do carry electric +al charges and, without the complete knowledge of what you are doing and without the +correct tools, it would be very easy to electrocute yourself. In rural areas, the basic +tools should be: rubb~-soled shoe{(sneake}); pliers with rubber grips; large heav +~-duty wire or tin cutters, also with rubber grips; a pair of surgical rubber gloves; +a small flashligh{(operate at nig}); and a body strap to allow you free movement of your +hands once at the top of the pole. IMPORTANT, before attempting any telephone w +ire cutting, get hold of a copy of telephone repairman's manual, and read it. + This same operation can be preformed in urban areas, although the process is much more +involved. In most urban areas the phone lines run beneath the street level, and they +are`usually`) + + to the phone lines in the sewers, there are also all the hi~-voltage electric lines. +If you cut into one of these, I don't care how well insulated you are, you'll fry. An +urband saboteur should either be in possession of a detailed map of the phone lin +es, available at any municipal library, or carry a small electric line locator, so that +he can find the right line to cut. The urban guerrilla, on this sort of mission, should +carry all the tools the rural guerrilla would have, except he should exchange +the body strap for a rubb~-insulated hack saw, also add a crowbar. The hack saw is for +the mtal encasement that surrounds all phone and electric wires in the sewers. Access +to the sewers is pretty easy, as most manholes will take you into an amazing com +plex of all differe~-sized tunnels, where you can get thoroghly lost, unless you have +had the foresight to study a map of the sewers, also available from any municiple +library. Know exactly where you are going, know all the obstacles that you may come +in + contact with, and have several routes of escape planned, in case of an emergency. +Needless to say, if you decide to go into the sewers, dress accordingly. It's cold, +damp infested with rodents, and dark, and many tunnels are partially full of water. + A word of caution about using explosives to sever phone lines: In the sewers, don't. +In Paris in 1945, the French resistance decided that to aid the oncoming Allied troops, +they would cut all lines of communication from the Nazi headquarters and Berli +n. This proved insuccessful, for many reasons, but the important fact was that they +did attempt to use explosives in the sewer system. A small charge was placed right +on the phone lines, and denoted from a good distance away. The phone line was cut, b +ut unknown to the resistance, so was a gas main, right next to lines. The result: +phone lines cut, a large number of civilians dead, and a block and a half completely +leveled. Not only was the area totally destroyed, it was flooded by the bursting of +t +he water mains which also shared the sewers with the phone wires. + One can use small explosive charges in rural areas, as the lines are above the ground. + + +DOWNLOADED FROM P-80 SYSTEMS 304-744-2253 + diff --git a/textfiles.com/phreak/WIRETAPPING/faxint.phk b/textfiles.com/phreak/WIRETAPPING/faxint.phk new file mode 100644 index 00000000..46b55841 --- /dev/null +++ b/textfiles.com/phreak/WIRETAPPING/faxint.phk @@ -0,0 +1,254 @@ +FAX INTERCEPTION + +This article is reprinted from Full Disclosure #23. Copyright (c) 1991 Full +Disclosure. Permission granted by publisher to reprint when subscription +information provided: Full Disclosure, Box 903-R, Libertyville, Illinois +60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll +free: (800) 786-6184. Subscriptions: $18 for 12 issues. + +As with the introduction of all new communications technologies, there is a +time lag between the availability of the technology and commercial +development of interception devices. Accompanying the use of both are +unanticipated risks and the potential for misuse and misunderstandings. + +False Sense of Security + +With the widespread proliferation of fax machines came increased use. In +general, a document transferred has been given the same sort of validity as +one sent or received by U.S. Mail. In general, such communications were +originally secure. Now that interception equipment is available, the sense of +security has become false. + +For all practical purposes, fax is a remote photocopying machine. The process +begins with the sending unit converting the image on the page into a +digitized image (numbers in an electronic format) and transmitting it as a +noise sounding signal over a phone line. The receiving fax converts the +signal into dots and prints it. + +Since the image is transmitted over standard phone lines, the communication +is subject to interception. However, rather than tapping the line with a tape +recorder or simply listening to the oral communications, an interception +device that makes sense of the specialized signal is necessary. Sometimes +this is done by recording the transmission and later converting the recording +of the modem signal to a computer image, sometimes it is done 'on the fly' as +the signal is being intercepted. + +Simple Fax Intercepts + +Why not just use a standard fax machine for interception? The signal +sequences and handshaking at the time machines first connect complicates the +possibility. During startup, the machines automatically select one of several +built in protocols depending on line conditions. That is why on really noisy +connections, the transmission of a page can take much longer. Directly +connecting a 3rd fax machine to the line may confuse this process. Both the +receiving unit and the intercepting machine would be sending signals about +line conditions and protocol. However, if a 3rd fax machine did manage to get +properly synchronized to the signal in use without interfering with the +initial handshake, it would print an image identical to the one received by +the intended recipient. We had mixed results when we tried this in our lab. +Sometimes we managed to get all three machines synchronized. Using unmodified +fax machines to attempt intercepts didn't provide sufficient reliability to +be considered a viable approach. Indeed, continued attempts of this approach +would likely put both sender and recipient(s) on notice that something was +wrong as connections would be repeatedly lost. + +This doesn't mean that it is really complicated to intercept faxes. The +Philadelphia Inquirer reported in September 1990 that Japanese hackers have +been stealing valuable information from corporations by using fax +interception. The article claimed it could be done by anyone with a little +knowledge of electronics. We agree, we have intercepted faxes in our lab. +(See front cover for one such example.) + +Doing It Right + +The latest commercially available fax interception devices generally use fax +boards in IBM PC or compatible computers. The actual hardware used for fax +interception is often the same as used by normal computer-fax systems. The +software is more sophisticated. Rather than attempting to synchronize with +the sending unit by sending protocol information, it adjusts to whatever +protocol the two main players have established and stores the signal +information. + +After interception, the electronic information is stored in the computer and +is available for review, to be printed, altered or discarded. Such equipment +can be left unattended for long periods if necessary, or monitored for the +instant use of information in cases where law enforcement is standing by +waiting for some specific bit evidence. + +Cellular Fax Interception + +Cellular phone based fax machines provide ripe opportunity for `hacker' +intercepts, since the signal is available via low cost police scanners. No +physical connection to a common carrier network is necessary. There is +absolutely no risk of being detected. + +Commercial fax interception equipment gets more complicated, though. Since +fax messages might be on the same phone lines as voice or other computer +modem communications, some of the interception devices automatically route +different types of communications to different interception devices. This +provides the interceptor with a separate recordings of voice phone calls, +faxes, and other computer communications. + +Such fax interceptions are based upon the interceptor having a specific +target. Distributing the sorts of information received for analysis isn't +much different from an ordinary, now old fashioned, wiretap. + +Broadband Interception + +Presorting of signals and voice communications as described above makes +broadband scanning for fax messages easy. The interception of satellite or +microwave links has become possibile. Cooperation by a common carrier with +the government has happened in the past, and strikes a chord of dangerous +reality today. But it really takes little by way of home fabricated equipment +to monitor much of the satellite link traffic. Commercial equipment is also +available. One commercial fax interception unit can decode up to 150 +simultaneous fax transmissions from a 6,000 phone line satellite link. + +Such broadband interception can also be done on oral calls, however, the task +of listening to all the conversations for the important ones is much, much +greater compared to scanning faxes. First, faxes are usually much more direct +and to the point than normal phone conversations (not so much about Sunday's +game). Additionally, optical character recognition (OCR) process can be used +to convert much of the text to standard computer data and then be +mechanistically selected for closer scrutiny by an automated search of +keywords of interest. Encryption of a fax could also be noted, perhaps +triggering further attention. + +The risks resulting from broadband interceptions are henious. Your fax could +be intercepted not because you were a selected target of law enforcement, +industrial spies or miscreant hackers, but because of the route your fax +travelled through the common carrier networks. Broadband interceptions become +a modern day version of general warrants. Satellite signals don't respect +borders. Interception in nations with no privacy concerns for radio signals +of what we, as users, understand to be Constitutionally protected +communications has become a real threat. There are areas contained within our +national frontiers where the United States Constitution does not apply. +Foreign embassies present one such clearcut example. The status on Indian +Reservations is not cleancut. + +Dangers of Fax + +The February 13, 1990 issue of the American Bankers' Association publication +``Bankers Weekly'' reported that ``In one incident, a bank suffered a $1.2 +million loss through fraudulent funds transfer requests which were +accomplished using nothing more than business letterhead, tape and sissors.'' +A fax machine made such simple tools effective. Inordinate reliance on +technology permitted the loss to actually happen. + +The journal continues that there is a need for legislation (changes to the +Uniform Commercial Code) to put a stop to the problem. Unfortunately, +legislative efforts alone cannot correct the problem. The first step, is an +understanding of the technology. + +Once the technology is understood, administrative procedures can be +implemented by users of fax machines to protect themselves. That protection +cannot be successful without understanding the limitations of the machinery. +Taking any communications device for granted is a high risk path. + +New Techniques For Fraud + +The advent of fax technology has opened the door to new methods of fraud. +Those intent on committing fraud have always devised methods of bypassing +normal authentication systems in order to steal. As technology evolves, these +methods also evolve. Protective measures must follow suit. + +Faxes represent a multiple whammy. People who send faxes have some geographic +distance between them. Because of past reliance on semi-automated +communications, formal verification proceedures are bypassed, substituting +the mysterious nature of modern communications. There was a time, even +recently, that tellers at banks asked for positive identification even in the +case of small cash transactions inside a bank. Yet today we witness orders +for large sums being processed simply because ``it came by fax.'' This is +truly a conspiracy of laxness and misinformation. + +A written purchase order from a company is likely to have a particular form, +and include a signature. One attempting to issue a fraudulent purchase order +would need to forge both the form and the signature. Additionally, envelopes +and possibly a postage meter imprint from the issuing company would also be +needed. Elsewhere in this issue we reprint a letter from the Federal +Communications Commission. The letterhead was, for reasons we have been +unable to determine, typed instead of printed. Some of the recipients we've +talked to have placed calls to verify the authenticity of the letter. As it +turns out, the letter was authentic and official. + +A purchase order sent by fax on the other hand, can be created by cutting, +pasting and xeroxing together parts of other orders from the company. When +received by fax, the fake would appear legitimate. + +PC's & Fax: The Miscreants Gun + +The advent of PC based fax boards exaggerates these problem. A fax that +originates, is received by, or intercepted by a personal computer (PC) fax +board really opens the door for miscreants. + +A fax, when stored on a PC is easily modified using ordinary commercial +software intended for preparation of graphics. An image of the fax can be +brought up on the screen and parts of it altered or cut and pasted +electronically. For example, a purchase order could have a shipping address +altered. A signature could be removed from one document and placed on +another. All such operations can be done on a computer screen in moments. +Document changes that could take a professional forger hours to accomplish +could be done in minutes by an amateur, even an underage one. + +Bogus faxes can be created to be sent to another fax, or incoming faxes could +be altered by an employee and printed as authentic. Detection is difficult to +impossible, depending on verification techniques used at audit. + +The difficulty of intercepting standard U.S. Mail or voice phone calls and +altering the content by a third party is enormous compared to fax messages. +Before a fax message is printed, it is just a series of electrical signals. +Any alternations result in changes without a trace of the alteration. + +The receipt of a fax is not a confirmation of its content, unless other +corroborative authentication validates the information. + +Someone with access to a phone closet can route incoming fax line to a PC. +The fax can then be connected to a different phone line. All incoming faxes +would be first received by the PC and the operator could alter, erase, or +forward without change those faxes to the standard fax machine. A pre-review +and alteration if desired scheme can be effected. The same can not easily be +accomplished with normal voice phone calls, or the U.S. Mail. + +With the advent of the Caller-ID services, this information should soon be +incorporated into fax machines, so the true number of the caller will be +placed on the fax. This will still do nothing to prevent transmission of +bogus faxes over that phone line. + +Protect Yourself + +The best rule for protecting one's interests when using faxes is to use them +only with other confirmation or as confirmation of other communications. They +should never be used for final copies of contracts, purchase orders or other +important documents that could have a significant impact if altered, or +entirely fabricated. Where would we be if our WW2 treaties terminating +hostilities were faxed documents. Additionally, information that would not be +given out over a standard phone conversation, subject to a wiretap, or other +listeners (via a speakerphone, extension, etc), should not be sent by fax. +There is no way to tell who may pick up a received fax and read it. In fact, +it is more likely an unintended party will read a fax than pick up an +extension phone and eavesdrop on a voice call (intentionally or not). + +It should be kept in mind that any errant employees or others that could get +access to the fax phone line(s) could intercept all faxes sent or received +and make use of the fax images for whatever purpose they desired. + +The intercepted faxes can be used to collect or create incriminating +evidence, industrial espionage, or as the base of documents to be used in +forgery. There's a whole new meaning to autograph collection. + +Conclusion + +Fax technology in its current form provides a useful service for business and +others. However, the risks must be examined so the use doesn't go beyond that +which is appropriate given its current functionality / risk ratio. + +In conclusion, the convenience of a fax must be weighed against its risks and +procedures implemented to authenticate incoming and outgoing faxes as well as +what information is communicated by fax. As with all technologies, it must be +understood so that it can be used for purposes that are appropriate for the +needs of the technology and the user. A lack of understanding can leave the +user exposed to unnecessary danger, liability and loss. When used with an +understanding of the benefits as well as the pitfalls, a fax machine can +greatly enhance productivity. + +Downloaded From P-80 International Information Systems 304-744-2253